Skip to main content

Abstract

We develop a method to determine the topology of a network that interconnects a number of token rings using source routing bridges. The purpose is to compute a topology that provides low response delays for network users at a minimal cost of bridge installations. We formulate this network design problem as a mixed binary integer linear program. We develop effective heuristic algorithms. The algorithms exploit the topology and routing solutions of the linear programming relaxation in a sophisticated manner which we believe is new in the literature. The model incorporates performance issues, such as network stability, bridge overflow, back pressure effect and broadcast storm, that are specific to the underlying communication technology. By formally incorporating these performance issues, we tighten the model formulation and improve the quality of the LP bound considerably. Computational results are reported for problems with up to 20 token rings and 190 potential bridge locations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • ASTRAL (Alliance for Strategic Token Ring Advancement and Leadership). (1996). “An Educational Guide to Token Ring.” (http://www.astral.org/astralwp.html).

    Google Scholar 

  • Boisson, N., O. Strilka, and A. Sutter. (1994). “A Simulated Annealing Algorithm for LANs Interconnection Networks Design.” In Proc. 2nd Int’l Conf. Telecom. Syst.,Vanderbilt Univ., Nashville, TN.

    Google Scholar 

  • Bux, W. (1985). “Performance Issues.” In G. Goos and J. Hartmanis (eds.), Lecture Notes in Computer Science 184: Local Area Networks: An Advanced Course. Berlin, Germany: Springer-Verlag, pp. 108–161.

    Google Scholar 

  • Bux, W. and D. Grillo. (1985). “Flow Control in Local Area Networks of Interconnected Token Rings,” IEEE Trans. Commun. 33, 1058–1065.

    Article  Google Scholar 

  • Clarke, L.W. and G. Anandalingam. (1995). “A Bootstrap Heuristic for Designing Minimum Cost Survivable Networks,” Computers and Operations Research 22, 921–934.

    Article  Google Scholar 

  • Ersoy, C. and S.S. Panwar. (1993). “Topological Design of Interconnected LAN/MAN Networks,” IEEE J. Select. Areas Commun. 11, 1172–1182.

    Article  Google Scholar 

  • Fetterolf, P.C. and G. Anandalingam. (1991). “Optimizing Interconnection of Local Area Networks: An Approach Using Simulated Annealing,” ORSA J. Computing 3, 275–287.

    Article  Google Scholar 

  • Fetterolf, P.C. and G. Anandalingam. (1992a). “A Lagrangian Relaxation Technique for Optimizing Interconnection of Local Area Networks,” Operations Res. 40, 678–688.

    Article  Google Scholar 

  • Fetterolf, P.C. and G. Anandalingam. (1992b). “Optimal Design of LAN-WAN Internetworks: An Approach Using Simulated Annealing,” Annals Operations Res. 36, 275–298.

    Article  Google Scholar 

  • Fratta, L., M. Gerla, and L. Kleinrock. (1973). “The Flow Deviation Method: Approach to Store-and Forward Computer Communication Network Design,” Networks 3, 97–133.

    Article  Google Scholar 

  • Gerla, M. and L. Kleinrock. (1988). “Congestion Control in Interconnected LANs,” IEEE Network 2, 72–76. Gondran, M. and M. Minoux. (1988). Graphs and Algorithms. New York: Wiley.

    Google Scholar 

  • Gupta, S. and K.W. Ross. (1991). “Performance Modeling and Optimization of Networks of Bridged LANs,” Queueing Syst. 9, 113–132.

    Article  Google Scholar 

  • IBM. (1991). Optimization Subroutine Library: Guide and Reference. Release 2

    Google Scholar 

  • Kingston, NY. IEEE. (1998). IEEE 802.5 Documents. (http://p8025.york.microvitec.co.uk/802.5/documents/).

    Google Scholar 

  • Information Handling Services. (1993). Vendor Master Directory and Vendor Catalogs on CD-ROM. Englewood, CO.

    Google Scholar 

  • Kaefer, F. (1995). “Algorithms for Designing Survivable LAN-Interconnection Networks Using Transparent Bridges.” Ph.D. Thesis, Univ. of Iowa, Iowa City, IA.

    Google Scholar 

  • Kaefer, F. and J.S. Park. (1995). “A Method for Interconnecting LANs with Survivability Considerations” In Proc. 3rd Int’l Conf. Telecom. Syst.,Vanderbilt Univ., Nashville, TN.

    Google Scholar 

  • Kaefer, F. and J.S. Park. (1998). “Interconnecting LANs and a FDDI Backbone Using Transparent Bridges: A Model and Solution Algorithms,” INFORMS J. Computing 10, 25–39.

