Path generation issues for survivable network design

Michal Pioro, Tomasz Śliwiński, Michal Zagożdżon, Mateusz Dzida, Włodzimierz Ogryczak

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

Link dimensioning and routing problems in resilient network design are considered. Reliable network operation is ensured by means of flow restoration which is performed on preselected protection (backup) paths that can absorb traffic overflows from failed primary paths. Backup and primary flows use separated link capacities, and can be split among many paths. In the paper, two restoration models are considered. The first model assumes that once the backup path is assigned it must be used in every state in which the protected primary path fails while the second model allows different protection paths to be used in different network failure states. The problems are formulated as multiple commodity linear programming (LP) models using the link-path (L-P) notation and solved by the column generation technique. Consequent pricing models and algorithms are introduced. Computational efficiency of the presented approaches is analyzed.
The research was partially supported by the Dean’s grant from the Faculty of Electronics and Information Technology, Warsaw University of Technology.
Original languageEnglish
Title of host publicationComputational Science and Its Applications /Lecture Notes in Computer Science
PublisherSpringer
Pages820-835
Volume5073
ISBN (Print)978-3-540-69840-1
DOIs
Publication statusPublished - 2008
EventICCSA 2008 - Perugia, Italy
Duration: 2008 Jun 302008 Jul 3

Publication series

Name
Volume5073
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceICCSA 2008
Country/TerritoryItaly
CityPerugia
Period2008/06/302008/07/03

Subject classification (UKÄ)

  • Electrical Engineering, Electronic Engineering, Information Engineering

Fingerprint

Dive into the research topics of 'Path generation issues for survivable network design'. Together they form a unique fingerprint.

Cite this