395 research outputs found

    Analysis and optimization of highly reliable systems

    Get PDF
    In the field of network design, the survivability property enables the network to maintain a certain level of network connectivity and quality of service under failure conditions. In this thesis, survivability aspects of communication systems are studied. Aspects of reliability and vulnerability of network design are also addressed. The contributions are three-fold. First, a Hop Constrained node Survivable Network Design Problem (HCSNDP) with optional (Steiner) nodes is modelled. This kind of problems are N P-Hard. An exact integer linear model is built, focused on networks represented by graphs without rooted demands, considering costs in arcs and in Steiner nodes. In addition to the exact model, the calculation of lower and upper bounds to the optimal solution is included. Models were tested over several graphs and instances, in order to validate it in cases with known solution. An Approximation Algorithm is also developed in order to address a particular case of SNDP: the Two Node Survivable Star Problem (2NCSP) with optional nodes. This problem belongs to the class of N P-Hard computational problems too. Second, the research is focused on cascading failures and target/random attacks. The Graph Fragmentation Problem (GFP) is the result of a worst case analysis of a random attack. A fixed number of individuals for protection can be chosen, and a non-protected target node immediately destroys all reachable nodes. The goal is to minimize the expected number of destroyed nodes in the network. This problem belongs to the N P-Hard class. A mathematical programming formulation is introduced and exact resolution for small instances as well as lower and upper bounds to the optimal solution. In addition to exact methods, we address the GFP by several approaches: metaheuristics, approximation algorithms, polytime methods for specific instances and exact methods in exponential time. Finally, the concept of separability in stochastic binary systems is here introduced. Stochastic Binary Systems (SBS) represent a mathematical model of a multi-component on-off system subject to independent failures. The reliability evaluation of an SBS belongs to the N P-Hard class. Therefore, we fully characterize separable systems using Han-Banach separation theorem for convex sets. Using this new concept of separable systems and Markov inequality, reliability bounds are provided for arbitrary SBS

    Design and operation of mesh-restorable WDM networks

    Get PDF
    The explosive growth of Web-related services over the Internet is bringing millions of new users online, thus creating a growing demand for bandwidth. Wavelength Division Multiplexed (WDM) networks, employing wavelength routing has emerged as the dominant technology to satisfy this growing demand for bandwidth. As the amount of traffic carried is larger, any single failure can be catastrophic. Survivability becomes indispensable in such networks. Therefore, it is imperative to design networks that can quickly and efficiently recover from failures.;In this dissertation, we explore the design and operation of survivable optical networks. We study several survivability paradigms for surviving single link failures. A restoration model is developed based on a combination of these paradigms. We propose an optimal design and upgrade scheme for WDM backbone networks. We formulate an integer programming-based design problem to minimize the total facility cost. This framework provides a cost effective way of upgrading the network by identifying how much resources to budget at each stage of network evolution. This results in significant cost reductions for the network service provider.;As part of network operation, we capture multiple operational phases in survivable network operation as a single integer programming formulation. This common framework incorporates service disruption and includes a service differentiation model based on lightpath protection. However, the complexity of the optimization problem makes the formulation applicable only for network provisioning and o2ine reconfiguration. The direct use of such methods for online reconfiguration remains limited to small networks with few tens of wavelengths. We develop a heuristic algorithm based on LP relaxation technique for fast, near optimal, online reconfiguration. Since the ILP variables are relaxed, we provide a way to derive a feasible solution from the relaxed problem. Most of the current approaches assume centralized information. They do not scale well as they rely on per-flow information. This motivates the need for developing dynamic algorithms based on partial information. The partial information we use can be easily obtained from traffic engineering extensions to routing protocols. Finally, the performance of partial information routing algorithms is compared through simulation studies

    Heuristic for the design of fault tolerant logical topology.

