Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing

Size: px
Start display at page:

Download "Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing"

Transcription

1 Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing Pietro Belotti, Antonio Capone, Giuliana Carello, Federico Malucelli Tepper School of Business, Carnegie Mellon University, Pittsburgh PA Dipartimento di Elettronica e Informazione, Politecnico di Milano, Italy Abstract The possibility of adding MPLS support to transport networks is considered an important opportunity by telecom carriers that want to add packet services and applications to their networks. However, the question arises whether it is suitable to have MPLS nodes just at the edge of the network to collect packet traffic from users, or to introduce also MPLS facilities on a subset of the core nodes in order to exploit packet switching flexibility and multiplexing, thus inducing a better bandwidth allocation. In this paper we propose a mathematical programming model for the design of two-layer networks where MPLS is considered on top of transport networks (SDH or WDM depending on required link speed). Our models take into account the tradeoff between the cost of adding MPLS support in the core nodes and the savings in the link bandwidth allocation due to the statistical multiplexing and the traffic grooming effects induced by MPLS nodes. The traffic matrix specifies for each point-to-point request a pair of values: a mean traffic value and an additional one. Using this traffic model, the effect of statistical multiplexing on a link allows to allocate a capacity equal to the sum of all the mean values of the traffic demands routed on the link and only the highest additional one. We propose a path-based Mixed Integer Programming (MIP) model for the problem of optimizing the number and location of MPLS nodes in the network and the link capacities. We apply Lagrangian relaxation to this model and use the subgradient method to obtain a lower bound of the network cost. As the number of path variables used to model the routing grows exponentially with the graph size, we use an initially limited number of variables and a column generation approach. We also introduce a heuristic approach to get a good feasible solution. Computational results are reported for small size and real-world instances. Keywords Multi-layer Network Design, MPLS, Statistical Multiplexing, Traffic Grooming, Optimization Models, Heuristics, Lagrangian Relaxation. Submitted to Computer Networks, May 15, This work has been partially supported by Alcatel-Lucent and by the European Network of Excellence EURO-NGI.

2 2 I. Introduction With classical IP routing, packet forwarding is performed independently at each router in the network and is based only on the destination address carried in the packet. Classical IP routing policy selects the shortest path to the destination exploiting distributed routing protocols. Hence, when the resources available on the shortest path are not sufficient the quality degrades. Recently, substantial effort has been spent to improve conventional IP routing architecture and protocols by providing them with additional functionalities using the Multi Protocol Label Switching (MPLS) [1]. One of the key aspects of MPLS is a new connectivity abstraction. In particular, explicitly routed point-to-point paths, named Label Switched Paths (LSP), can be established using label based forwarding mechanisms. This allows a per flow path selection and Quality of Service (QoS) parameters to be taken into account by the routing algorithm [2]. The notion of QoS has been introduced to capture the quantitatively defined performance contract between the service provider and the user. The QoS requirement of a connection can be given as a set of link constraints, e.g. by requiring that there is enough bandwidth on the path selected for the connection of the requesting user [3]. The capacity needed at MPLS layer is provided by the underlying transport network which may be based on Synchronous Digital Hierarchy (SDH) or Wavelength Division Multiplexing (WDM), depending on the link speed. The transport network can be devoted to MPLS services only, or, more often, shared with circuit switched services such as the phone service. In this network architecture some or all nodes must support both transport network technology and MPLS. Hence, a telecom carrier that wants to offer MPLS based packet switched services must add label switching capabilities to some nodes of the transport network. A node supporting MPLS is named Label Switched Router (LSR). Edge nodes must necessarily support MPLS in order to collect packet switched traffic from users. Core nodes may or may not support MPLS. LSRs and virtual links connecting them define a logical network topology on top of the physical topology of the transport network (Figure 1). Virtual links in the logical topology are mapped into paths of physical links in the physical topology. These paths between LSRs are circuits (or light-paths) and may cross several nodes of the transport network not supporting MPLS. Circuits must be dimensioned according to bandwidth requirements and then the capacity of each physical link must be selected based on the circuits crossing it and the discrete set of possible values defined by the transport technology. In this context we have to take into account jointly the transport network layer and the MPLS layer when designing the network. This means that we have to decide which core nodes must support MPLS, how to connect LSRs within the transport network, and the bandwidth reserved on each link. A simple solution could be that of adding MPLS support to edge nodes only. In this case we have to set up a circuit between each

3 3 Core LSR Edge LSR Transport Network node Physical link Logical link Fig. 1. MPLS over Transport Network: physical and logical topologies. pair of edge LSRs and to dimension it according to the bandwidth required by the LSPs connecting them. The advantage of this solution is that we save the costs of adding MPLS support to core nodes. However, we cannot exploit the multiplexing gain for traffic demands routed on the physical link since LSPs traversing different LSR pairs must use different circuits. On the other side, we could add MPLS support to all the core nodes. In this case, we can exploit at best the multiplexing gain saving bandwidth on the physical links. Which of these opposite solutions is the more profitable depends on the relative costs of the nodes and the bandwidth and on how the multiplexing gain is modelled and exploited in the network. More in general, due to the tradeoff between multiplexing gain and cost of MPLS nodes, the best solution will be an intermediate one where only a subset of nodes are equipped with MPLS capabilities. The effect of multiplexing on the bandwidth required to support a set of LSPs is twofold. Since the capacity provided by the transport layer is available with discrete values, multiplexing allows to reduce the quantization effect. In some cases where the minimum available capacity is quite high, as in WDM, this effect is remarkable and multiplexing allows to fill up link capacities even with small flows. Moreover, with packet switching techniques like MPLS, statistical multiplexing triggers another relevant bandwidth reduction effect. Packet flows are characterized by an average and a peak rate. Depending on QoS requirements, like delay, and on the statistical multiplexing effect, the bandwidth that must be allocated for the flow is a value between the average and the peak rate. If only a few flows are multiplexed together, the bandwidth needed for each of them is closer to the peak rate, while if many flows share the same resources it is closer to the average rate [4]. It is worth pointing out here that we focus on the network design problem only, i.e. on the problem

4 4 of dimensioning network links and nodes, based on traffic estimates, while QoS provisioning during network operation is out of the scope of the present paper. Obviously, once the network is dimensioned according to bandwidth requirements calculated considering also the statistical multiplexing effect, standard techniques (bandwidth reservation, traffic classification, scheduling, etc.) can be adopted for dynamic QoS provisioning to traffic flows. In this paper we propose a new mathematical programming model for network design and routing of MPLS networks that take into account the statistical multiplexing effect. We consider a simple traffic model where each traffic demand is described by a pair of values (mean and additional). With such traffic description, the link capacity can be modelled by a bottleneck constraint, thus limiting the model complexity. In fact, if a set of traffic demands is multiplexed on a link, its capacity must be greater than the sum of all the mean values and of the highest additional one. It is easy to show that such a traffic model describes accurately the case of Poisson traffic with a delay requirement on the bottleneck link (see Section III). However, we can extend the scope of the model by considering the mean plus the additional value as a measure of the traffic peak rate. If we assume that peaks are non-simultaneous, only the highest one must be guaranteed on the traversed links. Moreover, the model and the algorithms proposed in this paper can be easily adapted to other traffic models, as for example those based on Gaussian assumptions [4]. Note that, even if we refer to MPLS technology throughout the paper, the proposed network design approach can be applied to Generalized MPLS (GMPLS) as well, since the considered multi-layer models can be adopted regardless of the specific multiplexing technology. After reviewing related works (Section II), we first describe the traffic model (Section III), and then we propose a path-based formulation of the problem of MPLS node location and network dimensioning (Section IV), which involves an exponential number of variables, one for each path. Then, in Section V we present a Lagrangian relaxation that yields a lower bound. Due to the huge number of variables, a column generation approach is needed to solve the continuous relaxation of the Lagrangian relaxation of the problem. We also propose a heuristic approach to obtain feasible solutions (Section VI), based on a local search exploring two different neighborhoods. The local search can start from two different initial solutions. The first initial solution is derived by rounding the solution of the Lagrangian relaxation. The second one is computed by means of a greedy algorithm. Tests have been run on a small size network to get more insights on the proposed approaches, and on realistic instances (Section VII). Finally, we give some concluding remarks (Section VIII).

5 5 II. Related work Many papers have been published on network design problems (surveys on these problems can be found in [5], [6], [7]). Generally speaking, classical network design models consider a graph with n nodes describing the network and a (n n)-matrix providing the amount of traffic to be delivered for each pair of nodes. The problem is to select link and node capacities in order to find the minimum cost network able to route all traffic from source to destination. This classic approach to network design assumes that all nodes can route traffic flows, and it is usually referred to as single layer design. However, the multiplexing effect described above requires to consider more complex models where some nodes (possibly not all nodes) can aggregate traffic flows and there is a cost associated with this multiplexing operation. The most appropriate approach in this case is based on multi-layer network description where in the upper logical layer nodes can switch traffic flows between aggregated flows, while in the lower physical layer nodes can only switch aggregated flows. Two graphs can be used to represent the network, a physical graph and a logical one. Links in the logical graph are mapped into paths of physical links. The problem here is not only dimensioning the physical graph but also designing the topology of the logical graph [8]. Most of the previous works on two-layer models focus on the optimization of flow aggregation and routing [9] and in particular on Wavelength Division Multiplexing (WDM) networks [10]. In this context, the problem considered is usually referred to as grooming problem since the main goal is to aggregate flows in order to better exploit the large capacity available on each wavelength [11], [12], [13], [14]. In order to define the logical topology of the WDM network, also wavelengths must be assigned to light paths and converters located where needed [15]. Different variants of the problem can be considered including hierarchical flow aggregation [16], but it has been shown that even for simple network topologies where the routing is trivial, the grooming problem is inherently difficult [17]. In WDM networks, resilience to failures is also an important feature and protection and restoration techniques at different layers can be jointly applied and optimized [18], [19]. From the network technology perspective, the integration of the optical layer with electronic layers within a converged data-optical infrastructure, based on classical IP or modern GMPLS (Generalized MPLS) architectures, is a key element in the current trend in broadband network evolution [20], [21]. Two-layer network design problems, where also link and node dimensioning is included in the model, have been considered only quite recently [22] [29]. Some works specifically consider MPLS technology [21] and some of them address the problem of MPLS node location [30], [31]. Given the complexity of the optimization models, several authors rely on path formulations and column generation coupled with branch&bound [28], joint column and row generation methods [22], [26], branch&cut with cut-set inequalities [27] or LP-based

6 6 decomposition approaches [24]. For mid-to-large networks, the solution of choice remains heuristic algorithms [29], which provide a feasible solution in limited time. However, to the best of our knowledge, the effect of statistical multiplexing has not been previously considered in such network design and routing models. III. Traffic Description The traffic model adopted here considers each traffic flow q described by a mean rate f q and an additional rate f q. Considering several flows {1, 2,..., r}, statistical multiplexing affects the capacity required by the aggregated flow. We assume that, if the flows are not aggregated, then the total needed capacity is: r f q + q=1 r q=1 f q. (1) On the other hand, if the flows are aggregated, we can take advantage of the statistical multiplexing and the capacity requirement decreases. Indeed it must meet QoS requirements of all demands. Since only one demand q is assumed to take its highest value f q + f q at a time the capacity needed on the logical link is: r q=1 f q + max f q. (2) q=1,...,r Logical links are mapped on physical paths and then on circuits connecting MPLS nodes. On a single physical link multiple circuits can be routed. The minimum capacity of a physical link can be obtained considering the above expressions for all circuits traversing it. Then the actual capacity of the physical link must be selected considering the discrete set of values provided by the transport technology. The above simple model can be explained in an accurate way considering Poisson flows. Consider a specific logical link of the network. Let λ denote the packet arrival rate and µ the link service rate. Then the expected delay time E[d] is: E[d] = 1 µ λ. (3) Let us denote with f the total number of bits per second routed on the link, with U the amount of capacity on the considered link and with L the average packet length. We recall that µ = U L and that λ = f L. Then E[d] = 1 U L f L = L U f. (4) Suppose that, for the considered traffic flow, a constraint on the maximum delay time is given: τ denotes this limit. Thus the capacity needed to fulfill the constraint on the delay time is U L + τf τ = f + L τ. (5)

7 7 where L τ represents the additional traffic value. If several flows are routed along the given link, each associated with a maximum delay τ q, with q = 1,..., r, we can set the additional value f q of flow q equal to L τ q. Since the aggregated flow is still a Poisson one, it is easy to observe that the capacity required on the link to fulfill the maximum delay constraint for all flows is given by (2). It is worth noting that, even if the problem formulation presented in the next section is based on the above traffic model, it can be easily extended to other models. From the solution approach point of view also the greedy algorithm and the local search procedure presented in Section VI can be easily extended. IV. MPLS node location and network design problem The problem is specified by a set of nodes, a set of potential physical links, and a set of traffic demands between pairs of nodes to be routed, each described by a mean and an additional value. Two types of demands can be present: the MPLS ones, that can exploit statistical multiplexing, and the SDH ones, which cannot be multiplexed and have no additional value. The problem is to define the routing of all the traffic demands, which cannot be split on different paths, the network topology (physical and logical) and the capacity to be installed on each physical link. Moreover, the presence of multiplexing devices in some core nodes may allow to exploit the gain of statistical multiplexing. Therefore another level of decision concerns in which nodes multiplexing devices have to be located. Both MPLS and transport nodes are capacitated: the capacity to be installed on each node must to be optimized, as well. The goal is to minimize the total network installation cost, which is determined by the MPLS devices installed on core nodes, the transport node devices and the physical link capacity. The problem is NP-hard as it generalizes the Fixed Charge Network Design Problem [34]. Even in a simpler version where all nodes are equipped with multiplexing devices, all the flows routed on one link are multiplexed and all the capacity variables are continuous, the problem is NP-hard [32]. The design problem can be formulated as a network design and dimensioning problem with bottleneck constraints. In [33] a similar flexible capacity sharing model is proposed, representing capacity requirements occurring in survivable network design. The network can be represented as an undirected graph G = (V, E), where V is the set of nodes and E is the set of links, as shown in Figure 2. The subset of nodes with multiplexing capability V M V must be decided by the design problem. The set of edges E is partitioned into two subsets: E T is the subset of physical links, while S is the subset of potential logical links: it represents the logical topology, which must be decided by the design problem solution. The network graph can be divided into two graphs, one, denoted by G = (V, E T ), representing the physical layer, the other, G = (V M, S) representing

