scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A branch-and-cut algorithm for two-level survivable network design problems

TL;DR: This paper approaches the problem of designing a two-level network protected against single-edge failures by giving integer programming formulations and valid inequalities for the different versions of the problem, solving them using a branch-and-cut algorithm, and discussing computational results.
About: This article is published in Computers & Operations Research.The article was published on 2016-03-01 and is currently open access. It has received 16 citations till now. The article focuses on the topics: Backbone network & Network planning and design.

Summary (3 min read)

1. Introduction

  • The authors study several two-level network design problems with survivability requirements in both levels.
  • The lower level networks are called access networks and they connect the users to hubs.
  • There are also studies on two-level networks with survivability requirements on the backbone network.
  • They analyze worst-case performances of some heuristics for some special cases.

2. MIP models

  • Note that this is not a restrictive assumption as one can solve the problem for different root nodes if one has not been a priori fixed.
  • If an edge is used in the backbone network then, due to constraints (5) and (6), both endpoints should be hubs.
  • Finally, constraints (10) and (11) are variable restrictions.
  • In particular, to model the 2EC/ring and ring/ring design problems the authors add the degree constraints xðδðiÞÞr2 8 iAV : ð12Þ.
  • These constraints limit to at most two the degree of a node in an access network and, together with the connectivity constraints (8), force those networks to be rings.

3. Valid inequalities

  • This section presents several families of valid inequalities for the four variants of the 2-LSNDP.
  • The feasible set of this problem is a relaxation of the 2EC/2EC network design problem obtained by dropping the constraints related with xe variables.
  • The authors now present three new families of inequalities.
  • There are at least rðSÞ PiA Szii distinct hubs in set V⧹S that serve nodes in S. Hence, overall at least 2 rðSÞ PiA SziiþPmk ¼ 1 zðjk : SkÞ access edges cross the cut δðSÞ.□ ð21Þ to solve the hub location routing problem.

4. Branch-and-cut algorithm

  • The authors propose an exact branch-and-cut algorithm to solve the 2- LSNDP based on the MIP model strengthened with the valid inequalities presented in the previous section.
  • The branch-and-cut approach consists of a cutting plane technique embedded into a branch-and-bound framework.
  • The authors describe next the main features of the algorithm.

4.1. Initialization

  • To start the optimization the authors solve the linear program (LP) given by the constraints (2)–(6) and variable bounds.
  • To these inequalities, the authors add the degree inequalities (12) when the access networks are required to be rings, i.e., when the variant to solve is the 2EC/ring or the ring/ring.
  • Similarly, to solve the design problems with required ring structure in the backbone network (i.e., ring/ 2EC and ring/ring) the authors add constraints (13).
  • When the backbone network does not need to be a ring, the authors replace (13) by (7) with S¼ fig for all iAV in the initial LP.

4.2. Cutting plane phase

  • If the optimal solution of the LP relaxation is integer, the authors check whether it is a feasible solution for the 2-LSNDP by applying the separation routines for constraints (14), (7) and (8).
  • The cutting plane phase is performed only each 10 branch-and-cut nodes.
  • The left hand side of all these inequalities is the same and they do not involve variables related to the backbone network.
  • The authors refer to the variable values of the current fractional solution by ðxn; yn; znÞ.

4.2.1. Separation of inequalities (7)

  • To separate constraints (7) the authors use an exact and polynomial procedure presented in [20], and inspired by the known separation algorithm for the subtour elimination constraints for the travelling salesman problem.
  • The procedure consists of solving max-fow/min-cut problems on an appropriately defined support graph.
  • Next the authors determine a min-cut set S V 0 with iAS and 0=2S, and finally they check the violation of inequality (7) for that set.

4.2.3. Separation of inequalities (14)

  • Inequalities (14) can be separated in polynomial time.
  • If the inequality for this choice of S is not violated, then there exists no violated inequality (14) for edge fi; jg.

4.2.4. Separation of inequalities (15)

  • Constraints (15) are heuristically separated using a procedure presented in [11] that works as follows.
  • The authors look for sets of nodes fv1;…; vpg that determine odd cycles in G0.
  • The set F is formed by taking an odd number of edges from δðV0Þ with fractional values yne41=2.
  • Then, the corresponding inequality is checked for violation.

4.2.5. Separation of inequalities (16)

  • The bridge inequalities (16) can be separated exactly in polynomial time with the following algorithm.
  • If the capacity of this cut is less than 2yne , the corresponding inequality (16) is violated.
  • Therefore the authors use the following strategy to reduce the number of min-cut computations.
  • Note that, with these changes, the separation procedure for inequalities (16) becomes heuristic.

4.2.6. Separation of inequalities (18)

  • The capacity of the edges in E0 is set to the positive value considered for their definition.
  • Therefore, again the separation problem can be solved exactly by performing a min-cut computation for each pair of nodes.

4.2.7. Separation of inequalities (22)

  • To separate constraints (22) the authors use a heuristic procedure based on the separation algorithm for (20) described in [27].
  • The edges in E0 are the edges in E, with capacity xne ; the edges connecting s with each iAV , with capacity 2ðznjiþ1=qÞ; and the edges connecting each iAV with t, with capacity 2znii.

4.2.8. Separation of inequalities (24)

  • This section describes a heuristic separation for (24) based on an exact and polynomial-time separation for a closely related family of inequalities.
  • These inequalities are the ones obtained by not considering the rounding up operator in (24), i.e. yðEðSÞÞþyðδðSÞÞþxðδðSÞÞZ.
  • This separation algorithm can be adapted to deal with other inequalities (23) with m¼1, like for example when r(S) is defined as in (21).

4.3. Branching strategy

  • The branching strategy the authors devised prioritizes the set of variables zjj.
  • This is done because fixing the set of hubs contributes to determine other features of the solution.
  • Branching on the other variables is done only when all variables zjj are integral.

5. Computational results

  • The authors used CPLEX 12.5 as mixed integer linear programming solver.
  • For a given number of nodes n and fix hub cost setting f j, the hardest instances are those with tighter capacity.
  • To assess the influence of the different sets of valid inequalities proposed in this work, the authors compare four versions of the branchand-cut algorithm that differ by the sets of valid inequalities considered.
  • The addition of constraints (18) reduces the gaps and the running times, this being more evident for Class II instances.
  • This happens because the violation of constraints (17) is checked inside the separation routines for (8) and (18), and the authors are certain to find a violated constraint of the first type when any of the two latter is violated.

6. Conclusions

  • This paper addresses a two-level survivable network design problem in which location, assignment, and network design tasks are jointly tackled.
  • The authors present an integer programming formulation and valid inequalities for the problem.
  • This formulation models, with minor modifications, the four possible combinations of the two singleedge protected topologies considered (rings and two-edge connected networks).
  • The authors have designed an exact branch- and-cut algorithm and they have tested its performance on two sets of instances with different degree of difficulty.
  • The results are satisfactory since they show that instances with up to 40 nodes, which is already a large size for this kind of problems, are solved to optimality in a reasonable amount of time.

Did you find this useful? Give us your feedback

Citations
More filters
Dissertation
29 Nov 2018
TL;DR: This dissertation proposes a suitable reliability evaluation algorithm for a type of non series-parallel network system which includes the DMS and which can be used in an optimization model and proposes a new heuristic for the D MS problem with redundancy and reliability.
Abstract: Reliability and redundancy of safety-critical network systems is a paramount issue in system engineering. Be it in evaluating existing network systems or solving optimization problems for designing network systems, it is important to consider reliability and redundancy. This dissertation is in collaboration with AIRBUS Group, France, and they are very interest in the optimal design of safety-critical aircraft architecture systems which have to consider reliability and redundancy. To address the problem of optimally designing such systems, we chose to focus on one specific aircraft architecture system the door management system. It checks if all doors are properly closed and the cabin has the correct pressure. It is a safety-critical system since it is part of the pressurization system of an aircraft. To optimally design the DMS while considering reliability, a suitable reliability evaluation algorithm is necessary. In this dissertation, we begin by proposing a suitable reliability evaluation algorithm for a type of non series-parallel network system which includes the DMS and which can be used in an optimization model. The reliability evaluation algorithm is based on a simplification of the probability principle of inclusion-exclusion formula for intersections of unions. The simplification exploits the presence of many repeated events and has many fewer terms, which significantly reduces the number of operations needed. We compare its computational efficiency against the sum of disjoint products method KDH88 for a simple artificial example and for the DMS. Afterwards, we introduce the first MILP model for the DMS with k-redundancy. As the model is too difficult to be solved efficiently by standard MILP solvers, we discuss the issues of solving the model with general solving methods such as branch-and-bound and branch-andprice. We introduce specialized branching rules and new heuristics to solve the DMS problem with k-redundancy more efficiently and show results of computational tests which compare the specialized solving algorithms with general solving algorithms for example instances of the DMS problem. Lastly, we discuss the problems of considering reliability in MI(N)LP models for the DMS and how the new reliability evaluation algorithm can be used. In this discussion, we give different MI(N)LP models for the DMS problem with redundancy and reliability. Moreover, we propose a new heuristic for the DMS problem with redundancy and reliability. It is based on branchand-bound, the Dantzig-Wolfe decomposition and on the new reliability evaluation algorithm. We show results of computational tests of the new heuristic for example instances of the DMS problem and discuss its validity.

1 citations


Cites background from "A branch-and-cut algorithm for two-..."

  • ...k-node/arc-disjoint path problems have been widely researched ([25],[23],[52],[13],[16],[18]) and are applied in many different fields, as for example routing ([32],[47]) and social networks ([17],[46])....

    [...]

References
More filters
Book
14 Dec 1992
TL;DR: In this paper, a survey of survivability models using node types is presented, including basic inequalities, lifting theorems, partition inequalities, and node partition inequalities for survivability under connectivity constraints.
Abstract: Motivation.- Network survivability models using node types.- Survivable network design under connectivity constraints - a survey.- Decomposition.- Basic inequalities.- Lifting theorems.- Partition inequalities.- Node partition inequalities.- Lifted r-cover inequalities.- Comb inequalities.- How to find valid inequalities.- Implementation of the cutting plane algorithm.- Computational results.

400 citations

Journal ArticleDOI
TL;DR: A review of earlier algorithmic work on hub location problems in the particular context of communications networks is provided, drawing from the literature on facility location, network design, telecommunications, computer systems and transportation.

298 citations


"A branch-and-cut algorithm for two-..." refers background or methods in this paper

  • ...Klincewicz [18] reviews design problems that involve location of hubs....

    [...]

  • ...Klincewicz [18] uses the notation “backbone structure/access structure” to specify the structure of a two-level network....

    [...]

Journal ArticleDOI
01 Aug 2005-Networks
TL;DR: This paper attempts to survey some of the models and the optimization methods used for solving survivable network models, and particularly cutting plane based algorithms.
Abstract: For the past few decades, combinatorial optimization techniques have been shown to be powerful tools for formulating and solving optimization problems arising from practical situations. In particular, many network design problems have been formulated as combinatorial optimization problems. With the advances of optical technologies and the explosive growth of the Internet, telecommunication networks have seen an important evolution and therefore designing survivable networks has become a major objective for telecommunication operators. Over the past years, much research has been carried out to devise efficient methods for survivable network models, and particularly cutting plane based algorithms. In this paper, we attempt to survey some of these models and the optimization methods used for solving them. © 2005 Wiley Periodicals, Inc. NETWORKS, Vol. 46(1), 1–21 2005

189 citations

Journal ArticleDOI
01 May 2004-Networks
TL;DR: This article formulates the Ring Star Problem as a mixed-integer linear program and strengthens it with the introduction of several families of valid inequalities that are shown to be facet-defining and are used to develop a branch-and-cut algorithm.
Abstract: In the Ring Star Problem, the aim is to locate a simple cycle through a subset of vertices of a graph with the objective of minimizing the sum of two costs: a ring cost proportional to the length of the cycle and an assignment cost from the vertices not in the cycle to their closest vertex on the cycle. The problem has several applications in telecommunications network design and in rapid transit systems planning. It is an extension of the classical location–allocation problem introduced in the early 1960s, and closely related versions have been recently studied by several authors. This article formulates the problem as a mixed-integer linear program and strengthens it with the introduction of several families of valid inequalities. These inequalities are shown to be facet-defining and are used to develop a branch-and-cut algorithm. Computational results show that instances involving up to 300 vertices can be solved optimally using the proposed methodology. © 2004 Wiley Periodicals, Inc.

169 citations


"A branch-and-cut algorithm for two-..." refers background or methods in this paper

  • ...To separate constraints (7), (8), (14), and (18), we follow approaches presented in [20] and [27]....

    [...]

  • ...[20] propose a branch-and-cut algorithm for designing a ring as backbone network, while the access networks are direct connections from users to a hub (i....

    [...]

  • ...Separation of inequalities (7) To separate constraints (7) we use an exact and polynomial procedure presented in [20], and inspired by the known separation algorithm for the subtour elimination constraints for the travelling salesman problem....

    [...]

Journal ArticleDOI
TL;DR: A unified framework for the general network design problem which encompasses several classical problems involving combined location and network design decisions, and relevant modeling aspects, alternative formulations and possible algorithmic strategies are presented and analyzed.

122 citations


"A branch-and-cut algorithm for two-..." refers background in this paper

  • ...Studies on combined location and network design problems are reviewed by Contreras and Fernández [4]....

    [...]

Frequently Asked Questions (1)
Q1. What are the contributions in "A branch-and-cut algorithm for two-level survivable network design problems" ?

This paper approaches the problem of designing a two-level network protected against single-edge failures. The authors consider two survivable structures in both network levels. The aim of the problem is to minimize the total cost. The authors give integer programming formulations and valid inequalities for the different versions of the problem, solve them using a branch-and-cut algorithm, and discuss computational results.