    Get PDF
    Wavelength division multiplexing (WDM) in optical fiber networks is widely viewed as the savior for its potential to satisfy the huge bandwidth requirement of network users. Optical cross connect (OCX) in WDM network facilitates the switching of signal on any wavelength from any input port to any output port. As a result, it is possible to establish ligthpaths between any pair of nodes. The set of lightpaths established over fiber links defines logical topology. In our thesis, we proposed a heuristic approach for the design of fault tolerant logical topology. Our design approach generalizes the design protection concept and enforces wavelength continuity constraint in a multi-hop optical network. In our work, we first designed logical topology for fault free state of the network. We, then, added additional lightpaths for each single link failure scenario. Numerical results clearly show that our approach outperforms Shared path protection and Dedicated path protection. Our simulation result shows that our approach is feasible for large networks. (Abstract shortened by UMI.) Paper copy at Leddy Library: Theses & Major Papers - Basement, West Bldg. / Call Number: Thesis2005 .S24. Source: Masters Abstracts International, Volume: 44-03, page: 1413. Thesis (M.Sc.)--University of Windsor (Canada), 2005

    Network coding-based survivability techniques for multi-hop wireless networks

    Get PDF
    Multi-hop Wireless Networks (MWN) have drawn a lot of attention in the last decade, and will continue to be a hot and active research area in the future also. MWNs are attractive because they require much less effort to install and operate (compared to wired networks), and provide the network users with the flexibility and convenience they need. However, with these advantages comes a lot of challenges. In this work, we focus on one important challenge, namely, network survivability or the network ability to sustain failures and recover from service interruption in a timely manner. Survivability mechanisms can be divided into two main categories; Protection and restoration mechanisms. Protection is usually favored over restoration because it usually provides faster recovery. However, the problem with traditional protection schemes is that they are very demanding and consume a lot of network resources. Actually, at least 50% of the used resources in a communication session are wasted in order to provide the destination with redundant information, which can be made use of only when a network failure or information loss occurs. To overcome this problem and to make protection more feasible, we need to reduce the used network resources to provide proactive protection without compromising the recovery speed. To achieve this goal, we propose to use network coding. Basically, network coding allows intermediate network nodes to combine data packets instead of just forwarding them as is, which leads to minimizing the consumed network resources used for protection purposes. In this work we give special attention to the survivability of many-to-one wireless flows, where a set of N sources are sending data units to a common destination T. Examples of such many-to-one flows are found in Wireless Mesh Networks (WMNs) or Wireless Sensor Networks (WSNs). We present two techniques to provide proactive protection to the information flow in such communication networks. First, we present a centralized approach, for which we derive and prove the sufficient and necessary conditions that allows us to protect the many-to-one information flow against a single link failure using only one additional path. We provide a detailed study of this technique, which covers extensions for more general cases, complexity analysis that proves the NP-completeness of the problem for networks with limited min-cuts, and finally performance evaluation which shows that in the worst case our coding-based protection scheme can reduce the useful information rate by 50% (i.e., will be equivalent to traditional protection schemes). Next, we study the implementation of the previous approach when all network nodes have single transceivers. In this part of our work we first present a greedy scheduling algorithm for the sources transmissions based on digital network coding, and then we show how analog network coding can further enhance the performance of the scheduling algorithm. Our second protection scheme uses deterministic binary network coding in a distributed manner to enhance the resiliency of the Sensors-to-Base information flow against packet loss. We study the coding efficiency issue and introduce the idea of relative indexing to reduce the coding coefficients overhead. Moreover, we show through a simulation study that our approach is highly scalable and performs better as the network size and/or number of sources increases. The final part of this work deals with unicast communication sessions, where a single source node S is transmitting data to a single destination node T through multiple hops. We present a different way to handle the survivability vs. bandwidth tradeoff, where we show how to enhance the survivability of the S-T information flow without reducing the maximum achievable S-T information rate. The basic idea is not to protect the bottleneck links in the network, but to try to protect all other links if possible. We divide this problem into two problems: 1) pre-cut protection, which we prove it to be NP-hard, and thus, we present an ILP and a heuristic approach to solve it, and 2) post-cut protection, where we prove that all the data units that are not delivered to T directly after the min-cut can be protected against a single link failure. Using network coding in this problem allows us to maximize the number of protected data units before and after the min-cut

