TCOM 540/11 TCOM 540 Session 5. TCOM 540/12 Agenda Quiz Review Session 3 assignments Access and backbone design.

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

Chapter 23 Minimum Spanning Tree
Chapter 4: Trees Part II - AVL Tree
Greedy Algorithms Greed is good. (Some of the time)
Greed is good. (Some of the time)
Eighth Edition by William Stallings
CP3397 Network Design and Security Lecture 4 WAN design - Principles and practice.
Chapter 6 Multispeed Access Designs.
Presented By: Pariya Raoufi. Motivations Future applications require: higher bandwidth, generate a heterogeneous mix of network traffic, low latency.
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
Chapter 9 Graph algorithms Lec 21 Dec 1, Sample Graph Problems Path problems. Connectedness problems. Spanning tree problems.
TCOM 540/11 TCOM 540 Session 6. TCOM 540/12 Agenda Review Session 4 and 5 assignments Multicenter local access design.
CSE 550 Computer Network Design Dr. Mohammed H. Sqalli COE, KFUPM Spring 2007 (Term 062)
TDC 461: Wide Area Network Services DePaul University 22 May, 2001.
Priority Queues, Heaps & Leftist Trees
Minimum Spanning Trees What is a MST (Minimum Spanning Tree) and how to find it with Prim’s algorithm and Kruskal’s algorithm.
Data Communications and Networks Chapter 2 - Network Technologies - Circuit and Packet Switching Data Communications and Network.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
1 Chapter 5 Access Network Design. 2 Overview nA Backbone network connects major sites. nAccess networks connect “small” sites to the backbone network.
Minimal Spanning Trees What is a minimal spanning tree (MST) and how to find one.
Frame Relay Most Popular PSDN Today –Offers speeds of 64 kbps to about 40 Mbps; This covers the range of greatest corporate demand –Most demand is at the.
© The McGraw-Hill Companies, Inc., Chapter 3 The Greedy Method.
Chapter 9 – Graphs A graph G=(V,E) – vertices and edges
1 TCOM 5143 Telecommunications Analysis, Planning and Design Lecture 6 Network Design and Graph Theory: part 2 Shortest Path trees and Tours.
Chapter 18. Virtual-Circuit Networks: Frame Relay and ATM
Outlines Received due 13 March 24 %. Homework n Review for Midterm on 1 March 2000 n Research Paper n Readings [11] “ATM Systems: What’s Next?” [12] “Long.
1 TCOM 541 Session 1. 2 Agenda Overview Recap TCOM540 material needed for this course.
MST Many of the slides are from Prof. Plaisted’s resources at University of North Carolina at Chapel Hill.
Networks for Distributed Systems n network types n Connection-oriented and connectionless communication n switching technologies l circuit l packet.
Network Aware Resource Allocation in Distributed Clouds.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
Chapter 24. Congestion Control and Quality of Service part 3
HIGH SPEED WIDE AREA NETWORKS BYWANJAU. Introduction  WANs – Group of LANs linked together by communication service providers over large geographically.
ATM Switches Cells Scalable QoS Perspective Virtual Circuits.
UNC Chapel Hill Lin/Foskey/Manocha Minimum Spanning Trees Problem: Connect a set of nodes by a network of minimal total length Some applications: –Communication.
Minimum Spanning Trees CSE 2320 – Algorithms and Data Structures Vassilis Athitsos University of Texas at Arlington 1.
Outlines Received due 13 March %. Homework n Review for Midterm (1 March 2000) n Research Paper n Readings [9] “MPLS: Special Delivery” [10] “Diversifying.
TCP Traffic and Congestion Control in ATM Networks
A T M (QoS).
Telecommunications Essentials Chapter 7 Wide Area Networking.
Prof. Amr Goneid, AUC1 Analysis & Design of Algorithms (CSCE 321) Prof. Amr Goneid Department of Computer Science, AUC Part 8. Greedy Algorithms.
EMIS 8374 Optimal Trees updated 25 April slide 1 Minimum Spanning Tree (MST) Input –A (simple) graph G = (V,E) –Edge cost c ij for each edge e 
Lecture 19 Greedy Algorithms Minimum Spanning Tree Problem.
Union-find Algorithm Presented by Michael Cassarino.
Chapter 18: Searching and Sorting Algorithms. Objectives In this chapter, you will: Learn the various search algorithms Implement sequential and binary.
TCOM 540/11 TCOM 540 Session 2. TCOM 540/12 Web Page OM htm.
Graphs A ‘Graph’ is a diagram that shows how things are connected together. It makes no attempt to draw actual paths or routes and scale is generally inconsequential.
Mr. Mark Welton.  WAN transportation method that formats data into frames and sent over a network controlled by a service provider  Frame Relay is often.
WAN – Packet and Cell-switched Networks
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
Chapter 11. Chapter Summary  Introduction to trees (11.1)  Application of trees (11.2)  Tree traversal (11.3)  Spanning trees (11.4)
November 22, Algorithms and Data Structures Lecture XII Simonas Šaltenis Nykredit Center for Database Research Aalborg University
EE 122: Lecture 19 (Asynchronous Transfer Mode - ATM)
CSC 421: Algorithm Design & Analysis
CSC 421: Algorithm Design & Analysis
Introduction to Algorithms
Shortest Paths and Minimum Spanning Trees
Wide Area Network.
CSC 421: Algorithm Design & Analysis
B+ Tree.
Lecture 12 Algorithm Analysis
Algorithms and Data Structures Lecture XII
Access Network Design A Backbone network connects major sites.
CSC 421: Algorithm Design & Analysis
Minimum Spanning Tree.
CSE 550 Computer Network Design
Wide Area Networks (WANs), Routing, and Shortest Paths
Lecture 12 Algorithm Analysis
Lecture 14 Minimum Spanning Tree (cont’d)
Chapter 9 Graph algorithms
Presentation transcript:

TCOM 540/11 TCOM 540 Session 5

TCOM 540/12 Agenda Quiz Review Session 3 assignments Access and backbone design

TCOM 540/13 Access and Backbone We already encountered access and backbone in the first session To over-simplify, access lines provide local connectivity, backbone provides long- distance transport Balance between access and backbone costs can vary widely

TCOM 540/14 Access and Backbone (2) Access Backbone

TCOM 540/15 Access and Backbone (3) IXC1 POP IXC2 POP LEC Central Office Local Loops IXC1 Backbone IXC2 Backbone Access lines to IXCs To other LEC COs

TCOM 540/16 Local Access Costs Are Significant Relative cost of local access has been increasing Source: Bureau of Labor Statistics

TCOM 540/17 Local Access Costs Are Significant (2) Situation regarding dedicated local access is less clear –Accurate information regarding real prices paid for dedicated access circuits is not easy to find –Probably has been some decrease, at least in areas where there is local access competition

TCOM 540/18 Local Access Costs Are Significant (3) The Telecommunications Reform Act of 1996 was supposed (among other things) to foster local competition –Appears to have been relatively unsuccessful –Competitive Local Access Carriers (CLECs) have been decimated by collapse of high-tech stocks –Relatively little facilities-based local competition (< 5% of market)

TCOM 540/19 Local Access Costs Are Significant (4) Appears that whatever competition there is for at least residential local access (high speed) is coming from satellite and cable, not CLECs Legislative action – Tauzin-Dingell bill?

TCOM 540/110 Local Access Design Example BW Traffic (symmetric)Costs (symmetric)

TCOM 540/111 Local Access Design Example (2) Use some nodes as concentrators $1929 $1985 $1328 $667 $2112 $ (OPTIMAL)

TCOM 540/112 Local Access Design Example (3) If traffic grows by 50%, links (1,4) and (1,7) must be doubled (OPTIMAL) IMPROVEMENT

TCOM 540/113 Frame Relay (FR) Frame Relay Permanent Virtual Circuits (PVCs) use concepts of Committed Information Rate (CIR) and Port Speed Charges for –Access –Port (connection to network) –CIR of PVC – does not vary with distance

TCOM 540/114 Asynchronous Transfer Mode (ATM) ATM uses similar concepts to FR –Constant Bit Rate (CBR) –Variable Bit Rate non-real-time (VBR-nrt) –Variable Bit Rate real-time (VBR-rt) –Available Bit Rate (ABR) –Unspecified Bit Rate (UBR)

