1 Topology Design of Structured Campus Networks by Habib Youssef Sadiq M. SaitSalman A. Khan Department of Computer Engineering King Fahd University of.

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
Topic 7 Local Area Networks (LAN)
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Novembro 2003 Tabu search heuristic for partition coloring1/29 XXXV SBPO XXXV SBPO Natal, 4-7 de novembro de 2003 A Tabu Search Heuristic for Partition.
Optical Networks BM-UC Davis122 Part III Wide-Area (Wavelength-Routed) Optical Networks – 1.Virtual Topology Design 2.Wavelength Conversion 3.Control and.
1 Efficient and Robust Streaming Provisioning in VPNs Z. Morley Mao David Johnson Oliver Spatscheck Kobus van der Merwe Jia Wang.
5-1 Chapter 5 Tree Searching Strategies. 5-2 Satisfiability problem Tree representation of 8 assignments. If there are n variables x 1, x 2, …,x n, then.
Simulated Evolution Algorithm for Multi- Objective VLSI Netlist Bi-Partitioning Sadiq M. Sait, Aiman El-Maleh, Raslan Al-Abaji King Fahd University of.
Spie98-1 Evolutionary Algorithms, Simulated Annealing, and Tabu Search: A Comparative Study H. Youssef, S. M. Sait, H. Adiche
Multiobjective VLSI Cell Placement Using Distributed Simulated Evolution Algorithm Sadiq M. Sait, Mustafa I. Ali, Ali Zaidi.
Fuzzy Simulated Evolution for Power and Performance of VLSI Placement Sadiq M. Sait Habib Youssef Junaid A. KhanAimane El-Maleh Department of Computer.
Finite State Machine State Assignment for Area and Power Minimization Aiman H. El-Maleh, Sadiq M. Sait and Faisal N. Khan Department of Computer Engineering.
1 Greedy Algorithms. 2 2 A short list of categories Algorithm types we will consider include: Simple recursive algorithms Backtracking algorithms Divide.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
An Efficient Clustering-based Heuristic for Data Gathering and Aggregation in Sensor Networks Wireless Communications and Networking (WCNC 2003). IEEE,
PROFITABLE CONNECTION ASSIGNMENT IN ALL OPTICAL WDM NETWORKS VISHAL ANAND LANDER (Lab. for Advanced Network Design, Evaluation and Research) In collaboration.
Fuzzy Simulated Evolution for Power and Performance of VLSI Placement Sadiq M. SaitHabib Youssef Junaid A. KhanAimane El-Maleh Department of Computer Engineering.
Fast Force-Directed/Simulated Evolution Hybrid for Multiobjective VLSI Cell Placement Junaid Asim Khan Dept. of Elect. & Comp. Engineering, The University.
Multicast Routing in ATM Networks with Multiple Classes of QoS Ren-Hung Hwang, Min-Xiou Chen, and Youn-Chen Sun Department of Computer Science & Information.
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
Fuzzy Evolutionary Algorithm for VLSI Placement Sadiq M. SaitHabib YoussefJunaid A. Khan Department of Computer Engineering King Fahd University of Petroleum.
CSE 550 Computer Network Design Dr. Mohammed H. Sqalli COE, KFUPM Spring 2007 (Term 062)
1 Enhancing Performance of Iterative Heuristics for VLSI Netlist Partitioning Dr. Sadiq M. Sait Dr. Aiman El-Maleh Mr. Raslan Al Abaji. Computer Engineering.
1 Topology Design of Structured Campus Networks by Habib Youssef Sadiq M. SaitSalman A. Khan Department of Computer Engineering King Fahd University of.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
1 The Orphan Problem in ZigBee- based Wireless Sensor Networks IEEE Trans. on Mobile Computing (also in MSWiM 2007) Meng-Shiuan Pan and Yu-Chee Tseng Department.
Connecting LANs, Backbone Networks, and Virtual LANs
Chapter 11 Extending LANs: Fiber Modems, Repeaters, Bridges, & Switches Hub Bridge Switch.
1 Efficient packet classification using TCAMs Authors: Derek Pao, Yiu Keung Li and Peng Zhou Publisher: Computer Networks 2006 Present: Chen-Yu Lin Date:
Flow Models and Optimal Routing. How can we evaluate the performance of a routing algorithm –quantify how well they do –use arrival rates at nodes and.
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
Escaping local optimas Accept nonimproving neighbors – Tabu search and simulated annealing Iterating with different initial solutions – Multistart local.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
Steady and Fair Rate Allocation for Rechargeable Sensors in Perpetual Sensor Networks Zizhan Zheng Authors: Kai-Wei Fan, Zizhan Zheng and Prasun Sinha.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Internet Traffic Engineering by Optimizing OSPF Weights Bernard Fortz (Universit é Libre de Bruxelles) Mikkel Thorup (AT&T Labs-Research) Presented by.
Introduction to Operations Research
Topology Level: Prep-I Topic: Computer Networks Ms. Fouzia Yousuf October 25, 2010.
Network Aware Resource Allocation in Distributed Clouds.
Logical Topology Design
Logical Topology Design and Interface Assignment for Multi- Channel Wireless Mesh Networks A. Hamed Mohsenian Rad Vincent W.S. Wong The University of British.
Minimax Open Shortest Path First (OSPF) Routing Algorithms in Networks Supporting the SMDS Service Frank Yeong-Sung Lin ( 林永松 ) Information Management.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
1 EL736 Communications Networks II: Design and Algorithms Class7: Location and Topological Design Yong Liu 10/24/2007.
Lesson 4—Networking BASICS1 Networking BASICS Network Architectures Unit 2 Lesson 4.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
A configuration method for structured P2P overlay network considering delay variations Tomoya KITANI (Shizuoka Univ. 、 Japan) Yoshitaka NAKAMURA (NAIST,
Data Consolidation: A Task Scheduling and Data Migration Technique for Grid Networks Author: P. Kokkinos, K. Christodoulopoulos, A. Kretsis, and E. Varvarigos.
1 TCOM 5143 Lecture 10 Centralized Networks: Time Delay and Cost Tradeoffs.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
Example Apply hierarchical clustering with d min to below data where c=3. Nearest neighbor clustering d min d max will form elongated clusters!
Wavelength-Routed Optical Networks: Linear Formulation, Resource Budgeting Tradeoffs, and a Reconfiguration Study Dhritiman Banergee and Biswanath Mukherjee,
COMPUTER NETWORKS CS610 Lecture-13 Hammad Khalid Khan.
COMPUTER NETWORKS CS610 Lecture-15 Hammad Khalid Khan.
Priority Queues Chuan-Ming Liu
ElasticTree Michael Fruchtman.
Frank Yeong-Sung Lin (林永松) Information Management Department
2 Basic Concepts: data and computer networking
Totally Disjoint Multipath Routing in Multihop Wireless Networks Sonia Waharte and Raoef Boutaba Presented by: Anthony Calce.
Mesh Network Design Backbone network design goals:
Chapter 6 Network Flow Models.
Frank Yeong-Sung Lin (林永松) Information Management Department
Presentation transcript:

1 Topology Design of Structured Campus Networks by Habib Youssef Sadiq M. SaitSalman A. Khan Department of Computer Engineering King Fahd University of Petroleum and Minerals

2 Outline l Introduction & Problem Statement l Proposed Algorithm »Simulated Evolution »Fuzzy Evaluation Scheme »Selection »Fuzzy Allocation Scheme l Experiments and Results l Conclusion

3 Introduction

4 l Important objectives of good topology »Monetary Cost »Average network delay »Number of hops between any source-destination pair l Conflicting nature of the objectives

5 Constraints l Limitation of capacity on links l Limitation of ports on networking devices l Another possible constraint is that the designer might like to enforce certain hierarchies on network devices. l Topology is a tree

6 Proposed Algorithm- The Fuzzy Simulated Algorithm

7 Purpose l Given the optimization parameters and constraints, we have to design a Spanning Tree Topology to satisfy all the constraints and optimize desired objectives.

8 Objectives of Good Topology Design l Monetary Cost »Reduction in monetary cost s = total cable length c cable = cost per unit of cable used c nd = cost of network devices

9 Objectives of Good Topology Design l Average Network Delay per packet »Reduction in the average network delay due to links.  = total traffic in the network,  ij = traffic between clusters i and j  i j = delay per bit due to network device between cluster i and j

10 Objectives of Good Topology Design l Maximum hops between any source- destination pair. »This includes the networking devices due to which processing delays are encountered.

