Download
Download
net/publication/220640835
CITATIONS READS
59 537
2 authors:
All content following this page was uploaded by Cem Ersoy on 31 May 2014.
Topological Design of
Interconnected LAN/MAN Networks
Cem Ersoy, Member, IEEE, and Shivendra S. Panwar, Member, IEEE
L**
standard LAN’s interconnected by transparent bridges. These
bridges are required to form a spanning tree topology. We
propose a simulated annealing-based algorithm for designing
minimum delay spanning tree topologies. In order to measure
the quality of the solutions, we find a lower bound for the LAN
average network delay. We extend the algorithm to design the
0 LAN-LAN Bridge
overall LAN/MAN topology consisting of a MAN or high-speed
data service interconnecting several clusters of bridged LAN’s. la] LAN-MAN Bridge
Comparison with the lower bound and several other goodness
measures show that the solutions are not very far from the global Fig. 1. An example LAN/MAN topology.
minimum.
spanning tree bridges cannot be used to allow all source
I. INTRODUCTION destination pairs to use the best path that exists between them
L OCAL area networks (LAN’s) have become an indis- in the physical topology. However, some degree of flexibility
pensable part of the modem working environment. Wide- is available since network management can be used to force the
spread applications using LAN’s and a continuously growing shape of this deterministic logical topology to be any spanning
number of users have created a necessity for the interconnec- tree. The performance of bridged LAN’s has been studied
tion of LAN’s. Bridges, routers, and gateways are different in [3]-[5]. The problem of determining which gateways to
interconnection devices used to overcome the geographical use to interconnect existing data networks has been discussed
and capacity limitations of LAN’s. Among these, bridges in [6]. A simulated annealing technique has been used for
are the simplest since they operate at the two lowest layers designing minimum-cost interconnected CSMA/CD LAN’s in
of the Open Systems Interconnection (0%)model, namely [7]. The design of optimally locating bridges and repeaters for
the link and physical layers. Different types of bridges are minimizing the average delay and fast algorithms for special
used for interconnecting various types of LAN’s. We consider cases have been studied in [8].
transparent bridges which are widely used for interconnecting There is a growing interest in the interconnection of ge-
CSMA/CD LAN’s and other IEEE 802 standard LAN’s [l]. ographically separated LAN’s or bridged LAN clusters by a
The major advantage of transparent bridges is that they do not backbone metropolitan area network (MAN). Fig. 1 shows
require the participation of end users in order to interconnect an example interconnected LAN/MAN network with several
LAN’s. These bridges are self-learning and self-configuring. clusters. Each cluster consists of several LAN’s interconnected
They learn and store the location of end users by observing by transparent bridges. The major reason for forming these
source addresses of data packets. They route packets by clusters is the geographical separation of LAN’s. There may
comparing the destination addresses to the table of learned also be network management or security reasons for keeping
addresses. In order to operate properly, they require the logical several LAN’s in a cluster. The overall topology has to be a
topology of bridges and LAN’s to be a spanning tree [2]. spanning tree since this is required by the bridges. Depending
Given an arbitrary physical topology, these bridges configure on the physical distances involved and the capacity required,
themselves to be part of a deterministic active spanning tree different backbone network architectures can be used for
topology. One of the main disadvantages of this is that interconnecting clusters of bridged LAN’s. Fiber Distributed
Data Interface (FDDI), which is a 100 Mb/s network based
Manuscript received June 1992; revised December 1992. This work was
supported by the New York State Science and Technology Foundation’s Center
on a token ring protocol, has already been used for the
for Advanced Technology in Telecommunications, Polytechnic University, interconnection of LAN clusters [9]. There are other promising
Brooklyn, NY and by the NSF under Grants NOR-8909719, NCR-9003006, candidates such as backbone MAN’S interconnecting LAN
and NCR-9115864. This paper was presented in part at the IEEE INFO-
COM’92, Florence, Italy, May 6-8, 1992. clusters. One of them is the IEEE 802.6 MAN standard: Dual
C. Ersoy is now with the Department of Computer Engineering, Bogazici Queue Dual Bus (DQDB), which has typical data rates ranging
University, Istanbul, Turkey. from 50 to 150 Mb/s [lo].
