New approaches for virtual private network design

被引:0
|
作者
Eisenbrand, F
Grandoni, F
Oriolo, G
Skutella, M
机构
[1] Max Planck Inst Informat, D-66123 Saarbrucken, Germany
[2] Univ Roma La Sapienza, Dipartimento Informat, I-00198 Rome, Italy
[3] Univ Roma Tor Vergata, Dipartimento Ingn Impresa, I-00165 Rome, Italy
[4] Univ Dortmund, Fachbereich Math, D-44221 Dortmund, Germany
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Virtual private network design is the following NP-hard problem. We are given a communication network, represented as a weighted graph with thresholds on the nodes which represent the amount of flow that a node can send to and receive from the network. The task is to reserve capacities at minimum cost and to specify paths between every ordered pair of nodes such that all valid traffic-matrices can be routed along the corresponding paths. Recently, this network design problem has received considerable attention in the literature. It is motivated by the fact that the exact amount of flow which is exchanged between terminals is not known in advance and prediction is often illusive. The main contributions of this paper are as follows: - Using Hu's 2-commodity flow theorem, we provide a new lower bound on the cost of an optimum solution. - Using this lower bound we reanalyze a simple routing scheme which has been described in the literature many times and provide a considerably stronger upper bound on its approximation ratio. - We present a new randomized approximation algorithm for which, in contrast to earlier approaches from the literature, the resulting solution does not have tree structure. - Finally we show that a combination of our new algorithm with the simple routing scheme yields a randomized algorithm with expected performance ratio 3.55 for virtual private network design. This is a considerable improvement of the previously best known approximation results
引用
收藏
页码:1151 / 1162
页数:12
相关论文
共 50 条
  • [31] On the Difficulty of Virtual Private Network Instances
    Moradi, Ahmad
    Lodi, Andrea
    Hashemi, S. Mehdi
    NETWORKS, 2014, 63 (04) : 327 - 333
  • [32] A new virtual network static embedding strategy within the Cloud's private backbone network
    Fajjari, Ilhem
    Aitsaadi, Nadjib
    Pioro, Michal
    Pujolle, Guy
    COMPUTER NETWORKS, 2014, 62 : 69 - 88
  • [33] Virtual Private Network's Impact on Network Performance
    Nawej, Claude Mukatshung
    Du, Shengzhi
    2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 577 - 582
  • [34] Approaches to virtual library design
    Van Drie, JH
    Lajiness, MS
    DRUG DISCOVERY TODAY, 1998, 3 (06) : 274 - 283
  • [35] Virtual Private Supercomputer: Design and Evaluation
    Gankevich, Ivan
    Gaiduchok, Vladimir
    Gushchanskiy, Dmitry
    Tipikin, Yuri
    Korkhov, Vladimir
    Degtyarev, Alexander
    Bogdanov, Alexander
    Zolotarev, Valeriy
    2013 COMPUTER SCIENCE AND INFORMATION TECHNOLOGIES (CSIT), 2013,
  • [36] Design and implementation of virtual private services
    Ioannidis, S
    Bellovin, SM
    Ioannidis, J
    Keromytis, AD
    Smith, JM
    TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 269 - 274
  • [37] Simulated Evolution based Algorithm versus Exact Method for Virtual Private Network Design
    Thabti, Boulbaba
    Youssef, Habib
    Mahjoub, Ali Ridha
    Meddeb, Aref
    2014 10TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2014, : 245 - 249
  • [38] Exact approach for the optimal design of virtual private network trees assuming a hose workload
    Lourimi, Ali
    Thabti, Boulbaba
    Youssef, Habib
    ANNALS OF TELECOMMUNICATIONS, 2016, 71 (7-8) : 353 - 367
  • [39] The design of virtual private network topology for migrating to 1Pv6 world
    Kimura, E
    Norihiko, T
    Ishihara, K
    2004 INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2004, : 313 - 316
  • [40] Exact approach for the optimal design of virtual private network trees assuming a hose workload
    Ali Lourimi
    Boulbaba Thabti
    Habib Youssef
    Annals of Telecommunications, 2016, 71 : 353 - 367