2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)最新文献

筛选
英文 中文
A constraint-based local search for designing tree networks with distance and disjoint constraints 具有距离约束和不相交约束的树形网络设计的基于约束的局部搜索
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-11-12 DOI: 10.1109/RNDM.2015.7325219
Alejandro Arbelaez, D. Mehta, B. O’Sullivan, L. Quesada
{"title":"A constraint-based local search for designing tree networks with distance and disjoint constraints","authors":"Alejandro Arbelaez, D. Mehta, B. O’Sullivan, L. Quesada","doi":"10.1109/RNDM.2015.7325219","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325219","url":null,"abstract":"In many network design problems clients are required to be connected to a facility under path-length constraints and budget limits. Each facility is associated with a tree network where the root is the facility itself and the remaining nodes of the tree are its clients. An inherent feature of these networks is that they are vulnerable to a failure. Therefore, it is often important to provide some resiliency in the network. We focus on a problem where we want to ensure that all clients are connected to two facilities so that if one facility fails then all clients can still be served by another facility. Optionally, one might require that each client is resilient to a single link or node failure by enforcing that the paths used to connect a client to its two facilities are either edge-disjoint or node-disjoint respectively. In this paper we use local search to evaluate the trade-off between cost versus resiliency and coverage versus resiliency for a real-world problem in the field of optical networks.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115625418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective optimization of aircraft networks for weight, performance and survivability 飞机网络重量、性能和生存能力的多目标优化
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-11-12 DOI: 10.1109/RNDM.2015.7325251
Fabien Geyer, A. Elefsiniotis, D. Schupke, S. Schneele
{"title":"Multi-objective optimization of aircraft networks for weight, performance and survivability","authors":"Fabien Geyer, A. Elefsiniotis, D. Schupke, S. Schneele","doi":"10.1109/RNDM.2015.7325251","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325251","url":null,"abstract":"With a current utilization of around 25% of its total weight, optimization of cabling and harness plays an important role in the design of an aircraft. This is a multi-objective optimization problem as the physical properties of the harness (e.g., length and weight) as well as the logical properties of the underlying network (survivability and performance) have to be taken into account. We propose in this paper to investigate this multi-objective optimization problem and provide different algorithms to solve it. We first focus on expressing it as a mixed integer binary linear program. Due to the complexity of solving this class of linear programs, we propose various heuristics for providing a good solution to this problem.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117038358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Algorithms for finding robust and sustainable network flows against multilink-attack 针对多链路攻击寻找鲁棒和可持续网络流的算法
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-11-12 DOI: 10.1109/RNDM.2015.7325237
Jean-François Baffier, Vorapong Suppakitpaisarn
{"title":"Algorithms for finding robust and sustainable network flows against multilink-attack","authors":"Jean-François Baffier, Vorapong Suppakitpaisarn","doi":"10.1109/RNDM.2015.7325237","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325237","url":null,"abstract":"This work improves algorithms for finding network flows both sustainable and robust against multilink-attack (MLA). It brings out the relationship between sustainability (flow solution before attack known as MLA-reliable flow) and robustness (flow value after attack known as MLA-robust flow). Both problems are known to be NP-hard. However, exact polynomial time algorithms exist for certain categories of network. It includes the Extended Multiroute Flow (EMRF) algorithm that exhibits a solution to both MLA-robust and MLA-reliable flows. The class of networks solved by EMRF is extended here by using a capacity differentiation method. Although, the previous best-known approximation algorithm to both problems is the naturally robust and sustainable multiroute flow algorithm. A deeper analysis of EMRF an MLA problems leads to new methods to find tighter upper and lower bounds. The success rate of EMRF and the quality of the approximation is evaluated on practical networks as complex networks or grids.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128971371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of converged networks for 5G infrastructures 5G基础设施融合网络评估
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-11-12 DOI: 10.1109/RNDM.2015.7324301
A. Tzanakaki, M. Anastasopoulos, D. Simeonidou
{"title":"Evaluation of converged networks for 5G infrastructures","authors":"A. Tzanakaki, M. Anastasopoulos, D. Simeonidou","doi":"10.1109/RNDM.2015.7324301","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7324301","url":null,"abstract":"This paper focuses on a next generation ubiquitous converged infrastructure in accordance to the 5G model, to support cloud and mobile cloud computing services. This infrastructure interconnects fixed and mobile end users with data centres through a heterogeneous network integrating optical and wireless network domains. Virtualization across all technology domains is adopted and the virtual infrastructures are planned using a modelling framework based on Non-Linear Programming. Our modeling results identify trends and trade-offs relating to end-to-end delays and energy consumption levels including also resilience considerations.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interdependency in smart grid recovery 智能电网恢复中的相互依赖性
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-11-12 DOI: 10.1109/RNDM.2015.7325230
Jonas Wäfler, P. Heegaard
{"title":"Interdependency in smart grid recovery","authors":"Jonas Wäfler, P. Heegaard","doi":"10.1109/RNDM.2015.7325230","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325230","url":null,"abstract":"The pervasive use of information and communication technology (ICT) in the future power grid creates an interdependent system: ICT systems depend on power supply and the power grid depends on information channels and systems for monitoring and controlling. The automation of processes with ICT can reduce the most frequent failures and decrease their consequences. However, the added complexity and the tight integration comes with new failure sources and increased mutual dependencies between the systems and opens the possibility for more catastrophic failures. In this paper we focus on these interdependencies between the power grid and ICT in different phases of the recovery process of a power failure. We model the dependencies and quantify the effect of using smart monitoring devices in the detection phase. The analysis shows that adding battery backup into the communication network is a good measure to delay the interdependency effect encountered. The study of scenarios with different degrees of battery support, number of repair crews and fault detection mechanisms indicates that while automation can reduce the human effort needed for the most frequent failures, it can lead to longer down times in less frequent incidents, if no prevention measures are taken. Finally, we show that the skill sets and training level of the repair crews play a crucial role and can be used to prevent the negative effect in low frequency incidents.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133698914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Interplay between energy efficiency and survivable network planning with shared backup resources 具有共享备份资源的能源效率和可生存网络规划之间的相互作用
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-11-12 DOI: 10.1109/RNDM.2015.7325242
S. Jalalinia, C. Cavdar
{"title":"Interplay between energy efficiency and survivable network planning with shared backup resources","authors":"S. Jalalinia, C. Cavdar","doi":"10.1109/RNDM.2015.7325242","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325242","url":null,"abstract":"Backbone network infrastructures are deployed with redundant resources taking into account the backup capacity for protection in order to be resilient against link failures, serving extremely large amount of data transmission. This goes together with increasing power consumption of backbone networks. In this study the impact of green network design and flow routing mechanisms on different protection schemes is analyzed thoroughly by proposing models to obtain optimum solutions under various objectives: Minimizing consumption of (I) Capacity, (II) Capacity+Energy, and (III) Energy. Two different shared backup protection (SBP) schemes (1) SBP-ind (failure independent) and (2) SBP-dep (failure dependent) are compared with dedicated path protection (DPP). It is assumed that network links utilized by only backup paths can be put into sleep mode. It can be observed that when energy consumption is minimized, the backup sharing decreases in SBP and, in the extreme case, it behaves similar to DPP. The models are generalized and valid for both IP traffic flow routing and lightpath routing. It is shown that for a sample network topology, to save e.g., 32.33% power, capacity consumption increases significantly e.g., in SBP-ind up to 127.53%. In order to achieve a good compromise between power and capacity consumption we propose a multi-objective approach. Moreover this study presents a complete picture of various survivability mechanisms when power consumption is minimized together with the capacity consumption.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130149385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A telemetry design for anticipating train-road crossing collisions 预测火车与道路交叉碰撞的遥测设计
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-11-12 DOI: 10.1109/RNDM.2015.7325252
Markus Mäder, Wolfgang Münst, C. Dannheim, P. Sallis, Nicolas Gay, B. Malnar, Moinul Al-Mamun, Christian Icking
