WO2023041645A1 - Method for optimizing a usage distribution in a communications network - Google Patents

Method for optimizing a usage distribution in a communications network Download PDF

Info

Publication number
WO2023041645A1
WO2023041645A1 PCT/EP2022/075647 EP2022075647W WO2023041645A1 WO 2023041645 A1 WO2023041645 A1 WO 2023041645A1 EP 2022075647 W EP2022075647 W EP 2022075647W WO 2023041645 A1 WO2023041645 A1 WO 2023041645A1
Authority
WO
WIPO (PCT)
Prior art keywords
sub
demands
path
demand
communication paths
Prior art date
Application number
PCT/EP2022/075647
Other languages
French (fr)
Inventor
Marc Geitz
Oliver Holschke
Timmy Schüller
Christian MÜNCH
Fritz Schinkel
Sebastian Engel
Original Assignee
Fujitsu Technology Solutions Gmbh
Deutsche Telekom Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from EP21205005.8A external-priority patent/EP4152727B1/en
Application filed by Fujitsu Technology Solutions Gmbh, Deutsche Telekom Ag filed Critical Fujitsu Technology Solutions Gmbh
Publication of WO2023041645A1 publication Critical patent/WO2023041645A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/125Shortest path evaluation based on throughput or bandwidth

Definitions

  • the invention pertains to a computer-implemented method for optimi zing a usage distribution in a communications network in which data traf fic is routed, wherein the communications network has a plurality of communication nodes which are connectable over edges ( links ) of communication paths for a routing of the data traf fic .
  • the invention also pertains to a quantum concept processor configured for performing such a method as well as a computer program implemented to perform such a method .
  • link weights are often related to link capacities, i.e., the maximum amount of data per unit time that can be routed over a link from a starting node to an end node connected by that link respectively edge.
  • link capacities i.e., the maximum amount of data per unit time that can be routed over a link from a starting node to an end node connected by that link respectively edge.
  • link metrics can also be called link metrics or Interior Gateway Protocols (IGP) metrics.
  • linear optimization techniques applied so far quickly reach their limits when actual non-linear conditions are taken into account, like redundancies, geographical subgroups or subdomains (e.g. European network and US network considered in one model) , inclusion of satellites, Quality of Service, QoS, relationships, etc.
  • known techniques often lead to the problem of unused capacity usage and overloads of link capacities in communication paths within a network, where many links are close to their capacity limit.
  • the problem of the present disclosure lies in providing enhanced techniques that allow for an optimized utilization of communication paths within a communications network with respect to capacity limits, thereby achieving an optimized routing.
  • the method is a computer-implemented procedure for optimizing a usage distribution in a communications network in which data traffic is routed, wherein the communications network has a plurality of communication nodes.
  • the communication nodes are connected by edges of the communications network.
  • a series of edges yields a communication path for a routing of the data traffic.
  • an edge of a communication path in this context describes a connection between two adjacent nodes within a communication path.
  • the method comprises the following steps:
  • each traffic demand specifying a transfer of a determined data volume from an origin node to a destination node among the plurality of communication nodes
  • This method reliably tackles the problem of routing network demands in a communications network along optimi zed communication paths such that the overall capacity in the network is optimally used, thereby avoiding that link capacities in the network are exceeded .
  • one optimal option for a communication path from the set of optional communication paths can be selected .
  • the selection is chosen such that the capacity of all edges ( links ) in used communication paths within the network is respected as upper limit for the total volume of traf fic demands routed along them and that the average load of all communication paths within a network is minimum . Further, a minimization of a maximum link utilization (MLU) can be achieved .
  • MLU maximum link utilization
  • Traffic demands in this context are modelled as 3-tuples, defining an origin node (source of a data stream) , an end node or destination node (destination of a data stream) , and the determined data traffic to be transferred between origin and destination.
  • the focus is on providing continuous data streams over the network, which are to be modelled and routed in such a way that no data is lost during transmission by exceeding specified capacities on given transport links. Measurement for data transfer rates of such data stream requests or demands are currently specified in Gbps (Gigabit per second) .
  • Sub-demands in this context are traffic demands split into fragments. Hence, one sub-demand represents a fragment of an initial traffic demand in terms of the data volume split into a determined data volume packet.
  • the optional communication paths in this context are in general not subject to any restrictions with regard to routing, path length or number of intermediary nodes in the network.
  • the set of optional communication paths is pre-determined regarding each sub-demand that is to be transmitted through the network. In such a pre-determination useful or suitable paths can be considered in terms of latency (shortest possible paths, fewest possible IP hops) , redundancy (the model should be redundant against failure of a connection) , Domains (e.g. EU, US) or hierarchies (core network, access networks) , etc.
  • the set of optional communication paths is a subset of possible communication paths for each traffic demand or for each respective sub-demand .
  • the set of optional communication paths is for example stored as "path box" which can be accessed by the computer-implemented algorithm .
  • traf fic demands in this context can theoretically be split into sub-demands with any even or uneven fragment si ze that is suitable for the practical implementation .
  • the approach here is to split each traf fic demands into a plurality of sub-demands and to find for each sub-demand an optimal communication path through the network .
  • the approach bases on the so-called Multi Commodity Flow Routing (MCFR) which is a kind of source routing .
  • MCFR Multi Commodity Flow Routing
  • Such splitting of the traf fic demands can depend on the processing performance and capacity of the quantum concept processor .
  • a quadratic optimi zation problem By calculating, for each sub-demand, fractional capacity usages of the edges within the set of optional communication paths and formulating the calculated fractional capacity usages as terms of a quadratic stress function, a quadratic optimi zation problem can be formulated in order to deal with the complexity of the above-explained optimi zation problem .
  • the application of such quadratic optimi zation problem has the ef fect that a quadratic stress function can be formulated which heavily penali zes a high capacity usage on individual edges of communication paths .
  • an optimized routing is determined by selecting for each sub-demand one communication path from the set of optional communication paths, such that the quadratic stress function is minimized.
  • the minimum of the quadratic stress function preferably is a global minimum, but can also be a local minimum.
  • the method hence, has the technical effect and advantage of a uniformly minimal utilization of the network and distribution of the distance to the capacity limits within the network in order to achieve a uniformly minimal utilization of the network with respect to its capacity limits .
  • the underlying quadratic optimization problem is very complex. This is not only due to a potential impact of one selected communication path to other communication paths and a vast amount of data traffic to be managed between a plurality of origin nodes and destination nodes in the network.
  • the problem is also very complex because there are many practical constraints that have to be taken into account. As more constraints are implemented, such problems become more complex and difficult to solve.
  • the herein described method advantageously shows its strength compared to conventional approaches more and more, the more complex the underlying problem is . In other words , for a complex optimi zation problem taking into consideration practical constraints as explained above , the herein described method has a signi ficant strength over conventional techniques .
  • the herein described method makes use of an approach inspired by quantum computing .
  • the calculation of optimi zed solutions of the quadratic stress function for determining optimi zed communication paths for all sub-demands of the set of traf fic demands is performed by a so-called quantum concept processor .
  • a quantum concept processor in the context of the present disclosure a processor is defined that solves a so called " I sing model" or the equivalent quadratic unconstrained binary problem .
  • this is a processor configured to solve an optimi zation problem by means of quantum annealing or quantum annealing emulation .
  • Such a processor is for example based on conventional hardware technology, for example based on complementary metal-oxide-semiconductor (CMOS ) technology .
  • CMOS complementary metal-oxide-semiconductor
  • quantum concept processor is Fuj itsu' s digital annealer .
  • any other quantum processors can be used for the herein described method, in future times also such technologies that are based on real quantum bit technologies .
  • Further examples of such quantum concept processors are the quantum annealer of DWave ( e . g . 5000Q) , but also quantum gate computers ( IBM, Rigetti , OpenSuperQ, lonQ or Honeywell ) making use of quantum optimisation algorithms like QAOA or VQE .
  • a quantum concept processor as defined herein is a processor which realises the concept of minimi zation of a so-called quadratic unconstrained binary optimi zation ( QUBO) function, either on a special processor classic technology, a quantum gate computer or on a quantum annealer .
  • QUBO quadratic unconstrained binary optimi zation
  • the method further comprises the following steps :
  • each path variable is associated with one of the sub-demands and one communication path from the set of optional communication paths ,
  • Calculating the path terms by using the quantum concept processor, to choose for each sub-demand one communication path from the set of optional communication paths , such that the quadratic stress function is minimi zed .
  • di f ferent communication paths for di f ferent subdemands e . g . via di f ferent intermediary nodes
  • di f ferent communication paths for di f ferent subdemands can be selected in order to avoid overloads or critical increase of the capacity usage at respective edges of communication paths in the network and to distribute the overall capacity usage throughout the network in an optimi zed manner .
  • the path terms are calculated under consideration of a path condition that each sub-demand is routed along exactly one communication path from the set of optional communication paths .
  • Such path condition forms a constraint or "boundary" for the method such that each sub-demand can only be assigned to exactly one path out of the path box . This avoids undesirable solutions and guarantees that a routing of each sub-demand is suf ficiently considered .
  • the traf fic demands are split into sub-demands with determined discrete data volumes .
  • the sub-demands can each have an equal si ze or different sizes, depending on the implementation and practical considerations. For example, a traffic demand with a volume size of 1000 Gbit/s is split into a plurality of sub-demands with even sizes of 50 Gbit/s. Alternatively, subdemands with different sizes are generated, wherein different sub-demands may have for example different sizes of 50, 100, and 250 Gbit/s.
  • a splitting of the traffic demands into subdemands with determined discrete data volumes has the effect of a practically implementable algorithmic procedure within the network and helps keeping control of stable and reliable data streams. In this way, such approach is a kind of discrete MCFR approach.
  • the quadratic stress function is formulated under consideration of one or both of the following constraints for the set of traffic demands or for the respective sub-demands: organization of the communications network in different network domains, latency of the communications network.
  • solutions of the optimization problem can be penalized that contravene the above conditions. This enables finding suitable optimized solutions considering practical constraints of the actual network conditions of the communications network.
  • the set of optional communication paths for an individual routing of each sub-demand is specified under consideration of one or more of the following constraints: one or more redundant optional communication paths associated with a sub-network of the communications network organi zation of the communications network in di f ferent network domains , latency of the communications network .
  • the set of optional communication paths for an individual routing of each sub-demand is speci fied such that for topologically near origin and destination nodes a smaller number of optional communications paths is selected than for topologically distant origin and destination nodes .
  • This has the advantage that all possible combinations and options for communication paths can be condensed to a suitable number of optional paths in the path box for each respective sub-demand .
  • For topologically near origin and destination nodes a smaller number of optional communications paths is suf ficient
  • for topologically distant origin and destination nodes a higher number of optional communications paths is recommended .
  • For near origin and destination nodes rather short paths are preferred, whereas for distant origin and destination nodes suf ficient alternative routes or detours can be taken into account .
  • With increasing "distance" between origin and destination nodes hence , in each case suitable and suf ficient options and alternatives can be pre-determined as optional communications paths , without over-straining the complexity of the algorithm .
  • the quadratic stress function is formulated as a quadratic unconstrained binary optimi zation ( QUBO) function .
  • This QUBO function serves as " input" for the quantum concept processor that solves this optimi zation problem for an optimi zed routing of all sub-demands according to the above-explained method .
  • QUBOs are quadratic order polynomials in binary variables which are represented in a quantum concept processor as bits or quantum bits ( Q-bits hereinafter ) .
  • the QUBO function represents the sum of potential contributions of the fractional capacity usages of respective edges within optional communication paths as a function of di f ferent Q-bits , wherein each Q-bit represents the selection of a path alternative that can assume the value " 0" or the value " 1" .
  • the quantum concept processor runs through di f ferent settings of the di f ferent Q- bits in order to find such solution ( s ) that minimi ze the quadratic optimi zation problem .
  • a QUBO representation of the optimi zation problem has elegant properties regarding the here applied quantum concept computing .
  • the above explained path variables are formulated in the form of such Q-bits .
  • the quadratic stress function and the path condition are combined into a global QUBO function .
  • the global QUBO function one or more of the above-explained constraints can be considered .
  • one or more of the aboveexplained constraints can be weighted within the QUBO function as soft constraints . This has the advantage that the QUBO function can be somewhat fine-tuned depending on the focus of the optimi zation problem either on the optimi zation of the uni form capacity usage distribution throughout the network or on the ful filment of one or more of the mentioned ( soft ) constraints .
  • the above-mentioned problem is also solved by a quantum concept processor as claimed in the enclosed claims .
  • the quantum concept processor is configured for performing one or more steps of a method as described above .
  • the quantum concept processor is a digital annealing processing unit . This unit can be specially configured to perform quantum annealing or a quantum annealing emulation as explained above .
  • the quantum concept processor can be of any type explained above .
  • a computer program comprising instructions that , when the program is executed by one or more processors , cause each of the one or more processors to perform one or more steps of a method as described above .
  • At least one of these processors is e . g . a quantum concept processor as explained above .
  • Other processors can be configured for processing, by executing the computer program, preparatory or iterative steps of or for a method as explained above .
  • a workplace for a network planner, configured for veri fying an optimi zed routing determined by a method as described above .
  • a workplace for example, has veri fication means that are configured for an ( automated or semi-automated) veri fication of an optimi zed routing determined by a method as described above .
  • This serves a network planner to veri fy optimi zation results found by a method as described above .
  • the veri fication means can be implemented in software and/or hardware .
  • the workplace can communicate or be connected to a system comprising a quantum concept processor that performs the method as described above . The results can then be taken over into the workplace .
  • an interface arrangement comprising one or more interfaces to a plurality of communication nodes of a communications network in which data traf fic is routed, wherein the interface arrangement is configured to automatically deploy an optimi zed routing determined by a method as described above to the communication nodes of the communications network .
  • an optimi zed routing determined by a method as described above can be ( automatically or semi-automatically ) be deployed to a plurality of communication nodes of a respective communications network .
  • the interface arrangement can communicate or be connected to a workplace as describe above or to a system comprising a quantum concept processor that performs the method as described above . The results can then be taken over into the interface arrangement .
  • an interface can be implemented or used for reading out parameters from the communications network before a respective optimi zation and for inputting such parameters into the explained computer-implemented optimi zation procedure .
  • the parameters for example comprises a network configuration, adj acency information for a graph description of the network, available capacities in the network and traf fic demands to be expected .
  • Figure 1 shows an exemplary configuration of a communications network with exemplary routings of traf fic demands following a conventional approach .
  • Figure 2A shows an exemplary configuration of a communications network with exemplary routings of traf fic demands following an alternative approach .
  • Figure 2B shows an exemplary configuration of a communications network with exemplary routings of traf fic demands following an approach according to the invention .
  • Figure 3 shows an exemplary schematic illustration of optional communication paths for a routing of traf fic demands between origin and destination nodes .
  • Figures 4A and 4B show exemplary mathematical formulations of partial optimi zation problems following an approach according to the invention .
  • Figure 5 shows an exemplary schematic illustration of an algorithm performing an approach according to the invention .
  • FIG. 1 shows an exemplary configuration of a communications network 1 with exemplary routings of traf fic demands 5a, 5b and 5c following a conventional approach .
  • the communications network 1 comprises a plurality of communication nodes 2 , wherein a connection 4 between two adj acent communication nodes 2 is called an edge . This is exemplarily illustrated between the communication node 2 and another communication node 2c, which can communicate with each other over the connection 4 .
  • several communication nodes 2 are aggregated into so-called aggregation nodes 3 .
  • the communication node 2a is aggregated within aggregation node 3a, whereas other communication nodes 2b, 2d and 2e are aggregated in the aggregation node 3b, for example .
  • the communication nodes 2 are for example so-called label edge routers (LER) for routing incoming and outgoing data traf fic within the network 1 .
  • the aggregation nodes 3 are called Meta nodes and are aggregation zones of LERs in a certain region of the network 1 .
  • the aggregation nodes 3 are centrali zed aggregation zones of determined economic areas or cities between which a communication shall take place .
  • the aggregation nodes 3 can for example be entities of an industry network or of a traf fic network, etc .
  • the communication network 1 in general , is part-mashed . This means that not all of the communication nodes 2 are connected or connectable with all other communication nodes 2 . Instead, there are only several connections 4 ( see dotted connections ) between several communication nodes 2 implemented in the network 1 , which, for example , came from historical evolution of the network 1 .
  • the connections 4 between respective communication nodes 2 are for example implemented by fibre optic connections .
  • other technologies like radio technologies ( e . g . 5G) or copper/DSL technologies are applicable as well , in general .
  • Figure 1 illustrates a certain scenario of traf fic demands 5a, 5b and 5c, according to which certain data volumes have to be trans ferred between respective communication nodes 2 within the network 1 .
  • a first traf fic demand 5a is between the communication node 2a within aggregation node 3a and another communication node 2 f within aggregation node 3d .
  • a second traffic demand 5b is between a communication node 2e within aggregation node 3b and again communication node 2f within aggregation node 3d.
  • a third traffic demand 5c is between the communication node 2c within aggregation node 3c and again communication node 2f within aggregation node 3d.
  • Each traffic demand 5a, 5b and 5c hence, defines a determined volume to be transferred from an origin node to a destination node.
  • the origin node for traffic demand 5a is the communication node 2a
  • the destination node for the traffic demand 5a is the communication node 2f.
  • the origin node is communication node 2e
  • the destination node is communication node 2f.
  • the origin node is communication node 2c and the destination node is again communication node 2f.
  • traffic demands can be defined as demands between aggregation nodes 3, irrespective on which internal communication node 2 within a respective aggregation node 3 the communication starts or ends.
  • the demands 5a, 5b and 5c can be defined as demands between the aggregation nodes 3a and 3d (demand 5a) , aggregation nodes 3b and 3d (demand 5b) and aggregation nodes 3c and 3d (demand 5c) .
  • Each traffic demand 5a, 5b and 5c burdens the network 1 with a usage of the network's capacity, i.e. the capacity of respective connections 4 of potential communication paths between the respective communication nodes 2 in the network 1.
  • the traffic demand 5a is transferred from communication node 2a to communication node 2f via the communication nodes 2b, 2c, 2d, 2e, and 2f.
  • the traffic demand 5b is transferred simply over the connection 4 between the communication nodes 2e and 2f.
  • the traffic demand 5c is transferred from communication node 2c to communication node 2f via the communication nodes 2d, 2e, and 2f.
  • mainly two drawbacks occur.
  • a first drawback lies in the communication paths for the transfer of the traffic demands 5a and 5c being long and rather complicated paths through the network 1. These transfers embed a plurality of communication nodes 2 and connections 4 in the network 1 for transferring the traffic demands 5a and 5c, which can have significant impact on other transfers in the network.
  • a second drawback lies in the fact that all three traffic demands 5a to 5c are finally transferred over the connection 4 between the communication nodes 2e and 2f. Hence the link capacity of the connection 4 between the nodes 2e and 2f is loaded to a significant extent. This may lead to a failure or an overload of the connection 4 between nodes 2e and 2f, resulting in increased latency or loss of data, etc.
