Copyright © Wayne D. Grover 2000 EE 681 Fall 2000 Lecture 14 Mesh-restorable Network Design (1) Wayne D. Grover, TRLabs / University of Alberta October.

Slides:



Advertisements
Similar presentations
Maximum flow Main goals of the lecture:
Advertisements

Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
The Primal-Dual Method: Steiner Forest TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A AA A A A AA A A.
Introduction to Algorithms
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
Crew Scheduling Housos Efthymios, Professor Computer Systems Laboratory (CSL) Electrical & Computer Engineering University of Patras.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
W.D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 Mesh-restorable Network Design (2) E E Module 13.
The Cache Location Problem IEEE/ACM Transactions on Networking, Vol. 8, No. 5, October 2000 P. Krishnan, Danny Raz, Member, IEEE, and Yuval Shavitt, Member,
Totally Unimodular Matrices Lecture 11: Feb 23 Simplex Algorithm Elliposid Algorithm.
Quantitative Comparison of End-to-End Availability of Service Paths in Ring and Mesh- Restorable Networks Matthieu Clouqueur, Wayne D. Grover
Mesh Restorable Networks with Complete Dual Failure Restorability and with Selectvely Enhanced Dual-Failure Restorability Properties Matthieu Clouqueur,
Placement of Integration Points in Multi-hop Community Networks Ranveer Chandra (Cornell University) Lili Qiu, Kamal Jain and Mohammad Mahdian (Microsoft.
BROADNETS 2004 San José, California, USA October 25-29, 2004 p-Cycle Network Design with Hop Limits and Circumference Limits Adil Kodian, Anthony Sack,
Capacity Comparison of Mesh Network Restoration and Protection Schemes Under Varying Graph Connectivity John Doucette Wayne D. Grover TRLabs and University.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
Approximation Algorithms
Optimization for Network Planning Includes slide materials developed by Wayne D. Grover, John Doucette, Dave Morley © Wayne D. Grover 2002, 2003 E E 681.
E E Module 18 M.H. Clouqueur and W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 Analysis of Path Availability in Span-Restorable.
Span-restorable Mesh Network Design (1) W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 E E Module 11 ( Version for book.
Routing algorithms, all distinct routes, ksp, max-flow, and network flow LPs W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 E.
Capacity Requirements for Network Recovery from Node Failure with Dynamic Path Restoration Gangxiang Shen and Wayne D. Grover TRLabs and University of.
W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 Graph theory and routing (initial background) E E Lecture 4.
Distributed Combinatorial Optimization
University of Alberta ECE Department Network Systems Gangxiang Shen, Wayne D. Grover Extending the p-Cycle Concept to Path-Segment Protection Gangxiang.
LINEAR PROGRAMMING: THE GRAPHICAL METHOD
Advances in Optical Network Design with p-Cycles: Joint optimization and pre-selection of candidate p-cycles (work in progress) Wayne D. Grover, John Doucette.
Max-flow/min-cut theorem Theorem: For each network with one source and one sink, the maximum flow from the source to the destination is equal to the minimal.
1.3 Modeling with exponentially many constr.  Some strong formulations (or even formulation itself) may involve exponentially many constraints (cutting.
Copyright © Wayne D. Grover 2000 EE 681 Fall 2000 Lecture 15 Mesh-restorable Network Design (2) W. D. Grover, October 26, 2000 copyright © Wayne D. Grover.
Fair Allocation with Succinct Representation Azarakhsh Malekian (NWU) Joint Work with Saeed Alaei, Ravi Kumar, Erik Vee UMDYahoo! Research.
CS774. Markov Random Field : Theory and Application Lecture 13 Kyomin Jung KAIST Oct
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
CP Summer School Modelling for Constraint Programming Barbara Smith 2. Implied Constraints, Optimization, Dominance Rules.
Minimax Open Shortest Path First (OSPF) Routing Algorithms in Networks Supporting the SMDS Service Frank Yeong-Sung Lin ( 林永松 ) Information Management.
Mathematics of Networks (Cont)
Chap 10. Integer Prog. Formulations
1 1 © 2003 Thomson  /South-Western Slide Slides Prepared by JOHN S. LOUCKS St. Edward’s University.
1 P-Cycles. 2 What’s a p-Cycle? A preconfigured cycle formed out of the spare capacities in the network –A p-cycle uses one unit of spare capacity on.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
1 Slides by Yong Liu 1, Deep Medhi 2, and Michał Pióro 3 1 Polytechnic University, New York, USA 2 University of Missouri-Kansas City, USA 3 Warsaw University.
EMIS 8373: Integer Programming Column Generation updated 12 April 2005.
1 1 Slide © 2008 Thomson South-Western. All Rights Reserved © 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or.
1 Chapter 6 Reformulation-Linearization Technique and Applications.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Lap Chi Lau we will only use slides 4 to 19
St. Edward’s University
Topics in Algorithms Lap Chi Lau.
The minimum cost flow problem
John Doucette and Wayne D. Grover
Globecom 2003 December 1-5, San Francisco, California
Frank Yeong-Sung Lin (林永松) Information Management Department
1.3 Modeling with exponentially many constr.
Network Optimization Research Laboratory
Graph theory and routing: Background for Network Design
Robustness of wireless ad hoc network topologies
Robustness of wireless ad hoc network topologies
1.206J/16.77J/ESD.215J Airline Schedule Planning
Span-restorable Mesh Network Design
The University of Adelaide, School of Computer Science
Introduction to Network Design – Optimization Background
Algorithms for Budget-Constrained Survivable Topology Design
1.3 Modeling with exponentially many constr.
TRLabs & University of Alberta © Wayne D. Grover 2002, 2003, 2004
Span-restorable Mesh Network Design
Chapter 5 Transportation, Assignment, and Transshipment Problems
Design of Networks based on multiple rings
Frank Yeong-Sung Lin (林永松) Information Management Department
Graphical solution A Graphical Solution Procedure (LPs with 2 decision variables can be solved/viewed this way.) 1. Plot each constraint as an equation.
Chapter 1. Formulations.
Presentation transcript:

