A Robust Optimization Approach To Backup Network
A Robust Optimization Approach To Backup Network
4, AUGUST 2015
Abstract—This paper presents a scheme in which a dedicated the disrupted traffic can be rerouted onto its backup path.
backup network is designed to provide protection from random Preplanned methods of link restoration offer benefits over other
link failures. Upon a link failure in the primary network, traffic is methods in terms of speed and simplicity of failure recovery,
rerouted through a preplanned path in the backup network. We
introduce a novel approach for dealing with random link failures, as no additional dynamic routing is necessary at the time of a
in which probabilistic survivability guarantees are provided to failure [3]. In addition to designing a backup path for each link,
limit capacity overprovisioning. We show that the optimal backup preplanned link restoration requires provisioning of sufficient
routing strategy in this respect depends on the reliability of the spare capacity along each backup path to carry the load of
primary network. Specifically, as primary links become less failed links. Backup paths can share spare capacity and network
likely to fail, the optimal backup networks employ more resource
sharing among backup paths. We apply results from the field of resources to reduce the total cost of protection.
robust optimization to formulate an ILP for the design and ca- Communication networks can suffer from multiple simul-
pacity provisioning of these backup networks. We then propose a taneous failures, for example, if a second link fails before a
simulated annealing heuristic to solve this problem for large-scale first failed link is repaired. Furthermore, natural disasters or
networks and present simulation results that verify our analysis large-scale attacks can destroy several links in the vicinity of
and approach.
such events. Preplanning backup paths for combinations of mul-
Index Terms—Backup network design, random failures, robust tiple failures can be complex and impractical and can lead to
optimization.
significant capacity overprovisioning. Consequently, new ap-
proaches must be considered to offer protection against multiple
I. INTRODUCTION failures.
Spare capacity allocation for link-based protection has
1063-6692 © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
JOHNSTON et al.: ROBUST OPTIMIZATION APPROACH TO BACKUP NETWORK DESIGN WITH RANDOM FAILURES 1217
Subject To:
Since each is an i.i.d. Bernoulli random variable with pa-
rameter , is a binomial random variable with parameters
(2)
and . Furthermore, as all the primary links have unit ca-
pacity, (2) can be rewritten as
if
if
(7)
o.w.
(3)
(4)
The constraint in (3) is a standard flow conservation con-
straint for the routing of a single backup path for each primary (8)
link. The probabilistic constraint (2) is the capacity constraint,
from which the backup capacities are computed. Backup link Equation (8) uses the cumulative distribution function (CDF) of
must carry the load of each failed primary link that it pro- the binomial distribution. For each link , let be
tects. Constraint (2) restricts the probability that the load on the minimum value of satisfying (8). Clearly, the capacity
due to failures exceeds the backup capacity provisioned required on a backup link increases with the number of primary
on . This survivability metric, which considers the relia- links it protects, and it decreases as the probability of failure de-
bility of each backup link independently, is referred to as the creases. Additionally, as decreases, more capacity is required
backup-link survivability metric. There are a number of possible on each backup link.
JOHNSTON et al.: ROBUST OPTIMIZATION APPROACH TO BACKUP NETWORK DESIGN WITH RANDOM FAILURES 1219
(12)
(13)
(14)
(15)
(16)
the ratio between the total capacity of the optimal backup net-
work and that of the primary network can be upper-bounded as
the primary network size grows large by the following:
(21)
(22)
Conversely, for protection against random failures, the ratio A. Robust Optimization Formulation
in (19) can be upper-bounded using the following proposition. In the case of uniform link loads, capacity is allocated to the
Proposition 2: Assuming a fully connected primary network backup network by computing for each link .
with unit-capacity on each link and probability of link failure , The backup capacity provisioned is the number of primary link
JOHNSTON et al.: ROBUST OPTIMIZATION APPROACH TO BACKUP NETWORK DESIGN WITH RANDOM FAILURES 1221
failures protected against, as a function of , , and . How- The value of determines the probability of protection.
ever, this approach does not apply directly to nonuniform pri- While should be chosen such that (2) is satisfied, for now
mary link loads, as different links will require different capaci- we fix the value of for each link. The capacity constraint in
ties to provide protection. In order to mathematically formulate (28) replaces the probabilistic constraint in (2), leading to the
the problem for general link loads, we will use techniques from following nonlinear optimization problem.
the field of robust optimization.
