Shared Protection of Virtual Private Networks with Heuristic Methods
نویسندگان
چکیده
In our paper we analysed algorithms that seek the optimal routing configuration in backbone networks with capacity constraints. We investigated a special case when multiple full mesh demand sets (forming Virtual Private Networks (VPNs)) have to be built. We examined the pro-active path based shared protection scheme and investigated heuristic algorithms to calculate the paths. We analysed two different shared protection methods, and we also made comparisons between versions and objective types of the two algorithms. The first algorithm applies Dijkstra’s shortest path calculation, while the second algorithm is based on local search for the next hop. In the analysis and comparison numerical results are presented from calculations on sample networks.
منابع مشابه
Heuristic Algorithms for Shared Protection of Virtual Private Networks
Optimal routing in backbone networks with capacityconstraintsisaknownproblem.Thetaskcould be solved e.g. by integer programming or by heuristic algorithms. In our paper we analysed heuristic algorithms that solve the above-mentioned problem including protection. Furthermore we investigated a special case when multiple full mesh demand sets (formingVPNs)havetobebuilt. VPNsconnectmultiplesitesona...
متن کاملShared Protection of Virtual Private Networks with Traffic Concentration
In our paper we analyse algorithms that solve the optimal path search problem including the protection as well. We investigated the special case when multiple full mesh demand sets (forming VPNs) have to be built. We addressed the pro-active path based shared protection scheme and investigated heuristic algorithms to calculate the pair of paths. We formulated the problem generally without speci...
متن کاملSemiotics of Collective Memory of the Iran-Iraq War (Holy Defence): A Case Study of the Shared Images in Virtual Social Networks
This study aims to achieve a semiotic understanding of collective memory of the Iran-Iraq war. For this purpose, samples of images in virtual social networks shared in response to the news of discovery and return of the bodies of more than 175 divers have been analyzed. Visual signs in photographs, cartoons, graphic designs, prints, paintings and posters, in methods of historical pictures and f...
متن کاملTraffic engineering for MPLS-based virtual private networks
This paper considers the traffic engineering of MPLS-based virtual private networks (VPNs) with multiple classes of service. We focus on two main issues. Firstly, we point out that the one LSP per ingress-egress pair constraint can be relaxed for the case of MPLS-based VPNs due to the ease in classifying flows on a per-VPN basis. This allows us to use LSP with finer granularity and thus better ...
متن کاملPolynomial Time Algorithm (PTA) to generate a survivable ring virtual topology for Optical WDM based on the Hamiltonian Circuit Detection Heuristics(HCDH)
The Routing and Wavelength Assignment (RWA) problem is known to be NP-hard for general Physical Topology (PT) in optical networks. We have analyzed the survivability of the optical network under Survivable Routing and Shared Path Protection (SPP) for various topologies and suggested two survivable RWA algorithms which are shown to perform better under certain performance matrix by simulation. G...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003