copyright © Wayne D. Grover 2000 EE 681 Fall 2000 Lecture 14 Mesh-restorable Network Design (1) Wayne D. Grover, TRLabs / University of Alberta October 24, 2000

copyright © Wayne D. Grover 2000 Key ideas and vision behind “mesh” restoration (1) many real networks are highly mesh-like in their topology (2) for restoration, generalized re-routing over the graph can permit greater sharing of spare capacity –the redundancy will go down in proportion to the average nodal degree (3) the network can be its own computer for the real-time solution of the restoration re-routing problem –the network can self-organize restoration pathsets is a split-second –without any external control or databases (4) if a network is mesh-oriented it is more flexible and adaptable to unforeseen patterns of demand –the network can continually self-organize its mapping of physical transmission to logical transport configuration to suit time-and-spatially varying demand patterns

copyright © Wayne D. Grover 2000 A look at some real network topologies 32-node Italian backbone transport network

copyright © Wayne D. Grover 2000 A look at some real network topologies Belgian national transport network (Belga nodes, 59 spans)

copyright © Wayne D. Grover 2000 A look at some real network topologies “COST 239” European Community project model ( 19 nodes, 40 spans)

copyright © Wayne D. Grover 2000 A look at some real network topologies “Bellcore” (New-Jersey LATA) (LATA = local access and transport area)

copyright © Wayne D. Grover 2000 A look at some real network topologies “MCI” North American continental backbone (homeomorphism of topology only)

copyright © Wayne D. Grover 2000 A look at some real network topologies Level (3) North American continental backbone

copyright © Wayne D. Grover 2000 Representing networks in a “.snif” file Date: File Name: bellcore.snif Network: New Jersey LATA area from 1993 publication... Program: Jointspandatprep.exe followed by AMPL JointSCP.mod NodeXcoordYcoord SpanNodeANodeBDistanceWorkingSpare to last span entry (28 here) snif = TRLabs standard network interface file Notes: - x,y node co-ordinates are optional to support graphical display applications - working and spare quantities may or may not be present depending on use or stage of design processing

copyright © Wayne D. Grover 2000 Our journey will follow this sequence of concepts.... Theory and methods for mesh-restorable network capacity design –span restoration –path restoration –non-joint, joint, modular,..other variations “Selfhealing”: –distributed real-time restoration Self-organization: –continual autonomous adaptation of transport to suit demands

copyright © Wayne D. Grover 2000 Capacity design of Mesh restorable networks Start by looking at some actual fiber-optic transmission facilty networks...

copyright © Wayne D. Grover 2000 Basics of Mesh-restorable networks (28 nodes, 31 spans) 30% restoration 70% restoration 100% restoration span cut

copyright © Wayne D. Grover 2000 Basics of Mesh-restorable networks (28 nodes, 31 spans) span cut 40% restoration 70% restoration 100% restoration

copyright © Wayne D. Grover 2000 Basics of Mesh-restorable networks Spans where spare capacity was shared over the two failure scenarios ?..... This sharing efficiency increases with the degree of network connectivity “nodal degree”

copyright © Wayne D. Grover 2000 Basics of Mesh-restorable networks

copyright © Wayne D. Grover 2000 Basics of Mesh-restorable networks Mesh networks require less capacity as graph connectivity increases (sample result)

