scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Optimal capacity placement for path restoration in STM or ATM mesh-survivable networks

01 Jun 1998-IEEE ACM Transactions on Networking (IEEE Press)-Vol. 6, Iss: 3, pp 325-336
TL;DR: A method for capacity optimization of path restorable networks which is applicable to both synchronous transfer mode (STM) and asynchronous transfermode (ATM) virtual path (VP)-based restoration and jointly optimizing working path routing and spare capacity placement.
Abstract: The total transmission capacity required by a transport network to satisfy demand and protect it from failures contributes significantly to its cost, especially in long-haul networks. Previously, the spare capacity of a network with a given set of working span sizes has been optimized to facilitate span restoration. Path restorable networks can, however, be even more efficient by defining the restoration problem from an end to end rerouting viewpoint. We provide a method for capacity optimization of path restorable networks which is applicable to both synchronous transfer mode (STM) and asynchronous transfer mode (ATM) virtual path (VP)-based restoration. Lower bounds on spare capacity requirements in span and path restorable networks are first compared, followed by an integer program formulation based on flow constraints which solves the spare and/or working capacity placement problem in either span or path restorable networks. The benefits of path and span restoration, and of jointly optimizing working path routing and spare capacity placement, are then analyzed.
Citations
More filters
Proceedings ArticleDOI
05 Jul 2002
TL;DR: If all dual failure combinations incident to a common node are allowed for in the design, then nearly all other dual span failure combinations (any two spans in the network) will also be restorable.
Abstract: We study the total capacity requirements of span-restorable mesh network designs as the percentage of all possible dual failure combinations incident on a common node is increased. Our interest is in questions such as: Are there any guidelines or insights as to how many such SRLGs can be sustained before the capacity penalty becomes severe? Can we diagnose which SRLGs are the most limiting to overall network efficiency? When would it be worthwhile to take physical measures to eliminate a certain SRLG? In addressing these questions we provide a design formulation and procedure for planning any span-restorable network for a known set of SRLGs. One finding of interest is that if all dual failure combinations incident to a common node are allowed for in the design, then nearly all other dual span failure combinations (any two spans in the network) will also be restorable. We also produce experimental results showing how total capacity depends on the relative number or frequency of co-incident SRLGs and quantify how the type of SRLG will impact design costs.

48 citations


Cites background from "Optimal capacity placement for path..."

  • ...Aside from dedicated 1+1 APS, the path-oriented schemes involving sharing of spare capacity tend to be more efficient in terms of spare capacity requirements [5],[6],[7] than span-oriented schemes....

    [...]

  • ...Common forms of end-to-end survivability are shared backup path protection (SBPP) [2],[3], 1+1 automatic protection switching (APS) [4], and dynamic path restoration [5]....

    [...]

Journal ArticleDOI
TL;DR: The Forgiving Graph improves on the Forgging Tree distributed data structure from Hayes et al. (2008) in the following ways: it ensures low stretch over all pairs of nodes, while the Forgiving Tree only ensures low diameter increase.
Abstract: We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that, over a sequence of rounds, an adversary either inserts a node with arbitrary connections or deletes an arbitrary node from the network. The network responds to each such change by quick “repairs,” which consist of adding or deleting a small number of edges. These repairs essentially preserve closeness of nodes after adversarial deletions, without increasing node degrees by too much, in the following sense. At any point in the algorithm, nodes v and w whose distance would have been l in the graph formed by considering only the adversarial insertions (not the adversarial deletions), will be at distance at most l log n in the actual graph, where n is the total number of vertices seen so far. Similarly, at any point, a node v whose degree would have been d in the graph with adversarial insertions only, will have degree at most 3d in the actual graph. Our distributed data structure, which we call the Forgiving Graph, has low latency and bandwidth requirements. The Forgiving Graph improves on the Forgiving Tree distributed data structure from Hayes et al. (2008) in the following ways: 1) it ensures low stretch over all pairs of nodes, while the Forgiving Tree only ensures low diameter increase; 2) it handles both node insertions and deletions, while the Forgiving Tree only handles deletions; 3) it requires only a very simple and minimal initialization phase, while the Forgiving Tree initially requires construction of a spanning tree of the network.

47 citations

Journal ArticleDOI
TL;DR: Numerical results for a variety of networks indicate that the common pool protection is attractive to enhance bandwidth efficiency without loss of survivability and that the SSR heuristic quickly results in near optimal solutions.
Abstract: In this paper we consider the problem of provisioning spare capacity in two-layer backbone networks using shared backup path protection. First, two spare capacity allocation (SCA) optimization problems are formulated as integer linear programming (ILP) models for the cases of protection at the top layer against failures at the bottom layer. The first model captures failure propagation using overlay information between two layers for backup paths to meet diversity requirements. The second model improves bandwidth efficiency by moving spare capacity sharing from the top layer to the bottom layer. This exposes a tradeoff between bandwidth efficiency and extra cross-layer operation. Next, the SCA model for common pool protection is developed to allow spare capacity sharing between two layers. Our previous SCA heuristic technique, successive survivable routing (SSR) is extended for these optimization problems. Numerical results for a variety of networks indicate that the common pool protection is attractive to enhance bandwidth efficiency without loss of survivability and that the SSR heuristic quickly results in near optimal solutions

47 citations

Proceedings ArticleDOI
14 Apr 2008
TL;DR: A new algorithm, DASH, is presented, that provably ensures that the network stays connected even if an adversary deletes up to all nodes in the network; and no node ever increases its degree by more than 2 log n, where n is the number of nodes initially in thenetwork.
Abstract: We consider the problem of self-healing in networks that are reconfigurable in the sense that they can change their topology during an attack. Our goal is to maintain connectivity in these networks, even in the presence of repeated adversarial node deletion, by carefully adding edges after each attack. We present a new algorithm, DASH, that provably ensures that: 1) the network stays connected even if an adversary deletes up to all nodes in the network; and 2) no node ever increases its degree by more than 2 log n, where n is the number of nodes initially in the network. DASH is fully distributed; adds new edges only among neighbors of deleted nodes; and has average latency and bandwidth costs that are at most logarithmic in n. DASH has these properties irrespective of the topology of the initial network, and is thus orthogonal and complementary to traditional topology- based approaches to defending against attack. We also prove lower-bounds showing that DASH is asymptotically optimal in terms of minimizing maximum degree increase over multiple attacks. Finally, we present empirical results on power-law graphs that show that DASH performs well in practice, and that it significantly outperforms naive algorithms in reducing maximum degree increase.