    Article  Google Scholar 

  • LeBlanc, L., J.S. Park, V. Sridhar, and J. Kalvenes. (1996). “Topology Design and Bridge-Capacity Assignment for Interconnecting Token Ring LANs: A Simulated Annealing Approach,” Telecom. Syst. 6, 21–43.

    Article  Google Scholar 

  • Lee, F.C.Y., G. Anandalingam, and L. Clarke. (1995). “Design of Survivable LAN-LAN Internetworks with a Hierarchical Topology.” Working Paper 94–20

    Google Scholar 

  • Dept. of Sys. Eng., Univ. of Pennsylvania, Philadelphia, PA. Love, R.D. and J.J. Lynch. (1997). “Token Ring Migration: A White Paper.” IBM Networking Hardware Division, Research Triangle Park, NC. ( http://www.hstra.com/articles.html ).

    Google Scholar 

  • Magnanti, T.L., P. Mirchandani, and R. Vachani. (1995). “Modeling and Solving the Two Facility Capacitated Network Loading Problem,” Operations Res. 43, 142–157.

    Article  Google Scholar 

  • Monma, C.L. and D.F. Shallcross. (1989). “Methods for Designing Communications Networks with Certain Two-Connected Survivability Constraints,” Operations Research. 37, 531–541.

    Article  Google Scholar 

  • Nishida, T., M. Murata, H. Miyahara, and K. Takashima. (1986). “Congestion Control in Interconnected Local Area Networks.” In R.L. Pickholtz (ed.), Local Area and Multiple Access Networks. Rockville, MD: Computer Science Press, pp. 107–136.

    Google Scholar 

  • Padberg, M.W., T.J. Van Roy, and L.A. Wolsey. (1985). “Valid Linear Inequalities for Fixed Charge Problems,” Operations Res. 33, 842–861.

    Article  Google Scholar 

  • Park, J.S., R. Bartoszynski, and W.A. Rosenkrantz. (1995). “Stability of p-Persistent CSMA/CD” ORSA J. Computing7, 149–159.

    Google Scholar 

  • Park, J.S., and K. Kang. (1993). “Delay Analysis of Multidimensional Queuing Process in CSMA/CD Local Area Networks,” Telecom. Syst. 1, 217–242.

    Article  Google Scholar 

  • Park, J.S., L. LeBlanc, and B.H. Lim. (1996). “Interconnecting Remote LANs Using SMDS: A Model and solution algorithms.” In Proc. 4th In’l Conf. Telecom. Syst. Nashville, TN.

    Google Scholar 

  • Perlman, R. (1992) Interconnections: Bridges and Routers. Reading, MA: Addison-Wesley.

    Google Scholar 

  • Soha, M. and R. Perlman. (1988). “Comparison of Two LAN Bridge Approaches,” IEEE Network 2, 72–76. Sridhar, V. (1994). “Optimal Design of Interconnected Local Area Networks.” Ph.D. Dissertation, Univ. of Iowa, Iowa City, IA.

    Google Scholar 

  • Sridhar, V., B. Gavish, and J.S. Park. (1995). “Reliable Interconnection of LANs Using Source Routing Bridges:’ In Proc. 3rd ORSA Telecom. Conf.,Boca Raton, FL.

    Google Scholar 

  • Taylor, M. (1997). “High Speed Token Ring: A Technology White Paper.” Madge Networks, San Jose, CA, ( http://www.hstra.com/articles.html ).

    Google Scholar 

  • Valiant, L.G. (1979). “The Complexity of Enumeration and Reliability Problems,” SIAM J. Computing 8, 410–421. Wolsey, L.A. (1989). “Strong Formulation for Mixed Integer Programming: A Survey,” Math. Programming 45, 173–191.

    Google Scholar 

  • Yen, J.Y. (1971). “Finding the k Shortest Loopless Paths in a Network,” Management Sci. 17, 712–716.

    Google Scholar 

  • Ziff-Davis Publishing. (1993). Data Sources—the Complete Computer Product Book: Hardware and Data Communications Volume. New York, NY.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer Science+Business Media New York

About this chapter

Cite this chapter

Sridhar, V., Park, J.S., Gavish, B. (2000). LP-Based Heuristic Algorithms for Interconnecting Token Rings via Source Routing Bridges. In: Doverspike, R., Saniee, I. (eds) Heuristic Approaches for Telecommunications Network Management, Planning and Expansion. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-5392-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-1-4757-5392-9_8

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-4970-7

  • Online ISBN: 978-1-4757-5392-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics