Design of Capacitated Survivable Networks With a Single Facility Author : Hervé Kerivin, Dritan Nace, and Thi-Tuyet- Loan Pham R97725025 張耀元, R97725036.

Slides:



Advertisements
Similar presentations
Using dynamic flow network modeling for global flight plan optimization CARE workshop 14th –15th March 2001, EUROCONTROL Brussels. Dritan Nace Heudiasyc.
Advertisements

Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
13-Optimization Assoc.Prof.Dr. Ahmet Zafer Şenalp Mechanical Engineering Department Gebze Technical.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
1 An Adaptive GA for Multi Objective Flexible Manufacturing Systems A. Younes, H. Ghenniwa, S. Areibi uoguelph.ca.
1 Advancing Supercomputer Performance Through Interconnection Topology Synthesis Yi Zhu, Michael Taylor, Scott B. Baden and Chung-Kuan Cheng Department.
Optimal redundancy allocation for information technology disaster recovery in the network economy Benjamin B.M. Shao IEEE Transaction on Dependable and.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
Towards Virtual Routers as a Service 6th GI/ITG KuVS Workshop on “Future Internet” November 22, 2010 Hannover Zdravko Bozakov.
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
Network Capacity Planning IACT 418 IACT 918 Corporate Network Planning.
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara in collaboration with: D. Xu, R. Doverspike, D. Johnson and J. Rexford.
L12. Network optimization problems D. Moltchanov, TUT, Spring 2008 D. Moltchanov, TUT, Spring 2014.
AHOP Problem and QoS Route Pre-computation Adam Sachitano IAL.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
1 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, Mani Srivastava IEEE TRANSACTIONS ON MOBILE.
E E Module 18 M.H. Clouqueur and W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 Analysis of Path Availability in Span-Restorable.
Solving the Protein Threading Problem in Parallel Nocola Yanev, Rumen Andonov Indrajit Bhattacharya CMSC 838T Presentation.
1 Maximizing Restorable Throughput in MPLS Networks Reuven Cohen Dept. of Computer Science, Technion Gabi Nakibly National EW Research Center Published.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Maximizing the Lifetime of Wireless Sensor Networks through Optimal Single-Session Flow Routing Y.Thomas Hou, Yi Shi, Jianping Pan, Scott F.Midkiff Mobile.
D Nagesh Kumar, IIScOptimization Methods: M1L4 1 Introduction and Basic Concepts Classical and Advanced Techniques for Optimization.
Lecture 3. Notations and examples D. Moltchanov, TUT, Spring 2008 D. Moltchanov, TUT, Spring 2015.
Triple Patterning Aware Detailed Placement With Constrained Pattern Assignment Haitong Tian, Yuelin Du, Hongbo Zhang, Zigang Xiao, Martin D.F. Wong.
1 Planning and Scheduling to Minimize Tardiness John Hooker Carnegie Mellon University September 2005.
Finding Protection Cycles in DWDM Networks 2002 IEEE ICC on Volume 5, 28 April-2 May Page(s): Reporter: Jyun-Yong Du.
MODEL FOR FLIGHT LEVEL ASSIGNMENT PROBLEM ICRAT International Conference on Research in Air Transportation Alfred Bashllari National & Kapodistrian.
1 EL736 Communications Networks II: Design and Algorithms Class10: Restoration and Protection Design of Resilient Networks Yong Liu 11/28/2007.
1 Using Composite Variable Modeling to Solve Integrated Freight Transportation Planning Problems Sarah Root University of Michigan IOE November 6, 2006.