  • Figure 2A shows an exemplary configuration of the communications network 1 with exemplary routings of traffic demands 5a, 5b and 5c (see above) following an alternative approach.
  • an alternative path is chosen such that traffic demand 5a is transferred on an alternative communication path starting again in communication node 2a and following the communication nodes 2b, 2d, 2e and 2f.
  • the alternative path is , for example , selected by manipulation of link weights of connections 4 in the network 1 .
  • the scenario according to Figure 2A has the advantage over the scenario of Figure 1 that the communication path for the trans fer of the traf fic demand 5a has become closer to a short path strategy, thereby keeping the number of involved communication nodes 2 and connections 4 in the network 1 low ( at least lower than in the scenario of Figure 1 ) in order to reduce the impact on other trans fers .
  • the other drawback remains , according to which the connection 4 between the nodes 2e and 2 f is still heavily loaded with all three traf fic demands 5a to 5c going over this connection of the network 1 .
  • FIG. 2B shows an exemplary configuration of the communications network 1 according to Figures 1 and 2A, but now with exemplary routings of the traf fic demands 5a to 5c following an approach according to the invention .
  • a plurality of optimi zed communication paths regarding the data volumes of all three traf fic demands 5a to 5c are selected .
  • the traf fic demands 5a to 5c all have been split into a plurality of sub-demands , each sub-demand representing a discrete fragment of the data volume of an associated one of the traf fic demands 5a to 5c .
  • each traf fic demand 5a to 5c there is not only one single prescribed path, but a plurality of ( di f ferent and separate ) paths regarding each sub-demand of each traf fic demand 5a to 5c .
  • the scenario according to Figure 2B hence , trans fers the overall data volumes of the traf fic demands 5a to 5c split into a plurality of fragments ( sub-demands ) on very di f ferent communication paths from respective origins to respective destinations through the network .
  • This approach hence , follows a discrete MCFR approach .
  • the real value of the scenario according to Figure 2B lies in the fact that the overall data volume of all traf fic demands 5a to 5c, is distributed throughout the network, thereby avoiding that signi ficant load is trans ferred over single segments in the network which can heavily burden single connections 4 in the network .
  • Figure 2B solves the drawbacks of the approaches according to Figures 1 and 2A, thereby achieving a reduced impact and influence between trans fers of di f ferent traf fic demands 5a to 5c as best as possible together with a uni form and optimi zed distribution of the overall capacity usage of the connections 4 in the network 1 for all traf fic demands 5 that have to be trans ferred in the network 1 .
  • the optimi zation problem to be solved lies in determining an optimi zed routing through the network 1 by selecting for each sub-demand as fragment of a respective traf fic demand 5 one communication path from a set of optional communication paths , such that a mathematically formulated quadratic stress function ( core optimi zation problem) is minimi zed .
  • This serves the purpose of choosing for all sub-demands of all traf fic demands 5 in the network 1 respective communication paths with the ef fect that the overall capacity usage of connections 4 within the network 1 can be uni formly minimi zed over the network 1 . This avoids connections 4 to be heavily burdened or overloaded, whereas a minor load of other connections 4 could lead to signi ficantly lower such stress .
  • Figure 3 shows a schematic illustration of optional communication paths kl and k2 for a routing of fragments ( sub-demands ) of traf fic demands between an origin node o and a destination node d .
  • Determined data volume packets of a plurality of sub-demands into which a traf fic demand o , d is split ) are to be trans ferred between o and d .
  • the core optimi zation problem now lies in choosing and determining optimally distributed communication paths for all sub-demands between o and d such that an overall capacity usage of connections within optional communication paths are minimi zed such that the overall usage of the capacities in the network is uni formly minimi zed within the network .
  • the set of optional communication paths kl and k2 is speci fied in advance .
  • This can be done through application of any suitable path planning algorithm that calculates optional communication paths between the origin node o and destination node d for each sub-demand to be trans ferred .
  • path kl goes from o over an intermediate node i l to d .
  • Path k2 goes from o over another intermediate node 12 to d .
  • the planned paths kl , k2 can be stored in advance in the form of a path box that can be accessed by the algorithm for selecting for each sub-demand one path out of the path box .
  • Figure 3 further illustrates two exemplary connections that are further referenced to as edges el and e2 and that lie in the optional communication paths kl , k2 .
  • the edge el is configured between the intermediate node i l and the destination d, whereas the edge e2 is configured between the intermediate node 12 and the destination d .
  • the optimization problem lies in determining and selecting distributed communication paths for all sub-demands between o and d such that the overall capacity usage is distributed over both edges el and e2.
  • fractional capacity usages of all edges within the set of the optional communication paths kl, k2 are calculated for the whole set of sub-demands into which all traffic demands are split.
  • such measure includes the calculation of fractional capacity usages of each of the edges el and e2 for each of the sub-demands between o and d.
  • Fractional capacity usages" of the respective edges means that based on the respective usage capacity limit of each edge, the fraction of the capacity usage is calculated that is required for each sub-demand to be transmitted over this edge .
  • each sub-demand between o and d requires half of the maximum usage capacity of each edge el and e2 (i.e. 50% of the capacity) when passing over the respective edge.
  • the edges el and e2 both are burdened with 50% of their usage capacity limit.
  • the calculated fractional capacity usages are then formulated as terms of a quadratic stress function which is further explained in detail below and in view of Figure 4B .
  • Figures 4A and 4B show exemplary mathematical formulations of partial optimi zation problems following the approach as explained above with regard to the Figures 2B and 3 .
  • the mathematical formulations of Figures 4A and 4B are represented as so-called Hamiltonian functions , short Hamiltonians .
  • the mathematical formulation in Figure 4A is formulated as summed terms of binary variables that can assume the value " 0" or the value " 1" ( or both with a certain probability) and are represented in a quantum concept processor as bits ( or Q-bits as used hereinafter ) .
  • bits or Q-bits as used hereinafter .
  • a respective Q-bit can be set as path variable .
  • the respective Q-bit is set to the value " 1" i f a respective sub-demand goes over the respective communication path k, and set to the value " 0" , i f not .
  • the Hamiltonian must be equal to " 0" . This is only ful filled i f for each sub-demand p exactly one path k G P is chosen such that only one path variable assumes the value " 1" and all other path variables for other paths have the value " 0" . Otherwise , i f none or more than one path k would be chosen, the condition in Figure 4A would not be ful filled .
  • the path condition, mathematically formulated as Hamiltonian in Figure 4A has the ef fect that exactly one communication path k must be chosen for each sub-demand p in order to consider this sub-demand p for the overall calculation of an optimi zed routing of all sub-demands in the network .
  • the mathematical formulation of the Hamiltonian according to Figure 4B represents the core optimi zation problem that is formulated as a quadratic stress function taking into account the calculated fractional capacity usages of the edges e out of all edges E in the network ( e G E ) , the edges e lying within the set of optional communication paths k 6 P for all traf fic demands o , d .
  • the core optimi zation problem here lies in minimi zing the Hamiltonian according to Figure 4B in order to find optimi zed communication paths for all sub-demands p to be transmitted within the network .
  • the Hamiltonian of Figure 4B considers summed terms for each edge e within an optional communication path k considering all sub-demands p between all origins o and destinations d .
  • the QUBO of Figure 4B then sums all calculated fractional capacity usages of all edges e that are part of optional communication paths k.
  • here represents the volume of a respective sub-demand p
  • c e represents the capacity of the respective edge e.
  • the fractional capacity usages are connected with the respective Q-bits (path variables) into path terms.
  • the Q- bits can assume either the value "0" or the value "1" depending on whether an optional path associated with a respective Q-bit is taken into account or not.
  • the Hamiltonian according to Figure 4B may have the following expression:
  • the Hamiltonian of Figure 4B is generally solved for all subdemands in a network by a quantum concept processor that runs through di f ferent settings of values for the respective Q- bits thereby calculating the respective result of the Hamiltonian .
  • the target of doing so is to find the minimum of the Hamiltonian for respectively set values of Q-bits
  • the respective values of the Q-bits x leading to this minimum are stored and finally define respective communication paths of respective sub-demands .
  • each Q-bit defines one communication path for each sub-demand p as explained above .
  • an optimi zed routing is calculated by selecting for each sub-demand p one communication path k from the set of optional communication paths .
  • Figure 5 shows an exemplary schematic illustration of an algorithm performing the approach as explained above .
  • Figure 5 shows the processing of the above explained method steps and procedure considering the set of traf fic demands 5 .
  • the traf fic demands 5 each are split into respective sub-demands 7 with a determined discrete packet si ze .
  • the pre-processed sub-demands 7 are then input to an algorithmic procedure within the quantum concept processor 6 .
  • the quantum concept processor 6 according to Figure 5 is configured to solve the optimi zation problem by means of quantum annealing emulation .
  • the quantum concept processor 6 applies the mathematical formulation of the overall optimi zation problem according to Figures 4A and 4B .
  • the quantum concept processor 6 then calculates for the subdemands 7 an optimi zed routing solution of the optimi zation problem according to Figure 4B under consideration of the constraint according to Figure 4A.
  • the finally calculated minimum of the optimi zation problem according to Figure 4B is then output from the quantum concept processor 6 for the respective sub-demands 7 .
  • the determined communication paths k according to the found optimum of the optimi zation problem are then stored for the sub-demands 7 .
  • the algorithm is then finished .
  • the formulation of the optimi zation problem as QUBO representation has elegant properties regarding the here applied quantum concept computing within processor 6 .
  • quantum concept computing still reaches signi ficant limits .
  • the herein described approach can be further enhanced and developed in future .
  • path boxes can have more and more alternative options for communication paths , since more and more path variables can be calculated through quantum computing .
  • quantum computing be more and more applicable , a more and more increasing number of Qbits , more and more complex optimi zation problems and/or more and more non-linear constraints can be taken into consideration by the approach explained herein .
  • the herein explained approach is primarily applicable to communication networks . However, the approach can also be applied to any other networks , like railway networks , energy grids , traf fic networks , etc . in which certain "traf fic” or " load” has to be transmitted throughout the network over optimi zed paths .

Abstract

The invention pertains to a computer-implemented method for optimizing a usage distribution in a communications network (1) by using a quantum concept processor (6). A set of traffic demands for a transfer of determined data volumes between origin nodes (o) and destination nodes (d) among the plurality of communication nodes (2) is captured. The traffic demands (5) are split into sub-demands (7, p). A set of optional communication paths (k) for an individual routing of each sub-demand (7, p) is specified. The edges (e) within the set of optional communication paths (k) are assigned a respective usage capacity limit. Fractional capacity usages of the edges (e) are calculated based on the respective usage capacity limit. Then, the calculated fractional capacity usages are formulated as terms of a quadratic stress function. An optimized routing is determined by using a quantum concept processor (6), thereby selecting for each sub-demand (7, p) one communication path (k) from the set of optional communication paths (k), such that the quadratic stress function is minimized.

Description

Description
Method for optimi zing a usage distribution in a communications network
The invention pertains to a computer-implemented method for optimi zing a usage distribution in a communications network in which data traf fic is routed, wherein the communications network has a plurality of communication nodes which are connectable over edges ( links ) of communication paths for a routing of the data traf fic . The invention also pertains to a quantum concept processor configured for performing such a method as well as a computer program implemented to perform such a method .
Today' s demands regarding data traf fic in communications networks increase dramatically in these times . With the recent introduction of 5G, more and more devices and applications push data traf fic to new peaks . Moreover, the increasing demand of digiti zed and decentrali zed working as well as increasing streaming demands in the domestic environment of private households are other big contributors to this trend . These increasing amounts of data being transported through communications networks like the internet impose a signi ficant challenge to Service Providers . To avoid congestion of communications networks and degradation of user experience , traf fic engineering techniques can be deployed to complement the comparatively slow and expensive expansion of network infrastructure .
The most widely deployed engineering techniques for data traf fic management in communications networks operate on the premise of communication paths that are computed with respect to link weights. These weights are often related to link capacities, i.e., the maximum amount of data per unit time that can be routed over a link from a starting node to an end node connected by that link respectively edge. The final routing from a origin node to an destination node of the data streams, under the consideration of interim nodes and given links or edges, is based on the identified paths of the shortest paths found. As a result, the most straight-forward and practically oriented technique to guide traffic demands is by manipulation of these link weights that can also be called link metrics or Interior Gateway Protocols (IGP) metrics. The higher the link weight of an edge, the higher the probability of data being routed over the respective edge. Following this approach, in a reactive manner, link weights are adapted locally whenever a certain link tends to be overloaded. In a more systematic manner, the problem has been further dealt with by applying linear integer computer programs, where the optimization targets are the minimization of the maximal link capacity usage in the network. The task of finding a globally optimal set of metrics, however, is very complex. In terms of computational complexity this task is NP-hard. This is because each link metric potentially impacts a large number of communication paths.
The linear optimization techniques applied so far quickly reach their limits when actual non-linear conditions are taken into account, like redundancies, geographical subgroups or subdomains (e.g. European network and US network considered in one model) , inclusion of satellites, Quality of Service, QoS, relationships, etc. Moreover, the known techniques often lead to the problem of unused capacity usage and overloads of link capacities in communication paths within a network, where many links are close to their capacity limit.
The problem of the present disclosure, therefore, lies in providing enhanced techniques that allow for an optimized utilization of communication paths within a communications network with respect to capacity limits, thereby achieving an optimized routing.
This problem is solved by a method according to claim 1. Further implementations are described in the dependent claims and in the following description.
The method is a computer-implemented procedure for optimizing a usage distribution in a communications network in which data traffic is routed, wherein the communications network has a plurality of communication nodes. The communication nodes are connected by edges of the communications network. A series of edges yields a communication path for a routing of the data traffic. Hence, an edge of a communication path in this context describes a connection between two adjacent nodes within a communication path.
The method comprises the following steps:
Capturing a set of traffic demands, each traffic demand specifying a transfer of a determined data volume from an origin node to a destination node among the plurality of communication nodes,
Splitting the traffic demands into sub-demands, Speci fying a set of optional communication paths for an individual routing of each sub-demand, wherein the edges within the set of optional communication paths are assigned a respective usage capacity limit ,
Calculating, for each sub-demand, fractional capacity usages of the edges within the set of optional communication paths , the fractional capacity usages being calculated based on the respective usage capacity limit ,
Formulating the calculated fractional capacity usages as terms of a quadratic stress function,
Determining, by using a quantum concept processor, an optimi zed routing by selecting for each sub-demand one communication path from the set of optional communication paths , such that the quadratic stress function is minimi zed .
This method reliably tackles the problem of routing network demands in a communications network along optimi zed communication paths such that the overall capacity in the network is optimally used, thereby avoiding that link capacities in the network are exceeded .
By applying the method, for every given sub-demand from the traf fic demands , one optimal option for a communication path from the set of optional communication paths can be selected . The selection is chosen such that the capacity of all edges ( links ) in used communication paths within the network is respected as upper limit for the total volume of traf fic demands routed along them and that the average load of all communication paths within a network is minimum . Further, a minimization of a maximum link utilization (MLU) can be achieved .
"Traffic demands" in this context are modelled as 3-tuples, defining an origin node (source of a data stream) , an end node or destination node (destination of a data stream) , and the determined data traffic to be transferred between origin and destination. The focus is on providing continuous data streams over the network, which are to be modelled and routed in such a way that no data is lost during transmission by exceeding specified capacities on given transport links. Measurement for data transfer rates of such data stream requests or demands are currently specified in Gbps (Gigabit per second) .
"Sub-demands" in this context are traffic demands split into fragments. Hence, one sub-demand represents a fragment of an initial traffic demand in terms of the data volume split into a determined data volume packet.
The optional communication paths in this context are in general not subject to any restrictions with regard to routing, path length or number of intermediary nodes in the network. However, the set of optional communication paths is pre-determined regarding each sub-demand that is to be transmitted through the network. In such a pre-determination useful or suitable paths can be considered in terms of latency (shortest possible paths, fewest possible IP hops) , redundancy (the model should be redundant against failure of a connection) , Domains (e.g. EU, US) or hierarchies (core network, access networks) , etc. For example, the set of optional communication paths is a subset of possible communication paths for each traffic demand or for each respective sub-demand . The set of optional communication paths is for example stored as "path box" which can be accessed by the computer-implemented algorithm .
Advantageously, as many divergent (most diverse or disj oint ) paths as suitable are pre-selected in the path box to provide a suf ficiently large solution space for solving the quadratic stress function, i . e . finding a ( global ) minimum, by the quantum concept processor . Such pre-selection can depend on the processing performance and capacity of the quantum concept processor .
Moreover, traf fic demands in this context can theoretically be split into sub-demands with any even or uneven fragment si ze that is suitable for the practical implementation . The approach here is to split each traf fic demands into a plurality of sub-demands and to find for each sub-demand an optimal communication path through the network . In this way, the approach bases on the so-called Multi Commodity Flow Routing (MCFR) which is a kind of source routing . Such splitting of the traf fic demands can depend on the processing performance and capacity of the quantum concept processor .
By calculating, for each sub-demand, fractional capacity usages of the edges within the set of optional communication paths and formulating the calculated fractional capacity usages as terms of a quadratic stress function, a quadratic optimi zation problem can be formulated in order to deal with the complexity of the above-explained optimi zation problem . The application of such quadratic optimi zation problem has the ef fect that a quadratic stress function can be formulated which heavily penali zes a high capacity usage on individual edges of communication paths . In this way, an optimized routing is determined by selecting for each sub-demand one communication path from the set of optional communication paths, such that the quadratic stress function is minimized. The minimum of the quadratic stress function preferably is a global minimum, but can also be a local minimum.
The method, hence, has the technical effect and advantage of a uniformly minimal utilization of the network and distribution of the distance to the capacity limits within the network in order to achieve a uniformly minimal utilization of the network with respect to its capacity limits .
The underlying quadratic optimization problem, as mentioned above, is very complex. This is not only due to a potential impact of one selected communication path to other communication paths and a vast amount of data traffic to be managed between a plurality of origin nodes and destination nodes in the network. The problem is also very complex because there are many practical constraints that have to be taken into account. As more constraints are implemented, such problems become more complex and difficult to solve. This is problematic or difficult, if traffic engineering solutions are needed fast, for example as a reaction to an unexpected network failure or under consideration of further practical constraints like latency (shortest possible paths, fewest possible IP hops) , redundancy (the model should be redundant against failure of one or more/many edges, planned outages or maintenance of network links) , Domains (EU, US) or hierarchies (core network, access networks) , etc. The herein described method advantageously shows its strength compared to conventional approaches more and more, the more complex the underlying problem is . In other words , for a complex optimi zation problem taking into consideration practical constraints as explained above , the herein described method has a signi ficant strength over conventional techniques .
