GA-Based Hybrid Algorithm for MBR Problem of FIPP p-cycles for Node Failure on Survivable WDM Networks

Size: px
Start display at page:

Download "GA-Based Hybrid Algorithm for MBR Problem of FIPP p-cycles for Node Failure on Survivable WDM Networks"

Transcription

1 GA-Based Hybrid Algorithm for MBR Problem of FIPP p-cycles for Node Failure on Survivable WDM Networks Der-Rong Din Department of Computer Science and Information Engineering, National Changhua University of Education No. 1, Jin De Road, Changhua 500, Taiwan R.O.C Abstract. In this paper, the minimal backup reprovisioning (MBR) problem is studied, in which, the failure-independent path protecting p- cycles (FIPP p-cycles) scheme is considered for single node-failure on WDM networks. After recovering the affected lightpaths from a node failure, the goal of the MBR is to re-arrange the protecting and available resources such that working paths can be protected against next node failure if possible. This is a hard problem, a hybrid algorithm which combines heuristic algorithm and genetic algorithm is proposed to solve this problem. The simulation results of the proposed method are also given. Keywords: WDM, node failure, MBR, FIPP p-cycles, GA. 1 Introduction In an optical network employing WDM, the failure of a single link (or node) may lead to tremendous data loss since a single link can carry a huge amount of data (on the order of terabits per second). Therefore, several schemes have been proposed to achieve survivability by protection or restoration on the optical layer [1]. In a protection scheme, extra bandwidth is reserved when the connection is provisioned. The primary and backup paths are usually link (or node) disjoint, which guarantees that at least one path is available when any single link (or node) failure occurs in the network [1]. When a node failure occurs, all the traffic flows that go through the node and all the local traffic that is collected and distributed by the node are interrupted. The path-based protection techniques can be employed [2]. Setting protection paths for the possible failed nodes may be cheaper and flexible approach because there are huge wavelengths provided by the system and it can be extended more easily than setting up double switches. Note that it is not possible in any scheme to recover lightpaths from a failure at their own source/destination nodes. Node failure protection through network reconfiguration is therefore only concerned with restoring traffic flows that were transiting failed nodes [3]. This work was partly supported by the National Science Council (NSC) of Taiwan, R.O.C. under Grant Number NSC E D.-S. Huang et al. (Eds.): ICIC 2011, LNBI 6840, pp , c Springer-Verlag Berlin Heidelberg 2012

2 184 D.-R. Din 1.1 FIPP p-cycles The FIPP p-cycles protection method proposed by Kodian and Grover [4] is a pre-connected protection scheme with an end-to-end failure-independent path protection property. In the FIPP p-cycles scheme, several mutually node-disjoint paths can form a disjoint route set (DRS) [4]. For a DRS, a single FIPP p-cycle which passes through all end-nodes of the paths in DRS is pre-established. Since any two paths in the same DRS are node-disjoint, only one path in a DRS may be affected by a single node failure. Moreover, the FIPP p-cycles scheme is pathoriented, it can be used to recover traffic transiting through a failed node. More details about the FIPP p-cycles scheme can be found in [4]. 1.2 Backup Reprovisioning Recently, reprovisioning new backups for working paths to combat the effect of multiple concurrent failures (where concurrent means that a new failure occurs before a previous failure is repaired) is the goal of backup reprovisioning (BR) [5]. When a failure occurs, the traffic through the affected node is switched to backups. To protect lightpaths against next potential failure, new backups are provided for the paths that become unprotected or vulnerable because of losing their primary or their backup due to the previous failure or due to backup resource sharing. This approach is called Minimal Backup Reprovisioning (MBR). The numerical results show that [5], using MBR, the connection vulnerability can be significantly reduced even when the network is heavily loaded. According to the survey by authors, there is no article studied the backup reprovisioning problem for the FIPP p-cycles on WDM networks against node failure. In this paper, the MBR problem on WDM networks with FIPP p-cycles protection for node failure is studied A hybrid algorithm which combined heuristic algorithm and genetic algorithm [6] is proposed to solve this problem. 2 Problem Definition In this paper, the physical and virtual topologies of a WDM network, the set of working paths, the disjoint route sets and the set of FIPP p-cycles are fixed and known. For each working path in network, there is a single FIPP p-cycle can be used to protect it in an on-cycle or straddling manner. For each edge (or link) of physical topology, there is a single fiber connects the end-nodes of link such that data can be transmitted bidirectional. All nodes in physical network are with full wavelength converting capabilities. Only the node failure scenario is considered. 2.1 Notations G(V,E): the physical topology, where V = {v 1,v 2,..., v V } is the set of nodes and E = {e 1,e 2,..., e E } is the set of physical links. Each node of the network can also be represented by the number assigned to it.

3 GA-Based Hybrid Algorithm for MBR Problem of FIPP p-cycles 185 P = {P k k =1, 2,..., P }: the set of working paths, where P k P is the working path. Nodes v sk and v dk are the source and destination nodes of P k, respectively. BP k : the backup path for the working path P k, k =1, 2,..., P and path BP k should be node-disjoint to P k. v f : the failed node. N(v f ): the set of adjacent nodes of node v f. E(v f ): the set of links adjoined to node v f, E(v f ) E. FC: the set of FIPP p-cycles used to protect all paths in P. PoC j : the set of paths which is protected by the FIPP p-cycle C j,where C j FC, PoC j P.AnytwopathsinPoC j are mutually node-disjoint. P f : the set of working paths affected by the failed node v f, P f P. The goal of the problem is to recover the protecting capabilities of the set of FIPP p-cycles to protect working paths such that the total capacities can be minimized. The proposed hybrid method consists of two algorithms, the first one is the Preprocessing Algorithm and the second one is the Genetic Algorithm. 3 Preprocessing Algorithm When node v f fails, the recovering procedure is performed to recover the affected paths. In the recovering procedure, if path P k is affected by the node failure, first, the primary path is switched to the backup path BP k which is provided by the protecting FIPP p-cycle. After recovering, the FIPP p-cycle may lose its protecting capability and those paths originally protected by the FIPP p-cycle and the backup path BP k are vulnerable now. If a node failure occurs again, these paths cannot be protected. In backup reprovisioning, not only the affected working paths are recovered by current FIPP p-cycles, the protecting capabilities of affected FIPP p-cycles are also recovered and working paths can be survived at the sequent node failure such that total capacities can be minimized. 3.1 Cases of Failure In this subsection, working paths together with the FIPP p-cycles affected by the node failure can be classified into four cases: (1) End-node failure: the failed node is the source (or destination) node of the working paths, these working paths cannot be recovered. (2) Straddling-path failure: the failed node is an interior node of the working path P k, but not on the protecting FIPP p-cycle C i. (3) On-cycle-path failure: the failed node is an interior node of the working path P k and also a node on the protecting cycle. In this case, the working path P k can still be recovered by using the remaining part of the FIPP p-cycle. (4) Cycle failure: the failed node is on the cycle but all paths protected by the cycle are unaffected, then the cycle affected by the failure will lose its protecting capabilities.

