Skip to main content
Log in

Mathematical programming approaches for dual multicast routing problem with multilayer risk cost

  • Published:
Annals of Operations Research Aims and scope Submit manuscript

Abstract

This paper addresses a dual multicast routing problem with shared risk link group (SRLG) diverse costs (DMR-SRLGD) that arises from large-scale distribution of realtime multicast data (e.g., internet protocol TV, videocasting, online games, stock price update). The goal of this problem is to find two redundant multicast trees, each from one of the two sources to every destination at a minimum cost. The cost of the problem contains two parts: the multicast routing cost and the shard common risk cost. Such common risk could cause the failures of multiple links simultaneously. Therefore, the DMR-SRLGD ensures the availability and reliability of multicast service. We formulate an edge-based model for the DMR-SRLGD. In addition, we also propose a path-based model that rises from the Dantzig-Wolfe decomposition of the edge-based model, and develop a column-generation framework to solve the linear relaxation of the path-based formulation. We then employ a branch-and-price solution method to find integer solutions to DMR-SRLGD. We also extend both edge-based and path-based models to handle the complex quality of service requirements. The computational results show the edge-based model is superior than the path-based model for the easy and small test instances, whereas the path-based model provides better solutions in a timely fashion for hard or large test instances.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Ahuja, R. K., Magnati, T. L., & Orlin, J. B. (1993). Network flows: theory, algorithms and applications. New York: Prentice Hall.

    Google Scholar 

  • Banerjee, S., Bhattacharjee, B., & Kommareddy, C. (2002). Scalable application layer multicast. In SIGCOMM’02: proc. of the 2002 conference on applications, technologies, architectures, and protocols for computer communications (pp. 205–217).

    Chapter  Google Scholar 

  • Beasley, J. E. (1990). Or-library: distributing test problems by electronic mail. http://people.brunel.ac.uk/~mastjjb/jeb/orlib/steininfo.html.

  • Bhandari, R. (1999). Survivable networks: algorithms for diverse routing. Norwell: Kluwer Academic.

    Google Scholar 

  • Buriol, L. S., Resende, M. G. C., Ribeiro, C. C., & Thorup, M. (2005). A hybrid genetic algorithm for the weight setting problem in OSPF/IS-IS routing. Networks, 46(1), 36–56.

    Article  Google Scholar 

  • Buriol, L. S., Resende, M. G. C., & Thorup, M. (2007). Survivable IP network design with OSPF routing. Networks, 49(1), 51–64.

    Article  Google Scholar 

  • Cha, M., Chaovalitwongse, W. A., Moon, S., Shaikh, A., & Yates, J. (2006). Path protection routing with SRLG constraints to support IPTV in WDM mesh networks. In Proceedings of IEEE Global Internet Symposium.

    Google Scholar 

  • Cha, M., Chaovalitwongse, W. A., Yates, J., Shaikh, A., & Moon, S. (2009). Efficient and scalable provisioning of always-on multicast streaming services. Computer Networks, 53(16), 2825–2839.

    Article  Google Scholar 

  • Chu, Y., Rao, S. G., Seshan, S., & Zhang, H. (2001). Enabling conferencing applications on the Internet using an overlay multicast architecture. In SIGCOMM’01: proc. of the 2001 conference on applications, technologies, architectures, and protocols for computer communications (pp. 55–67).

    Chapter  Google Scholar 

  • Datta, P., & Somani, A. K. (2004). Diverse routing for shared risk resource groups (SRRG) failures in WDM optical networks. In Proc. of the first international conference on broadband networks (BROADNETS) (pp. 120–129).

    Chapter  Google Scholar 

  • Desrocsiers, J., Soumis, F., & Desrochers, M. (1984). Routing with time windows by column generation. Networks, 14, 545–565.

    Article  Google Scholar 

  • Ellinas, G., Bouillet, E., Ramamurthy, R., Labourdette, J., Chaudhuri, S., & Bala, K. (2003). Routing and restoration architectures in mesh optical networks. Optical Networks Magazine, 4(1), 91–105.

