10. Network dimensioning

Size: px
Start display at page:

Download "10. Network dimensioning"

Transcription

1 Partly based on slide material by Samuli Aalto and Jorma Virtamo ELEC-C7210 Modeling and analysis of communication networks 1

2 Contents Introduction Parameters: topology, routing and traffic Dimensioning for circuit switched networks Dimensioning for data networks with packet-level delay Dimensioning for data networks with elastic traffic 2

3 Role of dimensioning (1) First we need the network topology (nodes and links) Given by topology design problem, as studied in previous lecture Topology defines the connectivity between nodes but link capacities are still unknown Role of network dimensioning in network design Network topology (nodes and links), routing and offered traffic is given Provides reasonable estimates of the needed capacity to handle the offered traffic in the network at a given quality of service Models should be also simple enough so that it is not computationally too difficult to solve them! 3

4 Role of dimensioning (2) Performance analysis gives models that explain, for a given system, dependencies between: service quality of service traffic load system capacity capacity traffic In dimensioning, we use the models, fix QoS and load and ask: what is the needed capacity? 4

5 10. Network dimensioning Dimensioning as an optimization problem Typically formulated as an optimization problem min link capacities (or costs) so that offered traffic, link capacities QoS target Nonlinear optimization problems The specific form of the problem depends on network traffic assumptions and the associated performance measure 5

6 Aim of the lecture We consider three traffic models Circuit switched traffic Packet-level data traffic Elastic flow-level data traffic For end-to-end performance in the network we use the models already introduced in Network models lecture Aim is to show: The associated dimensioning problem formulations And how to solve them (numerically or analytically) 6

7 Contents Introduction Parameters: topology, routing and traffic Dimensioning for circuit switched networks Dimensioning for data networks with packet-level delay Dimensioning for data networks with elastic traffic 7

8 Input parameters to dimensioning problem Topology Nodes and the links (Simplified) routing Traffic matrix / offered traffic Traffic forecasting Busy hour traffic 8

9 Topology A data network consists of nodes and links Let N denote the set of nodes indexed with n Let J denote the set of links indexed with j Example: N < {a,b,c,d,e} J < {1,2,3,,12} a 1 2 b e 8 c d link 1 from node a to node b link 2 from node b to node a Let c j denote the capacity of link j 9

10 Routing in the network For dimensioning purposes, reasonable at this point to assume shortest path routing Exactly one route, or path, between every pair of nodes Path cost just number of hops Each path constitutes a class in our model Not an accurate assumption of actual routing but simplifies modeling Remember we aim at computationally simple models 10

11 Paths (or classes) We define a path (= route) as a set of consecutive links connecting two nodes Let P denote the set of paths indexed with p Each path p is a class in the model Example: three paths from node a to node c: 1 a 2 b e 11 8 c d red path consisting of links 1 and 3 green path consisting of links 11 and 6 blue path consisting of links 10, 8 and 6 11

12 Path matrix Each path consists of a set of links This connection is described by the path matrix A, for which element a jp < 1 if j p, that is, link j belongs to path p otherwise a jp < 0 each path is a column in the matrix each row tells which paths use that link Example: three columns of a path matrix ac1 ac2 ac

13 Need for traffic measurements and forecasts To properly dimension the network we need to estimate the traffic offered If the network is already operating, the current traffic is most precisely estimated by making traffic measurements in particular, then one estimates the busy hour traffic (recall from Traffic models lecture) Otherwise, the estimation should be based on other information, e.g. estimations on characteristic traffic generated by a subscriber estimations on the number of subscribers (from demographic data of population densities in the area) Long time-span of network investments it is not enough to estimate only the current traffic forecasts of future traffic are also needed 13

14 Traffic matrix Final result (that is, the forecast): traffic matrix describing the traffic interest between nodes (traffic areas) Traffic matrix = (t(i,j)) describes traffic interest between nodes N 2 elements (N = nr of exchanges) element t(i,i) tells the estimated traffic within node i, we assume however t(i,i) = 0 element t(i,j) tells the estimated traffic from node i to node j 14

15 Traffic matrix and offered traffic vector Since we have exactly one path for each pair (i,j), elements of traffic matrix can be represented by the offered traffic vector =,, Element gives the offered traffic on path p Unit of depends on traffic assumptions Unidirectional vs. bidirectional traffic Data traffic is unidirectional and thus each element is associated with the directed offered traffic from node i to node j. Thus, also link are directed. Circuit switched traffic is bidirectional and thus each element is associated with the sum of the offered traffic from node i to node j and from node j to node i. Thus, also links in the network and the paths are not directed. 15

16 10. Network dimensioning Link loads Then the traffic load on link j is given by the sum of offered traffic from the paths (or classes) that use link j = = () Recall from Network models lecture, R(j) is the set of paths (or classes) that use link j In matrix form, we obtain the vector of link loads r by = All our dimensioning models use link loads as traffic parameters 16

