Next Article in Journal
An Implementation Suite for a Hybrid Public Key Infrastructure
Next Article in Special Issue
On the Johnson–Tzitzeica Theorem, Graph Theory, and Yang–Baxter Equations
Previous Article in Journal
Shear-Driven Mechanism of Temperature Gradient Formation in Microfluidic Nematic Devices: Theory and Numerical Studies
Previous Article in Special Issue
Connectivity of Semiring Valued Graphs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Search of the Shortest Path in a Communication Network with Fuzzy Cost Functions

1
Electronic Technology Department, ETSI Telecommunication, Málaga University, 29071 Málaga, Spain
2
Applied Mathematics Department, Mathematics and Computer Science Faculty, Havana University, Havana 10200, Cuba
*
Author to whom correspondence should be addressed.
Current address: Instituto Universitario de Investigación en Telecomunicación (TELMA), Málaga University, CEI Andalucía TECH, 29071 Málaga, Spain.
Symmetry 2021, 13(8), 1534; https://doi.org/10.3390/sym13081534
Submission received: 15 June 2021 / Revised: 27 July 2021 / Accepted: 2 August 2021 / Published: 20 August 2021
(This article belongs to the Special Issue Graph Algorithms and Graph Theory)

Abstract

:
A communication network management system takes the measurements of its state variables at specific instants of time, considering them constant in the interval between two consecutive measurements. Nevertheless, this assumption is not true, since these variables evolve in real time. Therefore, uncertainty is inherent in the processing of the measurements during the intervals so that they cannot be efficiently managed using crisp variables. In this paper, we face this problem by modeling the communications network as a type-V fuzzy graph, where both the nodes and the links are described with precision, but the cost of each link is modeled as a triangular fuzzy number. Different fuzzy cost allocation functions and fuzzy optimization strategies are described and applied to the search for the shortest path between two nodes. An experimental study has been conducted using two representative networks: the backbone network of Nippon Telegraph and Telephone Corporation (NTT) and the National Science Foundation’s Network (NFSNET). In these networks, our fuzzy cost functions and strategies have been compared with the well-known crisp equivalents. The optimal search strategies are based on the proposed Fuzzy Dijkstra Algorithm (FDA), which is described deeply. The simulation results demonstrate that in all cases the fuzzy alternatives surpass or equal the crisp equivalents with statistically significant values. Specifically, the so-called Strategy 8 presents the best throughput, as it significantly exceeds the performance of all those evaluated, achieving a Global Mean Delivery Rate (GMDR) close to 1.

1. Introduction

The management of a communication network is mainly oriented to maximize the ratio between sent and received information for any pair of source-destination nodes while reducing transmission delays. This objective is especially relevant in high occupancy conditions. Necessary resources to achieve this objective are algorithms and routing protocols, which seek to provide the optimal path between any pair of source-destination nodes. To evaluate the goodness level of a path, it is crucial to know the state of the network by assigning a cost to every link. In this way, we compute the cost of a particular path using variables such as Used Bandwidth, Residual Bandwidth (non-used bandwidth), Packet Delay (time spent in the delivery of an information packet), Packet Delivery Ratio (ratio between delivered and sent packets), Packet Loss Ratio (one minus the Package Delivery Ratio), etc. From this knowledge, we can establish the routing tables, which contain the path communicating nodes to transmit the information at each moment.
Because of the dynamic behavior of a network, and consequently, the high variability in time of its performing conditions, the usual way to work is to compute the state variables over a given time interval using measurements obtained in the immediately previous time interval. So, typical routing protocols update the state (cost) of links in two possible ways [1]:
(A)
By time intervals. Each cost value (and therefore, the routing tables) is updated with a constant periodicity. This update is either to the instantaneous state value at the beginning of the new interval or to the mean value of costs over the previous time interval.
(B)
By thresholds. Some update thresholds are fixed so that the update of a state variable is carried out when the difference between its current real value and the one determined more recently exceeds the corresponding threshold.
It is evident that, although these cost values are well defined real numbers (crisp numbers in our lingo), these procedures include a degree of uncertainty about the current state due to the fact that the variables change during a time interval. Consequently, we believe that considering this uncertainty in the decision-making process for the management should allow us to find better solutions. In this sense, some elements of Fuzzy Logic, in particular, the application of arithmetic operations and properties of fuzzy numbers, can be helpful.
As a first approach, we interpret a triangular fuzzy number as a triplet of real numbers. The numbers at the ends delimit the interval of values that can be assigned to the fuzzy number (variable values with a probability value greater than 0 in the membership function) and the central number is the value of the variable with the highest value in the membership function. This triangular fuzzy number is a particular case of the more general trapezoidal fuzzy number described in Section 3 and in [2,3]).
An essential aspect of our work is to represent the cost measurements of the network by using fuzzy numbers in order to reasonably incorporate the aforementioned uncertainty. For this objective, option (B) has an apparent advantage over option (A) as when fixing the thresholds, we are also setting the upper and lower limits of the corresponding triangular fuzzy number. However, the central value of this fuzzy number, which would theoretically be considered the most feasible one, does not have a physical justification: it would respond to an instantaneous value from which we have no information about its feasibility. Moreover, if the central value is given, we compute the upper and lower values by adding and subtracting the threshold. The crisp number corresponding to this fuzzy cost function will always be constant and equal to the central value. Therefore, the meaning of fuzzification is lost. On the other hand, option (A) does not directly provide us with the extreme values of the normalized triangular fuzzy number. However, it allows us to define them using statistical methods in such a way that we can keep the consistency with the physics of the problem and incorporating its fuzzy nature. Thus, in our case, the proposed fuzzy numbers for the time interval t are defined as follows: the central value corresponds to the mean value of the costs over the entire t 1 time interval, which will generate a minor error, and the extreme values correspond to the maximum and minimum values of cost measurements in the above mentioned t 1 time interval.
In our proposal, we model the network as a non-directed Type-V fuzzy Graph. In this type of fuzzy graph, the vertexes and the edges are physically well established, but the costs of the links are defined by a fuzzy number. In our particular case, the costs are triangular fuzzy numbers to incorporate the uncertainty [4]. Finally, the application of a fuzzy version of the Dijkstra algorithm, like the shortest path search algorithm, should give us the path between any pair of source-destination nodes with the minimum cost. This fuzzy version of Dijkstra’s algorithm can be considered as classical since it does not incorporate any consideration of uncertainty in its execution, but it incorporates uncertainty in the value of the variables (here considered as fuzzy) and in the definition of the mathematical operation between them. A very basic application of this work can be found in [5], where a pair of shortest-disjoint paths is identified with a simpler version of the Modified Dijkstra Algorithm. However, the complete description of the algorithm, the operation of the fuzzy-based costs and their comparison with other classic approaches are firstly described in a scientific journal. In particular, we now include the mathematical framework to operate with the fuzzy costs in a modified Dijkstra algorithm. In addition, the present paper defines how classical cost functions can be incorporated into the algorithm and compare them with some fuzzy-based cost functions for two illustrative network topologies. The algorithm is completely described, including the complementary procedures of the initialization phase and the relaxation of the vertexes. However, the modified Dijkstra algorithm and the preliminary operations can be found as a technical report in the repository of the University of Málaga [6].
We are also interested in highlighting the differences between this methodology, which uses fuzzy values of variables (triangular fuzzy numbers) and the so-called Fuzzy Inference (or Control) (see [7,8]), in which the measurements have precise values, but the uncertainty lies on the decision process itself.
Summarizing, the main contribution of this work is the presentation of a methodology to optimize the search for the shortest path between two nodes during the global management of a communication network. This methodology is characterized by modeling the network as a Non-directed Type-V Fuzzy Graph and applying a fuzzy Dijkstra algorithm that is adapted to operate with fuzzy numbers. To show the goodness of our approach, we have two objectives:
(i)
To show the competitiveness of the methodology based on the fuzzy model versus that based on the traditional model using crisp magnitudes. To do this, we reconstruct the currently used classical cost functions and strategies for searching the optimal path in the fuzzy model. Then, we compare both visions (classical and fuzzy) in the same experimental environment for two representative network topologies. The results show that the fuzzy model is more efficient (or equal in the worst case), being this conclusion validated by a statistical parameter.
(ii)
To illustrate that the fuzzy model allows us to define new metrics that take advantage from the experimental uncertainty above mentioned. Thus, we provide a new strategy, and its cost function (referred to as Strategy 8), which has no equivalent in the classic model and by far exceeds all the other strategies analyzed in effectiveness.
Thus, the organization of this paper is as follows: we devote Section 2 to compile some related works from the points of view of both the application in the communication environment and the use of Fuzzy Logic. In Section 3, we describe the fuzzy model of the communication network and we proceed with the definition of various types of fuzzy numbers and their possible interpretation. Section 4 introduces our proposal of Fuzzy Dijkstra Algorithm applied on a network with fuzzy costs and using the Total Integral Method proposed in [9] as the ranking procedure for fuzzy numbers. Section 5 presents the application of these theoretical concepts to a communication network with a description of the communication network used, the different cost functions used in the comparison as well as the different strategies to search the optimal path (with a particular interest in Strategy 8). Section 6 deals with our experimental study, where the reader can find the simulation results and their discussion. Finally, Section 7 summarizes the main and conclusive ideas of this work and we also outline future research lines of work.

