You are on page 1of 41

Les Cahiers du GERAD ISSN: 07112440

A Typology for Multi-Technology,


Multi-Service Broadband Network
Synthesis
Michaela Plante
Brunilde Sans`o
G98-51
September 1998
Revised: February 2001
Les textes publies dans la serie des rapports de recherche HEC nengagent que la responsabilite de leurs
auteurs. La publication de ces rapports de recherche benecie dune subvention du Fonds F.C.A.R.
A Typology for Multi-Technology, Multi-Service
Broadband Network Synthesis
Michaela Plante and Brunilde Sans` o
GERAD and

Ecole Polytechnique de Montreal


C.P. 6079, Succ. Centre-ville
Montreal (Quebec) Canada, H3C 3A7
{michaela,bruni}@crt.umontreal.ca
September, 1998
Revised: February, 2001
Les Cahiers du GERAD
G9851
Copyright c 2001 GERAD
Abstract
Current technological possibilities for implementing multi-service networks include
both single technology ATM or IP networks and multi-technology networks such as
SONET-based or at networks. However, regardless of the technology employed, the
synthesis problem to optimally route trac and divide the networks transmission
resources between its virtual links remains of prime importance.
In this paper, we review, compare, and classify the extensive recent literature con-
cerning multi-service network synthesis methods. In order to do this, we propose a
typology based on switching and control strategies and a general notation that reects
the layered nature of the network. Technology independent mathematical models de-
scribe the various, essentially dierent, approaches presently found in the literature.
Keywords: Network synthesis, multi-technology networks, multi-service networks,
optimization, ATM, IP, SONET, at networks, optical networks
Resume
Actuellement, les possibilites technologiques pour mettre en application des reseaux
multi-services incluent les reseaux de simple technologie dATM ou de IP, et les reseaux
multi-technologies tels que les reseaux `a base SONET ou les reseaux plats. Cependant,
independamment de la technologie utilisee, le probl`eme de synth`ese le routage op-
timale du trac et la division des ressources de transmission entre les liens virtuels
restes dimportance primordiale.
Dans cet article, nous passons en revue, comparons, et classions la litterature
etendue et recente au sujet des methodes de synth`ese de reseau multi-service. An de
faire ceci, nous proposons une typologie basee sur les strategies de commutation et de
contr ole, et une notation generale qui re`ete la nature multi-niveaux du reseau. Des
mod`eles mathematiques independants de technologie decrivent les divers approches
actuellement trouvees dans la litterature.
Mots cles : Synth`ese de reseau, reseaux multi-technologies, reseaux multi-services,
optimisation, ATM, IP, SONET, reseaux plats, reseaux optiques.
Les Cahiers du GERAD G9851 Revised 1
1 Introduction
Network planners are looking for new methods which could eciently integrate various
telecommunication services within one network. How this integration is to be achieved re-
mains debatable. Although ATM (asynchronous transfer mode) remains the ITU switching
standard [35] for implementing multi-service networks, service-specic switching technolo-
gies, such as Internet Protocol or circuit-switching, are increasingly popular. In fact, the
Internet community is quickly developing protocols to enable guaranteed quality of service
using IPv6s labeling capabilities [4, 30, 36]. Rather than using a single technology in
which all services are switched using the same switching protocol over a transport layer
(see Fig 1a), some researchers [44, 53] have suggested that multi-technology networks be
implemented. In a multi-technology network, services are partitioned into parallel service-
specic networks, each with its own appropriate switching method (e.g., as summarized in
Figure 1b, circuit-switching for voice, ATM for video, IP for data, etc.).
Transport technology currently requires that call level switching be executed in interme-
diate nodes [53]. In a multi-technology network, this would require that every intermediate
node be capable of switching every protocol (e.g., ATM, circuit, and IP), thereby greatly
increasing node costs and delays. Two proposed solutions are to employ either SONET-
based multi-service (SBMS) networks [44] or adaptive high-capacity at networks [53].
Both networks use only origin-destination (O-D) nodes to control quality of service (QoS)
requirements and capacity allocations. Their intermediate nodes are therefore not required
to handle a multitude of protocols. In an SBMS network, logical paths (virtual pipes) are
dened between every O-D node pair for each service class. At every edge node, service
classes are switched using their corresponding switch type (e.g., using an ATM, circuit or
packet switch) and then are assigned to a virtual pipe. Similarly, in adaptive at networks,
a logical path (stream) is established between each O-D node pair. In the networks access
nodes, data is packaged into variably sized containers to be transmitted along a stream of
variable capacity. By assigning a proportion of the total number of containers per stream
to each service, capacity can be dynamically allocated to service classes down to multiples
of 10 Kbps. This should make fully meshed at networks less wasteful than fully meshed
SBMS networks which only have coarse granularity, the smallest virtual tributary (VT)
being 1.7 Mbps in North America and 2.3 Mbps in Europe.
Switching
Transport
Service
Circuit
Voice Data Video
IP ATM
Flat or SONET
Data
a) Single technology b) Multi-technology
e.g., ATM or IP
Voice Video
e.g., SONET
Figure 1: Single vs. multi-technology networks
Les Cahiers du GERAD G9851 Revised 2
Whether multi-service networks use a single switching technology or parallel service-
specic switching, the network synthesis problem must be solved. That means, given a
networks topology and trac demands, one needs to determine an optimal routing of
oered trac and a partitioning of the networks transmission resources between virtual
links connecting O-D node pairs. Network synthesis is generally treated as a static problem
in which dimensioning and routing variables are determined only once; however, it can also
be solved dynamically over time in response to variable trac demands.
The multi-service network synthesis problem has been studied primarily for ATM net-
works where transmission link bandwidth must always be allocated to VCs (virtual
circuits) and VPs (virtual paths), and sometimes also to virtual networks [15], to virtual
subnetworks [19], or to virtual trunks [31]. The network synthesis problem is also encoun-
tered in multirate circuit switched networks where leased lines are sized; in MPLS-based
networks where constraint-based routed label switched paths (CRLSPs) [4, 36] are man-
aged; in SONET-based networks where groups of virtual tributaries (SONET pipes [44])
are dimensioned; in adaptive at networks [53] where network bands [91] are assigned
capacities.
The multitude of methods used for solving the synthesis problem in multi-service net-
works creates a new problem. How does one compare and evaluate dierent types of
dimensioning strategies used in dierent types of networks?
In this paper, we propose a typology, a general notation and mathematical models
for each network synthesis strategy type and classify over 50 multi-service synthesis
models suggested in the literature. This was done with the aim of being able to compare
and evaluate diering solution methodologies for the network synthesis problem, using
the criteria of optimal network costs and bandwidth eciency. Since network planners
often require large networks to be optimized quickly, we also consider two other important
criteria: problem size and running time.
This paper is organized as follows. In Section 2, we describe the proposed classication
typology, which is illustrated in Table 1. Section 3 describes our general notation. In
Section 4, for each model category, we review formulations, solution methodologies and
computational results, and provide a summary table (Tables 27). Some conclusions are
provided in Section 5.
2 A typology for logical dimensioning strategies
The general typology we outline in Table 1 is specically designed to classify all multi-
service network dimensioning models, regardless of the switching technology involved. That
is, it is technology independent. Therefore, while a great deal of literature has been devoted
to dimensioning ATM networks, newer network dimensioning problems such as virtual
private network (VPN) allocation and QoS reservations for next generation IP networks
[4] can also be classied using this typology.
Any technique used for network dimensioning can be classied by its control and switch-
ing strategies, which we describe in detail in Sections 2.1 and 2.2. The control strategy
can take either a centralized control or decentralized control approach. Techniques using
Les Cahiers du GERAD G9851 Revised 3
Table 1: Proposed Classication Typology
Switching Strategies Control Strategies
Centralized Decentralized
Independent [26],[76], [58], [60], [86]
Connection [89]
[17], [22], [32], [34], [37], [4], [6], [7], [9], [28], [40], [47],
End-to-end Path [44], [54], [57], [83] [48], [51], [64], [66], [74], [75],
[78], [80], [81], [82], [88], [90]
[1], [11], [12], [13], [14],
Node-to-node Path [18], [19], [20], [45], [49],
[50], [59], [62], [63], [65],
[67], [87]
Hybrid [3], [10], [91]
centralized controllers employ one of four switching methods: 1. Independent connection
switching; 2. End-to-end path switching; 3. Node-to-node path switching; 4. Hybrid
switching. Those techniques using decentralized controllers use end-to-end path switching.
Note that techniques that employ independent connection, node-to-node path, and hybrid
switching with decentralized controllers are possible but have not been discussed in the
literature.
Several authors who propose new dimensioning strategies employ implicit typologies
when comparing their approach with those of others (e.g., Aneroussis and Lazar [3]).
Also, Dziong [14] refers to three common bandwidth allocation and routing strategies:
1. End-to-end paths; 2. Node-to-node paths; 3. Virtual networks. In our typology, we
retain end-to-end paths as a separate switching type. We put his virtual network design
approach within our node-to-node path category, however, because we are dealing with
resource management problems.
2.1 Centralized or decentralized control strategies
The control strategy selected determines whether each logical link has bandwidth allocated
by a decentralized controller or whether links are dimensioned jointly by a centralized
controller. In general, centralized strategies are used for o-line network planning or for
multi-hour dynamic allocation, while decentralized control strategies are implemented in
order to have adaptive real-time dimensioning capacities.
In Figure 2, centralized and decentralized control strategies are depicted [38, 47]. When
path capacities are allocated using a centralized control strategy, a single bandwidth con-
troller (see Figure 2a) uses information from the entire network. With decentralized con-
trol, each node is assigned a controller to determine its outgoing paths desired capacities.
Two decentralized control strategies are possible: local control and distributed control.
Local controllers (see Figure 2b) share the links capacity among the paths independently
from other paths in the network. Distributed controllers (see Figure 2c) must determine if
sucient bandwidth is available on all transmission links spanned by its paths. This is typ-
ically achieved by sending bandwidth-increase or bandwidth-decrease signaling messages to
Les Cahiers du GERAD G9851 Revised 4
Centralized Decentralized
b) Local control c) Distributed control a) Centralized control
Networks
Controllers
Bandwidth allocation signalling
Figure 2: Types of Control Strategies
other controllers along the paths route. Each distributed-controller receiving a bandwidth
adjustment message must consider all other paths it is carrying and then determine if the
adjustments are feasible.
2.1.1 Centralized control In order to use centralized controls, data from the entire
network is required (i.e., trac demand forecasts). Since the calculations are complex,
they are often done o-line and are time consuming. If the forecasts are accurate, the
centralized calculations can, however, provide better solutions than faster decentralized
approaches. Note that there is nothing to prevent centralized controls being dynamic,
however most papers treating this strategy consider static or multi-hour allocation.
2.1.2 Decentralized control When decentralized control is implemented, two control
variables are used: the bandwidth step and the update interval.
Update interval The update interval can be event-driven or periodic. Event-driven
controllers adaptively update a paths capacity whenever the quality of service degrades
or when a call is blocked. Periodic controllers reallocate bandwidth at xed intervals.
Bandwidth step Since bandwidth is reallocated frequently (every few minutes or sec-
onds), the bandwidth step must be estimated rapidly. A simple solution is to use a xed
step; however, variable bandwidth steps can be more ecient and more adaptive to network
trac changes.
2.2 Types of switching strategies
2.2.1 Independent connection switching An independent connection is set up be-
tween an origin and a destination in a network, if, after nding a route through the network,
there is sucient bandwidth available along the route to guarantee quality of service. Note
that independent connection switching is equivalent to (soft) VC switching for ATM net-
works.
Les Cahiers du GERAD G9851 Revised 5
An important advantage of using independent connection switching is that statistical
multiplexing takes place between all connections and service classes sharing a link
resulting in minimal bandwidth waste. For example, in Figure 3a, there is statistical
multiplexing on transmission link A-B between connections C
1
and C
2
. Another advantage
is that, by using equivalent bandwidth estimates, statistical multiplexing networks, such as
ATM networks, can be modeled as circuit-switched multirate networks. Therefore, existing
multirate dimensioning algorithms can be used to solve the logical dimensioning problem
[68].
There are some disadvantages, however, in using an independent connection approach.
The connections are provisioned in a call-by-call manner and must be routed individually
through every intermediate connection switch along their path. For example, C
1
, C
2
, and
C
3
must be switched through connection switches A and B in Figure 3a. This increases node
complexity and costs [8] and may result in signaling network congestion [3, 78]. Moreover,
in packet switching, the maximum number of connections is limited by the connection eld
length and may become inadequate for large networks.
2.2.2 End-to-end path switching In order to minimize the disadvantages associated
with independent connection switching, connections having identical origins and destina-
tions can be grouped together into end-to-end paths. This provides direct logical links
between each O-D pair. Using end-to-end paths simplies connection setup and routing
[8] and decreases switch costs and processing loads [78]. This is because each connections
path through the transmission network is predetermined, and connections are not switched
through intermediate connection switches. See how connections C
1
, C
2
, and C
3
are not
switched through path switches A and B in Figure 3b.
Unfortunately, network bandwidth is wasted because, while there is statistical multi-
plexing between connections belonging to the same path, there is none between connections
belonging to dierent paths for example, between connections C
1
and C
2
on transmis-
sion link A-B (Figure 3b). Consequently, connections may be blocked in one path, even
though enough bandwidth is available to accommodate them in other paths. Also, since
the number of paths increases quadratically with the number of origin and destination
nodes, large sparsely connected networks may be forced to carry numerous narrow paths
on centrally located transmission links. These narrow paths may be too small to admit
wideband connections [14]. Also, given the quadratic increase in the number of end-to-end
paths, the total number of paths may exceed the maximum allowable number of entries in
the routing tables for centrally located nodes of large networks [1, 23, 61]. When decen-
tralized algorithms are implemented, it is hoped that any bandwidth waste resulting from
the use of end-to-end paths can be diminished by dynamically adjusting over-utilized and
under-utilized paths.
2.2.3 Node-to-node path switching To reduce the number of required paths, it has
been suggested that connections be routed across a series of node-to-node paths [78]. For
example, in Figure 3c, node-to-node path switching results in half as many paths per link
as in the end-to-end path switching example of Figure 3b. However, connections must
now be routed through some of the intermediate connection switches. For example, in
Les Cahiers du GERAD G9851 Revised 6
hybrid switch
path switch
connection switch
connection
transmission link
a) Independent connection switching
A B
2
1
3
C
C
C
d) Hybrid Switching
A B
2
1
3
C
C
C
c) Node-to-node path switching
B
A
2
1
3
C
C
C
path
A B
2
1
3
C
C
C
b) End-to-end path switching
Figure 3: Types of Switching Strategies
Les Cahiers du GERAD G9851 Revised 7
Figure 3c, C
1
and C
2
are not switched through path switch A but are switched through
connection switch B. If connections are routed across too many paths, connection setup
time, node complexity and signaling costs will increase because processing will need to be
performed in many transit nodes.
2.2.4 Hybrid switching The nal switching strategy, hybrid switching, seeks a bal-
ance between bandwidth use and signaling costs by routing some connections directly over
end-to-end paths and the rest independently [3, 91]. In Figure 3d, we see that by routing
connections C
1
and C
3
independently, the number of paths per link, and thus the band-
width waste, is reduced. In order to decrease the high signaling costs encountered with
independent connection switching, connection C
2
is routed over an end-to-end path. The
problem is thus to nd a compromise between the number of connections routed indepen-
dently and the number of connections routed across end-to-end paths. Yan [91] suggests
that bandwidth waste could be further decreased by letting blocked path trac overow
into the independent connection allocation and by letting blocked independent connections
use under-utilized paths.
3 General notation
Having established a typology for network dimensioning models, we introduce in this sec-
tion a general notation to help describe the models and algorithms that will be reviewed in
Section 4. This notation is separated into four subsets: network data, problem data, vari-
ables and performance measures. For each subset, we briey summarize the most relevant
features then list the notation.
3.1 Network data
Telecommunication networks can be viewed as layered systems in which each layer is a
network embedded in another network [34, 55]. We denote network layer n by a graph
G
n
(V
n
, E
n
) where V
n
is the set of nodes and E
n
is the set of links between nodes. Every
O-D pair d in G
n+1
is connected by a set of routes r in G
n
consisting of a sequence of
adjacent links e in E
n
(i.e., r = {e
1
, . . . , e
i
}). If the set of routes for an O-D pair is non-
empty, the set denes a link in network G
n+1
[34]. In other words, links in network G
n+1
are formed from routes of network G
n
.
In Figure 4, we illustrate the three layers typically encountered in telecommunication
network synthesis problems. Note that for each network layer n in the gure, dashed lines
represent links in G
n
, and solid lines represent the possible routes through G
n
taken by
G
n+1
links (i.e., the mapping of G
n+1
onto G
n
). Note also that the links in Figure 4 have
been drawn with dierent sizes to represent their capacities, as have the possible routes to
represent their total carried trac ows.
For the remainder of the paper, we consider the following three layer network model,
using terminology from Lubacz et al. [55]:
G
2
: the routing network layer;
G
1
: the virtual network layer;
G
0
: the transmission network layer.
Les Cahiers du GERAD G9851 Revised 8
0
G Transmission Network Layer
Virtual Network Layer G
1
Routing Network Layer
2
G
Cross-connect
OD node
Switch
Links
Routes
F
C D
B A
E
E
A
C
{
(C
,E
,B
),(C
,F
,B
)}
C
C
C
a
l
l
r
o
u
t
i
n
g
D
i
m
e
n
s
i
o
n
i
n
g
D
e
s
i
g
n
T
o
p
o
l
o
g
i
c
a
l
{
(
D
,
B
)
}
{
(
A
,
F
,
C
)
}
{(A,E,B),(A,F,B)}
{(C,F,D)}
D
A
D
D
B
F
C
ir
c
u
it r
o
u
tin
g
{(A,B),(A,C,B)}
C
{
(C
,B
),(C
,D
,B
)}
B A B
B A
Figure 4: Telecommunication networks as layered systems
The routing network G
2
consists of the set of nodes V
2
from which connections originate
and to which they are destined. In Figure 4, for example, connections will be established
between node pairs A-B and B-C. The oered trac between each O-D pair in G
2
must
be routed through the virtual network layer G
1
. Note that the virtual network layer is
equivalent to the logical or switched network in circuit-switched networks. In Figure 4, we
see that connections between G
2
O-D pair A-B may be routed either directly over G
1
link
(A,B) or over the two-hop route (A,C,B). Note that these routing possibilities for G
2
link
(A,B) are written beside the link in Figure 4 as {(A,B),(A,C,B)}.
The virtual network layer G
1
consists of switches V
1
and of links E
1
. Some examples of
virtual network links are ATM virtual paths, virtual private network links, IP constraint-
based routed label switched paths, etc., and it is these links that are dimensioned in the
problems reviewed in Section 4. Every virtual network link must be mapped onto the
transmission network G
0
so that the transmission capacity constraints are respected. Note
that our example in Figure 4 shows a bifurcated link in G
1
(i.e., G
1
link (A,B) is carried
on routes (A,E,B) and (A,F,B)). This may not be feasible for some applications such as
virtual paths in ATM networks.
The transmission layer G
0
is generally a sparse network consisting of cross-connects V
0
connected by transmission links E
0
. For most problems considered in Section 4, the topol-
ogy and capacity of the transmission links and cross-connects are known, as is the mapping
of virtual links into the transmission network and the set of possible routes between each
O-D pair in the routing network.
Les Cahiers du GERAD G9851 Revised 9
Having explained the layered model for the network data, we now present the appro-
priate network data notation:
C
0
e
Transmission link bandwidth for link e E
0
. Let