8 8 j i Logical graph G ' ' = ( V, S ) M j Physical graph G ' = ( V, E ) T i l k Edge nodes Core nodes Core nodes with MPLS capab. Fig. 2. Physical and logical graphs representing the network. the logical layer. For each node i V, I(i) and F (i) are the sets of virtual links that start and end in i, respectively. Analogously, we denote with I(i) and F (i) the sets of physical links incident in i. Denote with Q the set of traffic demands to be routed. Each traffic demand q Q is defined by an origin node s q, a destination t q node (with s q, t q edge nodes), a mean flow f q (in Mbit/s) and an additional one f q (in Mbit/s). Let F denote the maximum value of f q for each q Q, namely F = max q Q f q. Different flows can be aggregated to exploit statistical multiplexing gain: once they are aggregated, they are routed as a single flow on a link of the logical layer s S. Each logical link s S is mapped into a physical path at the end of which the flows are disaggregated. For instance, in Figure 2, the virtual link (i, j) corresponds to the physical path i k l j. If a set of flows is aggregated at node i and disaggregated at node j, multiplexing devices are needed only at the endpoints i and j of the considered physical path. As the aggregated flows behave as a single one on the considered virtual link, no flow can be multiplexed at any intermediate node. As mentioned above, not only MPLS traffic but also SDH traffic can be served by the network. Let Q SDH Q be the subset of the SDH traffic demands that has to be routed on the transport layer. The set Q SDH cannot take advantage of statistical multiplexing. Each q Q SDH cannot utilize the MPLS layer of the nodes it traverses. We manage these traffic demands as special cases of the MPLS ones. Each q Q SDH can be seen as an MPLS demand with peak rate equal to zero with the additional constraint that it cannot be multiplexed with the other demands. Consider the traffic demand q Q SDH, with source node s q and destination node t q. To deal with q as if it is a MPLS demand, we introduce two auxiliary nodes, s q and t q in the network topology, which become the source and destination of q. The auxiliary nodes are linked to the

9 9 source and destination nodes, s q and t q, of the traffic demand through two arcs with null cost. Thus traffic demand q must be routed on the two auxiliary links (s q, s q ) and (t q, t q). Then we route this demand q on an LSP composed only by one single virtual link (the shortest path on the SDH topology between these two auxiliary nodes). This way, every SDH demand is not multiplexed with the other demands. A complete mathematical representation of the devices that can be installed on each node would be very complicated and worthless. However, we need to model the cost scheme and the relationship between cost, capacity and traffic flow. Thus we have chosen a general multi-facility model by defining a set of available devices that can be installed on each transport node, corresponding to discrete capacity values. A different cost is associated with each device. Let H N be the set of device types that can be installed on each transport node. For each h H N let µ h and θ h be the capacity (in Mbit/s) and the cost of a device of type h. We adopted the same approach to model the upper level (MPLS) node scheme. The set of available MPLS node device types is denoted with H M. For each h H M, ψ h and γ h denote the capacity (in Mbit/s) and the cost of device of type h 1. Finally, H L denote the set of available transport channels, that can be installed to a transport link e E T. For each e E T and h H L, c h e is the cost of installing one channel of type h on e, and λ h is its capacity. This cost depends not only on the type of channel installed but also on the length of the considered physical link. An unavoidable quantization effect is present due to the granularity of the installed capacity, as the capacity on nodes and arcs is provided by selecting node device and link channel types. Costs associated with available device and circuit types increase less than linearly with respect to the capacity. An example of capacities and costs of node and link devices will be presented in Section VII. We present a path based formulation where P denotes the set of all the paths between pairs of nodes of V. Given a traffic demand q, P q denotes the set of paths connecting s q and t q. Each path is a LSP set up by a sequence of virtual links. We have chosen to model routing paths with path variables instead of flow variables. Path formulations have a potentially very large number of variables (exponential in V ) but are more flexible in that, in general, only a subset of these variables is needed. We define a binary variable x p for each path p P connecting node s q to t q such that: 1 if traffic demand q is routed on path p, x p = 0 otherwise. These variables are subject to routing constraints guaranteeing that each demand is served by one path. Besides, they are involved in capacity setting constraints, together with variables representing the capacity 1 We assume that at most one device can be installed on each node of both layers. The different devices represent the different capacities which can be provided on a node. Their cost can include, when necessary, also the platform cost.

10 10 needed on each virtual link and the one installed on each physical link. For each virtual link s S and h H L, variable y h s represents the number of transport circuits of type h to be provided for virtual link s, to deal with the traffic routed on s. These circuits are not installed on s, but they are provided by installing circuit on the physical links belonging to the path to which s corresponds. Let y h e be the number of transport channels of type h to be installed on link e to provide the capacity needed by the logical links routed on e. Note that if for a given s S y h s is equal zero for all h H L then virtual link s does not belong to the virtual topology. The total flow on a virtual link according to the traffic model described in Section III is given by q Q p P q :s p f qx p + max q Q p P q :s p f q x p. To linearize the above quantity, we introduce variables z s. Let s endpoints be i and j. Then s denotes s with respect to the direction from i to j, while s denotes s in the opposite direction, from j to i. For each s S, variables z s and z s represent the maximum additional rate among the demands routed on s in both directions, from i to j and from j to i, respectively. Finally, we have to introduce dimensioning variables for both layer of each node, which are involved both in node dimensioning and in node capacity constraints. For each i V and h H N we define the binary variable w h i such that: 1 if node i is equipped with a transport device of type h, wi h = 0 otherwise. In the same way, for each i V and h H M we define the following binary variable: 1 if i is equipped with MPLS device of type h, m h i = 0 otherwise. Note that if variable m h i is equal to zero for all h H M, then the node is not a MPLS one. Using the variables described above, the model of the problem can be formulated as ILP problem. Let us first describe the structure of the model and the constraint sets, which will be described in detail later. Objective function: minimization of the total network cost s.t. Routing constraints - C1 Virtual link required capacity setting - C2 Virtual link highest additional value computing - C3 Maximum additional value - C4

11 11 Transport link capacity dimensioning - C5 MPLS and transport node device dimensioning - C6 Single node device selection - C7 Variables domain - C8 The objective function asks to minimize the total network costs (eq.(6)), i.e., the capacity installation cost, given by the sum of three components: MPLS node device costs, transport node device costs and transport link capacity costs. min γ h m h i + θ h wi h + i V h H M i V h H N e E T c h e ye h (6) h H L Routing constraint: routing constraints (eq.(7)) impose that each traffic demand is routed on at least one path. As x p are binary variables, the demands are not split among several paths 2. x p 1 q Q (7) p P q Virtual link required capacity setting: the constraints (eq. (8) and (9)) set the amount of capacity needed by each virtual link, which must provided through the transport channels installed on the lower layer. For each of the two directions, the required capacity must fulfill the sum of the mean values of the demands routed on it and of the maximum of the additional rates (given by z s variable). f qx p + z s q Q p P q:s p q Q p P q:s p λ h ys h s S (8) h H L f qx p + z s λ h ys h s S (9) h H L Virtual link highest additional value computing: the maximum value of the peak rates on each virtual link is stated by bottleneck constraints (eq.(10) and (11)): it must be greater or equal to the additional value of each demand routed on the considered link. f q f q p P q :s p p P q:s p x p x p z s q Q, s S (10) z s q Q, s S (11) 2 The problem requires a path for each demand, while in the constraint at least one path for each demand is required. However, in the following constraints all the amount of traffic is assumed to be routed on a path p such that x p = 1. Therefore, assigning value one to more that one path variable would increase the amount of needed capacity and thus the costs.

