BMBF Project ROBUKOM: Robust Communication Networks

Similar documents
Decision Analysis. Decision-Making Problem. Decision Analysis. Part 1 Decision Analysis and Decision Tables. Decision Analysis, Part 1

Regret-based Reward Elicitation for Markov Decision Processes

Seminar - Organic Computing

Your Partner for Additive Manufacturing in Aachen. Community R&D Services Education

Given a directed graph G =(N A), where N is a set of m nodes and A. destination node, implying a direction for ow to follow. Arcs have limitations

AN EXAMPLE OF THE GOMORY CUTTING PLANE ALGORITHM. max z = 3x 1 + 4x 2. 3x 1 x x x x N 2

Your Partner for Additive Manufacturing in Aachen. Community R&D Services Education

The Good Judgment Project: A large scale test of different methods of combining expert predictions

Testing A Moving Target: How Do We Test Machine Learning Systems? Peter Varhol Technology Strategy Research, USA

Reinforcement Learning by Comparing Immediate Reward

Software Maintenance

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING

School of Innovative Technologies and Engineering

Python Machine Learning

Carter M. Mast. Participants: Peter Mackenzie-Helnwein, Pedro Arduino, and Greg Miller. 6 th MPM Workshop Albuquerque, New Mexico August 9-10, 2010

Beyond the Pipeline: Discrete Optimization in NLP

An Introduction to Simio for Beginners

Lecture 1: Machine Learning Basics

STA 225: Introductory Statistics (CT)

AUTOMATED TROUBLESHOOTING OF MOBILE NETWORKS USING BAYESIAN NETWORKS

Probability and Statistics Curriculum Pacing Guide

A simulated annealing and hill-climbing algorithm for the traveling tournament problem

Artificial Neural Networks written examination

An Effective Framework for Fast Expert Mining in Collaboration Networks: A Group-Oriented and Cost-Based Method

Mathematics subject curriculum

Circuit Simulators: A Revolutionary E-Learning Platform

A Comparison of Annealing Techniques for Academic Course Scheduling

Moderator: Gary Weckman Ohio University USA

Algebra 1, Quarter 3, Unit 3.1. Line of Best Fit. Overview

University of Groningen. Systemen, planning, netwerken Bosman, Aart

BADM 641 (sec. 7D1) (on-line) Decision Analysis August 16 October 6, 2017 CRN: 83777

EECS 700: Computer Modeling, Simulation, and Visualization Fall 2014

Math 1313 Section 2.1 Example 2: Given the following Linear Program, Determine the vertices of the feasible set. Subject to:

TABLE OF CONTENTS TABLE OF CONTENTS COVER PAGE HALAMAN PENGESAHAN PERNYATAAN NASKAH SOAL TUGAS AKHIR ACKNOWLEDGEMENT FOREWORD

Lecture 10: Reinforcement Learning

The Strong Minimalist Thesis and Bounded Optimality

"On-board training tools for long term missions" Experiment Overview. 1. Abstract:

Using the Attribute Hierarchy Method to Make Diagnostic Inferences about Examinees Cognitive Skills in Algebra on the SAT

FUZZY EXPERT. Dr. Kasim M. Al-Aubidy. Philadelphia University. Computer Eng. Dept February 2002 University of Damascus-Syria

Continual Curiosity-Driven Skill Acquisition from High-Dimensional Video Inputs for Humanoid Robots

College Pricing. Ben Johnson. April 30, Abstract. Colleges in the United States price discriminate based on student characteristics

On the Combined Behavior of Autonomous Resource Management Agents

The presence of interpretable but ungrammatical sentences corresponds to mismatches between interpretive and productive parsing.