C
0
= {C
0
e
}, e E
0
;
R
0
An |E
0
| |E
1
| zero-one incidence matrix, where r
0
i,j
= 1 if virtual link
e
j
E
1
is routed across transmission link e
i
E
0
; = 0 otherwise;
R
1
d
Set of possible G
1
routes between O-D pair d D
2
;
E
1
sd
Set of possible G
1
links joining O-D pair d D
2
and carrying service class
s S. If links carry multiple classes, then E
1
sd
= E
1
d
s S.
3.2 Problem data
Problem data incorporates the oered trac and client characteristics given in most di-
mensioning problems. This includes the data service classes, the set of clients (G
2
O-D
pairs), the oered trac for each O-D pair (typically in Erlangs), the revenue or cost of
carrying trac, and the revenue or cost of installing link capacity.
Realistic models for link capacity costs are those which take into account how the virtual
links are routed across the transmission links. For instance, one could use either a convex
function to penalize highly utilized links or a concave function to model the economies
of scale one obtains with increasing capacity [34]. Nevertheless, in papers considered in
Section 4, the authors have assumed that bandwidth cost is a linear function of capacity
in order to simplify their models.
Problem data also includes eective bandwidth [24, 29, 33, 43] data that allows variable-
rate trac ows to be modeled by deterministic connection rates
1
s
by taking into account
the varying characteristics and requirements of dierent service classes.
The notation we employ for problem data is the following:
S Set of service classes;
D
2
Set of O-D pairs in G
2
;
A
2
sd
Class s S trac oered to O-D pair d D
2
;

1
se
The rate of a class s S connection on link e E
1
or the number of circuits
required by the connection on the link. Let
1
e
= {
1
1e
, . . . ,
1
|S|e
}. If rate
is link-independent, then
1
se
=
1
s
e E
1
;
K
1
e
Cost of reserving bandwdith on link e E
1
;
W
1
e
Revenue generated by reserved bandwidth on link e E
1
;
K
1
sdr
Cost of losing trac from class s S connections on route r R
1
d
. If the
cost is independent of route, then K
1
sdr
= K
1
sd
r R
1
d
;
W
1
sdr
Revenue generated by class s S connections on route r R
1
d
. If revenue
is independent of route, then W
1
sdr
= W
1
sd
r R
1
d
.
Les Cahiers du GERAD G9851 Revised 10
3.3 Variables
The sets of variables considered in most models are typically the virtual link bandwidth and
the trac oered to each virtual network route. Other possible variables include oered
trac for each virtual link or required bandwidth for routes. The notation is as follows:
C
1
e
Virtual bandwidth for link e E
1
. Let

