83 research outputs found
Optimal routing on complex networks
We present a novel heuristic algorithm for routing optimization on complex
networks. Previously proposed routing optimization algorithms aim at avoiding
or reducing link overload. Our algorithm balances traffic on a network by
minimizing the maximum node betweenness with as little path lengthening as
possible, thus being useful in cases when networks are jamming due to queuing
overload. By using the resulting routing table, a network can sustain
significantly higher traffic without jamming than in the case of traditional
shortest path routing.Comment: 4 pages, 5 figure
The Large Scale Curvature of Networks
Understanding key structural properties of large scale networks are crucial
for analyzing and optimizing their performance, and improving their reliability
and security. Here we show that these networks possess a previously unnoticed
feature, global curvature, which we argue has a major impact on core
congestion: the load at the core of a network with N nodes scales as N^2 as
compared to N^1.5 for a flat network. We substantiate this claim through
analysis of a collection of real data networks across the globe as measured and
documented by previous researchers.Comment: 4 pages, 5 figure
Network-wide Configuration Synthesis
Computer networks are hard to manage. Given a set of high-level requirements
(e.g., reachability, security), operators have to manually figure out the
individual configuration of potentially hundreds of devices running complex
distributed protocols so that they, collectively, compute a compatible
forwarding state. Not surprisingly, operators often make mistakes which lead to
downtimes. To address this problem, we present a novel synthesis approach that
automatically computes correct network configurations that comply with the
operator's requirements. We capture the behavior of existing routers along with
the distributed protocols they run in stratified Datalog. Our key insight is to
reduce the problem of finding correct input configurations to the task of
synthesizing inputs for a stratified Datalog program. To solve this synthesis
task, we introduce a new algorithm that synthesizes inputs for stratified
Datalog programs. This algorithm is applicable beyond the domain of networks.
We leverage our synthesis algorithm to construct the first network-wide
configuration synthesis system, called SyNET, that support multiple interacting
routing protocols (OSPF and BGP) and static routes. We show that our system is
practical and can infer correct input configurations, in a reasonable amount
time, for networks of realistic size (> 50 routers) that forward packets for
multiple traffic classes.Comment: 24 Pages, short version published in CAV 201
High Availability in the Future Internet
With the evolution of the Internet, a huge number of real-
time applications, like Voice over IP, has started to use IP as primary
transmission medium. These services require high availability, which is not
amongst the main features of today’s heterogeneous Internet where fail-
ures occur frequently. Unfortunately, the primary fast resilience scheme
implemented in IP routers, Loop-Free Alternates (LFA), usually does not
provide full protection against failures. Consequently, there has been a
growing interest in LFA-based network optimization methods, aimed at
tuning some aspect of the underlying IP topology to maximize the ratio
of failure cases covered by LFA. The main goal of this chapter is to give a
comprehensive overview of LFA and survey the related LFA network op-
timization methods, pointing out that these optimization tools can turn
LFA into an easy-to-deploy yet highly effective IP fast resilience scheme
Enhancing security and dependability of industrial networks with opinion dynamics
Opinion Dynamics poses a novel technique to accurately locate the patterns of an advanced attack against an industrial infrastructure, compared to traditional intrusion detection systems. This distributed solution provides pro table information to identify the most a ected areas within the network, which can be leveraged to design and deploy tailored response mechanisms that ensure the continuity of the service. In this work, we base on this multi-agent collaborative approach to propose a response technique that permits the secure delivery of messages across the network. For such goal, our contribution is twofold: rstly, we rede ne the existing algorithm to assess not only the compromise of nodes, but also the security and quality of service of communication links; secondly, we develop a routing protocol that prioritizes the secure paths throughout
the topology considering the information obtained from the detection system.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tec
Operational Research: methods and applications
This is the final version. Available on open access from Taylor & Francis via the DOI in this recordThroughout its history, Operational Research has evolved to include methods, models and algorithms that have been applied to a wide range of contexts. This encyclopedic article consists of two main sections: methods and applications. The first summarises the up-to-date knowledge and provides an overview of the state-of-the-art methods and key developments in the various subdomains of the field. The second offers a wide-ranging list of areas where Operational Research has been applied. The article is meant to be read in a nonlinear fashion and used as a point of reference by a diverse pool of readers: academics, researchers, students, and practitioners. The entries within the methods and applications sections are presented in alphabetical order. The authors dedicate this paper to the 2023 Turkey/Syria earthquake victims. We sincerely hope that advances in OR will play a role towards minimising the pain and suffering caused by this and future catastrophes
- …