TCOM 540/115 ATM Definitions Constant Bit Rate (CBR) - fixed bit rate in which bits are sent in a steady stream. A CBR is useful for applications requiring small but near constant transmission, for example, remote-site monitoring. Variable Bit Rate (VBR) - while overall transmission capacity (bits per second) is guaranteed, the rate at any given second may not equal the stated capacity. A VBR of 28 Kb/s, for example, may have periods where the transmission rate ranges from 23 to 33 Kb/s. VBR(rt) means a variable bit rate in real time transmission; VBR(nrt) means a variable bit rate transmission in near-real-time conditions. Both are used in voice and videoconferencing, where a quality channel is reserved but over which data does not flow evenly. Unspecified Bit Rate (UBR) - a transmission service which does not guarantee a fixed transmission capacity. Any application that can tolerate delays is ideally satisfied by an UBR. Source: BCE Teleglobe

TCOM 540/116 ATM Definitions (2) Available Bit Rate (ABR) -The bit rate left after the predictive and guaranteed service traffic (CBR/VBR) is served. In essence, it is simply a fair share of the remaining bandwidth amongst the VPs and VCs that have asked for this service. Source: cell-relay.indiana.edu

TCOM 540/117 Rules of Thumb Cannot choose between a leased line and a FR/ATM design until both are done and costs compared –Availability of FR and ATM just complicates life … Note that leased lines may have security advantages

TCOM 540/118 Rules of Thumb (2) If sites vary widely in size (traffic originated/terminated), choose the bigger sites as aggregation points –Define weight of a node as sum of all traffic flowing into and out of it Design problem then has two parts –Access – gets traffic from small sites to backbone – Backbone – carries traffic between backbone nodes –Which comes first??

TCOM 540/119 Traffic Scale Depends on relationship of node size to smallest desired link size –Smallest link size determined by factors such as packet size/delay 1.Traffic from access node much smaller than smallest link we wish to use - Create access trees to group sites efficiently - Capacitated spanning trees

TCOM 540/120 Traffic Scale (2) 2.Traffic from access node comparable to smallest link - Low speed link to hub vs. concentrator part way to hub - Concentrator placement problem 3.Traffic from access node significantly larger than smallest link - Multiple lower speed links vs. single higher speed link

TCOM 540/121 One Speed, One Center Example problem with 20 nodes – one of which is the hub 1200 bps/node, 9600 bps links, utilization 50% What algorithm to use?

TCOM 540/122 One Speed, One Center (2) Star design costs $26,358 –Link utilization 12.5% MST cost $18,730 –Uses multiple (up to 4) links on some legs Prim-Dijkstra tree cost $15,930 –Using  = 0.3 –Hundreds of designs tested

TCOM 540/123 One Speed, One Center (3) For n nodes, there are n n-2 different spanning trees –20 18 = * –This is a rather large number … –And partitioning does not help much Groups of 4 can be done in * ways Not to mention groups of 3 etc., etc., etc.

TCOM 540/124 Esau-Williams Algorithm Esau-Williams creates a Capacitated Minimum Spanning Tree (CMST) Given a central node N 0 and a set of other nodes (N 1, N 2, … N n ), and a set of weights (w 1, …, w n ) for each node, the capacity of a link W, and a cost matrix Cost(i,j) find a set of trees T1, …, Tk such that each N i belongs to exactly one Tj and each Tj contains N 0 and  i   Tj w i < W  trees  l   Links Cost(end1 l, end2 l ) is a minimum

TCOM 540/125 Esau-Williams Algorithm (2) Central concept is tradeoff function Build “good” trees Each tree starts off as one node –Component (graph theory meaning) Comp(N i ) Tradeoff function is Tr() where Tr(N i ) = min j [Cost(N i,N j )] –Cost (Comp(N i ),N 0 ) Computes cost of linking to neighbor vs. cost of going to center

TCOM 540/126 Esau-Williams Algorithm (2) Negative value of Tr means it is preferable to link to neighbor tree rather than running a link to the center Must check that the design is feasible – i.e., does not exceed link capacity: W(Comp(N i )) +W(Comp(N j )) < W –Algorithm limitation – often desirable to increase link capacities in real life

TCOM 540/127 Esau-Williams Algorithm (3) N4 N3 N1 N2 N0 Scanning node N3: 1. Examine costs of these links 2. Compare with cost of this link

TCOM 540/128 Heaps Code for implementing Esau-Williams in Cahn uses heaps (not essential, but interesting) –A heap is a special type of binary tree Binary tree: each node has at most 3 edges Parent Left child Right child

TCOM 540/129 Heaps (2) Heap –Root at level 0 – smallest element –Any node has a value no larger than either of its children –Heaps are not unique

TCOM 540/130 Heaps (3)

TCOM 540/131 Heaps (3)

TCOM 540/132 Esau-Williams Implementation Uses a heap for each node nHeap(i) and a global heap tHeap Heap for a node has tradeoff values with respect to neighbors –Subject to feasibility

TCOM 540/133 E-W Implementation (2) Let’s say top of heap for a node is – inf

TCOM 540/134 E-W Implementation (3) Say this is infeasible – change value to inf inf But now this is not a heap any more - “bubble down” offending node

TCOM 540/135 E-W Implementation (4) Swap with best child inf inf-100inf inf

TCOM 540/136 E-W Implementation (5) Heaps are efficient Number of levels in the heap grows as the order of log 2 (n) –Where n is total number of elements in the heap –On average, each level is twice the size of the level above

TCOM 540/137 E-W Implementation (6) Algorithm 1.Top of global heap is node n1, which has the best tradeoff 2.Go to heap of N1 and find partner n2 which appears to have best tradeoff 3.Remove n2 from node heap 4.Find components of n1 and n2 5.Tricky bit: When we start this loop, all tradeoffs are correct, but we do not update all tradeoffs as we go along 1.Wait until an n1, n2 pair appears, then check tradeoff 2.If tradeoff is incorrect, reset and push pair back into heap 6.If tradeoff is correct, check if merge of components is feasible 1.If feasible, merge 7.Update global heap with new n1 tradeoff

TCOM 540/138 Creditability of E-W E-W is heuristic –Guarantees resulting design is feasible –Does not guarantee that design is optimal –Poorer performance as number of sites increases –Works well for both homogenous and inhomogeneous traffic

TCOM 540/139 Esau-Williams Failure Rate Four sites per line

TCOM 540/140 Sharma’s Algorithm E-W sometimes introduces crossings –We know the design can be improved if crossings are removed Sharma’s algorithm builds MSTs in “wedges” from the central node

TCOM 540/141 Sharma’s Algorithm (2) Compute the angle from the central node to each other node Sort the angles Move clockwise from node with smallest angle –Create sets of nodes such that adding another node would put  set w(node) > W –Start next set with that node

TCOM 540/142 Sharma’s Algorithm (3) Sharma’s algorithm builds Capacitated Minimum Spanning Trees without crossings –So long as no set has more than half the pie (i.e.,  However, Sharma is generally inferior to E- W –Poorer creditability –Higher cost

TCOM 540/143 Multiple Link Speeds In real problems, almost always have a variety of link speeds to choose from 64kbps –N x DS0 Mbps 45 Mbps –Etc.

TCOM 540/144 Multiple Link Speeds (2) Intuitively, we’d like the access tree to use higher speeds closer to the root, and lower speeds out towards the edges

TCOM 540/145 Predecessor Function A tree T rooted at node Root can be represented uniquely by a predecessor function pred:V V on the set of vertices: –pred(Root) = Root –No other node is its own predecessor –For any node N there is an n>0 such that pred n (N) = Root

TCOM 540/146 Ancestors Given a tree T and the associated predecessor function, the ancestors of N are all the nodes N* where pred n (N*) = N for some n > 0

TCOM 540/147 Multispeed CMST Definition Given: –A set of nodes N 0, N 1, …, N n –A set of weights (w 1, …, wn) for each node –A set of link types L 1, L 2, …, L m –Capacities W 1, W 2, …, W m –A cost matrix C(i,j,k) for the cost of link type L k between N i and N j

TCOM 540/148 Multispeed CMST Definition (2) Then the multispeed CMST problem is to find the tree rooted at N 0 with link assignments such that  ancestors(N) w(i) < W Link(N, pred(N)) And  Links c(end1 L, end2 L, type L ) is minimized

TCOM 540/149 MSLA Algorithm for Multispeed CMSTs 1.Assign each node n the smallest link l to connect it to root. Compute spare_capacity(n) = W l – w n 2.Create tradeoff heap for n (similar to E-W) – tradeoffs represent savings by connecting site n to site i rather than to the root Tradeoff n (i) = c(n,i,L) + Upgrade (i, w n ) – c(n,0,L) The function Upgrade() computes the cost of adding w n units to the links that connect i and 0 by following back the predecessors 3.Add edges as long as tradeoffs are less than or equal to 0

TCOM 540/150 Session 5 Assignment Read Cahn, Chapter 7 Do Exercises 5.3 and 6.1