<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Computations for " =</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Application Of Proximal Point Method To The Problem Of Allocation Of Arcs In Telecommunication Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Igor V. Konnov</string-name>
          <email>konn-igor@ya.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alexey Yu. Kashuba</string-name>
          <email>leksser@rambler.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Erkki Laitinen</string-name>
          <email>erkki.laitinen@oulu</email>
          <email>erkki.laitinen@oulu.</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kazan Federal University</institution>
          ,
          <addr-line>Kazan</addr-line>
          ,
          <country country="RU">Russia 420008</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Oulu</institution>
          ,
          <addr-line>Oulu, Finland FI-90014</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>10</volume>
      <issue>2</issue>
      <abstract>
        <p>In the paper we consider the problem of allocation of network resources in telecommunication networks with respect to both utility and reliability goals. We suggest a solution method based on a proximal point method for this problem. We present results of numerical results for the suggested method on test examples.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>In [KKL21], we considered a problem of allocation of link resources in telecommunication networks with respect
to both utility and reliability goal. However, unlike [KKL20], we do not indicated any pre-de ned non-reliability
level. For this problem were suggested a dual decomposition method method.</p>
      <p>In this paper, we consider the same problem of allocation of link resources in telecommunication networks as in
[KKL21]. Here we describe another solution method. First we suggest to use a proximal point method. Then by
using the dual Lagrangian method with respect to the balance constraint, we replace the new formulated problem
with an unconstrained optimization problem, where calculation of the cost function value leads to independent
solution of single-dimensional problems. We present results of computational experiments which con rm the
applicability of the new methods.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Problem Description</title>
      <p>We rst take the optimal link distribution problem in computer and telecommunication data transmission
networks, which was suggested in [KMT98]. This model describes a network that contains a set of transmission
links (arcs) L and accomplishes some submitted data transmission requirements from a set of selected pairs of
origin-destination vertices I within a xed time period. Denote by xi and i the current and maximal value of
data transmission for pair demand i, respectively, and by cl the capacity of link l. Each pair demand is associated
with a unique data transmission path of links from the set of Li, hence each link l is associated uniquely with the
set Il of pairs of origin-destination vertices, whose transmission paths contain this link. For each pair demand
xi we denote by ui(xi) the utility value at this data transmission volume. Then we can write the network utility
maximization problem as follows:
max !</p>
      <p>X xi
i2Il
0
xi</p>
      <p>X ui(xi)
cl; l 2 L;
If the functions ui(xi) are concave, this is a convex optimization problem.</p>
      <p>Let us now consider the same telecommunication network where the reliability factor should be taken into
account. Namely, we associate the reliability to each arc ow and determine l(fl) as the non-reliability of the
l-th arc having the ow fl for l 2 L. Then Pl2L l(fl) is the total network non-reliability and we formulate the
network manager problem as follows:
min ! X l(fl)
l2L</p>
      <p>X ui(xi) or max !
i2I</p>
      <p>X ui(xi)
i2I</p>
      <p>!
X l(fl) ;
l2L
X xi = fl; l 2 L;
i2Il
0
0
fl
xi
c) and sequence of numbers f"kg</p>
      <p>nd (xk+1; f k+1) as
min !