The herein described method makes use of an approach inspired by quantum computing . The calculation of optimi zed solutions of the quadratic stress function for determining optimi zed communication paths for all sub-demands of the set of traf fic demands is performed by a so-called quantum concept processor . As a quantum concept processor in the context of the present disclosure a processor is defined that solves a so called " I sing model" or the equivalent quadratic unconstrained binary problem . For example , this is a processor configured to solve an optimi zation problem by means of quantum annealing or quantum annealing emulation . Such a processor is for example based on conventional hardware technology, for example based on complementary metal-oxide-semiconductor ( CMOS ) technology . An example of such quantum concept processor is Fuj itsu' s digital annealer . Alternatively, any other quantum processors can be used for the herein described method, in future times also such technologies that are based on real quantum bit technologies . Further examples of such quantum concept processors are the quantum annealer of DWave ( e . g . 5000Q) , but also quantum gate computers ( IBM, Rigetti , OpenSuperQ, lonQ or Honeywell ) making use of quantum optimisation algorithms like QAOA or VQE .
In other words , a quantum concept processor as defined herein is a processor which realises the concept of minimi zation of a so-called quadratic unconstrained binary optimi zation ( QUBO) function, either on a special processor classic technology, a quantum gate computer or on a quantum annealer .
In at least one implementation, the method further comprises the following steps :
Speci fying a set of path variables , wherein each path variable is associated with one of the sub-demands and one communication path from the set of optional communication paths ,
Formulating, in the quadratic stress function, path terms that connect the calculated fractional capacity usages of the edges of a respective communication path from the set of optional communication paths with the path variable associated with the respective communication path from the set of optional communication paths ,
Calculating the path terms , by using the quantum concept processor, to choose for each sub-demand one communication path from the set of optional communication paths , such that the quadratic stress function is minimi zed .
In this way, for each sub-demand an optimal routing between an origin node and a destination node on one selected communication path along a concatenation of connections between adj acent nodes in the network can be calculated individually . This of fers an elegant implementation of a very flexible and variable routing of data traf fic, in particular under consideration of the MCFR approach as explained above . Hence , di f ferent communication paths for di f ferent subdemands ( e . g . via di f ferent intermediary nodes ) can be selected in order to avoid overloads or critical increase of the capacity usage at respective edges of communication paths in the network and to distribute the overall capacity usage throughout the network in an optimi zed manner .
The connection of calculated fractional capacity usages of the edges within optional communication paths with path variables associated with respective communication paths allows for the calculation of an optimi zed solution (minimum) of the quadratic stress function for all sub-demands . In this way, an optimi zed selection of one path out of the path box for each sub-demand can be achieved to ful fil the aboveexplained optimi zation problem . Hence , an impact of a selected communication path for one sub-demand to other possible communication paths for other sub-demands can be mitigated . This allows for a very high degree of freedom in the routing, which nevertheless is very complex to solve . An optimi zed selection of respective paths from the path box for all sub-demands is performed by the quantum concept processor, as explained above .
In at least one implementation of the method, the path terms are calculated under consideration of a path condition that each sub-demand is routed along exactly one communication path from the set of optional communication paths . Such path condition forms a constraint or "boundary" for the method such that each sub-demand can only be assigned to exactly one path out of the path box . This avoids undesirable solutions and guarantees that a routing of each sub-demand is suf ficiently considered .
In at least one implementation of the method, the traf fic demands are split into sub-demands with determined discrete data volumes . The sub-demands can each have an equal si ze or different sizes, depending on the implementation and practical considerations. For example, a traffic demand with a volume size of 1000 Gbit/s is split into a plurality of sub-demands with even sizes of 50 Gbit/s. Alternatively, subdemands with different sizes are generated, wherein different sub-demands may have for example different sizes of 50, 100, and 250 Gbit/s. A splitting of the traffic demands into subdemands with determined discrete data volumes has the effect of a practically implementable algorithmic procedure within the network and helps keeping control of stable and reliable data streams. In this way, such approach is a kind of discrete MCFR approach.
In at least one implementation of the method, the quadratic stress function is formulated under consideration of one or both of the following constraints for the set of traffic demands or for the respective sub-demands: organization of the communications network in different network domains, latency of the communications network.
By considering such constraints in the formulation of the quadratic stress function, solutions of the optimization problem can be penalized that contravene the above conditions. This enables finding suitable optimized solutions considering practical constraints of the actual network conditions of the communications network.
In at least one implementation of the method, the set of optional communication paths for an individual routing of each sub-demand is specified under consideration of one or more of the following constraints: one or more redundant optional communication paths associated with a sub-network of the communications network organi zation of the communications network in di f ferent network domains , latency of the communications network .
This has the advantageous ef fect that the calculation of an optimi zed routing can react to and compensate a failure in a zone , segment or sub-network within the communications network, consider di f ferent domains of the network and/or react to and compensate a latency in the network . This also gives further additional degrees of freedom that allow for respective sub-networks , domains and latency to be emphasi zed in the calculation of an optimi zed routing of all subdemands . For example , certain zones or regions in the communications network can have greater signi ficance , importance or use density than other zones or regions . This can be countered by such measures . Also , the communications network can be segmented into di f ferent sub-networks to better handle di f ferent latency requirements in this regard .
In at least one implementation of the method, the set of optional communication paths for an individual routing of each sub-demand is speci fied such that for topologically near origin and destination nodes a smaller number of optional communications paths is selected than for topologically distant origin and destination nodes . This has the advantage that all possible combinations and options for communication paths can be condensed to a suitable number of optional paths in the path box for each respective sub-demand . For topologically near origin and destination nodes a smaller number of optional communications paths is suf ficient , whereas for topologically distant origin and destination nodes a higher number of optional communications paths is recommended . For near origin and destination nodes rather short paths are preferred, whereas for distant origin and destination nodes suf ficient alternative routes or detours can be taken into account . With increasing "distance" between origin and destination nodes , hence , in each case suitable and suf ficient options and alternatives can be pre-determined as optional communications paths , without over-straining the complexity of the algorithm .
In at least one implementation of the method, the quadratic stress function is formulated as a quadratic unconstrained binary optimi zation ( QUBO) function . This QUBO function serves as " input" for the quantum concept processor that solves this optimi zation problem for an optimi zed routing of all sub-demands according to the above-explained method . Generally speaking, QUBOs are quadratic order polynomials in binary variables which are represented in a quantum concept processor as bits or quantum bits ( Q-bits hereinafter ) . In the context of the optimi zation problem of the present disclosure , the QUBO function represents the sum of potential contributions of the fractional capacity usages of respective edges within optional communication paths as a function of di f ferent Q-bits , wherein each Q-bit represents the selection of a path alternative that can assume the value " 0" or the value " 1" . In order to solve the quadratic optimi zation problem ( quadratic stress function) , the quantum concept processor runs through di f ferent settings of the di f ferent Q- bits in order to find such solution ( s ) that minimi ze the quadratic optimi zation problem . In this way, a QUBO representation of the optimi zation problem has elegant properties regarding the here applied quantum concept computing . For example , the above explained path variables are formulated in the form of such Q-bits .
In at least one implementation of the method, the quadratic stress function and the path condition, as explained above , are combined into a global QUBO function . In the global QUBO function one or more of the above-explained constraints can be considered . In this regard, one or more of the aboveexplained constraints can be weighted within the QUBO function as soft constraints . This has the advantage that the QUBO function can be somewhat fine-tuned depending on the focus of the optimi zation problem either on the optimi zation of the uni form capacity usage distribution throughout the network or on the ful filment of one or more of the mentioned ( soft ) constraints .
The above-mentioned problem is also solved by a quantum concept processor as claimed in the enclosed claims . The quantum concept processor is configured for performing one or more steps of a method as described above . According to an exemplary implementation, the quantum concept processor is a digital annealing processing unit . This unit can be specially configured to perform quantum annealing or a quantum annealing emulation as explained above . The quantum concept processor can be of any type explained above .
Moreover, the above-mentioned problem is also solved by a computer program comprising instructions that , when the program is executed by one or more processors , cause each of the one or more processors to perform one or more steps of a method as described above . At least one of these processors is e . g . a quantum concept processor as explained above . Other processors can be configured for processing, by executing the computer program, preparatory or iterative steps of or for a method as explained above .
Moreover, the above-mentioned problem is also solved by a workplace for a network planner, configured for veri fying an optimi zed routing determined by a method as described above . Such a workplace , for example , has veri fication means that are configured for an ( automated or semi-automated) veri fication of an optimi zed routing determined by a method as described above . This serves a network planner to veri fy optimi zation results found by a method as described above . The veri fication means can be implemented in software and/or hardware . For example , the workplace can communicate or be connected to a system comprising a quantum concept processor that performs the method as described above . The results can then be taken over into the workplace .
Moreover, the above-mentioned problem is also solved by an interface arrangement comprising one or more interfaces to a plurality of communication nodes of a communications network in which data traf fic is routed, wherein the interface arrangement is configured to automatically deploy an optimi zed routing determined by a method as described above to the communication nodes of the communications network . In this way, an optimi zed routing determined by a method as described above can be ( automatically or semi-automatically ) be deployed to a plurality of communication nodes of a respective communications network . For example , the interface arrangement can communicate or be connected to a workplace as describe above or to a system comprising a quantum concept processor that performs the method as described above . The results can then be taken over into the interface arrangement . Moreover, as preparatory measure for one or more of the above-explained steps of the computer-implemented procedure , an interface can be implemented or used for reading out parameters from the communications network before a respective optimi zation and for inputting such parameters into the explained computer-implemented optimi zation procedure . The parameters for example comprises a network configuration, adj acency information for a graph description of the network, available capacities in the network and traf fic demands to be expected .