2. Related Work

In this Section, we will first review the strategies used to search the shortest (or more efficient) path in a communication network. Concerning classic strategies (based on crisp magnitudes), we consider some approaches to be among the most known and used at the moment. The Shortest-Widest (SW) strategy presented in [10] searches for the path with the largest residual bandwidth path (that is, the more efficient path). When there are two paths with the same value for this metric, the criterion about the path length is used so that the one with the lower number of hops is selected. The Widest-Shortest (WS) strategy, explained in [11], proceeds contrary to SW. WS searches for the path with the minimum number of hops, and if there are two paths with the same number of hops, the one with the maximum residual bandwidth is selected. The Shortest Dist Path is described in [12,13]. This strategy uses a hyperbolic cost function based on the inverse of the residual bandwidth to identify the best path. In these works, the authors perform an exhaustive comparison between SW, WS and Shortest Dist Path algorithm. When there is traffic without a reserve of resources, the Shortest Dist Path algorithm is clearly advantageous, especially under overload conditions. In [14], the goal is to find the optimum path in order to reduce the Bandwidth Rejection Ratio (BRR). A comparison of cost functions applied to software-defined networks is carried out. In fact, based on a cost function that uses a variant of the Shortest Dist Path algorithm, the algorithm DORA 0.9 provides the best results in [15]. In [16], the authors carry out an extensive study of different strategies and different network topologies concluding that widest-shortest is the best strategy among the studied ones in high load conditions.
Other approaches to the optimal path search problem in a communication network are based on the adaptation of control techniques based on fuzzy inference. In this case, the values of the cost functions on the links are crisp, but the uncertainty is applied to the inference process itself. Thus, in [17], the authors developed a fuzzy inference system using the Expected Transmission Time (ETX) and the number of hops as input variables to find the best server node in a P2P wireless mesh. The fuzzification of these variables and their introduction in the fuzzy decision rules allow us to outperform the efficiency of traditional methods, which select the server node based on a min-hop or random criteria. The work in [18] addresses the problem of file sharing. The authors proposed that the server node selected for this operation is the one with the highest degree of trustworthiness. In [19], the authors proposed a fuzzy inference system to find the path in a sensor network taking into account the remaining energy, the minimum number of hops and the node traffic load. In [20], the authors addressed the problem of selecting the best communication path to reach a gateway while performing a load balancing. Fuzzy-logic functions are evaluated for this purpose. Type-II fuzzy logic has also been applied in wireless communication networks to find the optimal paths. With this technique, the work in [21] focused on selecting the best path to reach the gateway in an Internet-connected network.
An alternative fuzzy approach to the network modeling assumes that the uncertainty lies on the value of the cost functions. This uncertainty can be modeled by using fuzzy numbers. In these cases, the application of a classic path search algorithm such as Dijkstra Algorithm involves solving the problem of operating with fuzzy numbers (e.g., adding up the fuzzy costs of the links in a path) and comparing fuzzy numbers (e.g., the comparison between the total cost of two paths). In [22], the definitions of the Graded Mean Integration Representation and the expression for the sum and product of two (triangular or trapezoidal) fuzzy numbers were developed with particular mathematical rigor using an integral representation. This study allows operating and comparing fuzzy numbers. Refs. [23,24] adopted this representation, which was used to adapt the Dijkstra algorithm to fuzzy costs in a generic transportation network.
In this paper, we base our proposal on the modeling of a network by assigning a triangular fuzzy number to the links costs. For the comparison of triangular fuzzy numbers, a generalized definition for the Total Integral of a fuzzy number proposed in [9] is used. This is different from the above mentioned Graded Mean Integration Representation. The different metrics discussed above (WS, SW, Normalized Used Bandwidth) are adapted to the definition of fuzzy number and compared with the classic versions on the simulated environment of two well known communication networks, based on the topology of the Nippon Telegraph and Telephone (NTT) and the National Science Foundation’s Network (NSFNET), respectively. In general, our fuzzy versions surpass or equal the crisp versions in all cases by a small statistically significant margin. In addition, a new cost function based on the triangular fuzzy number definition is developed, and given a physical explanation of its properties. Our optimization strategy based on this latter function (named Strategy 8) surpasses the other tested algorithms, giving a result of the Delivery Bit Ratio close to 1.
Parallel to this work, this Strategy 8 has already been applied to the problem of searching for the shortest pair of disjoint edge paths in a communication network [5]. It has proven its effectiveness in managing a network with two types of traffic. This topic is of applicability in financial or governmental services, where privacy and security against external attacks are imposed requirements. On the other hand, our methodology could be transferred to city or road traffic management by modeling road or street networks as a graph where links have a limited traffic capacity that can be measured. In these conditions, actualization of traffic density cannot be carried out in a continuous time manner, thus our fuzzy modeling of the network is justified. In  [25] this problem is posed and attacked by means of methodologies based on crisp measurements.