(
Each of one-dimensional problem of (10) can be solved easily by explicit formulas.</p>
      <p>Function '(y) in (9) is concave,
These properties enable us to apply the usual Uzawa gradient method to nd a solution of the dual problem (9):
4</p>
    </sec>
    <sec id="sec-3">
      <title>Numerical Experiments</title>
      <p>As part of the work, a numerical study of the suggested method was carried out. The method was implemented
in C++ with a PC with the following facilities: Intel(R) Core(TM) i7-4500, CPU 1.80 GHz, RAM 6 Gb.</p>
      <p>In the experiments, we used quadratic functions of utility of origin-destination pairs
linear functions of utility of origin-destination pairs
and quadratic functions of non-reliability of arcs
ui(xi) = u1;ixi2 + u0;ixi; u1;i &lt; 0; u0;i &gt; 0; i 2 I;
ui(xi) = u1;ixi + u0;i; u1;i; u0;i &gt; 0; i 2 I;
l(fl) =
1;lfl2 + 0;lfl;
1;l; 0;l &gt; 0; l 2 L:</p>
      <p>All the arcs and origin-destination pairs were indexed as l = 0; : : : ; jLj
i = 0; : : : ; jIj 1 (jIj is the cardinality I), respectively.</p>
      <p>The coe cients 1;l, 0;l, u0;i, and u1;i were formed on the basis of trigonometric functions:
1 (jLj is the cardinality of L) and
(5)
(6)
(i) for the case of quadratic functions ui
(ii) for the case of linear functions ui
(ii) for the functions l
u0;i = 2j sin(2i + 2)j + 2; u1;i =
j cos(2i + 1)j</p>
      <p>1;
u0;i = j sin(2i + 2)j + 1; u1;i = j2 sin(i + 2)j + 1;
0;l = j cos(l + 1)j + 3;
1;l = 2j sin(2l + 2)j + 1:
Let us denote the case of linear functions ui as L-case and the case of quadratic functions ui as Q-case.</p>
      <p>
        The maximal arc ow capacity cl was selected in [
        <xref ref-type="bibr" rid="ref3">1, 10</xref>
        ] as follows:
The maximal path ow capacity i associated with a origin-destination pair was selected in [1, 7] as follows:
cl = 10 j cos(l + 3)j + 1:
      </p>
      <p>i = 7 j sin(i)j + 1:
The parameter was xed. We used three xed values: 0.9, 0.5 and 5.0. The stepsize parameter k in the
gradient method was also xed and set to 0.6.</p>
      <p>The distribution of the available arcs across the origin-destination pairs was carried out either uniformly or
according to the normal distribution law. In the gradient method we used two di erent initial points: the vector
e of units and vector 100e.</p>
      <p>We now introduce additional notations:
1. "k is the accuracy of nding solution of the problem of k-th iteration,
2. T"k;1 and T"k;100 are the time (in seconds) of the method with the starting point e and 100e, respectively,
3. I"k;1 and I"k;100 are the numbers of iterations spent searching for a solution to the problem with the starting
point e and 100e, respectively.</p>
      <p>The gradient method was stopped if the norm k'0(yk)k appeared less than "k. We used next sequence of "k:
"0 = 1, "k = "k 1 0:9, k = 1; 2; : : :.</p>
      <p>In Tables 1{4 we give the results of nding a solution of the problem with Q-case combination of functions
and in Tables 5{6 - the results of nding a solution of the problem with L-case combination of functions.</p>
      <p>In Tables 1 and 5, we give the results for the case where jLj = 310, = 0:9 and for di erent values jIj. In
Tables 2{4 and 6, we give the results for the case where jIj = 310, = 0:5 (in Table 3), = 0:9 (in Tables 2 and
6), = 5:0 (in Table 4) and for di erent values jLj.</p>
      <p>In Tables 7{8, we give results of Q-case for described method and result for dual method from [KKL21]. For
that let us introduce additional notations from [KKL21]:
1. " is the accuracy of nding solution of the problem,
2. T";1 and T";100 are the time (in seconds) of the method with the starting point e and 100e, respectively,
3. I";1 and I";100 are the numbers of iterations spent searching for a solution to the problem with the starting
point e and 100e, respectively.</p>
      <p>The results of computational experiments con rmed rather stable performance of the method.</p>
      <p>From comparing the results in Tables 7{8 we see that in some cases dual method was slightly faster. Here we
should note, that in dual method was used static accuracy for nding solution, but in proximal point method we
used sequence of accuracies. This sequence can be generated in another way, which perhaps can improve speed
of nding solution. We should also note that, unlike [KKL21], proximal point method can nd solution when
functions are linear.
L
j j
620
930
1240</p>
      <p>Acknowledgments
In this work, the rst author was supported by Russian Foundation for Basic Research, project No. 19-01-00431.
The work of the second author was performed within the Russian Government Program of Competitive Growth
of Kazan Federal University. The rst and third authors were also supported by grant No. 331833 from Academy
of Finland.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [CW03]
          <string-name>
            <given-names>C.</given-names>
            <surname>Courcoubetis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Weber</surname>
          </string-name>
          .
          <article-title>Pricing Communication Networks: Economics, Technology and Modelling</article-title>
          . Chichester: John Wiley &amp; Sons,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [SWB06]
          <string-name>
            <given-names>S.</given-names>
            <surname>Stanczak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wiczanowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Boche</surname>
          </string-name>
          .
          <article-title>Resource Allocation in Wireless Networks</article-title>
          .
          <source>Theory and Algorithms</source>
          . Berlin: Springer,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>[WNH10] A. M. Wyglinski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Nekovee</surname>
          </string-name>
          , Y. T. Hou (eds.)