4 186 D.-R. Din 3.2 Preprocessing In this subsection, the details of the proposed algorithm Preprocessing Algorithm are described. When node v f fails, node v f and the links in E(v f ) are removed from G to form a new network G (V \{v f },E \ E(v f )). If path P k is affected by the node failure, the default path BP k on FIPP p-cycle is used to recover the affected working path. To provide backup reprovisioning, first, an empty set P f is constructed. Then, for each path (say P k ) together with the protecting cycle (say C i ), the respective case described in previous subsection is checked and applied. To reduce the total capacities used for protecting all paths in P f,cyclesin the current FC are examined first for whether they can be used to protect paths in P f. For each working path P k in P f, for each existing cycle C j in FC,ifpath P k is node-disjoint to all paths in PoC j,thencyclec j can be used to protect path P k and PoC j is updated by uniting path P k. And then path P k is removed from P f. This process is repeated performed until no cycle in FC can be found to protected path in P f. Then, for all unprotected paths in P f, the Genetic Algorithm is performed to find new FIPP p-cycles to protect them. The details of the Preprocessing Algorithm are shown in Algorithm 1. Algorithm 1. Preprocessing Algorithm 1: Input: G, P, FC, v f ; Output: G, FC; 2: Remove failed node v f and edges in E(v f )fromg to form the graph G (V \{v f },E\ E(v f )). 3: Construct the empty set P f. 4: for all (working path P k P ) do 5: Let cycle C i FC be the FIPP p-cycle used to protect path P k. 6: According the case of failure, perform the respective case (1) (4): (1) End-node failure 7: Remove working path P k.removec i from FC. 8: Release the network resources of path P k and cycle C i.addallpathsinpoc i to P f. 9: (2) Straddling-path failure: 10: Find a new path P new from v sk to v dk on G which is node-disjoint to all paths in PoC i. 11: if (P new can be found) then 12: Use P new as the new working paths. Release the network resources of path P k. 13: Use BP k to recover the original FIPP p-cycle C i. Add path P new to P f. 14: else 15: Remove C i from FC. Release the network resources of path P k and cycle C i. 16: Add all paths in PoC i and path BP k to P f. 17: end if 18: (3) On-cycle-path failure: 19: Remove C i from FC. Release the network resources of path P k and cycle C i. 20: Add all paths in PoC i and path BP k to P f. 21: (4) Cycle failure: 22: Remove C i from FC. Release the network resources of path P k and cycle C i. 23: end for 24: for all (working path P k P f ) do 25: for all (working path C j FC) do 26: if (path P k is node-disjoint to all paths in PoC j) then 27: Update PoC j = PoC j P i.removep k from P f. 28: end if 29: end for 30: end for

5 GA-Based Hybrid Algorithm for MBR Problem of FIPP p-cycles Genetic Algorithm 4.1 Chromosome Encoding Because the problem involves representing the protecting cycles for vulnerable paths, a coding scheme that uses positive integer is employed. After performing the Preprocessing Algorithm, the network G(V,E) is updated as G (V \{v f },E\ E(v f )) and the set P f of unprotected paths is constructed. For the current physical network G (V \{v f },E\E(v f )), the Cycle Finding Algorithm proposed in [7] is performed to form the set (NC) of all possible cycles in G (V \{v f },E\E(v f )). All cycles in NC are sorted and indexed in non-descending order according to the length of the cycles. For each path P k in P f,theset(nc k NC)ofcycles which can be used to protect path P k is formed. A chromosome consisting of an integer array with size 2 P f is introduced to represent the protecting cycles of vulnerable paths. The chromosome consists of two genes: the Protecting Cycle Gene (PCG)andCopy Gene (CG). For each unprotected path P k in P f,letv sk and v dk be the source and destination nodes of the path P k, respectively. The PCG can be represented as {PCG 1,PCG 2,..., P CG P f }, wherec PCGk (k=1, 2,..., P f ) is a cycle in NC k and the index of cycle is in {1, 2,..., NC}. TheCG can be represented as {CG 1,CG 2,..., CG P }, wherecg f k (k=1, 2,..., P f ) means that the path P k is protected by the CG k -th copy of the protected cycle C PCGk. 4.2 Population Initialization Let FC new be the set of selected cycles which are used to protected the vulnerable paths in P f. Initially, FC new is an empty set. Let z j represent the maximal copy of the cycle C j NC, initially z j =0,forj =1, 2,..., NC. For each copy of the selected cycle C j,createasetpoc j,zy for storing those paths currently protected by the z y -th (integer 1 z y z j )copyofcyclec j. The population of the genetic algorithm is generated by following steps: First, random selected an integer k (1 k P f ). For the selected path P k,afipp p-cycle in NC k FC new is selected randomly to protect it. This means that those cycles currently deployed are selected first if possible. If FC new NC k is nonempty, then those cycles in FC new NC k are selected first and tested whether there is a cycle in FC new NC k can be used to protect the path P k.it is worth noting that path P k can be protected by the z y -th (1 z y z j )copy of C j only if path P k is node-disjoint to all paths in PoC j,zy of the z y -th copy of selected cycle C j FC new NC k. If a cycle C j (FC new NC k )andthez y copy is found and satisfied the constraint, then add path P k to the set PoC y,zy. IfthepathcannotbeprotectedbythecyclesinFC new NC k, then a new cycle C j is selected from NC k to protect path P k. For the selected cycle C j, increase z j by 1, create a set PoC j,zj to store path P k,addc j to the set FC new, then set the value of PCG k as j and CG k as z j. Then, increase k by 1. If k> P f,setk to 1. Repeat the above steps to determine the protected cycle of next path until all contents of PCG and CG are set, then the initialization process is terminated.