copyright © Wayne D. Grover 2000 A simple lower-bound on achievable redundancy Consider two idealizations: –(1) restoration is “end node limited” i.e., the min cut governing restoration path number is at one or the other of the custodial nodes –(2) node has span degree d –(3) all wi are equal at the node mesh equivalent of the ‘perfect balance’ notion with rings then:... OCX W W W W d spans in total if any one span fails, the total spare capacity on the surviving (d-1) spans must be >= to w. hence.... redundancy = (node) d

copyright © Wayne D. Grover 2000 A simple lower-bound on achievable redundancy Comment and interpretation: This just says that in the idealized limit every span has w working capacity and w/(d-1) spare capacity. Although the redundancy ratio falls as (d-1) -1, the absolute working and spare quantities fall even faster as d increases. In practise, the lower limit is not achieved primarily because w i values are not balanced, rather than because (span-) restoration is not end-node limited (it almost always is above a certain d.) Class problem (extension of the basic result): show that with unequal w i values at a node, a more general lower bound on spare capacity is given by the relationship: where the notation s1, s2, w1, w2 denotes the largest and second-largest spare and working capacity quantities at the node.

copyright © Wayne D. Grover 2000 Review: Link, Span, Path and Route terminology G C D E F A B a path its route

copyright © Wayne D. Grover 2000 Review: Types of “route”: fully disjoint, span disjoint, and distinct

copyright © Wayne D. Grover 2000 Span restoration: what we mean The set of working paths severed by a span cut are restored by substitution of a set of local replacement paths between the end nodes of the failed span. The restoration path-set is equivalent to single-commodity max-flow routing or k- shortest paths routing between failure end nodes within the surviving portion of the reserve network. The number of paths crossing any span must respect the discrete spare capacity on the span. Example:

copyright © Wayne D. Grover 2000 Some notes on span restoration A network employing a span restoration mechanism and an optimally designed (e.g., minimal capacity) reserve network that just supports the target level of restorability by that mechanism is what we mean by “a span-restorable mesh network”. It has been found that in relatively sparse but non-planar graphs, k-shortest paths > ~ 99% of max-flow. Ref: ( D.A. Dunn, W.D. Grover, M.H. MacGregor, “A comparison of k-shortest paths and maximum flow methods for network facility restoration”, IEEE J. Sel. Areas in Communications, Jan. 1994, vol. 12, no. 1, pp ) In test cases a distributed restoration algorithm (DRA) must find the same maximal number of simultaneously feasible restoration paths within the discrete-capacitated spare capacity graph as a centralized reference algorithm. (P.N.E. = 1 ).

copyright © Wayne D. Grover 2000 Overview of three basic * approaches for mesh spare capacity design Sakauchi - “cut oriented” formulation Herzberg - “arc - path” formulation “Transportation-like” problem formulation Note: In these basic methods, the working paths are first shortest-path routed before solving the spare capacity placement problem. This is what we later refer to as the “non-joint” problem.

copyright © Wayne D. Grover 2000 Where: S = set of all spans c i = cost of a spare link on span i. s i = number of spare links assigned to span i. C i = set of “partial cutsets” relevant to restoration of span i. = 1 if span j is a member of the c th partial cutset relevant to restoration of span i, 0 otherwise. c = an individual cutset in the set Ci w i = the number of working links on span i (working demands are routed prior to solving for the spare capacity.) Sakauchi’s “min-cut max-flow” approach for spare capacity design Ref: H. Sakauchi, et al., “A self-healing network with an economical spare-channel assignment” IEEE GLOBECOM ‘90, pp , S.t.

copyright © Wayne D. Grover 2000 Review of Min-cut max-flow theorem (basis for Sakauchi’s method) A cut of a graph G(V,E) is a partitioning of the nodes of the graph into two disjoint sets A cutset is the set of edges. The capacity of a cut is the sum of the weights on the edges of the cutset. The min-cut max-flow theorem is that : or... More intuitively: “regardless of the routing details, the maximum flow between two nodes is set by the minimum capacity of any cut of the between those two nodes” or…“some combination of spans in parallel will always act as the bottleneck”

copyright © Wayne D. Grover 2000 Recall: the “max-flow = min-cut” concept A B E C D F the “min-cut” = 12 Hence --> no routing solution can provide more than 12 units of flow between A -F (i.e., this is the “max-flow”)

copyright © Wayne D. Grover 2000 How Sakauchi uses this: sizing the cutsets to support restoration w 1-2 s 1-4 s 3-4 s 1-3 s 2-5 s 4-5 C 1 C 2 C 3 C 4 C 5 Illustrating the “partial cutsets” relevant to restoration of span (1-2): Corresponding constraints: C1: s1-3 + s1-4 + s1-5  w1-2 C2: s3-4 + s1-4 + s1-5  w1-2 C3: s4-5 + s1-5  w1-2 C4: s4-5 + s1-5 + s2-5  w1-2 C5: s2-5  w1-2