17 path links Example p ab {1} p ac {6,3} p ad {6} Consider bidirectional traffic and assume t(i,j) = 1 for all node pairs (i,j) We have 10 shortest paths, see table Thus, the corresponding link loads are: = = =4 =2 (1+1)=4 =2 ( )=8 =2 (1+1)=4 =2 (1+1)=4 =2 (1+1)=4 1 p ae {5} p bc {2} p bd {2,3} p be {1,5} p cd {3} p ce {3,4} p de {4} b 2 c 3 With unidirectional traffic all links need to be separated based on direction a 6 5 e 4 d 17

18 Contents Introduction Parameters: topology, routing and traffic Dimensioning for circuit switched networks Dimensioning for data networks with packet-level delay Dimensioning for data networks with elastic traffic 18

19 Offered traffic and performance requirement For circuit switched traffic, dimensioning is based on loss models and blocking probability Offered traffic On each path p new calls arrive at rate [1/s] Each call has an average duration h [s] Offered traffic on path p is simply their product (dimensionless erlangs) = h [erl] Recall that traffic on path p consists of the traffic from node i to node j, as well as traffic from node j to node i (bidirectional traffic!) Performance requirement End-to-end loss probability on each path < 19

20 Example: dimensioning curve for a single link For a single link we require: B req 1% Required link capacity: n = min{i = 1,2, Erl(i,a) B req } required link capacity n offered traffic a In a network, we apply the product bound (recall from Network models ) 20

21 10. Network dimensioning Dimensioning problem for circuit swítched traffic Problem formulation min so that =1 1 Erl, <, () Where the link weight parameter gives the price/capacity unit May depend, e.g., on the distance of the link This is a non-linear constrained integer optimization problem Not easy to solve numerically So called Moe s principle can be used to provide numerically efficiently a good (close to optimal) feasible solution to the problem Idea: Add capacity little by little on those links where the benefit of reduction in blocking probability is greatest until feasible solution is found 21

22 10. Network dimensioning Moe s principle in a network Let +1 denote the product bound on path p with link j having one more capacity unit, i.e., +1 =1 1 Erl + 1, 1 Erl, \ Initially, network is underdimensioned, e.g., =1on all links Iteration: Calculate gain Δ (decrease in blocking by adding one capacity unit relative to link cost) for each link. However, many paths use link j and we select the path that benefits the most and does not meet the target B req. Δ = 1 max : +1 On link j with maximum gain Δ, we increase the capacity by one unit, i.e., let = arg max Δ, and set +1 Continue until < on all paths p 22

23 Contents Introduction Parameters: topology, routing and traffic Dimensioning for circuit switched networks Dimensioning for data networks with packet-level delay Dimensioning for data networks with elastic traffic 23

24 Offered traffic and performance requirement For packet switched traffic, dimensioning is based on queuing models and the packet-level delay Offered traffic On each path p new packets arrive at rate [1/s] Each packet has an average length L [bits] Offered traffic on path p is simply their product (in bps) = [bps] Performance requirement Mean end-to-end packet delay of the network < 24

25 Dimensioning for a single link Pure queueing system Performance measure = Mean delay E[D] Formula for the mean waiting time E[D] (assuming that θ < 1): E[ D] < 1 < λ, κ L c, t Note: service rate λ = c/l and offered load parameter t = κl E[D] grows to infinity as offered load t tends to 1 25

26 Dimensioning curve for a single link Grade of Service requirement: E[D] 2*mean service time Allowed traffic θ 0.5 = 50% < 0.5 Required capacity c 2 t (blue line) required capacity c offered traffic t = L In a network, we apply the overall mean delay in the network along each path (recall from Network models ) 26

27 10. Network dimensioning Dimensioning problem for packet switched traffic Recall that the mean delay along each path is given by = Problem formulation min so that = 1 Λ () Where Λ=, i.e., total offered packet arrival rate This is a non-linear, but convex, constrained optimization problem However, this can be solved explicitly and we get a simple closed form solution for the capacities! In the optimization, the inequality constraint is obviously solved as equality 27

28 10. Network dimensioning Dimensioning problem formulation The constrained problem is converted to an unconstrained problem Include the constraint in the objective multiplied by a free parameter α = 1 Λ () Function G is so-called Lagrangian function in optimization theory For any value of α one can find the global minimum of G. Now, determine α such that the minimum satisfies the constraint. Then the global minimum of the expression G is located on the hypersurface determined by the constraint. The value of G on the hypersurface of the constraint is, for any α, the same as the original objective function, since the constraint is satisfied. Then the global minimum of G is certainly also the minimum of the function G constrained on the hypersurface. Thus, the found solution minimizes the objective function and satisfies the constraint condition and is the solution for our problem. 28

29 Performing the minimization (1) Objective function is continuous At optimum, partial derivative w.r.t. equals zero = + Λ 1 =0 = + Λ Note! Negative root not possible because of stability requirement > We get as a function of 29

30 10. Network dimensioning Performing the minimization (2) Inserting this back in the constraint, we can solve optimum α Finally, we obtain 1 Λ Λ =0 () 1 Λ = + 1 Λ Λ =0 Capacity must be at least due to stability and second term determines the additional capacity needed to satisfy our delay target! 30 = 1 Λ

31 Contents Introduction Parameters: topology, routing and traffic Dimensioning for circuit switched networks Dimensioning for data networks with packet-level delay Dimensioning for data networks with elastic traffic 31