Any aspects , features , ef fects and measures described alone or in combination with each other in the context of the method explained above can be applied to or find analogous representation in aspects , features , ef fects and measures described alone or in combination with each other in the context of the quantum concept processor or the computer program explained above , and vice versa .
The invention is further described below under consideration of several implementations with the aid of multiple drawings .
Figure 1 shows an exemplary configuration of a communications network with exemplary routings of traf fic demands following a conventional approach .
Figure 2A shows an exemplary configuration of a communications network with exemplary routings of traf fic demands following an alternative approach . Figure 2B shows an exemplary configuration of a communications network with exemplary routings of traf fic demands following an approach according to the invention .
Figure 3 shows an exemplary schematic illustration of optional communication paths for a routing of traf fic demands between origin and destination nodes .
Figures 4A and 4B show exemplary mathematical formulations of partial optimi zation problems following an approach according to the invention .
Figure 5 shows an exemplary schematic illustration of an algorithm performing an approach according to the invention .
Figure 1 shows an exemplary configuration of a communications network 1 with exemplary routings of traf fic demands 5a, 5b and 5c following a conventional approach . The communications network 1 comprises a plurality of communication nodes 2 , wherein a connection 4 between two adj acent communication nodes 2 is called an edge . This is exemplarily illustrated between the communication node 2 and another communication node 2c, which can communicate with each other over the connection 4 . Depending on the historically grown configuration and implementation of the communications network 1 , several communication nodes 2 are aggregated into so-called aggregation nodes 3 . As exemplarily illustrated in Figure 1 , the communication node 2a is aggregated within aggregation node 3a, whereas other communication nodes 2b, 2d and 2e are aggregated in the aggregation node 3b, for example .
The communication nodes 2 are for example so-called label edge routers ( LER) for routing incoming and outgoing data traf fic within the network 1 . The aggregation nodes 3 are called Meta nodes and are aggregation zones of LERs in a certain region of the network 1 . For example , the aggregation nodes 3 are centrali zed aggregation zones of determined economic areas or cities between which a communication shall take place . In other applications , the aggregation nodes 3 can for example be entities of an industry network or of a traf fic network, etc .
The communication network 1 , in general , is part-mashed . This means that not all of the communication nodes 2 are connected or connectable with all other communication nodes 2 . Instead, there are only several connections 4 ( see dotted connections ) between several communication nodes 2 implemented in the network 1 , which, for example , came from historical evolution of the network 1 . The connections 4 between respective communication nodes 2 are for example implemented by fibre optic connections . However, other technologies like radio technologies ( e . g . 5G) or copper/DSL technologies are applicable as well , in general .
As explained above , Figure 1 illustrates a certain scenario of traf fic demands 5a, 5b and 5c, according to which certain data volumes have to be trans ferred between respective communication nodes 2 within the network 1 . As exemplarily illustrated, a first traf fic demand 5a is between the communication node 2a within aggregation node 3a and another communication node 2 f within aggregation node 3d . A second traffic demand 5b is between a communication node 2e within aggregation node 3b and again communication node 2f within aggregation node 3d. A third traffic demand 5c is between the communication node 2c within aggregation node 3c and again communication node 2f within aggregation node 3d. Each traffic demand 5a, 5b and 5c, hence, defines a determined volume to be transferred from an origin node to a destination node. In the exemplary scenario according to Figure 1 the origin node for traffic demand 5a is the communication node 2a, whereas the destination node for the traffic demand 5a is the communication node 2f. Analogously, for traffic demand 5b the origin node is communication node 2e and the destination node is communication node 2f. Further analogously, for traffic demand 5c the origin node is communication node 2c and the destination node is again communication node 2f.
In an alternative implementation, traffic demands can be defined as demands between aggregation nodes 3, irrespective on which internal communication node 2 within a respective aggregation node 3 the communication starts or ends. For example, the demands 5a, 5b and 5c can be defined as demands between the aggregation nodes 3a and 3d (demand 5a) , aggregation nodes 3b and 3d (demand 5b) and aggregation nodes 3c and 3d (demand 5c) . In such implementation, there is a "virtual" edge between the respective aggregation node and its internal communication nodes, wherein the virtual edge has a very high capacity. This leads to the effect that it does not play a significant role, on which internal communication node 2 within a respective aggregation node 3 the communication starts or ends.
Each traffic demand 5a, 5b and 5c burdens the network 1 with a usage of the network's capacity, i.e. the capacity of respective connections 4 of potential communication paths between the respective communication nodes 2 in the network 1. In the exemplary scenario of Figure 1 the traffic demand 5a is transferred from communication node 2a to communication node 2f via the communication nodes 2b, 2c, 2d, 2e, and 2f. In parallel, the traffic demand 5b is transferred simply over the connection 4 between the communication nodes 2e and 2f. Moreover, the traffic demand 5c is transferred from communication node 2c to communication node 2f via the communication nodes 2d, 2e, and 2f. In this scenario, mainly two drawbacks occur. A first drawback lies in the communication paths for the transfer of the traffic demands 5a and 5c being long and rather complicated paths through the network 1. These transfers embed a plurality of communication nodes 2 and connections 4 in the network 1 for transferring the traffic demands 5a and 5c, which can have significant impact on other transfers in the network. A second drawback lies in the fact that all three traffic demands 5a to 5c are finally transferred over the connection 4 between the communication nodes 2e and 2f. Hence the link capacity of the connection 4 between the nodes 2e and 2f is loaded to a significant extent. This may lead to a failure or an overload of the connection 4 between nodes 2e and 2f, resulting in increased latency or loss of data, etc.
Figure 2A shows an exemplary configuration of the communications network 1 with exemplary routings of traffic demands 5a, 5b and 5c (see above) following an alternative approach. In the scenario according to Figure 2A, for the traffic demand 5a an alternative path is chosen such that traffic demand 5a is transferred on an alternative communication path starting again in communication node 2a and following the communication nodes 2b, 2d, 2e and 2f. The alternative path is , for example , selected by manipulation of link weights of connections 4 in the network 1 .
The scenario according to Figure 2A has the advantage over the scenario of Figure 1 that the communication path for the trans fer of the traf fic demand 5a has become closer to a short path strategy, thereby keeping the number of involved communication nodes 2 and connections 4 in the network 1 low ( at least lower than in the scenario of Figure 1 ) in order to reduce the impact on other trans fers . However, also in the scenario of Figure 2A the other drawback remains , according to which the connection 4 between the nodes 2e and 2 f is still heavily loaded with all three traf fic demands 5a to 5c going over this connection of the network 1 .
Figure 2B shows an exemplary configuration of the communications network 1 according to Figures 1 and 2A, but now with exemplary routings of the traf fic demands 5a to 5c following an approach according to the invention . In the scenario of Figure 2B a plurality of optimi zed communication paths regarding the data volumes of all three traf fic demands 5a to 5c are selected . In this regard, the traf fic demands 5a to 5c all have been split into a plurality of sub-demands , each sub-demand representing a discrete fragment of the data volume of an associated one of the traf fic demands 5a to 5c . This is illustrated in Figure 2B with the traf fic demands 5a to 5c being only indicated by dashed arrows . Hence , according to the implementation of Figure 2B, for each traf fic demand 5a to 5c there is not only one single prescribed path, but a plurality of ( di f ferent and separate ) paths regarding each sub-demand of each traf fic demand 5a to 5c . The scenario according to Figure 2B, hence , trans fers the overall data volumes of the traf fic demands 5a to 5c split into a plurality of fragments ( sub-demands ) on very di f ferent communication paths from respective origins to respective destinations through the network . This approach, hence , follows a discrete MCFR approach . The real value of the scenario according to Figure 2B lies in the fact that the overall data volume of all traf fic demands 5a to 5c, is distributed throughout the network, thereby avoiding that signi ficant load is trans ferred over single segments in the network which can heavily burden single connections 4 in the network .
Hence , the scenario of Figure 2B solves the drawbacks of the approaches according to Figures 1 and 2A, thereby achieving a reduced impact and influence between trans fers of di f ferent traf fic demands 5a to 5c as best as possible together with a uni form and optimi zed distribution of the overall capacity usage of the connections 4 in the network 1 for all traf fic demands 5 that have to be trans ferred in the network 1 .
In the following, the implementation of the approach according to Figure 2B is further explained in detail .
The optimi zation problem to be solved lies in determining an optimi zed routing through the network 1 by selecting for each sub-demand as fragment of a respective traf fic demand 5 one communication path from a set of optional communication paths , such that a mathematically formulated quadratic stress function ( core optimi zation problem) is minimi zed . This serves the purpose of choosing for all sub-demands of all traf fic demands 5 in the network 1 respective communication paths with the ef fect that the overall capacity usage of connections 4 within the network 1 can be uni formly minimi zed over the network 1 . This avoids connections 4 to be heavily burdened or overloaded, whereas a minor load of other connections 4 could lead to signi ficantly lower such stress .
In order to achieve the above advantageous ef fect , a computer-implemented algorithmic method for optimi zing the routing within the communication network 1 is implemented . This is explained in the following .
Figure 3 shows a schematic illustration of optional communication paths kl and k2 for a routing of fragments ( sub-demands ) of traf fic demands between an origin node o and a destination node d . Determined data volume packets of a plurality of sub-demands ( into which a traf fic demand o , d is split ) are to be trans ferred between o and d . The core optimi zation problem now lies in choosing and determining optimally distributed communication paths for all sub-demands between o and d such that an overall capacity usage of connections within optional communication paths are minimi zed such that the overall usage of the capacities in the network is uni formly minimi zed within the network .
According to Figure 3 , the set of optional communication paths kl and k2 is speci fied in advance . This can be done through application of any suitable path planning algorithm that calculates optional communication paths between the origin node o and destination node d for each sub-demand to be trans ferred . As exemplarily illustrated in Figure 3 , path kl goes from o over an intermediate node i l to d . Path k2 goes from o over another intermediate node 12 to d . These are optional communication paths for a routing of data traf fic included in each sub-demand between the origin o towards the destination d . The planned paths kl , k2 can be stored in advance in the form of a path box that can be accessed by the algorithm for selecting for each sub-demand one path out of the path box .
Figure 3 further illustrates two exemplary connections that are further referenced to as edges el and e2 and that lie in the optional communication paths kl , k2 . The edge el is configured between the intermediate node i l and the destination d, whereas the edge e2 is configured between the intermediate node 12 and the destination d .
Let ' s exemplarily assume , based on the path box kl , k2 , di f ferent options for a routing of two sub-demands between the origin o and the destination d . One option for the routing per sub-demand is path kl such that the data traf fic is trans ferred over edge el . The other option for the routing per sub-demand is path k2 such that the data traf fic is trans ferred over edge e2 . As can be seen from these di f ferent options for a routing of the data traf fic per sub-demand, there are combinations of communication paths for each of the two sub-demands , wherein the two edges el and e2 each are burdened with one sub-demand only . This is , for example , given with one sub-demand going path kl and the other subdemand going path k2 . However, there are also possible combinations of communication paths wherein one of the edges el and e2 is signi ficantly and heavily loaded with both subdemands , whereas the other of the two edges el and e2 is not used at all . This is given with both sub-demands going the same path kl or k2 .
The latter combinations have the signi ficant drawback that the capacity usage of one of the edges el and e2 is significantly higher, which may result in an overload or failure of the respective edge. Hence, the optimization problem lies in determining and selecting distributed communication paths for all sub-demands between o and d such that the overall capacity usage is distributed over both edges el and e2.
For solving this optimization problem, fractional capacity usages of all edges within the set of the optional communication paths kl, k2 are calculated for the whole set of sub-demands into which all traffic demands are split. As exemplarily given in Figure 3, such measure includes the calculation of fractional capacity usages of each of the edges el and e2 for each of the sub-demands between o and d. "Fractional capacity usages" of the respective edges means that based on the respective usage capacity limit of each edge, the fraction of the capacity usage is calculated that is required for each sub-demand to be transmitted over this edge .
For example, with regard to Figure 3, let's assume that each sub-demand between o and d requires half of the maximum usage capacity of each edge el and e2 (i.e. 50% of the capacity) when passing over the respective edge. This means that an edge el and e2 is burdened with half of its usage capacity for each sub-demand between o and d when the respective subdemand passes over the respective edge. In other words, if one sub-demand goes over path kl and the other sub-demand goes over path k2, the edges el and e2 both are burdened with 50% of their usage capacity limit. Otherwise, if both subdemands go over one and the same path kl or k2, then the respective edge el (for kl) or e2 (for k2 ) is fully and completely burdened (2x50% = 100%) , thereby reaching its capacity limit , resulting in a utili zation of the entire edge capacity .
Such calculations of fractional capacity usages are performed for all remaining edges lying within the optional communication paths kl and k2 in the scenario of Figure 3 .
The calculated fractional capacity usages are then formulated as terms of a quadratic stress function which is further explained in detail below and in view of Figure 4B .
Figures 4A and 4B show exemplary mathematical formulations of partial optimi zation problems following the approach as explained above with regard to the Figures 2B and 3 . The mathematical formulations of Figures 4A and 4B are represented as so-called Hamiltonian functions , short Hamiltonians .
The mathematical formulation of Figure 4A formulates a path condition according to which each sub-demand between respective origins and destinations ( o , d) is to be routed along exactly one path k out of the path box P ( k 6 P ) . This means for the scenario of Figure 3 that each sub-demand between o and d either goes over kl or over k2 .
The mathematical formulation in Figure 4A is formulated as summed terms of binary variables that can assume the
Figure imgf000028_0001
value " 0" or the value " 1" ( or both with a certain probability) and are represented in a quantum concept processor as bits ( or Q-bits as used hereinafter ) . For each optional path k 6 P and considering each sub-demand with the packet si ze p from an origin o to a destination d, a respective Q-bit can be set as path variable . The
Figure imgf000028_0002
respective Q-bit is set to the value " 1" i f a respective
Figure imgf000029_0001
sub-demand goes over the respective communication path k, and set to the value " 0" , i f not . Considering the formulation of the Hamiltonian of Figure 4A, the Hamiltonian must be equal to " 0" . This is only ful filled i f for each sub-demand p exactly one path k G P is chosen such that only one path variable assumes the value " 1" and all other path
Figure imgf000029_0002
variables for other paths have the value " 0" . Otherwise ,
Figure imgf000029_0003
i f none or more than one path k would be chosen, the condition in Figure 4A would not be ful filled . The path condition, mathematically formulated as Hamiltonian in Figure 4A has the ef fect that exactly one communication path k must be chosen for each sub-demand p in order to consider this sub-demand p for the overall calculation of an optimi zed routing of all sub-demands in the network .
The mathematical formulation of the Hamiltonian according to Figure 4B represents the core optimi zation problem that is formulated as a quadratic stress function taking into account the calculated fractional capacity usages of the edges e out of all edges E in the network ( e G E ) , the edges e lying within the set of optional communication paths k 6 P for all traf fic demands o , d . Hence , the core optimi zation problem here lies in minimi zing the Hamiltonian according to Figure 4B in order to find optimi zed communication paths for all sub-demands p to be transmitted within the network .
Assuming that the expression in Figure 4A is satis fied, the Hamiltonian of Figure 4B considers summed terms for each edge e within an optional communication path k considering all sub-demands p between all origins o and destinations d . Thus , the QUBO of Figure 4B then sums all calculated fractional capacity usages of all edges e that are part of
Figure imgf000030_0001
optional communication paths k. here represents the volume of a respective sub-demand p and ce represents the capacity of the respective edge e. The fractional capacity usages are connected with the respective Q-bits (path
Figure imgf000030_0002
variables) into path terms. As explained above, the Q-
Figure imgf000030_0003
bits can assume either the value "0" or the value "1"
Figure imgf000030_0004
depending on whether an optional path associated with a respective Q-bit is taken into account or not.
Figure imgf000030_0005
Considering the scenario of Figure 3 for two sub-demands pl, p2 and the two edges el and 2 exemplary, the Hamiltonian according to Figure 4B may have the following expression:
Figure imgf000030_0006
Under the assumption that each sub-demand pl, p2 burdens a respective edge el, e2 with half of its capacity (50%) , as explained above, the above term reaches a minimum, if pl and p2 are routed over different paths kl, k2. Then, the above term is:
Figure imgf000030_0007
Otherwise, if pl and p2 are routed over one common path kl or k2 (and the other path is not used) , the above term is:
Figure imgf000030_0008
Hence , the costs/ stress for the network is higher in the latter solution, which is worse over the above solution .
The above example shows that a choice of di f ferent paths kl , k2 for the two sub-demands pl , p2 is the preferred solution for achieving the optimi zation target of a distribution of the overall capacity usage throughout the network .
The Hamiltonian of Figure 4B is generally solved for all subdemands in a network by a quantum concept processor that runs through di f ferent settings of values for the respective Q- bits thereby calculating the respective result of the
Figure imgf000031_0001
Hamiltonian . The target of doing so is to find the minimum of the Hamiltonian for respectively set values of Q-bits As
Figure imgf000031_0002
soon as a respective minimum of the Hamiltonian of Figure 4B is found, the respective values of the Q-bits x leading to
Figure imgf000031_0003
this minimum are stored and finally define respective communication paths of respective sub-demands . This is due to the fact that each Q-bit defines one communication path
Figure imgf000031_0004
for each sub-demand p as explained above . Hence , by calculating a minimum of the Hamiltonian of Figure 4B by using a quantum concept processor, an optimi zed routing is calculated by selecting for each sub-demand p one communication path k from the set of optional communication paths .
Figure 5 shows an exemplary schematic illustration of an algorithm performing the approach as explained above . Figure 5 shows the processing of the above explained method steps and procedure considering the set of traf fic demands 5 . The traf fic demands 5 each are split into respective sub-demands 7 with a determined discrete packet si ze . The pre-processed sub-demands 7 are then input to an algorithmic procedure within the quantum concept processor 6 . For example , the quantum concept processor 6 according to Figure 5 is configured to solve the optimi zation problem by means of quantum annealing emulation . The quantum concept processor 6 applies the mathematical formulation of the overall optimi zation problem according to Figures 4A and 4B . The quantum concept processor 6 then calculates for the subdemands 7 an optimi zed routing solution of the optimi zation problem according to Figure 4B under consideration of the constraint according to Figure 4A.
After the algorithmic procedure is completed, the finally calculated minimum of the optimi zation problem according to Figure 4B is then output from the quantum concept processor 6 for the respective sub-demands 7 . The determined communication paths k according to the found optimum of the optimi zation problem are then stored for the sub-demands 7 . The algorithm is then finished .
Hence , by applying a computer-implemented algorithmic procedure according to Figure 5 , which bases on the implementations and explanations above with regard to Figures 2B to 4B, an optimi zed routing can be provided for all subdemands of all traf fic demands over individually selected communication paths through a communication network 1 .
The formulation of the optimi zation problem as QUBO representation has elegant properties regarding the here applied quantum concept computing within processor 6 . Nowadays , quantum concept computing still reaches signi ficant limits . However, with computer science more and more developing towards quantum computing, the herein described approach can be further enhanced and developed in future . For example , when quantum computing is more and more applicable for increasing complexities of underlying optimi zation problems , path boxes can have more and more alternative options for communication paths , since more and more path variables can be calculated through quantum computing . Moreover, with quantum computing be more and more applicable , a more and more increasing number of Qbits , more and more complex optimi zation problems and/or more and more non-linear constraints can be taken into consideration by the approach explained herein .
The herein explained approach is primarily applicable to communication networks . However, the approach can also be applied to any other networks , like railway networks , energy grids , traf fic networks , etc . in which certain "traf fic" or " load" has to be transmitted throughout the network over optimi zed paths .
The embodiments illustrated and explained herein are merely exemplary .
List of reference signs
1 communications network
2, 2a-2f communication nodes 3, 3a-3f aggregation nodes
4 connections between adjacent nodes
5 set of traffic demands
5a-5c traffic demands
6 quantum concept processor 7 sub-demands d destination node e, el, e2 edges il , 12 intermediary nodes o origin node
P sub-demands with certain size p k, kl, k2 potential communication paths

Claims

Claims
1. Computer-implemented method for optimizing a usage distribution in a communications network (1) in which data traffic is routed, wherein the communications network (1) has a plurality of communication nodes (2) which are connectable over edges (4) of communication paths for a routing of the data traffic, wherein the method comprises the following steps :
Capturing a set of traffic demands (5) , each traffic demand (5a-5c) specifying a transfer of a determined data volume from an origin node (o) to a destination node (d) among the plurality of communication nodes (2) , Splitting the traffic demands (5a-5c) into sub-demands (7, P) , Specifying a set of optional communication paths (k) for an individual routing of each sub-demand (7, p) , wherein the edges (e) within the set of optional communication paths (k) are assigned a respective usage capacity limit, Calculating, for each sub-demand (7, p) , fractional capacity usages of the edges (e) within the set of optional communication paths (k) , the fractional capacity usages being calculated based on the respective usage capacity limit, Formulating the calculated fractional capacity usages as terms of a quadratic stress function, Determining, by using a quantum concept processor (6) , an optimized routing by selecting for each sub-demand (7, p) one communication path (kl, k2 ) from the set of optional communication paths (k) , such that the quadratic stress function is minimized.
2. The method according to claim 1, further comprising the following steps:
Specifying a set of path variables, wherein each path variable is associated with one of the sub-demands (7, p) and one communication path (kl, k2 ) from the set of optional communication paths (k) , Formulating, in the quadratic stress function, path terms that connect the calculated fractional capacity usages of the edges (e) of a respective communication path (kl, k2 ) from the set of optional communication paths (k) with the path variable associated with the respective communication path (kl, k2 ) from the set of optional communication paths (k) , Calculating the path terms, by using the quantum concept processor (6) , to choose for each sub-demand (7, p) one communication path (kl, k2 ) from the set of optional communication paths (k) , such that the quadratic stress function is minimized.
3. The method according to claim 2, wherein the path terms are calculated under consideration of a path condition that each sub-demand (7, p) is routed along exactly one communication path (kl, k2 ) from the set of optional communication paths (k) .
4. The method according to any of claims 1 to 3, wherein the traffic demands (5) are split into sub-demands (7, p) with determined discrete data volumes.
5. The method according to any of claims 1 to 4, wherein the quadratic stress function is formulated under consideration of one or both of the following constraints for the set of traffic demands (5) or for the respective sub-demands (7, p) : organization of the communications network (1) in different network domains, latency of the communications network (1) .
6. The method according to any of claims 1 to 5, wherein the set of optional communication paths (k) for an individual routing of each sub-demand (7, p) is specified under consideration of one or more of the following constraints: one or more redundant optional communication paths (k) associated with a sub-network of the communications network ( 1 ) , organization of the communications network (1) in different network domains, latency of the communications network (1) .
7. The method according to any of claims 1 to 6, wherein the set of optional communication paths (k) for an individual routing of each sub-demand (7, p) is specified such that for topologically near origin and destination nodes (o, d) a smaller number of optional communications paths (k) is selected than for topologically distant origin and destination nodes (o, d) .
8. The method according to any of claims 1 to 7, wherein the quadratic stress function is formulated as a quadratic unconstrained binary optimization (QUBO) function.
9. A quantum concept processor (6) , in particular a digital annealing processing unit or a quantum annealing processing unit, configured for performing one or more steps of a method according to any of claims 1 to 8.
10. A computer program, the computer program comprising instructions that, when the program is executed by one or more processors, cause each of the one or more processors to perform one or more steps of a method according to any of claims 1 to 8.
11. A computer-readable storage medium on which the computer program of claim 10 is stored.
12. A workplace for a network planner, configured for verifying an optimized routing determined by a method according to any of claims 1 to 8.
13. An interface arrangement comprising one or more interfaces to a plurality of communication nodes (2) of a communications network (1) in which data traffic is routed, wherein the interface arrangement is configured to automatically deploy an optimized routing determined by a method according to any of claims 1 to 8 to the communication nodes (2) of the communications network (1) .
PCT/EP2022/075647 2021-09-20 2022-09-15 Method for optimizing a usage distribution in a communications network WO2023041645A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
DE102021004716 2021-09-20
DE102021004716.8 2021-09-20
EP21205005.8A EP4152727B1 (en) 2021-09-20 2021-10-27 Method for optimizing a usage distribution in a communications network
EP21205005.8 2021-10-27

Publications (1)

Publication Number Publication Date
WO2023041645A1 true WO2023041645A1 (en) 2023-03-23

Family

ID=83598547

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2022/075647 WO2023041645A1 (en) 2021-09-20 2022-09-15 Method for optimizing a usage distribution in a communications network

Country Status (1)

Country Link
WO (1) WO2023041645A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170286852A1 (en) * 2016-03-30 2017-10-05 1Qb Information Technologies Inc. Method and system for solving a minimum connected dominating set problem using quantum annealing for distance optimization
US20200396154A1 (en) * 2017-12-21 2020-12-17 Telefonaktiebolaget Lm Ericsson (Publ) Methods, Apparatus and Computer Programs for Allocating Traffic in a Telecommunications Network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170286852A1 (en) * 2016-03-30 2017-10-05 1Qb Information Technologies Inc. Method and system for solving a minimum connected dominating set problem using quantum annealing for distance optimization
US20200396154A1 (en) * 2017-12-21 2020-12-17 Telefonaktiebolaget Lm Ericsson (Publ) Methods, Apparatus and Computer Programs for Allocating Traffic in a Telecommunications Network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JUEXIAO SU ET AL: "Fast Embedding of Constrained Satisfaction Problem to Quantum Annealer with Minimizing Chain Length", 20170618; 1077952576 - 1077952576, 18 June 2017 (2017-06-18), pages 1 - 6, XP058367890, ISBN: 978-1-4503-4927-7, DOI: 10.1145/3061639.3062246 *

Similar Documents

Publication Publication Date Title
Poularakis et al. One step at a time: Optimizing SDN upgrades in ISP networks
US7916657B2 (en) Network performance and reliability evaluation taking into account abstract components
US7869359B2 (en) Method and system for controlling data traffic in a network
JP6527584B2 (en) Active network fault handling
US8812279B2 (en) Apparatus and method for determining optimum paths in a multi-layer network using a routing engine
Muthumanikandan et al. Link failure recovery using shortest path fast rerouting technique in SDN
US20140126370A1 (en) Method of Traffic Engineering for Provisioning Routing and Storage in Content-Oriented Networks
CN104254838A (en) Method and apparatus for a distributed file system in a cloud network using file chunking and replication
Shvedov et al. Determining shortest paths between two arbitrary nodes in a composite transport network using segment routing
Jiang et al. PCF: provably resilient flexible routing
Zhang et al. An optimal design of multi-protocol label switching networks achieving reliability requirements
Masri et al. A multi-start variable neighborhood search for solving the single path multicommodity flow problem
Montana et al. Adaptive reconfiguration of data networks using genetic algorithms
US10635774B2 (en) Integrated circuit design
Tsai et al. Enabling efficient and consistent network update in wireless data centers
WO2023041645A1 (en) Method for optimizing a usage distribution in a communications network
EP4152727B1 (en) Method for optimizing a usage distribution in a communications network
Beck et al. On delay-aware embedding of virtual networks
Lemeshko et al. Quality of Service Protection Scheme under Fast ReRoute and Traffic Policing Based on Tensor Model of Multiservice Network
Wu et al. A matheuristic for a telecommunication network design problem with traffic grooming
EP4152726A1 (en) Method for optimizing a routing in a communications network
WO2023041643A1 (en) Method for optimizing a routing in a communications network
Schütz A k-cover model for reliability-aware controller placement in software-defined networks
US20160259813A1 (en) System and method for optimizing selection of a replication data node in a distributed file system
JP2024517981A (en) Method for optimizing utilization distribution in a communication network - Patents.com

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22786001

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 18288744

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2023570454

Country of ref document: JP