    Google Scholar 

  • Garey, M. R., & Johnson, D. S. (1979). Computers and intractability: a guide to the theory of NP-completeness. New York: Freeman.

    Google Scholar 

  • Gautam, N. (2002). Buffered and unbuffered leaky bucket policing: guaranteeing QoS, design and admission control. Telecommunications Systems, 21(1), 35–63.

    Article  Google Scholar 

  • Grover, W. D. (2003). Mesh-based survivable networks. New York: Prentice Hall.

    Google Scholar 

  • Guo, L., Yu, H., & Li, L. (2005). A new shared-path protection algorithm under shared risk link group constraints for survivable WDM mesh networks. Optics Communications, 246, 285–295.

    Article  Google Scholar 

  • Hu, J. Q. (2003). Diverse routing in mesh optical networks. IEEE Transactions on Communications, 51(3), 489–494.

    Article  Google Scholar 

  • Irava, V. S., & Hauser, C. (2005). Survivable low-cost low-delay multicast trees. In Proc. of global telecommunications conference, GLOBECOM’05, 2005 (pp. 109–115).

    Google Scholar 

  • Koch, T., Martin, A., & Voss, S. (2001). SteinLib: an updated library on Steiner tree problems in graphs. In X. Cheng & D.-Z. Zhu (Eds.), Steiner trees in industries (pp. 285–326). Berlin: Springer.

    Chapter  Google Scholar 

  • Lewis, J. M. (1978). On the complexity of the maximum subgraph problem. In Proc. 10th annu. ACM symp. theory of computing (pp. 265–274).

    Google Scholar 

  • Li, G., Doverspike, R., & Kalmanek, C. (2001). Fiber span failure protection in mesh optical networks. In Society of photo-optical instrumentation engineers (SPIE) conference series (Vol. 4599, pp. 130–141).

    Google Scholar 

  • Liang, Z., & Chaovalitwongse, W. A. (2010). Bounds of redundant multicast routing problem with SRLG-diverse constraints: edge, path and tree models. Journal of Global Optimization, 38(2), 335–345.

    Article  Google Scholar 

  • Liang, Z., Chaovalitwongse, W. A., Cha, M., & Moon, S. (2010). Redundant multicast routing in multilayer networks with shared risk resource groups: complexity, models and algorithms. Computers & Operations Research, 37(10), 1731–1739.

    Article  Google Scholar 

  • Lubbecke, M. E., & Mesrosiers, J. (2005). Selected topics in column generation. Operations Research, 53(6), 1007–1023.

    Article  Google Scholar 

  • Medard, M., Finn, S. G., & Barry, R. A. (1999). Redundant trees for preplanned recovery in arbitrary vertex-redundant or edge-redundant graphs. IEEE/ACM Transactions on Networking, 7(5), 641–652.

    Article  Google Scholar 

  • Oliveira, C. A. S., & Pardalos, P. M. (2005a). A survey of combinatorial optimization problems in multicast routing. Computers & Operations Research, 32(8), 1953–1981.

    Article  Google Scholar 

  • Oliveira, C. A. S., & Pardalos, P. M. (2005b). Construction algorithms and approximation bounds for the streaming cache placement problems in multicast networks. Cybernetics and Systems Analysis, 41(6), 898–908.

    Article  Google Scholar 

  • Oliveira, C. A. S., Pardalos, P. M., & Querido, T. M. (2005). A combinatorial algorithm for message scheduling on controller area networks. International Journal of Operations Research, 1(2), 160–171.

    Article  Google Scholar 

  • Oliveira, C. A. S., Pardalos, P. M., & Resende, M. G. C. (2006). Optimization problems in multicast tree construction. In M. G. C. Resende & P. M. Pardalos (Eds.), Handbook of optimization in telecommunications (pp. 701–731). Berlin: Springer.

    Chapter  Google Scholar 

  • Pardalos, P., & Khoury, B. (1996). A heuristic for the steiner problem on graphs. Computational Optimization and Applications, 6, 5–14.

    Article  Google Scholar 

  • Paul, P., & Raghavan, S. V. (2002). Survey of multicast routing algorithms and protocols. In Proc. of the fifteenth international conference on computer communication (ICCC 2002) (pp. 902–926).