Data Modeling and Databases II Entity-Relationship (ER) Model. Gustavo Alonso, Ce Zhang Systems Group Department of Computer Science ETH Zürich

Evolutive Neural Net Fuzzy Filtering: Basic Description

FY16 UW-Parkside Institutional IT Plan Report

Probabilistic Latent Semantic Analysis

Learning Methods for Fuzzy Systems

Cooperative Game Theoretic Models for Decision-Making in Contexts of Library Cooperation 1

MGT/MGP/MGB 261: Investment Analysis

Calibration of Confidence Measures in Speech Recognition

Improving Action Selection in MDP s via Knowledge Transfer

Radius STEM Readiness TM

Honors Mathematics. Introduction and Definition of Honors Mathematics

Specification and Evaluation of Machine Translation Toy Systems - Criteria for laboratory assignments

Truth Inference in Crowdsourcing: Is the Problem Solved?

SARDNET: A Self-Organizing Feature Map for Sequences

Reduce the Failure Rate of the Screwing Process with Six Sigma Approach

Spring 2015 IET4451 Systems Simulation Course Syllabus for Traditional, Hybrid, and Online Classes

College Pricing and Income Inequality

While you are waiting... socrative.com, room number SIMLANG2016

Rule-based Expert Systems

Document number: 2013/ Programs Committee 6/2014 (July) Agenda Item 42.0 Bachelor of Engineering with Honours in Software Engineering

Probability and Game Theory Course Syllabus

Intel-powered Classmate PC. SMART Response* Training Foils. Version 2.0

HARPER ADAMS UNIVERSITY Programme Specification

Communities in Networks. Peter J. Mucha, UNC Chapel Hill

A theoretic and practical framework for scheduling in a stochastic environment

Generative models and adversarial training

PRINCE2 Foundation (2009 Edition)

Bluetooth mlearning Applications for the Classroom of the Future

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Running Head: Implementing Articulate Storyline using the ADDIE Model 1. Implementing Articulate Storyline using the ADDIE Model.

Emergency Management Games and Test Case Utility:

OPTIMIZATINON OF TRAINING SETS FOR HEBBIAN-LEARNING- BASED CLASSIFIERS

Spring 2014 SYLLABUS Michigan State University STT 430: Probability and Statistics for Engineering

Active Learning. Yingyu Liang Computer Sciences 760 Fall

Stopping rules for sequential trials in high-dimensional data

CSC200: Lecture 4. Allan Borodin

Process to Identify Minimum Passing Criteria and Objective Evidence in Support of ABET EC2000 Criteria Fulfillment

Planning with External Events

Uncertainty concepts, types, sources

Visit us at:

Executive Guide to Simulation for Health

Team Formation for Generalized Tasks in Expertise Social Networks

Why Did My Detector Do That?!

48 contact hours using STANDARD version of Study & Solutions Kit

A Data Fusion Model for Location Estimation in Construction

1.11 I Know What Do You Know?

Massachusetts Institute of Technology Tel: Massachusetts Avenue Room 32-D558 MA 02139

Five Challenges for the Collaborative Classroom and How to Solve Them

High-level Reinforcement Learning in Strategy Games

CS Machine Learning

Agents and environments. Intelligent Agents. Reminders. Vacuum-cleaner world. Outline. A vacuum-cleaner agent. Chapter 2 Actuators

Probability estimates in a scenario tree

TIMSS ADVANCED 2015 USER GUIDE FOR THE INTERNATIONAL DATABASE. Pierre Foy

Georgetown University at TREC 2017 Dynamic Domain Track

Transcription:

BMBF Project ROBUKOM: Robust Communication Networks Arie M.C.A. Koster Christoph Helmberg Andreas Bley Martin Grötschel Thomas Bauschert supported by BMBF grant 03MS616A: ROBUKOM Robust Communication Networks, www.robukom.de EuroView 2012 24 July 2012 Lehrstuhl II für Mathematik

Project ROBUKOM ROBUKOM - Robust Communication Networks joint BMBF project started in Oct 2010, until Jun 2013 11 academics in 5 research groups: 2 industrial partners: mathematical planning and operation of robust telecommunication networks different robustness concepts: classical survivability, demand uncertainty For further information, visit www.robukom.de Arie Koster RWTH Aachen University 2 / 17

Project ROBUKOM ROBUKOM - Robust Communication Networks joint BMBF project started in Oct 2010, until Jun 2013 11 academics in 5 research groups: 2 industrial partners: mathematical planning and operation of robust telecommunication networks different robustness concepts: classical survivability, demand uncertainty For further information, visit www.robukom.de Project 1 Robust Network Design under Demand Uncertainties RWTH Aachen: AK, Manuel Kutschka, Christina Büsing (associated) Project 2 Convex Chance-Constrained Models for Robust Communication Networks TU Chemnitz: Christoph Helmberg, Peter Hoffmann Project 3 Scalable Optimization Methods for Survivable IP-Networks TU Berlin: Andreas Bley, Daniel Karch Project 4 Efficient Algorithms for Survivable Multi-Layer Networks Zuse Institute Berlin: Martin Grötschel, Fabio D Andreagiovanni Project 5 Robust Design of IP-Networks with Multiple Transport-Technologies TU Chemnitz: Thomas Bauschert, Uwe Steglich Arie Koster RWTH Aachen University 2 / 17

Project ROBUKOM ROBUKOM - Robust Communication Networks joint BMBF project started in Oct 2010, until Jun 2013 11 academics in 5 research groups: 2 industrial partners: mathematical planning and operation of robust telecommunication networks different robustness concepts: classical survivability, demand uncertainty For further information, visit www.robukom.de Project 1 Robust Network Design under Demand Uncertainties RWTH Aachen: AK, Manuel Kutschka, Christina Büsing (associated) Project 2 Convex Chance-Constrained Models for Robust Communication Networks TU Chemnitz: Christoph Helmberg, Peter Hoffmann Project 3 Scalable Optimization Methods for Survivable IP-Networks TU Berlin: Andreas Bley, Daniel Karch Project 4 Efficient Algorithms for Survivable Multi-Layer Networks Zuse Institute Berlin: Martin Grötschel, Fabio D Andreagiovanni Project 5 Robust Design of IP-Networks with Multiple Transport-Technologies TU Chemnitz: Thomas Bauschert, Uwe Steglich Arie Koster RWTH Aachen University 2 / 17

Outline 1 Network Design under Demand Uncertainty 2 WDM Replacement Problem Arie Koster RWTH Aachen University 3 / 17

How robust is a network design? Demand uncertainties Traffic fluctuations in the US abilene Internet2 network in time intervals of 5 minutes during one week: Traffic fluctuates heavily between node-pairs Arie Koster RWTH Aachen University 4 / 17

How robust is a network design? Demand uncertainties Traffic fluctuations in the US abilene Internet2 network in time intervals of 5 minutes during one week: Traffic fluctuates heavily between node-pairs Load of links will fluctuate alike Arie Koster RWTH Aachen University 4 / 17

How robust is a network design? Demand uncertainties Traffic fluctuations in the US abilene Internet2 network in time intervals of 5 minutes during one week: Traffic fluctuates heavily between node-pairs Load of links will fluctuate alike To avoid congestion, demand is overestimated by, e.g., 300% Can we do better? Arie Koster RWTH Aachen University 4 / 17

Design of Telecommunication Networks discrete decisions: given a potential network topology, demand forecast, link modules with capacities/costs find a hardware configuration, and a routing, such that demands are satisfied and total installation cost is minimised. Arie Koster RWTH Aachen University 5 / 17

Design of Telecommunication Networks discrete decisions: given a potential network topology, demand forecast, link modules with capacities/costs find a hardware configuration, and a routing, such that demands are satisfied and total installation cost is minimised. Variations / Extensions: Single path routing Integer routing Survivability requirements Node hardware (switching capacity) Wavelength assignment Multi-layer scenarios Arie Koster RWTH Aachen University 5 / 17

Deterministic Network Design f k ij = fraction of demand k K routed along arc (i, j) A. x e = number of link capacity modules to be installed on link e E. Arie Koster RWTH Aachen University 6 / 17

