scholarly journals An exact lexicographic approach for the maximally risk-disjoint/minimal cost path pair problem in telecommunication networks

Top ◽  
2021 ◽  
Author(s):  
Marta Pascoal ◽  
José Craveirinha ◽  
João Clímaco

AbstractThe paper addresses the lexicographically maximal risk-disjoint/minimal cost path pair problem that aims at finding a pair of paths between two given nodes, which is the shortest (in terms of cost) among those that have the fewest risks in common. This problem is of particular importance in telecommunication network design, namely concerning resilient routing models where both a primary and a backup path have to be calculated to minimize the risk of failure of a connection between origin and terminal nodes, in case of failure along the primary path and where bandwidth routing costs should also be minimized. An exact combinatorial algorithm is proposed for solving this problem which combines a path ranking method and a path labelling algorithm. Also an integer linear programming (ILP) formulation is shown for comparison purposes. After a theoretical justification of the algorithm foundations, this is described and tested, together with the ILP procedure, for a set of reference networks in telecommunications, considering randomly generated risks, associated with Shared Risk Link Groups (SRLGs) and arc costs. Both methods were capable of solving the problem instances in relatively short times and, in general, the proposed algorithm was clearly faster than the ILP formulation excepting for the networks with the greatest dimension and connectivity.

Author(s):  
Ф.Х. НАХЛИ ◽  
А.И. ПАРАМОНОВ

Анализируется фрактальная размерность (ФР) сети связи и ее использование для исследования и планирования сетей связи. Рассматривается применение метода «выращивания кластера» для оценки ФР и предлагается новый метод определения ФР сети, основанный на оценивании связности сети путем поиска кратчайших путей. Показано, что оценка ФР сети является дополнительной характеристикой, отражающей топологические свойства сети. Дается сравнительный анализ предложенного метода и «выращивания кластера». Полученные результаты позволяют выбрать метод и получить оценки ФР сети в зависимости от ее особенностей. The paper analyzes the fractal dimension of the network and its use for telecommunication networks research and planning. The analysis of the "cluster growing" method for assessing the fractal dimension is given and a new method for assessing the fractal dimensionof anetwork is proposed, based onassessing the network connectivity by finding the shortest paths. The article shows that the assessment of the fractal dimension of the network is an additional characteristic that reflects the topological properties of the network. Comparative analysis of the proposed method and "cluster growing" is given. The results obtained make it possible to select a method and obtain estimates of the fractal dimension of the network, depending on its features.


2013 ◽  
Vol 4 (3) ◽  
pp. 388-392
Author(s):  
Shanu K Rakesh ◽  
Bharat Choudhary ◽  
Rachna Sandhu

Swarm intelligence, as demonstrated by natural biological swarms, has numerous powerful properties desirable in many engineering systems, such as telecommunication. Communication network management is becoming increasingly difficult  due to the increasing size, rapidly changing topology, and complexity of communication networks. This paper describes  how biologically-inspired agents can be used to solve control problems in telecommunications. These agents, inspired by the foraging behaviour of ants, exhibit the desirable characteristics of simplicity of action and interaction. The colle ction of agents, or swarm system, deals only with local knowledge and exhibits a form of distributed control with agent communication effected through the environment. In this paper we explore the application of ant-like agents to the problem of routing in telecommunication networks.


2019 ◽  
Vol 11 (1) ◽  
pp. 145-158
Author(s):  
Luis M. Roman ◽  
Ante Salcedo ◽  
Miguel Alonso Vilchis

Purpose – In this paper we propose an iterative approach for the deployment of rural telecommunication networks. Methodology/approach/design – This approach relies heavily on the concept of locality, prioritizing small ‘cells’ with a considerable population density, and exploits the natural nesting of the distribution of rural communities, focusing in communities which are populous enough to justify the investment required to provide them with connectivity, and whose sheer size promotes the formation of ‘satellite’ communities that could be benefited from the initial investment at a marginal expense. For this approach, the concept of ‘cells’ is paramount, which are constructed iteratively based on the contour of a Voronoi tessellation centered on the community of interest. Once the focal community has been ‘connected’ with network of the previous layer, the process is repeated with less populous communities at each stage until a coverage threshold has been reached. One of the main contributions of this methodology is that it makes every calculation based on ‘street distance’ instead of Euclidean, giving a more realistic approximate of the length of the network and hence the amount of the investment. To test our results, we ran our experiments on two segregated communities in one of the most complicated terrains, due to the mountain chains, in the state of Chiapas, Mexico. Findings – The results suggest that the use of ‘street distance’ and a local approach leads to the deployment of a remarkably different network than the standard methodology would imply. Practical implications – The results of this paper might lead to a significant reduction in the costs associated with these kinds of projects and therefore make the democratization of connectivity a reality. In order to make our results reproducible, we make all our code open and publicly available on GitHub.


2014 ◽  
Vol 5 (1) ◽  
pp. 1-13
Author(s):  
Haibo Wang ◽  
Bahram Alidaee ◽  
Wei Wang ◽  
Wei Ning

Telecommunication network infrastructures both stationary and ad hoc, play an important role in maintaining the stability of society worldwide. The protection of these critical infrastructures and their supporting structures become highly challenged due to its complexity. The understanding of interdependency of these infrastructures is the essential step to protect these infrastructures from destruction and attacks. This paper presents a critical infrastructure detection model to discover the interdependency based on the theories from social networks and new telecommunication pathways while this study transforms social theory into computational constructions. The procedure and solution of protecting critical infrastructures are discussed and computational results from the proposed model are presented.