    Google Scholar 

  • Ramamurthy, S., Sahasrabuddhe, L., & Mukherjee, B. (2003). Survivable WDM mesh networks. Journal of Lightwave Technology, 21(4), 870–883.

    Article  Google Scholar 

  • Ramaswami, R., & Sivarajan, K. (1998). Optical networks: a practical perspective. San Mateo: Morgan Kaufmann.

    Google Scholar 

  • Resende, M. G. C., & Pardalos, P. M. (2006). Handbook of optimization in telecommunications. Berlin: Springer.

    Book  Google Scholar 

  • Rosen, E., Viswanathan, A., & Callon, R. (2001). Multiprotocol label switching architecture. IETF, RFC 3031 [Online]. Available: http://tools.ietf.org/html/rfc3031.html.

  • Rosseti, I., de Aragao, M. P., Ribeiro, C. C., Uchoa, E., & Werneck, R. F. (2001). New benchmark instances for the Steiner problem in graphs. In Proc. 4th metaheuristics international conference (pp. 557–591).

    Google Scholar 

  • Ryan, D., & Foster, B. (1981). An integer programming approach to scheduling. In A. Wren (Ed.), Computer schedule of public transport urban passenger vehicle and crew scheduling (pp. 269–280). Amsterdam: Elsevier

    Google Scholar 

  • Sahasrabuddhe, L., Ramamurthy, S., & Mukherjee, B. (2002). Fault management in IP-over-WDM networks: WDM protection versus IP restoration. IEEE Journal on Selected Areas in Communications, 20(1), 21–33.

    Article  Google Scholar 

  • Shen, L., Yang, X., & Ramanurthy, B. (2005). Shared risk link group (SRLG)-diverse path provisioning under hybrid service level agreements in wavelength-routed optical mesh networks. IEEE/ACM Transactions on Networking, 13(4), 918–931.

    Article  Google Scholar 

  • Sheridan-Smith, N., Leaney, J., O’Neill, T., & Hunter, M. (2005). A policy-driven autonomous system for evolutive and adaptive management of complex services and networks. In Proceedings of the 12th IEEE international conference and workshops on the engineering of computer-based systems (pp. 389–397).

    Google Scholar 

  • Vanderbeck, F. (2005). Implementing mixed integer column generation. In G. Desaulniers, J. Desrosiers, & M. M. Solomon (Eds.), Column generation (pp. 331–358). Berlin: Springer.

    Chapter  Google Scholar 

  • Wolsey, L. (1998). Integer programming. New York: Wiley.

    Google Scholar 

  • Xin, Y., & Rouskas, G. N. (2004). Multicast routing under optical layer constraints. In INFOCOM 2004. Twenty-third annual joint conference of the IEEE computer and communications societies (Vol. 4, pp. 2731–2742).

    Google Scholar 

  • Yannakakis, M. (1978). Node- and edge-deletion NP-complete problems. In Proc. 10th annu. ACM symp. theory of computing (pp. 253–264).

    Google Scholar 

  • Yuan, S., & Jue, J. P. (2005). Dynamic lightpath protection in WDM mesh networks under wavelength-continuity and risk-disjoint constraints. Computer Networks, 48, 91–112.

    Article  Google Scholar 

  • Zang, H., Ou, C., & Mukherjee, B. (2003). Path-protection routing and wavelength assignment (RWA) in WDM mesh networks under duct-layer constraints. IEEE/ACM Transactions on Networking, 11(2), 248–258.

    Article  Google Scholar 

Download references

Acknowledgements

The first author is supported by the National Science Foundation of China [Grant 71201003], and the New Teachers’ Fund for Doctor Stations, Ministry of Education, China [Grant 20120001120113].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to W. Art Chaovalitwongse.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liang, Z., Lee, C. & Chaovalitwongse, W.A. Mathematical programming approaches for dual multicast routing problem with multilayer risk cost. Ann Oper Res 203, 101–118 (2013). https://doi.org/10.1007/s10479-013-1317-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10479-013-1317-4

Keywords

Navigation