Optimal Path Selection for Minimizing the Differential Delay in Ethernet Over SONET

Size: px
Start display at page:

Download "Optimal Path Selection for Minimizing the Differential Delay in Ethernet Over SONET"

Transcription

1 Optimal Path Selection for Minimizing the Differential Delay in Ethernet Over SONET Satyajeet huja and Marwan Krunz Dept. of ECE University of rizona Turgay Korkmaz Dept. of Computer Science University of Texas at San ntonio bstract We consider the problem of minimizing the differential delay in a virtually concatenated Ethernet over SONET (EoS) system by suitable path selection. In such a system, a service provider can dynamically add virtual channels to or drop them from a Virtually Concatenated Group (VCG). new virtual channel can be added to the VCG provided that the differential delays between the new channel and the existing ones are within a certain limit that reflects the available memory buffer of the EoS system. We model the problem of finding such a virtual channel as a constrained path selection problem, where the delay of the required (feasible) path is constrained not only by an upper bound but also by a lower bound. We consider two cases: exactly known link delays and imprecisely known link delays. For the first case, we propose two algorithms for finding a feasible path. The first is based on a link metric that linearly combines the original link weight (the link delay) and its inverse. The theoretical properties of such a metric are studied and used to develop a highly efficient heuristic for path selection. The second algorithm is a backward-forward heuristic in which the nodes in the graph are prelabeled during the backward phase. The labels are then used in the forward phase to identify a feasible path. For the imprecise-link-state case, the problem is modeled as one of finding the most probable feasible path, where link weights are random variables. backward-forward heuristic is proposed which again uses prelabeling of the graph in the backward direction followed by a forward search that attempts to minimize an objective function. Simulations are conducted to evaluate the performance of the proposed algorithms and to demonstrate the advantages of the probabilistic path selection approach over the classic trigger-based approach. Index Terms Ethernet over SONET/SDH, virtual concatenation, differential delay, path selection. I. INTRODUCTION Much of the global network infrastructure in place today is based on the SONET/SDH technology [],[2]. This technology uses a bandwidth hierarchy indicated by STS-n, where n =, 3, 2, 48,.... The basic unit in this hierarchy is the STS- channel, which corresponds to 5.84 Mbps of bandwidth. SONET was originally developed to support voice traffic. s the demand for data services (IP and Ethernet traffic) continues This work was supported by NSF under grants NI , NI , and NI , and by the Center for Low Power Electronics (CLPE) at the University of rizona. CLPE is supported by NSF (grant # EEC ), the State of rizona, and a consortium of industrial partners. ny opinions, findings, conclusions, and recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF. n abridged version of this paper was presented at the International Conference on Computer Communications and Networks (ICCCN), Chicago, US, Oct. -3, to rise, there is a need to provide cost-effective solutions for supporting such services over the SONET/SDH infrastructure. Figure depicts the various possible approaches for transporting IP data over SONET. The first approach is to use IPover-TM-over-SONET using L5 (TM daptation Layer 5) [3]. One problem with this approach is its excessive protocol overhead, which can be as high as 25% of the used bandwidth. Packet-over-SONET (POS) addresses this problem by eliminating TM encapsulation and instead using the Pointto-Point Protocol (PPP) [], [4]. Under POS, PPP-encapsulated IP packets are framed using the High-Level Data Link Control (HDLC) protocol and are mapped into SONET. The basic function of HDLC is to provide framing, i.e., delineation of the PPP-encapsulated IP packets across the synchronous transport link. nother method for transporting IP data over SONET is to use the Generic Framing Procedure (GFP), which encapsulates Ethernet frames and then maps them into SONET frames [5]. GFP supports all the basic functions of a framing procedure, including frame delineation (needed to facilitate the transport of bursty traffic over TDM-like systems). It is currently considered the most popular framing procedure for supporting Ethernet-over-SONET (EoS). Fig.. GFP IP PPP SONET / SDH L5 Ethernet HDLC TM Methods for transporting IP traffic over SONET. EoS has been gaining popularity in point-to-point and multipoint LN interconnections [6]. It enables network providers to use their existing SONET infrastructure to provide new data services over regional and national geographic areas. Such services include Ethernet-private-leased-line services that provide dedicated point-to-point bandwidth and Ethernet-

2 virtual-private-line services that use statistical multiplexing to share bandwidth among various streams. EoS with virtual concatenation [] utilizes the existing SONET infrastructure, with only edge nodes (source and destination) being required to support such concatenation. By using the LCS (Link Capacity djustment Scheme) [7], virtual concatenation facilitates dynamic link upgrade and on-demand bandwidth adjustment without requiring additional hardware. In virtual concatenation, several STS-n channels, belonging to possibly different Optical Carriers (OCs), can be concatenated between the source and destination to support Ethernet connectivity. These channels, which we will simply refer to as virtual channels (VCs), form a Virtually Concatenated Group (VCG). The absolute difference between the end-to-end delay of the new VC and the delay of each existing VC in the VCG must not exceed some upper bound that is determined by the amount of high-speed memory available at the destination node. In this case, the new VC is said to be feasible. In this paper, we consider a point-to-point EoS LN application and focus on the problem of selecting a feasible VC to be added to an existing VCG. First, we consider the path selection problem under the assumption of exact linkstate (delay) information. The problem in this case reduces to that of finding a path whose delay lies between two strictly positive bounds, C and C 2. We show that this problem is NPcomplete, and accordingly propose two approximate solutions to it. We then consider the case when the link delays are not exactly known to the source node. In practice, several factors contribute to such imprecision [8], [9], [0], including information staleness due to the periodic nature of link-state protocols (e.g., OSPF) and sampling errors. lso, there may be cases where some of the link delays are not available because the participating nodes are managed by different Network Management Systems (NMS) that do not share link information between each other for policy reasons (in these cases, the physical distance between any two nodes can be used as a course estimate of the link delay). s demonstrated in [0], relying on outdated information and considering it as exact can significantly degrade the performance of a path selection algorithm. We cope with link imprecision by modeling link delays probabilistically, and develop a highly efficient heuristic for finding the most probable feasible VC subject to the constraints C and C 2. The rest of the paper is organized as follows. In Section II, we describe virtual concatenation in detail. We algorithmically formulate the problem of adding a VC to a VCG in Section III, and present our path selection algorithms for the case of exact link delays. In Section IV, we formulate the problem of finding the most probable feasible path under inaccurate linkstate information and provide a heuristic for finding such a path. Section V presents simulation results. Finally, the paper is concluded in Section VI. II. VIRTUL CONCTENTION IN EOS SYSTEMS To motivate the significance of virtual concatenation in EoS systems, let us consider a typical scenario of interconnecting two Gigabit Ethernet LNs over a SONET network. The smallest SONET payload slot that can carry such traffic is STS-48 (2.5 Gbps); this results in bandwidth wastage of about 60%. solution to avoid this wastage is to use concatenated payloads. Two methods for concatenation are available []: Contiguous and Virtual. Both methods provide aggregate bandwidth in multiples of VCs at the termination. The difference between the two is in the way in which the total bandwidth of the concatenated VCs is accumulated. Contiguous concatenation maintains bandwidth along the same transport path. Constituent VCs of the concatenated payload cannot be individually and independently routed. ny bandwidth upgrade, i.e., the addition of an VC, has to be done along the same path [2]. If no VC is available over any of the links along this path, then the upgrade cannot be done. In contrast, virtual concatenation splits the aggregate bandwidth into several VCs that are independently established between the two endpoints, as shown in Figure 2. The routes of 0/00BT Ethernet Corporate LN xsts n TIME SEQ No PYLOD STMP =T = 0 DT SONET End Node TIME STMP =T SEQ No PYLOD = DT new STS n Fig. 2. PTH (D ) SONET Network PTH2 (D 2 ) xsts n TIME SEQ No PYLOD STMP =T2 = 0 DT EoS setup with virtual concatenation. SONET End Node 0/00BT Ethernet TIME SEQ No PYLOD STMP = DT =T3 Corporate LN new STS n these VCs may or may not overlap. Whereas contiguous concatenation requires concatenation functionality at each network element, virtual concatenation requires such functionality only at the path termination. Virtual concatenation in EoS systems is performed by the virtual concatenation protocol. This protocol allows the bandwidth demand to be split into k portions. The source node sends traffic down k members of the VCG and the sink node reconstructs the data stream back. For example, a - Gbps demand can be mapped into seven STS-3 channels (or 2 STS- channels), incurring only 8% wastage. VCG members are allowed to be on noncontiguous time slots and they can be independently routed. Data are byte-interleaved over the multiple VCs of the VCG, i.e., if the first byte is transmitted on the rth VC, then the next byte is transmitted on the (r+)th VC, and so on. Control packets that contain necessary information for reassembling the original data stream are inserted in some of the currently unused SONET header fields. This information includes the sequence order of channels and a frame number, which is used as a time-stamp []. The receiving endpoint is responsible for re-assembling the original byte stream and compensating for the differential delay between different paths taken by the VCs. The compensation for such a delay is implemented using a very highspeed memory, which stores the payload bytes of VCs from successive frames. When the frames of all the VCs with the same frame number (i.e., time-stamp) arrive at the receiving node, the Ethernet packets can be extracted from them. It is obvious that the higher the differential delay, the larger the high-speed memory requirement.