Energies ◽  
2020 ◽  
Vol 13 (23) ◽  
pp. 6370
Author(s):  
Krzysztof Przystupa ◽  
Mykola Beshley ◽  
Mykola Kaidan ◽  
Volodymyr Andrushchak ◽  
Ivan Demydov ◽  
...  

In communication networks, the volume of traffic, the number of connected devices and users continues to grow. As a result, the energy consumption generated by the communication infrastructure has become an important parameter that needs to be carefully considered and optimized both when designing the network and when operating it in real-time. In this paper, the methodology of calculation of complex parameters of energy consumption for transport telecommunication networks is proposed. Unlike the known techniques, the proposed methodology takes into account heterogeneity and multilayer networks. It also takes into account the energy consumption parameter during the downtime of the network equipment in the process of processing the service data blocks, which is quite an important task for improving the accuracy of energy consumption at the stage of implementing the energy-saving network. We also developed simulation software to estimate and manage the energy consumption of the optical transport network using the LabVIEW environment. This software tool allows telecommunication network designers to evaluate energy consumption, which allows them to choose the optimal solution for the desired projects. The use of electro-and acousto-optical devices for optical transport networks is analyzed. We recommended using electro-optical devices for optical modulators and acousto-optical devices for optical switches. The gain from using this combination of optical devices and the parameter of rij electro-optical coefficient and M2 acousto-optical quality parameter found in the paper is about 36.1% relative to the complex criterion of energy consumption.


2011 ◽  
Vol 1 (4) ◽  
Author(s):  
Xiuquan Qiao ◽  
Xiaofeng Li ◽  
Anna Fensel ◽  
Fang Su

AbstractUbiquitous convergent telecommunication and Internet networks need to deliver services and content to users in a way that is tailored to the users’ context information and preferences. Thus, there is a new challenge in the areas of accurate service description, linking dynamic service discovery and invocation, which involves the services of telecom networks and the Internet. Semantic annotation can provide advantages for precise service description, discovery and composition. However, open service interface specifications of telecommunication networks are currently still in the syntactic level. By applying semantics to Parlay-based services for telecommunication networks and the Internet, we present an OWL-S-based semantic description approach for telecommunication network services, enabled by the telecommunication service domain ontologies to address the semantic interoperability that exists. Using this approach, we have implemented the semantic telecommunication services gateway and proposed the unified service integration architecture of telecommunication and Internet networks within the semantic-web service environment. Proof-of-concept prototype and case studies demonstrate the practical feasibility of the suggested solution.


Author(s):  
Sonia Giovinazzi ◽  
Andrew Austin ◽  
Rob Ruiter ◽  
Colin Foster ◽  
Mostafa Nayyerloo ◽  
...  

This paper provides an overview on the physical and functional performance of the New Zealand telecommunication network following the 14 November 2016 Kaikōura earthquake (Mw 7.8). Firstly, the paper provides an overview of the New Zealand telecommunications infrastructure. Secondly, the paper presents preliminary information on the impacts of the Kaikōura earthquake on the telecommunication network following the format proposed by [1] for post-earthquake assessment and resilience analysis of infrastructure systems, namely: extent of earthquake-induced physical impacts on the components of the telecommunication networks, identified according to a proposed taxonomy; main observed dependency issues; identification of resilience attributes and strategies that allowed an effective and rapid reinstatement of the telecommunication service. Finally lessons learned and research needs are discussed.


2018 ◽  
pp. 12-18
Author(s):  
Vladimir Baranov ◽  
Mikhail Kotsynyak ◽  
Denis Ivanov

The main trend in recent years is the shift of emphasis from mass attacks to targeted (target) attacks, which are the actions of the enemy of a particular state or non-state structure in advance. The target attack is always built under the object of influence, being a thoughtful operation, not a simple technical action. Target cyber attack on the element of information and telecommunication network is implemented in the form of a set of activities aimed at studying the information system and software. This allows for revealing weaknesses in the structure of the information and telecommunication network. The authors develop the technique of hidden introduction and bypass of standard means of information protection, fix the infrastructure, distribute the harmful action. Under the impact of a targeted cyber attack, it is difficult to choose the methods and means of protecting the information and telecommunication network, as their resource is limited. One of the ways to resolve this contradiction is a differentiated approach to the protection of information and telecommunication network, which is to choose the most relevant for the current situation areas of protection. The article deals with the problem of targeted attacks proliferation and describes the principle of their realization. The authors also substantiate the need of working out the methodology for estimating the impact of targeted cyber attacks by the enemy on information and telecommunications networks as well as their key elements. The special attention is paid to the purpose and structure of this methodology. The authors describe the stages of targeted cyber attack and its application areas.


Telecom IT ◽  
2021 ◽  
Vol 8 (4) ◽  
pp. 1-9
Author(s):  
T. Nzinga ◽  
A. Koucheryavy

Research subject. The article is devoted to the analysis of the development of telecommunication net-works in the Republic of Angola and the prospects for their development Method. System analysis. Core results. Determination of promising areas of research in the development of communication net-works in terms of their creation in sparsely populated and hard-to-reach areas. Practical relevance. The results of the article can be used to modernize the telecommunication network of the Republic of Angola.


Sign in / Sign up

Export Citation Format

Share Document