12 12 Maximum additional value: redundant constraints (eq.(12) and (13)), setting the maximum value of the additional traffic on any link, are added to bound the value of z s and z s : they are useful in solving the relaxation proposed in the next section. z s F s S (12) z s F s S (13) Transport link capacity dimensioning: constraints on the transport link capacity (eq.(14)) guarantee that physical links have sufficient installed capacity to support the traffic of virtual links routed on them. λ h ys h h H L s S:e s h H L λ h y h e e E T (14) MPLS and transport node dimensioning: node-dimensioning constraints (eq.(15) and eq.(16)) impose that the amount of capacity of each layer of a node, provided by the choice of the device to be installed, is not exceeded by the amount of traffic routed through the node. On the other hand, these constraints force the choice of the suitable node devices to be installed on each node layer to deal with the overall traffic rate of the incoming links. h H L λ h h H L λ h s I(i) F (i) e I(i) F (i) y h s y h e h H M ψ h m h i i V (15) h H N µ h w h i i V (16) Single node device selection: constraints (17) and (18) impose to install at most one type of device on each layer of a node. h H M m h i 1 i V (17) h H N w h i 1 i V (18) Variables domain: last constraints (eq. (19) - (25)) impose variable domains: they are integrality and nonnegativity constraints.

13 13 x p {0, 1} p P (19) wi h {0, 1} i V, h H N (20) m h i {0, 1} i V, h H M (21) ys h N s S, h H L (22) ye h N e E T, h H L (23) z s 0 s S (24) z s 0 s S (25) As mentioned before, the above problem formulation is based on the simple traffic described in Section III. In particular, variables z s and z s represent the capacity that must be allocated in addition to the mean traffic value. In the presented formulation the values of the maximum flow in the two directions are assigned to these variables by imposing constraints (10) and (11). Different formulations can be adopted to represent different traffic models by modifying these two sets of constraints. In case of Gaussian traffic the additional required capacity is given by a constant multiplied by the standard deviation of the aggregated flow [4]. V. Lagrangian relaxation The problem, beside being NP-hard, is also out of the reach of state-of-the-art integer linear programming solvers even for small size instances. Intending to deal with practical instances, our aim is to compute a good feasible solution that can be implemented in real life, and a lower bound of the problem to which we compare the feasible solution. To compute the lower bound we propose a Lagrangian relaxation, solved with the subgradient method [36]. Moreover, as the number of paths connecting pairs of nodes of the network grows exponentially with the network size, approaching the model with all possible path variables is impracticable. Therefore we use a column generation approach [37] to solve the continuous relaxation of the relaxed problem. This method allows us to consider only a subset of variables and new variables are added dynamically if needed. In order to identify such variables we solve a subproblem called pricing based on a shortest path computation. Lagrangian relaxation removes some of the constraints of the problem, in this way generating a relaxed problem, easier to solve than the original one. However, to take into account the relaxed constraints a linear combination of them is added to the objective function. We relax the constraints setting the capacity required on each virtual link together with those dimensioning the peak values, namely C2 and C3. They are combined through lagrangian multipliers π, τ, σ and ρ, and their combination is added to the objective function. The

14 14 resulting relaxed problem L(π, τ, σ, ρ) is: Relaxed objective function s.t. C1 - Eq.(7) involving routing variables x p C4 - Eq.(12) and (13) involving variables z s and z s C5 - Eq.(14) involving variables ys h and ye h C6 - Eq.(15) and (16) involving device variables, m h i and w h i, and link dimensioning variables, yh s and y h e C7 - Eq.(17) and (18) involving m h i and w h i variables C9 - relaxed variable domain constraints The relaxed objective function is: min γ h m h i + θ h wi h + c h e ye h + i V h H M i V h H N e E h H L + π s f qx p + z s λ h y h s + s S q Q p P q :s p h H L + τ s f qx p + z s λ h y h s + s S q Q p P q :s p h H L + σs q f q x p z s + s S q Q p P q:s p + ρ q s f q x p z s s S q Q p P q :s p (26) Note that routing variables x p and dimensioning variables, z s, z s, y e, y s, m h i, wh i, do not appear together in the same constraint, in the relaxed problem. Besides, the relaxed objective function can be rewritten in two parts, one involving only routing variables, the other involving only dimensioning variables. Thus the relaxed problem decomposes into Q +1 independent sub-problems, one L 0, involving dimensioning variables, and one L q problem for each demand, involving only routing variables,: L(π, τ, σ, ρ) = L 0 (π, τ, σ, ρ) + q Q L q (π, τ, σ, ρ) (27) The first sub-problem is: L 0 (π, τ, σ, ρ) = min [ c h e ye h λ ] h ys h (π s + τ s ) + γ h m h i + θ h w h i + h H L e E s S i V h H M h H N + s S z s π s q Q σ q s + s S z s τ s q Q ρ q s (28)

15 15 s.t. Maximum additional value - C4 Transport link capacity dimensioning - C5 MPLS and transport node device dimensioning - C6 Single node device selection - C7 Relaxed variable domain constraint - C9 In this sub-problem, the z variables are not related with the y, the m and the w ones. To decide the value to assign to each z variable we check its coefficient in the objective function: if it is negative, the z value will take value F, otherwise it will be set to 0. Constraints (12) and (13) limit the value each z variable can assume: without these constraints z variable would go to infinity. Once the z variables have been fixed to their optimal value the problem can be solved efficiently, being a Linear Programming problem. Each sub-problem L q (π, τ, σ, ρ), q Q, has the following form: L q (π, τ, σ, ρ) = min s S + s S p P q :s p p P q:s p x p (π s f q + σ q sf q )+ x p (τ s f q + ρ q sf q ) (29) p P q x p 1 q Q (30) 0 x p 1 p P (31) Each of these Q sub-problems is a shortest path problem. We have to find the shortest path on an oriented graph where the set of the arcs is the set of virtual links S and to each arc is assigned a cost given by the following sums: π s f q + σs q f q for the arc oriented from i to j, τ s f q + ρ q s f q for the arc oriented from j to i. Note that variable x p here is continuous, not binary. However, solving each of the Q sub-problems with Dijkstra s algorithm we know that only one path will be selected for each origin-destination pair, and the corresponding path variable x p will be set to 1. As the cardinality of S is exponential, we first solve the continuous relaxation of problem L 0 (π, τ, σ, ρ) over a subset of virtual links S 0 S (Restricted Master Problem RMP). The initial subset of virtual links is obtained by considering all the physical links and the virtual links traversing at most two physical links on the transport network. Then we apply a column generation procedure to compute the continuous optimum. We iteratively solve the reduced problem L 0 (π, τ, σ, ρ) and we update S 0 by adding the variables with negative

16 16 reduced costs, i.e., the variables whose related dual constraint is violated, until no such variables are found. We recall that, given a solution of a linear programming (LP) problem, if the dual variables related to such solution are feasible for the dual problem then the given solution is optimal. Besides, each variable (constraint) of the primal problem is associated with a constraint (variable) of the dual problem. Consider a violated dual constraint: the corresponding primal variable has a negative reduced cost and therefore it can produce an improvement in the objective function if it is added to the set of the considered variables. Thus the aim of the pricing procedure is to verify whether the dual variables associated with the primal solution found are feasible for the dual problem and, if they are not, to generate a primal variable corresponding to a violated dual constraint. Then, the new variable is added to the considered set and the RMP is solved again. The continuous relaxation optimum is reached when no primal variable can be found such that the related dual constraint is violated. Denote with η i, β e, ν s and χ s the dual variables related to the constraints (15), (14), (12) and (13) of L 0 (π, τ, σ, ρ), respectively. Let us denote with T (s) the two endpoints of virtual link s. The dual constraints related to the variables ys h, z s and z s for a given virtual link s are η i + β e π s + τ s (32) i T (s) e E:e s ν s q Q σ q s π s (33) χ s q Q ρ q s τ s (34) A crucial question consists in the fact that the multiplier values are not defined for the virtual links not yet generated, therefore we cannot identify which constraints are actually violated. For this reason we evaluate the missing multiplier values heuristically. The variables to be added to S 0 are such that (32), (33) or (34) are violated. Finding an s such that the related constraint (32) is violated is equivalent to solve a shortest path problem for each pairs of nodes. We consider a graph where there is an arc for each virtual link considered so far (S 0 denoting the set of virtual links considered so far) and where each arc e has a cost β e. Once we find the shortest path for a traffic demand q connecting o q to t q we sum the length of the shortest path to the dual variables corresponding to its source and destination nodes, η oq and η tq. If this value violates constraint (32) then the shortest path found between the two considered nodes is added as a new virtual link to S 0. Otherwise we check constraints (33) and (34). If at least one of them is violated the path is added to S 0. If none of these constraints is violated, we do not have to search for another path between the considered pair of nodes.

