The subject matter described herein generally relates to a system and method for optimizing the link topology of and traffic flows within a directional wireless network. In some aspects, heuristic optimizations are used to generate optimized network link topologies based upon specified constraints and resource requests.
Mobile sensing, command, and weapons platforms, generically referred to as mobile communications nodes, commonly share Intelligence, Surveillance, and Reconnaissance (ISR) data and/or tactical data across directional wireless communications networks. These networks are generally not directly managed by data exchange applications interacting with the physical, data link, or network layers. Instead, an autonomous management service is used to optimize the network link topology and routing of application data traffic in order to efficiently allocate available network resources among uncoordinated application traffic flows. As the number of mobile communications nodes increases, the number of potential link configurations, the number of potential routes, and the volume of application data traffic shared in mobile-to-mobile, mobile-to-fixed, and fixed-to-mobile inter-nodal communications also increase, potentially taxing the computational resources of the management service and compromising its ability to generate optimal or near-optimal link topology policies and routes within usefully short periods of time. If the management service becomes overwhelmed, the ability of the network to service application traffic flows can become degraded as the configuration and allocation of network resources can become misaligned with current demands upon the directional wireless network.
Prior art management services and optimization frameworks tend to deterministically work through a link topology solution space, so that as the complexity of the optimization problem increases, computational resource limitations prevent the management service from generating optimized link topology policies and routes in real or near-real time. On the other hand, prior art management services and optimization frameworks which employ time-limited, randomized searches within a link topology solution space do not reliably generate optimized link topology policies that are capable of supporting traffic flows with particularized network demands, such as bandwidth requirements, jitter requirements, and delay requirements, when restricted to real or near-real time searches.
The changing spatial relationships between mobile communications nodes, fixed communications nodes, and obstructions (such as terrain) in directional wireless communications networks requires that management services dynamically plan and configure at least the network link topology based upon varying resource requests, varying physical layer constraints, and varying mission criteria which create additional constraints with respect to network resources and demand. Accordingly, scientists and engineers continue to seek improved topology management systems for wireless communications networks, and particularly directional wireless networks involving mobile communications nodes.
Presented is a system and method for managing the link topology of a directional wireless network having mobile communications nodes. The system includes a network manager node adapted to receive resource requests from a plurality of communications nodes; a processor executing a management service; and a plurality of mobile communications node communicating resource requests to the network manager node for processing by the management service. The processor is adapted to execute the method for managing the link topology of the directional wireless network.
In a first aspect of the method, a management service in communication with the network manager node carries out the steps of receiving a plurality of resource requests from a plurality of mobile communications nodes, classifying the received plurality of resource requests as at least one class of traffic flow overlay having one or more specified constraints, determining a link topology solution based upon the at least one class of overlay and the one or more specified constraints, and publishing a topology policy based upon an optimized link topology solution to the plurality of mobile communications nodes.
The topology policy may be published as a decomposed topology policy individually directed at each communications node, or as a unitary topology policy broadcast to the directional wireless network. Agents in each communications node will typically be tasked with implementing the link topology policy and resultant routes for that communications node, as well as collecting and sending resource requests, in the form of a demand metric, to the management service from the communications node.
The features, functions, and advantages discussed herein can be achieved independently in various embodiments of the invention or may be combined in yet other embodiments of the invention, examples of which can be seen with reference to the following description and drawings.
The accompanying figures depict various embodiments of the system and method. A brief description of each figure is provided below.
With initial reference to
In current networks, the communications nodes 104 and 106 require dedicated devices for each of the high-bandwidth directional links 102. The size and the cost of the devices limit the number of high-bandwidth links available to typical communications nodes. With further reference to
In addition, although not specifically illustrated, the applications operating across such a network 100 may require varying network resources and/or capabilities, including security (encryption), priority (e.g., for tactical data over ISR data), minimum bandwidth, maximum jitter, and maximum delay. Thus, for example, an advanced directional link 105 between an advanced mobile communications node 104 (shown as a thickened circle) and an advanced network manager node 108 (also shown as a thickened circle) may be preferred over a potential legacy directional link 103 to a less capable mobile communications node 104 or fixed communications node 106 (shown as thinner circles).
At a later time, such as after movement of some of the mobile communications nodes 104, changes to the constraints may permit the use of a more efficient or capable network link topology. Thus, with further reference to
The management service 200 allows for the dynamic planning and configuration of the network in order to support mission demands such as secure, high speed redundant links between source and destination nodes for particular data flows. Operations personnel may be provided with means to switch between a particular solver for the network topology problem, such as a mixed integer linear programming (MIP) solver or a heuristic solver, in order to generate network topologies to support a mission at a desired level of performance within a desired solution time. While embodiments of the invention may make use of a MIP solver, in many aspects the management service 200 implements a particular solver known as a Lagrangian Relaxation (LR) solver and a Lagrangian heuristic. The use of such a solver may substantially reduce the time to yield a near-optimal link topology solution.