3. Fuzzy Modeling of a Communication Network

Fuzzy graphs can be classified into five main groups according to the fuzziness of the vertex set, the edge set and/or the edge weights. For our network model, we know the vertex and the edge sets as they correspond to the nodes and the connection lines. However, the weights of the edges (the costs in our network) are fuzzy numbers, as we cannot determine their exact value. According to [4], these features lead to a Type-V fuzzy graph.
In this section, we describe the Type-V fuzzy graph associated to the network. We also provide the definition of a fuzzy number and its possible interpretation to ease a better understanding of our approach. At this point, it is necessary to clarify that the definition of a triangular fuzzy number is not equivalent to that of a triangular probability distribution. While the probability distribution responds to a binary logic (the excluded third principle is respected), the fuzzy number responds to a multivalued logic. We can say that the membership function that defines the fuzzy number does not provide the probability that the number takes a certain value, but rather the ratio in which the number is that value. Thus, processing uncertainty and the properties of both fuzzy and probabilistic approaches are different. Zimmermann distinguishes them as “linguistics” and “stochastic” uncertainty, respectively, [26,27].
Definition 1.
(Type-V fuzzy graph) A Type-V fuzzy graph is based on known vertexes and edges. However, the costs of the edges has some uncertainty. It can be interpreted as a crisp graph in which the costs of the edges are fuzzy numbers.
Our network is described as a Type-V fuzzy graph G ˜ , which is defined as follows:
  • G ˜ = ( V , E , C ) is a triplet where,
    V is the set of vertexes
    E is the set of edges
    C is the set of fuzzy costs. C ˜ i j C : fuzzy cost of edge ( i , j ) , i , j V
    Figure 1 depicts an example of a Type-V fuzzy graph.
  • G ˜ is connected, that is, there is a path between each pair of different nodes in G ˜ .
  • C ˜ e i j C , e i j E , is the fuzzy cost of edge e i j . The cost of path P, denoted as C ˜ P , is a function of the cost of its constituent edges, i.e.,:
    C ˜ P = f ( C ˜ e i j ) , e i j P
There are several ways to define a fuzzy number, but for the goal of this paper, we adopt the definition referred to as a f L - f R positive fuzzy number.
Definition 2.
( f L f R Positive fuzzy number) The membership function of a positive fuzzy number C ˜ ( u , v ) = ( a , b , c , d , ω ) , which is associated to the cost of an edge e = u , v being u , v V , is:
μ C ˜ ( u , v ) ( x ) = f L ( x ) a x b ω b x c f R ( x ) c x d 0 o t h e r w i s e
where f L : [ a , b ] [ 0 , ω ] and f R : [ c , d ] [ 0 , ω ] are a strictly increasing and decreasing functions, respectively. They are also continuous functions with ω [ 0 , 1 ] .
We assume f L and f R to be linear functions. Thus, according to the values of ω , the cost of each edge is either normalized or generalized, and according to a, b, c and d, this cost is a triangular or trapezoidal fuzzy number (see Figure 2).
  • C ˜ ( u , v ) normalized triangular fuzzy number ( ω = 1 , b = c ).
  • C ˜ ( u , v ) normalized trapezoidal fuzzy number ( ω = 1 , a b c d ).
  • C ˜ ( u , v ) generalized triangular fuzzy number ( ω 1 , b = c ).
  • C ˜ ( u , v ) generalized trapezoidal fuzzy number ( ω 1 , a b c d ).
In what follows from this work, we focus on considering normalized triangular fuzzy numbers A ˜ = ( a , b , c ) .

4. Dijkstra Algorithm for Type V Fuzzy Graph

In order to work with the fuzzy costs associated to the links in a Type-V fuzzy graph, we propose a modified version of the classical Dijkstra algorithm referred to as fuzzy Dijkstra algorithm (FDA). In a similar way to the classical version, the proposed algorithm is able to identify the shortest path between a generic source vertex r and another vertex on the graph G ˜ , even when the costs are fuzzy numbers.
This algorithm is supported by the arithmetic operations and the ranking method of triangular fuzzy numbers.

4.1. Arithmetic Operations of Normalized Triangular Fuzzy Numbers

For the arithmetic operations of fuzzy numbers, the α -cut method is used. This method is quite simple (in comparison to the Extension Principle method) since the operation between fuzzy numbers is reduced to the operation of ordinary intervals in R .
First, two essential properties for the operations of triangular and trapezoidal fuzzy numbers are considered:
  • The results from addition and subtraction between triangular or trapezoidal fuzzy numbers are also a triangular or trapezoidal fuzzy number, respectively.
  • The results from multiplication or division, as well as maximum or minimum operations in triangular or trapezoidal fuzzy numbers, are not a triangular or trapezoidal fuzzy number, respectively.
The α-cut interval of a normalized triangular fuzzy number A ˜ , denoted by A ˜ α , is an ordinary crisp interval in R containing all the elements of A ˜ whose membership degree is greater than or equal to the specified value α [ 0 , 1 ] . Let A ˜ = ( a , b , c ) be a normalized triangular fuzzy number with its membership function defined in Equation (1), where f L ( x ) = x a b a and f R ( x ) = c x c b , A ˜ α is defined as in Equation (2).
A ˜ α = ( b a ) α + a , ( c b ) α + c α [ 0 , 1 ] ,
The following two properties of fuzzy numbers are based on the representation of a fuzzy set and the definition of the α -cut of a fuzzy set:
(a)
Each fuzzy set, and thus each fuzzy number, can fully and uniquely be represented by its α -cut.
(b)
α -cuts of each fuzzy number are closed intervals of real numbers for all α [ 0 , 1 ] .
Definition 3 provides the necessary elements to define the α -cut of the fuzzy number ( A ˜ B ˜ ) by the α -cuts of the fuzzy numbers A ˜ and B ˜ . Thus, the operation of standard crisp intervals can be used to find ( A ˜ B ˜ ) α .
Definition 3.
Let A ˜ and B ˜ denote fuzzy numbers and let denote any of the four basic arithmetic operations “ + , , · , ÷ ”. Then for any α ( 0 , 1 ] , the fuzzy set on R , ( A ˜ B ˜ ) is defined by its α-cut ( A ˜ B ˜ ) α :
( A ˜ B ˜ ) α = A ˜ α B ˜ α ,
For being ÷ , clearly, B ˜ α 0   α ( 0 , 1 ] .
According to First Decomposition Theorem and by using the definition of the union of fuzzy sets, the membership function of ( A ˜ B ˜ ) [28] is computed. Our interest lies on the addition and subtraction of triangular fuzzy numbers. Thus, let A ˜ = ( a 1 , a 2 , a 3 ) and B ˜ = ( b 1 , b 2 , b 3 ) be two triangular fuzzy numbers, if we perform the addition and subtraction of their α -cuts we obtain:
Addition : A ˜ α + B ˜ α = ( a 2 a 1 + b 2 b 1 ) α + a 1 + b 1 , ( a 2 a 3 + b 2 b 3 ) α + + a 3 + b 3 = ( A ˜ + B ˜ ) α
Subtraction : A ˜ α B ˜ α = ( a 2 a 1 + b 1 b 2 ) α + a 1 b 1 , ( a 2 a 3 + b 3 b 2 ) α + + a 3 b 3 = ( A ˜ B ˜ ) α
The triangular fuzzy number A ˜ + B ˜ (and A ˜ B ˜ ) is then found by making α = 0 and α = 1 in expression (3) (and expression (4)), i.e.,
A ˜ 0 + B ˜ 0 = a 1 + b 1 , a 3 + b 3 A ˜ 1 + B ˜ 1 = [ a 2 + b 2 ] A ˜ + B ˜ = ( a 1 + b 1 , a 2 + b 2 , a 3 + b 3 )
and
A ˜ 0 B ˜ 0 = a 1 b 1 , a 3 b 3 A ˜ 1 B ˜ 1 = [ a 2 b 2 ] A ˜ B ˜ = ( a 1 b 1 , a 2 b 2 , a 3 b 3 )

