Branch-and-cut methods for the Network Design Problem with Vulnerability Constraints
•We study the Network Design Problem with Vulnerability Constraints.•We propose three branch-and-cut algorithms for this problem.•These algorithms are significantly more efficient than previously proposed methods.•We are able to solve many previously unsolved instances of the problem. The aim of Net...
Gespeichert in:
Veröffentlicht in: | Computers & operations research 2018-03, Vol.91, p.190-208 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | •We study the Network Design Problem with Vulnerability Constraints.•We propose three branch-and-cut algorithms for this problem.•These algorithms are significantly more efficient than previously proposed methods.•We are able to solve many previously unsolved instances of the problem.
The aim of Network Design Problem with Vulnerability Constraints (NDPVC), is to design survivable telecommunications networks that impose length bounds on the communication paths of each commodity pair, before and after the failure of any k links. This problem was proposed as an alternative to the Hop-Constrained Survivable Network Design Problem (kHSNDP), which addresses similar issues, but imposes very conservative constraints, possibly leading to unnecessarily expensive solution or even rendering instances infeasible. In fact, it is known that the cost of the optimal solutions of the NDPVC never exceeds that of the related kHSNDP. However, previous results using the standard methods of a general-purpose integer linear (ILP) solver, combined with several ILP formulations, show that such methods fail to solve most instances in the benchmarking test set, within a time limit of two hours.
In this paper, we propose three branch-and-cut algorithms, which are significantly more efficient in solving the NDPVC. The first algorithm is a cutting-plane method devised in the context of a new layered graph ILP formulation, whereas the other two are based on Benders decomposition methods of previously known formulations. With the proposed new methods, we are able to solve substantially more instances of the NDPVC and therefore able to provide a more complete comparison of its solutions to those of the kHSNDP. |
---|---|
ISSN: | 0305-0548 1873-765X 0305-0548 |
DOI: | 10.1016/j.cor.2017.10.005 |