S. S. Panwar is with the Department of Electrical Engineering, Polytechnic
University, Brooklyn, NY. There are also proposals of broadband services such as
IEEE Log Number 9211669. Switched Multimegabit Data Service (SMDS) for intercon-
0733-8716/93$03.00 0 1993 IEEE
ERSOY AND PANWAR: TOPOLOGICAL DESIGN OF INTERCONNECTED LAN/MAN NETWORKS 1173
The problem of finding the minimum-delay spanning tree Because of the large number of topologies generated, we need
topology is formulated as described: an efficient way of approximating the average network delay;
Problem P: preferably, a closed-form delay model. We consider delays
due to LAN’s and bridges. The topology is modeled as a
network of queues. Different measurement and performance
studies have shown that LAN traffic is bursty and consists of
N N \ batches or trains of packets because of the existing protocols
[20], [21]. In order to account for the burstiness of traffic
and to have a computationally inexpensive measure, we use
subject to M X / M / l queues with batch Poisson arrivals. Although it is
simple, M X / M / 1 queueing model may achieve an acceptable
fi < p i VLANi (2) fit for the busiest periods of the network [21] and give us the
f i j < xijpij VBridgeij (3) relative performance of different topologies. Other closed-form
delay models may also be used in the algorithm. However,
where more complex delay models will increase the running times.
1, if there is a bridge We are given the mean rate for traffic requirements between
decision variables xij =
{ between LAN i and LAN j
0, otherwise.
S = set of all possible spanning trees.
each LAN pair ( t s d ) in terms of batches per second. For a
given spanning tree topology, we can find the mean batch
flow values of LAN’s and bridges A; and A i j , respectively. We
know the capacities of LAN’s, Ci (bitdsecond). We assume
The objective function is the average network delay (T) which exponential distribution for packet lengths with mean 1 and
is a combination of the queueing delays due to LAN’s (E[T;]) a geometrical distribution for the number of packets in a
and bridges (E[Tij]) as described in [16]. E[T;]is a function of batch with mean X. The mean service rate for LAN’s is
the total flow on LAN i (f;) and E[T;j]is a function of the total equal to the LAN capacity divided by the mean packet length
flow on the bridge between LAN i and LAN j (fij). y is the (pi = C;/l packets/second). The mean service rate for each
total input flow to the network. We do not consider propagation direction of the bridges is equal to p ; j (packetshecond). The
delays since LAN’s are geographically close to each other. A expected number of packets ( E [ L ] )in each queue is found
more detailed description of the delay model will be given in using the results in [22, pp. 156-1601. Using Little’s formula
Section 11-B. pi and p i j are the LAN and bridge capacities, ( E [ T ]= E [ L ] / X X )the , expected value of the delay ( E [ T ] )
respectively. Inequalities (2) and (3) are the corresponding for each M X / M / l queue is given as
LAN and bridge capacity constraints. They are also implied in
the objective function, since the delay ( T )becomes infinity if P AX
E[T]= ___ wherep = -. (4)
the flow values exceed the capacities. In order to keep the 4 1 - P) CL
problem simple, we do not consider additional constraints.
After finding the delays caused by LAN’s and bridges using
If needed, other constraints such as communication costs or
(4),the average network delay ( T ) is found by plugging
maximum utilization for LAN’s and bridges can easily be
these delay values, total flow values in terms of packets per
incorporated into the formulation.
second (f = AX), and the total input flow of the network
Problem P is a difficult combinatorial optimization problem.
t s d ) into the objective function of (1).
In fact, a simplified version of this problem, namely the (y = X
capacitated spanning tree problem, which handles queueing
delay implicitly, is NP-complete [17]. There is no efficient C . A Lower Bound on the Average Network Delay
exact algorithm for solving Problem P. The number of possible The average network delay is a combination of delays due
spanning trees for N LAN’s is equal to N N - 2 [18]. This to LAN’s and bridges TL and T B ,respectively:
makes it impractical to determine the minimum-delay topology
by exhaustive search except for very small size problems. l N
T =-xX;XE[T;]
Our experiments showed that the solution space has many Z=l
local minima and greedy local search heuristics get stuck in a
local minimum. In order to avoid this problem, we based our
search heuristic on simulated annealing since this technique
works well with problems with many local minima [19]. For
small problems, we found the global minimum with complete
enumeration. In order to check the quality of the solutions
- TB
for larger problems, we derived a lower bound for Problem P
As shown in ( 3 , the sum of the lower bounds on the delay
which is described in Section 11-C.
due to bridges and LAN’s will give us the lower bound on
T. In order to find a bound on the delay due to bridges ( T B ) ,
B . Delay Model we first find a lower bound on the total flow on all bridges
We find the average network delay for each topology gen- (A;). Then, we find the optimum distribution of this total flow
erated at every iteration of the simulated annealing algorithm. among all bridges such that TB is minimized. Similarly, we
ERSOY AND PANWAR: TOPOLOGICAL DESIGN OF INTERCONNECTED LANMAN NETWORKS 1175
find a lower bound on the total flow on all LAN's (A:). The where w:d is equal to 1 if LAN i is on P a t h s d , zero otherwise.
optimum distribution of this flow among all LAN's such that Therefore,
TL is minimized will give us the lower bound on TL. The
lower bound on T obtained by summing the lower bounds on A T = TLIA 2 (12)
TL and TB enables us to check the quality of the solutions i
found by simulated annealing and other techniques.
1 ) A Lower Bound on the Total Flow on Bridges: The total
flow on all bridges (A): is equal to the sum of all bridge flows.
The spanning tree topology with the minimum A; gives us a
lower bound. s d
s d
c(~i
N
2=1
- A,")+ = AE,rnzn -
N
2=1
P' (19)
1176
Flows
LAN
and
L
I
(I)+
LAN1
I
I I
I
*
’
4
New-Tree =
Neighbor of Current-Tree
I
New-Trec feiuible 1
Stop annealing 1
I
I
imized. We also show that if all bridges have equal capacity, ( Save the best tree so far
I.’\/
and chose one similar to the one described in [19], because of
its simplicity and efficiency. As already mentioned, the initial
value of the control parameter c, is chosen so that almost all
’ LAN
LAN-LAN Bridge
new topologies are accepted at the beginning. The function ,,Y LAN-MAN Bridge
used for decrementing the control parameter is given by
Fig. 5. An example topology with more than one L A N N A N bridge per
ck+1 = ff ‘ Ck = 0, 1,2, ’ . ’ cluster.
we can calculate the traffic matrix [ti,d]for cluster 1 as follows: minimum-delay topology for that cluster as in the first phase
but, this time, the maximum number of LAN/MAN bridges is
constrained to two. If TkAdrops below the threshold, we stop.
Otherwise, we allow the cluster to have one more LAN/MAN
bridge. We continue increasing the number of LAN/MAN
bridges until TkA drops below the threshold. We repeat this
procedure for all clusters. As a result, some of the clusters
might have one LANMAN bridge, and some of them might
have more depending on their traffic requirements.
Another approach could be using additional cost constraints
to determine the number of LAN/MAN bridges, but this
would increase the complexity of the problem and currently
1=7 high LAN/MAN bridge prices (approximately five times more
After finding the new traffic requirement matrices for each expensive than LANKAN bridges) would force us to use as
cluster, we can solve each subproblem independently. At the few bridges as possible per cluster. In many practical-size
beginning, we allow only one LAN/MAN bridge per cluster. problems, one LAN/MAN bridge per cluster is sufficient and
We use the simulated annealing algorithm as in the LANKAN the overall minimum-delay topology is found in one phase.
problem with the additional constraint that each cluster will A variation of the problem occurs in the case of using SMDS
be connected to the MAN node with only one bridge. After for interconnecting the clusters of LAN’s, since SMDS will
finding the overall topology, we calculate the maximum cluster provide communications at DS1 (1.5 Mb/s) or DS3 (45 Mb/s)
access delay TkAfor each cluster. T i Ais the maximum delay rates. During the design process, we have to decide which rate
between any LAN in cluster k and the MAN in either direction. of service and, in the case of DS3, which access class (4, 10,
The maximum end-to-end delay in the overall network will 16,34 Mb/s) will be used for each cluster. A possible approach
always be bounded by the summation of the two largest T i A can be described as follows: The total traffic between each
and the delay due to the MAN ( T M A NWe ) . assumed that the cluster and the MAN is known. At first, we choose the lowest
intercluster traffic will not have a significant impact on TMAN and cheapest rate among all SMDS access classes which is
because of the large capacity of the MAN. For example, in the sufficient to carry the cluster-MAN traffic for each cluster. We
case of SMDS as a backbone MAN, it is not very likely that find the minimum-delay cluster topologies and calculate T i A .
one group of users will change the performance of the service If it is acceptable, we stop; otherwise, if TkA is large due to
because the network management system will try to maintain a the delay on LAN/SMDS bridge, we choose the next higher
guaranteed level of performance. TMAN is, therefore, assumed SMDS access class for clusters with unacceptable T i A .We
to have a fixed value for our problem. The LAN access delay can decide whether the SMDS connection is the bottleneck
between LAN i and the MAN ( T i A )is equal to the larger or not by using a threshold on the utilization of the SMDS
of the total delay in either direction between LAN i and the line. We continue increasing the SMDS rates for each cluster
MAN ( T ~ , M A N T M A N ,The
and ~ ) . delay from LAN i to the until we are satisfied with the delay due to the LAN/SMDS
MAN is equal to the summation of the delays of all LAN’s bridge and T i A .If the bottleneck is not the SMDS connection,
( p ) and bridges ( T , u ) lying on the path from LAN i to the increasing the SMDS access rates does not reduce T i A .In that
MAN, Path(i, MAN), and is given case, we can increase the number of LAN/SMDS bridges per
cluster as explained before.
Ti,MAN = E[Tp] The algorithm for finding an overall LAN/MAN topology
pEPath(i,MAN) can be summarized as follows.
0 Find individual traffic matrices for each cluster from the
and T M A N ~ to the summation of the delays in the other one for all clusters.
is,equal
direction. Therefore, the LAN access delay and the cluster 0 For all clusters,
access delay are given by 1. Find individual minimum delay topology for the cluster.
2. Find Cluster Access Delay.
T ~ = A max ( T ~ , M A N , T M A N , ~ ) Vz, (25) 3. If Cluster Access Delay exceeds its threshold, add one
~i~ = max
, ~i~
zEcluster k
Vk (26) more LAN/MAN bridge to the cluster and go to 1;
otherwise save cluster topology and repeat 1, 2, 3 for
If TkA exceeds a threshold for a cluster, we proceed to the the next cluster.
second phase: We allow that cluster to have two LAN/MAN
bridges. Because of the spanning tree requirement, that cluster I v . RESULTSAND DISCUSSION
will have two subtrees as shown in Fig. 5. Since this is likely
to reduce the depth of the tree, the new TkA will be lower. A . Methodology for the Experiments
As we have explained before, we can change the topology of We performed experiments on networks with 6, 7, 10, 15,
one cluster without affecting the other clusters. We find the 20, and 30 LAN’s. For 6 and 7 LAN problems, we enumerated
ERSOY AND PANWAR: TOPOLOGICAL DESIGN OF INTERCONNECTED LANMAN NETWORKS 1179
TABLE I
Number of
LAN’s Tmin
Annealing
I %ax
RESULTSFOR THE MINIMUM
T L
Bound
~
Tmm
~
Local Search
~
I ~
Tmax
LAN PROBLEM
DELAYINTERCONNECTED
I
io'ooo
Tmin
smples
Tmean
I CPU Time PC-ATICONVEX
6 6.406* 6.406* 5.419 6.406* 7.214 - - 8 SI< 1 s
7 7.524* 7.746 5.721 7.524* 9.549 - - 18 SI< 1 s
10 8.323 8.524 6.199 8.639 11.027 9.103 1 1.445 52 s/< 1 s
15 10.470 10.696 7.168 11.117 14.836 12.419 15.993 6.2 min14.3 s
20 13.910 14.370 8.908 14.832 19.235 16.655 21.937 25.8 mid18 s
30 17.233 18.112 10.662 19.374 24.583 22.166 26.263 181 mi4124 s
* Global minimum in complete enumeration.
all possible spanning tree topologies and found the global value was measured on interconnected LAN’s by Leland and
minimum. This enabled us to compare the solution of the Wilson [21]. The average number of packets in a batch, X, is
simulated annealing directly with the global minimum. For 8. The capacity of LAN’s is 10 Mb/s, which is the standard
larger problems, we used several different goodness measures. for CSMA/CD LAN’s. The capacity of LANLAN bridges is
In order to estimate the range of the simulated annealing 6,000 packets/second and the capacity of LAN/MAN bridges
results, we ran the algorithm with 10 different random seeds are 10,000 packets/second for 192-byte packets. Given these
on the same problem. The difference between the best and the parameters, all the delay values presented in the following
worst solution in 10 runs gave us the range for the annealing sections are in milliseconds. The.threshold for T6A in the
solutions. We compared the solutions with the lower bound LAN/MAN problem is 20 ms.
described in Section 11-C. The gap between the lower bound
and the annealing solutions is an upper bound for the deviation B . Results for the Interconnected LAN Problem
from the global minimum. We also used the statistical good-
Table I summarizes the results of the annealing algorithm
ness measure described in [7]. In this measure, 10,000 random
and the comparisons with the lower bound for the inter-
feasible topologies were generated. A histogram corresponding
connected LAN problem in the case of heavy-load random
to the delay values of these topologies was created. This was
traffic requirements. As an example for the heavy load, the
then compared with the simulated annealing solutions.
requirement matrix for the 15 LAN problem consists of
The simulated annealing algorithm is a local search heuris-
uniformly distributed random requirements with an average
tic. In order to see its advantages over ordinary local search,
of 3 batches/second. Two rows, corresponding to LAN’s
we implemented a conventional local search heuristic and
with file servers, have higher requirements with an average
ran it several times with different random initial topologies.
10 batches/second. Corresponding minimum delay topologies
We compared the best topology found by the local search
found by the algorithm are such that maximum utilization
algorithm with the simulated annealing results. In order to on LAN’s and bridges reach 80% and 40%, respectively.
have a fair comparison, we adjusted the number of times the The minimum and maximum delay values for the simulated
local search was run so that the combined running time of annealing algorithm are found by running the algorithm with
multiple runs of local search was approximately equal to that 10 different random initial topologies. Related columns for the
of the annealing algorithm. best and worst performances of the algorithm show that the
The test problems had various traffic requirement patterns range of simulated annealing solutions is small. This small
as described. range of results confirms that the quality of the final solution
0 Three of the traffic matrices consist of uniformly dis-
is not dependent on the initial topology. For small problems,
tributed random traffic requirements with different average the algorithm found the global minimum most of the time.
values. These average values correspond to light, medium, and It found slightly higher delay topologies the rest of the time.
heavy loads. In order to consider the unbalanced inter-LAN There is a gap between the values of the simulated annealing
traffic patterns, some rows and columns of the traffic matrices solutions and the lower bound. For different size problems,
have larger average values than others. These rows or columns this gap was in the range of 18.2-61.6% of the lower bound.
might correspond to LAN’s connected to file servers or host The gap is a function of the quality of the solutions and the
computers. tightness of the lower bound. The lower bound is not very
0 One of the traffic matrices is such that the traffic between tight. For example, it can be observed from Table I that the
any two LAN’s decreases linearly with the “distance” between gap values between the lower bound and the global minimum
them. For example, the traffic requirements between LAN 1 for 6 and 7 LAN problems are 18.2% and 31.5% of the
and LAN 2 are larger than those between LAN 1 and LAN lower bound, respectively. Therefore, we conjecture that the
5. All traffic requirements have deterministic values according annealing solutions for larger problems are not very far from
to the “distance” measure. the global minimum.
0 The last traffic matrix is uniform. All traffic requirements In fact, Table I shows the worst overall performance of the
have the same deterministic value. annealing algorithm because the gap between the lower bound
Other important parameters of the example problems are as and the annealing solutions becomes smaller for the relatively
follows: The mean packet length, I, is equal to 192 bytes. This lighter load cases. The gap values were between 4.6% and
1180 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1 1 , NO. 8, OCTOBER 1993
22.5% of the lower bound for light load cases. A complete TABLE I1
table of results for the lighter load cases is given in [27]. One
of the reasons for the gap between the solutions and the lower
bound being large is using the minimum requirement spanning
Number of Tmin ;:::1
FOR Two LAN/MAN PROBLEMS
RESULTS
ITmax
Annealing Annealing Access
CPU Time
PC-
ATICONVEX
tree [23] for finding the bound on the total flow on LANs and Cluster 1 6 8.421* 8.480 14.643 22 SI< 1 s
bridges. This tree is found without considering the capacity Cluster 2 5 7.156* 7.352 14.417 9 SI< 1 s
constraints for LAN’s and bridges and is not feasible most of Cluster 3 7 8.572* 8.674 15.553 36 SI< 1 s
the time. Thus, actual flow on a feasible tree is larger than Overall 18 9.483* 9.667 - 67 s/l s
the lower bound for the total flow. The difference between the
Cluster 1 6 8.375* 8.437 13.948 23 SI< 1 s
actual total flow and the lower bound is smaller for light load Cluster 2 12 10.929 11.258 17.663 229 sI3.6 s
cases, leading to a smaller gap. Cluster 3 7 8.430* 8.768 14.177 34 SI< 1 s
The simulated annealing algorithm outperformed multiple Cluster 4 10 9.555 9.780 16.402 86 ~11.3s
runs of the greedy local search algorithm in all cases stud- Overall 35 13.069 13.349 - 372 sl6 s
ied. The contrast between the range of simulated annealing
* Global minimum in complete enumeration
solutions and that of the greedy local search shows that
the simulated annealing algorithm does not get stuck in a
local minimum. Related columns of Table I show that the V. CONCLUSION
simulated annealing algorithm finds better topologies than the We have described a method based on simulated annealing
best of 10,OOO randomly generated topologies. Furthermore, for finding minimum-delay spanning tree topologies for in-
the majority of the random topologies have significantly higher terconnected LAN/MAN networks. We have decomposed the
delays than the simulated annealing solutions. The last column LAN/MAN topology design problem into smaller, independent
in Table I shows the average CPU times for the simulated problems for each cluster. We have derived a lower bound for
annealing algorithm on a PC/AT and CONVEX 120 minicom- the minimum-delay spanning tree problem using the solution
puter. For smaller problems, the algorithm finds high-quality of the optimum requirement spanning tree problem described
solutions very quickly even on a personal computer. For larger in [23]. Results of the computational experiments with small
problems, running times are still reasonable, given that this is problems have shown that the simulated annealing algorithm
an off-line design problem. finds the optimum topology much faster than complete enu-
meration. For larger problems, comparisons with the lower
bound have indicated that the simulated annealing solutions are
C . Results for the Interconnected LA” Problem not very far from the global optimum. Furthermore, compar-
We have experimented with two LAN/MAN interconnection isons with multiple runs of greedy local search have shown that
problems. The first problem had a small number of LAN’s the quality of the solutions found by the simulated annealing
in each cluster as shown in Fig. 1, so that the global mini- algorithm depends at most weakly on the initial topology and
mum could be found with complete enumeration. The second are better than those of ordinary local search algorithms.
problem had more clusters and more LAN’s in each cluster. Increasing demand for the interconnection of LAN’s and
The top portion of Table I1 summarizes the results for the first better LAN/MAN topologies is continuing. New backbone
LAN/MAN problem. The simulated annealing algorithm found network architectures are proposed, and the local exchange
the global optimum topology for each of the three clusters in carriers are offering connectionless data transfer services for
this problem. Since the overall topology is a combination of interconnecting LAN’s. Although they are more complex and
these cluster topologies, the solution is also globally optimal slower than bridges, routers are becoming popular. Routers
for the first problem. The short overall running time for the first are more flexible and do not require the topology to be a
problem shows the advantage of decomposing the problem. spanning tree. Design of interconnected LAN/MAN topologies
If we had approached the problem as an 18 LAN problem using routers is another problem which can be approached in
without decomposing it, the running time would have been a similar way. Since the topology is no longer required to be a
around 20 minutes instead of 67 seconds on a PC/AT. Only spanning tree, different objective functions such as minimizing
one LANMAN bridge was sufficient for each cluster in order the dollar cost and maximizing the throughput can be used.
to keep the cluster access delays below the threshold (i.e., 20 Other constraints can easily be incorporated into the formu-
ms). lation of the problem, such as constraints on the maximum
The lower portion of Table I1 summarizes the results for number of hops between any two LAN’s, maximum utilization
the second problem, which has more and larger clusters. for LAN’s, or reliability requirements. Because of its simplic-
Although we do not know the overall global optimum for ity and general applicability, simulated annealing can be used
this problem, we can still check for the global optimum for for finding good feasible solutions for many variations of the
small clusters. Goodness measures described before show that interconnected LAN/MAN topology design problem.
we have good topologies for larger clusters. Therefore, we
conjecture that the simulated annealing algorithm finds high- APPENDIXA
OPTIMUM DISTRIBUTION OF THE TOTALFLOWON LAN’s
quality solutions for the LAN/MAN problem. Running times
for the algorithm are short because of the decomposition of A lower bound for the total flow on all LAN’s (XL,,,,~~)
the problem. and a set of inequality constraints due to mandatory flows on
ERSOY AND PANWAR: TOPOLOGICAL DESIGN OF INTERCONNECTED LANNAN NETWORKS 1181
each LAN were presented in Section 11-C. The delay due to APPENDIX B
LAN’s is given by OF’TIMUM DISTRIBUTION
OF THE TOTALFLOW ON BFWGES
A lower bound for the total flow on bridges was
presented in Section 11-C. A lower bound for TB can be
obtained by optimally distributing on all bridge ports
and such that TB is minimized. This is a standard optimization
problem, which can be solved using a Lagrange multiplier.
The delay due to bridges is given by
i=l
For LAN’s with X i = Ay, (29) becomes For normal operation, XXij < pij for all bridge ports;
otherwise, the delay will be infinite. This makes the quantity
in (40) positive, thus ensuring a minimum. Therefore, X i j ’ s
XPL
( P L - XXZ)2
-Q + pi = 0 vi S . t . X i = Ay. (34) found using this distribution give a lower bound on TL.
If all bridges have equal capacity (i.e., pij = pg,VPortij),
Therefore. the uniform distribution of among all bridge ports gives
a lower bound for TB. For this case, the following bridge port
flows give a lower bound for TB:
.. .
1182 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 11, NO. 8, OCTOBER 1993
TB, each of these requirements is assigned on a separate bridge [I91 E. Aarts and J. Korst, Simulated Annealing and Boltzmann Machines.
port. As in the case of LAN’s, finding a lower bound on TB is New York: Wiley, 1989.
[20] R. Gusella, “A measurement study of diskless workstation traffic on an
equivalent to finding the optimum distribution of on all Ethernet,” IEEE Trans. Comrnun., pp. 1557-1568, Sept. 1990.
bridge ports subject to 2(N - 1) inequality constraints due to [21] W. E. Leland and D. V. Wilson, “High time-resolution measurement
the 2 ( N - 1) largest requirements. Again, a water-filling type and analysis of LAN traffic: Implications for LAN interconnection,” in
Proc. IEEE INFOCOM, 1991, pp. 1360-1366.
distribution similar to the one shown in Fig. 3 is optimum and [22] D. Gross and C. M. Harris, Fundementals of Queueing Theory, 2nd Ed.
gives an improved lower bound on TB. New York: Wiley, 1985.
[23] T. C. Hu, “Optimum communication spanning trees,” SIAM J. Comp.,
If the bridge port capacities are not equal, the 2 ( N - 1) vol. 3, pp. 188-195, 1974.
largest requirements cannot be used for improving the lower [24] F. S. Hillier and G. J. Lieberman, Introduction to Operations Research,
bound on TB since they cannot be assigned on separate 4th Ed. New York: Holden-Day, 1986.
[25] S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, “Optimization by
bridge ports. In that case, the lower bound found using the simulated annealing,” Sei., pp. 671-680, May 1983.
Lagrangean in (38) is used for TB.As shown in ( 5 ) , the sum [26] B. Hajek, “Cooling schedules for optimal annealing,” Math. Operat.
of the lower bounds on TL and TB gives the lower bound for Res., vol. 13, pp. 311-329, 1988.
[27] C. Ersoy, “Topological design of interconnected local and metropolitan
the average network delay T. area networks,” Ph.D. dissertation, Polytech. Univ., Brooklyn, NY, June
1992.
REFERENCES
[l] “IEEE Standard 802.1, part D: MAC Bridges,” in IEEE Project 802
Local and Metropolitan Area Network Standards. Cem Ersoy (S’87-M’91-S’91-M’92) was born in
[2] F. Backes, “Transparent bridges for interconnection of IEEE 802 Ankara, Turkey, on September 28, 1963. He re-
LAN’s,’’ IEEE Netw., pp. 5-9, Jan. 1988. ceived the B.S. and M.S. degrees in electrical engi-
[3] C. K. Kwok and B. Mukherjee, “On transparent bridging of CSMA/CD neering from Bogazici University, Istanbul, Turkey,
networks,” in Proc. IEEE GLOBECOM, 1989, pp. 185-190. in 1984 and 1986, respectively, and the Ph.D. de-
[4] L. Merakos and H. Xie, “Interconnection of CSMA/CD LAN’s via an gree in electrical engineering from the Polytechnic
N-port bridge,” in Proc. IEEE INFOCOM, 1989, pp. 2&37. University, Brooklyn, NY, in 1992.
[51 C. Ersoy, S. S. Panwar, R. Dalias, and D. Segal, “Transient phenomena
From 1984 to 1986, he worked as a Research
in bridged local area networks,” in Proc. IEEE GLOBECOM, 1990.
[6] S. C. Liang and J. R. Yee, “A gateway allocation algorithm for and Development Engineer at Northern Electric
interconnecting existing data networks,” in Proc. IEEE INFOCOM, Telecommunications (NETAS), Istanbul, Turkey. At
1989, pp. 468-473. the Polytechnic University, he worked as a Teaching
[7] P. C. Fetterolf and G. Anandalingam, “Optimal design of LAN-WAN Assistant from 1987 to 1989 and as a Research Assistant from 1989 to
internetworks: An approach using simulated annealing,” in Proc. ORSA 1992. He is currently an Assistant Professor in the Computer Engineering
Telecommun. Conf., 1990. Department of Bogazici University, Istanbul, Turkey. His research interests
[8] S. Gupta and K. W. Ross, “Performance modelling and optimization include computer networks and optimization.
of interconnected ethemets,” in Proc. IEEE INFOCOM, 1991, pp.
1353-1359.
[9] F. E. Ross, “An overview of FDDI: The fiber distributed data interface,”
IEEE J . Select. Areas Commun., pp. 1043-1051, Sept. 1989. Shivendra S. Panwar (S’82-M’85) was born in
[lo] J. F. Mollenauer, “Standards for metropolitan area networks,” IEEE
Delhi, India, on December 15, 1959. He received
Commun. Mag., pp. 15-19, Apr. 1988.
[ l 11 G. H. Clapp, “LAN interconnection across SMDS,” IEEE Netw. Mag., the B.Tech. degree in electrical engineering from
pp. 25-32, Sept. 1991. the Indian Institute of Technology, Kanpur, in 1981,
[I21 L. Mongiovi, M. Farrell, and V. Trecordi, “A proposal for interconnect- and the M.S. and Ph.D. degrees in electrical and
ing FDDI networks through B-ISDN,” in Proc. IEEE INFOCOM, pp. computer engineering from the University of Mass-
116&1167, 1991. achusetts, Amherst, in 1983 and 1986, respectively.
[13] S. E. Minzer, “Broadband ISDN and asynchronous transfer mode From 1981 to 1985, he was a Research Assistant
(ATM),” IEEE Commun. Mag., pp. 17-24, Sept. 1989. at the University of Massachusetts. He joined the
[14] P. Marsden, “Interworking IEEE 802/FDDI LAN’s via the ISDN frame Department of Electrical Engineering at the Poly-
relay bearer service,” Proc. IEEE, pp. 223-229, Feb. 1991. technic University, Brooklyn, where he is currently
[15] R. Perlman, “An algorithm for distributed computation of a spanning an Associate Professor. He spent the summer of 1987 as a Visiting Scientist at
tree in an extended LAN,” Comput. Commun. Rev., pp. 44-53, Sept. the IBM T. J. Watson Research Center, Yorktown Heights, NY, and has been
1985. a Consultant to AT&T Bell Laboratories, Holmdel, NJ. His research interests
[I61 D. Bertsekas and R. Gallager, Data Networks, 2nd Ed. Englewood include the performance analysis and design of high-speed networks. He is
Cliffs, NJ: Prentice-Hall, 1992. currently the Secretary of the Technical Affairs Council of the IEEE Commu-
[17] M. R. Carey and D. S. Johnson, Computers andIntractability: A Guide nications Society and Co-chairman of the Technical Program Committee of
to the Theory of NP-Completeness. New York: Freeman, 1979. the Second IEEE Network Management and Control Workshop.
[18] W. Nijenhuis, Combinatorial Algorithms. New York Academic, 1975. Dr. Panwar is a member of Tau Beta Pi and Sigma Xi.