Turning now to
The management service 200 subscribes to the demand metrics published by the local agents, treating the demand metrics as resource requests by the respective communications nodes 104 and 106—i.e., the real-time demand data will include data concerning successfully and unsuccessfully transmitted traffic flows, such that the demand metric reflects resource demand rather than resource utilization. The management service 200 receives these resource requests from the plurality of communications nodes in the directional wireless network 100, and may store the resource requests/demand metrics in a resource demand repository 210 (shown in
Turning now to
In a simplified example of the function of problem formulation generation process 215, the process may classify resource requests into a single class of traffic flow overlays and generate matrices for the traffic flows f where
x ij,l,nf=1 if flow f is sent across an arc corresponding to node combination (ni, nj) on the nth possible instance of a link of type l (and 0 otherwise), (Eq. No. 1)
and for the link types l, where
uijl,n=1 if the nth possible instance of a link of type l is assigned to the arc corresponding to node combination (ni, nj) (and =0 otherwise). (Eq. No. 2)
Specified constraints are associated with the matrices to exclude impossible or undesired link topology solutions. For example:
Specified Constraint 1: Flow Balance (ie., Flow Entering a Node Must Leave a Node, and Flow Leaving a Node Must Have Entered the Node)
where b(i,f) is the supply/demand of flow f at node i; IN(i) is the set of nodes i for which flow from node j to node i is a possibility; ON(i) is the set of nodes j for which flow from node i to node j is a possibility; and L is the set of possible (link type l, and link instance n) combinations.
Specified Constraint 2: Bidirectional Links
Assuming that links between nodes must be of the same type,
uijl,n=ujil,n for all possible (i,j,l,n) combinations. (Eq. No. 4)
where the communications hardware is limited, in effect, to creating bidirectional communication links as opposed to directionally independent transmission and reception links.
Specified Constraint 3: Capacity of the Links per Node
where bw(f) is the bandwidth requirement for flow f; C(i,j) is the set of flows that could be assigned to flow from node i to node j; and cap(l) is the bandwidth capacity of link type l.
Specified Constraint 4: Number of Links per Node
where at most K(l) total links of type l are possible at each node (i.e., summing both in-bound and out-bound links); IN(i) is the set of nodes i for which flow from node j to node i is a possibility; ON(i) is the set of nodes j for which flow from node i to node j is a possibility; and L(l) is the set of possible instances n of link type l.
Specified Constraint 5: Redundancy
where two flow variables f1 and f2 are included each time a flow f is to have a redundant path; IN(j) is the set of nodes i for which flow from node j to node i is a possibility; and L is the set of possible (link type l, and link instance n) combinations.
Specified Constraint 6: Flow Integrality
xij,l,nf∈{0,1} for all possible (i,j,f,l, n) combinations (Eq. No. 8)
so that traffic flow f from source node i to destination node j may not be split.
Constraints for link availability between nodes based upon node location and orientation may be based upon known methods for calculating or using a structural interference matrix to determine interference based upon the relative location of a communications source and/or target. Similarly, constraints for link availability between nodes based upon environmental obstructions may be based upon known methods for using a topographical matrix such as a Digital Elevation Model (DEM) to determine whether a line-of-sight exists between a communications source and target. Additionally, constraints for link stability/error rate may be compared with estimates of the impact of local meteorological and/or atmospheric conditions upon signal strength and interference levels. Where the determination of whether a constraint exists is based upon the results of complex modeling calculations such as a structural interference matrix, topographical matrix, or environmental modeling, the problem formulation generation process 215 may perform the determination in combination with a network reference data repository 216 containing preprocessed reference data such as interference levels for varying relative locations of each communications source and target.
The mixed integer linear programming solver or MIP solver 220 may use or be similar to known solvers such as the ILOG CPLEX Optimizer marketed by International Business Machines Corporation (a.k.a. IBM) and the COIN Branch and Cut solver (a.k.a. CBC) distributed through the COIN-OR Foundation, Inc. Such solvers minimize or maximize problems of the form:
where w(f) is the weight (value) of the traffic flow f; is is the source node for the traffic flow f; id is a destination node for the traffic flow f; and, Il is the set of all possible (f,is, id) combinations.