    Optimization Methods for Optical Long-Haul and Access Networks

    Get PDF
    Optical communications based on fiber optics and the associated technologies have seen remarkable progress over the past two decades. Widespread deployment of optical fiber has been witnessed in backbone and metro networks as well as access segments connecting to customer premises and homes. Designing and developing a reliable, robust and efficient end-to-end optical communication system have thus emerged as topics of utmost importance both to researchers and network operators. To fulfill these requirements, various problems have surfaced and received attention, such as network planning, capacity placement, traffic grooming, traffic scheduling, and bandwidth allocation. The optimal network design aims at addressing (one or more of) these problems based on some optimization objectives. In this thesis, we consider two of the most important problems in optical networks; namely the survivability in optical long-haul networks and the problem of bandwidth allocation and scheduling in optical access networks. For the former, we present efficient and accurate models for availability-aware design and service provisioning in p-cycle based survivable networks. We also derive optimization models for survivable network design based on p-trail, a more general protection structure, and compare its performance with p-cycles. Indeed, major cost savings can be obtained when the optical access and long-haul subnetworks become closer to each other by means of consolidation of access and metro networks. As this distance between long-haul and access networks reduces, and the need and expectations from passive optical access networks (PONs) soar, it becomes crucial to efficiently manage bandwidth in the access while providing the desired level of service availability in the long-haul backbone. We therefore address in this thesis the problem of bandwidth management and scheduling in passive optical networks; we design efficient joint and non-joint scheduling and bandwidth allocation methods for multichannel PON as well as next generation 10Gbps Ethernet PON (10G-EPON) while addressing the problem of coexistence between 10G-EPONs and multichannel PONs

    Coded based protection in mesh networks

    Get PDF
    Since the Internet revolution of the 1990s; ever increasing levels of connectivity have been integrated into society. This has ushered in the era of globalization and a new plateau in prosperity. Credit for this accomplishment can be placed firmly on our communication networks. However, our incorporation of telecommunications into society has led to a dependency on it. Our escalating reliance on telecommunications has made society highly susceptible to fault occurrences. Consequently, the field of network survivability is required to maintain reliability in our telecommunications infrastructure. Mesh networks have been touted as the successor to the ring based networks of the past due to their efficiency and scalability. Unfortunately, mesh networks owing to their complexity have not been able to obtain restoration times comparable to its predecessor. This issue has led to a polarization of survivability schemes, where restoration time is pitted against redundancy requirements. In order to mitigate this problem; network coding based survivability algorithms are being proposed. Network coded based protection uses coding theory to linearly combine disjoint connections. This permits restoration times comparable to dedicated mesh schemes while having significantly less redundancy requirements. We propose three schemes of coded survivability known as Source Coded Protection, Multiple Source Coded Protection, and Network Coded Protection. From these three schemes, eight novel heuristic algorithms have been created