Deterministic Network Design f k ij = fraction of demand k K routed along arc (i, j) A. x e = number of link capacity modules to be installed on link e E. Integer Linear Programming formulation: min e E κ e x e s.t. {i,j} δ(i) k K (fij k fji k ) = (1) 1 i = s(k) 1 i = t(k), i V, k K (2) 0 else d k f k e Cx e, e E (3) f, x 0 (4) x Z E (5) Arie Koster RWTH Aachen University 6 / 17

Uncertain Demands Demand values d k are uncertain, i.e., random variables Arie Koster RWTH Aachen University 7 / 17

Uncertain Demands Demand values d k are uncertain, i.e., random variables Sufficient capacity cannot be guaranteed anymore! Arie Koster RWTH Aachen University 7 / 17

Uncertain Demands Demand values d k are uncertain, i.e., random variables Sufficient capacity cannot be guaranteed anymore! Capacity constraint (3) for edge e E changes to ( ) P d k fe k Cx e 1 ɛ, k K a so-called chance-constraint. Arie Koster RWTH Aachen University 7 / 17

Uncertain Demands Demand values d k are uncertain, i.e., random variables Sufficient capacity cannot be guaranteed anymore! Capacity constraint (3) for edge e E changes to ( ) P d k fe k Cx e 1 ɛ, k K a so-called chance-constraint. How to deal with such constraints in (integer) linear programs? Arie Koster RWTH Aachen University 7 / 17

Γ-Robust Network Design Approach by Bertsimas and Sim (2003,2004): d k [0, d k + ˆd k ], with nominal value d k and deviation ˆd k Arie Koster RWTH Aachen University 8 / 17

Γ-Robust Network Design Approach by Bertsimas and Sim (2003,2004): d k [0, d k + ˆd k ], with nominal value d k and deviation ˆd k Parameter Γ stating number of simultaneous deviations from nominal values Arie Koster RWTH Aachen University 8 / 17

Γ-Robust Network Design Approach by Bertsimas and Sim (2003,2004): d k [0, d k + ˆd k ], with nominal value d k and deviation ˆd k Parameter Γ stating number of simultaneous deviations from nominal values For each deviating demand, the peak value d k + ˆd k describes the worst-case (capacity-wise) Arie Koster RWTH Aachen University 8 / 17

Γ-Robust Network Design Approach by Bertsimas and Sim (2003,2004): d k [0, d k + ˆd k ], with nominal value d k and deviation ˆd k Parameter Γ stating number of simultaneous deviations from nominal values For each deviating demand, the peak value d k + ˆd k describes the worst-case (capacity-wise) Capacity constraint (3) for e E changes to: d k fe k + max ˆd k fe k Cx e, (6) k K Q K, Q Γ k Q (7) Arie Koster RWTH Aachen University 8 / 17

Γ-Robust Network Design Approach by Bertsimas and Sim (2003,2004): d k [0, d k + ˆd k ], with nominal value d k and deviation ˆd k Parameter Γ stating number of simultaneous deviations from nominal values For each deviating demand, the peak value d k + ˆd k describes the worst-case (capacity-wise) Capacity constraint (3) for e E changes to: d k fe k + max ˆd k fe k Cx e, (6) k K Q K, Q Γ k Q (7) Linearization by LP duality. Arie Koster RWTH Aachen University 8 / 17

Γ-Robust Network Design Approach by Bertsimas and Sim (2003,2004): d k [0, d k + ˆd k ], with nominal value d k and deviation ˆd k Parameter Γ stating number of simultaneous deviations from nominal values For each deviating demand, the peak value d k + ˆd k describes the worst-case (capacity-wise) Capacity constraint (3) for e E changes to: k K d k f k e + Γπ e + k K p k e Cx e, (6) π e + p k e ˆd k f k e (7) Linearization by LP duality. Arie Koster RWTH Aachen University 8 / 17

Computations Network Abilene Géant Germany17 Germany50 # nodes 12 22 17 50 # links 15 36 26 89 # demands 66 231 136 1044 available traffic period 6 months 4 months 1 day 1 day traffic granularity 5 min 15 min 5 min 5 min # available traffic matrices 48 095 10 737 288 288 # traffic matrices used 2 8 064 2 2 688 288 288 instances Abilene1 Geant1 Germany17 Germany50 Abilene2 Geant2 Arie Koster RWTH Aachen University 9 / 17