copyright © Wayne D. Grover 2000 Sakauchi’s method - technical aspects Number of cuts of graph is O(2 S ) –Have only S variables but S O(2 S-1 ) partial cutset constraints in a complete (fully constrained) formulation –> hence row generation (in the primal) methods have been used. Row generation: –Each added row represents a new partial cutset constraint for a span that is not yet fully restorable. –Uses a separate program to test for full restorability (formulation itself has no explicit expression of restorability for built-in infeasibility detection.) –Sakauchi used the N-1 basic cuts of a graph in the initial tableau. –Venables provided composite strategy for incident cutset constraints in initial tableau plus targeted discovery of “most relevant” additional cutset constraints. Other practical aspects: –Can run as LP with rounding up at each iteration –Don’t get (or control) restoration path-sets –Corresponds to perfect max-flow restoration routing

copyright © Wayne D. Grover 2000 Venables strategy for initializing Sakauchi’s cut- dimensioning approach “Incident cutset “ constraints: s 2  w 0 s 3 + s 1  w 0 s 5 + s 7  w 2 s 0  w 2 s 6  w 4 s 1  w 4 s 4  w 6 s 5 + s 8 + s 3  w 6 s 3 + s 0  w 1 s 4  w 1 s 6 + s 5 + s 8  w 3 s 0 + s 1  w 3 s 7  s 2  w 5 s 6 + s 8 + s 3  w 5 s 5 + s 2  w 7 s 8  w 7 s 6 + s 5 + s 3  w 8 s 7  w 8 Ref: B. Venables, M.Sc.thesis, “Algorithms for near optimal design of mesh-restorable transport networks”, University of Alberta, Fall 1992.

copyright © Wayne D. Grover Run restoration routing algorithm to find an un-restorable span. 2. Inspect the restoration path-set for that span (available as a result from 1.) 3. Remove saturated edges from the graph. 4. Each combination of disconnected sub-graphs in which two subgraphs remain, one containing s, the other t, defines a new cutset constraint. 5. Done when step 1. Finds all spans fully restorable. Venables strategy for discovering new cut-set constraints Next cut-set constraint: s7 + s3 +s6 >= w5 (also: s0 + s7 >= w5 ) s t remove edges saturated by the restoration routing trial (or at zero in the LP) 1 path s i values after first LP iteration

copyright © Wayne D. Grover 2000 Where: S, c i, s i, w i are as before P i is a set of “eligible routes” for restoration of span i is an assignment of restoration flow for span i to the p th eligible route encodes the eligible restoration routes: = 1 if span j is in the p th eligible route for restoration of span i Herzberg’s “arc-path” hop-limited approach Subject to: Restorability : Spare capacity : Ref: M. Herzberg, and S. Bye, “An optimal spare- capacity assignment model for survivable networks with hop limits,” Proc. IEEE GLOBECOM ‘94, pp , 1994.

copyright © Wayne D. Grover 2000 Understanding the span-restorable mesh spare capacity problem through Herzberg’s approach Flows over eligible routes Represented in the eligible route - defining information input Flows simultaneously imposed on any span s i values

copyright © Wayne D. Grover 2000 Herzberg’s approach - technical aspects working paths are routed prior to this formulation --> (provides the wi’s) A separate program finds “all distinct routes” for each failure scenario (depth-first search). DFS may be limited by a hop - count, a distance limit, any other operational criterion. These become the “eligible routes” for restoration. “Eligible routes” are not apriori decisions about the restoration routes to be taken for each failure…they only represent the routes available for restoration flow assignment. There are –S restorability constraints (equalities) and S(S-1) spare capacity generating inequality constraints. –~ variables - but controllable via eligible routes. Yields restoration path-set details along with reserve network spare capacity. The LP relaxation sometimes acts unimodular but this is data-dependent. Solution as IP often solves quickly enough or a “repair” procedure can be devised for fractional outcomes when solved as LP.

copyright © Wayne D. Grover 2000 How hop-limit affects complexity and solution quality in Herzberg’s formulation Threshold value ( for the network shown ) ( Total spare capacity, total number of eligible restoration routes ) Minimum spare Below the design threshold hop-limit, solution quality is affected. Above the threshold hop limit, computational difficulty grows unnecessarily

copyright © Wayne D. Grover 2000 Some practical notes re: “hop limit” concept In practice, –hop limits can easily be converted to mileage limits or combined hop / distance limits in generating the eligible route-sets for the formulation. –the basic idea of a single network-wide hop limit can evolves into approaches such as adapting hop limits per span (and per working route in the joint formulations) so as to assure a minimum representation of route diversity, within a computational “budget” for numbers of variables and constraints.