Validation of multi-layer network optimization

We consider the problem of routing and resource allocation in a multi-layer network loaded by a combination of constant bit-rate (CBR) and variable bit-rate (VBR) traffic streams. One scalable heuristic method that addresses this problem is the multi-layer market algorithm (MMA). In this paper we focus on two validation benchmarks of MM A by Integer Linear Programming (ILP). The first is based on the principle of peak rate allocation (all CBR), and the second is a modification of the first that also considers statistical multiplexing suited for inclusion of VBR traffic. The accuracy of MMA is then demonstrated for a small size problem amenable to ILP solution. In addition, we briefly discuss our recently developed method, based on the accounting principle of double-entry bookkeeping, used for verification of MMA correctness.

[1]  Herbert Snyder Double-Entry Bookkeeping. , 1999 .

[2]  H. Zimmermann,et al.  OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.

[3]  Walter Willinger,et al.  On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.

[4]  Matthias Gunkel,et al.  Cost modeling and evaluation of capital expenditures in optical multilayer networks , 2008 .

[5]  Moshe Zukerman,et al.  Optimizing multi-layered networks towards a transparently optical internet , 2010, 2010 12th International Conference on Transparent Optical Networks.

[6]  Moshe Zukerman,et al.  Cost modelling and validation in network optimization , 2015, 2015 International Telecommunication Networks and Applications Conference (ITNAC).

[7]  Michela Meo,et al.  Research challenges on energy-efficient networking design , 2014, Comput. Commun..

[8]  M. Zukerman,et al.  A new teletraffic approach for network planning and evolution prediction , 2012, OFC/NFOEC.

[9]  Moshe Zukerman,et al.  Internet traffic modeling and future technology implications , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[10]  Moshe Zukerman,et al.  Performance evaluation of a queue fed by a Poisson Pareto burst process , 2002, Comput. Networks.

[11]  Adel F. Agamy,et al.  A Survey on the Common Network Traffic Sources Models , 2011 .

[12]  Michael Menth,et al.  Greedy design of resilient multi-layer networks , 2010, 6th EURO-NGI Conference on Next Generation Internet.

[13]  Sally Floyd,et al.  Wide-area traffic: the failure of Poisson modeling , 1994 .

[14]  Deep Medhi,et al.  Routing, flow, and capacity design in communication and computer networks , 2004 .

[15]  Moshe Zukerman,et al.  NetML: Networking Networks , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.