32 Offered traffic and performance requirement For elastic data traffic, dimensioning is based on sharing models and flow-level delay or throughput For elastic data traffic we presented M/M/1-PS queue Single link with capacity C All flows share capacity perfectly fairly Under exponential assumptions same B-D process as ordinary M/M/1 FIFO queue Network model for elastic data traffic Generally called bandwidth sharing networks Not presented in the Network models lecture Reason: no simple models exist Even under Markovian assumptions we end up with complex multidimensional Markov processes with state-dependent rates 32

33 Dimensioning on a single link Throughput in M/M/1-PS queue Offered traffic = (arrival rate of flows times mean flow size) Throughput is just linear with respect to t : = Dimensioning very simple Throughput requirement Required capacity: + Excess capacity needed on top of t (stability) is just! Needed capacity as a function of offered traffic for =

34 Upper bound on throughput in bandwidth sharing networks Model On each path p new flows arrive at rate [1/s], routing matrix A Each flow has an average size S [bits] Offered traffic on path p is simply their product (dimensionless erlangs) = [bps] State gives number of on-going flows in each path On-going flows share fairly the capacity (somehow, characterized by some function of the state) Link load vector, as earlier, = Under certain conditions on the sharing function, upper bound for throughput of flows on path p is given by min ( ) Very natural interpretation: throughput bounded by throughput on bottle neck link along the path! 34

35 10. Network dimensioning Dimensioning problem for elastic traffic In a network, reasonable to require that on all paths in the network flows achieve some minimum target throughput min so that = min (), The constraints on the throughput in fact determine the solution The minimum operation can be replaced by writing the constraints separately for each link in J(p) since if the constraint is satisfied for all links it is satisfied by the minimum. Then do the same for all paths. We get many copies of the constraints per each link but the set of unique constraints are simply for all links. Thus, solution is = + That is, each link j is dimensioned as if it is an independent M/M/1-PS queue! 35

36 THE END What you should understand/remember: The concepts: network topology, traffic matrix Link loads (as determined by network topology, traffic matrix and shortest paths) Dimensioning as a nonlinear optimization problem Dimensioning of single link based on our elementary models for different traffic types Dimensioning of networks based on network level performance measure (product bound, overall packet level delay, mean flow throughput for elastic traffic) Role of dimensioning: to provide reasonable estimates for needed capacity! 36

10. Network planning and dimensioning

10. Network planning and dimensioning lect10.ppt S-38.145 - Introduction to Teletraffic Theory - Fall 2000 1 Contents Introduction Network planning Traffic forecasts Dimensioning 2 Telecommunication network A simple model of a telecommunication

More information

10. Network planning and dimensioning

10. Network planning and dimensioning lect10.ppt S-38.145 - Introduction to Teletraffic Theory - Fall 2001 1 Contents Introduction Network planning Traffic forecasts Dimensioning 2 Telecommunication network A simple model of a telecommunication

More information

3. Examples. Contents. Classical model for telephone traffic (1) Classical model for telephone traffic (2)

3. Examples. Contents. Classical model for telephone traffic (1) Classical model for telephone traffic (2) Contents Model for telephone traffic Packet level model for data traffic Flow level model for elastic data traffic Flow level model for streaming data traffic lect03.ppt S-38.45 - Introduction to Teletraffic

More information

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs Advanced Operations Research Techniques IE316 Quiz 1 Review Dr. Ted Ralphs IE316 Quiz 1 Review 1 Reading for The Quiz Material covered in detail in lecture. 1.1, 1.4, 2.1-2.6, 3.1-3.3, 3.5 Background material

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined

More information

PRIMAL-DUAL INTERIOR POINT METHOD FOR LINEAR PROGRAMMING. 1. Introduction

PRIMAL-DUAL INTERIOR POINT METHOD FOR LINEAR PROGRAMMING. 1. Introduction PRIMAL-DUAL INTERIOR POINT METHOD FOR LINEAR PROGRAMMING KELLER VANDEBOGERT AND CHARLES LANNING 1. Introduction Interior point methods are, put simply, a technique of optimization where, given a problem

More information

Final Exam Spring 2003

Final Exam Spring 2003 .8 Final Exam Spring Name Instructions.. Please answer all questions in the exam books that are provided.. Please budget your time carefully. It is often a good idea to read the entire exam first, so that

More information

Tuesday, April 10. The Network Simplex Method for Solving the Minimum Cost Flow Problem

Tuesday, April 10. The Network Simplex Method for Solving the Minimum Cost Flow Problem . Tuesday, April The Network Simplex Method for Solving the Minimum Cost Flow Problem Quotes of the day I think that I shall never see A poem lovely as a tree. -- Joyce Kilmer Knowing trees, I understand

More information

15.082J and 6.855J. Lagrangian Relaxation 2 Algorithms Application to LPs

15.082J and 6.855J. Lagrangian Relaxation 2 Algorithms Application to LPs 15.082J and 6.855J Lagrangian Relaxation 2 Algorithms Application to LPs 1 The Constrained Shortest Path Problem (1,10) 2 (1,1) 4 (2,3) (1,7) 1 (10,3) (1,2) (10,1) (5,7) 3 (12,3) 5 (2,2) 6 Find the shortest