3 III. PTH COMPUTTION UNDER EXCT LINK DELY. Problem Formulation INFORMTION Consider a SONET network with each multiplexer having a fully nonblocking cross-connect. Suppose that a new VC is to be added to an existing VCG that already contains m VCs with respective path delays D, D 2,..., D m. The delay associated with the newly added VC (D new ) should satisfy: max D i D new. () i m Figure 3 shows two examples for m = and m = 2. In (a) m = 0 (b) m = 2 C C2 D 0 C C 2 Fig. 3. Differential delay problem for a VCG that already contains: (a) one path, and (b) two paths. general, D new should satisfy C D new C 2 for some positive constants C and C 2 that depend on D, D 2,...,D m, and. To determine an appropriate path for the new VC, we start by removing from the network graph all the links whose available bandwidth is less than the bandwidth of the prospective VC. In the pruned graph, each link (i, j) is associated with a delay parameter w(i, j). Now we need to find a feasible path; one that satisfies the delay bound in (). In this section, we assume that the w(i, j) s are exactly known. The underlying problem is modeled as follows. Problem : Two-Sided Constrained Path (TSCP) Problem: Consider a network G(V, E), where V is the set of nodes and E is the set of links. Each link (u, v) E is associated with an additive parameter w(u, v) 0. Let C and C 2 be any two positive numbers, with C < C 2. The problem is to find a path P from s to t such that C W (P (s, t)) = D D2 (u,v) P (s,t) w(u, v) C 2. (2) This problem is actually a mixture of both the shortest path problem and the longest path problem. If only the upper bound is considered, then the problem is solved by using Dijkstra s shortest path algorithm. If only the lower bound is considered, then the problem is equivalent to finding the longest path in the network, which is known to be NP-complete. We now prove that the TSCP problem is also NP-complete. Theorem : TSCP problem is NP-complete. Proof: Consider the corresponding decision problem for TSCP, where the goal is to find if there exists a path P from s to t which satisfies (2). First, we show that TSCP belongs to the class of NP problems. The certificate for the verification algorithm is chosen as the path P (s, t) itself. The verification algorithm affirms that C W (P (s, t)) C 2 and that P (s, t) is a path in the network. This verification can be performed in polynomial time. We prove that TSCP is NP-hard by showing that the NPcomplete hamiltonian path problem (HM-PTH) [] can be reduced in polynomial time to the TSCP problem. The reduction approach takes as input an instance {G(V, E), s, t} of the HM-PTH problem. For a graph G(V, E), let C = n, C 2 = n, and w(i, j) = (i, j) E, where n = V. The output of the reduction algorithm {G(V, E), s, t, C = n, C 2 = n, w(i, j) = } is an instance of the TSCP problem. We now show that the output of this instance is yes (positive), if and only if the output of HMPTH on {G(V, E), s, t} is also yes (positive). The output of the TSCP algorithm will be a path P with n W (P ) n. Since we have fixed w(i, j) = (i, j) E, then P will traverse every node exactly once and hence is a hamiltonian path. On the other hand, suppose that G has a HM-PTH Q from s to t. Then, Q will have exactly n hops. ccordingly, W (Q) = (i,j) Q w(i, j) = n, which also satisfies n W (Q) n and is thus a solution to the TSCP problem. The reduction only requires fixing the values of w(i, j) (i, j) E, C, and C 2, and thus can be performed in polynomial time. B. lgorithms B. K-Shortest-Path (KSP) lgorithm: Researchers have extensively investigated the KSP problem and proposed various algorithmic solutions of varying computational complexities (e.g., [2], [3]). KSP algorithm tries to find the K lowest-cost paths in the network. It starts from the source node and explores the underlying graph by maintaining (at least) the best K (sub)paths at each node. For the TSCP problem, we can iteratively use a KSP algorithm with a sufficiently large K until a path whose cost is between C and C 2 is found. The algorithm terminates if it finds a feasible path or if all K returned paths are infeasible. large K renders the algorithm impractical, given the O(Kmlog(Kn)+ K 2 m) complexity of the KSP algorithm [4], where n is the number of nodes and m is the number of links. To avoid this highly complex solution, we propose two algorithms, one based on the KSP algorithm but with a modified link weight and the other based on the backward-forward heuristic. B.2 Modified-Link-Weight K-Shortest-Path (MLW-KSP) lgorithm: Our first algorithmic solution considers a Lagrangian (linear) composite of the link delay and its inverse as a basis for the optimization. This is similar to the Lagrangian solutions often used for multi-constrained path selection problems [5]. Formally, consider the following cost function for any path p from s to t: r(p) = αw (p) + W (p) where α > 0. Suppose there is an algorithm X that minimizes the cost function (3) for a given α > 0. The following theorem shows that if the graph contains a feasible path, then algorithm X will find it using α = C C 2. (3)