6 188 D.-R. Din 4.3 Fitness Definition Generally, GA uses fitness function to map objective to cost and to achieve the goal of a minimal cost. Let l(c j ) be the length of cycle C j NC and z j be thenumberofcopiesofthecyclec j. An objective function value is associated with chromosome and represented by the following equation: minimize OBJ = NC j=1 z j l(c j ) = C j FC new z j l(c j ). Since the best-fit chromosomes should have a probability of being selected as parents that is proportional to their fitness, they need to be expressed in a maximization form. 4.4 Crossover Operators and Mutation The Single Point Crossover is used to develop th GA. First, randomly select a crossover site (integer) i from interval [1, P f ]. In SPC, the operator is applied on both the PCG and CG. For the mutation, the Single Protecting Cycle Mutation (SPCM) is applied to GA. First randomly select an integer i in the interval [1, P f ], assume path P k be protected by the z j -th copy of cycle C j,spcm changes the protecting cycle of paths in the PoC j,zj by selecting a cycle C a with minimal length, if possible. The cycle is selected from the set CS of cycles, where CS = P k PoC j,zj {NC k }, with minimal length. 4.5 Chromosome Adjustment Algorithm (CAA) After performing crossover and/or mutation operations, it may generate infeasible chromosomes. Thus, these chromosomes should be adjusted to a constraintsatisfied solutions by performing the CAA. To adjust the chromosome to a constraint-satisfied one, first, the chromosome can be considered as two parts separated by the crossoversite i. It is worth noting that, before performing crossover, each part is constraint-satisfy. Random select a part (left or right) and a direction (increasing-direction or decreasing-direction) for adjustment. The increasing-direction means that the adjustment is performed from 1 to i and from i +1to P f for the left part and right part, respectively. And the decreasing-direction is the reverse direction of the increasing-direction. If the left part is selected and the increasing-direction is to be apply, the right part of the chromosome is packed and preserved. The details of CAA are described as follows. First, construct empty set FC new. For each cycle C j used in the right part, put it into FC new and construct the sets PoC j,zj. Second, two paths assigned to same cycle but not to same copies are tried to merge so as the number of copies of cycle can be reduced. Third, according to the direction of adjustment, the protecting cycle for path P k (1 k i) is adjusted. For the selected path P k, a FIPP p-cycle in NC k FC new is selected randomly to protect it. If FC new NC k is nonempty, then those cycles in FC new NC k are selected first and tested whether there is a cycle in FC new NC k can be used to protect the path P k. It is worth noting that path P k can be protected by the z y -th (1 z y z j )copyofc j only if path P k is node-disjoint to all paths in PoC j,zy of the z y -th copy of selected cycle

7 GA-Based Hybrid Algorithm for MBR Problem of FIPP p-cycles 189 C j FC new NC k. If a cycle C j (FC new NC k )andthez y copy is found and satisfied the constraint, then add path P k to the set PoC y,zy. If the path cannot be protected by the cycles in FC new NC k, then the original protecting cycle (say C j ) is preserved to protect path P k. For the selected cycle C j,increase z j by 1, create a set PoC j,zj to store path P k,addc j to the set FC new,then set PCG k to j and CG k to z j. 5 Experimental Results The proposed algorithms were conducted by using C++ programming language and Boost Graph Library [8]. All the simulations were run on a PC with Celeron 2 Duo 1.8 GHz CPU, 2.0G RAM, and with Windows Vista operating system. Two physical topologies were used for experiments, they are COST239 and National networks. All nodes in the network may fail and the failed nodes were generated randomly. The connection requests were generated randomly. A set of FIPP p-cycles is used to protect primary lightpaths. The parameters of GA were determined through simulations, and the crossover probability is set to 1.0, mutation probability is set to 0.1, and population size is set to 500. To know the efficiency of the proposed methods, the node-disjoint paths (NDPS) protection method was implemented for comparison. First, WDM networks with different number of connections were generated. Each case was examined 20 times and the result was evaluated and compared. Let Backup resources ratio be the ratio of the total capacities to that of the Fig. 1. BRR performance for different number of connections on (a) COST239 with different number of connections, (b) National with different number of connections, (c) COST239 with different number of wavelengths, (d) National with different number of wavelengths

8 190 D.-R. Din working capacities. Figure 1(a) shows the comparison of the average(avg.), minimal(min.) and maximal(max.) BRR performances of the GA to that of the NDPS methods on the network COST239. The average BRR value of the GA decreases from 1.5 to 1.15 and it is better than that of the NDPS. Even the maximal case of GA can get better performance than NDPS. For the case of the National network, the BRR performance of GA is better than that of the NDPS Figure 1(b). For the limited number of wavelengths (W in {20, 40, 60, 80, 100, 120}), WDM networks with 120 connections were generated for these experiments. In Figure 1(c), the BRR value of the GA method decreases about 0.2 on networks and it is better than that of the NDPS. For the case of the National network, the BRR performance of GA is also better than that of the NDPS Figure 1(d). 6 Conclusions In this article, the minimal backup reprovisioning (MBR) problem for FIPP p-cycles on WDM networks for node failure was studied. After recovering the working paths affected by the failed node, the protecting capabilities of FIPP p-cycles is recovered by performing MBR against the subsequent nodes failure on WDM networks. A hybrid algorithm was proposed to solve this problem. Simulation results show that the performance of GA is better than the traditional node-disjoint paths protecting method. References 1. Ramamurthy, A., Mukherjee, B.: Survivable WDM Mesh Networks-part II: Restoration. In: Proc. of IEEE ICC, pp (1999) 2. Su, H.K., Wu, C.S., Chu, Y.S.: IP Local Node Protection. In: Proc. of Second International Conference on Systems and Networks Communications, ICSNC, vol. 58 (2007) 3. Stamatelakis, D., Grover, W.D.: IP layer Restoration and Network Planning Based on Virtual Protection Cycles. IEEE Journal on Selected Areas in Communications 18(10), (2000) 4. Kodian, A., Grover, W.D.: Failure-independent Path-protecting P-cycles: Efficient and Simple Fully Pre-connected Optical Path Protection. Journal of Lightwave Technology 23(10), (2005) 5. Tornatore, M., Lucerna, D., Pattavina, A.: Improving Efficiency of Backup Reprovisioning in WDM Networks. In: Proc. of IEEE Inforcom Phoenix, AZ, USA, pp (15 17) (2008) 6. Holland, J.: Adaptation in Natural and Artificial Systems. Univ. of Michigan Press, Ann Arbor (1975) 7. Liu, C., Ruan, L.: Finding Good Candidate Cycles for Efficient P-cycle Network Design. In: Proc. of Int. Conf. on Computer Communications and Networks, ICCCN 2004, Chicago, USA, pp (11 13) (2004) 8. Boost Graph Library,

Survivable Routing Problem in EONs with FIPP p-cycles Protection

Survivable Routing Problem in EONs with FIPP p-cycles Protection JOURNAL OF INFORMATION SCIENCE AND ENGINEERING XX, XXXX-XXXX (2016) Survivable Routing Problem in EONs with FIPP p-cycles Protection DER-RONG DIN Department of Computer Science and Information Engineering

More information

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland

More information

A Novel Efficient Design of Survivable WDM Mesh Networks

A Novel Efficient Design of Survivable WDM Mesh Networks 1684 JOURNAL OF COMPUTERS, VOL. 9, NO. 7, JULY 2014 A Novel Efficient Design of Survivable WDM Mesh Networks HONG HUI LI, XUE LIANG FU College of Computer and Information Engineering Inner Mongolia Agricultural

More information

RWA on Scheduled Lightpath Demands in WDM Optical Transport Networks with Time Disjoint Paths

RWA on Scheduled Lightpath Demands in WDM Optical Transport Networks with Time Disjoint Paths RWA on Scheduled Lightpath Demands in WDM Optical Transport Networks with Time Disjoint Paths Hyun Gi Ahn, Tae-Jin Lee, Min Young Chung, and Hyunseung Choo Lambda Networking Center School of Information

More information

Shared Protection by Concatenated Rings in Optical WDM Networks

Shared Protection by Concatenated Rings in Optical WDM Networks Shared Protection by Concatenated Rings in Optical WDM Networks Hyunseung Choo, Minhan Son, Min Young Chung, and Tae-Jin Lee School of Information and Communication Engineering Sungkyunkwan University

More information

Survivability with P-Cycle in WDM Networks

Survivability with P-Cycle in WDM Networks Survivability with P-Cycle in WDM Networks K. Aparna 1, P. Ramya Krishna 2 JNTUA College of Engineering, Pulivendula Abstract: In this paper we discuss about the Pre-Configured survivability schemes. Network

More information

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks Wojciech Molisz, DSc, PhD Jacek Rak, PhD Gdansk University of Technology Department of Computer Communications

More information

Design Methodologies and Algorithms for Survivable C-RAN

Design Methodologies and Algorithms for Survivable C-RAN 16 Regular papers ONDM 218 Design Methodologies and Algorithms for Survivable C-RAN Bahare M. Khorsandi, Federico Tonini, Carla Raffaelli DEI, University of Bologna Viale Risorgimento 2, 4136 Bologna,

More information

Analysis of Optimal Sets of Survivable Paths in Undirected Simple Graph Applicable for Optical Networks

Analysis of Optimal Sets of Survivable Paths in Undirected Simple Graph Applicable for Optical Networks Analysis of Optimal Sets of Survivable Paths in Undirected Simple Graph Applicable for Optical Networks Z. R. Bogdanowicz 1,2 Intelligent Systems and Robotics Laboratory Armament Research, Development

More information

AN EVOLUTIONARY APPROACH TO DISTANCE VECTOR ROUTING

AN EVOLUTIONARY APPROACH TO DISTANCE VECTOR ROUTING International Journal of Latest Research in Science and Technology Volume 3, Issue 3: Page No. 201-205, May-June 2014 http://www.mnkjournals.com/ijlrst.htm ISSN (Online):2278-5299 AN EVOLUTIONARY APPROACH

More information

On Efficient Protection Design for Dynamic Multipath Provisioning in Elastic Optical Networks

On Efficient Protection Design for Dynamic Multipath Provisioning in Elastic Optical Networks On Efficient Protection Design for Dynamic Multipath Provisioning in Elastic Optical Networks Xiaoliang Chen, Shilin Zhu,DiChen, Shuguang Hu, Chang Li, Zuqing Zhu School of Information Science and Technology,

More information

A Hybrid Genetic Algorithm for the Distributed Permutation Flowshop Scheduling Problem Yan Li 1, a*, Zhigang Chen 2, b

A Hybrid Genetic Algorithm for the Distributed Permutation Flowshop Scheduling Problem Yan Li 1, a*, Zhigang Chen 2, b International Conference on Information Technology and Management Innovation (ICITMI 2015) A Hybrid Genetic Algorithm for the Distributed Permutation Flowshop Scheduling Problem Yan Li 1, a*, Zhigang Chen

More information

Star Topology based Protection Scheme for Survivable Fiber Wireless (FiWi) Access Network

Star Topology based Protection Scheme for Survivable Fiber Wireless (FiWi) Access Network International Journal of Electronics Engineering Research. ISSN 0975-6450 Volume 9, Number 6 (2017) pp. 859-866 Research India Publications http://www.ripublication.com Star Topology based Protection Scheme

More information

Network Routing Protocol using Genetic Algorithms

Network Routing Protocol using Genetic Algorithms International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:0 No:02 40 Network Routing Protocol using Genetic Algorithms Gihan Nagib and Wahied G. Ali Abstract This paper aims to develop a

More information

Research Article Genetic Algorithm for Finding Minimal Cost Light Forest of Multicast Routing on WDM Networks

Research Article Genetic Algorithm for Finding Minimal Cost Light Forest of Multicast Routing on WDM Networks Hindawi Publishing Corporation Journal of Artificial Evolution and Applications Volume 8, Article ID 691, pages doi:111/8/691 Research Article Genetic Algorithm for Finding Minimal Light Forest of Multicast

More information

WAVELENGTH-DIVISION multiplexed (WDM) optical

WAVELENGTH-DIVISION multiplexed (WDM) optical IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 1823 A Dynamic Routing Algorithm With Load Balancing Heuristics for Restorable Connections in WDM Networks Lu Ruan, Member,

More information

Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks

Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks Ahmed Frikha, Samer Lahoud, and Bernard Cousin University of Rennes 1, IRISA,

More information

Available online at ScienceDirect

Available online at   ScienceDirect Available online at www.sciencedirect.com ScienceDirect Procedia Technology 0 ( 0 ) 900 909 International Conference on Computational Intelligence: Modeling, Techniques and Applications (CIMTA-0) Multicast

More information

Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures

Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Anna Urra, Eusebi Calle, and Jose L. Marzo Institute of Informatics and Applications (IIiA), University of Girona, Girona

More information

Splitter Placement in All-Optical WDM Networks

Splitter Placement in All-Optical WDM Networks plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

Genetic algorithm based on number of children and height task for multiprocessor task Scheduling

Genetic algorithm based on number of children and height task for multiprocessor task Scheduling Genetic algorithm based on number of children and height task for multiprocessor task Scheduling Marjan Abdeyazdan 1,Vahid Arjmand 2,Amir masoud Rahmani 3, Hamid Raeis ghanavati 4 1 Department of Computer

More information

ISSN: [Keswani* et al., 7(1): January, 2018] Impact Factor: 4.116

ISSN: [Keswani* et al., 7(1): January, 2018] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AUTOMATIC TEST CASE GENERATION FOR PERFORMANCE ENHANCEMENT OF SOFTWARE THROUGH GENETIC ALGORITHM AND RANDOM TESTING Bright Keswani,

More information

Genetic Algorithm for Network Design Problem-An Empirical Study of Crossover Operator with Generation and Population Variation

Genetic Algorithm for Network Design Problem-An Empirical Study of Crossover Operator with Generation and Population Variation International Journal of Information Technology and Knowledge Management July-December 2010, Volume 2, No. 2, pp. 605-611 Genetic Algorithm for Network Design Problem-An Empirical Study of Crossover Operator

More information

Mobile Agent Routing for Query Retrieval Using Genetic Algorithm

Mobile Agent Routing for Query Retrieval Using Genetic Algorithm 1 Mobile Agent Routing for Query Retrieval Using Genetic Algorithm A. Selamat a, b, M. H. Selamat a and S. Omatu b a Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia,

More information

CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN

CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN 97 CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN 5.1 INTRODUCTION Fuzzy systems have been applied to the area of routing in ad hoc networks, aiming to obtain more adaptive and flexible

More information

An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops

An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops Harsha V. Madhyastha Department of Computer Science and Engineering Indian Institute of Technology, Madras Chennai,

More information

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks Proceedings of the International Conference on Computer and Communication Engineering 008 May 3-5, 008 Kuala Lumpur, Malaysia A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

More information

Fault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee

Fault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee DIMACS Series in Discrete Mathematics and Theoretical Computer Science Fault-Tolerant Design of Wavelength-Routed Optical Networks S. Ramamurthy and Biswanath Mukherjee Abstract. This paper considers optical

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National

More information

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry

More information

Establishment of Survivable Connections in WDM Networks using Partial Path Protection

Establishment of Survivable Connections in WDM Networks using Partial Path Protection Establishment of Survivable Connections in WDM Networks using Partial Path Protection G. Xue 1, Senior Member, IEEE, W. Zhang 1,J.Tang 1, and K. Thulasiraman 2, Fellow, IEEE Abstract As a generalization

More information

Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks

Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks Hwajung Lee, Hongsik hoi, Suresh Subramaniam, and Hyeong-Ah hoi Department of omputer Science and Electrical and omputer

More information

P Cycles: Design and Applications

P Cycles: Design and Applications P Cycles: Design and Applications -Aman Nijhawan Abstract Survivability is becoming an increasingly important goal in network design. An important aspect of network design today is designing networks with

More information

Shared Risk Link Group (SRLG)-Diverse Path Provisioning Under Hybrid Service Level Agreements in Wavelength-Routed Optical Mesh Networks

Shared Risk Link Group (SRLG)-Diverse Path Provisioning Under Hybrid Service Level Agreements in Wavelength-Routed Optical Mesh Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 8-2005 Shared Risk Link Group (SRLG)-Diverse Path Provisioning

More information

Implementation of Genetic Algorithm for Combined Routing and Dimensioning for Dynamic WDM Networks

Implementation of Genetic Algorithm for Combined Routing and Dimensioning for Dynamic WDM Networks Implementation of Genetic Algorithm for Combined Routing and Dimensioning for Dynamic WDM Networks Bhuthesh H K 1, Triveni C L 2 1M.Tech student, Dept. Of ECE, MCE Hassan, Karnataka, India 2Assistant Professor,

More information

Efficient path protection using Bi-directional WDM transmission technology. Title

Efficient path protection using Bi-directional WDM transmission technology. Title Title Efficient path protection using Bi-directional WDM transmission technology Author(s) Li, J; Yeung, KL Citation Globecom - Ieee Global Telecommunications Conference, 2005, v. 4, p. 1910-1914 Issued

More information

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Ankitkumar N. Patel, Chengyi Gao, and Jason P. Jue Erik Jonsson School of Engineering and Computer Science The University

More information

Genetic Algorithm for Dynamic Capacitated Minimum Spanning Tree

Genetic Algorithm for Dynamic Capacitated Minimum Spanning Tree 28 Genetic Algorithm for Dynamic Capacitated Minimum Spanning Tree 1 Tanu Gupta, 2 Anil Kumar 1 Research Scholar, IFTM, University, Moradabad, India. 2 Sr. Lecturer, KIMT, Moradabad, India. Abstract Many

More information

Application-Aware Protection in DWDM Optical Networks

Application-Aware Protection in DWDM Optical Networks Application-Aware Protection in DWDM Optical Networks Hamza Drid, Nasir Ghani, Bernard Cousin To cite this version: Hamza Drid, Nasir Ghani, Bernard Cousin. Application-Aware Protection in DWDM Optical

More information

Ray-tracing Method for Estimating Radio Propagation Using Genetic Algorithm

Ray-tracing Method for Estimating Radio Propagation Using Genetic Algorithm Ray-tracing Method for Estimating Radio Propagation Using Genetic Algorithm High-precision Propagation Estimation High-speed Computation Area Design Ray-tracing Method for Estimating Radio Propagation

More information

Arc Perturbation Algorithms for Optical Network Design

Arc Perturbation Algorithms for Optical Network Design Applied Mathematical Sciences, Vol. 1, 2007, no. 7, 301-310 Arc Perturbation Algorithms for Optical Network Design Zbigniew R. Bogdanowicz Armament Research, Development and Engineering Center Building

More information

ECE442 Communications Lecture 4. Optical Networks

ECE442 Communications Lecture 4. Optical Networks ECE442 Communications Lecture 4. Optical Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Network Elements 1 WDM networks provide circuit switched end-to-end optical

More information

DETERMINING MAXIMUM/MINIMUM VALUES FOR TWO- DIMENTIONAL MATHMATICLE FUNCTIONS USING RANDOM CREOSSOVER TECHNIQUES

DETERMINING MAXIMUM/MINIMUM VALUES FOR TWO- DIMENTIONAL MATHMATICLE FUNCTIONS USING RANDOM CREOSSOVER TECHNIQUES DETERMINING MAXIMUM/MINIMUM VALUES FOR TWO- DIMENTIONAL MATHMATICLE FUNCTIONS USING RANDOM CREOSSOVER TECHNIQUES SHIHADEH ALQRAINY. Department of Software Engineering, Albalqa Applied University. E-mail:

More information

Layer-Wise Topology Design for Cost Effective IP-Optical Networks

Layer-Wise Topology Design for Cost Effective IP-Optical Networks Communications and Networ, 2012, 4, 88-92 http://dx.doi.org/10.4236/cn.2012.41012 Published Online February 2012 (http://www.scirp.org/journal/cn) Layer-Wise Topology Design for Cost Effective IP-Optical

More information

Adaptive Crossover in Genetic Algorithms Using Statistics Mechanism

Adaptive Crossover in Genetic Algorithms Using Statistics Mechanism in Artificial Life VIII, Standish, Abbass, Bedau (eds)(mit Press) 2002. pp 182 185 1 Adaptive Crossover in Genetic Algorithms Using Statistics Mechanism Shengxiang Yang Department of Mathematics and Computer

More information

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks Timothy Hahn, Shen Wan March 5, 2008 Montana State University Computer Science Department Bozeman,

More information

Grid Scheduling Strategy using GA (GSSGA)

Grid Scheduling Strategy using GA (GSSGA) F Kurus Malai Selvi et al,int.j.computer Technology & Applications,Vol 3 (5), 8-86 ISSN:2229-693 Grid Scheduling Strategy using GA () Dr.D.I.George Amalarethinam Director-MCA & Associate Professor of Computer

More information

C 1 Modified Genetic Algorithm to Solve Time-varying Lot Sizes Economic Lot Scheduling Problem

C 1 Modified Genetic Algorithm to Solve Time-varying Lot Sizes Economic Lot Scheduling Problem C 1 Modified Genetic Algorithm to Solve Time-varying Lot Sizes Economic Lot Scheduling Problem Bethany Elvira 1, Yudi Satria 2, dan Rahmi Rusin 3 1 Student in Department of Mathematics, University of Indonesia,

More information

ROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING

ROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING ROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING Mohamed KOUBAA, Nicolas PUECH, and Maurice GAGNAIRE Telecom Paris - LTCI -

More information

Deadline-Aware Co-Scheduling Using Anycast Advance Reservations in Wavelength Routed Lambda Grids

Deadline-Aware Co-Scheduling Using Anycast Advance Reservations in Wavelength Routed Lambda Grids Deadline-Aware Co-Scheduling Using Anycast Advance Reservations in Wavelength Routed Lambda Grids Hitesh Kulkarni, Arush Gadkar, and Vinod M. Vokkarane Department of Computer and Information Science University

More information

A Parallel Genetic Algorithm for Maximum Flow Problem

A Parallel Genetic Algorithm for Maximum Flow Problem A Parallel Genetic Algorithm for Maximum Flow Problem Ola M. Surakhi Computer Science Department University of Jordan Amman-Jordan Mohammad Qatawneh Computer Science Department University of Jordan Amman-Jordan

More information

Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation

Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation Muhammad S. Javed, Krishnaiyan Thulasiraman, Matthew A. Gaines School of Computer Science, University

More information

QUT Digital Repository:

QUT Digital Repository: QUT Digital Repository: http://eprints.qut.edu.au/ This is the accepted version of this conference paper. To be published as: Ai, Lifeng and Tang, Maolin and Fidge, Colin J. (2010) QoS-oriented sesource

More information

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in

More information

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS D. Harle, S. Albarrak, F. Ali Department of Electrical and Electronic Engineering, University of Strathclyde, U. K {d.harle,sbarrak,

More information

Energy-Efficient Traffic GroominginWDM Networks With Scheduled Time Traffic

Energy-Efficient Traffic GroominginWDM Networks With Scheduled Time Traffic JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 29, NO. 17, SEPTEMBER 1, 2011 2577 Energy-Efficient Traffic GroominginWDM Networks With Scheduled Time Traffic Shuqiang Zhang, Student Member, IEEE, Dong Shen, Student

More information

An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid

An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid Demin Wang 2, Hong Zhu 1, and Xin Liu 2 1 College of Computer Science and Technology, Jilin University, Changchun

More information

An experimental evaluation of a parallel genetic algorithm using MPI

An experimental evaluation of a parallel genetic algorithm using MPI 2009 13th Panhellenic Conference on Informatics An experimental evaluation of a parallel genetic algorithm using MPI E. Hadjikyriacou, N. Samaras, K. Margaritis Dept. of Applied Informatics University

More information

Survivable Multipath Provisioning in OFDM-Based Flexible Optical Networks

Survivable Multipath Provisioning in OFDM-Based Flexible Optical Networks Survivable Multipath Provisioning in OFDM-Based Flexible Optical Networks Nan Xiao and Lu Ruan Department of Computer Science Iowa Stat University, Ames, IA 11 Email: {nxiao, ruanlu}@iastate.edu Abstract

More information

Variable Neighborhood Search Based Algorithm for University Course Timetabling Problem

Variable Neighborhood Search Based Algorithm for University Course Timetabling Problem Variable Neighborhood Search Based Algorithm for University Course Timetabling Problem Velin Kralev, Radoslava Kraleva South-West University "Neofit Rilski", Blagoevgrad, Bulgaria Abstract: In this paper

More information

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Amit Shukla, L. Premjit Singh and Raja Datta, Dept. of Computer Science and Engineering, North Eastern Regional Institute

More information

An Evolutionary Algorithm for the Multi-objective Shortest Path Problem

An Evolutionary Algorithm for the Multi-objective Shortest Path Problem An Evolutionary Algorithm for the Multi-objective Shortest Path Problem Fangguo He Huan Qi Qiong Fan Institute of Systems Engineering, Huazhong University of Science & Technology, Wuhan 430074, P. R. China

More information

Time Complexity Analysis of the Genetic Algorithm Clustering Method

Time Complexity Analysis of the Genetic Algorithm Clustering Method Time Complexity Analysis of the Genetic Algorithm Clustering Method Z. M. NOPIAH, M. I. KHAIRIR, S. ABDULLAH, M. N. BAHARIN, and A. ARIFIN Department of Mechanical and Materials Engineering Universiti

More information

Genetic Algorithms. Kang Zheng Karl Schober

Genetic Algorithms. Kang Zheng Karl Schober Genetic Algorithms Kang Zheng Karl Schober Genetic algorithm What is Genetic algorithm? A genetic algorithm (or GA) is a search technique used in computing to find true or approximate solutions to optimization

More information

Design of Large-Scale Optical Networks Λ

Design of Large-Scale Optical Networks Λ Design of Large-Scale Optical Networks Λ Yufeng Xin, George N. Rouskas, Harry G. Perros Department of Computer Science, North Carolina State University, Raleigh NC 27695 E-mail: fyxin,rouskas,hpg@eos.ncsu.edu

More information

A THREAD BUILDING BLOCKS BASED PARALLEL GENETIC ALGORITHM

A THREAD BUILDING BLOCKS BASED PARALLEL GENETIC ALGORITHM www.arpapress.com/volumes/vol31issue1/ijrras_31_1_01.pdf A THREAD BUILDING BLOCKS BASED PARALLEL GENETIC ALGORITHM Erkan Bostanci *, Yilmaz Ar & Sevgi Yigit-Sert SAAT Laboratory, Computer Engineering Department,

More information

Traffic grooming, routing, and wavelength assignment in WDM transport networks with sparse grooming resources

Traffic grooming, routing, and wavelength assignment in WDM transport networks with sparse grooming resources Available online at www.sciencedirect.com Computer Communications 30 (2007) 3508 3524 www.elsevier.com/locate/comcom Traffic grooming, routing, and wavelength assignment in WDM transport networks with

More information

A Scalable Wavelength Assignment Algorithm Using Minimal Number of Wavelength Converters in Resilient WDM Networks

A Scalable Wavelength Assignment Algorithm Using Minimal Number of Wavelength Converters in Resilient WDM Networks A Scalable Wavelength Assignment Algorithm Using Minimal Number of Wavelength Converters in Resilient WDM Networks Technical Report UTD/EE/4/2009 September 2009 Miguel Razo, Shreejith Billenahalli, Wanjun

More information

Automatic Selection of GCC Optimization Options Using A Gene Weighted Genetic Algorithm

Automatic Selection of GCC Optimization Options Using A Gene Weighted Genetic Algorithm Automatic Selection of GCC Optimization Options Using A Gene Weighted Genetic Algorithm San-Chih Lin, Chi-Kuang Chang, Nai-Wei Lin National Chung Cheng University Chiayi, Taiwan 621, R.O.C. {lsch94,changck,naiwei}@cs.ccu.edu.tw

More information

Delayed reservation decision in optical burst switching networks with optical buffers

Delayed reservation decision in optical burst switching networks with optical buffers Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of

More information

Survivability schemes for optical backbone and access networks

Survivability schemes for optical backbone and access networks Graduate Theses and Dissertations Iowa State University Capstones, Theses and Dissertations 2010 Survivability schemes for optical backbone and access networks Taiming Feng Iowa State University Follow

More information

A Comparison of Path Protections with Availability Concern in WDM Core Network

A Comparison of Path Protections with Availability Concern in WDM Core Network A Comparison of Path Protections with Availability Concern in WDM Core Network M. A. Farabi Photonic Technology Lab, Universiti Teknologi, S. M. Idrus Member, IEEE Photonic Technology Lab, Universiti Teknologi,

More information

Virtual Source-Based Minimum Interference Path Multicast Routing with Differentiated QoS Guarantees in the Next Generation Optical Internet

Virtual Source-Based Minimum Interference Path Multicast Routing with Differentiated QoS Guarantees in the Next Generation Optical Internet Virtual Source-Based Minimum Interference Path Multicast Routing with Differentiated QoS Guarantees in the Next Generation Optical Internet Suk-Jin Lee 1, Kyung-Dong Hong 1, Chun-Jai Lee 1, Moon-Kyun Oh

More information

Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue

Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue Sandip R. Shinde Research Scholar, Sathyabama University, Chennai & Assistant Professor, Vishwakarma

More information

A NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT

A NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT A NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT Mohd Nazri Ismail Faculty of MIIT, University of Kuala Lumpur (UniKL), MALAYSIA, mnazrii@miit.unikl.edu.my Abstract Most

More information

Design of a Route Guidance System with Shortest Driving Time Based on Genetic Algorithm

Design of a Route Guidance System with Shortest Driving Time Based on Genetic Algorithm Design of a Route Guidance System with Shortest Driving Time Based on Genetic Algorithm UMIT ATILA 1, ISMAIL RAKIP KARAS 2, CEVDET GOLOGLU 3, BEYZA YAMAN 2, ILHAMI MUHARREM ORAK 2 1 Directorate of Computer

More information

A GENETIC ALGORITHM APPROACH TO OPTIMAL TOPOLOGICAL DESIGN OF ALL TERMINAL NETWORKS

A GENETIC ALGORITHM APPROACH TO OPTIMAL TOPOLOGICAL DESIGN OF ALL TERMINAL NETWORKS A GENETIC ALGORITHM APPROACH TO OPTIMAL TOPOLOGICAL DESIGN OF ALL TERMINAL NETWORKS BERNA DENGIZ AND FULYA ALTIPARMAK Department of Industrial Engineering Gazi University, Ankara, TURKEY 06570 ALICE E.

More information

Using Genetic Algorithm to Break Super-Pascal Knapsack Cipher

Using Genetic Algorithm to Break Super-Pascal Knapsack Cipher Cihan University, First International Scientific conference 204 Cihan University. All Rights Reserved. Research Article Using Genetic Algorithm to Break Super-Pascal Knapsack Cipher Safaa S Omran, Ali

More information

Job Shop Scheduling Problem (JSSP) Genetic Algorithms Critical Block and DG distance Neighbourhood Search

Job Shop Scheduling Problem (JSSP) Genetic Algorithms Critical Block and DG distance Neighbourhood Search A JOB-SHOP SCHEDULING PROBLEM (JSSP) USING GENETIC ALGORITHM (GA) Mahanim Omar, Adam Baharum, Yahya Abu Hasan School of Mathematical Sciences, Universiti Sains Malaysia 11800 Penang, Malaysia Tel: (+)

More information

WDM Network Provisioning

WDM Network Provisioning IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the

More information

Genetic Algorithm for Dynamic Capacitated Minimum Spanning Tree

Genetic Algorithm for Dynamic Capacitated Minimum Spanning Tree Genetic Algorithm for Dynamic Capacitated Minimum Spanning Tree Rahul Mathur M.Tech (Purs.) BU, AJMER IMRAN KHAN Assistant Professor AIT, Ajmer VIKAS CHOUDHARY Assistant Professor AIT, Ajmer ABSTRACT:-Many

More information

Comparison of Protection Cost at IP or WDM Layer

Comparison of Protection Cost at IP or WDM Layer Comparison of Protection Cost at IP or WDM Layer Mauro Cuna Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it Marco Mellia Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it

More information

International Journal of Scientific & Engineering Research, Volume 8, Issue 1, January ISSN

International Journal of Scientific & Engineering Research, Volume 8, Issue 1, January ISSN International Journal of Scientific & Engineering Research, Volume 8, Issue 1, January-2017 550 Using Neuro Fuzzy and Genetic Algorithm for Image Denoising Shaymaa Rashid Saleh Raidah S. Khaudeyer Abstract

More information

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding e Scientific World Journal, Article ID 746260, 8 pages http://dx.doi.org/10.1155/2014/746260 Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding Ming-Yi

More information

TRAFFIC GROOMING WITH BLOCKING PROBABILITY REDUCTION IN DYNAMIC OPTICAL WDM NETWORKS

TRAFFIC GROOMING WITH BLOCKING PROBABILITY REDUCTION IN DYNAMIC OPTICAL WDM NETWORKS TRAFFIC GROOMING WITH BLOCKING PROBABILITY REDUCTION IN DYNAMIC OPTICAL WDM NETWORKS K.Pushpanathan 1, Dr.A.Sivasubramanian 2 1 Asst Prof, Anand Institute of Higher Technology, Chennai-603103 2 Prof &

More information

A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings

A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings Xin Yuan Amit Fulay Department of Computer Science Florida State University Tallahassee, FL 32306 {xyuan, fulay}@cs.fsu.edu Abstract

More information

Automatic Clustering Old and Reverse Engineered Databases by Evolutional Processing

Automatic Clustering Old and Reverse Engineered Databases by Evolutional Processing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,

More information

Scheduling Mixed-Model Assembly Lines with Cost Objectives by a Hybrid Algorithm

Scheduling Mixed-Model Assembly Lines with Cost Objectives by a Hybrid Algorithm Scheduling Mixed-Model Assembly Lines with Cost Objectives by a Hybrid Algorithm Binggang Wang, Yunqing Rao, Xinyu Shao, and Mengchang Wang The State Key Laboratory of Digital Manufacturing Equipment and

More information

Using Genetic Algorithm with Triple Crossover to Solve Travelling Salesman Problem

Using Genetic Algorithm with Triple Crossover to Solve Travelling Salesman Problem Proc. 1 st International Conference on Machine Learning and Data Engineering (icmlde2017) 20-22 Nov 2017, Sydney, Australia ISBN: 978-0-6480147-3-7 Using Genetic Algorithm with Triple Crossover to Solve

More information

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sanjay K. Bose, SMIEEE, Y.N. Singh, MIEEE A.N.V.B. Raju Bhoomika Popat Department of Electrical

More information

THE EXPLOSIVE growth of Web-related services over the. A Practical Approach to Operating Survivable WDM Networks

THE EXPLOSIVE growth of Web-related services over the. A Practical Approach to Operating Survivable WDM Networks 34 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 A Practical Approach to Operating Survivable WDM Networks Murari Sridharan, Student Member, IEEE, Murti V. Salapaka, and

More information

Dynamic RWA Based on the Combination of Mobile Agents Technique and Genetic Algorithms in WDM Networks with Sparse Wavelength Conversion

Dynamic RWA Based on the Combination of Mobile Agents Technique and Genetic Algorithms in WDM Networks with Sparse Wavelength Conversion PAPER Special Section/Issue on Software Agent and its Application Dynamic RWA Based on the Combination of Mobile Agents Technique and Genetic Algorithms in WDM Networks with Sparse Wavelength Conversion

More information

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS IT Specialist Dorina LuminiŃa Copaci Gorj Court IT Expert Constantin Alin Copaci ANRCTI Bucharest Abstract: A large number of recovery mechanisms

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY /$ IEEE

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY /$ IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY 2010 67 1+NNetwork Protection for Mesh Networks: Network Coding-Based Protection Using p-cycles Ahmed E. Kamal, Senior Member, IEEE Abstract

More information

Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks

Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks André C. S. Donza, Carlos R. L. Francês High Performance Networks Processing Lab - LPRAD Universidade

More information

Performance Assessment of DMOEA-DD with CEC 2009 MOEA Competition Test Instances

Performance Assessment of DMOEA-DD with CEC 2009 MOEA Competition Test Instances Performance Assessment of DMOEA-DD with CEC 2009 MOEA Competition Test Instances Minzhong Liu, Xiufen Zou, Yu Chen, Zhijian Wu Abstract In this paper, the DMOEA-DD, which is an improvement of DMOEA[1,

More information

Link Based Vs. Path Based

Link Based Vs. Path Based Backup Multiplexing Student Lecture Presented by Mithun Hebbar (742056) EECS 864 Dept. Of Electrical Engineering and Computer Science University of Kansas 23 rd April, 2003 Outline Link based Vs Path Based

More information

DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS

DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS Shinya Ishida Graduate School of Information Science and Technology, Osaka University Machikaneyama 1-32, Toyonaka, Osaka, 0-0043

More information