Mesh Network Design Backbone network design goals:

Slides:



Advertisements
Similar presentations
O(N 1.5 ) divide-and-conquer technique for Minimum Spanning Tree problem Step 1: Divide the graph into  N sub-graph by clustering. Step 2: Solve each.
Advertisements

DIJKSTRA’s Algorithm. Definition fwd search Find the shortest paths from a given SOURCE node to ALL other nodes, by developing the paths in order of increasing.
1 Discrete Structures & Algorithms Graphs and Trees: III EECE 320.
Chen, Lu Mentor: Zhou, Jian Shanghai University, School of Management Chen213.shu.edu.cn.
IKI 10100: Data Structures & Algorithms Ruli Manurung (acknowledgments to Denny & Ade Azurat) 1 Fasilkom UI Ruli Manurung (Fasilkom UI)IKI10100: Lecture10.
CP3397 Network Design and Security Lecture 4 WAN design - Principles and practice.
1 TCOM 541 Session 3. 2 MENTOR-II Last session, we talked about routing and how the limitations of routing algorithms introduce complications –They may.
Computing a tree Genome 559: Introduction to Statistical and Computational Genomics Prof. James H. Thomas.
1 Greedy 2 Jose Rolim University of Geneva. Algorithmique Greedy 2Jose Rolim2 Examples Greedy  Minimum Spanning Trees  Shortest Paths Dijkstra.
1 Discrete Structures & Algorithms Graphs and Trees: II EECE 320.
1 Greedy Algorithms. 2 2 A short list of categories Algorithm types we will consider include: Simple recursive algorithms Backtracking algorithms Divide.
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
Traffic Engineering Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Spanning Trees.
Chapter 9 Graph algorithms Lec 21 Dec 1, Sample Graph Problems Path problems. Connectedness problems. Spanning tree problems.
TCOM 501: Networking Theory & Fundamentals
1 A Distributed Delay-Constrained Dynamic Multicast Routing Algorithm Quan Sun and Horst Langendorfer Telecommunication Systems Journal, vol.11, p.47~58,
CS541 Advanced Networking 1 Routing and Shortest Path Algorithms Neil Tang 2/18/2009.
1 Topology Design of Structured Campus Networks by Habib Youssef Sadiq M. SaitSalman A. Khan Department of Computer Engineering King Fahd University of.
TCOM 540/11 TCOM 540 Session 6. TCOM 540/12 Agenda Review Session 4 and 5 assignments Multicenter local access design.
CSE 550 Computer Network Design Dr. Mohammed H. Sqalli COE, KFUPM Spring 2007 (Term 062)
1 Topology Design of Structured Campus Networks by Habib Youssef Sadiq M. SaitSalman A. Khan Department of Computer Engineering King Fahd University of.
Minimum Spanning Trees. Subgraph A graph G is a subgraph of graph H if –The vertices of G are a subset of the vertices of H, and –The edges of G are a.
C o n f i d e n t i a l HOME NEXT Subject Name: Data Structure Using C Unit Title: Graphs.
Nirmalya Roy School of Electrical Engineering and Computer Science Washington State University Cpt S 223 – Advanced Data Structures Graph Algorithms: Minimum.
© The McGraw-Hill Companies, Inc., Chapter 3 The Greedy Method.
Chapter 9 – Graphs A graph G=(V,E) – vertices and edges
Chapter 2 Graph Algorithms.
COSC 2007 Data Structures II Chapter 14 Graphs III.
Introduction to Graphs. Introduction Graphs are a generalization of trees –Nodes or verticies –Edges or arcs Two kinds of graphs –Directed –Undirected.
TCP Traffic and Congestion Control in ATM Networks
A Graph-based Friend Recommendation System Using Genetic Algorithm
Network Topology
Slide 1 Chapter 9 Mesh Network Design - II. Slide 2 Mesh Network Design The design of backbone networks is governed by 3 goals: nDirect path between source.
Network Design with Constraints Chapter 10 Part 2.
Networking and internetworking devices. Repeater.
1 TCOM 541 Session 2. 2 Mesh Network Design Algorithms for access are not suitable for backbone design –Access designs generally are trees – sites connect.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Example Apply hierarchical clustering with d min to below data where c=3. Nearest neighbor clustering d min d max will form elongated clusters!
1 CPSC 320: Intermediate Algorithm Design and Analysis July 14, 2014.
Computer Network Collection of computers and devices connected by communications channels that facilitates communications among users and allows users.
Data Center Network Architectures
Chapter 5. Greedy Algorithms
Shortest Path from G to C Using Dijkstra’s Algorithm
Divide-and-Conquer MST
Minimum Spanning Trees
The minimum cost flow problem
What Are Routers? Routers are an intermediate system at the network layer that is used to connect networks together based on a common network layer protocol.
Introduction to Graphs
Intra-Domain Routing Jacob Strauss September 14, 2006.
CS223 Advanced Data Structures and Algorithms
Autumn 2016 Lecture 11 Minimum Spanning Trees (Part II)
Graph Algorithm.
Discrete Mathematics for Computer Science
Minimum Spanning Tree.
Modeling and Simulation NETW 707
Autumn 2015 Lecture 11 Minimum Spanning Trees (Part II)
CSE 373 Data Structures and Algorithms
Access Network Design A Backbone network connects major sites.
Graphs.
Graph Searching.
CSCI2100 Data Structures Tutorial
CSE 373: Data Structures and Algorithms
CSE 550 Computer Network Design
CSE 417: Algorithms and Computational Complexity
The Greedy Approach Young CS 530 Adv. Algo. Greedy.
COMPUTER NETWORKS CS610 Lecture-16 Hammad Khalid Khan.
CSE 461: Link State Routing
INTRODUCTION A graph G=(V,E) consists of a finite non empty set of vertices V , and a finite set of edges E which connect pairs of vertices .
Presentation transcript:

Mesh Network Design Backbone network design goals: Direct path between source and destination. Well-utilized components Use high speed lines to achieve economy of scale. These goals are self-contradictory. 2/19/2019 C. Edward Chow

Examples of Bad Design Too Many Direct Links; Nodes with High Degree 45 node network with cost=$264,411/month 2/19/2019 C. Edward Chow

Design with Only High Speed Links Warning sign: high average number of hops 2/19/2019 C. Edward Chow

2-Level Design ($96,777) Pick heavy traffic nodes as interior nodes of the tree. 2/19/2019 C. Edward Chow

More Reliable Design Instead of tree, interior nodes form a 2-connected graph. 2/19/2019 C. Edward Chow

A Different Interior Topology Reduce cost from $112,587$108,724 2/19/2019 C. Edward Chow

Add More Backbone Nodes $103,107 cost reduced. 2/19/2019 C. Edward Chow

Even Lower Cost Design $101,806 2/19/2019 C. Edward Chow

Algorithm Complexity and Design Space Size Even if a subset of designs can be identified we are still dealing with big design space. Here the number in D is based on 2 c(45,2) 2/19/2019 C. Edward Chow

Mentor Algorithm [KKG91] Assume single link type with capacity C. Choose backbone sites. (Also called Threshold Cluster Algorithm) Calculate the normalized weight NW(Ni)=W(Ni)/C Choose sites with NW(Ni) > WPARM (threshold) Group end sites around a backbone site, x, based on Cost(x, Ni)/MAXCOST < RPARM. Where MAXCOST=Max i,j Cost(Ni, Nj) If there are sites not covered in groups, compute merit(n)=1/2*(MaxDistCtr-distCtrn)/MaxDistCtr + 1/2*(Weightn/WeightMax) Here and Center of Mass (xctr, yctr) defined by Sort the merit functions. The node with largest merit get picked as backbone node. Group end node around it. Repeat until all nodes are covered in groups. 2/19/2019 C. Edward Chow

Mid Stage of Threshold Cluster Algorithm Big Squares are Backbone nodes. 2/19/2019 C. Edward Chow

Final Stage of Threshold Clustering Based on merit(), three backbone nodes are picked. 2/19/2019 C. Edward Chow

Mentor Algorithm Steps 2-3 Pick median node (root node of the network) with smallest Moment(): Build a restricted Prim-Dijkstra tree rooted at median. Here only backbone nodes can be the interior nodes of the tree. Sequencing Node Pair: Prepare adding additional direct links to the tree. Use the tree to list node pair in “sequence” The node pair with longer path will list first Choose home node H for each node pair (Ni,Nj) (H and Nx are intermediate nodes along the path) that satisfies Cost(Ni, H)+Cost(H,Nj)<= Cost(Ni, Nx)+Cost(Nx,Nj). 2/19/2019 C. Edward Chow

Restricted Prim-Dijkstra Tree Note that there is an end node that violate the constraint. 2/19/2019 C. Edward Chow

Sequencing Node Pairs 2/19/2019 C. Edward Chow

Mentor Algorithm Step 5 Decide which node pairs deserve direct links. Start with the top node pair (N1,N2) in the sequence. Calculate the utilization u=Traf(N1,N2)/(n*C) where n=ceil(Traf(N1,N2)/C). If u>utilmin, add direct link between N1 and N2. If u< utilmin, add Traf(N1,N2) to Traf(N1,H) and Traf(H,N2). Here H is the home of (N1,N2). Remove (N1,N2) from the sequence and repeat Step 5 again until all node pairs are processed. 2/19/2019 C. Edward Chow

Complexity of Mentor Algorithm The three basic steps: backbone selection, tree building, and direct link addition are all O(n2). It can be executed pretty fast. Typically we will generate a set of designs based on the same threshold parameter, e.g., different a in the restricted Prim-Dijkstra tree, or different node pair sequence (note that the sequence are not unique). We then pick the best design from the set. 2/19/2019 C. Edward Chow

Example of Mentor Algorithm Result 15 sites, 5 backbone nodes 2/19/2019 C. Edward Chow

Mentor Algorithm Design 2 $221,590, same 5 backbone nodes, with lower utilmin=0.7 2/19/2019 C. Edward Chow

Mentor Algorithm Design 3 Same 5 backbone nodes but with different tree. $209,220. 2/19/2019 C. Edward Chow

Cost of Designs vs. a and utilmin A=0.1 and 1-utilmin=0.1 is the best value. 2/19/2019 C. Edward Chow

Cost vs. Size of Backbone 2/19/2019 C. Edward Chow