Download presentation
Presentation is loading. Please wait.
1
1 Topology Design of Structured Campus Networks by Habib Youssef Sadiq M. SaitSalman A. Khan Department of Computer Engineering King Fahd University of Petroleum and Minerals
2
2 Outline l Introduction & Problem Statement l Proposed Algorithm »Simulated Evolution »Fuzzy Evaluation Scheme »Selection »Fuzzy Allocation Scheme l Experiments and Results l Conclusion
3
3 Introduction
4
4 l Important objectives of good topology »Monetary Cost »Average network delay »Number of hops between any source-destination pair l Conflicting nature of the objectives
5
5 Constraints l Limitation of capacity on links l Limitation of ports on networking devices l Another possible constraint is that the designer might like to enforce certain hierarchies on network devices. l Topology is a tree
6
6 Proposed Algorithm- The Fuzzy Simulated Algorithm
7
7 Purpose l Given the optimization parameters and constraints, we have to design a Spanning Tree Topology to satisfy all the constraints and optimize desired objectives.
8
8 Objectives of Good Topology Design l Monetary Cost »Reduction in monetary cost s = total cable length c cable = cost per unit of cable used c nd = cost of network devices
9
9 Objectives of Good Topology Design l Average Network Delay per packet »Reduction in the average network delay due to links. = total traffic in the network, ij = traffic between clusters i and j i j = delay per bit due to network device between cluster i and j
10
10 Objectives of Good Topology Design l Maximum hops between any source- destination pair. »This includes the networking devices due to which processing delays are encountered.
11
11 Simulated Evolution B = Bias value; e i = Individual link in C i = Current cost of i th link in ; = complete solution O i = Lower bound on cost of i th link g i = Goodness of i th link in S = Queue to store the selected links; INITIALIZATION Repeat EVALUATION : ForEach e i DO g i = O i / C i SELECTION : ForEach e i DO IF Random > Min (g i + B, 1) THEN begin S = S U e i ; Remove e i from end Sort element of S ALLOCATION : ForEach e i S DO ALLOCATE(e i, ) Until Stopping condition is satisfied. Return Best Solution
12
12 Evaluation l Goodness = O i / C i l A link is the individual to be evaluated, based on »Its cost. »Its depth in the current topology with respect to the root. l Goodness of link with respect to cost »Link with minimum cost (LCostMin). »Link with maximum cost (LCostMax).
13
13 Evaluation l Done using fuzzy logic. l Thus, we make a membership function which consists of the minimum, maximum, and the current cost and compare “goodness of link with respect to cost” using this function.
14
14 Evaluation LCostMin LCostMax LCost LCostMax 1 1.0 0.5 Membership of a kink in fuzzy subset “Link Cost”
15
15 Evaluation l Goodness of link with respect to depth »Minimum depth of link =1 (LDepthMin) »Maximum depth of link = (1.5) *Max. depth of any link in the first generation OR Maximum of 7 (LDepthMax)
16
16 Evaluation LDepthMin LDepth LDepthMax 1.0 0.5 Membership of a link in fuzzy subset “ Link Depth”
17
17 Evaluation l The two fuzzy goodness functions are combined using fuzzy rule. l The fuzzy rule used is: If the link has near optimum cost AND near optimum depth THEN the link has high goodness. l Using OWA - andlike:
18
18 Selection l Based on the goodness found in the evaluation phase, link(s) is (are) selected to be removed from the topology. l Done using »Variable bias B k = 1 - G k-1 where G k-1 is the average goodness of links in K-1 st iteration
19
19 Allocation l Moves are made and the gain in cost of the overall topology is calculated based on »Monetary cost of the topology »Average network delay per packet »Maximum number of hops between any source- destination pair.
20
20 Allocation l For Monetary Cost, the minimum and maximum bounds are calculated as follows: »Minimum : from Esau-Williams algorithm with all the constraints fully relaxed. (TCostMin) »Maximum : we find it from the very first generation. (TCostMax)
21
21 Allocation TCostMin TCostMax TCost TCostMax 1 1.0 0.5 Membership function of a tree in fuzzy subset of low cost trees
22
22 Allocation l For Average Network Delay, the minimum and maximum bounds are calculated as follows: »Minimum : delay when all the nodes are connected directly to the center (TDelayMin). »Maximum : initial solution (TDelayMax).
23
23 Allocation TDelayMin TDelayMax TDelay TDelayMax 1 1.0 0.5 Membership function of a tree in fuzzy subset of low average delay tree
24
24 Allocation l For Maximum number of hops, the minimum and maximum bounds are calculated as follows: »minimum : 1 hop (THopsMin). »maximum : initial solution (THopsMax).
25
25 Allocation ThopsMin THops THopsMax 1.0 0.5 Membership function of a tree in fuzzy subset of low maximum number of hops between any s-d pair
26
26 Allocation l The three fuzzy tree measures are combined using the following fuzzy rule: If a solution has low monetary cost AND low average network delay AND low maximum hops AND it is a good topology. l Using OWA - andlike:
27
27 Allocation l What is our move ? »For each selected link, maximum 10 moves are tried (valid or invalid) – Five greedy – Five random »Pick the move which gives the maximum gain among all the moves.
28
28 Tabu Search l Diversifies the search by imposing restrictions on the search process, preventing it from moving in certain directions.
29
29 Experiments and Results
30
30 Assumptions l The number of segments is known a priori and nodes have already been assigned to segments. l The location of a segment (or of a local site) is represented by its (x,y) coordinates with respect to some reference point. l A node is either 10/100baseT Ethernet or Token Ring Type. l A local site is made of 10/100BaseT Ethernet segments or all Token Ring segments.
31
31 Assumptions l The backbone is assumed to be running on Fast Ethernet using fiber optic cable. l Within a local site, only Category 5 cable is used, while between two local sites, only fiber optic cable is used. l Class C networks are assumed. Therefore, we limit the number of nodes per cluster to at most 254. l Hubs, switches, routers, and other networking devices cannot be placed in any location. There are designated location to do so.
32
32 Experiments and Results
33
33 Results for n50
34
34 Results for n50
35
35 Results for n50
36
36 Results for n50
37
37 Results for n50
38
38 Comparison of EW and SE
39
39 Conclusion l The proposed algorithm was successfully applied to the problem considered in this research and performs better than Esau-William Algorithm, a widely used constructive algorithm.
40
40
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.