• Title/Summary/Keyword: Integer linear programming

Search Result 256, Processing Time 0.023 seconds

Efficient Provisioning for Multicast Virtual Network under Single Regional Failure in Cloud-based Datacenters

  • Liao, Dan;Sun, Gang;Anand, Vishal;Yu, Hongfang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2325-2349
    • /
    • 2014
  • Network virtualization technology plays a key role in cloud computing, which serves as an effective approach for provisioning a flexible and highly adaptable shared substrate network to satisfy the demands of various applications or services. Recently, the problem of mapping a virtual network (VN) onto a substrate network has been addressed by various algorithms. However, these algorithms are typically efficient for unicast service-oriented virtual networks, and generally not applicable to multicast service-oriented virtual networks (MVNs). Furthermore, the survivable MVN mapping (SMVNM) problem that considers the survivability of MVN has not been studied and is also the focus of this work. In this research, we discuss SMVNM problem under regional failures in the substrate network and propose an efficient algorithm for solving this problem. We first propose a framework and formulate the SMVNM problem with the objective of minimizing mapping cost by using mixed integer linear programming. Then we design an efficient heuristic to solve this problem and introduce several optimizations to achieve the better mapping solutions. We validate and evaluate our framework and algorithms by conducting extensive simulations on different realistic networks under various scenarios, and by comparing with existing approaches. Our simulation experiments and results show that our approach outperforms existing solutions.

Optimization of Energy Distribution in District Heating Systems (지역 냉난방 시스템의 에너지 분배 최적화)

  • Park, Tae Chang;Kim, Ui Sik;Kim, Lae-Hyun;Kim, Weon Ho;Kim, Seong Jin;Yeo, Yeong Koo
    • Korean Chemical Engineering Research
    • /
    • v.47 no.1
    • /
    • pp.119-126
    • /
    • 2009
  • A district energy system plays very important role to fulfill energy demand in regional areas. This paper diagnoses the necessity of the development of an economical operation system for the efficient operation of district energy plants located in Seoul. The effect anticipated from the use of the optimal operation system is also analyzed. Production and consumption of energy are estimated for the district energy plants at Suseo, Bundang, Ilwon and Jungang located near in Seoul, Korea. The problem is formulated as a mixed integer linear programming(MILP) problem where the objective is to minimize the overall cost of the district energy system. From the results of numerical simulations we can see that the energy efficiency is improved due to the application of the optimal operation conditions provided by the proposed model.

Virtual Network Embedding through Security Risk Awareness and Optimization

  • Gong, Shuiqing;Chen, Jing;Huang, Conghui;Zhu, Qingchao;Zhao, Siyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2892-2913
    • /
    • 2016
  • Network virtualization promises to play a dominant role in shaping the future Internet by overcoming the Internet ossification problem. However, due to the injecting of additional virtualization layers into the network architecture, several new security risks are introduced by the network virtualization. Although traditional protection mechanisms can help in virtualized environment, they are not guaranteed to be successful and may incur high security overheads. By performing the virtual network (VN) embedding in a security-aware way, the risks exposed to both the virtual and substrate networks can be minimized, and the additional techniques adopted to enhance the security of the networks can be reduced. Unfortunately, existing embedding algorithms largely ignore the widespread security risks, making their applicability in a realistic environment rather doubtful. In this paper, we attempt to address the security risks by integrating the security factors into the VN embedding. We first abstract the security requirements and the protection mechanisms as numerical concept of security demands and security levels, and the corresponding security constraints are introduced into the VN embedding. Based on the abstraction, we develop three security-risky modes to model various levels of risky conditions in the virtualized environment, aiming at enabling a more flexible VN embedding. Then, we present a mixed integer linear programming formulation for the VN embedding problem in different security-risky modes. Moreover, we design three heuristic embedding algorithms to solve this problem, which are all based on the same proposed node-ranking approach to quantify the embedding potential of each substrate node and adopt the k-shortest path algorithm to map virtual links. Simulation results demonstrate the effectiveness and efficiency of our algorithms.

