首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We present a topology design methodology for broadband (FTTx) access networks. The calculations are based on real geographic data (digital maps) and infrastructural information of the targeted area, using detailed and realistic cost models in order to provide results of practical interest. The developed heuristics offer low time consumption and nearly optimal solutions for the highly complex problem of minimal cost network deployment, due to the properly chosen and customized heuristic algorithms for the various network technologies. We review the specific properties of the FTTx network technologies, present a formal representation of the problem including a detailed cost function and network model and discuss complexity issues. The various solution techniques are presented along with case studies of real-life scenarios in order to show the potential of the methodology. The developed heuristic algorithms offer an approximation of the optimum within 10–15%, while time consumption remains in the range of a few minutes, even for large-scale scenarios with 10,000s of customers. Beyond topology design, the results provided by these methods are useful for a preliminary CAPEX estimation and techno-economic comparison.  相似文献   

2.
We propose a comprehensive design methodology for control and data planes of wavelength-routed optical networks (WRONs) employing mixed-line-rate (MLR) transmission for cost-effective resource provisioning. The proposed approach attempts to minimize the maximum lightpath capacity demand in Gbps (representing the measure of lightpath congestion) in network for a given traffic matrix by using a mix of a heuristic scheme and linear programming (LP). In the first step of the proposed three-step design, some lightpaths are set up on a set of judiciously selected fiber links (with point-to-point lightpaths between neighboring nodes), on a specific wavelength throughout the network, and an appropriate fraction of the same set of lightpaths is utilized for carrying control information, forming therefore the control plane (CP) of the WRON. The remaining bandwidth of these lightpaths is utilized to carry the data traffic along with all other designed lightpaths of the WRON using appropriate algorithm, forming the overall data plane (DP) of the WRON. In the second step, traffic routing is carried out through LP to minimize lightpath congestion in the network. In the third step, we utilize the results of LP to assign rates to lightpaths, such that the cost (considering only the transceiver cost) of the network is minimized. This design leads to congestion-aware MLR network with due consideration to cost-effectiveness without compromising the network restoration response against link failures. We carry out simulation studies employing possible CPs using both symmetric (CP topology being same as the physical topology) as well as asymmetric (using fewer fiber links than the symmetric case) topology. The results of our simulations indicate that the proposed design of CP with symmetric/asymmetric topology and in-band transmission with sub-lightpath capacity can bring down network congestion and cost with respect to symmetric out-of-band transmission (using fully reserved lightpaths for CP), without any perceptible sacrifice in respect of the network restoration time. Failure can occur either in CP or DP, or in both the planes. We investigate the effect of design of CP with symmetric/asymmetric topology on network restoration time for single- and double-link failures. We further present DP design methodology with hybrid restoration scheme, i.e., combination of dedicated (1:1) path protection and path restoration. We analyze the effect of symmetric CP topology and degree of protection on the congestion of the network. Some lightpaths, that support more traffic, are protected against failures, while the others are left for path restoration in the event of failures. As more lightpaths are protected, the congestion and power consumption of network increase. We provide an analysis of the factors that come into play while altering the degree of protection and observe how the choice for the degree of protection in DP can be arrived at using an appropriate design methodology.  相似文献   

3.
The design of network topology is an important part of network design, since network topology is directly associated with network operational behavior, capacity, reliability, and cost. This paper is a tutorial paper concerned with illustrating how the optimization capabilities of genetic algorithms can be used to design suitable network topologies considering basic topology problems. Simple genetic algorithms have been developed for the topology problem of mesh networks, considering single node and single link failure tolerance. The algorithms are based on criteria of two important measures: minimizing the length of communication links; and minimizing traffic flow through these links for given traffic loads. The first measure contributes to minimizing the cost of cabling, while the second measure contributes to minimizing the cost of link capacity. The work provides a useful approach and tools to network students and professionals concerned with the topology design of backbone networks. The developed software is made available on the Internet. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

4.
Efficient Cache Placement in Multi-Hop Wireless Networks   总被引:1,自引:0,他引:1  
In this paper, we address the problem of efficient cache placement in multi-hop wireless networks. We consider a network comprising a server with an interface to the wired network, and other nodes requiring access to the information stored at the server. In order to reduce access latency in such a communication environment, an effective strategy is caching the server information at some of the nodes distributed across the network. Caching, however, can imply a considerable overhead cost; for instance, disseminating information incurs additional energy as well as bandwidth burden. Since wireless systems are plagued by scarcity of available energy and bandwidth, we need to design caching strategies that optimally trade-off between overhead cost and access latency. We pose our problem as an integer linear program. We show that this problem is the same as a special case of the connected facility location problem, which is known to be NP-hard. We devise a polynomial time algorithm which provides a suboptimal solution. The proposed algorithm applies to any arbitrary network topology and can be implemented in a distributed and asynchronous manner. In the case of a tree topology, our algorithm gives the optimal solution. In the case of an arbitrary topology, it finds a feasible solution with an objective function value within a factor of 6 of the optimal value. This performance is very close to the best approximate solution known today, which is obtained in a centralized manner. We compare the performance of our algorithm against three candidate cache placement schemes, and show via extensive simulation that our algorithm consistently outperforms these alternative schemes.  相似文献   

5.
This paper studies the design of low-cost survivable wavelength-division-multiplexing (WDM) networks. To achieve survivability, lightpaths are arranged as a set of rings. Arrangement in rings is also necessary to support SONET/SDH protection schemes such as 4FBLSR above the optical layer. This is expected to be the most common architecture in regional (metro) networks. We assume that we are given a set of lightpaths in an arbitrary network topology and aim at finding a partition of the lightpaths to rings adding a minimum number of lightpaths to the original set. The cost measure that we consider (number of lightpaths) reflects the switching cost of the entire network. In the case of a SONET/SDH higher layer, the number of lightpaths is equal to the number of add-drop multiplexers (ADMs) (since two subsequent lightpaths in a ring can share an ADM at the common node). We prove some negative results on the tractability and approximability of the problem and provide an approximation algorithm with a worst case approximation ratio of 8/5. We study some special cases in which the performance of the algorithm is improved. A similar problem was introduced, motivated, and studied by Liu, Li, Wan and Frieder (see Proc. INFOCOM 2000, p.1020-1025, 2000) Gerstel, Lin and Sasaki, (see Proc. IEEE INFOCOM '98, p. 94-101, 1998)(where it was termed minimum ADM problem). However, these two works focused on a ring topology while we generalize the problem to an arbitrary network topology  相似文献   

6.
Virtual private network (VPN) design according to a tree topology has been the subject of numerous research papers. Two workload models are commonly used to allow VPN clients to specify the communication capacity they need, the hose and the pipe workload models. As opposed to the pipe model, where bandwidth needs between every pair of endpoints must be specified as a matrix, the hose model has the advantage of simple specification where only one ingress and egress bandwidths per hose endpoint are specified. However, the tree bandwidth costs obtained with the hose workload model are higher by a factor of as much as 2.5 compared to those obtained with pipe workloads Duffield et al. (SIGCOMM Comput Commun Rev 29(4):95108, 1999). In this work, we propose a two-step exact approach to design a VPN tree with minimum bandwidth cost. The first step derives a pipe workload from the user specified hose workload using an exact algorithm. The second step formulates the pipe-based VPN tree bandwidth minimization as a 0–1 integer linear program, which is solved using the exact approach proposed in Thabti et al. (1–6, 2012). The bandwidth costs of VPN trees obtained using this two-step approach are lower by a factor varying between 1.31 and 2.23 compared to VPN trees obtained using the original hose workload. Furthermore, we show that tree solutions obtained using the derived pipe workload satisfy the original hose workload.  相似文献   

7.
Topology control is one of the important techniques in wireless multi-hop networks to preserve connectivity and extend the network lifetime. This is more significant in ZigBee, since the address assignment scheme is tightly coupled with topology construction. For example, there can be orphan nodes that cannot receive the network address and isolated from the network due to predefined network configurations. In this paper, we propose a distributed topology construction algorithm that controls the association time of each node in order to solve the orphan node problem in ZigBee as well as construct an efficient routing tree topology. The main idea of the distributed topology construction algorithm is to construct primary backbone nodes by propagating the invitation packets and controlling the association time based on the link quality. Since the dynamically selected primary nodes are spread throughout the network, they can provide backbone to accept the association requests from the remaining secondary nodes which are majority in a network. In the performance evaluation, we show that the proposed topology construction algorithm effectively solves the orphan node problem regardless of network density as well as provides efficient tree routing cost comparable to the approximation algorithm for degree constrained minimum routing cost tree (DC-MRCT) problem.  相似文献   

8.
张万鹏  童家榕 《微电子学》1997,27(4):272-275
提出了一个基于性能的LUT结构的FPGA再设计过程中的工艺映射算法。采用该算法不改变网络的拓扑结构,而是用特征函数以及对原布尔网络进行相应的约束实现电路的再设计,从而避免了在再设计过程中重新考虑电路的时延和布局布线结果。用于较大规模的电路有很好的实验结果。  相似文献   

9.
Traffic grooming in static wavelength division multiplexing networks   总被引:4,自引:0,他引:4  
Advances in wavelength-division multiplexing technology have made it possible to design point-to-point transmission systems with unprecedented per-wavelength high capacity. This capacity may be exploited to design optical networks, in which end nodes are interconnected by circuits consisting of wavelengths. Contrary to early expectations, however, most of today's end-to-end applications require only sub-wavelength bandwidth. This bandwidth mismatch makes wavelength circuits inefficient in many cases, unless multiple traffic flows are time multiplexed together on the same wavelength. This practice is often referred to as traffic grooming. In this survey the authors address the issue of achieving efficient traffic grooming in static WDM networks. A great deal of discussion is devoted to the problem of determining which network solution is the most cost effective, taking into account the network topology, volume of traffic, possible optical impairments at high transmission rates, and cost ratio between electronic and optical components.  相似文献   

10.
In dynamic IP-over-WDM networks efficient fault-management techniques become more difficult since as demands change with time the optimal logical topology varies as well. Changes in the virtual topology should be done with care because working IP LSPs routed on top of a virtual topology should not be interrupted. Reconfiguration of the virtual topology may also affect precomputed backup IP LSPs to be activated in case of failure meaning that backup IP LSPs would need to be recomputed after any change in the virtual topology. A good sense solution can be the dimensioning of the virtual topology for a worst case traffic scenario, having as goal the minimization of the network cost, for example, and then route dynamic IP LSPs on this virtual topology. The virtual topology would remain unchanged as long as possible, that is, until changes in the virtual topology are considered to bring considerable benefits. Since data services over IP are essentially of a best-effort nature, protection could be provided, using IP LSP protection, only when bandwidth is available in the virtual topology. The computation of backup IP LSPs does not interfere with working IP LSPs meaning that no service interruption will exist. Such a strategy, considered in this paper, allows resources to be used efficiently, since free bandwidth is used for backup purposes, while the normal delivery of traffic is guaranteed in peak traffic situations although having no protection guarantees. Our main objective is to quantify the spare capacity, which can be used for restoration (backup) purposes, over a virtual topology designed and optimized to carry a traffic scenario with no survivability and QoS requirements. We analyse the maximum protection (MP) problem in such IP-over-WDM network environment. Protection is provided to IP LSP requests whenever possible through bandwidth reservation in a backup IP LSP on the virtual topology. Besides the mathematical formalization of the MP problem, an upper bound and heuristic algorithms are proposed and evaluated. The traffic considered includes IP LSPs of different granularities and is the worst case traffic scenario for which the network should be dimensioned.  相似文献   

11.
Bulk data transfers, such as backups and propagation of bulky updates, account for a large portion of the inter‐datacenter traffic. These bulk transfers consume massive bandwidth and further increase the operational cost of datacenters. The advent of store‐and‐forward transfer mode offers the opportunity for cloud provider companies to transfer bulk data by utilizing dynamic leftover bandwidth resources. In this paper, we study the multiple bulk data transfers scheduling problem in inter‐datacenter networks with dynamic link capacities. To improve the network utilization while guaranteeing fairness among requests, we employ the max–min fairness and aim at computing the lexicographically maximized solution. Leveraging the time‐expanded technique, the problem in dynamic networks is formulated as a static multi‐flow model. Then, we devise an optimal algorithm to solve it simultaneously from routing assignments and bandwidth allocation. To further reduce the computational cost, we propose to select an appropriate number of disjoint paths for each request. Extensive simulations are conducted on a real datacenter topology and prove that (i) benefiting from max–min fairness, the network utilization is significantly improved while honoring each individual performance; (ii) a small number of disjoint paths per request are sufficient to obtain the near optimal allocation within practical execution time. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

12.
The "explosive growth in bursty traffic" changes the network dynamics and requires a good evaluation of various classes of service when designing an access network. From a topological standpoint, the multiservice networks in this paper are heterogeneous systems which integrate both a core and some wireless access networks into an infrastructure similar to third-generation wireless networks. Such networks require reliable and cost-effective solutions to the problem of selecting access technologies for satisfying performance and quality of service requirements related to the services and applications envisioned. This paper analyzes the reliability aspects of some access network topologies to insure a certain level of quality of service at the lowest cost for the end users. It considers a mass market equivalent to 1.6 million subscribers, the objective being to determine the cost the users are ready to pay to benefit from services and applications provided by these multiservice networks. For these purposes, the relative behavior of 3 access-network topologies are studied: the tree with parallel backup links, the ring, and the partially meshed topologies. In ring topology, simulation results show that a great connectivity in the access network is not justified in terms of reliability requirements; the partially meshed topology, even if it has redundant links which affect its cost, outperforms the tree with parallel backup links; and the ring topology is more reliable in terms of disconnected sessions than the tree topology. By considering both reliability and cost, a tree with parallel backup links appears the best topology for the access network and its cost is acceptable for the end user. This study can be extended by: (1) establishing the cost as a function of the quality of service; (2) optimizing the partially meshed topology for more reliable networks; and (3) defining a (shaping) policy to deal with a variety of traffic schemes  相似文献   

13.

Software-defined networking (SDN) is a new approach that overcomes the obstacles which are faced by conventional networking architecture. The core idea of SDN is to separate the control plane from the data plane. This idea improves the network in many ways, such as efficient utilization of resources, better management of the network, reduced cost, innovation with new evolution, and many others. To manage all these changes, there is a great need for an efficient controller to improve the utilization of resources for the better performance of the network. The controller is also responsible for the analysis and monitoring of real-time data traffic. There is a great need for a high-performance controller in networking industries, data centres, academia, and research due to the tremendous growth of distributed processing-based real time applications. Therefore, it is crucial to investigate the performance of an open-source controller to provide efficient traffic routing, leading to improved utilization of resources for the enhanced performance metrics of the network. The paper presents an implementation of SDN architecture using an open-source RYU SDN controller for the network traffic analysis. The proposed work evaluates the performance of SDN architecture based custom network topology for a node to node performance parameters such as bandwidth, throughput and roundtrip time, etc. The simulation results exhibit an improved performance of the proposed work in comparison to the existing default network topology for SDN.

  相似文献   

14.

Owing to the spectrum scarcity and energy constrained devices in wireless networks arises the demand for an efficient spectrum sensing technique which improves both sensing performance and energy efficiency for cognitive radio networks. This paper proposes a cooperative spectrum sensing scheduling (CSSS) scheme for heterogeneous multi-channel cognitive radio networks with the objective of finding an efficient sensing schedule to enhance network utility while keeping the energy depletion at a lower level. We start with formulating the CSSS problem as an optimization problem, which captures both the energy-performance and performance opportunity trade-offs. We prove that the formulated CSSS problem is non-deterministic polynomial hard (NP-hard). To tackle the higher computational complexity of the formulated problem, we propose a greedy-based heuristic solution, which produces a sub-optimal result in polynomial time. To reduce energy consumption during spectrum sensing, we make secondary users to adaptively decide on the sensing duration based on the received signal-to-noise ratio (SNR), where higher SNR leads to lower sensing duration and vice-versa. For enhancing network throughput, SUs sense multiple channels in the order of their suitability for data transmission to explore as many numbers of channels as possible within the permitted maximum sensing time. We consider erroneous nature of reporting channel to make the cooperative decision robust against errors during reporting. Simulation based results show the effectiveness of the proposed scheme in terms of utility, energy overhead, and the number of channels explored compared to similar schemes from literature.

  相似文献   

15.
A new scalable interconnection topology suitable for massively parallel systems called the spanning bus connected hypercube (SBCH) is proposed. The SBCH uses the hypercube topology as a basic building block and connects such building blocks using multidimensional spanning buses. In doing so, the SBCH combines positive features of both the hypercube (small diameter, high connectivity, symmetry, simple routing, and fault tolerance) and the spanning bus hypercube (SBH) (constant node degree, scalability, and ease of physical implementation), while at the same time circumventing their disadvantages. The SBCH topology permits the efficient support of many communication patterns found in different classes of computation such as bus-based, mesh-based, tree-based problems as well as hypercube-based problems. A very attractive feature of the SBCH network is its ability to support a large number of processors while maintaining a constant degree and constant diameter. Other positive features include symmetry, incremental scalability, and fault-tolerance. An optical implementation methodology is proposed for SBCH. The implementation methodology combines both the advantages of free space optics with those of wavelength division multiplexing techniques. A detailed analysis of the feasibility of the proposed network is also presented  相似文献   

16.
A virtual private network (VPN) is a private data network that uses a nonprivate data network to carry traffic between remote sites. An “Intranet VPN” establishes network layer connectivity between remote Intranet sites by creating an IP overlay network over the nonprivate network, using various tunneling mechanisms. There are two approaches for establishing such tunnels: a “CPE-based approach” and a “network-based approach.” In the first approach, tunnels are established only between the CPE devices, whereas in the second approach tunnels are also established between the routers of the core nonprivate network. In this paper we address the problem of determining a CPE-based and a network-based layout of VPN tunnels while taking into account two factors: the cost of the links over which the VPN tunnels are established and the cost of the core routers that serve as end points for the VPN. We define related graph algorithm problems, analyze their complexity, and present heuristics for solving these problems efficiently  相似文献   

17.
MERIT is a framework that can be used to assess routing protocols in mobile ad hoc networks (manets). It uses the novel concept of a shortest mobile path (SMP) in a mobile graph, a generalization of the shortest path problem for mobile environments. As a measure for routing protocol assessment, we propose the mean ratio of the cost of the route used by a protocol to the cost of the optimal mobile path for the same network history. The cost reflects that the route used in a session can change over time because of network dynamics such as topology changes. The aim is for the ratio to be an abstract, inherent measure of the protocol that is as implementation-independent as possible. The MERIT spectrum, which is the ratio expressed as the function of some parameters of interest, is a characterization of protocol effectiveness. MERIT, for MEan Real vs. Ideal cosT, provides a scalable assessment framework: rather than comparing performance measures of different protocols directly, we compare a protocol to the optimal solution. That is, rather than forcing the comparison to be in the same system, it is done once for each protocol in its own environment. Furthermore, we show that there is an efficient algorithm to solve the underlying SMP problem for important cases, making the approach practically feasible. We also investigate generalizations of and extensions within the MERIT framework. We show that the MERIT framework is rich, with much wider generality and potential applicability than assessing routing protocols.  相似文献   

18.
Wireless sensor networks (WSNs) have many micro devices that are easy to capture. In node capture attacks, the adversary physically captures sensors and extracts all information including key information from their memories, trying to compromise the system's security protection. However, the robust and random nature of many WSN security designs makes it difficult to compromise the system even with the capture of some sensors. In this paper, we approach WSN security from an adversarial point of view and investigate low‐cost and efficient algorithms to identify sensors in a WSN in the shortest time with the lowest cost. Instead of randomly capturing sensors, an intelligent attacker should choose the next target based on the known topology so far. Because the identification of such has been proven to be NP‐hard (non‐deterministic polynomial‐time hard), we propose to transform the problem into a set covering problem and develop a greedy minimum cost node capture attack algorithm (MCA) to lower cost of attack. Extensive simulations have been implemented to evaluate the performance of MCA and to compare it with several related schemes. It is shown that MCA lowers the cost of compromising WSNs by 16%. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

19.
谢胜军  殷锋  周绪川 《通信学报》2013,34(Z2):16-83
分析了高校校园网拓扑结构现存的问题,依据扁平化的大二层网络设计思路,提出了一种以BARS设备为网络核心的有线无线一体化网络拓扑结构。该拓扑结构能够最大限度地保护现有投资,只需在核心层增加BRAS设备,将原有交换机全部作为二层设备上联至BRAS即可。利用BRAS设备的性能和特性完成了内外网用户的隧道建立、隔离、流控、故障定位等精细化管理;利用大二层结构特性实现网内IPv4/IPv6双栈及多播业务,各种品牌有线无线设备的统一管理。该拓扑结构应用在实际网络环境中时BRAS设备必须进行热备,无线AC需要支持本地转发。  相似文献   

20.
This article addresses the problem of finding a static virtual topology design and flow routing in transparent optical wavelength division multiplexing networks under a time-varying (multihour) traffic demand. Four variants of the problem are considered, using fixed or dynamically adaptable (meaning variable) flow routing, which can be splittable or unsplittable. Our main objective is to minimize the number of transceivers needed which make up for the main network cost. We formulate the problem variants as exact integer linear programs (ILPs) and mixed ILPs. For larger problem instances, we also propose a family of heuristics based on the concept of domination between traffic matrices. This concept provides the theoretical foundations for a set of techniques proposed to reduce the problem complexity. We present a lower bound to the network cost for the case in which the virtual topology could be dynamically reconfigured along time. This allows us to assess the limit on the maximum possible benefit that could be achieved by using optical reconfigurable equipment. Extensive tests have been conducted, using both synthetically generated and real-traced traffic demands. In the cases studied, results show that combining variable routing with splittable flows obtains a significant, although moderate, cost reduction. The maximum cost reduction achievable with reconfigurable virtual topologies was shown to be negligible compared to the static case in medium and high loads.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号