45 citations


Cites background from "Optimal capacity placement for path..."

  • ...Related Work: There have been numerous papers that discuss strategies for adding additional capacity and rerouting in anticipation of failures [7, 9, 12, 17, 21, 22]....

    [...]

Journal ArticleDOI
TL;DR: This paper presents two new ILP formulations for the more general sliding scheduled traffic model, where the setup and teardown times may vary within a specified range, and proposes a fast two-step optimization process.

43 citations


Cites methods from "Optimal capacity placement for path..."

  • ...In this section, we present the results of our experiments on larger networks of up to 53 nodes (with topologies as given in [18]), using the heuristics given in Section 4....

    [...]

  • ...For testing the ILP formulations, we considered the 10node network given in [18] and the 14-node NSFNET [19] topology....

    [...]

  • ...We also experimented with larger demand sets on networks of up to 53 nodes (with topologies as given in [18]), using the heuristics outlined in Section 4....

    [...]

References
More filters
Book
16 Feb 1970
TL;DR: Interestingly, integer programming and network flows that you really wait for now is coming, it's significant to wait for the representative and beneficial books to read.
Abstract: (1970). Integer Programming and Network Flows. Journal of the Operational Research Society: Vol. 21, No. 4, pp. 500-501.

638 citations

Journal ArticleDOI
TL;DR: Self-healing network techniques suitable for ATM networks in order to realize a high-reliablity B-ISDN are proposed and high-speed restoration technique which exploits the benefits of the VP is proposed and described.
Abstract: This paper proposes self-healing network techniques suitable for ATM networks in order to realize a high-reliablity B-ISDN. First, the characteristics of the virtual paths (VP) and their influence on failure restoration are discussed. A high-speed restoration technique which exploits the benefits of the VP is then proposed and described. The technique simplifies the message transmission processes and reduces the number of generated messages by using preassigned backup virtual paths. Next, the scheme used to design the backup VP routes and spare resource distribution for each link is proposed in order to create a network that applies the proposed restoration scheme. Next, self-reconstruction techniques of backup virtual paths are proposed for the realization of a reversionless restoration cycle. Finally, the feasibility of the distributed control operation is discussed. >

233 citations

Journal ArticleDOI
TL;DR: A comparative study of the effectiveness of KSP versus Max Flow as an alternative rerouting criteria in the context of transport network span restoration, and the hypothesis is made that a generalized "trap" topology is responsible for all KSP-Max Flow capacity differences.
Abstract: In the development of technologies for span failure restoration, a question arises about the restoration rerouting characteristics to be specified. In theory, maximal rerouting capacity is obtained with a maximum flow (Max Flow) criterion. However, rerouting that realizes the k-successively shortest link disjoint paths (KSP) may be faster, easier, and, in distributed implementation, more robust than a distributed counterpart for Max Flow. The issue is, therefore, what the restoration capacity penalty is if KSP is used instead of Max Flow. To explore this tradeoff, the authors present a comparative study of the effectiveness of KSP versus Max Flow as an alternative rerouting criteria in the context of transport network span restoration. The comparison applies to both centrally controlled and distributed restoration systems. Study methods include exhaustive span failure experiments on a range of network models, and parametric and analytical investigations for insight into the factors resulting in KSP versus Max Flow differences. The main finding is that KSP restoration capacity is more than 99.9% of that from Max Flow in typical network models. The hypothesis is made that a generalized "trap" topology is responsible for all KSP-Max Flow capacity differences. The hypothesis is tested experimentally and used to develop analytical bounds which agree well with observed results. These findings and data are relevant to standards makers and equipment developers in specifying and engineering future restorable networks. >

199 citations

Proceedings ArticleDOI
02 Dec 1990
TL;DR: In order to achieve fast restoration, a distributed control mechanism that is applicable to both line and path restoration is proposed, and the shared use of spare channels for various failure scenarios, including multiple failure cases, are allowed.
Abstract: With the advent of networking technologies intelligent network elements, such as the digital cross-connect system (DCS), will make it possible to dynamically reconfigure a network for restoration purposes. Both restoration control of DCSs and spare-channel design issues are presented, and how they work together so that a fast and economical SONET self-healing network is obtained. In order to achieve fast restoration, a distributed control mechanism that is applicable to both line and path restoration is proposed. The proposed method allows the shared use of spare channels for various failure scenarios, including multiple failure cases, so that the efficient use of spare channels can be achieved. A linear-programming-based scheme is proposed to obtain spare-channel assignment, where a network-flow technique is used. Through a simulation study, a fast and economical self-healing network is verified. >

193 citations


"Optimal capacity placement for path..." refers background or methods in this paper

  • ...Previous work used an IP approach based on -flow -cut considerations to solve the spare capacity placement problem in a span-restorable network [4], [11], [20]....

    [...]

  • ...Issues related to the restoration mechanisms themselves are addressed in related works [1], [2], [4], [21], [27]....

    [...]