Robust optimization finds a solution to a problem that best Minimize:
fits all possible realizations of the data, when that data is sub-
ject to uncertainty. In [20], the authors propose a novel formula-
tion with an adjustable level of conservatism for such problems.
Their approach is to introduce an optimization parameter and
provide sufficient capacity to support all scenarios in which any Subject To:
of the demands exceeds their mean. The solution is guaran-
teed to be robust for those scenarios and is shown to be robust
for all other scenarios with high probability, determined by .
Robust optimization techniques have been successfully if
applied to different network design problems previously if
[25]–[28]. The work in [27] applies the robust optimization o.w.
results of [20] to solve the problem of allocating capacity to (29)
support traffic uncertainty. Given an average traffic demand and
a peak power demand, the authors formulate the robust network The above is nonlinear due to the backup capacity constraint
design problem to support some of the demands reaching their in (28), but it can be reformulated as an ILP using duality tech-
peak intensity, using the fact that not all demands will reach niques similar to [20], detailed in the Appendix. The following
their peak simultaneously. In [27], the demand uncertainty is an equivalent formulation to (29):
arises due to traffic intensity variation, whereas in our paper,
the demand uncertainty on the backup network arises due to Minimize:
the uncertainty in which links will fail. The work in [26] uses
this approach to compute the realized robustness of networks
designed with a certain degree of robustness, exploring the
sensitivity the traffic parameters. The work in [25] elaborates
on this problem, determining the correct amount on peak traffic Subject To:
intensities to support to provide robustness guarantees.
A similar approach can be applied to the problem of backup
network design for general link loads, where the uncertainty is
in the number of primary links that fail. Consider allocating ca-
pacity on link to protect against any scenario where up to if
of the primary links utilizing for protection if
fail. Clearly, for the specific case of uniform loads, the required o.w.
backup capacity is just , and as shown in Section III,
is given by under the constraint in (2). For gen-
eral loads, is not the bandwidth that needs to be (30)
allocated, as in Section III, but rather the number of primary
links for which to provide protection. To extend this idea, let Clearly, if fewer than links in fail, the capacity al-
be the set of primary links protected by backup link , i.e., located in (28) will be sufficient. Therefore, the probability of
. Let be a set of primary links in insufficient backup capacity can be upper-bounded using the tail
with the largest capacities. Thus, for any , we probability of a binomial random variable
have
(31)
(26)
The backup capacity required to protect against any pri-
The capacity allocated in (27) is sufficient to meet the relia-
mary link failures is given by
bility constraint in (31) with probability if .
(27) However, is an optimization variable, on which depends.
Thus, the remaining task is to modify (30) to directly compute
the value of for each link using an ILP formulation.
In a complete form, this constraint can be expressed as
B. Complete Formulation
Since cannot be computed analytically, we create a
(28) table a priori in which the th entry equals ,
1222 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 4, AUGUST 2015
(32) if
if
o.w.
Constraint (32) enforces to be equal to 1 for only one value
of for each backup link
(39)
(33) This formulation calculates the backup paths and capacity al-
location for a dedicated backup network satisfying the surviv-
Constraint (33) ensures that the number of primary links uti- ability constraint in (2).
lizing a backup link is equal to the value of for which
C. Simulated Annealing
. Consequently, can be represented by the following:
The ILP in (39) can be directly solved for small instances,
but becomes intractable for large networks. There are a number
(34)
of heuristic approaches to solving ILPs, such as randomized
rounding, tabu search, and simulated annealing. Here, we em-
The capacity constraint of (30) is rewritten as ploy a simulated annealing approach to estimate the backup path
routing in (39).
(35) Simulated annealing (SA) is a random search heuristic that
can be used to find near-optimal solutions to optimization prob-
lems [29]. The algorithm begins with an arbitrary feasible solu-
Since the product is nonlinear, another set of opti- tion, with a cost computed with respect to an objective func-
mization variables is added to represent this product in linear tion. Then, a random perturbation is applied to the solution,
form. Let be a nonnegative variable satisfying the following and the cost is reevaluated. The new solution is probabilisti-
constraints: cally accepted based on the relationship between the two costs.