4 Theorem 2: Consider the TSCP problem. ssume that there is at least one feasible path f in the network, i.e., C W (f) C 2. Let p be a path that minimizes the cost function r for α = C C 2. Then, C W (p ) C 2. Proof: ssume that p is not feasible. We have two cases to consider: (i) W (p ) < C, and (ii) W (p ) > C 2. Consider the first case. Let W (p ) = C ɛ, where 0 < ɛ < C. Since algorithm X returns the path p, it must be true that r(p ) r(f). That is, W (P) 2 Feasibility region W (p ) + C C 2 W (p ) W (f) + C C 2 W (f). (4) Because C W (f) C 2, the right-hand side of (4) is bounded above by C + C 2. Then, the following must be true (C ɛ) + C C 2 (C ɛ) +. C C 2 Further manipulation of the above equation leads to the following: (C ɛ) 2 + C C 2 C C 2 (C ɛ) C2 2ɛC + ɛ 2 + C C 2 C C 2 (C ɛ) C2 2ɛC + ɛ 2 + C C 2 (C ɛ) C + C 2 C + C 2 C C 2 C + C 2 which can be reduced to C ɛ C 2. But this cannot be true because we know that C C 2 and 0 < ɛ < C. For the second case, let W (p ) = C 2 + ɛ, where ɛ > 0. Using a similar argument to the one above, we end up with C 2 + ɛ C. This cannot be true either, because we know that C C 2. So W (p ) should be less than or equal to C 2. Unfortunately, there is no exact polynomial-time algorithm that can minimize the cost function (3). Hence, one has to rely on approximations. We now introduce one such approximate solution to the minimization of the cost function r. Let w (i, j) = w(i, j) and w 2 (i, j) =. For a path P from s to t, let W k (P ) = (i,j) P w(i,j) w k (i, j), k =, 2. graphical representation of the paths from s to t with respect to the cost metrics W (.) and W 2 (.) is shown in Figure 4. The shaded region in the figure contains all feasible paths that satisfy (2). The plot of W (P ) corresponds to the nonlinear component in the cost function (3). Notice that all paths from s to t lie in the region above this curve because W (P ) W 2(P ), which follows from the inequality w(i,j) for w(i, j) > 0. Hence, by w(i,j) (i,j) P (i,j) P using an appropriate linear combination of the link weights w and w 2, a highly efficient heuristic can be developed for minimizing r. Define the following link cost function: l(i, j) = αw (i, j) + w 2 (i, j) (5) Fig. 4. /C /C 2 C C 2 /W (P) W (P) Geometric representation of paths in the (W,W 2 ) parameter space. where α > 0. Minimization of this function is illustrated in Figure 4, where each dashed line represents a contour of equalcost paths. The search for a path is done by sliding the line from the origin outwards towards the top-right corner of the figure. The key issue here is how to set the value of α, which determines the slope of the search line. Clearly, the best value should allow the sliding line to touch the curve that lowerbounds the feasibility region. Because the curve meets this region at the points (C, C ) and (C 2, C 2 ), with corresponding slopes of C 2 the range [ C 2 2 and C 2 2, C 2, respectively, the best value of α falls in ]. From Theorem 2, a good choice of α is C C 2. Using Dijkstra s algorithm with respect to (w.r.t.) the cost function (5), we can compute a path P with path metric: L(P ) = α w (u, v) + w 2 (u, v) (u,v) P (u,v) P = αw (P ) + W 2 (P ). If P is feasible, i.e., C W (P ) C 2, the algorithm terminates. Otherwise, we use the KSP algorithm with the link metric in (5) to continue the search. The algorithm terminates when a feasible path is found or K paths have been returned. B.3 Backward-Forward (BF) lgorithm: lthough the MLW-KSP algorithm provides a significant improvement over the standard KSP (as shown in the simulations), it sometimes requires a large number of iterations before returning a feasible path. We now present another algorithm, called the backwardforward algorithm, for the TSCP problem. The basic idea of the BF algorithm is derived from the H MCOP algorithm [6] for the multiconstraint path selection problem. feasible s t path is heuristically determined at any node u based on the already traversed segment s u and the estimated remaining segment u t. The estimated remaining segment u t is taken as the shortest path from u to t w.r.t. w(.,.). Since the algorithm considers complete paths, it can foresee several paths before reaching the destination. If one of the foreseen paths is feasible, the algorithm terminates. The BF algorithm operates in two phases: backward phase (from

5 t to all other nodes), which is used to estimate the cost of the remaining segment, and a forward phase, which is used to find the most promising path in terms of the nonlinear cost function (3). Figure 5 shows the basic operation of the algorithm. In the backward phase, every node is pre-labelled with the shortestpath distance from itself to node t. The forward step starts from the source s and tries to determine a path that is most likely to be feasible. s S[u] u lready explored nodes Fig. 5. w(u,v) D[v] v Unexplored nodes Exploring the graph in the BF algorithm. pseudocode for the algorithm is shown in Figure 6. For each node u, the algorithm maintains the following labels: the cost of the shortest path from u to t (D[u]), the predecessor of u on the shortest path from u to t (π r [u]), cost of the already travelled segment from s to u (S[u]), and the predecessor of u on this already travelled segment (π s [u]). BF algorithm(g(v, E), s, t, w(.), C, C 2 ). D=Reverse Dijkstra(G, t, w(e)) 2. if D[s] > C 2 3. return: No feasible path 4. else 5. T = Forward Heuristic(G, s, t, w(e), C, C 2, D) 6. if T > C and T < C 2 7. return: T is feasible path 8. else 9. return: T is infeasible path Fig. 6. Pseudocode for the BF algorithm. In the backward direction, the algorithm uses the Reverse Dijkstra s algorithm (RD) [7] to find the shortest path to t w.r.t. w(.,.) from every node u. Initially, we set D[u] = and π r [u] = NIL u V. The algorithm then starts from t by setting D[t] = 0. It explores the graph and eventually finds the shortest path from u to t u V. The algorithm returns an array D that contains the weights of the shortest paths from u to t u V. Before proceeding further, the algorithm checks whether D[s] > C 2. If so, then there is no feasible path and the algorithm terminates. Otherwise, the algorithm proceeds to the forward phase. pseudocode for the forward phase is shown in Figure 7. The forward phase is essentially a modified version of Dijkstra s algorithm. This search uses the information provided by RD to find the next node for the already travelled path segment. Consider a search that has already traversed from t s to u, as shown in Figure 5. The next node v is determined from the unexplored graph by finding the node that minimizes the cost function (3) for the path s u v t. The weight of the path from v to t is taken as the cost of the shortest path w.r.t. w(.,.) provided by RD. Forward Heuristic(G(V, E), s, t, w(.), C, C 2, D). for all i V, i s, do S[i] = π s [i] = NIL end for 2. S[s] = 0, α = C C 2 3. Insert Heap(s, α(s[s] + D[s]) + /(S[s] + D[s]), Q) 4. while Q is not empty, 5. u = ExtractMin(Q) 6. if (u == t) return S[t] 7. for each edge (u, v) outgoing from u, do 8. if (C < S[u] + w(u, v) + D[v] < C 2 ) return S[u] + w(u, v) + D[v] 9. if {α(s[v] + D[v]) + /(S[v] + D[v])} > {α(s[u] + w(u, v) + D[v]) + /(S[u] + w(u, v) + D[v])} 0. S[v] = S[u] + w(u, v). π s [v] = u 2. Insert Heap(v, α(s[v] + D[v]) + /(S[v] + D[v]), Q) end for Function u = ExtractMin(Q) removes and returns the vertex u in the heap Q with the least key value. Function Insert Heap(v, x, Q) inserts the node v in the heap Q with a key value x. If the node is already present in the heap then this function decreases its key to x. Fig. 7. Pseudocode for the forward phase of the BF algorithm. To improve the performance, the forward phase can be used with a KSP implementation of Dijkstra s algorithm presented. IV. PTH COMPUTTION UNDER INCCURTE DELY. Problem Formulation INFORMTION To model the uncertainties in the delay parameter, we follow a probabilistic approach, where we assume that for each link (u, v) the delay parameter w(u, v) is a nonnegative random variable with mean µ(u, v) and variance σ 2 (u, v). We assume that link delays are mutually independent. Each node u can compute the parameters µ(u, v) and σ 2 (u, v) associated with its outgoing links and disseminate them throughout the network. For more discussion on the feasibility and effectiveness of capturing and disseminating such delay information, we refer the reader to [0]. We use the same probabilistic model that was used in [0] to deal with the most-probable delay-constrained path (MP-DCP). In our work, however, the

