On the design of performance-constrained survivable networks

Kris T. Newport, Pramod Kumar Varshney

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

The authors describe a network design algorithm that combines standard traffic flow analysis with previously ignored topological survivability considerations. The proposed approach uses a version of the cut-saturation algorithm modified to include considerations for survivability in the process of adding and deleting link resources to meet specified throughput goals. This approach improves on the original design process, which made decisions on which link should be added or deleted solely on the basis of link use and link cost. Link distance was used for link cost when all links had the same capacity. Survivability considerations were directly introduced into the design process by using the information provided by the ND (node decomposition) and LT (link tree) indexes to indicate which links to add or delete. Considerations of the LT and ND indexes, along with link use and link cost (i.e., distance), result in network designs that meet performance requirements, tend to minimize total link distance, and are survivable.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE Military Communications Conference
Editors Anon
PublisherIEEE Computer Society
Pages663-670
Number of pages8
Volume3
StatePublished - 1989
Externally publishedYes
EventIEEE Military Communications Conference - MILCOM '89. Part 1 - Boston, MA, USA
Duration: Oct 15 1989Oct 18 1989

Other

OtherIEEE Military Communications Conference - MILCOM '89. Part 1
CityBoston, MA, USA
Period10/15/8910/18/89

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'On the design of performance-constrained survivable networks'. Together they form a unique fingerprint.

  • Cite this

    Newport, K. T., & Varshney, P. K. (1989). On the design of performance-constrained survivable networks. In Anon (Ed.), Proceedings - IEEE Military Communications Conference (Vol. 3, pp. 663-670). IEEE Computer Society.