A positive probability of moving to a worse solution avoids the
(36) problem of being trapped in a local minima. SA has been used
(37) previously on network survivability problems [30].
(38) For a fixed backup path routing, the computation of the op-
timal backup capacity is straightforward. Therefore, we use
In the above equations, is a large number such that simulated annealing to estimate the backup path routing. For the
. When , then , and constraints problem in (39), the solution at each SA iteration is the backup
(37) and (38) force to 0. On the other hand, if , con- path for each primary link, and the cost is the total backup ca-
straint (36) will force , which at the optimal solution pacity, computed using (28). Perturbations are applied to this so-
will be satisfied with equality. These constraints lead to an ILP lution by randomly recomputing the backup path for a randomly
formulation for backup network design, given in (39). chosen primary link. This recomputation is done by choosing
The following is an ILP formulation for the design of a ded- random links starting from the source node and ending at the
icated backup network to protect against random failures: destination node. The current network with cost is mod-
ified by changing a single backup path, and the network cost
Minimize: is recomputed. The new backup network is accepted with
probability , where
(40)
Subject To:
Hence, better solutions are unconditionally accepted, and
worse solutions are accepted with probability . The parameter
in (40) represents the ”temperature” of the system. At high
temperatures, there is a high probability of accepting a solution
with a larger cost than the current solution. This prevents the
algorithm from getting trapped in a local minima. The temper-
ature decreases after a number of iterations depending on the
network size by , for . SA cannot escape
local minima if is too small, but high values of result in
JOHNSTON et al.: ROBUST OPTIMIZATION APPROACH TO BACKUP NETWORK DESIGN WITH RANDOM FAILURES 1223
Fig. 4. Optimal backup networks shown as solid links over dotted primary net-
works for different probabilities of link failure. Designed using . (a)
. (b) . (c) .
Fig. 6. Backup network (solid) shown for the NSFNET (dotted) with the re-
striction that the backup network must be a subgraph of the primary network.
TABLE II The primary network here assumes a probability of link failure of 0.075, and
BACKUP NETWORK CAPACITY REQUIRED FOR TOPOLOGIES DESIGNED USING the backup network is designed for .
DIFFERENT STRATEGIES. IN EACH DESIGN
Fig. 7. Backup network (solid) shown for the NSFNET (dotted) with the re-
long computation times. Eventually, becomes small enough striction that the backup network must be a subgraph of the primary network.
that the probability of accepting a worse solution approaches The primary network here assumes a probability of link failure of 0.1, and the
zero. At this point, the algorithm terminates and returns the backup network is designed for .
resulting backup network.
There are only limited theoretical results on the convergence
The table shows that for , the two-hop protection
time of SA, which is known to be highly problem-dependent.
scheme is optimal, and for , the one-hop protection
Regardless, SA approaches are widely used in practice [29]. The
scheme is optimal. Furthermore, the simulated annealing
choice of parameters leads to an inherent tradeoff between the
heuristic performs very close to optimal for different values
accuracy of SA and its convergence time. As the number of it-
of . Clearly, the optimal topology depends on the probability
erations before a temperature reduction increases, the accuracy
of link failure, and it is therefore necessary to use a different
of the SA approach improves at the expense of increased con-
backup routing scheme depending on the link failure probabil-
vergence time.
ities.
TABLE III
COMPARISON OF BACKUP NETWORKS FOR NSFNET WITH DIFFERENT
PROBABILITIES OF PRIMARY LINK FAILURE. NETWORKS WERE DESIGNED
USING . AVERAGE REFERS TO THE AVERAGE NUMBER OF
PRIMARY LINKS BEING PROTECTED BY A BACKUP LINK
TABLE IV
COMPARISON OF BACKUP NETWORKS FOR NSFNET WITH DIFFERENT
PROBABILITIES OF PRIMARY LINK FAILURE. NETWORKS WERE DESIGNED
USING . AVERAGE REFERS TO THE AVERAGE NUMBER
OF PRIMARY LINKS BEING PROTECTED BY A BACKUP LINK
Fig. 9. Backup network (solid) shown for the Sprint backbone network (dotted)
with the restriction that the backup network must be a subgraph of the primary
network. The primary network assumes a probability of link failure of
and is designed for a survivability constraint of .