1 EL736 Communications Networks II: Design and Algorithms Class2: Network Design Problems -- Notation and Illustrations Yong Liu 09/12/2007.
L13. Shortest path routing D. Moltchanov, TUT, Spring 2008 D. Moltchanov, TUT, Spring 2014.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
Helsinki 19 May 2006 Fine Protection of Data-Paths in Multi-Layer Networks Based on the GMPLS paradigm G.Oriolo, Università Tor Vergata, Roma joint work.
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
Improving QoS Support in Mobile Ad Hoc Networks Agenda Motivations Proposed Framework Packet-level FEC Multipath Routing Simulation Results Conclusions.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Algorithms for Allocating Wavelength Converters in All-Optical Networks Authors: Goaxi Xiao and Yiu-Wing Leung Presented by: Douglas L. Potts CEG 790 Summer.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Load Balancing in Protection Switching of Optical Networks Hongkyu Jeong, Gyu-Myoung Lee Information and Communications Univ. (ICU) Student ID : ,
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
From payments of debts to real time distributed system reconfiguration Nouveaux défis en théorie de l'ordonnancement Luminy, may 2008 Jacques Carlier.
Survivable Traffic Grooming with Differentiated End-to-End Availability Guarantees in WDM Mesh Networks Proceedings of the 13th IEEE Workshop on Local.
10/6/2003Kevin Su Traffic Grooming for Survivable WDM Networks – Shared Protection Kevin Su University of Texas at San Antonio.
1 Algorithms  Algorithms are simply a list of steps required to solve some particular problem  They are designed as abstractions of processes carried.
Algorithm for enumerating all recovery paths against single span of a network Sung-Hwan Park Jeong-Hee Ryou
Reliable Multicast Routing for Software-Defined Networks.
On Improving the Efficiency and Manageability of NotVia Ang Li †, Pierre Francois ‡, and Xiaowei Yang † † UCIrvine ‡ Université catholique de Louvain CoNext.
Static Process Scheduling
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
1 Dynamic RWA Connection requests arrive sequentially. Setup a lightpath when a connection request arrives and teardown the lightpath when a connection.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Onlinedeeneislam.blogspot.com1 Design and Analysis of Algorithms Slide # 1 Download From
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Optimal Design of Survivable Mesh Networks Based on Line Switched WDM Self-Healing Rings IEEE/ACM Transactions on Networking, Vol 11, NO.3, June,2003 Andrea.
Optimal Placement of Relay Infrastructure in Heterogeneous Wireless Mesh Networks by Bender’s Decomposition Aaron So, Ben Liang University of Toronto,
Doc.: IEEE /2200r2 Submission July 2007 Sandesh Goel, Marvell et alSlide 1 Route Metric Proposal Date: Authors:
Joint Routing and Scheduling Optimization in Wireless Mesh Networks with Directional Antennas A. Capone, I. Filippini, F. Martignon IEEE international.
Route Metric Proposal Date: Authors: July 2007 Month Year
Solving bucket-based large flow allocation problems
John Doucette and Wayne D. Grover
ME 521 Computer Aided Design 15-Optimization
An Equal-Opportunity-Loss MPLS-Based Network Design Model
Algorithms for Budget-Constrained Survivable Topology Design
TRLabs & University of Alberta © Wayne D. Grover 2002, 2003, 2004
Route Metric Proposal Date: Authors: July 2007 Month Year
L13. Capacitated and uncapacitated network design problems
Presentation transcript:

Design of Capacitated Survivable Networks With a Single Facility Author : Hervé Kerivin, Dritan Nace, and Thi-Tuyet- Loan Pham R 張耀元, R 李怡緯

IEEE transactions on networking Publication Date: April 2005

Hervé Kerivin received the Ph.D. degree in combinatorial optimization from the University Blaise Pascal, Clermont-Ferrand, France, in November Dritan Nace received the degree in mathematics from the University of Tirana, Albania, in 1991, and the M.Sc. (DEA) degree in computer science and the Ph.D. degree in computer science, both from University of Technology of Compiègne, Compiègne Cedex, France, in 1993 and 1997, respectively. Thi-Tuyet-Loan Pham received the B.Sc. Degree from the Technology University of Ho Chi Minh City, Vietnam, the M.Sc. degree from the Francophone Institut for Computer Science, and the Ph.D. degree from University of Technology of Compiègne, Compiègne Cedex, France.

Outline Abstract Introduction Mathematical formulation Solution method Computational result Conclusion

ABSTRACT

Abstract Single-facility capacitated survivable network design problem SFCSND. We optimize the network topology and the link dimensioning in order to rout all traffic commodities. We also consider rerouting strategies to deal with link failure We present a mix-integer linear programming model solved by combining several approaches.

INTRODUCTION

Introduction Given ◦ a set of nodes  Link  Dimension ◦ a set of single type facilities with constant capacity ◦ a set of commodities (OD-pair and required bandwidth) We consider only the problem of designing survivable networks when a single link failure arises

Introduction The problem involves designing the topology and dimensioning the links The installed capacities will be sufficient to route all traffic demands for ◦ Nominal state: all network hardware is operational (without fail). ◦ Reroute interrupted traffic for failure state The problem determines the lowest cost resource ◦ Link installation cost ◦ A unit facility loading cost

Introduction In order to reduce cost, the spare capacity devoted to protection is usually shared among several rerouting paths: Shared reroute mode local rerouting: tries to reroute traffic locally between the extremities of the failed link end-to-end rerouting: propagates failure information to the destination nodes of traffic demands, in order to set up rerouting paths between them

MATHEMATICAL FORMULATION End-to-end rerouting Local rerouting

Mathematical Formulation We formulate both end-to-end rerouting and local rerouting Local rerouting schemes have in theory a higher bandwidth overhead than end-to- end rerouting schemes

G(V,E)Graph with vertex and edge aInstallation cost associated with the edge of G X e ={0,1}Topology variable K={1,2,…|K|}Commodities for OD-pair & BkBk Traffic demand (required bandwidth) MMaximum number of modularity λCapacity of given facility yeye Dimension variable CeCe A cost corresponds to the loading of a single facility onto edge e L={1,2,…|L|}Link failure indexes where |L| |E| p  P(k) P(k) is the finite set of elementary paths of commodity k Nominal flow variable q  Q(l,k) Q(l,k) is the set of elementary paths of failed commodity k in fail index l End-to-end reroute flow variable

Mathematical Formulation

Local reroute strategy: interrupted traffic must be rerouted between the extremity nodes of the failed link GelGel Graph composed of failed link e l q  Q(l) Q(l) is the finite set of elementary paths of G el local rerouting flow variable

Mathematical Formulation We rewrite some constrains:

Mathematical Formulation The size of both mixed-integer linear programs may be very large because of the huge number of paths in P(k), Q(l,k), Q(l). The working paths P(k) and rerouting path Q(l,k), Q(l) are independent so decomposition method (such as Benders’ decomposition) can be used to obtain near optimal solution.

SOLUTION METHOD A. Break down the problem B. Capacity feasibility problem C. Topology and dimensioning problem D. Implementation detail

Solution method We break down into 2 consecutive stages of optimization ◦ Topology and link dimension ◦ Capacity feasible This breaking down of the problem has a drawback: there are some distance for optimal to our solution The higher is the basic capacity of the facility (λ) in relation to a single traffic demand (B K ), the more critical this distance becomes

Solution method

Implementation detail

COMPUTATIONAL RESULT

Computational Results A series of computational experiments were performed to compare and analyze the survivability cost based on end-to-end and local rerouting strategies Compare effectiveness of both restoration strategies (end-to-end and local rerouting): ◦ Total capacity installed in the network ◦ Topology ◦ Global cost with respect to the obtained network

Computational Results (Cont.) Algorithm implemented in C CPLEX 7.1 Machine configuration: ◦ Sun Enterprise 450 ◦ Solaris 2.6 ◦ Quadri-UltraSparcII 400 MHz ◦ 1 GB RAM

Problem Instances Three (undirected) network instances considered to perform the numerical experiments: ◦ net1 is generated randomly ◦ net2, net3 are furnished by France Telecom R&D  Correspond to real telecommunication networks

Problem Instances (Cont.) Main parameters of the network: ◦ |V|: number of nodes ◦ |E|: number of potential links ◦ |K|: number of traffic demands ◦ d(G): average nodal degree ◦ T(k): average demand traffic

Problem Instances (Cont.) Considered all possible traffic demands ◦ The number of traffic demand: |K| = ( |V| * (|V|-1) ) / 2 Run all of the tests with four different facility capacities ◦ 2400 ◦ 1800 ◦ 1200 ◦ 600 All links are subject to failure ◦ L = E

Facility Capacity Results obtained with four different facility capacities for the single-facility capacitated network design problem: ◦ λ: constant facility capacity ◦ F: number of installed facilities ◦ C i : percentage of the whole capacity that is idle (unused) ◦ d: average nodal degree in the optimal network ◦ f: average link facility in the optimal network

Facility Capacity (Cont.)

Facility capacity plays a significant role in the nature of the SFCSND problem The major difference between nonsurvivable and survivable networks is the number of used links

Obtained Network Topology Average nodal degree for the obtained network depends on the value of facility capacity λ, regardless of the survivability requirement

Obtained Network Topology (Cont.) Small values of λ are of the same magnitude order to some traffic demands ◦ Often more cost-effective to create a link than to use long paths to carry this traffic ◦ Obtained network is highly meshed

Obtained Network Topology (Cont.) Sufficiently large values of λ may therefore enable us to obtain the minimal topology for both the nonsurvivable case and for the survivable case problems

Obtained Network Topology (Cont.) If we stipulate survivability, the obtained network always has an average nodal degree strictly superior to that obtained in the nonsurvivable case (about 20% on average)

Obtained Network Topology (Cont.) Survivable networks need spare links in order to meet the survivability requirements Main difference between partial end-to-end rerouting without recovery and local rerouting: ◦ Local rerouting tends to be slightly more meshed ◦ Local rerouting generally uses longer rerouting paths than other rerouting strategies ◦ Meshed network permits a better use of resources when addressing failure situations

Obtained Network Topology (Cont.) The obtained network topology is sometimes the same for both restoration strategies

Network Cost Consider link installation costs and the cost of capacity loading Gaps between the global costs for the networks: ◦ : end-to-end rerouting and nonsurvivable case ◦ : local rerouting and nonsurvivable case ◦ : gap related to the global costs between two rerouting strategies

Network Cost (Cont.) The cost for a survivable network can be almost 70% more than the cost for a nonsurvivable network ◦ We need to optimize simultaneously the dimensioning problem for the nominal state and the spare capacity computation, in order to reduce this gap

Network Cost (Cont.) The cost of survivable networks based on a local rerouting strategy is slightly greater than the cost for an end-to-end rerouting strategy ◦ Local rerouting may be used without bringing about a significant impact in terms of cost

Computational Time The computational time becomes generally greater as the facility capacity becomes smaller ◦ Large combinatory of the problem with respect to the choice for installing links and assigning capacities ◦ The case with large capacity facility where the number of links to be installed is obviously lower and the choice “easier.”

Computational Time (Cont.) The computational time spent for solving the super master program takes often more than 50% of global time ◦ The result justify our strategy to reduce the number of calls through introducing as much as possible valid inequalities in order to approach faster to the optimal solution before checking for the feasibility of assigned capacities

CONCLUSION

Conclusion Survivable network design problem with single facility: ◦ Survivability requirements are expressed in terms of the spare capacity required to address link failures ◦ Various rerouting strategies:  Local and end-to-end rerouting Presented mixed-integer linear programming models Proposed an appropriate decomposition approach ◦ Allows to accelerate the resolution time

Conclusion (Cont.) Reported some numerical results in terms of overall network cost for: ◦ Restoration schemes ◦ Nonsurvivable case Main result is that survivable networks designed on basis of local restoration may be used without bringing about a significant impact in terms of cost

Conclusion (Cont.) Result could be very useful for telecommunication operators ◦ Restoration strategy is already known to be quite simple and efficient in operational terms.

THANKS FOR YOUR LISTENING!