Genetic Algorithm based Resource Management for Cognitive Mesh Networks with Real-time and Non-real-time Services

  • Shan, Hangguan;Ye, Ziyun;Bi, Yuanguo;Huang, Aiping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2774-2796
    • /
    • 2015
  • Quality-of-service (QoS) provisioning for a cognitive mesh network (CMN) with heterogeneous services has become a challenging area of research in recent days. Considering both real-time (RT) and non-real-time (NRT) traffic in a multihop CMN, [1] studied cross-layer resource management, including joint access control, route selection, and resource allocation. Due to the complexity of the formulated resource allocation problems, which are mixed-integer non-linear programming, a low-complexity yet efficient algorithm was proposed there to approximately solve the formulated optimization problems. In contrast, in this work, we present an application of genetic algorithm (GA) to re-address the hard resource allocation problems studied in [1]. Novel initialization, selection, crossover, and mutation operations are designed such that solutions with enough randomness can be generated and converge with as less number of attempts as possible, thus improving the efficiency of the algorithm effectively. Simulation results show the effectiveness of the newly proposed GA-based algorithm. Furthermore, by comparing the performance of the newly proposed algorithm with the one proposed in [1], more insights have been obtained in terms of the tradeoff among QoS provisioning for RT traffic, throughput maximization for NRT traffic, and time complexity of an algorithm for resource allocation in a multihop network such as CMN.

A Study on Balanced Team Formation Method Reflecting Characteristics of Students (학생들의 특성을 반영한 균형적인 팀 편성 방법에 관한 연구)

  • Kim, Jong-hwan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.6
    • /
    • pp.55-65
    • /
    • 2019
  • With the advent of the Fourth Industrial Revolution and changes in the educational environment, team-based assignments are increasing in university classes. Effective team formation in team-based class is an important issue that affects students' satisfaction and the effectiveness of education. However, previous studies mostly focused on post analysis on the results of team formation, which makes it difficult to use them in actual classes. In this paper, we present a mathematical model of how to create a balanced team that reflects students' abilities and other characteristics. Characteristic values for assignment may be scores, such as students' proficiency, binary values such as gender, and multi-values, such as grade or department. This problem is a type of equitable partitioning problem, which takes the form of 0-1 integer programming, and the objective function is linear or nonlinear, depending on how balance is achieved. The basic model or the extended model presented can be applied to the situation where teams are balanced in consideration of various factors in actual class.

A Study on Design Scheme of Mesh-Based Survivable WDM Networks (메쉬 기반의 생존성 WDM망의 설계 기법에 관한 연구)

  • 현기호;정영철
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.7
    • /
    • pp.507-517
    • /
    • 2003
  • A single fiber failure in mesh-based WDM networks may result in the loss of a large number of data. To remedy this problem, an efficient restoration algorithm for a single fiber failure in the mesh- based WDM network is necessary. We propose a new algorithm for restoration scheme in WDM networks and compare it with previous schemes. Path restoration and link restoration are two representative restoration schemes which deal with only a single link failure. In this paper, we propose two kinds of efficient restoration scheme. In the proposed schemes the restoration path for each link failure is not secured. The mesh network is decomposed into a number of small loops. In one algorithm, any link failure in a certain loop is regarded as the failure of the loop and the restoration lightpath is selected by detouring the failed loop. In another scheme any link failure in a certain loop is restored within the loop. We compare performance of the proposed schemes with conventional path restoration scheme and link restoration scheme. Simulation results show that CPU time in the proposed schemes decreases compared with that in path restoration scheme and link restoration scheme, although total wavelength mileage usage increases by 10% to 50%.

A Novel Shared Segment Protection Algorithm for Multicast Sessions in Mesh WDM Networks

  • Lu, Cai;Luo, Hongbin;Wang, Sheng;Li, Lemin
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.329-336
    • /
    • 2006
  • This paper investigates the problem of protecting multicast sessions in mesh wavelength-division multiplexing (WDM) networks against single link failures, for example, a fiber cut in optical networks. First, we study the two characteristics of multicast sessions in mesh WDM networks with sparse light splitter configuration. Traditionally, a multicast tree does not contain any circles, and the first characteristic is that a multicast tree has better performance if it contains some circles. Note that a multicast tree has several branches. If a path is added between the leave nodes on different branches, the segment between them on the multicast tree is protected. Based the two characteristics, the survivable multicast sessions routing problem is formulated into an Integer Linear Programming (ILP). Then, a heuristic algorithm, named the adaptive shared segment protection (ASSP) algorithm, is proposed for multicast sessions. The ASSP algorithm need not previously identify the segments for a multicast tree. The segments are determined during the algorithm process. Comparisons are made between the ASSP and two other reported schemes, link disjoint trees (LDT) and shared disjoint paths (SDP), in terms of blocking probability and resource cost on CERNET and USNET topologies. Simulations show that the ASSP algorithm has better performance than other existing schemes.

  • PDF

Advanced Time-Cost Trade-Off Model using Mixed Integer Programming (혼합정수 프로그래밍 기법을 이용한 진보된 Time-Cost Trade-Off Model)

  • Kwon, Obin;Lee, Seunghyun;Son, Jaeho
    • Korean Journal of Construction Engineering and Management
    • /
    • v.16 no.6
    • /
    • pp.53-62
    • /
    • 2015
  • Time-Cost Trade-Off (TCTO) model is an important model in the construction project planning and control area. Two types of Existing TCTO model, continuous and discrete TCTO model, have been developed by researchers. However, Using only one type of model has a limitation to represent a realistic crash scenario of activities in the project. Thus, this paper presents a comprehensive TCTO model that combines a continuous and discrete model. Additional advanced features for non-linear relationship, incentive, and liquidated damage are included in the TCTO model. These features make the proposed model more applicable to the construction project. One CPM network with 6 activities is used to explain the proposed model. The model found an optimal schedule for the example to satisfy all the constraints. The results show that new model can represent more flexible crash scenario in TCTO model.

A Framework of Resource Provisioning and Customized Energy-Efficiency Optimization in Virtualized Small Cell Networks

  • Sun, Guolin;Clement, Addo Prince;Boateng, Gordon Owusu;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5701-5722
    • /
    • 2018
  • The continuous increase in the cost of energy production and concerns for environmental sustainability are leading research communities, governments and industries to amass efforts to reduce energy consumption and global $CO_2$ footprint. Players in the information and communication industry are keen on reducing the operational expenditures (OpEx) and maintaining the profitability of cellular networks. Meanwhile, network virtualization has been proposed in this regard as the main enabler for 5G mobile cellular networks. In this paper, we propose a generic framework of slice resource provisioning and customized physical resource allocation for energy-efficiency and quality of service optimization. In resource slicing, we consider user demand and population resources provisioning scheme aiming to satisfy quality of service (QoS). In customized physical resource allocation, we formulate this problem with an integer non-linear programming model, which is solved by a heuristic algorithm based on minimum vertex coverage. The proposed algorithm is compared with the existing approaches, without consideration of slice resource constraints via system-level simulations. From the perspective of infrastructure providers, traffic is scheduled over a limited number of active small-cell base stations (sc-BSs) that significantly reduce the system energy consumption and improve the system's spectral efficiency. From the perspective of virtual network operators and mobile users, the proposed approach can guarantee QoS for mobile users and improve user satisfaction.

A Study on the Optimization Problem for Offshore Oil Production and Transportation (해양 석유 생산 및 수송 최적화 문제에 관한 연구)

  • Kim, Chang-Soo;Kim, Si-Hwa
    • Journal of Navigation and Port Research
    • /
    • v.39 no.4
    • /
    • pp.353-360
    • /
    • 2015
  • The offshore oil production requires a huge amount of cost and time accompanied by multiple variables due to the peculiar nature of 'offshore'. And every process concerned is controlled by elaborate series of plans for reducing loss of lives, environment and property. This paper treats an optimization problem for offshore oil production and transportation. We present an offshore production and transportation network to define scope of the problem and construct a mixed integer linear programming model to tackle it. To demonstrate the validity of the optimization model presented, some computational experiments based on hypothetical offshore oil fields and demand markets are carried out by using MS Office Excel solver. The downstream of the offshore production and transportation network ends up with the maritime transportation problem distributing the crude oil produced from offshore fields to demand markets. We used MoDiSS(Model-based DSS in Ship Scheduling) which was built to resolve this maritime transportation problem. The paper concludes with the remark that the results of the study might be meaningfully applicable to the real world problems of offshore oil production and transportation.