{"title":"A telemetry design for anticipating train-road crossing collisions","authors":"Markus Mäder, Wolfgang Münst, C. Dannheim, P. Sallis, Nicolas Gay, B. Malnar, Moinul Al-Mamun, Christian Icking","doi":"10.1109/RNDM.2015.7325252","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325252","url":null,"abstract":"Every year worldwide, dozens of people are injured or killed due to the non-alert for vehicle drivers of oncoming trains or trams. This paper proposes a telemetry network approach for addressing this situation. The concept of real-time traffic management utilizing a virtual road crossing controller system is described. Using mobile communication technologies, the power of cloud computing technology and the ability to perform real time data analysis is combined with decision-making algorithms, which enables a workable solution to be demonstrated. Some additional technologies include vehicle addressing, highly accurate geo-positioning, the TMP messaging protocol, a cloud based controller concept and ad-hoc group negotiations.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128887458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic source routing under attacks 攻击下的动态源路由
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-11-12 DOI: 10.1109/RNDM.2015.7325226
Mohamed A. Abdelshafy, P. King
{"title":"Dynamic source routing under attacks","authors":"Mohamed A. Abdelshafy, P. King","doi":"10.1109/RNDM.2015.7325226","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325226","url":null,"abstract":"MANET routing protocols are designed based on the assumption that all nodes cooperate without maliciously disrupting the operation of the routing protocol. A large number of attack types of varying severity are threatening MANET. Dynamic Source Routing (DSR) is a well-known reactive MANET routing protocol that does not support security of routing messages. In this paper, we study the performance of both DSR and its flow-state extension routing protocols in the presence of blackhole, grayhole, selfish and flooding attacks. We conclude that the performance of flow-state DSR is better than DSR in the presence of all attacks. Flooding attacks are found to dramatically impact all the standard performance metrics. Blackhole attacks significantly worse the packet delivery ratio in a static network using unmodified DSR. All the attacks greatly increase the end-to-end delay; an effect particularly marked in a static network.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126682810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Generalized shared protection (GSP): Simulation results and proof of optimality 广义共享保护(GSP):仿真结果和最优性证明
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-11-12 DOI: 10.1109/RNDM.2015.7325217
T. Cinkler, P. Soproni
{"title":"Generalized shared protection (GSP): Simulation results and proof of optimality","authors":"T. Cinkler, P. Soproni","doi":"10.1109/RNDM.2015.7325217","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7325217","url":null,"abstract":"Among various protection and restoration schemes it is hard to decide which is the best to be used in a certain situation. First, we propose a method to find the best possible shared protection scheme among all possible shared protection schemes. We provide optimisation and simulation results. Second, we prove the optimality of the proposed method in terms of minimal resource usage for any single demand to be routed with any shared protection: shared link, shared segment, and shared end-to-end path protection.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126515363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation and comparison of several graph robustness metrics to improve network resilience 几种提高网络弹性的图鲁棒性指标的评价和比较
2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM) Pub Date : 2015-11-12 DOI: 10.1109/RNDM.2015.7324302
Mohammed J. F. Alenazi, J. Sterbenz
{"title":"Evaluation and comparison of several graph robustness metrics to improve network resilience","authors":"Mohammed J. F. Alenazi, J. Sterbenz","doi":"10.1109/RNDM.2015.7324302","DOIUrl":"https://doi.org/10.1109/RNDM.2015.7324302","url":null,"abstract":"Computer networks serve as critical infrastructure to services in business, health care, and education. Targeted attacks and random failures may cause link or node removals, which in turn can cause significant disruption to the availability of network services. Designing a network topology to provide acceptable levels of service in the face of these challenges can save both lives and money. A number of graph robustness metrics have been introduced to measure network resilience against such attacks. One way to improve resilience against such challenges is to add a set of links to improve these graph robustness metrics. In this paper, we add links to a given graph to improve given robustness functions. Then, we evaluate non- and improved graphs by applying centrality-based attacks to examine their resilience. Our results show that adding links to balance link-betweenness yields the best network resilience against such attacks among the studied robustness metrics.","PeriodicalId":248916,"journal":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132070600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信