6 problem at hand involves both upper and lower bounds. The problem can be formally stated as follows. Problem 2: Most-Probable Two-Sided Constrained Path (MP-TSCP) Problem: Consider a network G(V, E). Each link (u, v) E is associated with an additive parameter w(u, v). ssume that w(u, v) is a nonnegative random variable with mean µ(u, v) and variance σ 2 (u, v). Let be the set of all paths from s to t. For a path p, let W (p) = (u,v) p w(u, v). Given two constraints C and C 2, the problem is to find a path that is most likely to satisfy both constraints. Specifically, the problem is to find a path r such that for any other path p from s to t, π(r ) π(p) (6) where π(p) = Pr[C W (p) C 2 ] for any path p. Before presenting our solution to the MP-TSCP problem, we first briefly discuss how to compute the probability measure π. Without loss of generality, we assume that the probability density function (pdf) of w(u, v) is continuous and differentiable over some domain (a, b). The smoothness assumption, which is satisfied by many distributions, enables us to apply the central limit theorem (CLT) approximation (see [8, ]), which results in a path delay that is approximately normally distributed. Note that functions with cutoffs, such as the uniform distribution, are also smooth functions. The CLT approximation also holds for heavy-tailed distributions (e.g., lognormal) as long as they have a finite variance. For a given path p from s to t, let µ(p) = (u,v) p µ(u, v) and σ 2 (p) = (u,v) p σ2 (u, v). Then π(p) is approximately given by π(p) F (C 2, µ(p), σ 2 (p)) F (C, µ(p), σ 2 (p)) = Φ(C 2, C, µ(p), σ 2 (p)) where F (x, µ(p), σ 2 (p)) is the cumulative distribution function (CDF) of a Gaussian random variable with mean µ(p) and variance σ 2 (p) evaluated at x. For a path p, µ(p) and σ 2 (p) are exactly known at the source node. The Gaussian CDF can be evaluated with sufficient accuracy using tables [9]. Hence, π(p) can be evaluated by O() lookups from the table of a Gaussian CDF. mong all paths from s to t, we need to find a path that maximizes π(p) or, equivalently, minimizes π(p). B. Backward Forward lgorithm Under Inaccurate Link-State Information (BF Inaccurate) We now present a heuristic solution for MP-TSCP, which uses the same philosophy of the BF algorithm discussed in Section III. Each node u maintains the following labels: D[u] = {D [u], D 2 [u]}, where D [u] is the mean and D 2 [u] is the variance of the shortest path from u to t w.r.t. µ; E[u] = {E [u], E 2 [u]}, where E [u] is the mean and E 2 [u] is the variance of the shortest path from u to t w.r.t. σ 2 ; π s [u], the predecessor node of u on the already travelled segment s u; µ(s u) and σ 2 (s u); mean and variance of the already travelled segment s u. The feasible path s t is heuristically determined at any node u based on the already travelled segment s u and the estimated remaining segment u t. This remaining segment is estimated either from the shortest path w.r.t. variance or the shortest path w.r.t. mean from u to t, based on which of these has the smaller π(p) value. Since the algorithm considers complete paths, it can foresee several paths before reaching the destination. Let r be the shortest u t path w.r.t. µ, i.e., D [u] = (u,v) r µ(u, v) and D 2[u] = (u,v) r σ2 (u, v). Let q be the shortest u t path w.r.t. σ 2, i.e., E [u] = (u,v) q µ(u, v) and E 2 [u] = (u,v) q σ2 (u, v). Similar to the BF algorithm, BF Inaccurate has two phases: backward phase from t to all the nodes to prelabel all the nodes with D [u], D 2 [u], E [u], and E 2 [u] using RD, and a forward phase to find the most likely path that minimizes π. pseudocode for the BF Inaccurate algorithm is presented in Figure 8. RD is executed first over the graph w.r.t. µ to calculate D [u] and D 2 [u], and then w.r.t. σ 2 to calculate E [u] and E 2 [u]. The forward phase (Figure 9) is a modified version of Dijkstra s algorithm. It uses the information provided by the RD to find the next node from the already traveled segment. Consider a search that has already traversed from s to u. The next node v is determined from the unexplored graph by finding the node that has the smallest cost function π for the path s u v t. Note that in this case, for each such node v, there are two possible paths from v to t, as calculated in the backward step. BF Inaccurate(G(V, E), s, t, µ(e), σ 2 (E), C, C 2, w (.)) a. D=Reverse Dijkstra(G, t, µ(e)) b. E=Reverse Dijkstra(G, t, σ 2 (E)) 2. p = Fwd Inaccurate(G, s, t, µ(e), σ 2 (E), C, C 2, D, E) 3. if C < (i,j) p w (i, j) < C 2 4. return: p is feasible 5. else 6. return: p is infeasible Fig. 8. Pseudocode for the main loop of BF Inaccurate. To improve its performance, the forward heuristic can be used with a KSP implementation of Dijkstra s algorithm. The series of K paths can be tried for establishing the connection and if the differential delay after establishing the path satisfies the constraint (), then the path returned by the algorithm is feasible. V. SIMULTION RESULTS In this section, we describe the simulation model and study the performance of the algorithms proposed in Sections III and IV. In our simulations, a network of N nodes is generated randomly using Waxman s model [20]. The link weights w(i, j), the source and destination nodes, and the constraints C and C 2 are randomly generated.. TSCP with Exact Link Delay Information We compare the performance of the KSP, MLW-KSP, and BF algorithms. First, we compare the KSP and MLW-KSP

7 Fwd Inaccurate(G, s, t, µ(e), σ 2 (E), C, C 2, D, E). for all i V, i s, S[i] = π s [i] = NIL 2. S[s] = 0, µ(s, s) = 0, σ 2 (s, s) = 0 3. Insert Heap(s, S[s], Q) 4. while Q is not empty, 5. u = ExtractMin(Q) 6. if (u == t) return: The path traversed s t 7. for each edge (u, v) outgoing from u, 8a. µ D (v) = µ(s u) + µ(u, v) + D [v] 8b. µ E (v) = µ(s u) + µ(u, v) + E [v] 9a. σ 2 D (v) = σ2 (s u) + σ 2 (u, v) + D 2 [v] 9b. σ 2 E (v) = σ2 (s u) + σ 2 (u, v) + E 2 [v] 0. if {S[v] > Φ(C 2, C, µ D (p), σ 2 D (p))} S[v] = Φ(C 2, C, µ D (p), σ 2 D (p)) π s [v] = u, µ(s v) = µ(s u) + µ(u, v) σ 2 (s v) = σ 2 (s u) + σ 2 (u, v) Insert Heap(v, S[v], Q). if {S[v] > Φ(C 2, C, µ E (p), σ 2 E (p))} S[v] = Φ(C 2, C, µ E (p), σ 2 E (p)) π s [v] = u, µ(s v) = µ(s u) + µ(u, v) σ 2 (s v) = σ 2 (s u) + σ 2 (u, v) Insert Heap(v, S[v], Q) Function u = ExtractMin(Q) removes and returns the vertex u in the heap Q with the least key value. Function Insert Heap(v, x, Q) inserts the node v in the heap Q with a key value x. If the node is already present in the heap then it decreases its key to x. Fig. 9. Pseudocode for the forward phase of the BF Inaccurate algorithm. algorithms in terms of the miss probability, ined as the probability that an algorithm cannot find a feasible path for the connection request under a given value of K. We then study the performance of the BF algorithm. We also compare the average number of iterations required to find a feasible path under the three algorithms. For each link (i, j), w(i, j) is sampled from a uniform distribution in the range [0, 50]. The values of C and C 2 fall into the following three cases: ) The shortest path between s and t w.r.t w(.,.) is greater than C 2. In this case, there is no feasible path. 2) The shortest path between s and t w.r.t w(.,.) is greater than C but less than C 2. This is a trivial case, as the shortest path w.r.t. w is a feasible solution. 3) The shortest path between s and t w.r.t w(.,.) is less than C. The third case is the nontrivial case and is the one considered in our simulations. ccordingly, C and C 2 are generated such that they are always greater than the length of the shortest path between s and t w.r.t. w(.,.). Specifically, we let C = W (p ) + + U(0..50) and C 2 = C + L, where p is the shortest path between s and t w.r.t. w(.,.), and and L are positive constants. Notice that L reflects the allowable differential delay. We first compare the performance of the KSP and MLW- KSP algorithms. Figures 0 and depict the miss probability of the two algorithms versus K for a network of 50 and 00 nodes, respectively. In both figures, we see that the MLW- Miss Probability KSP MLW KSP Iterations permitted Fig. 0. Miss probability vs. number of permitted iterations for KSP and MLW-KSP algorithms (N = 50, = 20, L = 00). Miss Probability KSP MLW KSP Iterations permitted Fig.. Miss probability vs. number of permitted iterations for KSP and MLW-KSP algorithms (N = 00, = 20, L = 00). KSP algorithm has a significantly lower miss rate than the KSP algorithm for the same computational cost. Figure 2 depicts the hit probability versus for the BF algorithm under various values of L and N and with only one permitted iteration during the forward phase (K = ). The plot shows that with only one iteration, the algorithm is able of finding a feasible path in more than 99% of the instances. We report the average number of iterations (average value of K) required to find a feasible path in the KSP, MLW-KSP, and BF algorithms. To obtain this average, we execute each algorithm with a very large K and terminate the algorithm

8 once it finds a feasible path. The results are shown in Table I. s increases, MLW-KSP algorithm performs much better (a) N = 50 KSP algorithm MLW-KSP algorithm BF algorithm TBLE I VERGE NUMBER OF ITERTIONS FOR DIFFERENT VLUES OF (L = 00, N = 00). than the KSP algorithm in terms of computational cost. This is actually expected because when is increased (i.e., constraints get far away from the cost of the shortest path), the KSP algorithm needs to consider more paths to reach the feasibility region, while the MLW-KSP algorithm immediately reaches that region via the modified link weights. The BF algorithm performs much better than the other algorithms and requires significantly fewer iterations to find the feasible path under all scenarios. This is attributed to the fact that BF algorithm works on complete paths and directly optimizes the nonlinear cost function in (3) (b) N = Fig. 2. (c) N = 200 Hit probability vs. for the BF algorithm. B. TSCP with Inaccurate Link Delay Information Next, we study the performance of the proposed BF Inaccurate algorithm. To demonstrate the effectiveness of this algorithm, we compare its performance with the classic trigger-based approach [0], in which the current delay value of a link is advertised once its absolute difference from the last advertised value exceeds a given threshold T. Clearly, the smaller the value of T, the more accurate is the estimate of the link delay and the better is the performance of the path selection algorithm. This performance gain, however, comes at the expense of higher advertisement overhead. For the triggerbased approach, we use the BF algorithm in Section III-B-3, executed using the last advertised link delay values (treated as exact from the standpoint of the BF algorithm). For a given topology, each link (i, j) is assigned a random delay w(i, j). We assume that w(i, j) is normally distributed with mean µ(i, j) and variance σ 2 (i, j). To produce heterogeneous link delays, we also randomize the selection of µ(i, j) and σ 2 (i, j) by taking µ(i, j) uniform[0, 50] and σ 2 (i, j) uniform[0, 50]. We fix the exact value of the link delay (w (i, j)) of a link (i, j) by sampling from a Gaussian distribution with mean µ(i, j) and variance σ 2 (i, j). Note that w is not provided to the BF Inaccurare algorithm and is merely used to check if the path returned by the algorithm is feasible. We set C and C 2 as in Section V-, where p is now the shortest path between s and t w.r.t. w (.,.). BF Inaccurate heuristically attempts to return the most probable feasible path r. Let W (r) be the weight of this path w.r.t. w (.,.). If C W (r) C 2, then we count this a hit. Using only one permitted iteration of the BF Inaccurate algorithm (i.e., K = ), Figure 3 shows the hit probability for various values of and L and a network of 50 and 00 nodes. Figure 4 shows the average number of iterations needed to find a feasible path when no limit is imposed on K. Notice that as

9 the differential delay increases, the average number of required iterations is reduced. Because the difference between the last advertised link delay w last (i, j) and the present (exact) link delay cannot be more than T, we have w last (i, j) uniform[w (i, j) T, w (i, j) + T ]. (7) We vary the value of and L to show the effectiveness of the BF Inaccurate algorithm compared with a trigger-based approach. Figure 5 shows the hit probability versus (T = 5) for a network of 00 nodes. We conducted simulations for other values of T and observed similar trends. BF Inaccurate, which uses a one-time advertised statistical information, performs significantly better than the trigger-based approach as is increased..02 verage number of Iterations required (a) N = verage number of Iterations required (a) N = 50 Fig (b) N = 00 verage number of iterations vs. for the BF Inaccurate algorithm T = Fig. 3. (b) N = 00 Hit probability vs. for the BF Inaccurate algorithm (Threshold based) (Threshold based) (BF_Inaccurate) (BF_Inaccurate) VI. CONCLUSIONS ND SUMMRY In this paper, we considered the problem of finding a feasible VC to be added to a VCG in an EoS system that uses virtual concatenation. The memory requirement of the termination node imposes an upper bound on the differential Fig. 5. Hit probability vs. for the BF Inaccurate algorithm and BF algorithm using trigger-based approach (T = 5, N = 00).

10 delay between the new VC and each existing VC of the VCG. We modeled the problem algorithmically as that of finding a path whose delay is both upper and lower bounded. The resulting TSCP problem is shown to be NP-complete. We proposed two efficient heuristic algorithms (MLW-KSP and BF) for the TSCP problem when link delays are exact. Both algorithms achieve a significant improvement in the required computational cost compared to a standard KSP algorithm. The BF algorithm was found particularly efficient, often requiring only one iteration to return a feasible path. For the case of inaccurate link-state information, we modeled the problem as that of finding the most probable path that satisfies the two bounds. We proposed the BF Inaccurate algorithm for this case and verified its performance by comparing it with the standard trigger-based approach. Simulations indicate that BF Inaccurate achieves significant performance improvements over the trigger-based approach. REFERENCES [] ITU-T Standard G.707, Network node interface for the synchronous digital hierarchy, [2] NSI T , Synchronous optical network (SONET): Basic description including multiplexing structure, rates and formats, 200. [3] IETF RFC 577, Classical IP and RP over TM, June 994. [4] IETF RFC 265, PPP over SONET/SDH, June 999. [5] ITU-T Standard G.704, Generic framing procedure, Feb [6] V. Ramamurti, J. Siwko, G. Young, and M. Pepe, Initial implementations of point-to-point Ethernet over SONET/SDH transport, IEEE Communications Magazine, vol. 42, pp , [7] ITU-T Standard G.7042, Link capacity adjustment scheme for virtually concatenated signals, 200. [8]. Shaikh, J. Rexford, and K. G. Shin, Evaluating the impact of stale link state on quality-of-service routing, IEEE/CM Transactions on Networking, vol. 9, no. 2, pp , pril 200. [9] D. H. Lorenz and. Orda, QoS routing in networks with uncertain parameters, IEEE/CM Transactions on Networking, vol. 6, no. 6, pp , Dec 998. [0] T. Korkmaz and M. Krunz, Bandwidth-delay constrained path selection under inaccurate state information, IEEE/CM Transactions on Networking, vol., no. 3, pp , June [] Michael R. Garey and David S. Johnson, Computers and Intractability: Guide to the Theory of NP-Completeness, W. H. Freeman, [2] Gang Liu and K. G. Ramakrishnan, *prune: n algorithm for finding k shortest paths subject to multiple constraints, Proceedings of the IEEE INFOCOM Conference, pp , 200. [3] G. Eppstein, Finding the k shortest paths, Proceedings of the 35th nnual Symposium on Foundations of Computer Science, vol., pp , Nov 994. [4] E. I. Chong, S. R. Sanjeev Rao Maddila, and S. T. Morley, On finding single-source single-destination shortest paths, The Seventh International Conference on Computing and Information (ICCI 95), pp , July 995. [5] Fernando Kuipers, Turgay Korkmaz, Marwan Krunz, and Piet Van Mieghem, n overview of constraint-based path selection algorithms for QoS routing, IEEE Communications Feature Topic on IP-Oriented Quality of Service (QOS), pp , Dec [6] T. Korkmaz and M. Krunz, Routing multimedia traffic with QOS guarantees, vol. 5, pp , Sep [7] R. K. huja, T. L. Magnanti, and J. B. Orlin, Network flows: Theory, lgorithm, and pplications, Prentice Hall Inc., 993. [8] D. E. McDysan, QoS & traffic management in IP & TM networks, McGraw-Hill, [9] thanasios Papoulis and S. Unnikrishna Pillai, Probability, Random Variables and Stochastic Processes, McGraw-Hill Higher Education, [20] B. M. Waxman, Routing of multipoint connections, IEEE Journal on Selected reas in Communications, vol. 69, pp , Dec 988.

Cross-Virtual Concatenation for Ethernet-over-SONET/SDH Networks

Cross-Virtual Concatenation for Ethernet-over-SONET/SDH Networks Cross-Virtual Concatenation for Ethernet-over-SONET/SDH Networks Satyajeet S. Ahuja and Marwan Krunz {ahuja,krunz}@ece.arizona.edu Dept. of Electrical and Computer Engineering, The University of Arizona.

More information

Cross-Virtual Concatenation for Ethernet-over-SONET/SDH Networks

Cross-Virtual Concatenation for Ethernet-over-SONET/SDH Networks Cross-Virtual Concatenation for Ethernet-over-SONET/SDH Networks Satyajeet S. Ahuja and Marwan Krunz Dept. of Electrical and Computer Engineering, The University of Arizona {ahuja, krunz}@ece.arizona.edu

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

Quality of Service Routing

Quality of Service Routing Quality of Service Routing KNOM Tutorial 2004, Jeju, Korea, Nov. 4-5, 2004. November 5, 2004 Kwang-Hui Lee Communication Systems Lab, Changwon National University khlee@changwon.ac.kr Contents Introduction

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

V1.0: Seth Gilbert, V1.1: Steven Halim August 30, Abstract. d(e), and we assume that the distance function is non-negative (i.e., d(x, y) 0).

V1.0: Seth Gilbert, V1.1: Steven Halim August 30, Abstract. d(e), and we assume that the distance function is non-negative (i.e., d(x, y) 0). CS4234: Optimisation Algorithms Lecture 4 TRAVELLING-SALESMAN-PROBLEM (4 variants) V1.0: Seth Gilbert, V1.1: Steven Halim August 30, 2016 Abstract The goal of the TRAVELLING-SALESMAN-PROBLEM is to find

More information

100Mbps Ethernet Data Transmission over SDH Networks using Cross Virtual Concatenation

100Mbps Ethernet Data Transmission over SDH Networks using Cross Virtual Concatenation 100Mbps Ethernet Data Transmission over SDH Networks using Cross Virtual Concatenation Sunanda Manke, EL & Comm. Engg. Deptt., BUIT, Barkatullah University, Bhopal. Kavita Khare, EL & Comm. Engg. Deptt.,

More information

A Graph-theoretic QoS-aware Vulnerability Assessment for Network Topologies

A Graph-theoretic QoS-aware Vulnerability Assessment for Network Topologies A Graph-theoretic QoS-aware Vulnerability Assessment for Network Topologies March 24, 2010 Table of contents 1 Problem Definition and Contributions 2 3 network with small amount of constraints small networks

More information

Name of Course : E1-E2 CFA. Chapter 14. Topic : NG SDH & MSPP

Name of Course : E1-E2 CFA. Chapter 14. Topic : NG SDH & MSPP Name of Course : E1-E2 CFA Chapter 14 Topic : NG SDH & MSPP Date of Creation : 28.03.2011 NGN SDH and MSPP 1. Introduction: Innovation, the lifeline to survival in the telecommunication market, has spurred

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined

More information

CE Ethernet Operation

CE Ethernet Operation 25 CHAPTER Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

Bi-directional Search in QoS Routing

Bi-directional Search in QoS Routing Bi-directional Search in QoS Routing F.A. Kuipers and P. Van Mieghem Delft University of Technology Electrical Engineering, Mathematics and Computer Science P.O Box 5031, 2600 GA Delft, The Netherlands

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

An Evolutionary Algorithm for the Multi-objective Shortest Path Problem

An Evolutionary Algorithm for the Multi-objective Shortest Path Problem An Evolutionary Algorithm for the Multi-objective Shortest Path Problem Fangguo He Huan Qi Qiong Fan Institute of Systems Engineering, Huazhong University of Science & Technology, Wuhan 430074, P. R. China

More information

Dynamic service Allocation with Protection Path

Dynamic service Allocation with Protection Path www.ijcsi.org 115 Dynamic service Allocation with Protection Path Loay Alzubaidi Department of Computer Engineering & Science, Prince Muhammad bin Fahd University AL-Khobar, Saudi Arabia Abstract Path

More information

UNIT- 2 Physical Layer and Overview of PL Switching

UNIT- 2 Physical Layer and Overview of PL Switching UNIT- 2 Physical Layer and Overview of PL Switching 2.1 MULTIPLEXING Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. Figure

More information

Automatic Service and Protection Path Computation - A Multiplexing Approach

Automatic Service and Protection Path Computation - A Multiplexing Approach Automatic Service and Protection Path Computation - A Multiplexing Approach Loay Alzubaidi 1, Ammar El Hassan 2, Jaafar Al Ghazo 3 1 Department of Computer Engineering & Science, Prince Muhammad bin Fahd

More information

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks Proceedings of the International Conference on Computer and Communication Engineering 008 May 3-5, 008 Kuala Lumpur, Malaysia A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

E1-E2 (EB) Chapter 4 MSPP

E1-E2 (EB) Chapter 4 MSPP E1-E2 (EB) Chapter 4 MSPP Page: 1 Multi-service Provisioning Platform (M S P P) I) Introduction: MSPP is deployed in the boundary of Access and Metro core backbone. TEC has prepared two different platforms

More information

POS on ONS Ethernet Cards

POS on ONS Ethernet Cards 20 CHAPTER This chapter describes packet-over-sonet/sdh (POS) and its implementation on ONS Ethernet cards. This chapter contains the following major sections: POS Overview, page 20-1 POS Interoperability,

More information

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Ankitkumar N. Patel, Chengyi Gao, and Jason P. Jue Erik Jonsson School of Engineering and Computer Science The University

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING

UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING 1 UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING Syllabus: Physical layer and overview of PL Switching: Multiplexing: frequency division multiplexing, wave length division multiplexing, synchronous

More information

POS on ONS Ethernet Cards

POS on ONS Ethernet Cards CHAPTER 23 This chapter describes packet-over-sonet/sdh (POS) and its implementation on ONS Ethernet cards. This chapter contains the following major sections: POS Overview, page 23-1 POS Interoperability,

More information

Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks

Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Franz Rambach Student of the TUM Telephone: 0049 89 12308564 Email: rambach@in.tum.de

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Exploring Multiple Paths using Link Utilization in Computer Networks

Exploring Multiple Paths using Link Utilization in Computer Networks 7 Exploring Multiple Paths using Link Utilization in Computer Networks 1 Shalini Aggarwal, 2 Shuchita Upadhyaya 1 Teacher Fellow, Department of Computer Science & Applications, Kurukshetra University Kurukshetra,

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Algorithm Design, Anal. & Imp., Homework 4 Solution

Algorithm Design, Anal. & Imp., Homework 4 Solution Algorithm Design, Anal. & Imp., Homework 4 Solution Note: The solution is for your personal use for this course. You are not allowed to post the solution in public place. There could be mistakes in the

More information

/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang

/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization

More information

Memory Placement in Network Compression: Line and Grid Topologies

Memory Placement in Network Compression: Line and Grid Topologies ISITA212, Honolulu, Hawaii, USA, October 28-31, 212 Memory Placement in Network Compression: Line and Grid Topologies Mohsen Sardari, Ahmad Beirami, Faramarz Fekri School of Electrical and Computer Engineering,

More information

From Routing to Traffic Engineering

From Routing to Traffic Engineering 1 From Routing to Traffic Engineering Robert Soulé Advanced Networking Fall 2016 2 In the beginning B Goal: pair-wise connectivity (get packets from A to B) Approach: configure static rules in routers

More information

Copyright 2007 Pearson Addison-Wesley. All rights reserved. A. Levitin Introduction to the Design & Analysis of Algorithms, 2 nd ed., Ch.

Copyright 2007 Pearson Addison-Wesley. All rights reserved. A. Levitin Introduction to the Design & Analysis of Algorithms, 2 nd ed., Ch. Iterative Improvement Algorithm design technique for solving optimization problems Start with a feasible solution Repeat the following step until no improvement can be found: change the current feasible

More information

Simple Quality-of-Service Path First Protocol and Modeling Analysis*

Simple Quality-of-Service Path First Protocol and Modeling Analysis* Simple Quality-of-Service Path First Protocol and Modeling Analysis* Lin Shen, Mingwei Xu, Ke Xu, Yong Cui, Youjian Zhao Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

FINDINGS ON A LEAST HOP (s) PATH USING BELLMAN-FORD ALGORITHM

FINDINGS ON A LEAST HOP (s) PATH USING BELLMAN-FORD ALGORITHM FINDINGS ON A EAST HOP (s) PATH USING BEMAN-FORD AGORITHM NIK SHAHIDAH AFIFI MD TAUJUDDIN MOHD HEMY ABD WAHAB SITI ZARINA MOHD MUJI ZARINA TUKIRAN FIRST REGIONA CONFERENCE ON COMPUTATIONA SCIENCE AND TECHNOOGIES

More information

Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture

Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture Robert D. allaway and Michael Devetsikiotis Department of Electrical

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

Cisco ONS Port 10/100 Ethernet Module

Cisco ONS Port 10/100 Ethernet Module Cisco ONS 15305 8-Port 10/100 Ethernet Module The Cisco ONS 15305 8-Port 10/100 Ethernet module provides eight ports for Layer 1 or Layer 2 switched transport of Ethernet and Fast Ethernet traffic over

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Linear Programming Duality and Algorithms

Linear Programming Duality and Algorithms COMPSCI 330: Design and Analysis of Algorithms 4/5/2016 and 4/7/2016 Linear Programming Duality and Algorithms Lecturer: Debmalya Panigrahi Scribe: Tianqi Song 1 Overview In this lecture, we will cover

More information

Resource Sharing for QoS in Agile All Photonic Networks

Resource Sharing for QoS in Agile All Photonic Networks Resource Sharing for QoS in Agile All Photonic Networks Anton Vinokurov, Xiao Liu, Lorne G Mason Department of Electrical and Computer Engineering, McGill University, Montreal, Canada, H3A 2A7 E-mail:

More information

Job-shop scheduling with limited capacity buffers

Job-shop scheduling with limited capacity buffers Job-shop scheduling with limited capacity buffers Peter Brucker, Silvia Heitmann University of Osnabrück, Department of Mathematics/Informatics Albrechtstr. 28, D-49069 Osnabrück, Germany {peter,sheitman}@mathematik.uni-osnabrueck.de

More information

Overview of Constraint-Based Path Selection Algorithms for QoS Routing

Overview of Constraint-Based Path Selection Algorithms for QoS Routing Overview of Constraint-Based Path Selection Algorithms for QoS Routing F.A. Kuipers, Delft University of Technology T. Korkmaz, University of Texas at San Antonio M. Krunz, University of Arizona P. Van

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

NETWORK routing essentially consists of two identities,

NETWORK routing essentially consists of two identities, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 5, OCTOBER 2004 851 Concepts of Exact QoS Routing Algorithms Piet Van Mieghem and Fernando A. Kuipers, Student Member, IEEE Abstract The underlying concepts

More information

Splitter Placement in All-Optical WDM Networks

Splitter Placement in All-Optical WDM Networks plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

CURRENT routing schemes typically focus on discovering

CURRENT routing schemes typically focus on discovering IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 413 Multipath Routing Algorithms for Congestion Minimization Ron Banner, Senior Member, IEEE, and Ariel Orda, Fellow, IEEE Abstract Unlike

More information

1 Dijkstra s Algorithm

1 Dijkstra s Algorithm Lecture 11 Dijkstra s Algorithm Scribes: Himanshu Bhandoh (2015), Virginia Williams, and Date: November 1, 2017 Anthony Kim (2016), G. Valiant (2017), M. Wootters (2017) (Adapted from Virginia Williams

More information

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima Graduate School of Information Science and Technology, Osaka University - Yamadaoka, Suita, Osaka 60-08, Japan

More information

Precomputation Schemes for QoS Routing

Precomputation Schemes for QoS Routing 578 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 4, AUGUST 2003 Precomputation Schemes for QoS Routing Ariel Orda, Senior Member, IEEE, and Alexander Sprintson, Student Member, IEEE Abstract Precomputation-based

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Effectective Bandwidth Utilization in a NG- SDH Network

Effectective Bandwidth Utilization in a NG- SDH Network Effectective Bandwidth Utilization in a NG- SDH Network S. Helan santhiya, G.Janani, R.Mohana Jothi, S.Subalakshmi Department of Electronics and Communication, Ponnaiyah Ramajayam College of engineering

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

Random Neural Networks for the Adaptive Control of Packet Networks

Random Neural Networks for the Adaptive Control of Packet Networks Random Neural Networks for the Adaptive Control of Packet Networks Michael Gellman and Peixiang Liu Dept. of Electrical & Electronic Eng., Imperial College London {m.gellman,p.liu}@imperial.ac.uk Abstract.

More information

Optimal per-node Rate Allocation to provide per-flow End-to-End Delay Guarantees in a Network of Routers supporting Guaranteed Service Class

Optimal per-node Rate Allocation to provide per-flow End-to-End Delay Guarantees in a Network of Routers supporting Guaranteed Service Class Optimal per-node Rate Allocation to provide per-flow End-to-End Delay Guarantees in a Network of Routers supporting Guaranteed Service Class Aniruddha Diwan ECE Department Indian Institute of Science Bangalore

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Technical Report, April 2011 Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu

More information

QoS Mapping along the Protocol Stack: Discussion and Preliminary Results

QoS Mapping along the Protocol Stack: Discussion and Preliminary Results QoS Mapping along the Protocol Stack: Discussion and Preliminary Results Luiz A. DaSilva Bradley Department of Electrical and Computer Engineering Virginia Polytechnic Institute and State University Alexandria

More information

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks Internet Traffic Characteristics Bursty Internet Traffic Statistical aggregation of the bursty data leads to the efficiency of the Internet. Large Variation in Source Bandwidth 10BaseT (10Mb/s), 100BaseT(100Mb/s),

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Statistical Timing Analysis Using Bounds and Selective Enumeration

Statistical Timing Analysis Using Bounds and Selective Enumeration IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 22, NO. 9, SEPTEMBER 2003 1243 Statistical Timing Analysis Using Bounds and Selective Enumeration Aseem Agarwal, Student

More information

Routing with Mutual Information Accumulation in Energy-Limited Wireless Networks

Routing with Mutual Information Accumulation in Energy-Limited Wireless Networks Routing with Mutual Information Accumulation in Energy-Limited Wireless Networks Mahdi Shakiba-Herfeh Department of Electrical and Electronics Engineering METU, Ankara, Turkey 68 Email: mahdi@eee.metu.edu.tr

More information

1 The Traveling Salesperson Problem (TSP)

1 The Traveling Salesperson Problem (TSP) CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation

More information

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National

More information

Approximation Algorithm for N-distance Minimal Vertex Cover Problem

Approximation Algorithm for N-distance Minimal Vertex Cover Problem Approximation Algorithm for N-distance Minimal Vertex Cover Problem Tarun Yadav Scientist, Scientific Analysis Group Defence R & D Organisation, INDIA Email: tarunyadav@sag.drdo.in Koustav Sadhukhan, Rao

More information

Asynchronous Transfer Mode (ATM) ATM concepts

Asynchronous Transfer Mode (ATM) ATM concepts Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in

More information

CHAPTER 3 A TIME-DEPENDENT k-shortest PATH ALGORITHM FOR ATIS APPLICATIONS

CHAPTER 3 A TIME-DEPENDENT k-shortest PATH ALGORITHM FOR ATIS APPLICATIONS CHAPTER 3 A TIME-DEPENDENT k-shortest PATH ALGORITHM FOR ATIS APPLICATIONS 3.1. Extension of a Static k-sp Algorithm to the Time-Dependent Case Kaufman and Smith [1993] showed that under the consistency

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks 336 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks Vincent W. S. Wong, Member, IEEE, Mark E. Lewis,

More information

THE goal of quality-of-service (QoS) routing is to find a

THE goal of quality-of-service (QoS) routing is to find a IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 1, FEBRUARY 2004 17 Routing With Topology Aggregation in Delay-Bandwidth Sensitive Networks King-Shan Lui, Member, IEEE, Klara Nahrstedt, Member, IEEE,

More information

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Ali Al-Dhaher, Tricha Anjali Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago, Illinois

More information

On The Complexity of Virtual Topology Design for Multicasting in WDM Trees with Tap-and-Continue and Multicast-Capable Switches

On The Complexity of Virtual Topology Design for Multicasting in WDM Trees with Tap-and-Continue and Multicast-Capable Switches On The Complexity of Virtual Topology Design for Multicasting in WDM Trees with Tap-and-Continue and Multicast-Capable Switches E. Miller R. Libeskind-Hadas D. Barnard W. Chang K. Dresner W. M. Turner

More information

9.1 Cook-Levin Theorem

9.1 Cook-Levin Theorem CS787: Advanced Algorithms Scribe: Shijin Kong and David Malec Lecturer: Shuchi Chawla Topic: NP-Completeness, Approximation Algorithms Date: 10/1/2007 As we ve already seen in the preceding lecture, two

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Greedy Algorithms 1. For large values of d, brute force search is not feasible because there are 2 d

Greedy Algorithms 1. For large values of d, brute force search is not feasible because there are 2 d Greedy Algorithms 1 Simple Knapsack Problem Greedy Algorithms form an important class of algorithmic techniques. We illustrate the idea by applying it to a simplified version of the Knapsack Problem. Informally,

More information

Real Time Implementation of Data Communication using Ipv4Telecom Network through Sdhstm-4 Digital Transmission Wan

Real Time Implementation of Data Communication using Ipv4Telecom Network through Sdhstm-4 Digital Transmission Wan RESEARCH ARTICLE Real Time Implementation of Data Communication using Ipv4Telecom Network through Sdhstm-4 Digital Transmission Wan SharadaOhatkar*, Sanjay Thakare**, RachnaChavan*, Mugdha Kulkarni *,

More information

Optimally-balanced Hash Tree Generation in Ad Hoc Networks

Optimally-balanced Hash Tree Generation in Ad Hoc Networks African Journal of Information and Communication Technology, Vol. 6, No., September Optimally-balanced Hash Tree Generation in Ad Hoc Networks V. R. Ghorpade, Y. V. Joshi and R. R. Manthalkar. Kolhapur

More information

SONET/SDH VCAT SONET VCAT

SONET/SDH VCAT SONET VCAT SONET/SDH VCAT SONET/SDH networks have been deployed and heavily utilized for many years. These networks where designed for the efficient transport of DS0 voice circuits. Service providers, who have made

More information

Chapter 24. Shortest path problems. Chapter 24. Shortest path problems. 24. Various shortest path problems. Chapter 24. Shortest path problems

Chapter 24. Shortest path problems. Chapter 24. Shortest path problems. 24. Various shortest path problems. Chapter 24. Shortest path problems Chapter 24. Shortest path problems We are given a directed graph G = (V,E) with each directed edge (u,v) E having a weight, also called a length, w(u,v) that may or may not be negative. A shortest path

More information

Multipath Routing for Video Unicast over Bandwidth-Limited Networks

Multipath Routing for Video Unicast over Bandwidth-Limited Networks Multipath Routing for Video Unicast over Bandwidth-Limited Networks Jiancong Chen S.-H. Gary Chan Department of Computer Science The Hong Kong University of Science and Technology Hong Kong Abstract Video

More information

Material handling and Transportation in Logistics. Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena

Material handling and Transportation in Logistics. Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena Material handling and Transportation in Logistics Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena Introduction to Graph Theory Graph Theory As Mathematical

More information

A Heuristic Algorithm for the Multi-constrained Multicast Tree

A Heuristic Algorithm for the Multi-constrained Multicast Tree A Heuristic Algorithm for the Multi-constrained Multicast Tree Wen-Lin Yang Department of Information Technology National Pingtung Institute of Commerce No.51, Ming-Sheng East Road, Pingtung City,Taiwan

More information

Scribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu

Scribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu CS 267 Lecture 3 Shortest paths, graph diameter Scribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu Today we will talk about algorithms for finding shortest paths in a graph.

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

Outline Computer Networking. Circuit Switching. Circuit Switching

Outline Computer Networking. Circuit Switching. Circuit Switching line 5-5- omputer Networking 5-6 Lecture : Virtual ircuits Peter Steenkiste ircuit switching refresher Virtual ircuits - general Why virtual circuits? How virtual circuits? -- tag switching! Two modern

More information

Absolute QoS Differentiation in Optical Burst-Switched Networks

Absolute QoS Differentiation in Optical Burst-Switched Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 1781 Absolute QoS Differentiation in Optical Burst-Switched Networks Qiong Zhang, Student Member, IEEE, Vinod M. Vokkarane,

More information

CMSC 451: Lecture 22 Approximation Algorithms: Vertex Cover and TSP Tuesday, Dec 5, 2017

CMSC 451: Lecture 22 Approximation Algorithms: Vertex Cover and TSP Tuesday, Dec 5, 2017 CMSC 451: Lecture 22 Approximation Algorithms: Vertex Cover and TSP Tuesday, Dec 5, 2017 Reading: Section 9.2 of DPV. Section 11.3 of KT presents a different approximation algorithm for Vertex Cover. Coping

More information

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions. CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT

More information

Request for Comments: June MAPOS - Multiple Access Protocol over SONET/SDH Version 1

Request for Comments: June MAPOS - Multiple Access Protocol over SONET/SDH Version 1 Network Working Group Request for Comments: 2171 Category: Informational K. Murakami M. Maruyama NTT Laboratories June 1997 MAPOS - Multiple Access Protocol over SONET/SDH Version 1 Status of this Memo

More information

FastA & the chaining problem

FastA & the chaining problem FastA & the chaining problem We will discuss: Heuristics used by the FastA program for sequence alignment Chaining problem 1 Sources for this lecture: Lectures by Volker Heun, Daniel Huson and Knut Reinert,

More information

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching Henry Lin Division of Computer Science University of California, Berkeley Berkeley, CA 94720 Email: henrylin@eecs.berkeley.edu Abstract

More information