C
1
= {C
1
e
} e E
1
;
C
1
d
Total virtual bandwidth reserved between O-D pair d D
2
;
A
1
sdr
Class s S trac oered to route r R
1
d
;
a
1
se
Total class s S trac oered to link e E
1
. Let a
1
e
= {a
1
1e
, . . . , a
1
|S|e
};
X
1
sdr
Bandwidth or number of bandwidth units required by class s S trac
on route r R
1
d
.
3.4 Performance measures
Typical performance measures employed are call blocking and packet loss probabilities,
although in some cases average packet delay is used.
Notation used is:
g
1
se
(a
1
e
,
1
e
, C
1
e
) Blocking function for class s S connections on link e E
1
B
1
se
Call blocking probability for class s S connections on link
e E
1
(upper bound: B
1
se
);
B
1
sd
End-to-end call blocking for class s S connections between
O-D pair d D
2
(upper bound: B
1
sd
);
B
1
sdr
End-to-end call blocking for class s S connections on route
r R
1
d
(upper bound: B
1
sdr
);
L
1
sdr
End-to-end packet loss for class s S connections on route
r R
1
d
(upper bound: L
1
sdr
);
H Average packet delay.
Given that call blocking probability is the network performance measure most frequently
employed, a brief introduction to call blocking functions is now given.
We consider a single virtual link e E
1
with a xed capacity C
1
e
in which a number of
calls of diering classes share the link. Class s calls arrive following a Poisson process with
rate
s
and require bandwidth
1
s
during an exponentially distributed holding time with
mean 1/
s
. If there is insucient bandwidth to accept a call, it is blocked and lost. The
Les Cahiers du GERAD G9851 Revised 11
total class s trac oered to link e is a
1
se
=
s
/
s
. If only a single service class is oered
to link e, the blocking function is simply the Erlang-B function E()
g
1
e
(a
1
e
, C
1
e
) = E(a
1
e
, C
1
e
) =
(a
1
e
)
C
1
e
(C
1
e
)!

C
1
e

i=0
(a
1
e
)
i
i!

1
. (1)
For multirate trac, calculating the exact product form solution [16] for the state
probabilities has proven to be intractable. However, a faster exact recursive solution has
been provided by Kaufman [39] and Roberts [70]. This method assumes Poisson arrivals
and allows for general holding time distributions [70]. It also limits the eective bandwidth
and link capacities to integer values. The probability P
n
of having n units of capacity
occupied in a link e having C
1
e
units of capacity is:
P
n
=

1
n

sS

1
s
a
1
se
P
n
1
s
for n = 1, . . . , C
1
e
P
0
for n = 0
0 for n < 0,
(2)
where P
0
is determined by solving the following equation:
C
1
e

n=0
P
n
= 1. (3)
The blocking probability for service class s on link e E
1
is thus given by
B
1
se
=
C
1
e

n=C
1
e

1
s
+1
P
n
. (4)
Since the Kaufman and Roberts method becomes impractical if the number of service
classes or the number of bandwidth units per link is large, several approximations have been
proposed [46, 52, 71]. In what follows, we describe the popular approximation developed by
Labourdette and Hart [46], in which the classes of oered trac are combined to create an
equivalent single class system. This approximation is exact under asymptotic conditions,
that is, when the link capacity and oered trac intensity become very large yet remain
in a constant ratio. The method also allows the eective bandwidth and link capacities to
be continuous.
The equivalent single class trac is characterized by the total oered trac M, the
variance of oered trac V, and the eective bandwidth of the equivalent trac
M =

sS

1
s
a
1
se
, V =

sS
(
1
s
)
2
a
1
se
, =
log
C
1
e
M
log
, (5)
Les Cahiers du GERAD G9851 Revised 12
where is the unique positive root of the following equation in z

sS

1
s
a
1
se
z

1
s
= C
1
e
. (6)
The approximate link blocking probability can subsequently be determined using a
continuous approximation of the Erlang blocking function:
B
1
se
=

1
s
1
C
1
e
M
E
_
M

,
C
1
e

_
if = 1

1
s
M
V
E
_
M

,
C
1
e

_
if = 1.
(7)
In this section, we have assumed that the call admission policy is a complete sharing
policy. Consequently, calls with larger eective bandwidths experience higher blocking
probabilities than calls with smaller eective bandwidths. Partial sharing or trunk reser-
vation schemes, providing for fairness, are also discussed in the literature. For a thorough
discussion on blocking probability calculations for fair systems see [69, 73].
4 Review of models
Using our typology presented in Table 1, we can identify ve distinct model types charac-
terized by their respective control and switching strategies:
1. Centralized independent connection models;
2. Centralized end-to-end path models;
3. Centralized node-to-node path models;
4. Centralized hybrid models;
5. Decentralized end-to-end path models.
For each model type, we rst give a brief introduction to the network and problem data
that is commonly given as input, the variables which must be determined by the optimiza-
tion, and the performance measures required for problem resolution. We then describe
the mathematical formulation for the problem and review the relevant literature. In Ta-
bles 27, we summarize each model type by describing the variables, objective functions,
constraints, solution approaches, and problem features for each paper reviewed. These ta-
bles also include computational problem sizes and running times for those papers in which
the information is available.
4.1 Centralized independent connection models
When independent connection switching is implemented, there is at most one virtual link
between every O-D pair in the virtual network G
1
; therefore, G
1
is not necessarily fully-
meshed. Connections are routed either over the direct virtual link (if it exists) or over a
Les Cahiers du GERAD G9851 Revised 13
Virtual links
Routes
C
e
e
sd
A
2
A-C
r
e
(A,B)
r
r
(A,B,C)
(A,C)
(A,C)
(B,C)
(B,C)
A
B
2
sd
A
B-C
Figure 5: Virtual network for the independent connection model
series of links (i.e., |r| 1 for all r R
1
d
, d D
2
). Given a trac demand A
2
sd
oered by
every O-D pair d D
2
for each class s S and the possible routes R
1
d
between each O-D
pair, the network synthesis problem is to nd the required bandwidth C
1
e
of each virtual
link e E
1
and the class s trac A
1
sdr
that will be oered to each route r between O-D
pair d.
In Figure 5, we illustrate the problem. The A
2
sd
AC
Erlangs of trac oered to O-D pair
A-C can be routed either over the direct route r
(A,C)
or over the two-hop route r
(A,B,C)
.
Trac oered to O-D pair B-C is routed over the direct link e
(B,C)
. Since there is at
most one virtual link between each O-D pair, trac from multiple O-D pairs and classes
are required to share the virtual links (e.g., trac on routes r
(A,B,C)
and r
(B,C)
share link
e
(B,C)
).
Note that models in this section assume that transmission link capacities

C
0
are large
enough to support any amount of virtual link bandwidth. Therefore, the models contain no
constraints that specically limit the virtual link capacities with respect to the transmission
link capacities.
4.1.1 Throughput-based and cost-based optimization Throughput- and cost-based
models typically play with the classical trade-o between the cost of installing or reserving
bandwidth and the revenue generated by carried trac. The problem is modeled as the
minimization of virtual link bandwidth costs Z
1
and the maximization of revenue from
carried trac Z
2
subject to routing and blocking constraints.
Minimize
Z
1
(C
1
e
) Z
2
(A
1
sdr
) =

eE
1
K
1
e
(C
1
e
)

sS

dD
2

rR
1
d
W
1
sdr
A
1
sdr
_
1 B
1
sdr
_
Les Cahiers du GERAD G9851 Revised 14
subject to

rR
1
d
A
1
sdr
A
2
sd
, s S, d D
2
(8)
B
1
sdr
B
1
sdr
, s S, d D
2
, r R
1
d
(9)
A
1
sdr
0, s S, d D
2
, r R
1
d
(10)
C
1
e
0. e E
1
(11)
For this type of model, it is assumed that there is complete sharing between all connec-
tions carried on a link. Also, by using eective bandwidth calculations, each connection
can be estimated by a xed bandwidth requirement. The network can therefore be modeled
as a circuit-switched multirate broadband network.
Assuming link independence, the end-to-end call blocking probability B
1
sdr
of class s on
route r R
1
d
between O-D pair d is
B
1
sdr
= 1

er
(1 B
1
se
). (12)
The call blocking probability B
1
se
and the total oered trac a
1
se
per service class s on
each link e E
1
are linked by the well-known Erlang xed point system [25, 41]
B
1
se
= g
1
e
_
a
1
e
,
1
e
, C
1
e
_
, (13)
a
1
se
=

dD
2

rR
1
d
: er
A
1
sdr

r{e}
_
1 B
1
se

_
. (14)
In equation (14), the trac oered to a link e for a specic route r between O-D pair d
depends on the blocking probability B
1
se

on each link e

that precedes and follows it along


the route. The total oered trac for a link is determined by adding up the trac between
every O-D pair on all routes that go through the link (i.e., r R
1
d
: e r and d D
2
).
Note that in equation (14), we assume that the routing decision balances the load across
routes having an arbitrary number of links. Other routing approaches, such as load sharing
with 2-link alternate routing, would yield a dierent yet quite similar equation.
Unfortunately, resolving Erlangs xed point system (13)(14) exactly is intractable
for large problems. Some approximations that are used include Newtons method or a
successive approximation method, the latter being numerically ecient but for which con-
vergence is not guaranteed [25]. As discussed in Section 3.4, equation (13) can be solved
using the Kaufman and Roberts recursive algorithm [39, 70] or by Labourdette and Harts
approximation [46].
In Girard and Gardouh [26] and in Sun and Girard [86], each connection is routed either
on a direct link or, if blocked, on a single alternate two-link route. In [26], the xed-point
equations (13) and (14) are added as constraints. As a result, the model structure leads
Les Cahiers du GERAD G9851 Revised 15
to a heuristic solution method based on decomposition into independent subproblems.
Numerical results show, however, that there is no guarantee that the method converges.
In [86], the authors study whether using a steepest descent method for the same prob-
lem would guarantee convergence. They propose an approximation for the gradient of
the objective function. When only the routing problem is considered, a reduced gradient
method is used since the constraints on the sharing coecients (8) are linear. However,
when both the dimensioning and routing problems are solved, additional non-linear end-
to-end blocking constraints (9) are added. These new constraints are dualized, and the
problem is solved using a subgradient algorithm in which the Lagrangian function is repeat-
edly minimized using the reduced gradient method. This method was applied to networks
having up to 40 nodes and carrying 3 service classes. When only the routing problem is
solved, their algorithm converges quickly and accurately compared to an exact solution.
However, when the dimensioning problem is also included in the model, solution times are
considerably longer.
Mitra et al. [60] solve only the routing problem; that is, the problem of maximizing
Z
2
subject to constraints (8), (10), (12), (13) and (14). Admission control is simulated
by blocking some connections based on independent Bernoulli trials. Connections are
then oered to each route with probability A
1
sdr
/A
2
sd
and are lost if blocked. The xed
point equations are solved by successive approximations. In order to use a steepest ascent
algorithm, the authors develop approximations for the partial derivatives of the objective
with respect to carried trac and to link capacity. These approximations, which have
also been developed independently by Farago et al. [19], were obtained by extending the
approach of Kelly [42] to the multirate case. Experimental simulations on an 8 node
network carrying 6 service classes gave good results compared to revenue and blocking
probability bounds.
In Sans` o, Girard and Mobiot [76] reliability is built into the network model by taking
into account the propagation of E
0
transmission link failures into the G
1
network. This
is achieved by extending the single-service results of [27, 77] to the multirate case. The
authors dene the state t of the transmission network as the set of its failed links. It has
been shown in [77] that among the 2
|E
0
|
possible states, only the no-failure and single-failure
states are essential for a reliable network model. We refer to this set of essential states as
T and the probability of being in state t as P(t). For each state t, the eective bandwidths