    Optimización metaheurística para la planificación de redes WDM

    Get PDF
    Las implementaciones actuales de las redes de telecomunicaciones no permiten soportar el incremento en la demanda de ancho de banda producido por el crecimiento del tráfico de datos en las últimas décadas. La aparición de la fibra óptica y el desarrollo de la tecnología de multiplexación por división de longitudes de onda (WDM) permite incrementar la capacidad de redes de telecomunicaciones existentes mientras se minimizan costes. En este trabajo se planifican redes ópticas WDM mediante la resolución de los problemas de Provisión y Conducción en redes WDM (Provisioning and Routing Problem) y de Supervivencia (Survivability Problem). El Problema de Conducción y Provisión consiste en incrementar a mínimo coste la capacidad de una red existente de tal forma que se satisfaga un conjunto de requerimientos de demanda. El problema de supervivencia consiste en garantizar el flujo del tráfico a través de una red en caso de fallo de alguno de los elementos de la misma. Además se resuelve el Problema de Provisión y Conducción en redes WDM con incertidumbre en las demandas. Para estos problemas se proponen modelos de programación lineal entera. Las metaheurísticas proporcionan un medio para resolver problemas de optimización complejos, como los que surgen al planificar redes de telecomunicaciones, obteniendo soluciones de alta calidad en un tiempo computacional razonable. Las metaheurísticas son estrategias que guían y modifican otras heurísticas para obtener soluciones más allá de las generadas usualmente en la búsqueda de optimalidad local. No garantizan que la mejor solución encontrada, cuando se satisfacen los criterios de parada, sea una solución óptima global del problema. Sin embargo, la experimentación de implementaciones metaheurísticas muestra que las estrategias de búsqueda embebidas en tales procedimientos son capaces de encontrar soluciones de alta calidad a problemas difíciles en industria, negocios y ciencia. Para la solución del problema de Provisión y Conducción en Redes WDM, se desarrolla un algoritmo metaheurístico híbrido que combina principalmente ideas de las metaheurísticas Búsqueda Dispersa (Scatter Search) y Búsqueda Mutiarranque (Multistart). Además añade una componente tabú en uno de los procedimiento del algoritmo. Se utiliza el modelo de programación lineal entera propuesto por otros autores y se propone un modelo de programación lineal entera alternativo que proporciona cotas superiores al problema, pero incluye un menor número de variables y restricciones, pudiendo ser resuelto de forma óptima para tamaños de red mayores. Los resultados obtenidos por el algoritmo metaheurístico diseñado se comparan con los obtenidos por un procedimiento basado en permutaciones de las demandas propuesto anteriormente por otros autores, y con los dos modelos de programación lineal entera usados. Se propone modelos de programación lineal entera para sobrevivir la red en caso de fallos en un único enlace. Se proponen modelos para los esquemas de protección de enlace compartido, de camino compartido con enlaces disjuntos, y de camino compartido sin enlaces disjuntos. Se propone un método de resolución metaheurístico que obtiene mejores costes globales que al resolver el problema en dos fases, es decir, al resolver el problema de servicio y a continuación el de supervivencia. Se proponen además modelos de programación entera para resolver el problema de provisión en redes WDM con incertidumbres en las demandas

    Survivability aspects of future optical backbone networks

    Get PDF
    In huidige glasvezelnetwerken kan een enkele vezel een gigantische hoeveelheid data dragen, ruwweg het equivalent van 25 miljoen gelijktijdige telefoongesprekken. Hierdoor zullen netwerkstoringen, zoals breuken van een glasvezelkabel, de communicatie van een groot aantal eindgebruikers verstoren. Netwerkoperatoren kiezen er dan ook voor om hun netwerk zo te bouwen dat zulke grote storingen automatisch opgevangen worden. Dit proefschrift spitst zich toe op twee aspecten rond de overleefbaarheid in toekomstige optische netwerken. De eerste doelstelling die beoogd wordt is het tot stand brengen vanrobuuste dataverbindingen over meerdere netwerken. Door voldoende betrouwbare verbindingen tot stand te brengen over een infrastructuur die niet door een enkele entiteit wordt beheerd kan men bv. weredwijd Internettelevisie van hoge kwaliteit aanbieden. De bestudeerde oplossing heeft niet enkel tot doel om deze zeer betrouwbare verbinding te berekenen, maar ook om dit te bewerkstelligen met een minimum aan gebruikte netwerkcapaciteit. De tweede doelstelling was om een antwoord te formuleren om de vraag hoe het toepassen van optische schakelsystemen gebaseerd op herconfigureerbare optische multiplexers een impact heeft op de overleefbaarheid van een optisch netwerk. Bij lagere volumes hebben optisch geschakelde netwerken weinig voordeel van dergelijke gesofistikeerde methoden. Elektronisch geschakelde netwerken vertonen geen afhankelijkheid van het datavolume en hebben altijd baat bij optimalisatie
    corecore