Ajou University repository

Linear programming based heuristic algorithms for tunnel assignment and reconfiguration in MPLS networks: Linear programming based heuristic algorithms for tunnel assignment and reconfiguration..: S. Joung et al.
  • Joung, Seulgi ;
  • Ryu, Jaehyeon ;
  • Kwon, Sun Hyeon ;
  • Shin, Jongyoon ;
  • Park, Sungsoo
Citations

SCOPUS

0

Citation Export

Publication Year
2024-12-01
Publisher
Springer
Citation
Telecommunication Systems, Vol.87, pp.991-1013
Keyword
Bandwidth packing problemHeuristicInteger programmingLinear programmingMulti-protocol label switching
Mesh Keyword
Bandwidth packing problemHeuristicHeuristics algorithmInteger Program- mingLabel switchingLinear programming based heuristicsLinear-programmingMulti-protocol label-switching networkMultiprotocolsPacking problems
All Science Classification Codes (ASJC)
Electrical and Electronic Engineering
Abstract
Multi-Protocol Label Switching (MPLS) sets up a connecting tunnel for each origin–destination pair of traffic demands to send data packets over Internet Protocol (IP) networks. We should assign each tunnel to one of the available candidate paths to achieve efficient use of the network and avoid congestion. Additionally, we need to update the bandwidths and routing of the tunnels efficiently in short periods of time to accommodate fluctuating traffic demands, which we refer to as the reconfiguration problem. In this paper, we propose formulations and linear programming-based heuristic algorithms for the tunnel assignment and reconfiguration problems arising in MPLS networks. First, we propose a formulation and algorithms for the tunnel assignment problem, considering realistic constraints such as port limitations and priority queue capacity restrictions. Our model incorporates unidirectional, bidirectional, protected, and unprotected tunnel cases altogether. Then, we present a heuristic algorithm to obtain a schedule for changing the bandwidths and routing of tunnels from the current configuration to a target configuration quickly while adhering to network capacity constraints. We report computational results using some random data from the real-life telecommunication network of the Republic of Korea.
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/34518
DOI
https://doi.org/10.1007/s11235-024-01217-3
Fulltext

Type
Article
Funding
S.Joung was supported by Institute of Information & communications Technology Planning & Evaluation (IITP) under the Artificial Intelligence Convergence Innovation Human Resources Development (IITP-2024-RS-2023-00255968) grant funded by the Korea government(MSIT).
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Joung, Seulgi  Image
Joung, Seulgi 정슬기
Department of Industrial Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.