11 Simulated Evolution B = Bias value; e i = Individual link in  C i = Current cost of i th link in  ;  = complete solution O i = Lower bound on cost of i th link g i = Goodness of i th link in  S = Queue to store the selected links; INITIALIZATION Repeat EVALUATION : ForEach e i   DO g i = O i / C i SELECTION : ForEach e i   DO IF Random > Min (g i + B, 1) THEN begin S = S U e i ; Remove e i from  end Sort element of S ALLOCATION : ForEach e i  S DO ALLOCATE(e i,  ) Until Stopping condition is satisfied. Return Best Solution

12 Evaluation l Goodness = O i / C i l A link is the individual to be evaluated, based on »Its cost. »Its depth in the current topology with respect to the root. l Goodness of link with respect to cost »Link with minimum cost (LCostMin). »Link with maximum cost (LCostMax).

13 Evaluation l Done using fuzzy logic. l Thus, we make a membership function which consists of the minimum, maximum, and the current cost and compare “goodness of link with respect to cost” using this function.

14 Evaluation LCostMin LCostMax LCost LCostMax 1  Membership of a kink in fuzzy subset “Link Cost”

15 Evaluation l Goodness of link with respect to depth »Minimum depth of link =1 (LDepthMin) »Maximum depth of link = (1.5) *Max. depth of any link in the first generation OR Maximum of 7 (LDepthMax)

16 Evaluation LDepthMin LDepth LDepthMax  Membership of a link in fuzzy subset “ Link Depth”

17 Evaluation l The two fuzzy goodness functions are combined using fuzzy rule. l The fuzzy rule used is: If the link has near optimum cost AND near optimum depth THEN the link has high goodness. l Using OWA - andlike:

18 Selection l Based on the goodness found in the evaluation phase, link(s) is (are) selected to be removed from the topology. l Done using »Variable bias B k = 1 - G k-1 where G k-1 is the average goodness of links in K-1 st iteration

19 Allocation l Moves are made and the gain in cost of the overall topology is calculated based on »Monetary cost of the topology »Average network delay per packet »Maximum number of hops between any source- destination pair.

20 Allocation l For Monetary Cost, the minimum and maximum bounds are calculated as follows: »Minimum : from Esau-Williams algorithm with all the constraints fully relaxed. (TCostMin) »Maximum : we find it from the very first generation. (TCostMax)

21 Allocation TCostMin TCostMax TCost TCostMax 1  Membership function of a tree in fuzzy subset of low cost trees

22 Allocation l For Average Network Delay, the minimum and maximum bounds are calculated as follows: »Minimum : delay when all the nodes are connected directly to the center (TDelayMin). »Maximum : initial solution (TDelayMax).

23 Allocation TDelayMin TDelayMax TDelay TDelayMax 1  Membership function of a tree in fuzzy subset of low average delay tree

24 Allocation l For Maximum number of hops, the minimum and maximum bounds are calculated as follows: »minimum : 1 hop (THopsMin). »maximum : initial solution (THopsMax).

25 Allocation ThopsMin THops THopsMax  Membership function of a tree in fuzzy subset of low maximum number of hops between any s-d pair

26 Allocation l The three fuzzy tree measures are combined using the following fuzzy rule: If a solution has low monetary cost AND low average network delay AND low maximum hops AND it is a good topology. l Using OWA - andlike:

27 Allocation l What is our move ? »For each selected link, maximum 10 moves are tried (valid or invalid) – Five greedy – Five random »Pick the move which gives the maximum gain among all the moves.

28 Tabu Search l Diversifies the search by imposing restrictions on the search process, preventing it from moving in certain directions.

29 Experiments and Results

30 Assumptions l The number of segments is known a priori and nodes have already been assigned to segments. l The location of a segment (or of a local site) is represented by its (x,y) coordinates with respect to some reference point. l A node is either 10/100baseT Ethernet or Token Ring Type. l A local site is made of 10/100BaseT Ethernet segments or all Token Ring segments.

31 Assumptions l The backbone is assumed to be running on Fast Ethernet using fiber optic cable. l Within a local site, only Category 5 cable is used, while between two local sites, only fiber optic cable is used. l Class C networks are assumed. Therefore, we limit the number of nodes per cluster to at most 254. l Hubs, switches, routers, and other networking devices cannot be placed in any location. There are designated location to do so.

32 Experiments and Results

33 Results for n50

34 Results for n50

35 Results for n50

36 Results for n50

37 Results for n50

38 Comparison of EW and SE

39 Conclusion l The proposed algorithm was successfully applied to the problem considered in this research and performs better than Esau-William Algorithm, a widely used constructive algorithm.

40