The solution generated by the MIP solver may then be passed to the solution decomposition process 230. The solution decomposition process 230 may generate a link topology policy—i.e., a set of instructions to local agents concerning the configuration of point-to-point links to (transmission) and, potentially, from (reception) other nodes in the directional wireless network 100.
The Lagrangian Relaxation solver or LR solver 225 may implement the following general procedure. If the primal program (P) is structured in the form:
where cTx may be the objective function for the link topology problem, subject to, for example:
where A1x≤b1 and A2x≤b2 may be specified constraints,
then it may be assumed that if specified constraints A2x≤b2 were not in the problem formulation that the problem would be easy, or easier, to solve—i.e., that an algorithm satisfying a time-limited solution exists or would be more likely to reach an optimal or near-optimal solution. A related problem, known as the Lagrangian Dual, can be constructed, where:
optimal dual variables λ* can be determined. Solving (LD) is a nonsmooth optimization problem, and the primal variables x used to generate an optimal solution to the Lagrangian Dual (LD) might not be feasible for the original primal program (P). If the primal variables x are feasible, then they are an optimal solution to the original problem. If the primal variables x are not feasible, then the optimal dual variables λ*, potentially with the primal variables x, can be used to construct a feasible and typically near-optimal solution to the primal program (P). The construction process is termed a Lagrangian heuristic.
A primal program (P) subject to specified constraints 1-4 and 6 (in this example, lacking a redundancy constraint) may be considered where the Capacity of the Links per Node specified constraint and the Number of Links per Node specified constraint are relaxed into the objective function. The optimization problem consequently becomes two subproblems amenable to efficient solution: (1) solving a minimum cost network flow problem for each flow f and (2) choosing, for each link type l, the links of that type to add to the wireless directional network while considering the reduced costs of adding the links. The solution to the second subproblem may calculate the reduced costs for the variables corresponding to adding links to the network, and then adding the links with either non-positive or negative reduced costs.
Subproblem (1)
A portion of the Lagrangian Dual objective function corresponding to the first subproblem includes the portion of cTx−λT(A2x) corresponding to the flow management variables, i.e.:
where w(f) is the weight (value) of the traffic flow f, is is the source node for the traffic flow f; id is the destination node for the traffic flow f; Il is the set of all possible (f,is,id) combinations; A is the set of arcs in the network; L is the set of possible (link type 1, and link instance n) combinations; bw(f) is the bandwidth requirement for flow f; C(i,j) is the set of flows that could be assigned to flow from node i to node j; and cap(l) is the bandwidth capacity of link type l.
Subproblem (2)
A portion of the Lagrangian Dual objective function corresponding to the second subproblem includes the portion of cTx−λT(A2x) corresponding to the design variables, i.e.:
where cap(l) is the bandwidth capacity of link type l; A is the set of arcs in the network; IN(i) is the set of nodes i for which flow from node j to node i is a possibility; ON(i) is the set of nodes j for which flow from node i to node j is a possibility; L(l) is the set of possible instances n of link type l; LCC is the set of (ni,l) combinations where there is a constraint on the number of links of type l going into and out of node ni; and, γ is used to denote the dual variables corresponding to the Number of Links per Node specified constraint.
The portion of the Lagrangian Dual objective function corresponding to the right-hand side of the constraints and dual variables is:
where b21 corresponds to the right-hand side of the Capacity of the Links per Node specified constraint(s), and is a the vector of all zeros, and b22 corresponds to the right-hand side of the Number of Links per Node specified constraint(s), and is a vector with entries equal to K(l).
As a result, the portion of the Lagrangian Dual objective function corresponding to the right-hand side of the constraints may be expressed as:
where N is the set of nodes in the network; LCC is the set of (ni,l) combinations where there is a constraint on the number of links of type l going into and out of node ni; and, K(l) is the maximum number of links of type l possible at each node.
The subgradient of cTx+λT(b2−A2x) for the given dual variables, λ, may be expressed by
where bw(f) is the bandwidth requirement for flow f, C(i,j) is the set of flows that could be assigned to flow from node i to node j; cap(l) is the bandwidth capacity of link type l; and L is the set of possible (link type l, and link instance n) combinations.
and
where at most K(l) total links of type l are possible at each node (i.e., summing both in-bound and out-bound links); IN(i) is the set of nodes i for which flow from node j to node i is a possibility; ON(i) is the set of nodes j for which flow from node i to node j is a possibility; and L(l) is the set of possible instances n of link type l.
