On Capacity Planning for Minimum Vulnerability

Like dokumenter
SVM and Complementary Slackness

Unit Relational Algebra 1 1. Relational Algebra 1. Unit 3.3

Neural Network. Sensors Sorter

Andrew Gendreau, Olga Rosenbaum, Anthony Taylor, Kenneth Wong, Karl Dusen

Verifiable Secret-Sharing Schemes

Dynamic Programming Longest Common Subsequence. Class 27

Exercise 1: Phase Splitter DC Operation

UNIVERSITY OF OSLO DEPARTMENT OF ECONOMICS

Slope-Intercept Formula

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

Generalization of age-structured models in theory and practice

Perpetuum (im)mobile

Graphs similar to strongly regular graphs

Trigonometric Substitution

Databases 1. Extended Relational Algebra

Estimating Peer Similarity using. Yuval Shavitt, Ela Weinsberg, Udi Weinsberg Tel-Aviv University

Speed Racer Theme. Theme Music: Cartoon: Charles Schultz / Jef Mallett Peanuts / Frazz. September 9, 2011 Physics 131 Prof. E. F.

Oppgave 1a Definer følgende begreper: Nøkkel, supernøkkel og funksjonell avhengighet.

TFY4170 Fysikk 2 Justin Wells

Gradient. Masahiro Yamamoto. last update on February 29, 2012 (1) (2) (3) (4) (5)

HONSEL process monitoring

Improving Customer Relationships

Ole Isak Eira Masters student Arctic agriculture and environmental management. University of Tromsø Sami University College

0:7 0:2 0:1 0:3 0:5 0:2 0:1 0:4 0:5 P = 0:56 0:28 0:16 0:38 0:39 0:23

TDT4117 Information Retrieval - Autumn 2014

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

KROPPEN LEDER STRØM. Sett en finger på hvert av kontaktpunktene på modellen. Da får du et lydsignal.

Emneevaluering GEOV272 V17

Level Set methods. Sandra Allaart-Bruin. Level Set methods p.1/24

Stationary Phase Monte Carlo Methods

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

Multimedia in Teacher Training (and Education)

Call function of two parameters

UNIVERSITETET I OSLO

Maple Basics. K. Cooper

GEOV219. Hvilket semester er du på? Hva er ditt kjønn? Er du...? Er du...? - Annet postbachelor phd

VLSI Design for Yield on Chip Level

Physical origin of the Gouy phase shift by Simin Feng, Herbert G. Winful Opt. Lett. 26, (2001)

EN Skriving for kommunikasjon og tenkning

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

Accuracy of Alternative Baseline Methods

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

ISO 41001:2018 «Den nye læreboka for FM» Pro-FM. Norsk tittel: Fasilitetsstyring (FM) - Ledelsessystemer - Krav og brukerveiledning

EKSAMENSOPPGAVE I FAG TKP 4105

Brukerkrav og use case diagrammer og -tekst 19. januar Agenda. Brukerkrav og use case. Diagrammer Tekst.

Model Description. Portfolio Performance

2A September 23, 2005 SPECIAL SECTION TO IN BUSINESS LAS VEGAS

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

UNIVERSITETET I OSLO

Existence of resistance forms in some (non self-similar) fractal spaces

The Norwegian Citizen Panel, Accepted Proposals

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

FYSMEK1110 Eksamensverksted 23. Mai :15-18:00 Oppgave 1 (maks. 45 minutt)

Forecast Methodology September LightCounting Market Research Notes

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

Eksamensoppgaver til SOSANT1101. Regional etnografi: jordens folk og kulturelt mangfold. Utsatt skoleeksamen 12. desember 2013 kl.

HARP-Hybrid Ad Hoc Routing Protocol

Moving Objects. We need to move our objects in 3D space.

HØGSKOLEN I NARVIK - SIVILINGENIØRUTDANNINGEN

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

Den som gjør godt, er av Gud (Multilingual Edition)

SCE1106 Control Theory

UNIVERSITETET I OSLO

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

EKSAMENSOPPGAVE I BI2034 Samfunnsøkologi EXAMINATION IN: BI Community ecology

PATIENCE TÅLMODIGHET. Is the ability to wait for something. Det trenger vi når vi må vente på noe

TMA4329 Intro til vitensk. beregn. V2017

PSi Apollo. Technical Presentation

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

Øystein Haugen, Professor, Computer Science MASTER THESES Professor Øystein Haugen, room D

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

Level-Rebuilt B-Trees

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

UNIVERSITETET I OSLO

Information search for the research protocol in IIC/IID

Confidence-based Data Management for Personal Area Sensor Nets

CAMES. Technical. Skills. Overskrift 27pt i to eller flere linjer teksten vokser opad. Brødtekst 22pt skrives her. Andet niveau.

Forskningsrådets rolle som rådgivende aktør - innspill til EUs neste rammeprogram, FP9 og ERA

STILLAS - STANDARD FORSLAG FRA SEF TIL NY STILLAS - STANDARD

TUSEN TAKK! BUTIKKEN MIN! ...alt jeg ber om er.. Maren Finn dette og mer i. ... finn meg på nett! Grafiske lisenser.

Gir vi de resterende 2 oppgavene til én prosess vil alle sitte å vente på de to potensielt tidskrevende prosessene.

Eksamensoppgave i PSY3100 Forskningsmetode - Kvantitativ

IN2010: Algoritmer og Datastrukturer Series 2

TUSEN TAKK! BUTIKKEN MIN! ...alt jeg ber om er.. Maren Finn dette og mer i. ... finn meg på nett! Grafiske lisenser.

The exam consists of 2 problems. Both must be answered. English

SAS FANS NYTT & NYTTIG FRA VERKTØYKASSA TIL SAS 4. MARS 2014, MIKKEL SØRHEIM

Right Triangle Trigonometry

TUSEN TAKK! BUTIKKEN MIN! ...alt jeg ber om er.. Maren Finn dette og mer i. ... finn meg på nett! Grafiske lisenser.

KEEPING THE WORLD MOVING. Ferske data til navigasjonssystemer fra datafangst til sluttbruker

Start MATLAB. Start NUnet Applications Statistical and Computational packages MATLAB Release 13 MATLAB 6.5

Smart High-Side Power Switch BTS730

UNIVERSITETET I OSLO ØKONOMISK INSTITUTT

Hvordan føre reiseregninger i Unit4 Business World Forfatter:

5 E Lesson: Solving Monohybrid Punnett Squares with Coding

Transkript:

On Capacity Planning for Minimum Vulnerability Alireza Bigdeli Ali Tizghadam Alberto Leon-Garcia University of Toronto DRCN - October 2011 Kakow - Poland 1

Outline Introduction Network Criticality and Its Interpretations Vulnerability Analysis Optimizing Vulnerability Metrics Evaluations Conclusion 2

Introduction Robustness : to be insensitive to the environmental changes Vulnerability: deals with bottleneck points of the network Perturb network parts or environmental parameters Measure performance degradation So more robust networks are less vulnerable Less sensitive to unwanted environmental changes 3

Objective of this work Network criticality (NC) A global measure of robustness on a graph Optimizing network criticality provides robustness Introduce vulnerability metrics Based on the variations of NC in case of failures Optimize vulnerability metrics to make the network less vulnerable to failures Compare the optimal weight sets The metrics Routing persformance 4

Outline Introduction Network Criticality and Its Interpretations Vulnerability Analysis Optimizing Vulnerability Metrics Evaluations Conclusion 5

Network Criticality Based on Random Walks Betweenness Consider a weighted graph And a random walk from node s to d b sk (d ) = average number of visits to node k Let b k = b s, d sk ( d) It can be shown that b k /W k is independent of the node And it is a unique value which we name it Network Criticality 6

Interpretations of NC Average Resistance Distance τ sd =Resistance distance between nodes s and d τ sd = effective resistance between two nodes when conductance s are equal to weights Network criticality is proportional to the average of τ sd s Average Sensitivity of betweenness to weight changes 7

Formulation of NC If L = [ l ij ] is the Laplacian of the graph, and L + = [ l + ij ] is its Moore - Penrose inverse : 8

Outline Introduction Network Criticality and Its Interpretations Vulnerability Analysis Optimizing Vulnerability Metrics Evaluations Conclusion 9

Vulnerability Analysis Study the behavior of NC when failures happen Definitions: = NC of the network when link (i, j) fails = NC of the network when node i fails = the worst value NC takes in case of a single link failure The most critical link = the worst value NC take in case of a single node failure The most critical Node we call these values Vulnerability Metrics 10

Optimizing Vulnerability Metrics Optimizing the vulnerability metrics make the network less vulnerable to node or link failures Proposed Planning Optimizations: MMTL : Minimize Maximum Tau in case of Link failures MMTN : Minimize Maximum Tau in case of Node failures OT : Optimize Tau We assume: z ij be the cost of assigning a unit of w ij to link (i, j) Then the total planning cost for the network is: And we consider a total budget of C for the network 11

MMTL Formulation MMTL Formulation: is an strictly convex function of link weights is the NC of the network without link (i, j) So is convex as well And is convex since It is the maximum of some convex functions And this is a convex optimization problem Convex objective Linear constraints 12

MMTN and OT Formulation Again we can prove that is a convex function of link weights and MMTN is a convex optimization problem as well: We use OT as a comparison base: 13

SDP Formulation SDP can be solved numerically faster for larger networks SDP formulation for MMTL: Schur complement of is It is used to obtain this SDP formulation 14

Evaluations Networks Fish network Rocketfuel Networks and Abilene CVX to solve SDPs 5 weight sets for each network Weights for EW: 15

Weight sets for Fish Network 16

Fish Network Parameters 17

RocketFuel Dataset Consolidate the nodes within a city Aggregate all the links between two cities Use OSPF weights to find out capacities OSPF weights are proportional to reciprocal of capacities 18

Parameters of 1755 Network 19

Comparison of IW and EW with Optimized Weight Sets 20

Comparison of Optimized Weight Sets 21

Observations A huge gap between IW and optimized weight sets Our optimizations significantly improve the vulnerability of the networks Metric improvement for 1755 compared to IW 42% for Tau 61.4% for max-tau-ij 60% for max-tau-i In different optimization methods less variations in tau More variations in max-tau-ij and max-tau-i 22

Routing Performance Applying the same traffic matrix Gravity Model to obtain traffic matrix Input to each node proportional to capacity of links attached to it It divides among the nodes proportional to capacity of links attached to them And the same routing method (independent) Using Totem Package IGP-WO weight optimizer to find OSPF optimal weights Uses Tabu search meta-heuristic method Capacity of links equal to the weight sets from our optimizations Examine link utilization before and after a failure 23

Link Utilization Before and After a Link Failure 24

Link Utilization Before and After a Node Failure 25

Conclusion Define vulnerability metrics for a communication network Propose optimization problems to optimize these metrics Convert optimizations to SDP to be able to apply them on large networks Apply them on ISP topologies from Rocketfuel dataset Compare the metrics and routing performance using TOTEM package Future research More than one failure Correlated failures Probabilistic approach to the failures Compare to other graph metrics such as Algebraic Connectivity 26

Thank You 27