1
se
(t), the set of routes R
1
d
(t), the oered trac A
1
sdr
(t), and the link blocking probabilities
B
1
se
(t) must be calculated. This model minimizes a linear network cost function and the
expected cost of lost trac in the event of failures under ow conservation constraints.
Minimize

eE
1
K
1
e
(C
1
e
) +

tT
P(t)

sS

eE
1

1
se
(t)

dD
2
K
1
sd


rR
1
d
(t) : er
A
1
sdr
(t)

B
1
se
(t)
subject to (8), (10) and (11).
Les Cahiers du GERAD G9851 Revised 16
Blocking constraints (9) are implicitly included in the model by associating penalty costs
K
1
sd
to lost trac.
The model is solved by decomposing the problem into two subproblems. Given xed link
capacities, the routing subproblem is solved using the Frank-Wolfe ow deviation algorithm
to obtain oered trac values. Using these trac values, the dimensioning subproblem is
then solved to obtain new capacity estimates. This process is repeated until convergence.
An advantage of this method is that it is independent of the type of call routing used by
the network.
This algorithm was tested on the 10 node network used in [56], and the results were
compared to those obtained using Sun and Girards [86] approach. Network costs and
computation times were similar, and the resulting network proved to be more robust in
the event of transmission link failures.
4.1.2 Linear cost-based optimization In the previous subsection, the relationship
between end-to-end blocking and link capacity resulted in dicult non-linear problems.
By using a trunk reservation method, Mehdi and Guptan [58] propose a simpler linear
approximation of the model by inverting the Erlang-B blocking function to estimate (o-
line) the number of bandwidth units required for each node pair d and service class s. To
simplify these calculations, bandwidth requirements
1
s
are not used as blocking function
parameters but are instead included explicitely within the model (see Equations (15) and
(16)). The bandwidth unit estimates are used in a linear multi-commodity ow model that
determines virtual link capacities C
1
e
and the number of bandwidth units X
1
sdr
required on
each route.
Minimize
Z
1
(C
1
e
) =

eE
1
K
1
e
(C
1
e
)
subject to (11),

sS

dD
2

rR
1
d
:er

1
s
X
1
sdr
C
1
e
, e E
1
(15)

rR
1
d
X
1
sdr
g
1
_
A
2
sd
, B
1
sd
_
, s S, d D
2
(16)
X
1
sdr
0. s S, d D
2
, r R
1
d
(17)
Simulations were carried out with 2 service classes on the 10 node network from [56], and
results were obtained in less than 3 minutes.
4.1.3 Delay-based optimization Since independent connection switching means that
connections are routed over a series of concatenated virtual links, a useful objective is
to minimize packet delays. One example is Wolfgangs model [89] in which the routing
problem is solved. This model minimizes average packet delay H subject to oered trac
Les Cahiers du GERAD G9851 Revised 17
Table 2: Articles presenting Centralized Independent Connection Models
ARTICLES VARIABLES OBJECTIVE CONSTRAINTS SOLUTION PROBLEM
APPROACHES FEATURES
Girard and load sharing max carried trac Erlang xed point decomposition nonlinear
Gardouh (1992) virtual link capacity min link costs end-end blocking heuristic Labourdette
Sun and load sharing max carried trac Erlang xed point approx. obj. gradient nonlinear
Girard (1998) virtual link capacity min link costs end-end blocking reduced gradient Erlang xed
Lagrange relax. point
Mitra, Morrison and load sharing max carried trac Erlang xed point approx. blocking Erlang xed
Ramakrishnan (1996) steepest ascent point
Sans` o, Girard and oered trac min lost trac multi-commodity Decomposition link failures
Mobiot (2000) virtual link capacity min link costs Flow deviation Labourdette
Medhi and oered trac min link costs multi-commodity trunk reservation linear model
Guptan (1997) virtual link capacity o-line calculations
Erlang xed point relax blocking nonlinear
Wolfgang (1995) virtual link capacity min packet delay end-end blocking penalty function
end-end delay
ARTICLES PROBLEM NO. SERVICE CLASSES PLATFORM RUNNING
SIZE TIMES (SECS.)
Sun and |V
1
| = 40, |E
1
| = 1560 4 (64, 384, 1536, 6144 Kbps) SUN Ultra 1 routing: 750
Girard (1998) routing & dim: 4350
Mitra, Morrison and |V
1
| = 8, |E
1
| = 20 6 (16, 48, 64, 96, 384, 960 Kbps)
Ramakrishnan (1996)
Sans` o, Girard and |V
1
| = 10, |E
1
| = 90, 3 (64, 384, 1536 Kbps) SUN Ultra 1 Sans`o: 162
Mobiot (2000) Sun: 183
Medhi and |V
1
| = 10, |E
1
| = 90 2 (64, 384 Kbps) DECstation 5000-200 180
Guptan (1997) running MIPS Ultrix
Wolfgang (1995) |V
1
| = 18, |E
1
| = 306 3
constraints (8) and (10), end-to-end blocking constraints (9), and the Erlang xed point
equations (13) and (14). Packet ow and delay constraints are also included in this model.
The blocking constraints and Erlang xed point equations make the model a dicult
non-convex problem to solve. However, by ignoring the eect of blocked connections when
calculating the oered trac on each route, the model becomes convex. This approximated
model is solved using a penalty function method and was tested on networks having up to
18 nodes.
The papers on centralized independent connection models that were reviewed in this
section are summarized in Table 2.
4.2 Centralized end-to-end path models
In end-to-end path models, every O-D pair is connected by at least one virtual link. More-
over, connections oered to an O-D pair are always routed over a direct virtual link joining
the pair (i.e., |r| = 1, r R
1
d
, d D
2
). Since each O-D pair can be connected by several
virtual links, a connection routing algorithm, such as xed alternate routing, is required
to select those links on which new connections will be set up.
In many models, connections from dierent service classes are mixed together over the
virtual links. However, when networks carry highly dissimilar service classes, such as both
very bursty and constant bit rate trac, separating service classes onto dierent links may
be more ecient [85].
We provide an illustration of end-to-end path models in Figure 6. There are three
virtual links between nodes A and C across which A-C connections can be routed. Given
oered trac A
2
sd
AC
from node A to C, the synthesis problem determines how much trac
is to be carried across each of the three possible links while respecting the transmission
capacity constraints.
Les Cahiers du GERAD G9851 Revised 18
Virtual links
Routes
2
sd
A
A
B
C
A-C
Figure 6: Virtual network for the end-to-end path model
End-to-end path models are typically formulated as nonlinear programs [17, 32, 54, 83],
which maximize network throughput, or as linear models [34, 37, 57], which optimize
capacity costs or revenues. Link utilization based models [22, 44], which minimize the
amount of reserved transmission link bandwidth, have also been proposed. Since using end-
to-end paths minimizes the delay in a network, delay-based optimization is not considered.
4.2.1 Throughput-based optimization In this section, we review the centralized end-
to-end path models that maximize carried trac or carried trac revenue. These models
assume that virtual links can carry connections from multiple service classes.
Given the oered trac A
2
sd
for every service class s and O-D pair d and the incidence
matrix R
0
of virtual and transmission links, bandwidth C
1
e
must be allotted to each virtual
link e, so that carried trac revenue is maximized while transmission capacity constraints
are respected.
Maximize
Z
3
(C
1
e
) =

sS

dD
2
W
1
sd
A
2
sd
_
1 B
1
sd
_
subject to
R
0
C
1


C
0
, (18)
C
1
e
0. e E
1
(19)
If xed alternate routing is implemented, there is no known exact analytical expression
for the end-to-end blocking probabilities B
1
sd
of multiple service classes sharing a group of
parallel virtual links. Consequently, in [54, 84], the model is simplied by substituting the
parallel links between each O-D pair d D
2
with a single link whose capacity is the sum
of the parallel link capacities
C
1
d
=

eE
1
d
C
1
e
. (20)
Les Cahiers du GERAD G9851 Revised 19
As a result, the routing is xed and end-to-end blocking B
1
sd
can be calculated using a
multirate approximation
B
1
sd
= g
1
sd
(a
1
d
,
1
d
, C
1
d
). (21)
In Siebenhaar [83], blocking constraints B
1
sd
B
1
are added to the model. A reduced-
gradient and quasi-Newton algorithm is used to solve the problem once the blocking con-
straints are linearized. The maximal blocking probability B
1
is determined by solving the
following minimax problem using Labourdette and Harts multirate blocking approxima-
tion and a bisection method.
Minimize
Z
4
(C
1
e
) = max
sS dD
2
{B
1
sd
}
subject to (18), (19), (20) and (21).
This algorithm was tested on a 23 node network in which each O-D pair was connected
by up to 6 virtual links. The total number of virtual links was 960. When the network
carried 5 service classes, solutions were obtained in 5 to 10 minutes on a SUN Sparcstation
10.
Logothesis and Shioda [54] also minimize Z
4
subject to constraints (18), (19), (20) and
(21) but add linear switch capacity constraints. Multirate blocking is calculated using the
Kauman and Roberts recursive formula. The authors solve the problem using a heuristic
approach in which bandwidth is successively added to paths having large blocking rates and
removed from paths having small blocking probabilities, while guaranteeing transmission
capacity constraints. The heuristic algorithm was compared to an analytic solution by
testing on networks having up to 14 nodes. The heuristic gave near optimal results in less
time.
It is not necessary to estimate network throughput using end-to-end blocking probabil-
ities. For example, in Evans [17], the expected number of calls in progress is maximized.
The author develops a simple approximation for this objective and its derivative. While
the objective is not concave, she shows that it is concave over the relevant part of the
feasible region if trac demands and available link capacities are not greatly mismatched.
A Frank-Wolfe algorithm is consequently employed to solve the problem.
Herzberg and Pitsillides [32] use a uid ow function to model the total expected
network throughput. By discretizing the throughput function, the authors reformulate the
relaxed model as a linear programming problem, which is solved using standard techniques.
4.2.2 Linear capacity-based optimization Instead of mixing service classes, some
models assume that only one service class is carried on each virtual link. This means that
the Erlang-B function can be calculated o-line to estimate bandwidth requirements and
that linear models can be easily formulated using trunk reservation schemes.
In Hui et al. [34], a formulation is given in which linear bandwidth costs are minimized
subject to bandwidth requirements and transmission capacity constraints.
Les Cahiers du GERAD G9851 Revised 20
Minimize
Z
5
(C
1
e
) =