17 17 VI. Heuristic approach To find a good feasible solution we propose a heuristic algorithm based on a local search framework. The local search can start from different initial solutions, obtained in two different ways, thus generating two different versions of the local search based approach. The first initial solution is obtained by dimensioning the node and link capacity according to the routing provided by the solution of the Q shortest path problems L q and it can be applied at each iteration of the subgradient procedure, thus generating a population of solutions. It considers the routing obtained from the solution of the Q shortest path problems and allocates the resources on node and links according to such routing. If the obtained solution does not violate the capacity constraints, it is added to the population of initial solutions. The local search is then applied to the set of K best solutions obtained from such procedure. In the computational test the value of K has been set to three, as good tradeoff between quality of results and needed computational time. The second algorithm builds from scratch the initial solution through a greedy algorithm. It first builds a set of virtual links S: all the physical links and the virtual links that cross at most two lower layer links belong to such set. Then the greedy algorithm routes each traffic demand on the path with the minimum number of virtual links between the origin and the destination. The local search we propose is based on two neighborhoods, which are alternately visited, starting from the chosen initial solution. When an improving solution is found, it becomes the new current one and the search continues with the currently explored neighborhood. Instead, if no improving solution is found and a local minimum of the current neighborhood is reached, the local search swaps to the other neighborhood and the search goes on until a new local minimum is reached and the neighborhood has to be changed again. The local search procedure stops when no improving solution can be found exploring both the neighborhoods. Two key features of the problem solution are the routing of each traffic demand and the routing of each virtual link on the lower layer network. The two neighborhoods are generated by modifying such features of a given solution. The first neighborhood is generated by routing each traffic demand on all possible LSPs connecting its source to its destination. Given a current solution, a neighbor is generated by changing the path on which a given demand is routed. As the number of possible LSPs connecting the origin and the destination node of a given traffic demand is huge, visiting the whole neighborhood, and therefore searching the best neighbor solution, would be expensive from a computational viewpoint. We propose a heuristic way to visit such neighborhood based on the approach proposed in [35]. To visit the neighborhood and find the best neighbor solution, we should look for the best routing of each traffic demand. Instead of enumerating all possible alternative routing, we look heuristically for the routing providing the best improvement of the objective

18 18 function. For each demand we build a path such that an improving solution is obtained if the considered demand is routed on the built path. An auxiliary graph is built for each traffic demand. In the auxiliary graph, the cost associated with each arc represents the incremental cost, positive (or negative), of routing (removing) the considered traffic demand on (from) the arc itself. Consider a demand q and an arc e. If q is routed on the arc e in the current solution, then e is assigned a negative cost equal to the capacity cost saved by removing demand q from arc e. If no transport circuit can be removed the incremental cost is zero. Suppose now that q is not routed on e. The incremental cost of routing demand q on e is given by the cost of adding the needed capacity. If q can exploit the available capacity on e the incremental cost is zero. A new routing of a given demand is then associated with a cycle: it represents the moving of the given traffic demand from the current routing (negative cost arcs) to a new one (positive cost arcs). If the total cost of the cycle is negative, the balance between the new costs and the saving associated with the move is negative and therefore the new routing would improve the objective function. Thus, looking for the best neighbor solution turns out to be a minimum negative cost cycle problem, which is an NP-hard problem that can be solved heuristically as proposed in [35]. However, due to the peculiar characteristics of our problem cost functions, devising the auxiliary graph costs is computationally expensive as it requires to evaluate the link capacity to add or remove at the lower layer and the node capacity to add or remove at both layers. To show the behavior of the first neighborhood, consider the network design problem described in Figure 3 and an initial routing. Fig. 3. Initial routing. In the auxiliary graph related to demand D, arc (6, 3) has a negative cost, as the demand can be removed from the arc, providing a capacity saving, while positive costs are associated to arcs (6, 7) and (7, 3), as the demand can be added on such arcs. Incremental costs of such arcs are represented in bold in Fig 4. For each

19 19 arc two costs are reported, one for each direction in which the arc can be used. It is possible to find a negative cost cycle related to demand D shown in Figure 4, represented in bold. As an improving move is found, a new solution can be generated by moving demand D from its current routing to a new one, as shown in Figure 5. Fig. 4. Negative cycle. Fig. 5. Final solution. The move is first applied to the set of SDH traffic demands, explored according to non-increasing values of the traffic amount, until no improving solution is found. Then the procedure considers MPLS demands, sorted according to non increasing sum of mean and peak values. The second move builds a neighbor solution by removing all the traffic flows routed on a given virtual link. It tries to reroute them together on a new path on the transport layer. The dimension of the second neighborhood is huge as well, thus we use a heuristic approach to find an improving move. We generate an

20 20 auxiliary graph with incremental arc costs using the same criteria adopted to explore the first neighborhood. Then we delete the only arc with a negative incremental cost (that represents the considered virtual link) and search the shortest path on the lower layer to connect the endpoints of the considered virtual link. If the length of this path is less than the cost of the deleted arc, considering the absolute value, a potentially improving solution is found. We explore the virtual links according to non decreasing value of the flow routed on it. When a new solution with a lesser cost is found we reorder the virtual links and we restart from the first one. Note that the described local search procedure, as well as the greedy algorithm for obtaining the initial solution, can be applied also to different traffic models since the way in which we calculate the capacity for each virtual link is irrelevant. On the contrary, the Lagrangian relaxation and the heuristic used to obtain the set S of initial solutions from the column generation strictly depend on the assumptions made in the ILP model presented in Section IV. VII. Computational results We implemented our algorithms with MATLAB 7.0 and we ran them on an AMD Athlon 1.8 Ghz with 1 Gbyte RAM. In order to get some insights on the model characteristics, we first present an example of the solutions obtained on a small network with 12 links, 3 edge nodes and 4 core nodes. On each link of the network is reported its physical length. Table I shows the mean and the peak rates of the traffic demands offered to the network. In Table II an example of available link and node devices is given. However, to evaluate the behavior of the approach, it has been tested on different kinds of costs of MPLS devices: much cheaper than the cost of links, comparable and much more expensive. Figure 6 reports solutions obtained after the local search. The figure shows the solution considering a cost for MPLS devices much cheaper than the cost of links in case a), comparable in case b) and much more expensive in case c). The used starting points derive from the lower bound resolution. In case a), since the cost for multiplexing devices is small compared with bandwidth saving obtained with statistical multiplexing, two MPLS core nodes (grey nodes) have been installed. Traffic demand can be multiplexed and demultiplexed at node 6 and node 7: demands B and D are multiplexed at node 6, while demands A and C are multiplexed at node 7. The total link capacity cost is In case b), only a core node is equipped with multiplexing device since the corresponding cost is higher. As node 7 is not a LSR anymore, traffic demands cannot be multiplexed at such node. Thus demand C is routed from its origin to node 6 and there is multiplexed with demand A. The link capacity installation due to this different routing

21 21 a) b) c) Fig. 6. Example: effect of MPLS node costs on design and routing.

22 22 Traffic demand O D Medium rate Peak rate (Mbits/s) (Mbits/s) A B C D TABLE I Traffic demands offered to the small size network. Device Capacity Cost (Mbit/s) d Link device d d d Transport d node device d d d MPLS node device d d TABLE II Cost and capacity of available link and node devices. is more expensive than the former one: the total link capacity cost is Finally, in case c), the cost of multiplexing devices is too high and none is installed in the core. As the traffic demands can be multiplexed only at edge nodes, demand A is routed from node 1 to node 6 and then to node 3 where it is multiplexed with demand C, while demand D is routed from node 2 to node 3 through node 7 and there is multiplexed with B. The link capacity installation cost arises up to In all cases, we observe that flows are routed only on few links in order to exploit statistical multiplexing and traffic grooming at best. For this reason nodes 4 and 5 are never equipped with multiplexing devices even if the nodes cost is very cheap. We tested the formulation also on real life based instances (all instances have been derived from realistic cases provided by Alcatel-Lucent) with 25 (A instances) and 39 nodes (B instances) and 63 and 86 links,

23 23 Instances # nodes # links A B C D E TABLE III Instances. respectively. To these networks we offer a traffic represented by 270 traffic demands (60 of them are SDH) in the first case and by 300 traffic demands (40 SDH) in the second case. We solved different instances obtained by considering different ratios between mean and additional values: low peak instances, in which the ratio between additional and mean rate is [ ], medium peak instances, in which the ratio is between [ ] and high peak instances, in which the ratio is between [ ]. In these three cases, for each traffic demand, the sum of mean and additional rates is the same so the amount of traffic offered to the network does not change. In order to evaluate the effect of statistical multiplexing, we also considered an instance in which statistical multiplexing cannot be exploited and the capacity needed for a set of flows crossing a link is given by the sum of their mean and peak rates, according to equation (1). To evaluate the effect of MPLS node costs, we have considered also two networks with 35 nodes (C instances) and one with 45 (D instances). These three instances have respectively 63, 106 and 102 links. We offered a traffic represented by 340 traffic demands (40 of them are SDH) in the first two instances and by 575 traffic demands (75 SDH) in the last one. We considered three different nodes costs: one with the overall nodes cost equal to the overall links cost (equal), one with the first one 100 times greater than the second one (expensive) and finally one with the first one 100 times smaller than the second one(cheap). A summary of these networks is provided in Table III. Table IV reports results for instances A and B (first column) for different values of the ratio between mean and peak rate (second column): in the third column the objective function value (LB) of the Lagrangian relaxation, in the fourth column and in the fifth one both the initial solution (LH) and the final solution (LS LH ) of the local search respectively, in the sixth column and in the seventh one the gap between upper and lower bound ( LS LH LB LB ) and the gain obtained on the starting solution by using the local search ( LS LH LH LH ). We observe that the gap between upper and lower bound is quite high (45% on average). This is due to the fact that we solved the continuous relaxation of the Lagrangian relaxation. The mean time to obtain

INTEGER PROGRAMMING. Integer Programming. Prototype example. BIP model. BIP models

INTEGER PROGRAMMING. Integer Programming. Prototype example. BIP model. BIP models Integer Programming INTEGER PROGRAMMING In many problems the decision variables must have integer values. Example: assign people, machines, and vehicles to activities in integer quantities. If this is

More information

Maximizing Restorable Throughput in MPLS Networks Reuven Cohen, Senior Member, IEEE, and Gabi Nakibly, Member, IEEE

Maximizing Restorable Throughput in MPLS Networks Reuven Cohen, Senior Member, IEEE, and Gabi Nakibly, Member, IEEE 568 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2, APRIL 2010 Maximizing Restorable Throughput in MPLS Networks Reuven Cohen, Senior Member, IEEE, and Gabi Nakibly, Member, IEEE Abstract MPLS recovery

More information

A hierarchical multicriteria routing model with traffic splitting for MPLS networks

A hierarchical multicriteria routing model with traffic splitting for MPLS networks A hierarchical multicriteria routing model with traffic splitting for MPLS networks João Clímaco, José Craveirinha, Marta Pascoal jclimaco@inesccpt, jcrav@deecucpt, marta@matucpt University of Coimbra

More information

On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks

On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks 1 Technion - Computer Science Department - Tehnical Report CS-01-0 - 01 On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks Abstract Software Defined Networking

More information

Iyad Katib and Deep Medhi DRCN 2011 Krakow, Poland October 2011

Iyad Katib and Deep Medhi DRCN 2011 Krakow, Poland October 2011 Iyad Katib and Deep Medhi DRCN 2011 Krakow, Poland October 2011 IP/MPLS over OTN over DWDM network protection. Three-layer modeling. OTN sublayer technological constraints explicitly considered. Layers

More information

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir

More information

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

Capacity planning and.

Capacity planning and. Some economical principles Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Assume users have

More information

Cost Models for Vehicle Routing Problems. 8850 Stanford Boulevard, Suite 260 R. H. Smith School of Business

Cost Models for Vehicle Routing Problems. 8850 Stanford Boulevard, Suite 260 R. H. Smith School of Business 0-7695-1435-9/02 $17.00 (c) 2002 IEEE 1 Cost Models for Vehicle Routing Problems John Sniezek Lawerence Bodin RouteSmart Technologies Decision and Information Technologies 8850 Stanford Boulevard, Suite

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

On the effect of forwarding table size on SDN network utilization

On the effect of forwarding table size on SDN network utilization IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz

More information

Chapter 13: Binary and Mixed-Integer Programming

Chapter 13: Binary and Mixed-Integer Programming Chapter 3: Binary and Mixed-Integer Programming The general branch and bound approach described in the previous chapter can be customized for special situations. This chapter addresses two special situations:

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

Relationship between SMP, ASON, GMPLS and SDN

Relationship between SMP, ASON, GMPLS and SDN Relationship between SMP, ASON, GMPLS and SDN With the introduction of a control plane in optical networks, this white paper describes the relationships between different protocols and architectures. Introduction

More information

PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON

PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON (B.Eng.(Hons), NUS) A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF ENGINEERING DEPARTMENT OF ELECTRICAL & COMPUTER

More information

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams André Ciré University of Toronto John Hooker Carnegie Mellon University INFORMS 2014 Home Health Care Home health care delivery

More information

New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints

New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints Santosh Kulkarni 1, Reema Sharma 2,Ishani Mishra 3 1 Department of ECE, KSSEM Bangalore,MIEEE, MIETE & ISTE 2 Department

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

A Software Architecture for a Photonic Network Planning Tool

A Software Architecture for a Photonic Network Planning Tool A Software Architecture for a Photonic Network Planning Tool Volker Feil, Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering Pfaffenwaldring 47, D-70569 Stuttgart

More information

The Problem of Scheduling Technicians and Interventions in a Telecommunications Company