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information

5.3 Cutting plane methods and Gomory fractional cuts

5.3 Cutting plane methods and Gomory fractional cuts 5.3 Cutting plane methods and Gomory fractional cuts (ILP) min c T x s.t. Ax b x 0integer feasible region X Assumption: a ij, c j and b i integer. Observation: The feasible region of an ILP can be described

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE Classes

Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE Classes Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE Classes Kehang Wu Douglas S. Reeves Capacity Planning for QoS DiffServ + MPLS QoS in core networks DiffServ provides

More information

Computational Methods. Constrained Optimization

Computational Methods. Constrained Optimization Computational Methods Constrained Optimization Manfred Huber 2010 1 Constrained Optimization Unconstrained Optimization finds a minimum of a function under the assumption that the parameters can take on

More information

Optical Packet Switching

Optical Packet Switching Optical Packet Switching DEISNet Gruppo Reti di Telecomunicazioni http://deisnet.deis.unibo.it WDM Optical Network Legacy Networks Edge Systems WDM Links λ 1 λ 2 λ 3 λ 4 Core Nodes 2 1 Wavelength Routing

More information

1 Linear programming relaxation

1 Linear programming relaxation Cornell University, Fall 2010 CS 6820: Algorithms Lecture notes: Primal-dual min-cost bipartite matching August 27 30 1 Linear programming relaxation Recall that in the bipartite minimum-cost perfect matching

More information

IO2654 Optical Networking. WDM network design. Lena Wosinska KTH/ICT. The aim of the next two lectures. To introduce some new definitions

IO2654 Optical Networking. WDM network design. Lena Wosinska KTH/ICT. The aim of the next two lectures. To introduce some new definitions IO2654 Optical Networking WDM network design Lena Wosinska KTH/ICT 1 The aim of the next two lectures To introduce some new definitions To make you aware about the trade-offs for WDM network design To

More information

The Bounded Edge Coloring Problem and Offline Crossbar Scheduling

The Bounded Edge Coloring Problem and Offline Crossbar Scheduling The Bounded Edge Coloring Problem and Offline Crossbar Scheduling Jonathan Turner WUCSE-05-07 Abstract This paper introduces a variant of the classical edge coloring problem in graphs that can be applied

More information

Teletraffic theory (for beginners)

Teletraffic theory (for beginners) Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles

More information

Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras

Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture - 35 Quadratic Programming In this lecture, we continue our discussion on

More information

Topology basics. Constraints and measures. Butterfly networks.

Topology basics. Constraints and measures. Butterfly networks. EE48: Advanced Computer Organization Lecture # Interconnection Networks Architecture and Design Stanford University Topology basics. Constraints and measures. Butterfly networks. Lecture #: Monday, 7 April

More information

Network Design for QoS under IEEE ( Zigbee ) CSMA/CA for Internet of Things Applications

Network Design for QoS under IEEE ( Zigbee ) CSMA/CA for Internet of Things Applications Network Design for QoS under IEEE 802.15.4 ( Zigbee ) CSMA/CA for Internet of Things Applications EECS Symposium Abhijit Bhattacharya Advisor: Prof. Anurag Kumar Dept. of ECE, IISc, Bangalore April 28,

More information

MATH3016: OPTIMIZATION

MATH3016: OPTIMIZATION MATH3016: OPTIMIZATION Lecturer: Dr Huifu Xu School of Mathematics University of Southampton Highfield SO17 1BJ Southampton Email: h.xu@soton.ac.uk 1 Introduction What is optimization? Optimization is

More information

TCP performance analysis through. processor sharing modeling

TCP performance analysis through. processor sharing modeling TCP performance analysis through processor sharing modeling Pasi Lassila a,b, Hans van den Berg a,c, Michel Mandjes a,d, and Rob Kooij c a Faculty of Mathematical Sciences, University of Twente b Networking

More information

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation Optimization Methods: Introduction and Basic concepts 1 Module 1 Lecture Notes 2 Optimization Problem and Model Formulation Introduction In the previous lecture we studied the evolution of optimization

More information

Part 4. Decomposition Algorithms Dantzig-Wolf Decomposition Algorithm

Part 4. Decomposition Algorithms Dantzig-Wolf Decomposition Algorithm In the name of God Part 4. 4.1. Dantzig-Wolf Decomposition Algorithm Spring 2010 Instructor: Dr. Masoud Yaghini Introduction Introduction Real world linear programs having thousands of rows and columns.

More information

Convex Optimization MLSS 2015

Convex Optimization MLSS 2015 Convex Optimization MLSS 2015 Constantine Caramanis The University of Texas at Austin The Optimization Problem minimize : f (x) subject to : x X. The Optimization Problem minimize : f (x) subject to :

More information

Unconstrained Optimization Principles of Unconstrained Optimization Search Methods

Unconstrained Optimization Principles of Unconstrained Optimization Search Methods 1 Nonlinear Programming Types of Nonlinear Programs (NLP) Convexity and Convex Programs NLP Solutions Unconstrained Optimization Principles of Unconstrained Optimization Search Methods Constrained Optimization

More information

Adaptive Load Balancing Using MPLS

Adaptive Load Balancing Using MPLS Adaptive Load Balancing Using MPLS Riikka Susitaival, Jorma Virtamo and Samuli Aalto Networking Laboratory Helsinki University of Technology Content Introduction Objectives of research Proposed algorithms

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Outline. Application examples

Outline. Application examples Outline Application examples Google page rank algorithm Aloha protocol Virtual circuit with window flow control Store-and-Forward packet-switched network Interactive system with infinite servers 1 Example1:

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Introduction to Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras

Introduction to Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Introduction to Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Module 03 Simplex Algorithm Lecture - 03 Tabular form (Minimization) In this

More information

Providing QoS to Real and Non-Real Time Traffic in IEEE networks

Providing QoS to Real and Non-Real Time Traffic in IEEE networks Providing QoS to Real and Non-Real Time Traffic in IEEE 802.16 networks Joint work with my student Harish Shetiya Dept. of Electrical Communication Engg., Indian Institute of Science, Bangalore Overview

More information

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize.

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize. Cornell University, Fall 2017 CS 6820: Algorithms Lecture notes on the simplex method September 2017 1 The Simplex Method We will present an algorithm to solve linear programs of the form maximize subject

More information

Optimization. Industrial AI Lab.

Optimization. Industrial AI Lab. Optimization Industrial AI Lab. Optimization An important tool in 1) Engineering problem solving and 2) Decision science People optimize Nature optimizes 2 Optimization People optimize (source: http://nautil.us/blog/to-save-drowning-people-ask-yourself-what-would-light-do)

More information

Lecture 2 September 3

Lecture 2 September 3 EE 381V: Large Scale Optimization Fall 2012 Lecture 2 September 3 Lecturer: Caramanis & Sanghavi Scribe: Hongbo Si, Qiaoyang Ye 2.1 Overview of the last Lecture The focus of the last lecture was to give

More information

Lecture 25 Nonlinear Programming. November 9, 2009

Lecture 25 Nonlinear Programming. November 9, 2009 Nonlinear Programming November 9, 2009 Outline Nonlinear Programming Another example of NLP problem What makes these problems complex Scalar Function Unconstrained Problem Local and global optima: definition,

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

Some economical principles

Some economical principles Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Some economical principles Assume users have

More information

Adaptive packet scheduling for requests delay guaranties in packetswitched computer communication network

Adaptive packet scheduling for requests delay guaranties in packetswitched computer communication network Paweł Świątek Institute of Computer Science Wrocław University of Technology Wybrzeże Wyspiańskiego 27 50-370 Wrocław, Poland Email: pawel.swiatek@pwr.wroc.pl Adam Grzech Institute of Computer Science

More information

2. Traffic lect02.ppt S Introduction to Teletraffic Theory Spring

2. Traffic lect02.ppt S Introduction to Teletraffic Theory Spring lect02.ppt S-38.145 - Introduction to Teletraffic Theory Spring 2005 1 Contents Traffic characterisation Telephone traffic modelling Data traffic modelling at packet level Data traffic modelling at flow

More information

The Simplex Algorithm

The Simplex Algorithm The Simplex Algorithm Uri Feige November 2011 1 The simplex algorithm The simplex algorithm was designed by Danzig in 1947. This write-up presents the main ideas involved. It is a slight update (mostly

More information

Convexization in Markov Chain Monte Carlo

Convexization in Markov Chain Monte Carlo in Markov Chain Monte Carlo 1 IBM T. J. Watson Yorktown Heights, NY 2 Department of Aerospace Engineering Technion, Israel August 23, 2011 Problem Statement MCMC processes in general are governed by non

More information

Lagrangean relaxation - exercises

Lagrangean relaxation - exercises Lagrangean relaxation - exercises Giovanni Righini Set covering We start from the following Set Covering Problem instance: min z = x + 2x 2 + x + 2x 4 + x 5 x + x 2 + x 4 x 2 + x x 2 + x 4 + x 5 x + x

More information

Routing algorithms. Jan Lönnberg, 51101M. October 2, Based on G. Tel: Introduction to Distributed Algorithms, chapter 4.

Routing algorithms. Jan Lönnberg, 51101M. October 2, Based on G. Tel: Introduction to Distributed Algorithms, chapter 4. Routing algorithms Jan Lönnberg, 51101M October 2, 2002 Based on G. Tel: Introduction to Distributed Algorithms, chapter 4. 1 Contents Introduction Destination-based routing Floyd-Warshall (single processor)

More information

Constrained Optimization

Constrained Optimization Constrained Optimization Dudley Cooke Trinity College Dublin Dudley Cooke (Trinity College Dublin) Constrained Optimization 1 / 46 EC2040 Topic 5 - Constrained Optimization Reading 1 Chapters 12.1-12.3

More information

CS200: Graphs. Rosen Ch , 9.6, Walls and Mirrors Ch. 14

CS200: Graphs. Rosen Ch , 9.6, Walls and Mirrors Ch. 14 CS200: Graphs Rosen Ch. 9.1-9.4, 9.6, 10.4-10.5 Walls and Mirrors Ch. 14 Trees as Graphs Tree: an undirected connected graph that has no cycles. A B C D E F G H I J K L M N O P Rooted Trees A rooted tree

More information

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in

More information

Capacity planning and.

Capacity planning and. Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Some economical principles Assume users have

More information

Chapter 3 Numerical Methods

Chapter 3 Numerical Methods Chapter 3 Numerical Methods Part 1 3.1 Linearization and Optimization of Functions of Vectors 1 Problem Notation 2 Outline 3.1.1 Linearization 3.1.2 Optimization of Objective Functions 3.1.3 Constrained

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

Introduction to Mathematical Programming IE496. Final Review. Dr. Ted Ralphs

Introduction to Mathematical Programming IE496. Final Review. Dr. Ted Ralphs Introduction to Mathematical Programming IE496 Final Review Dr. Ted Ralphs IE496 Final Review 1 Course Wrap-up: Chapter 2 In the introduction, we discussed the general framework of mathematical modeling

More information

Routing. Information Networks p.1/35

Routing. Information Networks p.1/35 Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual

More information

Artificial Intelligence

Artificial Intelligence Artificial Intelligence Combinatorial Optimization G. Guérard Department of Nouvelles Energies Ecole Supérieur d Ingénieurs Léonard de Vinci Lecture 1 GG A.I. 1/34 Outline 1 Motivation 2 Geometric resolution

More information

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing Husnu Saner Narman Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science University of Oklahoma,

More information

LECTURE 13: SOLUTION METHODS FOR CONSTRAINED OPTIMIZATION. 1. Primal approach 2. Penalty and barrier methods 3. Dual approach 4. Primal-dual approach

LECTURE 13: SOLUTION METHODS FOR CONSTRAINED OPTIMIZATION. 1. Primal approach 2. Penalty and barrier methods 3. Dual approach 4. Primal-dual approach LECTURE 13: SOLUTION METHODS FOR CONSTRAINED OPTIMIZATION 1. Primal approach 2. Penalty and barrier methods 3. Dual approach 4. Primal-dual approach Basic approaches I. Primal Approach - Feasible Direction

More information

and 6.855J Lagrangian Relaxation I never missed the opportunity to remove obstacles in the way of unity. Mohandas Gandhi

and 6.855J Lagrangian Relaxation I never missed the opportunity to remove obstacles in the way of unity. Mohandas Gandhi 15.082 and 6.855J Lagrangian Relaxation I never missed the opportunity to remove obstacles in the way of unity. Mohandas Gandhi On bounding in optimization In solving network flow problems, we not only

More information

Probabilistic Graphical Models

Probabilistic Graphical Models School of Computer Science Probabilistic Graphical Models Theory of Variational Inference: Inner and Outer Approximation Eric Xing Lecture 14, February 29, 2016 Reading: W & J Book Chapters Eric Xing @

More information

COT 6936: Topics in Algorithms! Giri Narasimhan. ECS 254A / EC 2443; Phone: x3748

COT 6936: Topics in Algorithms! Giri Narasimhan. ECS 254A / EC 2443; Phone: x3748 COT 6936: Topics in Algorithms! Giri Narasimhan ECS 254A / EC 2443; Phone: x3748 giri@cs.fiu.edu http://www.cs.fiu.edu/~giri/teach/cot6936_s12.html https://moodle.cis.fiu.edu/v2.1/course/view.php?id=174

More information

Some graph theory applications. communications networks

Some graph theory applications. communications networks Some graph theory applications to communications networks Keith Briggs Keith.Briggs@bt.com http://keithbriggs.info Computational Systems Biology Group, Sheffield - 2006 Nov 02 1100 graph problems Sheffield

More information

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012 Queuing Systems Queuing theory establishes a powerful tool in modeling and performance analysis of many complex systems, such as computer networks, telecommunication systems, call centers, manufacturing

More information

EXERCISES SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM. 1 Applications and Modelling

EXERCISES SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM. 1 Applications and Modelling SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM EXERCISES Prepared by Natashia Boland 1 and Irina Dumitrescu 2 1 Applications and Modelling 1.1

More information

Model suitable for virtual circuit networks

Model suitable for virtual circuit networks . The leinrock Independence Approximation We now formulate a framework for approximation of average delay per packet in telecommunications networks. Consider a network of communication links as shown in

More information

Reprinted with kind permission of Springer Science+Business Media.

Reprinted with kind permission of Springer Science+Business Media. Riikka Susitaival, Jorma Virtamo, and Samuli Aalto. Load balancing by MPLS in differentiated services networks. In Proceedings of the International Workshop on Architectures for Quality of Service in the

More information

Algorithms for Bioinformatics

Algorithms for Bioinformatics Adapted from slides by Leena Salmena and Veli Mäkinen, which are partly from http: //bix.ucsd.edu/bioalgorithms/slides.php. 582670 Algorithms for Bioinformatics Lecture 6: Distance based clustering and

More information

15. Cutting plane and ellipsoid methods

15. Cutting plane and ellipsoid methods EE 546, Univ of Washington, Spring 2012 15. Cutting plane and ellipsoid methods localization methods cutting-plane oracle examples of cutting plane methods ellipsoid method convergence proof inequality

More information

Unit-5 Dynamic Programming 2016

Unit-5 Dynamic Programming 2016 5 Dynamic programming Overview, Applications - shortest path in graph, matrix multiplication, travelling salesman problem, Fibonacci Series. 20% 12 Origin: Richard Bellman, 1957 Programming referred to

More information

CSE 417 Network Flows (pt 4) Min Cost Flows

CSE 417 Network Flows (pt 4) Min Cost Flows CSE 417 Network Flows (pt 4) Min Cost Flows Reminders > HW6 is due Monday Review of last three lectures > Defined the maximum flow problem find the feasible flow of maximum value flow is feasible if it

More information

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom Telecommunication Systems 0 (1998)?? 1 Blocking of dynamic multicast connections Jouni Karvo a;, Jorma Virtamo b, Samuli Aalto b and Olli Martikainen a a Helsinki University of Technology, Laboratory of

More information

Capacity planning and.