TABLE V
COMPARISON OF BACKUP NETWORKS FOR NSFNET WITH DIFFERENT
ROBUSTNESS CONSTRAINTS. NETWORKS WERE DESIGNED ASSUMING
PROBABILITY OF LINK FAILURE . AVERAGE REFERS TO THE
AVERAGE NUMBER OF PRIMARY LINKS BEING PROTECTED BY A BACKUP LINK
Fig. 10. Backup network (solid) shown for the Sprint backbone network
In the backup network of Fig. 6, a total capacity of 24 is re- (dotted) with the restriction that the backup network must be a subgraph of the
quired. Most backup links protect up to five primary links. In the primary network. The primary network assumes a probability of link failure of
case of Fig. 7, where the probability of link failure is higher, a and is designed for a survivability constraint of .
total capacity of 28 is needed. The backup links in this example
protect an average of three primary links. If the probability of The simulated annealing approach can be used to solve large-
link failure increases to , the resulting backup topology scale networks as well, such as the 36-node Sprint backbone
is a mirror of the primary topology, requiring a capacity of 42. network, shown in Fig. 8. Due to the large size of the network,
As increases, the number of backup links needed rises, and the simulated annealing algorithm requires a prohibitively large
similarly the number of primary links being protected by each number of iterations to find an optimal solution. However, the
backup link falls, until the network follows the one-hop pro- number of iterations can be reduced in exchange for a less optimal
tection scheme. These results are summarized in Table III. In solution. Assume the bidirectional links in Fig. 8 represent a unit
this table, we also see that by providing probabilistic protec- of primary capacity in each direction. Again, the goal is to con-
tion, we only need to allocate roughly half the capacity needed struct a backup network consisting of links , where
for 100% protection. In Table IV, we show numerical results and are connected by a link in the primary network, to satisfy the
for smaller values of and , modeling scenarios where fail- survivability constraint in (2) with probability .
ures are less common. Additionally, in Table V, we show the The backup networks returned by the simulated annealing al-
effect of varying the probabilistic constraint on the resulting gorithm for a probability of primary link failure of
backup network. As grows, the constraint becomes more le- and are shown in Figs. 9 and 10, respectively. For a
nient, and more failures can be tolerated. Thus, we would expect small probability of primary link failure (Fig. 9), the optimal
less backup capacity to be required, as confirmed by the results backup network is made up of many cycles, where backup paths
in Table V. are potentially many hops. However, as the probability of link
JOHNSTON et al.: ROBUST OPTIMIZATION APPROACH TO BACKUP NETWORK DESIGN WITH RANDOM FAILURES 1225
Fig. 11. 14-node NSFNET backbone network with nonuniform link loads. Fig. 12. 14-node NSFNET backbone network with nonuniform link loads. Di-
Bold links represent demands of 10, and dashed links represent demands of 1. rected bold links represent a primary capacity of 10 in one direction, and of 1 in
the other direction, while dashed links represent primary capacity of 1 in both
directions.
TABLE VI
COMPARISON OF BACKUP NETWORKS FOR THE SPRINT BACKBONE WITH
DIFFERENT PROBABILITIES OF PRIMARY LINK FAILURE. NETWORKS WERE
DESIGNED USING . AVERAGE REFERS TO THE AVERAGE
NUMBER OF PRIMARY LINKS BEING PROTECTED BY A BACKUP LINK
Fig. 13. Backup network (solid) shown for the NSFNET (dotted). The backup
network must be a subgraph of the primary network. The primary network here
assumes a probability of link failure of 0.075, and the backup network is de-
signed for . Primary link capacities are distributed according to Fig. 11.
(43)
(44)
The number of links is calculated such that the probability that (47)
at least one of the links fails (and the total demand over all the Therefore, incorporating backup-link failures into the formula-
links needs to be rerouted over the backup network) is equal to tion is equivalent to solving the formulation with a modified
the probability of link failure . Applying our formulation to probability constraint ( ), as long as .
the modified network results in an upper bound on the required As an illustration, for the backup network design problem for
capacity since our formulation allocates capacity to account for the NSFNET in Table III, if , then for backup link
multiple links in series failing. However, this bound becomes failure probability , , and for backup failure
tight for small , where it is unlikely that multiples of those links probability , which is the same order as the primary link
to fail. failure probability , . Thus, for a reliability require-
The difference between the original link failure probability ment , one can solve our formulation with a slightly smaller
and the failure probability of the new links in series can be value of .
written as
C. Correlated Link Failures
As a final extension, we consider augmenting our framework
to account for correlated failures. For example, consider the
Probabilistic Shared Risk Link Group (PSRLG) model in [31],
where once an SRLG failure event occurs, the links contained in
(42) the SRLG fail independently with probability . For simplicity
JOHNSTON et al.: ROBUST OPTIMIZATION APPROACH TO BACKUP NETWORK DESIGN WITH RANDOM FAILURES 1227
of exposition, assume mutually exclusive SRLGs such that each Assuming the number of primary links satisfying
SRLG fails with probability and . Then, is larger than or equal to , the LP will choose the of them
the overflow probability at backup link can be written as with the largest capacities by setting for those links
. This corresponds to choosing the set in (27). If there
(48)
are fewer than primary links satisfying , then
for each of these links, , and the other satisfying
are chosen arbitrarily. Note, however, that this does not
affect the correctness of (51).
Let be the dual variable for the first constraint in (51), and
(49) let be the dual variables for the second set of constraints.
where is the number of primary links that belong to The dual problem of (51) is formulated as follows:
SRLG and use as backup links. We assume an empty
summation to be zero. Similar to the argument in Section IV-B, minimize
we can create a priori a table containing the values of and
use it in the MILP formulation. Note that in this case, a much subject to
larger table is needed since the value of is determined by
the number of links in each SRLG that use link as backup.
(52)
VII. CONCLUSION
Since there is zero duality gap between problem (51) and its
Dedicated backup networks are a low-cost and efficient
dual (52), the optimal value of the objective function in (52) is
method for providing protection against multiple (random)
equal to . Additionally, since problem (29) mini-
failures. In the event of a failure, the load on the failed link
mizes for each , problem (52) can be substi-
can be automatically rerouted over a predetermined path in
tuted into (29) to arrive at the formulation in (30).
the backup network, providing fast recovery from network
failures. We formulated the backup network design problem as
REFERENCES
an ILP for primary networks with general link capacities and
[1] W. Grover, Mesh-Based Survivable Networks: Options and Strategies
independent, identically distributed probabilities of link failure. for Optical, MPLS, SONET, and ATM Networking. Upper Saddle
For primary networks with rare failures, backup networks are River, NJ, USA: Prentice-Hall, 2004.
shown to use fewer links, with more resource sharing among [2] S. Lumetta et al., “Capacity versus robustness: A tradeoff for link
restoration in mesh networks,” J. Lightw. Technol., vol. 18, no. 12, p.
backup paths. Conversely, when the primary network has a 1765, Dec. 2000.
high probability of link failure, the backup network consists [3] D. Zhou and S. Subramaniam, “Survivability in optical networks,”
of shorter backup paths. For larger primary networks, a sim- IEEE Netw., vol. 14, no. 6, pp. 16–23, Nov.–Dec. 2000.
[4] Y. Liu, D. Tipper, and P. Siripongwutikorn, “Approximating op-
ulated annealing approach was presented to solve the backup timal spare capacity allocation by successive survivable routing,”
network design ILP. This approach has been shown to perform IEEE/ACM Trans. Netw., vol. 13, no. 1, pp. 198–211, Feb. 2005.
near-optimally in designing dedicated backup networks. The [5] S. Ramamurthy, L. Sahasrabuddhe, and B. Mukherjee, Survivable
WDM Mesh Netw., vol. 21, no. 4, pp. 870–883, 2003.
SA algorithm can be adjusted to trade off between computation [6] J. Zhang and B. Mukherjee, “A review of fault management in WDM
time and accuracy. Additionally, we demonstrated our capacity mesh networks: Basic concepts and research challenges,” IEEE Netw.,
allocation approach on real-world networks and have shown vol. 18, no. 2, pp. 41–48, Mar. 2004.
[7] M. Banner and A. Orda, “Designing low-capacity backup networks for
that, practically, protecting against failures with high proba- fast restoration,” in Proc. IEEE INFOCOM, 2010, pp. 1–9.
bility can lead to a capacity savings of up to 50% compared to [8] H. Choi, S. Subramaniam, and H. Choi, “On double-link failure re-
approaches providing 100% protection guarantees. covery in WDM optical networks,” in Proc. IEEE INFOCOM, 2002,
vol. 2, pp. 808–816.
[9] L. Guo, H. Yu, and L. Li, “Segment shared protection for survivable
APPENDIX meshed WDM optical networks,” Opt. Commun., vol. 251, no. 4–6,
The following steps are used to convert formulation (29) to pp. 328–338, 2005.
[10] B. Jozsa, D. Orincsay, and A. Kern, “Surviving multiple network fail-
formulation (30) using a duality approach. For a fixed and ures using shared backup path protection,” in Proc. ISCC, 2003, vol.
, the backup capacity of link 1, pp. 1333–1340.
[11] M. Herzberg, S. Bye, and A. Utano, “The hop-limit approach for spare-
capacity assignment in survivable networks,” IEEE/ACM Trans. Netw.,
(50) vol. 3, no. 6, p. 784, Dec. 1995.
[12] K. Vajanapoom and D. Tipper, “Risk based incremental survivable net-
work design,” in Proc. 6th DRCN, 2007, pp. 1–9.
can be written as the solution to the following LP: [13] D. Papadimitriou et al., “Inference of shared risk link groups,” Internet
Draft, May 2002 [Online]. Available: http://tools.ietf.org/html/draft-
many-inference-srlg-02
[14] R. Bhandari, Survivable Networks: Algorithms for Diverse Routing.
New York, NY, USA: Kluwer, 1999.
[15] E. Modiano and A. Narula-Tam, “Survivable lightpath routing—A new
approach to the design of WDM-based networks,” IEEE J. Sel. Areas
Commun., vol. 20, no. 4, pp. 800–809, May 2002.
[16] E. Oki, N. Matsuura, K. Shiomoto, and N. Yamanaka, “A disjoint path
selection scheme with shared risk link groups in GMPLS networks,”
(51) IEEE Commun. Lett., vol. 6, no. 9, pp. 406–408, Sep. 2002.
1228 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 4, AUGUST 2015
[17] D. Xu, Y. Xiong, C. Qiao, and G. Li, “Trap avoidance and protection Hyang-Won Lee (S'02–M'08) received the B.S.,
schemes in networks with shared risk link groups,” J. Lightw. Technol., M.S., and Ph.D. degrees in electrical engineering and
vol. 21, no. 11, pp. 2683–2693, Nov. 2003. computer science from the Korea Advanced Institute
[18] A. Soyster, “Convex programming with set-inclusive constraints and of Science and Technology (KAIST), Daejeon,
applications to inexact linear programming,” Oper. Res., vol. 21, no. Korea, in 2001, 2003, and 2007, respectively.
5, pp. 1154–1157, 1973. He was a Postdoctoral Research Associate with the
[19] A. Ben-Tal and A. Nemirovski, “Robust solutions of uncertain linear Massachusetts Institute of Technology, Cambridge,
programs,” Oper. Res. Lett., vol. 25, no. 1, pp. 1–14, 1999. MA, USA, during 2007 to 2011, and a Research
[20] D. Bertsimas and M. Sim, “The price of robustness,” Oper. Res., vol. Assistant Professor with KAIST between 2011 and
52, no. 1, pp. 35–53, 2004. 2012. He is currently an Assistant Professor with the
[21] S. Gast and A. Keimer, “Robust optimization in network flows,” Uni- Department of Internet and Multimedia Engineering,
versity of Erlangen-Nürnberg, Germany, Tech. Rep., 2009. Konkuk University, Seoul, Korea. His research interests are in the areas
[22] J. Zhang, K. Zhu, H. Zang, and B. Mukherjee, “Service provisioning of congestion control, stochastic network control, robust optimization, and
to provide per-connection-based availability guarantee in WDM mesh reliable network design.
networks,” in Proc. OFC, Atlanta, GA, USA, Mar. 2003, pp. 622–624.
[23] M. Tornatore, G. Maier, and A. Pattavina, “Availability design of op-
tical transport networks,” IEEE J. Sel. Areas Commun., vol. 23, no. 8,
pp. 1520–1532, Aug. 2005. Eytan Modiano (S'90–M'93–SM'00–F'12) received
[24] J. Segovia, E. Calle, P. Vila, J. Marzo, and J. Tapolcai, “Topology-fo- the B.S. degree in electrical engineering and com-
cused availability analysis of basic protection schemes in optical trans- puter science from the University of Connecticut,
port networks,” J. Opt. Netw., vol. 7, pp. 351–364, 2008. Storrs, CT, USA, in 1986, and the M.S. and Ph.D.
[25] A. M. Koster, M. Kutschka, and C. Raack, “Robust network design: degrees in electrical engineering from the University
Formulations, valid inequalities, and computations,” Networks, vol. 61, of Maryland, College Park, MD, USA, in 1989 and
no. 2, pp. 128–149, 2013. 1992, respectively.
[26] A. M. Koster, M. Kutschka, and C. Raack, “On the robustness of op- He was a Naval Research Laboratory Fellow
timal network designs,” in Proc. IEEE ICC, 2011, pp. 1–5. between 1987 and 1992 and a National Research
[27] A. M. Koster and M. Kutschka, “An integrated model for survivable Council Post-Doctoral Fellow during 1992 to 1993.
network design under demand uncertainty,” in Proc. 8th DRCN, 2011, Between 1993 and 1999, he was with the Massachu-
pp. 54–61. setts Institute of Technology (MIT) Lincoln Laboratory, Lexington, MA, USA,
[28] M. Johnston, H.-W. Lee, and E. Modiano, “Robust network design where he was a project leader for MIT Lincoln Laboratory's Next Generation
for stochastic traffic demands,” in Proc. IEEE GLOBECOM, 2011, pp. Internet (NGI) project. Since 1999, he has been on the faculty of MIT, where
1–5. he is a Professor with the Department of Aeronautics and Astronautics and the
[29] S. Brooks and B. Morgan, “Optimization using simulated annealing,” Laboratory for Information and Decision Systems (LIDS). His research is on
Statistician, vol. 44, no. 2, pp. 241–257, 1995. communication networks and protocols with emphasis on satellite, wireless,
[30] B. Van Caenegem, W. Van Parys, F. De Turck, and P. Demeester, and optical networks.
“Dimensioning of survivable WDM networks,” IEEE J. Sel. Areas Prof. Modiano is an Associate Fellow of the AIAA. He is an Editor-at-Large
Commun., vol. 16, no. 7, pp. 1146–1157, Sep. 1998. for the IEEE/ACM TRANSACTIONS ON NETWORKING and served as Associate
[31] H.-W. Lee, E. Modiano, and K. Lee, “Diverse routing in networks Editor for the IEEE TRANSACTIONS ON INFORMATION THEORY, IEEE/ACM
with probabilistic failures,” IEEE/ACM Trans. Netw., vol. 18, no. 6, TRANSACTIONS ON NETWORKING, and AIAA Journal of Aerospace Information
pp. 1895–1907, Dec. 2010. Systems. He was the Technical Program Co-Chair for IEEE WiOpt 2006, IEEE
INFOCOM 2007, and ACM MobiHoc 2007.
Matthew Johnston (S'10) received the B.S. degree
in electrical engineering and computer science from
the University of California, Berkeley, CA, USA, in
2008, and the S.M. degree in electrical engineering
from the Massachusetts Institute of Technology
(MIT), Cambridge, MA, USA, in 2010, and is
currently pursuing the Ph.D. degree in electrical
engineering with the Laboratory for Information and
Decision Systems, MIT.
His research interests include network con-
trol, wireless resource allocation, and network
survivability.