Shared Protection of Virtual Private Networks with Heuristic Methods

نویسندگان

  • Péter Hegyi
  • Markosz Maliosz
  • Ákos Ladányi
  • Tibor Cinkler
چکیده

In our paper we analysed algorithms that seek the optimal routing configuration in backbone networks with capacity constraints. We investigated a special case when multiple full mesh demand sets (forming Virtual Private Networks (VPNs)) have to be built. We examined the pro-active path based shared protection scheme and investigated heuristic algorithms to calculate the paths. We analysed two different shared protection methods, and we also made comparisons between versions and objective types of the two algorithms. The first algorithm applies Dijkstra’s shortest path calculation, while the second algorithm is based on local search for the next hop. In the analysis and comparison numerical results are presented from calculations on sample networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Heuristic Algorithms for Shared Protection of Virtual Private Networks

Optimal routing in backbone networks with capacityconstraintsisaknownproblem.Thetaskcould be solved e.g. by integer programming or by heuristic algorithms. In our paper we analysed heuristic algorithms that solve the above-mentioned problem including protection. Furthermore we investigated a special case when multiple full mesh demand sets (formingVPNs)havetobebuilt. VPNsconnectmultiplesitesona...

متن کامل

Shared Protection of Virtual Private Networks with Traffic Concentration

In our paper we analyse algorithms that solve the optimal path search problem including the protection as well. We investigated the special case when multiple full mesh demand sets (forming VPNs) have to be built. We addressed the pro-active path based shared protection scheme and investigated heuristic algorithms to calculate the pair of paths. We formulated the problem generally without speci...

متن کامل

Semiotics of Collective Memory of the Iran-Iraq War (Holy Defence): A Case Study of the Shared Images in Virtual Social Networks

This study aims to achieve a semiotic understanding of collective memory of the Iran-Iraq war. For this purpose, samples of images in virtual social networks shared in response to the news of discovery and return of the bodies of more than 175 divers have been analyzed. Visual signs in photographs, cartoons, graphic designs, prints, paintings and posters, in methods of historical pictures and f...

متن کامل

Traffic engineering for MPLS-based virtual private networks

This paper considers the traffic engineering of MPLS-based virtual private networks (VPNs) with multiple classes of service. We focus on two main issues. Firstly, we point out that the one LSP per ingress-egress pair constraint can be relaxed for the case of MPLS-based VPNs due to the ease in classifying flows on a per-VPN basis. This allows us to use LSP with finer granularity and thus better ...

متن کامل

Polynomial Time Algorithm (PTA) to generate a survivable ring virtual topology for Optical WDM based on the Hamiltonian Circuit Detection Heuristics(HCDH)

The Routing and Wavelength Assignment (RWA) problem is known to be NP-hard for general Physical Topology (PT) in optical networks. We have analyzed the survivability of the optical network under Survivable Routing and Shared Path Protection (SPP) for various topologies and suggested two survivable RWA algorithms which are shown to perform better under certain performance matrix by simulation. G...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003