{"id":184461,"date":"2004-06-14T00:00:00","date_gmt":"2009-10-31T13:47:02","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/msr-research-item\/traffic-constraints-instead-of-traffic-matrices-capabilities-of-a-new-approach-to-traffic-characterization\/"},"modified":"2016-09-09T09:42:26","modified_gmt":"2016-09-09T16:42:26","slug":"traffic-constraints-instead-of-traffic-matrices-capabilities-of-a-new-approach-to-traffic-characterization","status":"publish","type":"msr-video","link":"https:\/\/www.microsoft.com\/en-us\/research\/video\/traffic-constraints-instead-of-traffic-matrices-capabilities-of-a-new-approach-to-traffic-characterization\/","title":{"rendered":"Traffic Constraints Instead of Traffic Matrices: Capabilities of a New Approach to Traffic Characterization"},"content":{"rendered":"<div class=\"asset-content\">\n<p>We have developed a reformulation of network design (routing), replacing the traffic matrix, by a set of linear constraints, representing a convex polyhedral traffic ensemble.<\/p>\n<p>Linear programming is used, together with classical design techniques, to globally optimize a variety of metrics over this traffic ensemble. Where applicable, the method yields richer answers than using a traffic matrix. Firstly, network costs can be globally bounded over large scale distribution variations of traffic. This eliminates one of weaknesses of classical network design, in that the answers are dependent on detailed traffic forecasts, which are error-prone (at least for planning purposes). Secondly, inverse problems can be solved, with max\/min bounds on network capacity and other metrics being derived from a pre-specified cost. Thirdly, analyses of traffic matrices can be performed, detecting hidden biases in selection. Many other kinds of results can be derived, by appropriate reformulation of the governing LP. To the best of our knowledge, we have obtained the first global bounds on network cost, with very limited knowledge of the traffic \u2013 total traffic, mean traversed distance, add-drop at nodes, are sufficient to obtain useful bounds on total network cost. The sufficient set of parameters is often less than 5% of the elements of the entire traffic matrix T and can be specified far more confidently than T. Our work has the potential to evaluate networks based on intrinsic topological and gross easily specified properties of the traffic, as opposed to point evaluations possibly modulated by uncertain traffic matrix data.<\/p>\n<p>Keywords: Mathematical programming \/optimization, Graph theory, Combinatorics, Economics<\/p>\n<p>[Joint work with Arun Vishwanath, work partially done while at Lucent Technologies]<\/p>\n<\/div>\n<p><!-- .asset-content --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have developed a reformulation of network design (routing), replacing the traffic matrix, by a set of linear constraints, representing a convex polyhedral traffic ensemble. Linear programming is used, together with classical design techniques, to globally optimize a variety of metrics over this traffic ensemble. Where applicable, the method yields richer answers than using a [&hellip;]<\/p>\n","protected":false},"featured_media":288974,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_hide_image_in_river":0,"footnotes":""},"research-area":[],"msr-video-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-session-type":[],"msr-impact-theme":[],"msr-pillar":[],"msr-episode":[],"msr-research-theme":[],"class_list":["post-184461","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/_kky3By_bAQ","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/184461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/184461\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/288974"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=184461"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=184461"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=184461"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=184461"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=184461"},{"taxonomy":"msr-session-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-session-type?post=184461"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=184461"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=184461"},{"taxonomy":"msr-episode","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-episode?post=184461"},{"taxonomy":"msr-research-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-theme?post=184461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}