sS

dD
2

eE
1
sd
K
1
e
C
1
e
subject to (18), (19), and

eE
1
sd
C
1
e
g
1
sd
_
A
2
sd
, B
1
sd
_
. s S, d D
2
(22)
To this model, Mehdi [57] has added the assumption that class s trac between O-D
pair d can not be bifurcated and thus is carried on only one virtual link. Given the variable
x
sde
, such that x
sde
= 1 if virtual link e E
1
sd
is chosen to carry class s trac between
O-D pair d and is 0 otherwise, the author has formulated a mixed-integer linear program
for optimizing total revenue.
Maximize
Z
6
(x
sde
, C
1
e
) =

sS

dD
2

eE
1
sd
W
1
e
C
1
e
subject to (18), (19), (22),
C
1
e
x
sde
g
1
sd
(A
2
sd
, B
1
sd
), s S, d D
2
, e E
1
sd
(23)

eE
1
sd
x
sde
= 1, s S, d D
2
(24)
x
sde
{0, 1}. s S, d D
2
, e E
1
sd
(25)
Another linear model has been proposed by Jiyapanichkul and Lambert [37], in which
the carried class s trac for virtual link e is estimated as C
1
e
/
1
se
. The model maximizes
Z
6
subject to constraints (18), (19), and

eE
1
sd
C
1
e

1
se
A
2
sd
. s S, d D
2
(26)
All models in this section can be solved by using standard linear optimization or mixed-
integer routines; however, some authors [57] have not provided any experimental results
and others [34, 37] have simulated networks that are only carrying a single service class.
4.2.3 Link utilization-based optimization When only carried trac is maximized,
all available transmission capacity is allocated to the oered trac. This results in networks
that have very little spare capacity and are thus unable to accommodate potential increased
bandwidth demands. Consequently, Gersht et al. [21] propose a model that combines a
load sharing objective with an access control objective. This model is optimized over the
admission control variables
sd
and the load sharing variables
sde
. Note that
sd
is the
Les Cahiers du GERAD G9851 Revised 21
percentage of A
2
sd
trac blocked at the source, and
sde
is the fraction of (1
sd
)A
2
sd
trac carried over link e joining O-D pair d. The load sharing variables are determined by
maximizing the minimal residual transmission link capacity Z
7
, and the access variables are
calculated by maximizing the minimal fraction of admitted trac Z
8
. Using our notation,
the objectives and constraints are written:
maximize
Z
7
(
sde
,
sd
) = min
eE
0
_
C
0
e

E
1
r
0
e,e
C
1
e

_
;
maximize
Z
8
(
sd
) = min
dD
2
_
(1
sd
)
_
;
subject to (18), (19),
C
1
e
=

sS

dD
2

eE
1
d
(1
sd
)A
2
sd

1
s

sde
, e E
1
(27)

eE
1
d

sde
= 1, s S, d D
2
(28)

sde
0, s S, d D
2
, e E
1
d
(29)
0
sd
1, s S, d D
2
(30)

sd
> 0 max
e

E
1
d
_
min
eE
0
:ee

_
C
0
e

E
1
r
0
e,e
C
1
e

_
_
= 0. (31)
Equation (31) describes the connection accessibility conditions, which only permit a
fraction of A
2
sd
trac to be blocked if no residual capacity is available between O-D pair
d. In [44], these access conditions are slightly modied so that bandwidth demand for
long duration calls is rejected until accepted bandwidth demand for regular calls is above
a preset value. This way, long duration calls do not monopolize the networks capacity at
the expense of shorter duration calls. Another variant of the problem is tackled in [22],
where possible transmission link failures are taken into consideration and the network is
designed with the guarantee that it can fully restore trac ow after any failure.
This model is tackled by solving the network equilibrium equations of the problem,
which are shown to satisfy both objectives.
Table 3 summarizes articles reviewed in Section 4.2, which use centralized end-to-end
path models.
4.3 Centralized node-to-node path models
As described in Section 2.2.2, reserving bandwidth between O-D pairs using end-to-end
paths may reduce the delay and complexity of a network, however it also wastes bandwidth
if the paths are underutilized. To compensate for this ineciency, connections may be
routed over a series of paths to give us a node-to-node path model. The virtual network is
Les Cahiers du GERAD G9851 Revised 22
Table 3: Articles presenting Centralized End-to-end Path Models
ARTICLES VARIABLES OBJECTIVE CONSTRAINTS SOLUTION PROBLEM
APPROACHES FEATURES
Siebenhaar (1994) virtual link capacity max. carried trac link capacity linearize constraints nonlinear
end-end blocking reduced-gradient Labourdette
Logothetis and virtual link capacity min max link capacity heuristic nonlinear
Shioda (1992) call blocking switch capacity Roberts
Evans (1991) virtual link capacity max # connections link capacity concave
Frank-Wolfe
Herzberg and virtual link capacity max carried trac link capacity discetize objective nonlinear
Pitsillides (1993) route bandwidth linear relaxation uid ow model
Jiyapanichkul and virtual link capacity max revenue link capacity linear formulation
Lambert (1998) max connection rate ow constraints
Mehdi (1997) virtual link capacity max revenue link capacities required bandwidth linear formulation
virtual link routing 1 route per O-D calculated o-line 1 class/path
Kheradpir, Gersht,
Shulman and virtual link capacity max min ow conservation parallel algorithm SBMS network
Stinson (1996) residual capacity
Gersht, Kheradpir virtual link capacity max min ow conservation parallel algorithm SBMS network
and Friedman (1996) residual capacity
Hui, Gursoy, Moayeri virtual link capacity min. link costs link capacities linear formulation
and Yates (1991)
ARTICLES PROBLEM NO. SERVICE CLASSES PLATFORM RUNNING
SIZE TIMES (SECS.)
Siebenhaar (1994) |V
1
| = 23, |E
1
| = 960 5 SUN Sparcstation 10 600
|V
0
| = 23, |E
0
| = 41
Logothetis and |V
1
| = 14 2 (100, 1000 Kbps) VAX-6330 (VMS) analytic 3540
Shioda (1992) heuristic 2940
Gerrsht, Kheradpir |V
1
| = 20, |E
1
| = 380 HP-730 370
and Shulman (1996)
Hui, Gursoy, Moayeri |V
1
| = 5, |E
1
| = 42
and Yates (1991)
therefore a multigraph, in which each possible route R
1
d
for an O-D pair d D
2
is a series
of links in E
1
. Note that O-D pairs are not necessarily connected by a direct virtual link
in G
1
. Since the virtual links C
1
e
may now hold trac from many O-D pairs, oered trac
A
1
sdr
to each route r R
1
d
must be included as a variable in the model formulations.
In Figure 7, we illustrate the multigraph, which represents the virtual network for a
node-to-node path network model. Connections between O-D pair A-C are either routed
over one of the direct links between A-C or across more than one virtual link (i.e., over
links (A-B) then (B-C)).
An example of node-to-node bandwidth allocation is the virtual network allocation
proposed by Dziong, Xiong and Mason [15], in which routing and bandwidth allocation
functions are separated between paths and virtual network links. Paths are used to dene
routes between every node pair, and virtual network links are used to control bandwidth
allocation.
Node-to-node path models may optimize performance by maximizing network through-
put [11, 18, 19, 49, 67]. However, cost-based models [1, 5, 12, 13, 14, 45, 59, 65, 79], which
minimize the network costs, and delay-based models [20, 50, 61, 63, 87] are also common.
4.3.1 Throughput-based optimization In this section, we review the node-to-node
path models that optimize network throughput. In Farago et al. [19], carried trac revenue
is maximized by estimating the end-to-end call blocking probabilities for each route r R
1
d
.
Given oered trac A
2
sd
and the incidence matrix R
0
of virtual and transmission links,
virtual link bandwidth C
1
e
and oered trac A
1
sdr
are determined such that transmission
capacity constraints and trac requirements are respected.
Les Cahiers du GERAD G9851 Revised 23
Routes
Virtual links
A
2
B-C
sd
sd
A
2
A-C
A
B
C
Figure 7: Virtual network for the node-to-node path model
Maximize
Z
2
(C
1
e
, A
1
sdr
) =

sS

dD
2

rR
1
d
W
1
sdr
A
1
sdr
_
1 B
1
sdr
_
subject to (8), (10), (12), (13), (14), (18) and (19).
Farago et al. employ a two-step method to solve the problem. Initially, connection
routing is xed, and the link dimensioning problem is reformulated as a convex program
by approximating the expected revenue by a concave function based on a continuous ap-
proximation of Erlangs formula. Using the solution to this rst step as an initial point,
approximations for the objective function and objective gradient are used in a gradient-
based hill climbing method to nd an improved solution. Alternatively, a neural network
approach can solve the dimensioning problem [18].
The solution approach described in [19] is tested on a 3 node network carrying 2 service
classes. Total revenue values were similar to those obtained using a more exact approach.
Cheng and Lin [11] solve this model too but add constraints on the number of concate-
nated virtual links that a connection can be routed across. They solve the program using
a two-phase iterative algorithm. In the rst phase, virtual link capacities are xed while
routing is optimized, while in the second phase, the reverse is performed.
In Lazar et al. [49, 67], a novel approach is taken to solve the bandwidth allocation
problem. Rather than maximizing overall network performance, path allocation is con-
sidered as a non-cooperative game, where each user attempts to selshly reserve as much
bandwidth as possible for its own end-to-end paths. In order to reect this competition
between users, a two-part cost function is used. The rst part accounts for the fact that
as more bandwidth is reserved for a user, its call blocking, and consequently its cost di-
minishes. The second part reects the fact that as more bandwidth is reserved by other
users of links making up a users path, the available bandwidth diminishes and the cost
of reserving bandwidth rises. Cost functions are constrained by the following: no user is
allowed to reserve all network bandwidth for itself; every user reserves some bandwidth for
itself; and total reserved bandwidth is less than the total available network bandwidth. For
single link, parallel and general network topologies, the authors show that the game has a
Les Cahiers du GERAD G9851 Revised 24
unique Nash equilibrium and is fair, which means that there exists a bandwidth allocation
strategy such that no user nds it benecial to change its paths bandwidth.
4.3.2 Cost-based optimization In work by Dziong [14] and Oki and Yamanaka [65],
virtual link capacity costs are minimized subject to blocking constraints. Since they as-
sume that transmission link capacities are very large, there are no transmission capacity
constraints.
Minimize
Z
1
(C
1
e
) =