The Problem of Scheduling Technicians and Interventions in a Telecommunications Company The Problem of Scheduling Technicians and Interventions in a Telecommunications Company Sérgio Garcia Panzo Dongala November 2008 Abstract In 2007 the challenge organized by the French Society of Operational

More information

Routing in Line Planning for Public Transport

Routing in Line Planning for Public Transport Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany MARC E. PFETSCH RALF BORNDÖRFER Routing in Line Planning for Public Transport Supported by the DFG Research

More information

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

OPRE 6201 : 2. Simplex Method

OPRE 6201 : 2. Simplex Method OPRE 6201 : 2. Simplex Method 1 The Graphical Method: An Example Consider the following linear program: Max 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Balancing by MPLS in Differentiated Services Networks Riikka Susitaival, Jorma Virtamo, and Samuli Aalto Networking Laboratory, Helsinki University of Technology P.O.Box 3000, FIN-02015 HUT, Finland

More information

David Tipper Graduate Telecommunications and Networking Program. Telcom 2110 Network Design, Slides 11. WAN Network Design

David Tipper Graduate Telecommunications and Networking Program. Telcom 2110 Network Design, Slides 11. WAN Network Design WAN - VPN Network Design David Tipper Graduate Telecommunications and Networking Program University it of Pittsburgh Telcom 2110 Network Design, Slides 11 WAN Network Design WAN typically have a mesh or

More information

Policy-Based Fault Management for Integrating IP over Optical Networks

Policy-Based Fault Management for Integrating IP over Optical Networks Policy-Based Fault Management for Integrating IP over Optical Networks Cláudio Carvalho 1, Edmundo Madeira 1, Fábio Verdi 2, and Maurício Magalhães 2 1 Institute of Computing (IC-UNICAMP) 13084-971 Campinas,

More information

Security-Aware Beacon Based Network Monitoring

Security-Aware Beacon Based Network Monitoring Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan Email: {sasaki, liang, nag}@amp.i.kyoto-u.ac.jp

More information

Multiple Layer Traffic Engineering in NTT Network Service

Multiple Layer Traffic Engineering in NTT Network Service Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service

More information

Multiple Spanning Tree Protocol (MSTP), Multi Spreading And Network Optimization Model

Multiple Spanning Tree Protocol (MSTP), Multi Spreading And Network Optimization Model Load Balancing of Telecommunication Networks based on Multiple Spanning Trees Dorabella Santos Amaro de Sousa Filipe Alvelos Instituto de Telecomunicações 3810-193 Aveiro, Portugal dorabella@av.it.pt Instituto

More information

Traffic protection in MPLS networks using an off-line flow optimization model

Traffic protection in MPLS networks using an off-line flow optimization model Traffic protection in MPLS networks using an off-line flow optimization model A.E. Krzesinski and K.E. Müller Department of Computer Science University of Stellenbosch, 76 Stellenbosch, South Africa Phone:

More information

Path Selection Analysis in MPLS Network Based on QoS

Path Selection Analysis in MPLS Network Based on QoS Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

Discuss the size of the instance for the minimum spanning tree problem.

Discuss the size of the instance for the minimum spanning tree problem. 3.1 Algorithm complexity The algorithms A, B are given. The former has complexity O(n 2 ), the latter O(2 n ), where n is the size of the instance. Let n A 0 be the size of the largest instance that can

More information

PART II. OPS-based metro area networks

PART II. OPS-based metro area networks PART II OPS-based metro area networks Chapter 3 Introduction to the OPS-based metro area networks Some traffic estimates for the UK network over the next few years [39] indicate that when access is primarily

More information

Designing Reliable IP/MPLS Core Transport Networks

Designing Reliable IP/MPLS Core Transport Networks Designing Reliable IP/MPLS Core Transport Networks Matthias Ermel Workshop ITG FG 5.2.1 14. November 2008 München Content 1. Introduction 2. Protection Mechanisms 3. Failure Detection Page 1 Architecture

More information

The Trip Scheduling Problem

The Trip Scheduling Problem The Trip Scheduling Problem Claudia Archetti Department of Quantitative Methods, University of Brescia Contrada Santa Chiara 50, 25122 Brescia, Italy Martin Savelsbergh School of Industrial and Systems

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

TD 271 Rev.1 (PLEN/15)

TD 271 Rev.1 (PLEN/15) INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:

More information

A Constraint Programming based Column Generation Approach to Nurse Rostering Problems

A Constraint Programming based Column Generation Approach to Nurse Rostering Problems Abstract A Constraint Programming based Column Generation Approach to Nurse Rostering Problems Fang He and Rong Qu The Automated Scheduling, Optimisation and Planning (ASAP) Group School of Computer Science,

More information

A New Forwarding Policy for Load Balancing in Communication Networks

A New Forwarding Policy for Load Balancing in Communication Networks A New Forwarding Policy for Load Balancing in Communication Networks Martin Heusse Yvon Kermarrec ENST de Bretagne BP 83, 985 Brest Cedex, France Martin.Heusse@enst-bretagne.fr Abstract We present in this

More information

Integrating Benders decomposition within Constraint Programming

Integrating Benders decomposition within Constraint Programming Integrating Benders decomposition within Constraint Programming Hadrien Cambazard, Narendra Jussien email: {hcambaza,jussien}@emn.fr École des Mines de Nantes, LINA CNRS FRE 2729 4 rue Alfred Kastler BP

More information

24. The Branch and Bound Method

24. The Branch and Bound Method 24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no

More information

Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring

Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring Qiang Zheng, Student Member, IEEE, and Guohong Cao, Fellow, IEEE Department of Computer Science and Engineering

More information

Recovery Modeling in MPLS Networks

Recovery Modeling in MPLS Networks Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim

More information

MPLS over WDM Network Design with Packet Level QoS Constraints based on ILP Models

MPLS over WDM Network Design with Packet Level QoS Constraints based on ILP Models MPLS over WDM Networ Design with Pacet Level QoS Constraints based on ILP Models Luís Gouveia, Pedro Patrício Department of Statistics and Operations Research Faculty of Sciences, University of Lisbon,

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

The Multi-Item Capacitated Lot-Sizing Problem With Safety Stocks In Closed-Loop Supply Chain

The Multi-Item Capacitated Lot-Sizing Problem With Safety Stocks In Closed-Loop Supply Chain International Journal of Mining Metallurgy & Mechanical Engineering (IJMMME) Volume 1 Issue 5 (2013) ISSN 2320-4052; EISSN 2320-4060 The Multi-Item Capacated Lot-Sizing Problem Wh Safety Stocks In Closed-Loop

More information

MPLS - A Choice of Signaling Protocol

MPLS - A Choice of Signaling Protocol www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras

Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture - 36 Location Problems In this lecture, we continue the discussion

More information

Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach

Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach Patrik Björklund, Peter Värbrand and Di Yuan Department of Science and Technology, Linköping University SE-601

More information

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information

Lesson 13: MPLS Networks

Lesson 13: MPLS Networks Slide supporting material Lesson 13: MPLS Networks Giovanni Giambene Queuing Theor and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved IP Over ATM Once defined IP

More information

Supporting Differentiated QoS in MPLS Networks

Supporting Differentiated QoS in MPLS Networks Supporting Differentiated QoS in MPLS Networks Roberto A. Dias 1, Eduardo Camponogara 2, and Jean-Marie Farines 2 1 Federal Technology Center of Santa Catarina, Florianópolis, 88020-300, Brazil 2 Federal