Computations Network Abilene Géant Germany17 Germany50 # nodes 12 22 17 50 # links 15 36 26 89 # demands 66 231 136 1044 available traffic period 6 months 4 months 1 day 1 day traffic granularity 5 min 15 min 5 min 5 min # available traffic matrices 48 095 10 737 288 288 # traffic matrices used 2 8 064 2 2 688 288 288 instances Abilene1 Geant1 Germany17 Germany50 Abilene2 Geant2 d k = geometric mean of 1 week / 1 day ˆd k = 95% percentile of 1 week / 1 day Arie Koster RWTH Aachen University 9 / 17

Gain of Robustness = Cost savings compared with 95% deterministic model Price of Robustness Arie Koster RWTH Aachen University 10 / 17

Gain of Robustness = Cost savings compared with 95% deterministic model Price of Robustness How robust are the network designs? Evaluation of 8064 traffic matrices (Abilene1, 4 weeks) realized robustness = maximal fraction of the total demand that can be routed for a traffic matrix Arie Koster RWTH Aachen University 10 / 17

Gain of Robustness = Cost savings compared with 95% deterministic model Price of Robustness How robust are the network designs? Evaluation of 8064 traffic matrices (Abilene1, 4 weeks) realized robustness = maximal fraction of the total demand that can be routed for a traffic matrix Arie Koster RWTH Aachen University 10 / 17

Gain of Robustness = Cost savings compared with 95% deterministic model Price of Robustness How robust are the network designs? Evaluation of 8064 traffic matrices (Abilene1, 4 weeks) realized robustness = maximal fraction of the total demand that can be routed for a traffic matrix Arie Koster RWTH Aachen University 10 / 17

Gain of Robustness = Cost savings compared with 95% deterministic model Price of Robustness How robust are the network designs? Evaluation of 8064 traffic matrices (Abilene1, 4 weeks) realized robustness = maximal fraction of the total demand that can be routed for a traffic matrix Arie Koster RWTH Aachen University 10 / 17

Realized Robustness Abilene network: Evaluation of 8064 traffic matrices (4 weeks) Géant network: Evaluation of 2688 traffic matrices (4 weeks) Γ ABILENE1 ABILENE2 GEANT1 GEANT2 0 1 5 10 K Arie Koster RWTH Aachen University 11 / 17

Realized Robustness Abilene network: Evaluation of 8064 traffic matrices (4 weeks) Géant network: Evaluation of 2688 traffic matrices (4 weeks) Γ ABILENE1 ABILENE2 GEANT1 GEANT2 0 1 5 10 K About 10% cost savings for Γ = 5 without losing robustness! Arie Koster RWTH Aachen University 11 / 17

Outline 1 Network Design under Demand Uncertainty 2 WDM Replacement Problem Arie Koster RWTH Aachen University 12 / 17

WDM replacement WDM upgrade procedure (1) Install new OXCs at node (In parallel to old one) (2) Shut down fiber(s) Replace regenerators Connect fiber(s) to new OXCs (3) Remove old OXCs from node Arie Koster RWTH Aachen University 13 / 17

WDM replacement WDM upgrade procedure (1) Install new OXCs at node (In parallel to old one) (2) Shut down fiber(s) Replace regenerators Connect fiber(s) to new OXCs (3) Remove old OXCs from node Arie Koster RWTH Aachen University 13 / 17

WDM replacement WDM upgrade procedure (1) Install new OXCs at node (In parallel to old one) (2) Shut down fiber(s) Replace regenerators Connect fiber(s) to new OXCs (3) Remove old OXCs from node Arie Koster RWTH Aachen University 13 / 17

WDM replacement WDM upgrade procedure (1) Install new OXCs at node (In parallel to old one) (2) Shut down fiber(s) Replace regenerators Connect fiber(s) to new OXCs (3) Remove old OXCs from node Arie Koster RWTH Aachen University 13 / 17