At each iteration of the LR solver 225, a function value and subgradient are calculated, where these items depend upon the dual variables λ. The optimal dual variables λ* and associated primal variables x are determined, and the feasibility of the primal variables x is determined. If the solution determined by the Lagrangian Relaxation solver or LR solver 225 is not feasible, then the solver may implement a Lagrangian heuristic to determine a feasible network topology solution. The LR solver 225 may evaluate the reduced costs for the design variables and use a greedy algorithm to determine which links should be added to the network. The reduced costs for (implementing the Bidirectional Link constraint) will have the form:
RC(uijl,n)=cap(l)λijl,n−γn
where cap(l) is the bandwidth capacity of link type l; and, γ is used to denote the dual variables corresponding to the Number of Links per Node specified constraint,
so that the reduced cost for adding a bidirectional link between nodes nj and ni is:
RC(uijl,n)+RC(ujil,n)=cap(l)(γijl,n+γjil,n)−2(γn
The greedy algorithm orders the reduced costs from largest to smallest. Links between nodes are added to the network according to the order while satisfying the Number of Links per Node specified constraint. The greedy algorithm stops adding links to the network if the next reduced cost is not non-negative.
Other dual variable information can be used in a Lagrangian heuristic as well. For example, the dual variables corresponding to the capacity constraints for the flows can be used. In varying implementations, multiple Lagrangian heuristics may be used, returning a set of candidate near-optimal link topologies which may be compared for relative optimality.
The link topology solution determined by the Lagrangian Relaxation solver or LR solver 225, without (if feasible) or with (if not initially feasible) the Lagrangian heuristic, may then be passed to the solution decomposition process 230. The solution decomposition process 230 may generate a link topology policy—i.e., a set of instructions to local agents concerning the configuration of point-to-point links to (transmission) and, potentially, from (reception) other nodes in the directional wireless network 100.
Referring now to
The embodiments of the invention shown in the drawings and described above are exemplary of numerous embodiments that may be made within the scope of the appended claims. It is contemplated that numerous other configurations of a dynamic fusion management system and method may be created taking advantage of the disclosed approach. It is the applicant's intention that the scope of the patent issuing herefrom will be limited only by the scope of the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
6262976 | McNamara | Jul 2001 | B1 |
6594268 | Aukia | Jul 2003 | B1 |
6909700 | Benmohamed | Jun 2005 | B1 |
7336617 | Liu | Feb 2008 | B1 |
7953015 | Qing | May 2011 | B2 |
8072977 | Omar | Dec 2011 | B2 |
8325627 | Pratt, Jr. | Dec 2012 | B2 |
20030179742 | Ogier | Sep 2003 | A1 |
20040082338 | Norrgard | Apr 2004 | A1 |
20050076173 | Merril | Apr 2005 | A1 |
20050076336 | Cutrell | Apr 2005 | A1 |
20050195835 | Savage | Sep 2005 | A1 |
20060092855 | Chiu | May 2006 | A1 |
20080062862 | Goyal | Mar 2008 | A1 |
20080189416 | Yamada | Aug 2008 | A1 |
20090185508 | Duke | Jul 2009 | A1 |
20100046396 | Cai | Feb 2010 | A1 |
20110002240 | Harel | Jan 2011 | A1 |
20110170448 | Buob | Jul 2011 | A1 |
20110228785 | Filsfils | Sep 2011 | A1 |
20110258284 | Sundstrom | Oct 2011 | A1 |
20120137336 | Applegate | May 2012 | A1 |
20130159550 | Vasseur | Jun 2013 | A1 |
Entry |
---|
Bae, K., “Directional Network Management. Mobile Communications and Network Management,” presented by The Boeing Company (Dec. 9, 2010). |
Belotti, P. et al., “Shared Protection network design: valid inequalities and a decomposition approach,” Technical Paper published by Politecnico di Milano, 2003. |
Costa, A., “Analytic Modelling of Agent-Based Network Routing Algorithms,” thesis submitted to the University of Adelaide, Australia (issued Nov. 4, 2002). |
Dorsett, M. et al., “Directional Network Management,” presented by the Boeing Company (May 12, 2011). |
Hadynski, G. et al., “Optimization of Directional Antenna Network Topology in Airborne Networks,” MILCOM2010, IEEE (2010). |
Krishnamurthi, N. et al., “Topology Control for Future Airborne Networks,” MILCOM2009, IEEE (2009). |
Stewart, S., “Topology Management for Directional Antenna-based Networks,” Navy SBIR 2008.2—Topic N08-198, at http://www.navysbir.com/n08_2/N082-198.htm (2008). |
Velez, P. et al., “Dynamic Topology Optimization and Transition Schemes for Assuring Connectivity in Multihop Mobile Optical Wireless Communications Networks,” MILCOM2009, IEEE (2009). |