More information

Chapter 15: Dynamic Programming

Chapter 15: Dynamic Programming Chapter 15: Dynamic Programming Dynamic programming is a general approach to making a sequence of interrelated decisions in an optimum way. While we can describe the general characteristics, the details

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

Operational Cost Factor Consideration of Path Management Method for MPLS Networks

Operational Cost Factor Consideration of Path Management Method for MPLS Networks Operational Cost Factor Consideration of Path Management Method for MPLS Networks Motoi Iwashita, and Masayuki Tsujino Abstract The recent improvements in broadband networks are enabling network carriers

More information

SDH and WDM: a look at the physical layer

SDH and WDM: a look at the physical layer SDH and WDM: a look at the physical SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

ASON for Optical Networks

ASON for Optical Networks 1/287 01-FGC1010609 Rev B ASON for Optical Networks Ericsson Control Plane for DWDM Optically Switched Networks ASON for MHL3000 Introduction The growing demand for multiple service is changing the network

More information

4.6 Linear Programming duality

4.6 Linear Programming duality 4.6 Linear Programming duality To any minimization (maximization) LP we can associate a closely related maximization (minimization) LP. Different spaces and objective functions but in general same optimal

More information

B4: Experience with a Globally-Deployed Software Defined WAN TO APPEAR IN SIGCOMM 13

B4: Experience with a Globally-Deployed Software Defined WAN TO APPEAR IN SIGCOMM 13 B4: Experience with a Globally-Deployed Software Defined WAN TO APPEAR IN SIGCOMM 13 Google s Software Defined WAN Traditional WAN Routing Treat all bits the same 30% ~ 40% average utilization Cost of

More information

QoS Strategy in DiffServ aware MPLS environment

QoS Strategy in DiffServ aware MPLS environment QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,

More information

Network management and QoS provisioning - QoS in the Internet

Network management and QoS provisioning - QoS in the Internet QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets

More information

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26 Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next

More information

SDH and WDM A look at the physical layer

SDH and WDM A look at the physical layer SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Copyright This

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq

More information

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies

More information

Practical Guide to the Simplex Method of Linear Programming

Practical Guide to the Simplex Method of Linear Programming Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear

More information

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004 Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February

More information

(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.

(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004. (MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised:

More information

Chapter 10: Network Flow Programming

Chapter 10: Network Flow Programming Chapter 10: Network Flow Programming Linear programming, that amazingly useful technique, is about to resurface: many network problems are actually just special forms of linear programs! This includes,

More information

Enhanced Variable Splitting Ratio Algorithm for Effective Load Balancing in MPLS Networks

Enhanced Variable Splitting Ratio Algorithm for Effective Load Balancing in MPLS Networks Journal of Computer Science 4 (3): 232-238, 2008 ISSN 1549-3636 2008 Science Publications Enhanced Variable Splitting Ratio Algorithm for Effective Load Balancing in MPLS Networks 1 G. Murugesan, 2 A.M.

More information

Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro

Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro Copyright Virgil Dobrota 2007-2008, All rights reserved 1 Course 12 - Outline 46. NGN Next Generation

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

PATH SELECTION AND BANDWIDTH ALLOCATION IN MPLS NETWORKS

PATH SELECTION AND BANDWIDTH ALLOCATION IN MPLS NETWORKS PATH SELECTION AND BANDWIDTH ALLOCATION IN MPLS NETWORKS James E Burns and Teunis J Ott Telcordia Technologies Inc, 445 South Street, Morristown NJ 07960-6438, USA Anthony E Krzesinski and Karen E Müller

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Guaranteed QoS Routing Scheme in MPLS -Wireless Access Networks

Guaranteed QoS Routing Scheme in MPLS -Wireless Access Networks JKAU: Comp. IT, Vol. 2, pp: 45-56 (2013 A.D./ 1435 A.H.) DOI: 10.4197 / Comp. 2-3 Guaranteed QoS Routing Scheme in MPLS -Wireless Access Networks Jeddah University, Alkamil Branch, Alkamil, Saudi Arabia

More information

LOAD BALANCING IN WDM NETWORKS THROUGH DYNAMIC ROUTE CHANGES

LOAD BALANCING IN WDM NETWORKS THROUGH DYNAMIC ROUTE CHANGES LOAD BALANCING IN WDM NETWORKS THROUGH DYNAMIC ROUTE CHANGES S.Ramanathan 1, G.Karthik 1, Ms.G.Sumathi 2 1 Dept. of computer science Sri Venkateswara College of engineering, Sriperumbudur, 602 105. 2 Asst.professor,

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: suvarna_jadhav@rediffmail.com

More information

I. ADDITIONAL EVALUATION RESULTS. A. Environment

I. ADDITIONAL EVALUATION RESULTS. A. Environment 1 A. Environment I. ADDITIONAL EVALUATION RESULTS The tests have been performed in a virtualized environment with Mininet 1.0.0 [?]. Mininet is tool to create a virtual network running actual kernel, switch

More information

Social Media Mining. Graph Essentials

Social Media Mining. Graph Essentials Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

More information

An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks

An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks Arunkumar C K M.Tech student, Dept. of ECE, Dayananda Sagar College of Engineering, VTU, Banglore, India ABSTRACT: Increasing demand

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Minimizing costs for transport buyers using integer programming and column generation. Eser Esirgen

Minimizing costs for transport buyers using integer programming and column generation. Eser Esirgen MASTER STHESIS Minimizing costs for transport buyers using integer programming and column generation Eser Esirgen DepartmentofMathematicalSciences CHALMERS UNIVERSITY OF TECHNOLOGY UNIVERSITY OF GOTHENBURG

More information

Strategic planning in LTL logistics increasing the capacity utilization of trucks

Strategic planning in LTL logistics increasing the capacity utilization of trucks Strategic planning in LTL logistics increasing the capacity utilization of trucks J. Fabian Meier 1,2 Institute of Transport Logistics TU Dortmund, Germany Uwe Clausen 3 Fraunhofer Institute for Material

More information

Circuits 1 M H Miller

Circuits 1 M H Miller Introduction to Graph Theory Introduction These notes are primarily a digression to provide general background remarks. The subject is an efficient procedure for the determination of voltages and currents

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Lecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method

Lecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method Lecture 3 3B1B Optimization Michaelmas 2015 A. Zisserman Linear Programming Extreme solutions Simplex method Interior point method Integer programming and relaxation The Optimization Tree Linear Programming

More information

Recovery of primal solutions from dual subgradient methods for mixed binary linear programming; a branch-and-bound approach

Recovery of primal solutions from dual subgradient methods for mixed binary linear programming; a branch-and-bound approach MASTER S THESIS Recovery of primal solutions from dual subgradient methods for mixed binary linear programming; a branch-and-bound approach PAULINE ALDENVIK MIRJAM SCHIERSCHER Department of Mathematical

More information

TRAFFIC ENGINEERING AND PATH PROTECTION IN MPLS VIRTUAL PRIVATE NETWORKS

TRAFFIC ENGINEERING AND PATH PROTECTION IN MPLS VIRTUAL PRIVATE NETWORKS TRAFFIC ENGINEERING AND PATH PROTECTION IN MPLS VIRTUAL PRIVATE NETWORKS AThesis Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment

More information

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1 System Interconnect Architectures CSCI 8150 Advanced Computer Architecture Hwang, Chapter 2 Program and Network Properties 2.4 System Interconnect Architectures Direct networks for static connections Indirect

More information

Enterprise Network Simulation Using MPLS- BGP

Enterprise Network Simulation Using MPLS- BGP Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,

More information