Capacity planning and. Some economical principles Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Assume users have

More information

In this chapter we introduce some of the basic concepts that will be useful for the study of integer programming problems.

In this chapter we introduce some of the basic concepts that will be useful for the study of integer programming problems. 2 Basics In this chapter we introduce some of the basic concepts that will be useful for the study of integer programming problems. 2.1 Notation Let A R m n be a matrix with row index set M = {1,...,m}

More information

Programming, numerics and optimization

Programming, numerics and optimization Programming, numerics and optimization Lecture C-4: Constrained optimization Łukasz Jankowski ljank@ippt.pan.pl Institute of Fundamental Technological Research Room 4.32, Phone +22.8261281 ext. 428 June

More information

MATH 890 HOMEWORK 2 DAVID MEREDITH

MATH 890 HOMEWORK 2 DAVID MEREDITH MATH 890 HOMEWORK 2 DAVID MEREDITH (1) Suppose P and Q are polyhedra. Then P Q is a polyhedron. Moreover if P and Q are polytopes then P Q is a polytope. The facets of P Q are either F Q where F is a facet

More information

Dynamic resource allocation for virtual path connections

Dynamic resource allocation for virtual path connections COST257: traffic theory for the networks of future Dynamic resource allocation for virtual path connections Samuli Aalto Laboratory of Telecommunications Technology Helsinki University of Technology samuli.aalto@hut.fi

More information

Support Vector Machines.

Support Vector Machines. Support Vector Machines srihari@buffalo.edu SVM Discussion Overview 1. Overview of SVMs 2. Margin Geometry 3. SVM Optimization 4. Overlapping Distributions 5. Relationship to Logistic Regression 6. Dealing

More information

Bilinear Programming

Bilinear Programming Bilinear Programming Artyom G. Nahapetyan Center for Applied Optimization Industrial and Systems Engineering Department University of Florida Gainesville, Florida 32611-6595 Email address: artyom@ufl.edu

More information

Copyright 2007 Pearson Addison-Wesley. All rights reserved. A. Levitin Introduction to the Design & Analysis of Algorithms, 2 nd ed., Ch.

Copyright 2007 Pearson Addison-Wesley. All rights reserved. A. Levitin Introduction to the Design & Analysis of Algorithms, 2 nd ed., Ch. Iterative Improvement Algorithm design technique for solving optimization problems Start with a feasible solution Repeat the following step until no improvement can be found: change the current feasible

More information

Introduction to Queuing Systems

Introduction to Queuing Systems Introduction to Queuing Systems Queuing Theory View network as collections of queues FIFO data-structures Queuing theory provides probabilistic analysis of these queues Examples: Average length Probability

More information

Introduction to Mathematical Programming IE406. Lecture 20. Dr. Ted Ralphs

Introduction to Mathematical Programming IE406. Lecture 20. Dr. Ted Ralphs Introduction to Mathematical Programming IE406 Lecture 20 Dr. Ted Ralphs IE406 Lecture 20 1 Reading for This Lecture Bertsimas Sections 10.1, 11.4 IE406 Lecture 20 2 Integer Linear Programming An integer

More information

2. Traffic. Contents. Offered vs. carried traffic. Characterisation of carried traffic

2. Traffic. Contents. Offered vs. carried traffic. Characterisation of carried traffic Contents characterisation Telephone traffic modelling Data traffic modelling at packet level Data traffic modelling at flow level lect.ppt S-8.5 - Introduction to Teletraffic Theory Spring 6 Offered vs.

More information

Lecture 10,11: General Matching Polytope, Maximum Flow. 1 Perfect Matching and Matching Polytope on General Graphs

Lecture 10,11: General Matching Polytope, Maximum Flow. 1 Perfect Matching and Matching Polytope on General Graphs CMPUT 675: Topics in Algorithms and Combinatorial Optimization (Fall 2009) Lecture 10,11: General Matching Polytope, Maximum Flow Lecturer: Mohammad R Salavatipour Date: Oct 6 and 8, 2009 Scriber: Mohammad

More information

(Refer Slide Time: 01:00)

(Refer Slide Time: 01:00) Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture minus 26 Heuristics for TSP In this lecture, we continue our discussion

More information

Maximum flow problem CE 377K. March 3, 2015

Maximum flow problem CE 377K. March 3, 2015 Maximum flow problem CE 377K March 3, 2015 Informal evaluation results 2 slow, 16 OK, 2 fast Most unclear topics: max-flow/min-cut, WHAT WILL BE ON THE MIDTERM? Most helpful things: review at start of

More information

Introduction to Modern Control Systems

Introduction to Modern Control Systems Introduction to Modern Control Systems Convex Optimization, Duality and Linear Matrix Inequalities Kostas Margellos University of Oxford AIMS CDT 2016-17 Introduction to Modern Control Systems November

More information

Stochastic Approximation and Transaction-Level Model for IP Network Design

Stochastic Approximation and Transaction-Level Model for IP Network Design Stochastic Approximation and Transaction-Level Model for IP Network Design Linhai He and Jean Walrand Department of Electrical Engineering and Computer Sciences University of California at Berkeley Berkeley,

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

Search direction improvement for gradient-based optimization problems

Search direction improvement for gradient-based optimization problems Computer Aided Optimum Design in Engineering IX 3 Search direction improvement for gradient-based optimization problems S Ganguly & W L Neu Aerospace and Ocean Engineering, Virginia Tech, USA Abstract

More information

Lecture Notes 2: The Simplex Algorithm

Lecture Notes 2: The Simplex Algorithm Algorithmic Methods 25/10/2010 Lecture Notes 2: The Simplex Algorithm Professor: Yossi Azar Scribe:Kiril Solovey 1 Introduction In this lecture we will present the Simplex algorithm, finish some unresolved

More information

Classification of Optimization Problems and the Place of Calculus of Variations in it

Classification of Optimization Problems and the Place of Calculus of Variations in it Lecture 1 Classification of Optimization Problems and the Place of Calculus of Variations in it ME256 Indian Institute of Science G. K. Ananthasuresh Professor, Mechanical Engineering, Indian Institute

More information

Traffic theory for the Internet and the future Internet

Traffic theory for the Internet and the future Internet Traffic theory for the Internet and the future Internet Orange Labs Jim Roberts, Research & Development 29 August 2008, MAS Seminar Internet traffic theory understanding the relationship between demand,

More information

Discrete Optimization 2010 Lecture 5 Min-Cost Flows & Total Unimodularity

Discrete Optimization 2010 Lecture 5 Min-Cost Flows & Total Unimodularity Discrete Optimization 2010 Lecture 5 Min-Cost Flows & Total Unimodularity Marc Uetz University of Twente m.uetz@utwente.nl Lecture 5: sheet 1 / 26 Marc Uetz Discrete Optimization Outline 1 Min-Cost Flows

More information

Dynamic Network Provisioning for Time-Varying Traffic

Dynamic Network Provisioning for Time-Varying Traffic JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. X, NO. X, XXXX 2X 1 Dynamic Network Provisioning for Time-Varying Traffic Vicky Sharma, Koushik Kar, Richard La, and Leandros Tassiulas Abstract: Abstract:

More information

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING ZVI LOTKER, BOAZ PATT-SHAMIR, AND ADI ROSÉN Abstract. We consider the model of adversarial queuing theory for packet networks introduced by Borodin et al.

More information

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing In this lecture we will discuss about Routing algorithms Congestion algorithms Lecture 19 The routing algorithm is that part of the network layer software, which is responsible for deciding which output

More information

Advanced Operations Research Techniques IE316. Quiz 2 Review. Dr. Ted Ralphs

Advanced Operations Research Techniques IE316. Quiz 2 Review. Dr. Ted Ralphs Advanced Operations Research Techniques IE316 Quiz 2 Review Dr. Ted Ralphs IE316 Quiz 2 Review 1 Reading for The Quiz Material covered in detail in lecture Bertsimas 4.1-4.5, 4.8, 5.1-5.5, 6.1-6.3 Material

More information

MST & Shortest Path -Prim s -Djikstra s

MST & Shortest Path -Prim s -Djikstra s MST & Shortest Path -Prim s -Djikstra s PRIM s - Minimum Spanning Tree - A spanning tree of a graph is a tree that has all the vertices of the graph connected by some edges. - A graph can have one or more

More information

ORF 307: Lecture 14. Linear Programming: Chapter 14: Network Flows: Algorithms

ORF 307: Lecture 14. Linear Programming: Chapter 14: Network Flows: Algorithms ORF 307: Lecture 14 Linear Programming: Chapter 14: Network Flows: Algorithms Robert J. Vanderbei April 10, 2018 Slides last edited on April 10, 2018 http://www.princeton.edu/ rvdb Agenda Primal Network

More information

Introduction to Mathematical Programming IE406. Lecture 16. Dr. Ted Ralphs

Introduction to Mathematical Programming IE406. Lecture 16. Dr. Ted Ralphs Introduction to Mathematical Programming IE406 Lecture 16 Dr. Ted Ralphs IE406 Lecture 16 1 Reading for This Lecture Bertsimas 7.1-7.3 IE406 Lecture 16 2 Network Flow Problems Networks are used to model

More information

Principles of Wireless Sensor Networks. Fast-Lipschitz Optimization

Principles of Wireless Sensor Networks. Fast-Lipschitz Optimization http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 5 Stockholm, October 14, 2011 Fast-Lipschitz Optimization Royal Institute of Technology - KTH Stockholm, Sweden e-mail: carlofi@kth.se

More information