4.2. Ranking Method of Triangular Fuzzy Numbers

For the comparison of the fuzzy costs, we use the ranking criterion proposed by [9]. This method compares the Total Integral of fuzzy numbers based on a parameter α , called index of optimism. This index represents the degree of optimism of the decision-maker. For α taking values greater than 0.5, the comparison between the fuzzy numbers is executed giving priority to numbers higher than the central value. When α is lower than 0.5, the comparison is made considering those values that are lower than the central value.
Let C ˜ ( u , v ) = ( a , b , c , d , ω ) be a generalized trapezoidal fuzzy number representing the fuzzy cost in a link joining the vertexes u and v. For a fixed α , the Total Integral of C ˜ ( u , v ) is defined in Equation (5):
S T α ( C ˜ ( u , v ) ) = ω 2 ( 1 α ) ( a + b ) + α ( c + d ) 2 X min ,
where X min a . For simplicity, since every cost in G ˜ is assumed to be a positive fuzzy number in our study, we set X min = 0 without altering the process performance.
By making the proper modifications on a, b, c and d, the total integral for a normalized triangular fuzzy number can be obtained.
A ranking criterion for the fuzzy costs must be created for our algorithm. To obtain this ranking, an order relation on the set of fuzzy numbers is defined. Let C ˜ 1 and C ˜ 2 be two fuzzy costs (defined either on an edge or a path), for α [ 0 , 1 ] , each C ˜ i , i = 1 , 2 has total integral S T α ( C ˜ i ) , then,
  • If S T α ( C ˜ 1 ) > ( < ) S T α ( C ˜ 2 ) , then C ˜ 1 is greater (smaller) than C ˜ 2 . This is denoted as C ˜ 1 ( ) C ˜ 2 .
  • If S T α ( C ˜ 1 ) = S T α ( C ˜ 2 ) and Me ( C ˜ 1 ) > ( < ) Me ( C ˜ 2 ) , then C ˜ 1 ( ) C ˜ 2 .
  • If S T α ( C ˜ 1 ) = S T α ( C ˜ 2 ) and Me ( C ˜ 1 ) = Me ( C ˜ 2 ) , then C ˜ 1 = C ˜ 2 .
where Me ( C ˜ i ) ( i = 1 , 2 ) denotes the median of the fuzzy number C ˜ i . To compute the median of the fuzzy cost C ˜ i = ( a , b , c ) , first it is necessary to identify if the median is smaller or greater than the value b.
  • If b a c a 2 , then a Me ( C ˜ i ) b and Me ( C ˜ i ) = a + ( b a ) ( c a ) 2 .
  • If c b c a 2 , then b Me ( C ˜ i ) c and Me ( C ˜ i ) = c ( c b ) ( c a ) 2 .
This relation is an order relation because it meets the antisymmetry, reflexivity and transitivity properties. On the other hand, since the total integral satisfies the linearity property, we can apply this order relation for both the comparison between the cost of two links and the cost of two paths using the comparison between their total integrals. Therefore, the classic Dijkstra algorithm can be applied.

4.3. Fuzzy Dijkstra Algorithm

Let Ψ ( r , v ) denote the set of all paths between r and v ( v , r V with v r ), and P * Ψ ( r , v ) be the shortest path between r and v. The cost of P * is defined as:
δ ˜ ( r , v ) = C ˜ P * ( r , v ) = min P Ψ ( r , v ) { C ˜ ( P ( r , v ) ) } if Ψ ( r , v ) if Ψ ( r , v ) = ,
Then, for each vertex v V , the algorithm defines an attribute d ˜ , which is an upper bound on the cost of P * ,
d ˜ ( v ) δ ˜ ( r , v ) ,
Given a vertex v V , we will denote by Γ ( v ) the set of neighbors of v, that is, the adjacent vertexes to v. Moreover, we will denote by w ( v ) the predecessor of v in P * . The algorithm considers w ( v ) to be either a vertex of Γ ( v ) or NIL. Actually, during the execution of the algorithm, w ( v ) is the predecessor of v in the shortest path to v known so far. Only when the algorithm has ended, we can say that w ( v ) is the predecessor of v by the shortest path from r to v.
Every vertex is assigned a label, which is modified during the algorithm execution. At each stage, the label of vertex v V contains its predecessor in the (known so far) shortest path from r to v, and the corresponding cost of this path, i.e.,
Label ( v ) = d ˜ ( v ) , w ( v ) with d ˜ ( v ) = d ˜ ( w ( v ) ) + C ˜ ( w ( v ) , v ) w ( v ) : ( predecessor   vertex   of   v in   the provisional   path P * ( r , v ) )
where C ˜ ( w ( v ) , v ) is the cost of link ( w ( v ) , v ) .
At the end of the algorithm, for each vertex v, d ˜ ( v ) will coincide with δ ˜ ( r , v ) and w ( v ) will be its predecessor in P * ( r , v ) .
The initialization (Algorithm 1) assigns a label to every vertex in G ˜ . The cost of the shortest path from r to any other vertex in v V is initialized as , except for r, which is set to be equal to 0.
Algorithm 1 Initialization
1:
functionInitialize-single-source( G ˜ , r , C )
2:
     d ˜ ( r ) ( 0 , 0 , 0 )
3:
     w ( r ) N I L
4:
    for each vertex v V { r }  do
5:
         d ˜ ( v )
6:
    end for
7:
end function
The algorithm proceeds by choosing and extracting vertexes from a set, denoted as H, which is initially defined as V. At each iteration, the vertex u with minimum cost is selected in H according to the ranking method described in Section 4.2. Then, the cost d ˜ of the neighbors of vertex u are analyzed in the Algorithm 2 (Relaxation). Thus, the label of each neighbor v Γ ( u ) is updated if the path from r to v at which u = w ( v ) has the minimum cost at this point of the algorithm.
Algorithm 2 Relaxation of v
1:
functionRelaxation( u , v , C ˜ ( u , v ) , α )
2:
     d ˜ n e w ( v ) : = d ˜ ( u ) C ˜ ( u , v )
3:
    if  S T α ( d ˜ ( v ) ) > S T α ( d ˜ n e w ( v ) ) or [ S T α ( d ˜ ( v ) ) = S T α ( d ˜ n e w ( v ) ) and M e ( d ˜ ( v ) ) > M e ( d ˜ n e w ( v ) ) ] then
4:
         d ˜ ( v ) d ˜ n e w ( v )
5:
         w ( v ) u
6:
    end if
7:
end function
The algorithm ends when set H is empty. At this point, the label of each vertex v contains the cost of P * ( r , v ) ( δ ˜ ( r , v ) ) with its predecessor w ( v ) on this path. Following a backward procedure, the shortest path between r and each vertex is found. Algorithm 3 shows the pseudocode of the Fuzzy Dijkstra Algorithm.
Algorithm 3 Dijkstra( G ˜ , r , C )
1:
Initialize-single-source( G ˜ , r , C )        ▹ Initialization
2:
H V
3:
while H do
4:
     u t | d ˜ ( t ) = min x H d ˜ ( x )
5:
    Update H H { u }
6:
    if  Γ ( u ) H  then
7:
        for each vertex v Γ ( u ) H  do
8:
           Relaxation( u , v , C ˜ ( u , v ) , α )        ▹ Relaxation of v
9:
        end for
10:
    end if
11:
end while

5. Application to a Communications Network. Fuzzy Functions and Strategies

5.1. Description of the Communications Network

We carry out our study on two well known communication networks: the Nippon Telegraph and Telephone (NTT) and the National Science Foundation’s Network (NSFNET). We have set the capacity of their links to 1 Gbit/s and 0.5 Gbit/s, respectively. The connections use Multi-Protocol Label Switching (MPLS) [29], so that once the path between two nodes is selected, it remains unchanged during the connection time. This practice is widely used in networks relying on quality of service (QoS) techniques to avoid the network to become unstable when applying dynamic routing. On the other hand, the connections are established without resource reservation. This implies that the connection is never rejected, although there can be a loss of information in the links when their capacity is exceeded. This way of proceeding is usual in IP networks since the management necessary for the resource reservation reduces the maximum throughput that the network can achieve.
In the simulated networks, each node is identified by an index i and the link between nodes is determined by the source-destination index pair i j . The capacity (or bandwidth) of a link ( i , j ) , ( C i j ) and its Used Bandwidth at time t, ( [ B W ] i j [ t ] ) will be used as the two primary magnitudes.

5.2. Description of Cost Functions and Strategies

In this section, we describe the different cost functions used in our experiments. These functions are defined both in their classic form (as crisp numbers) and in their fuzzy version as triangular fuzzy numbers. Let us remember from the Introduction that our first objective is not to compare the efficiency of the different cost functions, but rather the competitiveness of the fuzzy model based methodology versus that the traditional mode-based one using crisp magnitudes, for each cost function.
Additionally, as one of the main contributions of this paper and as our second objective, we propose a new fuzzy cost function that has no crisp equivalent, since it is an empirical adaptation of the generalized fuzzy number model described above. This new function will be explained in detail when presenting Strategy 8.
The simulated classic cost functions are the following:
  • Normalized Instantaneous Used Bandwidth [30]:
    It is the value of the bandwidth occupied in a link at the instant t, when weighted according to Equation (6).
    b w i j ( t ) = B W i j ( t ) C i j C max C i j ,
    where,
    • b w i j ( t ) is the Normalized Instantaneous Used Bandwidth on link ( i , j ) at the instant t.
    • B W i j ( t ) is the Instantaneous Used Bandwidth on link ( i , j ) at the instant t.
    • C i j is the capacity of link ( i , j ) .
    • C max is the capacity of the link with the highest bandwidth in the network.
    This value will be updated in the routing tables with a predefined periodicity according with the measurement protocol. Therefore, it will be considered “fixed” during the update period.
  • Normalized Mean Used Bandwidth, [5]:
    It is the mean value of the Used Bandwidth in a particular link, over a considered time interval. This value is normalized by the capacity of the link and is weighted according to the ratio between the network’s larger capacity and the current link capacity. It is defined in Equation (7).
    [ b w ] ¯ i j = [ B W ] ¯ i j C i j C max C i j ,
    where,
    • [ b w ] ¯ i j is the Normalized Mean Used Bandwidth in link ( i , j ) at a measurement time interval.
    • [ B W ] ¯ i j is the Mean Used Bandwidth in link ( i , j ) at the measured period of time.
    • C i j and C max as defined above.
  • Mean Residual Bandwidth associated with a link (or a path):
    In a link ( i , j ) , the Mean Residual Bandwidth ( r ¯ i j ) is defined by the difference between the link capacity and [ B W ] ¯ i j at the considered time interval, as shown in Equation (8).
    r ¯ i j = C i j [ B W ] ¯ i j ,
    The Mean Residual Bandwidth of a path ( r ¯ P ) is given by the minimum among the Mean Residual Bandwidths of the links that are part pf the path, that is, the Residual Bandwidth of the “worst” link.
Equations (6)–(8) will be transformed into triangular fuzzy numbers. In particular, in our experimental study, for each link ( i , j ) at the n-th time interval, we will use triangular fuzzy numbers ( a , b , c ) , where a and c are computed from the minimum and maximum values of the variable measured at the ( n 1 ) -th time interval, and b is computed from the mean value of the variable over the ( n 1 ) -th time interval.
Once the cost functions have been described, we define the different strategies for searching the shortest path by using the Dijkstra algorithm in both its crisp and fuzzy versions.

5.3. Strategies for the Search of Path with Minimum Cost

Here, we describe the set of well-known strategies that we will use to compare the competitiveness of the fuzzy model based methodology versus the traditional crisp based mode. All these strategies are designed to search the best communication path by the application of the Dijkstra algorithm. Therefore, we compare both methodologies based on the relative results for each strategy and not on their absolute terms.
  • Strategy 1. Application of Dijkstra algorithm using the Normalized Instantaneous Used Bandwidth as the cost function (Equation (6)). This strategy aims to find the path with the minimum sum of the Normalized Instantaneous Used Bandwidths of their links. The instants at which this magnitude is measured will be given by t = t 0 + n T , where t 0 is the instant of the first measurement, and the measured value will be considered constant during T (time interval between measurements). The total cost of a path is given by the algebraic sum of their links costs. Thus, this is a strategy of additive costs.
  • Strategy 2. Application of Dijkstra algorithm using the Normalized Mean Used Bandwidth as the cost function (Equation (7)). With this strategy, we intend to find the path that minimizes the sum of the Normalized Mean Used Bandwidths of their links.
    In Strategies 1 and 2, we consider the magnitudes as crisp numbers.
  • Strategy 3. Application of fuzzy Dijkstra algorithm using the Fuzzy Normalized Used Bandwidth. The cost function at the n-th time interval is defined in Equation (9),
    [ b w ] ˜ i j = [ b w ] i j min , [ b w ] ¯ i j , [ b w ] i j max ,
    where [ b w ] i j min and [ b w ] i j max are the minimum and maximum value of the Normalized Instantaneous Used Bandwidths measured in the ( n 1 ) -th time interval, respectively, and [ b w ] ¯ i j is the mean value of the variable during the ( n 1 ) -th time interval. In this instance, the fuzzy Dijkstra algorithm described in Section 4 was applied considering additive fuzzy costs. This strategy is directly comparable to Strategy 1 and 2.
  • Strategy 4. (Shortest-Widest, SW) [10]. This strategy searches for the path with the maximum Mean Residual Bandwidth from (Equation (8)). If there are several paths with the same maximum value, the strategy chooses the one with the minimum number of edges (hops). While the previous metrics are additive (the cost of the path is the sum of the costs of their links), the Residual Bandwidth is concave (the cost of the path is the cost of the link with minimum cost). Note that this metric is not properly a cost, but quite the opposite: it is a metric that measures the goodness of a link. Therefore, the goodness of a path will be associated with that of its worst link (the one with minimal residual bandwidth).
    Figure 3 helps understanding how this strategy works. The residual bandwidth appears on each link. According to the SW, paths P A and P C are firstly chosen (paths with the maximum residual bandwidth in their worst link), and between those two, path P C is selected, since it has the minimum number of hops.
  • Strategy 5. (Fuzzy Shortest-Widest, FSW). It is the same than Strategy 4, but defining the Fuzzy Mean Residual Bandwidth measurement of each link ( i , j ) as a triangular fuzzy number ( r i j min , r ¯ i j , r i j max ) where r i j min , r ¯ i j and r i j max are computed according to Equation (10),
    r i j min = c i j [ B W ] i j max , r ¯ i j = c i j [ B W ] ¯ i j , r i j max = c i j [ B W ] i j min ,
    The path selection is performed following the fuzzy Dijkstra algorithm. This strategy is directly comparable with Strategy 4.
  • Strategy 6: (Widest-Shortest, WS) [11]. This strategy consists of the inverse process of the SW. First, it searches for the path with the minimum number of hops. In case of several paths with the same number of hops, the strategy searches for the one with the maximum residual bandwidth.
    Figure 4 shows the application of WS to the same network illustrated in Figure 3. The paths with the minimum number of hops are P B and P D . Among them, the strategy WS chooses the path P B because it has the maximum Residual Bandwidth used bandwidth in its worst link.
  • Strategy 7: (Fuzzy Widest-Shortest, FWS). Using the same definition of fuzzy cost as in Strategy 5, the same selection pattern is followed as in Strategy 6. This strategy competes with Strategy 6.
Finally, we propose a new strategy (Strategy 8), which uses a new fuzzy cost function that has no crisp equivalent since it is an empirical adaptation of the generalized fuzzy number model described above. This new strategy and its cost function are explained in detail below.
  • Strategy 8. It can be verified that the smaller the bandwidth used during the interval ( n 1 ) -th time (period where the measurements were made), the higher the degree of uncertainty in the values considered for the used bandwidth at the n-th time interval. We can explain the above statement by the following two factors,
    • The percentage of variation. When a link has a very low used bandwidth, a new connection causes a high relative variation in the value of the occupied bandwidth. On the contrary, if the used bandwidth is large, a new connection will have little impact on the relative variation.
    • The routing algorithm itself. The routing algorithm prioritizes the least used links so that the smaller the occupation of a link is, the most likely this parameter varies significantly in the next time interval.
    These reasons lead us to redefine the fuzzy number that describes the occupation in Strategy 3 (Equation (9)), which is multiplied by a coefficient. The Modified Fuzzy Normalized Used Bandwidth in a link ( i , j ) is defined in Equation (11).
    C o s t ˜ S t 8 = A B [ b w ] ¯ i j [ b w ] ˜ i j ,
    In practice, this operation produces a displacement to the right and a widening of the fuzzy number. In our experiments we set A = 10 and B = 20 .

6. Experimentation and Results

6.1. Description of the Experiment

In this work, the simulator OMNET ++ [31] is used for the experimentation. The code used for the experiment and the configuration files can be downloaded from [32]. A flow-oriented simulation is performed to reduce the execution time of each simulation (the alternative packet-oriented simulation would require an execution time in the order of thousand times greater).
In our study, a 57-node and a 12-node networks were used. The first one is based on the topology of the backbone network of the Nippon Telegraph and Telephone (NTT). This topology has been extensively used in the related literature such as in [33]. The particular characteristics of our implementation can be found in the examples of the use of the OMNeT ++ simulator [31] (Figure 5). The second one is based on the topology of the National Science Foundation’s Network (NFSNET) (Figure 6) [34]. This network is obsolete today, but it has been used extensively in the study of routing protocols.
Our data loss model simulates an optical burst switching network (OBS) without storage. If a burst does not have enough bandwidth on a link, the information is discarded (that is, the information is lost) until there are enough resources. When there are not enough resources at any time during the burst lifetime, the complete burst is discarded. The model and source code required to carry out these simulations are found in [32].
To facilitate the reproduction of the experiments, we have carried out ten simulations with different seeds for each of the different strategies, where every node generates traffic with the same probability. We have adjusted the traffic in both networks to work in a close saturation mode, because we want to study the performance of the different strategies under these conditions. With low saturation, all the strategies can deliver the traffic successfully, and in high saturation conditions, the percentage of losses impacts on the network performance. Table 1 and Table 2 indicate the features of the traffic used for the first and second network topologies, respectively.
Each parameter characterizing the traffic is described next:
  • Call rate: Mean number of connections requests.
  • Call duration: Interval of time at which the connection is active once it is established.
  • Type of traffic: Data are transmitted for a specific time (burst with constant bandwidth) and they are not transmitted for another time interval.
  • Used Bandwidth over an ON period: Resources required for a connection over an ON period. Since we are considering an ON period of 5 s and an OFF period of 1 s, the Mean Used Bandwidth for a connection is 25 Mb/s, that is, approximately, the Used Bandwidth of an Advanced Video Coding High Definition (AVCHD) connection. We use this value in order to work in conditions of saturation.
  • ON period: Transmission period. It is modeled by a random distribution. In our case we use an exponential distribution with a mean of 5 s.
  • OFF period: Period without transmission, that is, without consumption of resources. We use the same exponential function with a mean of 1 s. We force an off period to guarantee the competition of the burst.
  • Connection type: Given a connection, both nodes can be source and destination simultaneously with the same consumption of resources. Thus, the connection is symmetrical and bidirectional.
  • Simulation time: It is the simulated time assigned to each experiment (do not confuse with the duration of the simulation).
  • Interval of time to update routing tables: Interval of time used to measure the average occupation of links and update the routing tables. Higher values in this parameter imply higher uncertainty in the measurements.
In our simulation scenario, source and destination nodes are randomly selected (with equal probability) among all the nodes in the network. Thus, there are multiple active source-destination pairs simultaneously.
In the networks, our magnitudes of interest are the total number of sent and received bytes by each node at each simulation interval.
From the previous values, we calculate the following metrics:
  • Mean Delivery Rate (MDR): Total number of received bits divided by the total number of sent bits during an experiment. This value indicates the probability that a sent data is finally received. We use this value to obtain the GMDR.
  • Global Mean Delivery Rate (GMDR): Mean of the MDR in ten experiments.
  • Confidence interval (Computed with a probability of 0.95).

6.2. Results and Discussion

As a previous question, we raise some considerations about the suitability of applying the Dijkstra Algorithm in our problem. It is known that it can present two major drawbacks. On one hand, it does not converge in graphs with negative costs, which may imply a negative cycle. That could result in an infinite cycle, which will block the algorithm to find a solution [35]. On the other hand, when there is more than one shortest path between origin and destination nodes, Dijkstra algorithm will always provide the first one it finds, which can generate unbalanced solutions. The first drawback does not apply to our problem since all the links in our graphs have positive weights (the three parameters of our fuzzy numbers correspond to positive quantities measured in the network as described in Section 5.3). Regarding the second drawback, the probability that several paths generate the same value of their fuzzy costs is very low because of the high variability of their fuzzy triplets. Under these considerations, we can conclude that our fuzzy version of the Dijkstra algorithm is a reliable tool for solving our problem. In any case, we have alternatively implemented a Dijkstra algorithm for k-Shortest paths with k = 10, which extracts the 10 best routes. If there are several best routes with the same cost, it randomly selects one of them. Although in practice this algorithm is not necessary, its implementation is available in GitHub with the rest of the source codes of the simulator. When tested for our problems, we derived similar results.
To compare and rank the performance of the different strategies we calculate the Global Mean Delivery Rate (GMDR) such as it is defined above. This parameter informs about the ratio between the bits received and those sent during a complete simulation. Thus, comparison and ranking of the different strategies with different cost functions is possible. Table 3 and Table 4 show these values together with the associated confidence intervals for NTT and NFSNET networks, respectively. Figure 7 and Figure 8 show the same information in a bar diagram for NTT and NFSNET. We can see that the behavior is qualitatively similar for both networks in all the analyzed strategies.
After a detailed analysis of each group of strategies, we obtain the following consideration for both studies:
When applying Strategy 3 (using Fuzzy Normalized Used Bandwidth as a cost function), we observe that the value of the GMDR surpasses its crisp equivalents (strategies 1 and 2), although in a small percentage. We find that confidence intervals are not overlapping. From the statistical point of view, this means that the results are distinguishable so that the resulting comparison has statistical validation.
Similarly, with Strategy 5 (Fuzzy Shortest-Widest), the value of the GMDR surpasses its crisp equivalent (Strategy 4), but their confidence intervals are overlapped. Thus, we must consider both results as equal from a statistical point of view.
Strategies 6 and 7 (Widest-Shortest and Fuzzy Widest-Shortest, respectively) have the same GMDR values with practically equal confidence intervals. We also observe that strategies 6 and 7 are superior to the previous ones (in the order of 10%). Our hypothesis in this regard is the advantage of these strategies working in a network close to saturation. Since these strategies search for paths with the minimum number of hops, they contribute to a lesser flow of information through the network. Therefore, Strategies 6 and 7 are benefited by the low consumption of resources when compared to Strategies 1 to 5.
Finally, as the main result of this study, we verify that Strategy 8 (proposed for the first time in this work), achieves a performance which is widely superior to all the previous ones. In particular, the value of GMDR is close to 1.
Therefore, the obtained results can be summarized with the following two statements:
  • Fuzzy versions of the classical strategies are more efficient (or practically equal) than their corresponding crisp versions, although in a very narrow margin. Thus, we can say that our fuzzy modeling of a communications network correctly incorporates the uncertainty in the measurement variables, being competitive.
  • Strategy 8, proposed by us, is the most efficient one with a clear advantage over the rest of the strategies. Specifically, it leads to a GMDR close to 1. This advantage comes from the definition of a new fuzzy cost function that incorporates our empirical knowledge about the effects of measurement uncertainty.

7. Conclusions

In this paper, we addressed the problem of searching the shortest path (or more efficient path, in a more general sense) between two nodes in a communication network, considering uncertainty in the measurements used in the cost function. The above referred uncertainty is inevitably caused by the network dynamics and the impossibility of making decisions with the instantaneous measurement of the state variables at each moment. Thus, in general, over a given time interval, decisions on the routing of information are made using measurements obtained in the previous time intervals, which, naturally, can differ from the current ones.
In order to incorporate our fuzzy cost functions and strategies into a communication network management system, we associate the network to a Type-V Fuzzy Graph. In this graph, nodes and links are clearly located (without uncertainty), but a triangular fuzzy number defines the cost for each connection. Moreover, a fuzzy version of Dijkstra’s routing algorithm was developed and exhaustively described. This is called Fuzzy Dijkstra Algorithm (FDA). Simulated experiments have shown its correct operation and competitiveness. It is essential to distinguish this approximation, in which the uncertainty lies on the value of the variables, from other approximations based on Fuzzy Inference, where these values are considered crisp (precise data) and the uncertainty lies on the decision rules used.
For our experimental study, we implemented the most commonly used cost functions and strategies in the management of real networks based on crisp values (e.g., these using the Instantaneous or Mean Used Bandwidth or Residual Bandwidth as cost function, Shortest-Widest (SW), Widest-Shortest (WS)) and we confronted them with their similar ones based on our definition of fuzzy costs. As an especially interesting contribution, we proposed a new fuzzy strategy (Strategy 8) that has no correspondence with any classic one, which adapts the definition of the fuzzy cost to the fact that the smaller the Used Bandwidth at the ( n 1 ) -th time interval (where the measurements have been obtained) the more significant uncertainty in the Used Bandwidth value considered in the n-th time interval.
We made the experiments on two representative network topologies. Fuzzy Strategy 3 surpasses their analogous crisp ones (strategies 1,2) in a slightly, but statistically significant way. As for the fuzzy Strategies 5 and 7, we observed that they do not present statistically significant differences with their analogous crisp Strategies 4 and 6, respectively. However, our new fuzzy strategy (Strategy 8), with an effectiveness ratio very close to unity, clearly surpasses the rest of the analyzed strategies. Therefore, we conclude that our methodology to introduce the inherent uncertainty to the dynamic nature of the network in the routing algorithms has been successful.

Author Contributions

Conceptualization, L.V. and S.M.A.; methodology, L.V. and A.A.; validation, L.V., A.A. and G.J.; formal analysis, L.V. and S.M.A.; software, A.A.; writing—original draft preparation, L.V., A.A. and A.T.; writing—review and editing, L.V., A.A., S.M.A., G.J. and A.T.; visualization, A.T.; supervision, G.J.; project administration, G.J.; funding acquisition, A.T. and G.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partially supported by the University of Málaga-Andalucía Tech through the Plan Propio de Investigación y Transferencia and by the II Plan Propio Smart-Campus with the project “Smart and Secure EV Urban Lab II”.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data used in our research are synthetic values generated by means simulation. All the data and experimental software routines are freely available at https://github.com/aarizaq/flowsimulator (accessed on 31 July 2021). The post-process and figures have been done by using LibreOffice.

Acknowledgments

The publication of this work has been partially financed by the University of Málaga, through its Own Research and Transfer Plan.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

References

  1. Ariza, A.; Casiliari, E.; Sandoval, F. Strategies for updating link states in QoS routers. Electron. Lett. 2000, 36, 1749–1750. [Google Scholar] [CrossRef] [Green Version]
  2. Bansal, A. Trapezoidal Fuzzy Numbers (a,b,c,d): Arithmetic Behavior. Int. J. Phys. Math. Sci. 2011, 2, 39–44. [Google Scholar]
  3. Banerjee, S.; Kumar, T. Arithmetic Operations on Generalized Trapezoidal Fuzzy Number and its Applications. Turk. J. Fuzzy Syst. 2012, 3, 1190–1309. [Google Scholar]
  4. Blue, M.; Bush, B.; Puckett, J. Unified approach to fuzzy graph problems. Fuzzy Sets Syst. 2002, 125, 355–368. [Google Scholar] [CrossRef]
  5. Valdés, L.; Ariza, A.; Allende, S.M.; Joya, G. Searching the Shortest Pair of Edge-Disjoint Paths in a Communication Network. A Fuzzy Approach. In Advances in Computational Intelligence; Rojas, I., Joya, G., Catala, A., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 640–652. [Google Scholar]
  6. Valdés, L.; Ariza-Quintana, A.; Alonso, S.; Joya-Caparrós, G. An Implementation of the Dilkstra Algorithm for Fuzzy Costs (Technical Report). Available online: https://hdl.handle.net/10630/17478 (accessed on 31 July 2021).
  7. Valdés, L.; Ariza, A.; Allende, S.M.; Parada, R.; Joya, G. Study of Alternative Strategies to Selection of Peer in P2P Wireless Mesh Networks. In Advances in Computational Intelligence; Rojas, I., Joya, G., Gabestany, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 124–132. [Google Scholar]
  8. Mamdani, E.; Assilian, S. An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man Mach. Stud. 1975, 7, 1–13. [Google Scholar] [CrossRef]
  9. Yu, V.F.; Dat, L.Q. An improved ranking method for fuzzy numbers with integral values. Appl. Soft Comput. 2014, 14, 603–608. [Google Scholar] [CrossRef]
  10. Zheng, W.; Crowcroft, J. Quality-of-service routing for supporting multimedia applications. IEEE J. Sel. Areas Commun. 1996, 14, 1228–1234. [Google Scholar] [CrossRef] [Green Version]
  11. Guerin, R.A.; Orda, A.; Williams, D. QoS routing mechanisms and OSPF extensions. In Proceedings of the GLOBECOM 97. IEEE Global Telecommunications Conference. Conference Record, Phoenix, AZ, USA, 3–8 November 1997; Volume 3, pp. 1903–1908. [Google Scholar]
  12. Dirac, P.A.M. Routing High-bandwidth Traffic in Max-min Fair Share Networks. Physica 1953, 19, 888–896. [Google Scholar] [CrossRef]
  13. Ma, Q.; Steenkiste, P. On Path Selection for Traffic with Bandwidth Guarantees. In Proceedings of the IEEE International Conference on Network Protocols, Atlanta, GA, USA, 28–31 October 1997; pp. 191–202. [Google Scholar]
  14. Tomovic, S.; Radusinovic, I.; Prasad, N. Performance comparison of QoS routing algorithms applicable to large-scale SDN networks. In Proceedings of the International Conference on Computer as a Tool (EUROCON 2015), Salamanca, Spain, 8–11 September 2015. [Google Scholar] [CrossRef]
  15. Boutaba, R.; Szeto, W.; Iraqi, Y. DORA: Efficient Routing for MPLS Traffic Engineering. J. Netw. Syst. Manag. 2002, 10, 309–325. [Google Scholar] [CrossRef]
  16. Al-Jawad, A.; Shah, P.; Gemikonakli, O.; Comsa, I.S.; Trestian, R. Performance evaluation of routing strategies over multimedia-based SDNs under realistic environments. In Proceedings of the 6th IEEE Conference on Network Softwarization (NetSoft), Ghent, Belgium, 29 June–3 July 2020. [Google Scholar] [CrossRef]
  17. Valdés, L.; Montesinos, S.; Ariza, A.; Allende, S.M.; Joya, G. Peer selection in P2P wireless mesh networks: comparison of different strategies. Soft Comput. 2015, 19, 2447–2455. [Google Scholar] [CrossRef]
  18. Umezaki, K.; Spaho, E.; Barolli, L.; Xhafa, F.; Younas, M.; Iwashige, J. An Integrated Fuzzy-based Trustworthiness System for P2P Communications in JXTA-Overlay. In Proceedings of the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, Victoria, BC, Canada, 12–14 November 2012; pp. 278–284. [Google Scholar]
  19. Tian, Y.; Zhou, Q.; Zhang, F.; Li, J. Multi-hop clustering routing algorithm based on fuzzy inference and multi-path tree. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717707897. [Google Scholar] [CrossRef]
  20. Yuste-Delgado, A.; Cuevas-Martinez, J.; Canada-Bago, J.; Fernández-Prieto, J.; Gadeo-Martos, M. Improving hybrid ad hoc networks: The election of gateways. Appl. Soft Comput. 2016, 41, 1–14. [Google Scholar] [CrossRef]
  21. Yuste, A.; Triviño, A.; Casilari, E. Type-2 fuzzy decision support system to optimise MANET integration into infrastructure-based wireless systems. Expert Syst. Appl. 2013, 40, 2552–2567. [Google Scholar] [CrossRef]
  22. Chou, C. The canonical representation of multiplication operation on triangular fuzzy numbers. Comput. Math. Appl. 2003, 45, 1601–1610. [Google Scholar] [CrossRef] [Green Version]
  23. Deng, Y.; Chen, Y.; Zhang, Y.; Mahadevan, S. Fuzzy Dijkstra algorithm for shortest path problem under uncertain environment. Appl. Soft Comput. 2012, 12, 1231–1237. [Google Scholar] [CrossRef]
  24. Mullai, M. Railway Route Optimization System Using Fuzzy Dijkstra’s Algorithm. Int. J. Appl. Math. Sci. 2016, 9, 117–123. [Google Scholar]
  25. Agafonov, A.; Myasnikov, V.V. Vehicle routing algorithms based on a route reservation approach. In Proceedings of the IV International Conference on Information Technology and Nanotechnology, Samara, Russia, 24–27 April 2018. [Google Scholar] [CrossRef] [Green Version]
  26. Hajek, P.; Godo, L.; Esteva, F. Fuzzy Logic and Probability. arXiv 2013, arXiv:1302.4953. [Google Scholar]
  27. Zimmermann, H. Fuzzy Set Theory and Its Applications; Kluwer Academic Publishers: London, UK, 1991. [Google Scholar]
  28. Klir, G.L.; Yuan, B. Fuzzy Sets and Fuzzy Logic. Theory and Applications; Prentice Hall PTR: Hoboken, NJ, USA, 1995. [Google Scholar]
  29. Rosen, E.; Viswanathan, A.; Callon, R. RFC3031: Multiprotocol Label Switching Architecture. 2001. Available online: https://www.rfc-editor.org/info/rfc3031 (accessed on 31 July 2021).
  30. Xin, C.; He, F. Cross-Layer Path Computation for Dynamic Traffic Grooming: In Mesh WDM Optical Networks. In Proceedings of the 43rd Annual Southeast Regional Conference—ACM-SE 43, Kennesaw, GA, USA, 18–20 March 2005; Association for Computing Machinery: New York, NY, USA, 2005; Volume 2, pp. 9–13. [Google Scholar] [CrossRef]
  31. Varga, A. OMNeT++ Discrete Evente Simulator. Available online: https://omnetpp.org/ (accessed on 1 June 2021).
  32. Ariza, A. Flow Simulator to Test QoS Wired Protocols. Available online: https://github.com/aarizaq/flowsimulator (accessed on 1 June 2021).
  33. Xu, Y.; Qu, R. Solving multi-objective multicast routing problems by evolutionary multi-objective simulated annealing algorithms with variable neighbourhoods. J. Oper. Res. Soc. 2011, 62, 313–325. [Google Scholar] [CrossRef]
  34. Foundation, N.S. Review of NSFNET. Available online: https://www.nsf.gov/pubs/stis1993/oig9301/oig9301.txt (accessed on 1 June 2021).
  35. Dinitz, Y.; Itzhak, R. Hybrid Bellman–Ford–Dijkstra algorithm. J. Discret. Algorithms 2017, 42, 35–44. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Type-V fuzzy graph G ˜ = ( V , E , C ) .
Figure 1. Type-V fuzzy graph G ˜ = ( V , E , C ) .
Symmetry 13 01534 g001
Figure 2. The cost of each link can be either a triangular or trapezoidal fuzzy number.
Figure 2. The cost of each link can be either a triangular or trapezoidal fuzzy number.
Symmetry 13 01534 g002
Figure 3. SW applied to a 9-node network with explicit Mean Residual Bandwidth in every link.
Figure 3. SW applied to a 9-node network with explicit Mean Residual Bandwidth in every link.
Symmetry 13 01534 g003
Figure 4. WS applied to a 9-node network with explicit Mean Residual Bandwidth in every link.
Figure 4. WS applied to a 9-node network with explicit Mean Residual Bandwidth in every link.
Symmetry 13 01534 g004
Figure 5. First topology used in our experiments, based on the backbone network of the Nippon Telegraph and Telephone (NTT).
Figure 5. First topology used in our experiments, based on the backbone network of the Nippon Telegraph and Telephone (NTT).
Symmetry 13 01534 g005
Figure 6. Second topology used in our experiments, based on the backbone network of NFSNET network.
Figure 6. Second topology used in our experiments, based on the backbone network of NFSNET network.
Symmetry 13 01534 g006
Figure 7. Bar diagram of the GMDR for each strategy (NTT network).
Figure 7. Bar diagram of the GMDR for each strategy (NTT network).
Symmetry 13 01534 g007
Figure 8. Bar diagram of the GMDR for each strategy (NFSNET network).
Figure 8. Bar diagram of the GMDR for each strategy (NFSNET network).
Symmetry 13 01534 g008
Table 1. Characteristics of the traffic used in the experiments with NTT network.
Table 1. Characteristics of the traffic used in the experiments with NTT network.
Description of the Parameters
Value
Call rate
Poisson Distribution with mean value 0.5 Calls/s
Call duration
Exponential Distribution with mean value μ = 120 s
Type of trafficON/OFF
Used Bandwidth over an ON period30 Mbit/s
ON period
Exponential Distribution with mean value μ = 5 s
OFF period
Exponential Distribution with mean value μ = 1 s
Connection typeSymmetrical and bidirectional
Simulation time10,000 s
Interval of time to update routing tables300 s
Number of replications with different seeds10
Table 2. Characteristics of the traffic used in the experiments with NFSNET network.
Table 2. Characteristics of the traffic used in the experiments with NFSNET network.
Description of the Parameters
Value
Call rate
Poisson Distribution with mean value 0.14 calls/s
Call duration
Exponential Distribution with mean value μ = 60 s
Type of trafficON/OFF
Used Bandwidth over an ON period30 Mbit/s
ON period
Exponential Distribution with mean value μ = 1 s
OFF period
Exponential Distribution with mean value μ = 1 s
Connection typeSymmetrical and bidirectional
Simulation time10,000 s
Interval of time to update routing tables300 s
Number of replications with different seeds10
Table 3. For each Strategy, the GMDR and confidence interval associated (NTT network).
Table 3. For each Strategy, the GMDR and confidence interval associated (NTT network).
StrategiesGMDRErrorConf. Interval [ C I min , C I max ]
CI min CI max
Strategy 10.8600.0040.8560.864
Strategy 20.8610.00640.8560.866
Strategy 30.8700.0040.8660.874
Strategy 40.8500.0150.8350.865
Strategy 50.8570.0130.8430.870
Strategy 60.9660.00250.9630.968
Strategy 70.9660.00260.96320.9684
Strategy 80.99820.00040.99780.9986
Table 4. For each Strategy, the GMDR and confidence interval associated. (NFSNET network).
Table 4. For each Strategy, the GMDR and confidence interval associated. (NFSNET network).
StrategiesGMDRErrorConf. Interval [ C I min , C I max ]
CI min CI max
Strategy 10.8110.0020.8090.813
Strategy 20.8090.00340.8050.812
Strategy 30.8320.0030.830.835
Strategy 40.8560.090.8470.865
Strategy 50.8620.0650.8560.869
Strategy 60.9650.000450.9640.9657
Strategy 70.9650.000460.9650.966
Strategy 80.99510.00010.99490.9952
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Valdés, L.; Ariza, A.; Allende, S.M.; Triviño, A.; Joya, G. Search of the Shortest Path in a Communication Network with Fuzzy Cost Functions. Symmetry 2021, 13, 1534. https://doi.org/10.3390/sym13081534

AMA Style

Valdés L, Ariza A, Allende SM, Triviño A, Joya G. Search of the Shortest Path in a Communication Network with Fuzzy Cost Functions. Symmetry. 2021; 13(8):1534. https://doi.org/10.3390/sym13081534

Chicago/Turabian Style

Valdés, Lissette, Alfonso Ariza, Sira M. Allende, Alicia Triviño, and Gonzalo Joya. 2021. "Search of the Shortest Path in a Communication Network with Fuzzy Cost Functions" Symmetry 13, no. 8: 1534. https://doi.org/10.3390/sym13081534

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop