Journal of Computer Networks and Communications

Journal of Computer Networks and Communications / 2019 / Article

Research Article | Open Access

Volume 2019 |Article ID 4109453 |

Ashutosh Sharma, Rajiv Kumar, "A Framework for Risk-Energy Aware Service-Level Agreement Provisioning (RESP) for Computing the Quickest Path", Journal of Computer Networks and Communications, vol. 2019, Article ID 4109453, 8 pages, 2019.

A Framework for Risk-Energy Aware Service-Level Agreement Provisioning (RESP) for Computing the Quickest Path

Academic Editor: Juraj Machaj
Received31 Aug 2018
Revised13 Mar 2019
Accepted14 Mar 2019
Published06 May 2019


This paper involved the computation of quickest paths with the help of service-level agreement (SLA) and energy constraints. The consideration of these constraints helps to propose a novel system model which computes the path to strengthen the continuity and criticality of the data transmission. The proposed risk-energy aware SLA provisioning (RESP) system model incorporates the research gaps of the existing risk assessment models in the literature without any increase in time complexity. The formulation of RESP shows the usefulness in the critical applications. The results show that the computation of risk-provisioned path gives the SLA satisfied paths and has a great impact of variations in the data traffic. The performance of the proposed algorithm has been indicated in terms of different performance parameters such as mean paths, average hop counts, and average energy efficiency. Simulation result implies that as data traffic increases, the number of the risk‐provisioned paths decreases whereas corresponding average hop counts and average energy efficiency increases.

1. Introduction

Due to the advancements in the technology of the computer networks, the applications associated with network have been provided by the service providers. These applications have a great impact on the life of human beings [1]. Therefore, a dependable network has to be requested for the network applications [2, 3]. In this regard, the concerns of environmentalists have been raised for the consumption of minimum energy for the design of dependable network [4]. Recently, the concept of dependability and energy has been considered together to address performability engineering [5]. The performance of a computer network relies mainly on the reliability, bandwidth, delay, and energy of the links which participate during data transmission. In this paper, an attempt has been performed to consider these parameters for computing the quickest path problem between two specific ends, i.e., source and destination.

With evolution of network services, quickest path problem (QPP) was proposed by the authors in [6] for the data transmission. A polynomial algorithm was proposed for the data transmission to find a solution for QPP in the generalized computer network. Later, this problem got attention from several researchers, and authors in [7] modified the problem by considering the idea of bicriterion for the range of different data. This problem extends for the single-pair QPP to all-pair QPP as shown by the authors in [8]. Several extensions have been made for the QPP as the k-QPP was introduced in [912]. For general network, it is very important to design a routing protocol for high availability so that critical services may get completed. To design a routing protocol for high availability, the parameters like energy, delay, and bandwidth are the major factors which play an important role [13, 14]. This QPP model was also extended toward the building evacuation problem by Hamacher and Tjandra [15] who propose a building evacuation problem. The QPP model was also extended toward the continuity of critical applications where it has been considered as an important figure of merit [16].

The network is associated with certain uncertainties which may lead to service failure, and to deal with these failures, reliability theory has been used in [17] and the reliable QPP model has been proposed. This model was later extended for different models in [12, 1820]. Also, authors in [19] extend the reliable QPP by considering a threshold value of reliability for quality-of-service (QoS) routing. Later, the reliable model was extended for risk analysis by considering service-level agreement (SLA) [2125].

Recently, QoS routing has been provided by considering the amount of energy used for the data transmission services by considering parameters like reliability, risk, and availability. [26, 27]. The reliable QPP problem further extended with energy constraint for the continuity of data transmission [28]. The discussion made in the above paragraphs leads us to work for continuity of critical data transmission services by provisioning SLA and energy. Recently, risk-energy problem in data transmission services has been discussed for minimization in the risk and energy consumption [29].

1.1. Research Significance

Here, in this paper, the authors have made an attempt to provision the risk-free path computation model with consideration of SLA and energy constraints. The main contributions of this paper are presented as follows: (i) A novel system model has been presented with the risk-provisioned mechanism which is the upgraded version of the existing REQPP risk assessment system model in the existing literature. (ii) The contribution can also be seen with the reference to SLA violation factor. The proposed system model gives the full SLA satisfaction as compared to the existing REQPP system model.

The rest of the paper is organized into sections. Section 2 presents the preliminaries to develop the strong base for the development of the system model. A novel system model is proposed in Section 3. To implement the proposed system model, an algorithm and its complexity analysis are presented in Section 4. Section 5 presents the results and discussion of the proposed problem. In Section 6, conclusion is presented.

2. Preliminaries

To explain the QPP model, let us consider the directed loop-less graph , where and are the set of number of nodes and set of number of links , respectively. This network is associated with several resources such as link delays and link capacities . Assume a data σ transmission has been considered between two consecutive links with a connection-oriented approach having no buffer, i.e., seamless flow of data. To aid the seamless flow, capacity of a path has to be least and is defined as the data sent over a link per unit time.

Let us assume that amount of data is being transmitted between two specific ends, namely, source s and destination (t). While data are being transferred between these two specific ends, a path is formed with the sequence of the number of links without any loop to manage the resources efficiently.

To transmit unit’s data over a path, the delay experienced at a link can be expressed as . Let a path where and be the loop-free path. Therefore, the minimum transmission delay experienced to transmit unit’s data along a path iswhere first term in the right hand side is known as the delay of path calculated as and the numerator of the second term is known as the minimum capacity for the path .

Hence, the minimum transmission time is given as

The quickest path problem (QPP) is formulated as

In the beginning, when QPP was conceptualized [611, 14, 15, 30, 31], no special care was maintained for the energy consumption during data transmission. Nowadays, without the consideration of energy [26], any one cannot afford transmission [27, 28, 32]. In addition to this, the bar on usage of energy resources put a constraint for data transmission [3339]. To consider the concept energy consumption, the topic of green computing was explored in [40, 41] for data transmission.

To deal with energy, various authors tried to incorporate them in QPP. Let us assume that each link is allied with energy rate to transmit unit data from node along with the link . In networks, each node is endowed with limited amount of power which is available at nodes for data transmission. The amount of energy required at the node is calculated as .

To compete with successful data transmission, the following has to be proved:

For data transmission without any disruption, find minimum link capacity used for transmission of σ unit data between nodes and having energy rate . The minimum capacity of link is given as follows:

In the given network, each link follows the following equation for the path capacity path :

The residual energy of path is

Hence, constrained QPP has been formulated by using above equations as

The above-discussed model has been proposed by several authors [28, 42, 43] to incorporate energy in QPP.

The availability of sufficient amount of energy is not only the factor for the continuity in data transmission. The link reliabilities are also helpful for the continuity of data transmission [44, 45].

Recently, the authors in [42] tried to adopt the above constraints in their proposed model, but they have incorporated these parameters for the assessment of risk unless provisioning for the risk. In the proposed framework, the authors have made an attempt to deal with the provisioning of risk.

3. Proposed System Model

3.1. Assumptions

The proposed system model for the RESP required some assumptions for better understanding and they are given as follows:(1)There are no parallel and duplicate links in the network graph [46](2)Capacities of links are generated randomly with the uniform distribution and are statistically independent [47](3)Bifurcation of data is not allowed, and also, flow of conservation is followed by data transmission [47]

Let us take the performance reliability which constitutes the link reliability and performance factor of a link . The reliability of a link is related to the failure in the connectivity (i.e., hard failure), and the performance factor of a link is related to the performance parameters such as delay and capacity (i.e., soft failure) [42].

Let us assume that link reliability is ideal, i.e., and performance of data transmission depends mainly on the performance factor. The requested service-level agreement (SLA) is drawn for the critical data transmission. The requested SLA is defined as where is the requested SLA availability and is the penalty period. By using these SLA parameters, the allowed time has been computed as [21, 42]

The link performance factor constitutes the service-level agreements (SLAs) and link delays; therefore, along a path, the performance factor is calculated as

Equation (10) is known as the performance reliability due to delay , and by expanding equation (10), performance reliability is calculated as

In equation (11), if minimum transmission delay is very large as compared to , then the value of performance delay is equal to zero and if minimum transmission delay is small as compared to , then the value of performance delay is equal to 1. The above study shows that the minimum transmission delay has a great impact on the performance of the data transmission.

Here, in this paper, the authors have tried to incorporate the research gaps of the existing risk assessment REQPP model proposed in [42]. In the REQPP model, the authors performed only the assessment of risk and not the provisioning. In the present paper, following this research gap, the authors have tried to incorporate risk provisioning by satisfying the SLAs and proposed the novel system model for risk provisioning.

A path is formed either by combination of several links or a single link. Therefore, it is more realistic to satisfy the SLA piecewise or between two consecutive links other than satisfying the SLA after completion of data transmission service among the path. The SLAs are considered for mission-critical applications; therefore, each node is endowed with the requested amount of reliability . To deal with SLA constraint, the following expression has to follow:where is the reliability at nodes and has to be maintained equal or more to this value.

The minimum SLA aware link capacity is shown as follows:

To incorporate both parameters (energy and SLA) for sorting, the minimum link capacity has been given as follows:where is the capacity lying between the minimum energy cooperative capacity and link capacity. The capacity lies between the minimum SLA cooperative capacity and link capacity Equation (14) provides the label of minimum link capacity to support the continuity and criticality in data transmission if and . A path is feasible if . The above equations sort the minimum capacity which incorporates both the critical and continuous data transmission by considering the AND rule.

The remaining value of performance reliability is termed as residual-requested performance reliability. along the path gives feasibility of path , i.e., as

The SLA-energy awareness allows us to combine the characteristics of the both models (energy and SLA) and formulate the constraint model of the risk-energy aware SLA provisioning (RESP) given as follows:Here, problem has been used to transmit the data with continuity and criticality using shortest path problem (SPP). The energy and SLA have been used as a constraint for the SPP. The working of SPP lies on Dijkstra’s algorithm with the link delay as a cost value in the different subnetworks [48]:

By following this, Algorithm 1 has been proposed in Section 4 to perform the computations.

Output: risk-energy aware SLA-provisioned (RESP) route
j ⟵ 1,
STEP 0: variable declaration
G ⟵ directed network
N ⟵ set of nodes
E ⟵ set of links
 ⟵ capacity of the link
 ⟵ delay of link the
 ⟵ energy rate of link the
 ⟵ endowed energy at node u
 ⟵ requested reliability at node u
 ⟵ data
tp ⟵ penalty time
a ⟵ availability
STEP 1: prune r different capacities of links corresponds to critical-continuous service and label of minimum capacity:
STEP 2: solve w.r.t delay time in with capacities
For j ⟵ 1 : r
 Set j ⟵ 1
  If No path in with capacities
   go to STEP 3
   Let is an optimal solution for with capacity
For j ⟵ r
 go to STEP 4
 set and go to STEP 2
STEP 4: find the solution
Find index of path array such that
is an optimal solution of the RESP

4. Algorithm

4.1. Algorithm for Risk-Energy Aware SLA Provisioned (RESP) Route
4.2. Complexity Analysis

Theorem 1. The time complexity of the proposed RESP algorithm is .

Proof. The complexity of RESP is explained using the time complexity of [49] which has been run for times.

5. Results and Discussion

5.1. Experimental Setup

The experiment for the performance evaluation of the proposed RESP algorithm has been performed over the personal computer having the configuration of Intel(R) CoreTMi5–7400, CPU@ 3.00 GHz, 8 GB RAM, and Windows 10 operating system. All simulations have been performed in MATLAB R2010a environment platform. The simulations show that the proposed RESP algorithm is solvable in polynomial time using Dijkstra’s algorithm which used binary heap data structure. The illustrations of results have been explained with the help of standard network topologies as shown in Figure 1(a) and 1(b).

The associated values of link parameters like delay and capacities are taken from the uniform distribution range [1, 1000]. As discussed in the previous sections, the amount of fixed powers at each node and amount of energy rate at each link is given by and , respectively. The requested reliability at nodes is generated uniformly within the range [0, 1]. For the risk provisioning, requested SLA is defined by considering the availability and the penalty time . The value of requested availability is taken as , and the penalty time is considered as (secs). To visualize the performance of the proposed algorithm, three different amounts of data are taken. This variation in the amount of data to be transmitted shows the trend in the various SLAs and energy-provisioned shortest paths.

5.2. Performance Analysis

The quantitative performance analysis of the proposed algorithm has been shown in Tables 1 and 2. The different simulations have been performed for different data sizes. The set of different number of paths has been commutated from the different subgraphs which are equal to distinct capacities present in the network. Further, from the set of paths, the shortest path has been computed. The performance of proposed RESP algorithm has been seen in other parameters also such as average hop counts, average capacity, and energy efficiency of risk-provisioned shortest path. The results for both standard topologies have been taken for the discussion to show the effectiveness of the RESP.

Sr. no.Traffic
pathsHop counts of shortest pathCapacity of shortest pathEnergy efficiency of shortest path ()

1131047881220121.0933 MJ0.27270.1968
28968108725290.2539 MJ0.28460.2339
3910117662538690.3633 MJ0.44220.3351

Sr. no.Traffic
pathsHop counts of shortest pathCapacity of shortest pathEnergy efficiency of shortest path ()


5.2.1. 24-Node US Network

The results for the standard topology as shown in Figure 1(a) show the mean number of shortest paths computed for the ten runs. Table 1 shows the results for risk-provisioned paths in second, third, and fourth columns for different data traffics , and . The mean value of risk-provisioned paths shows that as data traffic is varied, the number of paths got reduced. This trend has been shown because for the large amount of data, the links in the network topology are not capable to provide the energy and SLA provisioning. Also, hop counts in fifth, sixth, and seventh columns of Table 1 shows very little variation with respect to different data traffics.

The trend in the adopted capacity of path is increased as the data traffic increases as shown in the eighth, ninth, and tenth columns of Table 1, respectively. This trend has been found because for the large amount of data, the capacity of link should be maintained maximum.

5.2.2. 14-Node NSF Network

The experiment conducted for the Figure 1(a) has been repeated for the Figure 1(b) also to see the performance of the proposed RESP algorithm. The results for the 14-node NSF topology are shown in Table 2. The results for this topology depict that the same trend of the performance has been followed.

The variation of data traffic has high impact on the energy efficiency () of path in the given topology. The results for the energy efficiency have been shown in the eleventh to thirteenth columns. The value of energy efficiency increased as data traffic increases. This is because the energy constraints have to be qualified to be part of a subnetworks, so as data traffic increases, energy efficiency also increases.

The illustrative results show that the proposed RESP algorithm is outperforming over the REQPP algorithm [42] with reference to risk provisioning, resource wastage, and computation time.

6. Conclusion and Future Work

This paper has proposed the concept of risk-energy aware SLA provisioning (RESP) for the planning of critical routing where continuity of data transmission is given utmost priority. Continuity of transmission in this paper has been quantified in terms of performance of the link in a data transmission path considered as energy required for the link connectivity. The link delay has also been considered for the risk provisioning. The result shows an improvement in energy efficiency and capacity of path. The proposed RESP algorithm is able to compute the paths without any risk in terms of SLA. Present work is considering only energy of the link in path computation. In future work, the proposed algorithm can be extended with incorporating the security paradigms which enable the computation of paths in presence of any malicious activities.

Data Availability

No data have been used separately for the presentation of the work. Each and every detail of the results has been included already in the Results section.

Conflicts of Interest

The authors declare that they have no conflicts of interest.


The authors are thankful for the financial grant for this paper from the research project titled “Reliability Modeling and Optimized Planning of Risk-Based Resilient Networks” sponsored by Indo-Polish Program under grant DST/INT/POL/P-04/2014.


  1. C. R. Kalmanek, S. Misra, and Y. R. Yang, Guide to Reliable Internet Services and Applications, Springer Science & Business Media, Berlin, Germany, 2010.
  2. L. Norros, I. Norros, M. Liinasuo, and K. Seppänen, “Impact of human operators on communication network dependability,” Cognition, Technology & Work, vol. 15, no. 4, pp. 363–372, 2013. View at: Publisher Site | Google Scholar
  3. A. Arroyo and T. Grisham, Leading Extreme Projects: Strategy, Risk and Resilience in Practice, Taylor & Francis, Abingdon, UK, 2017.
  4. P. E. Heegaard, B. E. Helvik, and V. B. Mendiratta, “Achieving dependability in software-defined networking—a perspective,” in Proceedings of the 7th International Workshop on Reliable Networks Design and Modeling (RNDM), pp. 63–70, Munich, Germany, October 2015. View at: Google Scholar
  5. K. B. Misra, Handbook of Performability Engineering, Springer Science & Business Media, Berlin, Germany, 2008.
  6. Y. L. Chen and Y. H. Chin, “The quickest path problem,” Computers & Operations Research, vol. 17, no. 2, pp. 153–161, 1990. View at: Publisher Site | Google Scholar
  7. E. D. Q. V. Martins and J. L. E. Dos Santos, “An algorithm for the quickest path problem,” Operations Research Letters, vol. 20, no. 4, pp. 195–198, 1997. View at: Publisher Site | Google Scholar
  8. J. B. Rosen, S.-Z. Sun, and G.-L. Xue, “Algorithms for the quickest path problem and the enumeration of quickest paths,” Computers & Operations Research, vol. 18, no. 6, pp. 579–584, 1991. View at: Publisher Site | Google Scholar
  9. M. M. B. Pascoal, M. E. V. Captivo, and J. C. N. Clı́maco, “An algorithm for ranking quickest simple paths,” Computers & Operations Research, vol. 32, no. 3, pp. 509–520, 2005. View at: Publisher Site | Google Scholar
  10. M. M. B. Pascoal, M. E. V. Captivo, and J. C. N. Clímaco, “A comprehensive survey on the quickest path problem,” Annals of Operations Research, vol. 147, no. 1, pp. 5–21, 2006. View at: Publisher Site | Google Scholar
  11. M. Pascoal, M. E. Captivo, and J. C. Clímaco, “Computational experiments with a lazy version of a K quickest simple path ranking algorithm,” TOP, vol. 15, no. 2, pp. 372–382, 2007. View at: Publisher Site | Google Scholar
  12. S. Ruzika and M. Thiemann, “Min-max quickest path problems,” Networks, vol. 60, no. 4, pp. 253–258, 2012. View at: Publisher Site | Google Scholar
  13. J. Rak, Resilient Routing in Communication Networks, Springer, Berlin, Germany, 2015.
  14. D. Eppstein, “Finding the k shortest paths,” SIAM Journal on Computing, vol. 28, no. 2, pp. 652–673, 1998. View at: Publisher Site | Google Scholar
  15. H. W. Hamacher and S. A. Tjandra, “Mathematical modelling of evacuation problems: a state of art,” in Pedestrian and Evacuation Dynamics, Springer, Berlin, Germany, 2001. View at: Google Scholar
  16. P. H. Pathak and R. Dutta, Designing for Network and Service Continuity in Wireless Mesh Networks, Springer Science & Business Media, Berlin, Germany, 2012.
  17. G. Xue, “End-to-end data paths: quickest or most reliable?” IEEE Communications Letters, vol. 2, no. 6, pp. 156–158, 1998. View at: Publisher Site | Google Scholar
  18. S. Tragoudas, “The most reliable data-path transmission,” IEEE Transactions on Reliability, vol. 50, no. 3, pp. 281–285, 2001. View at: Publisher Site | Google Scholar
  19. H. I. Calvete, L. del-Pozo, and J. A. Iranzo, “Algorithms for the quickest path problem and the reliable quickest path problem,” Computational Management Science, vol. 9, no. 2, pp. 255–272, 2012. View at: Publisher Site | Google Scholar
  20. Y.-K. Lin, “Extend the quickest path problem to the system reliability evaluation for a stochastic-flow network,” Computers & Operations Research, vol. 30, no. 4, pp. 567–575, 2003. View at: Publisher Site | Google Scholar
  21. M. Xia, M. Tornatore, C. U. Martel, and B. Mukherjee, “Risk-aware provisioning for optical WDM mesh networks,” IEEE/ACM Transactions on Networking, vol. 19, no. 3, pp. 921–931, 2011. View at: Publisher Site | Google Scholar
  22. K. Vajanapoom and D. Tipper, “Risk based incremental survivable network design,” in Proceedings of the 6th International Workshop on Design and Reliable Communication Networks, pp. 1–9, La Rochelle, France, October 2007. View at: Google Scholar
  23. K. Vajanapoom, Risk-Based Survivable Network Design, University of Pittsburgh, Pittsburgh, PA, USA, 2008.
  24. K. Vajanapoom, D. Tipper, and S. Akavipat, “Risk based resilient network design,” Telecommunication Systems, vol. 52, no. 2, pp. 799–811, 2013. View at: Publisher Site | Google Scholar
  25. A. J. Gonzalez and B. E. Helvik, “SLA success probability assessment in networks with correlated failures,” Computer Communications, vol. 36, no. 6, pp. 708–717, 2013. View at: Publisher Site | Google Scholar
  26. P. Chołda and P. Jaglarz, “Optimization/simulation-based risk mitigation in resilient green communication networks,” Journal of Network and Computer Applications, vol. 59, pp. 134–157, 2016. View at: Publisher Site | Google Scholar
  27. P. Chołda and P. Jaglarz, “Energy-efficiency versus resilience: risk awareness view on dimensioning of optical networks with a sleep mode,” Photonic Network Communications, vol. 30, no. 1, pp. 43–58, 2015. View at: Publisher Site | Google Scholar
  28. H. I. Calvete, L. del-Pozo, and J. A. Iranzo, “The energy-constrained quickest path problem,” Optimization Letters, vol. 11, no. 7, pp. 1319–1339, 2017. View at: Publisher Site | Google Scholar
  29. Y. Wu, M. Tornatore, C. U. Martel, and B. Mukherjee, “Green and low-risk content placement in optical content delivery networks,” in Proceedings of the IEEE International Conference on Communications (ICC), pp. 1–6, Kuala Lumpur, Malaysia, May 2016. View at: Google Scholar
  30. S. Ruzika and M. Thiemann, “Reliable and restricted quickest path problems,” in Network Optimization, pp. 309–314, Springer, Berlin, Germany, 2011. View at: Google Scholar
  31. T. Gomes and J. Craveirinha, “Efficient calculation of the most reliable pair of link disjoint paths in telecommunication networks,” European Journal of Operational Research, vol. 181, no. 3, pp. 1055–1064, 2007. View at: Publisher Site | Google Scholar
  32. J. Chabarek, J. Sommers, P. Barford, C. Estan, D. Tsiang, and S. Wright, “Power awareness in network design and routing,” in Proceedings of the IEEE INFOCOM-The 27th Conference on Computer Communications, pp. 457–465, Phoenix, AZ, USA, April 2008. View at: Google Scholar
  33. N. C. Nguyen, P. Wang, D. Niyato, Y. Wen, and Z. Han, “Resource management in cloud networking using economic analysis and pricing models: a survey,” IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 954–1001, 2017. View at: Publisher Site | Google Scholar
  34. L. Zhang, K. Li, C. Li, and K. Li, “Bi-objective workflow scheduling of the energy consumption and reliability in heterogeneous computing systems,” Information Sciences, vol. 379, pp. 241–256, 2017. View at: Publisher Site | Google Scholar
  35. Y. Liu, H. S. Seah, and G. Shou, “Constrained energy-efficient routing in time-aware road networks,” GeoInformatica, vol. 21, no. 1, pp. 89–117, 2017. View at: Publisher Site | Google Scholar
  36. J. Rak, M. Pickavet, K. S. Trivedi et al., “Future research directions in design of reliable communication systems,” Telecommunication Systems, vol. 60, no. 4, pp. 423–450, 2015. View at: Publisher Site | Google Scholar
  37. Y. Cui, S. Xiao, X. Wang et al., “Performance-aware energy optimization on mobile devices in cellular network,” IEEE Transactions on Mobile Computing, vol. 16, no. 4, pp. 1073–1089, 2017. View at: Publisher Site | Google Scholar
  38. K. Wang, J. Yu, Y. Yu et al., “A survey on energy internet: architecture, approach, and emerging technologies,” IEEE Systems Journal, vol. 12, no. 3, pp. 2403–2416, 2017. View at: Publisher Site | Google Scholar
  39. H. Bast, D. Delling, A. Goldberg et al., “Route planning in transportation networks,” in Algorithm Engineering, pp. 19–80, Springer, Berlin, Germany, 2016. View at: Google Scholar
  40. F. Wu, “Integration of software reliability engineering, risk management and safety assurance case,” in Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 169–192, Pasadena, CA, USA, November 2013. View at: Google Scholar
  41. V. Balasubramanian, M. Aloqaily, F. Zaman, and Y. Jararweh, “Exploring computing at the edge: a multi-interface system Architecture enabled mobile device cloud,” in Proceedings of the IEEE 7th International Conference on Cloud Networking (CloudNet), pp. 1–4, Tokyo, Japan, October 2018. View at: Google Scholar
  42. A. Sharma and R. Kumar, “Risk-energy aware service level agreement assessment for computing quickest path in computer networks,” International Journal of Reliability and Safety, vol. 13, no. 1-2, p. 96, 2019. View at: Publisher Site | Google Scholar
  43. H. I. Calvete, L. del-Pozo, and J. A. Iranzo, “Dealing with residual energy when transmitting data in energy-constrained capacitated networks,” European Journal of Operational Research, vol. 269, no. 2, pp. 602–620, 2018. View at: Publisher Site | Google Scholar
  44. A. Chen, H. Yang, H. K. Lo, and W. H. Tang, “A capacity related reliability for transportation networks,” Journal of Advanced Transportation, vol. 33, no. 2, pp. 183–200, 1999. View at: Publisher Site | Google Scholar
  45. V. Kounev, M. Lévesque, D. Tipper, and T. Gomes, “Reliable communication networks for smart grid transmission systems,” Journal of Network and Systems Management, vol. 24, no. 3, pp. 629–652, 2016. View at: Publisher Site | Google Scholar
  46. R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms, and Applications, MIT Sloan School of Management, Cambridge, MA, USA, 1993.
  47. W.-C. Yeh and M. El Khadiri, “A new universal generating function method for solving the single $(d,\tau) $-quick-path problem in multistate flow networks,” IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, vol. 42, no. 6, pp. 1476–1484, 2012. View at: Publisher Site | Google Scholar
  48. A. Sharma and R. Kumar, “Service-level agreement—energy cooperative quickest ambulance routing for critical healthcare services,” Arabian Journal for Science and Engineering, vol. 44, no. 4, pp. 3831–3848, 2019. View at: Publisher Site | Google Scholar
  49. M. L. Fredman and R. E. Tarjan, “Fibonacci heaps and their uses in improved network optimization algorithms,” Journal of the ACM, vol. 34, no. 3, pp. 596–615, 1987. View at: Publisher Site | Google Scholar

Copyright © 2019 Ashutosh Sharma and Rajiv Kumar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

More related articles

438 Views | 308 Downloads | 0 Citations
 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder

Related articles

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.