WDM replacement WDM upgrade procedure (1) Install new OXCs at node (In parallel to old one) (2) Shut down fiber(s) Replace regenerators Connect fiber(s) to new OXCs (3) Remove old OXCs from node Arie Koster RWTH Aachen University 13 / 17

WDM replacement WDM upgrade procedure (1) Install new OXCs at node (In parallel to old one) (2) Shut down fiber(s) Replace regenerators Connect fiber(s) to new OXCs (3) Remove old OXCs from node Arie Koster RWTH Aachen University 13 / 17

WDM replacement WDM upgrade procedure (1) Install new OXCs at node (In parallel to old one) (2) Shut down fiber(s) Replace regenerators Connect fiber(s) to new OXCs (3) Remove old OXCs from node Workforce constraint Step (2) requires personel at nodes and regenerators. Arie Koster RWTH Aachen University 13 / 17

WDM replacement WDM upgrade procedure (1) Install new OXCs at node (In parallel to old one) (2) Shut down fiber(s) Replace regenerators Connect fiber(s) to new OXCs (3) Remove old OXCs from node Workforce constraint Step (2) requires personel at nodes and regenerators. Arie Koster RWTH Aachen University 13 / 17

WDM replacement WDM upgrade procedure (1) Install new OXCs at node (In parallel to old one) (2) Shut down fiber(s) Replace regenerators Connect fiber(s) to new OXCs (3) Remove old OXCs from node Workforce constraint Step (2) requires personel at nodes and regenerators. Manpower sufficient to upgrade each single fiber Must upgrade fibers sequentially over multiple periods Arie Koster RWTH Aachen University 13 / 17

WDM replacement WDM upgrade procedure (1) Install new OXCs at node (In parallel to old one) (2) Shut down fiber(s) Replace regenerators Connect fiber(s) to new OXCs (3) Remove old OXCs from node Workforce constraint Step (2) requires personel at nodes and regenerators. Manpower sufficient to upgrade each single fiber Must upgrade fibers sequentially over multiple periods Arie Koster RWTH Aachen University 13 / 17

WDM replacement WDM upgrade procedure (1) Install new OXCs at node (In parallel to old one) (2) Shut down fiber(s) Replace regenerators Connect fiber(s) to new OXCs (3) Remove old OXCs from node Workforce constraint Step (2) requires personel at nodes and regenerators. Manpower sufficient to upgrade each single fiber Must upgrade fibers sequentially over multiple periods Arie Koster RWTH Aachen University 13 / 17

WDM replacement WDM upgrade procedure (1) Install new OXCs at node (In parallel to old one) (2) Shut down fiber(s) Replace regenerators Connect fiber(s) to new OXCs (3) Remove old OXCs from node Workforce constraint Step (2) requires personel at nodes and regenerators. Manpower sufficient to upgrade each single fiber Must upgrade fibers sequentially over multiple periods Arie Koster RWTH Aachen University 13 / 17

Upgrading an Existing Network Existing connections are disrupted (a) Upgrade all fibers at once Uncritical: Only short break. Arie Koster RWTH Aachen University 14 / 17

Upgrading an Existing Network Existing connections are disrupted (a) Upgrade all fibers at once Uncritical: Only short break. Arie Koster RWTH Aachen University 14 / 17

Upgrading an Existing Network Existing connections are disrupted (a) Upgrade all fibers at once Uncritical: Only short break. Arie Koster RWTH Aachen University 14 / 17

Upgrading an Existing Network Existing connections are disrupted (a) Upgrade all fibers at once Uncritical: Only short break. (b) Upgrade fibers non-simultaneously Critical: Connection down until all fibers are upgraded. Why: Old & new WDM systems incompatible No mixed new-old connectons Arie Koster RWTH Aachen University 14 / 17

Upgrading an Existing Network Existing connections are disrupted (a) Upgrade all fibers at once Uncritical: Only short break. (b) Upgrade fibers non-simultaneously Critical: Connection down until all fibers are upgraded. Why: Old & new WDM systems incompatible No mixed new-old connectons Arie Koster RWTH Aachen University 14 / 17

Upgrading an Existing Network Existing connections are disrupted (a) Upgrade all fibers at once Uncritical: Only short break. (b) Upgrade fibers non-simultaneously Critical: Connection down until all fibers are upgraded. Why: Old & new WDM systems incompatible No mixed new-old connectons Arie Koster RWTH Aachen University 14 / 17

Upgrading an Existing Network Existing connections are disrupted (a) Upgrade all fibers at once Uncritical: Only short break. (b) Upgrade fibers non-simultaneously Critical: Connection down until all fibers are upgraded. Why: Old & new WDM systems incompatible No mixed new-old connectons Arie Koster RWTH Aachen University 14 / 17

Upgrading an Existing Network Existing connections are disrupted (a) Upgrade all fibers at once Uncritical: Only short break. (b) Upgrade fibers non-simultaneously Critical: Connection down until all fibers are upgraded. Why: Old & new WDM systems incompatible No mixed new-old connectons Arie Koster RWTH Aachen University 14 / 17

Upgrading an Existing Network Existing connections are disrupted (a) Upgrade all fibers at once Uncritical: Only short break. (b) Upgrade fibers non-simultaneously Critical: Connection down until all fibers are upgraded. Why: Old & new WDM systems incompatible No mixed new-old connectons Planning task (simplified) Schedule fiber upgrades such that total disruption is minimized. Arie Koster RWTH Aachen University 14 / 17

Effect of Disruption on Different Services IP service Down if IP network disconnected Arie Koster RWTH Aachen University 15 / 17

Effect of Disruption on Different Services IP service Down if IP network disconnected Arie Koster RWTH Aachen University 15 / 17

Effect of Disruption on Different Services IP service Down if IP network disconnected Unprotected WDM connection Down if (single) path disrupted Arie Koster RWTH Aachen University 15 / 17

Effect of Disruption on Different Services IP service Down if IP network disconnected Unprotected WDM connection Down if (single) path disrupted Arie Koster RWTH Aachen University 15 / 17

Effect of Disruption on Different Services IP service Down if IP network disconnected Unprotected WDM connection Down if (single) path disrupted Protected WDM connection (1+1) Arie Koster RWTH Aachen University 15 / 17

Effect of Disruption on Different Services IP service Down if IP network disconnected Unprotected WDM connection Down if (single) path disrupted Protected WDM connection (1+1) Down if both paths disrupted Arie Koster RWTH Aachen University 15 / 17

Effect of Disruption on Different Services IP service Down if IP network disconnected Unprotected WDM connection Down if (single) path disrupted Protected WDM connection (1+1) Down if both paths disrupted Unprotected if one path disrupted Arie Koster RWTH Aachen University 15 / 17

Effect of Disruption on Different Services IP service Down if IP network disconnected Unprotected WDM connection Down if (single) path disrupted Protected WDM connection (1+1) Down if both paths disrupted Unprotected if one path disrupted Planning task Schedule fiber upgrades such that (1) IP service is never down (2) total WDM down time min (3) total WDM unprot. time min Arie Koster RWTH Aachen University 15 / 17

Conclusions Robust Network Design New ways to model network planning problem, allowing more information Mathematical Models are challenging generalization of existing theory Promising results: cheaper and better network designs Non-linear optimization approaches; techonology-dependent models WDM Replacement Problem New Problem many dependencies in solutions Straightforward formulation extremely weak First improvement results work in progress Arie Koster RWTH Aachen University 16 / 17

BMBF Project ROBUKOM: Robust Communication Networks Arie M.C.A. Koster Christoph Helmberg Andreas Bley Martin Grötschel Thomas Bauschert supported by BMBF grant 03MS616A: ROBUKOM Robust Communication Networks, www.robukom.de EuroView 2012 24 July 2012 Lehrstuhl II für Mathematik