          <source>Cognitive Radio Communications and Networks: Principles and Practice</source>
          . Amsterdam: Elsevier,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [KKL18]
          <string-name>
            <given-names>I.</given-names>
            <surname>Konnov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kashuba</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Laitinen.</surname>
          </string-name>
          <article-title>Dual methods for optimal allocation of telecommunication network resources with several classes of users</article-title>
          .
          <source>Math. Comput. Appl.</source>
          ,
          <volume>23</volume>
          ,
          <string-name>
            <surname>Art</surname>
          </string-name>
          . No 31
          <issue>: 1</issue>
          {
          <fpage>14</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [KK19]
          <string-name>
            <given-names>I. V.</given-names>
            <surname>Konnov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yu</surname>
          </string-name>
          . Kashuba.
          <article-title>Application of the conditional gradient method to a network resource allocation problem with several classes of users</article-title>
          .
          <source>Journal of Physics: Conference Series</source>
          .
          <volume>1158</volume>
          ,
          <string-name>
            <surname>Art</surname>
          </string-name>
          . No 032015
          <issue>: 1</issue>
          {
          <issue>8</issue>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [ZJT13]
          <string-name>
            <given-names>S.T.</given-names>
            <surname>Zargar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Joshi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Tipper</surname>
          </string-name>
          .
          <article-title>A survey of defense mechanisms against distributed denial of service (ddos) ooding attacks</article-title>
          .
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          ,
          <volume>15</volume>
          (
          <issue>4</issue>
          ):
          <year>2046</year>
          {2069, Mar.
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>[MZA13] M.H. Manshaei</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          <string-name>
            <surname>Zhu</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Alpcan</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Bacsar</surname>
            ,
            <given-names>J.-P.</given-names>
          </string-name>
          <string-name>
            <surname>Hubaux</surname>
          </string-name>
          .
          <article-title>Game theory meets network security and privacy</article-title>
          .
          <source>ACM Computing Surveys (CSUR)</source>
          ,
          <volume>45</volume>
          (
          <issue>3</issue>
          ):
          <volume>25</volume>
          {
          <fpage>64</fpage>
          ,
          <string-name>
            <surname>Jun</surname>
          </string-name>
          .
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [ZJT13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Vadlamani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Eksioglu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Medal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nandi</surname>
          </string-name>
          .
          <article-title>Jamming attacks on wireless networks: A taxonomic survey</article-title>
          .
          <source>International Journal of Production Economics</source>
          ,
          <volume>172</volume>
          :
          <fpage>76</fpage>
          {
          <fpage>94</fpage>
          ,
          <string-name>
            <surname>Feb</surname>
          </string-name>
          .
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [LHW17]
          <string-name>
            <given-names>N.C.</given-names>
            <surname>Luong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.T.</given-names>
            <surname>Hoang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Niyato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Han</surname>
          </string-name>
          .
          <article-title>Applications of economic and pricing models for wireless network security: a survey</article-title>
          .
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          ,
          <volume>19</volume>
          (
          <issue>4</issue>
          ):
          <volume>2735</volume>
          {
          <fpage>2767</fpage>
          ,
          <string-name>
            <surname>Jul</surname>
          </string-name>
          .
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [KKL20]
          <string-name>
            <given-names>I.V.</given-names>
            <surname>Konnov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yu. Kashuba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Laitinen</surname>
          </string-name>
          .
          <article-title>Penalty method for reliable allocations of wireless network resources</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          ,
          <volume>2642</volume>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [KKL21]
          <string-name>
            <given-names>I.</given-names>
            <surname>Konnov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kashuba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Laitinen</surname>
          </string-name>
          .
          <article-title>Dual Decomposition Method for Reliable Allocations of Wireless Network Resources</article-title>
          .
          <source>Mobility</source>
          <year>2021</year>
          : The Eleventh International Conference on Mobile Services, Resources, and
          <string-name>
            <surname>Users</surname>
          </string-name>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [KMT98]
          <string-name>
            <given-names>F.P.</given-names>
            <surname>Kelly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Maulloo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Tan</surname>
          </string-name>
          .
          <article-title>Rate control for communication networks: shadow prices, proportional fairness and stability</article-title>
          .
          <source>J. Oper. Res. Soc.</source>
          ,
          <volume>49</volume>
          (
          <issue>3</issue>
          ):
          <volume>237</volume>
          {
          <fpage>252</fpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>