eE
1
K
1
e
(C
1
e
)
subject to (9) and (11).
In Dziongs model [14, pp.227233], reward parameters, dened as the average reward
for carrying connections of a certain class, are added as optimization variables so that the
connection blocking constraints can be simplied. The problem is solved using an iterative
algorithm, which gives nearly optimal solutions when tested on a 4 node network. The
algorithm starts with initial bandwidth allocation and reward parameters, which then are
increased until all constraints are satised.
A similar model is proposed by Oki and Yamanaka, in which link capacity variables
are determined by minimizing link and node capacity costs. Binary decision variables,
which indicate whether or not an O-D pair is joined by a virtual link, are also decided.
This model not only includes call blocking constraints but also constraints on packet loss
L
1
sdr
L
1
and on the number of transmission hops a path can take. Since the problem
is a dicult nonlinear combinatorial program, the authors propose a heuristic algorithm.
Random initial values are assigned to the decision variables so that there are at least 2 node-
disjoint routes between every O-D pair. At each iteration, a decision variable is chosen at
random and its value is negated. This process stops when each decision variable has been
chosen at least once and when the variables have returned to their initial random values.
The solution having the lowest cost and for which blocking and packet loss constraints are
veried is chosen as optimal.
In Sections 4.1.2 and 4.2.2, trunk reservation was used to obtain linear models for solving
the network synthesis problem. This approach can also be used for node-to-node networks
[1, 12, 13, 45, 59], resulting in multicommodity ow models that determine required virtual
link C
1
e
and route X
1
sdr
capacities.
Minimize
Z
1
(C
1
e
) =

eE
1
K
1
e
(C
1
e
)
subject to (17), (18), (19),
Les Cahiers du GERAD G9851 Revised 25

sS

dD
2

rR
1
d
:er
X
1
sdr
C
1
e
, e E
1
(32)

rR
1
d
X
1
sdr
= g
1
_
A
2
sd
,
1
s
, B
1
sd
_
. s S, d D
2
(33)
In Mehdi and Lu [59], the synthesis problem is solved in conjunction with the circuit
routing and transmission dimensioning problems. The model is a complex mixed-integer
linear optimization problem, which must be decomposed into two problems: the transmis-
sion network dimensioning subproblem and the virtual network dimensioning subproblem.
The two subproblems can be solved using an iterative procedure in which the virtual net-
work subproblem is used as an input for the transmission network subproblem, and vice
versa. The authors have tested their model on a 15 node network carrying 3 service classes,
using CPLEX to solve the subproblems.
In [1, 12, 13, 45], a link ow formulation of the previous multicommodity model is
solved. Chlamtac et al. [12] solve the problem using standard linear routines, whereas
Ahn et al. [1] solve it in two steps. Initially, they determine the transmission routes for the
oered trac using a mixed integer linear multi-commodity ow formulation. Using this
trac layout, both virtual link capacities and virtual link routing variables are determined
by using a heuristic method that minimizes switching and call setup costs.
In the model proposed by Kim [45], nonlinear switching and buer costs are added to the
objective function, and an interior penalty function method is used to solve the problem.
In Chung et al. [13], a heuristic algorithm based on the local linear approximation of the
objective is proposed and is shown to give good results more quickly when compared with
the approach proposed in [45].
4.3.3 Delay-based optimization In [20, 50, 61, 63, 87], the objective is to minimize
packet loss. However, since models for packet loss are complex, average packet delay is
used as an indirect measure of packet loss probability. The average delay is calculated by
modeling each link e E
1
as an independent M/M/1 queue. The objective of the model
is to optimize required virtual link C
1
e
and route X
1
sdr
capacities, such that the average
packet delay is minimized:
Minimize
H(C
1
e
, X
1
sdr
)
subject to (32), (17), (18) and (19).
In Gerla et al. [20] and Murphy et al. [63], the objective function H is non-convex. By
generating many random initial solutions to be used as starting points for their algorithm,
the authors can select the global optimum from among the local optima having the lowest
value. In [20], a solution is found using Frank-Wolfes steepest descent method, while in
[63] a standard library routine for linearly constrained optimization problems is used.
Les Cahiers du GERAD G9851 Revised 26
Monteiro et al. [61] improve the solution provided in [20] by employing an average
packet delay objective which is convex in both C and X if the integer capacity variables
C
1
e
are relaxed. They develop an iterative algorithm that routes heavy O-D trac over
direct paths and less loaded O-D pairs over indirect paths. Finally, Tang et al. [87] have
studied the same problem but have included switch capacity constraints. They solve the
problem using a fast genetic algorithm.
Lee and Yee [50] solve a model similar to [20]; however, total packet loss is minimized
directly rather than by optimizing average packet delay. Although the packet loss function
is non-convex, the authors show that the relaxed model can be simplied to a convex
problem.
Tables 4 and 5 provide a summary of the papers describing centralized node-to-node
path models.
Table 4: Articles presenting Centralized Node-to-node Path Models
ARTICLES VARIABLES OBJECTIVE CONSTRAINTS SOLUTION PROBLEM
APPROACHES FEATURES
Farago, Blaabjetg, virtual link capacity max carried trac link capacity convex approx. 2 phase solution
Ast, Gordos and load sharing approx. obj. gradient
Henk (1995) steepest ascent
Farago, Biro, Henk virtual link capacity max carried trac link capacity convex approx. Erlang xed point
and Boda (1997) neural networks xed routing
Cheng and virtual link capacity max carried trac link capacity model decomposition Erlang xed point
Lin (1994) connection routing # virtual hops iterative algorithm
Lazar, Orda and virtual link capacity min blocking link capacity Non-cooperative
Pendarakis (1997) min capacity cost Game
Pendarakis (1996)
Dziong (1997) virtual link capacity min. link costs end-end blocking iterative algorithm
connection routing link eciency
Oki and virtual link capacity min. link costs end-end blocking
Yamanaka (1995) connection routing min. switch costs packet loss rate heuristic switch costs
virtual hops
transm. link capacities min virtual and link capacity decompose model linear model
Mehdi and Lu (1997) virtual link routing transm. link costs ow constraints
virtual link capacity
connection routing
Ahn, Tsang, Tong virtual link capacity min. max ow multicommodity heuristic
and Du (1994) virtual link routing
connection routing
Kim (1995) virtual link capacity min link costs multicommodity linear relaxation linear objectives
connection routing min control costs link capacity exterior penalty
buer capacities min buer costs integer variables
Chung, Hong, Song virtual link capacity min link costs multicommodity linearize obj. concave objective
and Kim (1997) connection routing min control costs link capacity bilinear method
buer capacities min buer costs
Chlamtac, Farago virtual link capacity min link costs multicommodity linear model
and Zhang (1996) connection routing link capacity
Gerla, Monteiro virtual link capacity min packet loss link capacity Random initial sol. non convex
and Pazos (1989) trac ows ow conservation Frank-Wolfe
Murphy and virtual link capacity min packet loss link capacity Random initial sol. non convex
Curran (1993) trac ows ow conservation library routing
Monteiro and virtual link capacity min packet loss link capacity integer relaxation convex
Gerla (1994) trac ows ow conservation Frank-Wolfe
Tang, Ko, Man virtual link capacity min packet loss link capacity genetic algorithm non convex
and Kwong (1998) trac ows ow conservation
Lee and Yee (1994) virtual link capacity min packet loss ow conservation linear relaxation non convex
connection routing total packet loss heuristics mixed integer
integer capacities
Les Cahiers du GERAD G9851 Revised 27
Table 5: Articles presenting Centralized Node-to-node Path Models
ARTICLES PROBLEM NO. SERVICE CLASSES PLATFORM RUNNING
SIZE TIMES (SECS.)
Farago, Blaabjetg, |V
1
| = 3, |E
1
| = 6 2
Ast, Gordos and
Henk (1995)
Farago, Biro, Henk |V
1
| = 4, |E
1
| = 6 2 (750, 1500 Kbps)
and Boda (1997)
Dziong (1997) |V
1
| = 4, |E
1
| = 6 2 (64, 192 Kbps)
Oki and |V
1
| = 8
Yamanaka (1995)
Mehdi and Lu (1997) |V
1
| = 15 3 (64, 384, 384 Kbps)
Ahn, Tsang, Tong |V
1
| = 20, |E
1
| = 50
and Du (1994)
Kim (1995) |V
1
| = 6, |E
1
| = 90 3 (64, 2000, 10000 Kbps)
Chung, Hong, Song |V
1
| = 6, |E
1
| = 90 3 (64, 2000, 10000 Kbps) Kim: 2400
and Kim (1997) Chung: 4
Gerla, Monteiro |V
1
| = 5, |E
1
| = 28 SUN 3/280 1800
and Pazos (1989)
Murphy and |V
1
| = 3, |E
1
| = 7
Curran (1993)
Tang, Ko, Man |V
1
| = 5, |E
1
| = 28 SUN 3/280 1800
and Kwong (1998)
Lee and Yee (1994) |V
1
| = 18 SUN 4 100
4.4 Centralized hybrid models
Hybrid allocation models route some connections over direct end-to-end paths and route
others independently in order to increase multiplexing gains and decrease processing eorts.
This approach is likely to be useful for networks in which delay sensitive, high demand
trac can be routed over end-to-end paths, while delay insensitive, low demand trac can
be routed independently. For example, in Chan and Geraniotis [10], voice calls are carried
on end-to-end paths, whereas video calls are set up as independent connections.
In Aneroussis and Lazar [3], the network revenue is maximized while satisfying process-
ing load constraints on the nodes and blocking constraints for each O-D pair. An algorithm
is proposed in which, initially, the trac between all O-D pairs is routed using either a
xed alternate or an adaptive routing scheme, with routes and alternate routes made up of
either paths, or independent connections, or of both. First, path bandwidths are gradually
increased until both blocking and signaling constraints are satised, then they are further
increased so as to maximize revenue, yet satisfy all constraints. This algorithm was tested
on a 10 node network carrying 2 service classes.
Articles describing centralized hybrid models are summarized in Table 6.
Table 6: Articles presenting Centralized Hybrid Models
ARTICLES VARIABLES OBJECTIVE CONSTRAINTS SOLUTION PROBLEM
APPROACHES FEATURES
Aneroussis and virtual link capacity max. network processing loads heuristic
Lazar (1996) revenue end-end blocking
ARTICLES PROBLEM NO. SERVICE CLASSES PLATFORM RUNNING
SIZE TIMES (SECS.)
Aneroussis and |V
1
| = 10, |E
1
| = 52 2 (64, 4000 Kbps) 5
Lazar (1996)
Les Cahiers du GERAD G9851 Revised 28
4.5 Decentralized end-to-end path models
When decentralized models are implemented, each paths bandwidth is computed by a
controller based on data acquired from some, but not all, paths in the network. Since
global information is not considered, these models give worse solutions than do centralized
models, however, they are likely to operate on a faster time scale.
Much research has been devoted to decentralized dynamic end-to-end path algorithms.
In general, very simple algorithms are used to allocate the bandwidth. For example, in
order to react quickly to trac variations, paths may have their bandwidth varied by a
xed step [78, 64, 51, 90, 40], either at each new call arrival or whenever quality of service
requirements are not met. Variations include making the increase step size larger than the
decrease step size [51] or having two possible step sizes [90].
There are some disadvantages, however, in using xed step sizes. For example, large
bandwidth steps result in increased bandwidth waste and small step sizes result in increased
processing loads [66, 90]. Furthermore, bandwidth may oscillate around a steady state if
xed step sizes are used [66]. For this reason, variable step sizes are most often employed.
When the bandwidth steps are variable, bandwidth is shared between the paths in such
a way as to optimize network performance. For example, in Gu [28] a heuristic algorithm is
used to minimize the maximum call blocking probability, and in Bolla et al. [6] a steepest
descent algorithm is used to minimize the total expected packet loss rate. Tsang and Chan
propose two heuristics methods: the rst [9] involves combining paths together in order
to minimize total bandwidth required while satisfying the QoS requirements of each class;
the second approach [88] involves having high priority classes overow into under-utilized
paths.
Larsson and Arvidsson [47] propose a distributed method where trac between each O-
D pair is divided among an arbitrary number of end-to-end paths. The paths bandwidth
is estimated using an iterative procedure based on the Erlang-B formula. In a subsequent
paper [48], bandwidth is estimated more quickly using an approximation requiring only
the number of active connections.
Bruni [7] assumes that paths have Poissonian trac demands, so bandwidth for each
period is calculated based on the oered trac and desired blocking. With only the
number of active connections known, path bandwidths are quickly determined by using
pre-calculated capacity allocation tables.
Recently, IP resource management methods based on the MPLS architecture [72] have
been proposed [4, 36] to provide QoS guarantees for delay sensitive services using constraint-
based routing label paths (CRLSPs). In [4], the edge nodes periodically increase and de-
crease CRLSP bandwidth based on estimated bandwidth needs, bandwidth use, and the
status of the transmission links carrying the CRLSP. Bandwidth changes are implemented
using the constraint-based routing label distribution protocol [2, 36].
Shioda [81] predicts the bandwidth step for two bandwidth demand cases: where band-
width demand is stationary and where it is modeled as a linear dynamic time-series.
In the algorithms by Saito [74] and Saito et al. [75], the bandwidth step is estimated
every 15 minutes based on actual trac and on trac data collected by the system on the
Les Cahiers du GERAD G9851 Revised 29
previous day during the same measurement period. This algorithm ensures that there will
be sucient bandwidth during the next control period if the largest variation in trac is
less than the variation which occurred on the previous day.
Orda et al. [66] develop an event-driven, variable bandwidth step algorithm. Each
virtual link is assigned an upper and lower threshold. Bandwidth is increased if the demand
is greater than the upper threshold, and bandwidth is decreased if the demand is less than
the lower threshold. New thresholds are calculated using Markov chains to model the path
dynamics.
Table 7 provides a summary of the articles reviewed in Section 4.5 using decentralized
end-to-end path models.
Table 7: Articles presenting Decentralized End-to-end Path Models
ARTICLES LOCAL OR BANDWIDTH UPDATE PROBLEM FEATURES
DISTRIBUTED STEP INTERVAL
Sato, Ohta, and Tokizawa (1990), local xed event driven update if connection is blocked,
Ohta and Sato (1992) equal increase and decrease steps
Gu , Sohraby and local variable periodic minimize call blocking
Vaman (1995) heuristic algorithm
Bolla, Davoli, Lombardo, local variable periodic minimize expected packet loss rate
Palazzon and Panno (1994) steepest descent method
Chan and Tsang (1994) local variable periodic combination of paths
Tsang and Chan (1998) local variable periodic priority classes
Lin, Su and Lo (1996) distributed xed event driven update if connection is blocked,
if link utilization is too high or low
or if processing load is too high
increase step larger than decrease step
Wu, Chou and Tzeng (1995) distributed xed event driven two possible step sizes
Saito, Nakagawa, Kato distributed variable event driven self-sizing network
and Ohta (1996) or periodic measurement-based bandwidth estimation
Saito (1997)
Kawamura, Hadama, Sato distributed xed periodic peak rate allocation
and Tokizawa (1994)
Larsson and Arvidsson (1998) distributed variable periodic # active calls for bandwidth estimation
Larsson and Arvidsson (1997) distributed variable periodic iterative procedure
Bruni, Mocci, Pannunzi distributed variable periodic capacity assignment tables
and Scoglio (1995)
Ash, Jamoussi, Lee distributed variable periodic IP MPLS-based networks
and Aboul-Magd (1999)
Orda, Pacici and distributed variable event-driven upper and lower thresholds
Pendarakis (1996) Markov chains to calculate thresholds
Shioda (1994), distributed variable event-driven call blocking for bandwidth estimation
Shioda and Uose (1991)
Shioda, Saito and Yokoi (1997) distributed variable event-driven time series model
5 Conclusion
An extensive review of the multi-service network literature revealed a large diversity of
models and technological choices suggested for the solution of the network synthesis prob-
lem. In this paper, we have proposed a technology-independent typology permitting clas-
sication of all these multi-service network synthesis methods. We found that there are,
at present, ve basic modeling types which we classied based on the switching and
control strategies used. To do this, we developed a unifying notation, which we then used
to analyze and compare the mathematical formulations and solution approaches currently
suggested for the multi-service network synthesis problem.
Our review reveals several possible directions for future research. These include the
development of fast heuristics to allow for real-time centralized network synthesis, the
Les Cahiers du GERAD G9851 Revised 30
development of models for dimensioning decentralized independent connection, node-to-
node and hybrid networks, and the development of models and algorithms specic to
multi-technology networks.
Acknowledgement
Finally, we would like to thank the anonymous referees for their valuable comments and
suggestions.
References
[1] S. Ahn, R.P. Tsang, S.-R. Tong, and D.H.C. Du. Virtual path layout design on ATM
networks. In Proc. IEEE Infocom, pages 192200, 1994.
[2] L. Anderson, P. Doolan, N. Feldman, A. Fredette, and B. Thomas. LDP
specication, IETF draft-ietf-mpls-ldp-01.txt. Internet Draft, available at
www.crt.umontreal.ca/bruni/archive/, August 1998.
[3] N.G. Aneroussis and A.A. Lazar. Virtual path control for ATM networks with call
level quality of service guarantees. IEEE/ACM Trans. Networking, 6(2):222236,
April 1998.
[4] G. R. Ash, B. Jamoussi, Y. Lee, and O. S. Aboul-Maged. QoS resource management
in MPLS-based networks, draft-ash-qos-routing-00.txt. Internet Draft, available at
www.crt.umontreal.ca/bruni/archive/, February 1999.
[5] M. Aydemir and Y. Viniotis. Deterministic algorithm for VP assignment in ATM
networks. Computer Communications, 19(13):10361050, November 1996.
[6] R. Bolla, F. Davoli, A. Lombardo, S. Palazzo, and D. Panno. Hierarchical dynamic
control of multiple trac classes in ATM networks. European Trans. Telecommunica-
tions, 5(6):747755, November 1994.
[7] C. Bruni, U. Mocci, P. Pannunzi, and C. Scoglio. Ecient capacity assignment for
ATM virtual paths. In Proc. ATM Hot Topics on Trac Performance from Race to
ACTS, No.14, Milan, 1995.
[8] J. Burgin and D. Dorman. Broadband ISDN resource management: The role of virtual
paths. IEEE Commmunications Magazine, 29(9):4448, September 1991.
[9] J.H.S. Chan and D.H.K. Tsang. Bandwidth allocation of multiple QoS classes in ATM
environment. In Proc. IEEE Infocom, pages 360367, 1994.
[10] W.C. Chan and E. Geraniotis. Near-optimal bandwidth allocation for multi-media
virtual circuit switched networks. In Proc. IEEE Infocom, pages 749757, 1996.
[11] K-T. Cheng and F. Lin. On the joint virtual path assignment and virtual circuit
routing problem in ATM networks. In Proc. IEEE Globecom, pages 777782, 1994.
Les Cahiers du GERAD G9851 Revised 31
[12] I. Chlamtac, A. Farag o, and T. Zhang. VP network design using a multicommodity
ow model. In J. Roberts, U. Mocci, and J. Virtamo, editors, Broadband Network
Teletrac: Performance Evaluation and Design of Broadband Multiservice Networks,
COST 242 nal report, pages 272273. Springer, 1996.
[13] S.-J. Chung, S.-P. Hong, H.-G. Song, and S.-B. Kim. Toward real-time optimal man-
agement of virtual paths in ATM-based B-ISDNs. In Proc. IEEE ICC, pages 225230,
1997.
[14] Z. Dziong. ATM Network Resource Management. Computer Communications. Mc-
Graw Hill, New York, 1997.
[15] Z. Dziong, Y. Xiong, and L.G. Mason. Virtual network concept and its applications
for resource management in ATM networks. In L. Mason and A. Casaca, editors,
Broadband Communications, IFIP-IEEE Conference on Broadband Communications,
pages 223234. Chapman-Hall, 1996.
[16] O. Enomoto and H. Miyamoto. An analysis of mixtures of multiple bandwidth trac
on time division switching networks. In Proc. 7th ITC, pages 635.18, 1973.
[17] S.P. Evans. Optimal bandwidth management and capacity provision in a broadband
network using virtual paths. Performance Evaluation, 13:2743, 1991.
[18] A. Farag o, J. B

ir o, T. Henk, and M. Boda. Analog neural optimization for ATM


resource management. IEEE JSAC, 15(2):156164, 1997.
[19] A. Farag o, S. Blaabjerg, L. Ast, G. Gordos, and T. Henk. A new degree of freedom
in ATM network dimensioning: Optimizing the logical conguration. IEEE JSAC,
13(7):11991206, 1995.
[20] M. Gerla, J.A.S. Monteiro, and R. Pazos. Topology design and bandwidth allocation
in ATM nets. IEEE JSAC, 7(8):12531262, October 1989.
[21] A. Gersht, S. Kheradpir, and A. Friedman. Real-time trac management by a parallel
algorithm. IEEE Trans. Communications, 41(2):351360, February 1993.
[22] A. Gersht, S. Kheradpir, and A. Shulman. Dynamic bandwidth allocation and path
restoration in SONET self-healing networks. IEEE Trans. Reliability, 45(2):321330,
June 1996.
[23] O. Gerstel, I. Cidon, and S. Zaks. The layout of virtual paths in ATM networks.
IEEE/ACM Trans. Networking, 4(6):873884, 1996.
[24] R.J. Gibbens and P.J. Hunt. Eective bandwidths for the multi-type UAS channel.
Queuing Systems, 9:1728, 1991.
[25] A. Girard. Routing and Dimensioning in Circuit-Switched Networks. Addisson Wesley,
New York, 1990.
[26] A. Girard and E.B. Gardouh. An optimization method for broadband ISDN networks.
In Proc. IEEE Globecom, pages 762766, 1993.
[27] A. Girard and B. Sans o. Multicommodity ow models, failure propagation, and reli-
able loss network design. IEEE/ACM Trans. Networking, 6(1):8293, February 1998.
Les Cahiers du GERAD G9851 Revised 32
[28] X. Gu, K. Sohraby, and D.R. Vaman. Control and Performance in Packet, Circuit,
and ATM Networks. Kluwer Academic Publishers, 1995.
[29] R. Guerin, H. Ahmadi, and M. Naghshineh. Equivalent capacity and its application
to bandwidth allocation in high-speed networks. IEEE JSAC, 9(7):968981, 1991.
[30] R. Guerin, D.-H. Gan, S. Kamat, T. Li, and E. Rosen. Setting up reservations on ex-
plicit paths using RSVP, draft-guerin-expl-path-rsvp-01.txt. Internet Draft, available
at www.crt.umontreal.ca/bruni/archive/, November 1997.
[31] F. Guillemin and I. Hamchaoui. Some trac aspects in virtual private networks over
ATM. In L. Mason and A. Casaca, editors, Broadband Communications, IFIP-IEEE
Conference on Broadband Communications, pages 235246. Chapman and Hall, 1996.
[32] M. Herzberg and A. Pitsilllides. A hierarchical approach for the bandwidth allocation
management and control in B-ISDN. In Proc. IEEE ICC, pages 13201324, 1993.
[33] J.Y. Hui. Resource allocation for broadband networks. IEEE JSAC, 6(9):15981608,
1988.
[34] J.Y. Hui, M.B. Gursoy, N. Moayeri, and R.D. Yates. A layered broadband switching
architechture with physical or virtual path congurations. IEEE JSAC, 9(9):1416
1426, 1991.
[35] ITU-T. Series I recommendations, integrated services digital networks (ISDN), 1988.
[36] B. Jamoussi. Constraint-based LSP setup using LDP, draft-ietf-mpls-cr-ldp-01.txt.
Internet Draft, available at www.crt.umontreal.ca/bruni/archive/, February 1999.
[37] P. Jiyapanichkul and J. Lambert. Optimal resource management with dynamic virtual
paths in ATM networks. In Proc. IEEE ICC, pages 17281732, 1998.
[38] M. Kahani and H. W. P. Beadle. Decentralized approaches for network management.
Computer Communications Review, 27(3):3647, 1997.
[39] J.S. Kaufman. Blocking in a shared resource environment. IEEE Trans. Communi-
cations, 29(10):14741481, 1981.
[40] R. Kawamura, H. Hadama, K.-I. Sato, and I. Tokizawa. Fast VP-bandwidth man-
agement with distributed control in ATM networks. IEICE Trans. Communications,
E77-B(1):514, 1994.
[41] F.P. Kelly. Blocking probabilities in large circuit-switched networks. Advances in
Applied Probability, 18:473505, 1986.
[42] F.P. Kelly. Fixed point models of loss networks. J. Austr. Math Society, Ser.B,
31:204218, 1989.
[43] F.P. Kelly. Eective bandwidths at multi-class queues. Queueing Systems, 9:516,
1991.
[44] S. Kheradpir, A. Gersht, A. Shulman, and W. Stinson. Trac management and
control in SONET networks. In C.A. Siller and M. Sha, editors, SONET/SDH: A
Sourcebook of Synchronous Networking, pages 235241. IEEE Press, 1996.
Les Cahiers du GERAD G9851 Revised 33
[45] S.-B. Kim. An optimal establishment of virtual path connections for ATM networks.
In Proc. IEEE Infocom, pages 7279, 1995.
[46] J.F.P. Labourdette and G.W. Hart. Blocking probabilities in multitrac loss systems:
Insensitivity, asymptotic behavior, and approximations. IEEE Trans. Communica-
tions, 40(8):13551366, 1992.
[47] S.-O. Larsson and A. Arvidsson. A comparison between dierent approaches for VPC
bandwidth management. In Proc. 5th IFIP Workshop on ATM Networks, 1997.
[48] S.-O. Larsson and A. Arvidsson. Performance evaluation of a local approach for VPC
capacity management. IEICE Trans. Communications, E81-B(5):870876, May 1998.
[49] A.A. Lazar, A. Orda, and D.E. Pendarakis. Virtual path bandwidth allocation in
multiuser networks. IEEE/ACM Trans. Networking, 5(6):861871, 1997.
[50] M.-J. Lee and J.R. Yee. A design algorithm for recongurable ATM networks. In
Proc. IEEE Infocom, pages 144151, 1993.
[51] Y.-D. Lin, W.-J. Su, and C.-C. Lo. Virtual path management in ATM networks. In
Proc. IEEE ICC, pages 642646, 1996.
[52] K. Lindberger. Dimensioning and design methods for integrated atm networks. In
Proc. 14th ITC, pages 897906, 1994.
[53] E. Livermore, R.P. Skillen, M. Beshai, and M. Wernik. Architecture and control of
an adaptive high-capacity at network. IEEE Communications Mag., 36(5):106112,
May 1998.
[54] M. Logothetis and S. Shioda. Centralized virtual path bandwidth allocation scheme
for ATM networks. IEICE Trans. Communications, E75-B(10):10711080, October
1992.
[55] J. Lubacz, M. Pi oro, A. Tomaszewski, and D. Bursztynowski. Generic architechture
and core network design. In J. Roberts, U. Mocci, and J. Virtamo, editors, Broadband
Network Teletrac: Performance Evaluation and Design of Broadband Multiservice
Networks, COST 242 nal report, pages 235252. Springer, 1996.
[56] D. Mehdi. A unied approach to network survivability for teletrac networks: Models,
algorithms and analysis. IEEE Trans. Communications, 42(2-4):534548, 1994.
[57] D. Mehdi. Models for network design, servicing and monitoring of ATM networks
based on the virtual path concept. Computer Networks and ISDN Systems, 29(3):373
386, February 1997.
[58] D. Mehdi and S. Guptan. Network dimensioning and performance of multi-service
multi-rate loss networks with dynamic routing. IEEE/ACM Trans. Networking, 5:944
957, 1997.
[59] D. Mehdi and C.-T. LU. Dimensioning and computational results for wide-area broad-
band networks with two-level dynamic routing. IEICE Trans. Communications, E80-
B(2):273280, 1997.
Les Cahiers du GERAD G9851 Revised 34
[60] D. Mitra, J.A. Morrisson, and K.G. Ramakrishnan. ATM network design and op-
timization: A multirate loss network framework. IEEE/ACM Trans. Networking,
4:531543, 1996.
[61] J.A.S. Monteiro and M. Gerla. Bandwidth allocation in ATM networks. Annals of
Operations Research, 49:2550, 1994.
[62] J.A.S. Monteiro, M. Gerla, and L. Fratta. Statistical multiplexing in ATM networks.
Performance Evaluation, 12(3):157167, 1991.
[63] J. Murphy and T. Curran. Optimising embedded ATM networks. In IEE Tenth UK
Teletrac Symposium, 1993.
[64] S. Ohta and K.-I. Sato. Dynamic bandwidth control of the virtual path in an ATM
network. IEEE Trans. Communications, 40(7):12391247, 1992.
[65] E. Oki and N. Yamanaka. An optimum logical ATM network design method guar-
anteeing multimedia QoS requirements. In Proc. IEEE Globecom, pages 263269,
1995.
[66] A. Orda, G. Pacici, and D.E. Pendarakis. An adaptive virtual path allocation policy
for broadband networks. In Proc. IEEE Infocom, pages 329335, 1996.
[67] D.E. Pendarakis. On the Trade-o Between Transport and Signaling in Broadband
Networks. PhD thesis, Dep. of Electrical Engineering, Columbia University, New
York, 1996.
[68] M. Ritter and P. Tran-Gia. Equivalent bandwidth estimations for VBR calls. In
U. Mocci J. Roberts and J. Virtamo, editors, Broadband Network Teletrac: Perfor-
mance Evaluation and Design of Broadband Multiservice Networks, COST 242 nal
report. Springer, 1996.
[69] J. Roberts, U. Mocci, and J. Virtamo, editors. Broadband Network Teletrac: Perfor-
mance Evaluation and Design of Broadband Multiservice Networks, COST 242 nal
report. Springer, 1996.
[70] J.W. Roberts. A service system with heterogeneous user requirements. In G. Pujolle,
editor, Performance of Data Communication Systems and the Applications, pages
423431. North Holland Publishing Co., 1981.
[71] J.W. Roberts. Teletrac models for the telecom 1 integrated services network. In
Proc. 10th ITC, 1983.
[72] E. Rosen, A. Viswanthan, and R. Callon. Multiprotocol label switch-
ing architecture, ietf draft-ietf-mpls-arch-04.txt. Internet Draft, available at
www.crt.umontreal.ca/bruni/archive/, February 1999.
[73] K.W. Ross. Multiservice Loss Models for Broadband Telecommunication Networks.
Telcommunication Networks and Computer Systems. Springer, 1995.
[74] H. Saito. Dynamic resource allocation in ATM networks. IEEE Communications
Magazine, 35(5):146153, May 1997.
[75] H. Saito, S.-I. Nakagawa, Y. Sato, and S. Ohta. Innovation of circuit/path operations
in ATM networks: Self-sizing network. NTT Review, 8(1):5565, 1996.
Les Cahiers du GERAD G9851 Revised 35
[76] B. Sans o, A. Girard, and F. Mobiot. An integrated model for reliability and synthesis
of multi-rate and ATM networks with SVC connections. Cahier du GERAD G-99-35,
August 1999, revised June 2000.
[77] B. Sans` o, F. Soumis, and M. Gendreau. On the evaluation of telecommunications
network reliability using routing models. IEEE Trans. Communications, 39(10):1494
1501, October 1991.
[78] K.-I. Sato, S. Ohta, and I. Tokizawa. Broadband ATM network architecture based on
virtual paths. IEEE Trans. Communications, 38(8):12121222, 1990.
[79] A.S. Sethi. A model for virtual tree bandwidth allocation in ATM networks. In Proc.
IEEE Infocom, pages 12221229, 1995.
[80] S. Shioda. Evaluating the performance of virtual path bandwidth control in ATM
networks. IEICE Trans. Communications, E77-B(10):11751187, 1994.
[81] S. Shioda, H. Saito, and H. Yokoi. Sizing and provisioning for physical and virtual path
networks using self-sizing capability. IEICE Trans. Communications, E80-B(2):252
262, 1997.
[82] S. Shioda and H. Uose. Virtual path bandwidth control method for ATM networks:
Successive modication method. IEICE Trans. Communications, E74-B(12):4061
4068, 1991.
[83] R. Siebenhaar. Optimized ATM virtual path bandwidth management under fairness
constraints. In Proc. IEEE Globecom, pages 924928, 1994.
[84] R. Siebenhaar. Multiservice call blocking approximations for virtual path based ATM
networks with CBR and VBR trac. In Proc. IEEE Infocom, pages 321329, 1995.
[85] C.-F. Su and G. de Veciana. On statistical multiplexing, trac mixes and VP man-
agement. In Proc. IEEE Infocom, pages 643650, 1998.
[86] X. Sun and A. Girard. A fast numerical algorithm for multi-rate network synthesis.
Telecommunication Systems, 10(3,4):355388, 1998.
[87] K.-S. Tang, K.-T. Ko, K.F. Man, and S. Kwong. Topology design and bandwidth al-
location of embedded ATM networks using genetic algorithm. IEEE Communications
Letters, 2(6):171172, June 1998.
[88] D.H.K. Tsang and J.H.S. Chan. A simulation study of VP bandwidth allocation for
heterogeneous trac in ATM networks. Society of Computer Simulation, 70(1):718,
1998.
[89] B. Wolfgang. Optimal routing in connection-oriented data networks. European Trans.
Telecommunications, 6(4):481493, 1995.
[90] J.-L. C. Wu, L.-D. Chou, and S.-J. Tzeng. Virtual paths with dynamic step sizes in
ATM networks. In Proc. IEEE Globecom, pages 21462150, 1995.
[91] J. Yan. Adaptive conguration of elastic high-speed multiclass networks. Commmu-
nications Magazine Magazine, 36(5):116120, 1998.

You might also like