708 research outputs found

    The minimum cost network upgrade problem with maximum robustness to multiple node failures

    Get PDF
    The design of networks which are robust to multiple failures is gaining increasing attention in areas such as telecommunications. In this paper, we consider the problem of upgrading an existent network in order to enhance its robustness to events involving multiple node failures. This problem is modeled as a bi-objective mixed linear integer formulation considering both the minimization of the cost of the added edges and the maximization of the robustness of the resulting upgraded network. As the robustness metric of the network, we consider the value of the Critical Node Detection (CND) problem variant which provides the minimum pairwise connectivity between all node pairs when a set of c critical nodes are removed from the network. We present a general iterative framework to obtain the complete Pareto frontier that alternates between the minimum cost edge selection problem and the CND problem. Two different approaches based on a cover model are introduced for the edge selection problem. Computational results conducted on different network topologies show that the proposed methodology based on the cover model is effective in computing Pareto solutions for graphs with up to 100 nodes, which includes four commonly used telecommunication networks.publishe

    RMSA algorithms resilient to multiple node failures in dynamic EONs

    Get PDF
    In Elastic Optical Networks (EONs), the way different service demands are supported in the network is ruled by the Routing, Modulation and Spectrum Assignment (RMSA) algorithm, which decides how the spectrum resources of the optical network are assigned to each service demand. In a dynamic EON, demand requests arrive randomly one at a time and the accepted demands last in the network for a random time duration. So, one important goal of the RMSA algorithm is the efficient use of the spectrum resources to maximize the acceptance probability of future demand requests. On the other hand, multiple failure events are becoming a concern to network operators as such events are becoming more frequent in time. In this work, we consider the case of multiple node failure events caused by malicious attacks against network nodes. In order to obtain RMSA algorithms resilient to such events, a path disaster availability metric was recently proposed which takes into account the probability of each path not being disrupted by an attack. This metric was proposed in the offline variant of the RMSA problem where all demands are assumed to be known at the beginning. Here, we exploit the use of the path disaster availability metric in the RMSA of dynamic EONs. In particular, we propose RMSA algorithms combining the path disaster availability metric with spectrum usage metrics in a dynamic way based on the network load level. The aim is that the efficient use of the resources is relaxed for improved resilience to multiple node failures when the EON is lightly loaded, while it becomes the most important goal when the EON becomes heavily loaded. We present simulation results considering a mix of unicast and anycast services in 3 well-known topologies. The results show that the RMSA algorithms combining the path disaster availability metric with spectrum usage metrics are the best trade-off between spectrum usage efficiency and resilience to multiple node failures.publishe

    Minimization of the network availability upgrade cost with geodiverse routing for disaster resilience

    Get PDF
    Telecommunication networks are a critical infrastructure of our society. Wide area backbone communication networks are based on optical networks, where each fiber has a very large capacity. These networks must offer high end-to-end availability and a high resilience to large-scale disasters. Routing with geodiversity can mitigate the impact of disasters but will result in longer paths, making it difficult to achieve the availability levels required by critical services. In this paper, we consider a given core optical network such that the current availability and the cost of upgrading it to a higher value are known for each network link (or edge). Then, the problem of selecting a set of edges to be upgraded at a minimum cost, while guaranteeing desired values of end-to-end availability and geodiversity, is considered and formulated as an arc based integer non-linear programming model. The non-linear constraints of the model are approximated and linearized, resulting in a new ILP based heuristic. A filtering procedure is proposed for decreasing (if possible) the cost and the number of upgraded edges of the solutions obtained by previously proposed greedy heuristics and also by the ILP based heuristic. The relative performance of the heuristics is evaluated using different geodiverse distances and end-to-end availability values in two reference core optical networks.publishe

    Reconfigurable remote nodes for hybrid passive optical networks

    Get PDF
    Mestrado em Engenharia ElectrĂłnica e TelecomunicaçÔesO presente documento tem por objectivo demonstrar, analisar e optimizar nĂłs remotos passivos para redes Ăłpticas passivas baseadas numa topologia de anel de dupla fibra com multiplexagem no comprimento de onda onde estĂŁo penduradas ĂĄrvores mono fibra baseadas na multiplexagem no tempo. A rede ‘Scalable Advanced Ring-based passive Dense Access Network Architecture’ (SARDANA) baseada nesta topologia Ă© apresentada e demonstrada. Na rede SARDANA a interligação entre o anel e as ĂĄrvores Ă© realizada pelo intermĂ©dio de um nĂł especial denominado de nĂł remoto. Esse nĂł remoto Ă© um elemento fundamental para o funcionamento, resiliĂȘncia e escalabilidade da rede. Neste documento sĂŁo apresentadas e comparadas diferentes topologias para a implementação desse nĂł remoto. É tambĂ©m apresentada a reconfigurabilidade remota desses mesmos nĂłs remotos atravĂ©s de mĂłdulos de conversĂŁo energĂ©tica e controlo, implementada nos nĂłs remotos. Um factor importante para a optimização dos nĂłs remotos Ă© a amplificação remota realizada por intermĂ©dio de fibras dopadas de Ă©rbio pelo que o seu estudo Ă© tambĂ©m apresentado. Finalmente Ă© demonstrado um protĂłtipo de um nĂł remotamente reconfigurado e eficiente. ABSTRACT: The objective of this document is to demonstrate, analyze and optimize remote nodes for passive optical networks based on double fiber ring multiplexed in wavelength connected to single fiber trees multiplexed in time. The network ‘Scalable Advanced Ring-based passive Dense Access Network Architecture’ (SARDANA) based on this topology is presented and demonstrated. In the SARDANA network the interconnection between the ring and the trees is done by means of a special node, the remote node. This node is a fundamental element to the operation, resiliency and scalability of the network. This document presents and compares different topologies to the implementation of the remote node. Remotely reconfigurability of the remote nodes is also demonstrated by means of optical conversion and control modules. An important factor to the optimization of the remote nodes is the remote amplification done by means of erbium doped fibers being presented the analysis of the amplifier. Finally is demonstrated a prototype of a node remotely reconfigured and efficient

    Advanced information processing system: The Army fault tolerant architecture conceptual study. Volume 1: Army fault tolerant architecture overview

    Get PDF
    Digital computing systems needed for Army programs such as the Computer-Aided Low Altitude Helicopter Flight Program and the Armored Systems Modernization (ASM) vehicles may be characterized by high computational throughput and input/output bandwidth, hard real-time response, high reliability and availability, and maintainability, testability, and producibility requirements. In addition, such a system should be affordable to produce, procure, maintain, and upgrade. To address these needs, the Army Fault Tolerant Architecture (AFTA) is being designed and constructed under a three-year program comprised of a conceptual study, detailed design and fabrication, and demonstration and validation phases. Described here are the results of the conceptual study phase of the AFTA development. Given here is an introduction to the AFTA program, its objectives, and key elements of its technical approach. A format is designed for representing mission requirements in a manner suitable for first order AFTA sizing and analysis, followed by a discussion of the current state of mission requirements acquisition for the targeted Army missions. An overview is given of AFTA's architectural theory of operation

    Moving target defense for securing smart grid communications: Architectural design, implementation and evaluation

    Get PDF
    Supervisory Control And Data Acquisition (SCADA) communications are often subjected to various kinds of sophisticated cyber-attacks which can have a serious impact on the Critical Infrastructure such as the power grid. Most of the time, the success of the attack is based on the static characteristics of the system, thereby enabling an easier profiling of the target system(s) by the adversary and consequently exploiting their limited resources. In this thesis, a novel approach to mitigate such static vulnerabilities is proposed by implementing a Moving Target Defense (MTD) strategy in a power grid SCADA environment, which leverages the existing communication network with an end-to-end IP Hopping technique among the trusted peer devices. This offers a proactive L3 layer network defense, minimizing IP-specific threats and thwarting worm propagation, APTs, etc., which utilize the cyber kill chain for attacking the system through the SCADA network. The main contribution of this thesis is to show how MTD concepts provide proactive defense against targeted cyber-attacks, and a dynamic attack surface to adversaries without compromising the availability of a SCADA system. Specifically, the thesis presents a brief overview of the different type of MTD designs, the proposed MTD architecture and its implementation with IP hopping technique over a Control Center–Substation network link along with a 3-way handshake protocol for synchronization on the Iowa State’s Power Cyber testbed. The thesis further investigates the delay and throughput characteristics of the entire system with and without the MTD to choose the best hopping rate for the given link. It also includes additional contributions for making the testbed scenarios more realistic to real world scenarios with multi-hop, multi-path WAN. Using that and studying a specific attack model, the thesis analyses the best ranges of IP address for different hopping rate and different number of interfaces. Finally, the thesis describes two case studies to explore and identify potential weaknesses of the proposed mechanism, and also experimentally validate the proposed mitigation alterations to resolve the discovered vulnerabilities. As part of future work, we plan to extend this work by optimizing the MTD algorithm to be more resilient by incorporating other techniques like network port mutation to further increase the attack complexity and cost
    • 

    corecore