Survivability in IP over WDM networks YINGHUA YE and SUDHIR DIXIT Nokia Research Center, Burlington, Massachusetts.

Slides:



Advertisements
Similar presentations
In the name of God, The Beneficent, The Merciful
Advertisements

Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
~1~ Infocom’04 Mar. 10th On Finding Disjoint Paths in Single and Dual Link Cost Networks Chunming Qiao* LANDER, CSE Department SUNY at Buffalo *Collaborators:
Novembro 2003 Tabu search heuristic for partition coloring1/29 XXXV SBPO XXXV SBPO Natal, 4-7 de novembro de 2003 A Tabu Search Heuristic for Partition.
CSC 778 Fall 2007 Routing & Wavelength Assignment Vinod Damle Hardik Thakker.
Protection Mechanisms for Optical WDM Networks based on Wavelength Converter Multiplexing and Backup Path Relocation Techniques Presented by: Brian V.
Lecture: 4 WDM Networks Design & Operation
1 Short Overview of Dynamic Routing and Wavelength-Assigment in Survivable WDM Networks Carlos Simões 1,3 e Teresa Gomes 2,3 1 Escola Superior de Tecnologia.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
Efficient Realization of Hypercube Algorithms on Optical Arrays* Hong Shen Department of Computing & Maths Manchester Metropolitan University, UK ( Joint.
AGH University of Science and Technology NOBEL WP2 Meeting, Berlin May QoS/GoS Routing in Optical Networks.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
9/22/2003Kevin Su Traffic Grooming in WDM Networks Kevin Su University of Texas at San Antonio.
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara in collaboration with: D. Xu, R. Doverspike, D. Johnson and J. Rexford.
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
Dynamic Routing and Wavelength Assignment Scheme for Protection against Node Failure Ying Wang1, Tee Hiang Cheng1,2 and Biswanath Mukherjee3 1School of.
Jan 13, 2006Lahore University of Management Sciences1 Protection Routing in an MPLS Network using Bandwidth Sharing with Primary Paths Zartash Afzal Uzmi.
October 8, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Basics Zartash Afzal Uzmi Computer Science and Engineering Department.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
PROFITABLE CONNECTION ASSIGNMENT IN ALL OPTICAL WDM NETWORKS VISHAL ANAND LANDER (Lab. for Advanced Network Design, Evaluation and Research) In collaboration.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
Comparison of MSTP and (G)ELS Benchmarking Carrier Ethernet Technologies Workshop Session AI.1: Scientific and Technical Results Krakow, Poland April 30,
The Shortest Path Problem
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
The Research of Applying Random Early Blocking strategy to Dynamic Lightpath Routing National Yunlin University of Science & Technology.
Competitive On-Line Admission Control and Routing By: Gabi Kliot Presentation version.
Integrated Dynamic IP and Wavelength Routing in IP over WDM Networks Murali Kodialam and T. V. Lakshman Bell Laboratories Lucent Technologies IEEE INFOCOM.
A Dynamically Adaptive Hybrid Algorithm for Scheduling Lightpaths in Lambda-Grids Neena R. Kaushik and Silvia M. Figueira Santa Clara University Presented.
Helsinki 19 May 2006 Fine Protection of Data-Paths in Multi-Layer Networks Based on the GMPLS paradigm G.Oriolo, Università Tor Vergata, Roma joint work.
Genetic Algorithm for Multicast in WDM Networks Der-Rong Din.
1 Protection Mechanisms for Optical WDM Networks based on Wavelength Converter Multiplexing and Backup Path Relocation Techniques Sunil Gowda and Krishna.
Algorithms for Allocating Wavelength Converters in All-Optical Networks Authors: Goaxi Xiao and Yiu-Wing Leung Presented by: Douglas L. Potts CEG 790 Summer.
Wavelength Assignment in Waveband Switching Networks with Wavelength Conversion Xiaojun Cao; Chunming Qiao; Anand, V. Jikai LI GLOBECOM '04. IEEE Volume.
SMUCSE 8344 Protection & Restoration of Optical Networks.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Load Balancing in Protection Switching of Optical Networks Hongkyu Jeong, Gyu-Myoung Lee Information and Communications Univ. (ICU) Student ID : ,
Lightpath Restoration in WDM Optical Networks A Survey in IEEE Network Magazine Nov/Dec 2000.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
Diverse Routing Algorithms
CSC Survivability Anuj Dewangan Parinda Gandhi.
Enhanced Protection using Shared Segment Backups in a Multiservice GMPLS-based Networks Anna Urra, Eusebi Calle, Jose L Marzo Institute of Informatics.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
Two-layer Restoration Scheme for IP over Optical Networks with MPLS Jia Ke, L. Mason, Q. Yang ICIS, School of EEE, Nanyang Technological University
Optical Network Security Daniel Stewart. Preliminary work Dijkstra's Algorithm Dijkstra's algorithm, is a graph search algorithm that solves the single-
Survivable Traffic Grooming with Differentiated End-to-End Availability Guarantees in WDM Mesh Networks Proceedings of the 13th IEEE Workshop on Local.
10/6/2003Kevin Su Traffic Grooming for Survivable WDM Networks – Shared Protection Kevin Su University of Texas at San Antonio.
1 Presented by Sarbagya Buddhacharya. 2 Increasing bandwidth demand in telecommunication networks is satisfied by WDM networks. Dimensioning of WDM networks.
1 Why Optical Layer Protection? Optical layer provides lightpath services to its client layers (e.g., SONET, IP, ATM) Protection mechanisms exist in the.
Traffic grooming in WDM Networks Dynamic Traffic Grooming in WDM Mesh Networks Using a Novel Graph Model by Hongyue Zhu, Hui Zang, Keyao Zhu, and Biswanath.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
11/02/2001 Workshop on Optical Networking 1 Design Method of Logical Topologies in WDM Network with Quality of Protection Junichi Katou Dept. of Informatics.
1 Dynamic RWA Connection requests arrive sequentially. Setup a lightpath when a connection request arrives and teardown the lightpath when a connection.
1 1 Slide © 2008 Thomson South-Western. All Rights Reserved © 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or.
Suppose G = (V, E) is a directed network. Each edge (i,j) in E has an associated ‘length’ c ij (cost, time, distance, …). Determine a path of shortest.
7.1 The Network Layer It provides services to the transport layer. It is concerned with getting packets from the source to the destination, possibly making.
Optimal Design of Survivable Mesh Networks Based on Line Switched WDM Self-Healing Rings IEEE/ACM Transactions on Networking, Vol 11, NO.3, June,2003 Andrea.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Network Survivability, Reliability and Availability: Protection & Restoration Zilong Ye, Ph.D.
Isabella Cerutti, Andrea Fumagalli, Sonal Sheth
Network Layer – Routing 1
Distributed Control Plane
Disjoint Path Routing Algorithms
Data and Computer Communications
The University of Adelaide, School of Computer Science
SURVIVABILITY IN IP-OVER-WDM NETWORKS (2)
Chapter 10 RWA 2019/5/9.
Eusebi Calle, Jose L Marzo, Anna Urra. L. Fabrega
Presentation transcript:

Survivability in IP over WDM networks YINGHUA YE and SUDHIR DIXIT Nokia Research Center, Burlington, Massachusetts

Outline Survivability strategies ․ Protection and restoration Survivable routing algorithms ․ Conventional survivable routing ․ Suurballe`s Algorithms ․ Joint Working and Protection Routing Approach

Survivability strategies Survivability can be classified as protection and restoration. Protection mechanism are designed against a single failure event, whereas restoration can be used against multifailure events.

Survivability strategies - Protection Protection is preprovisioned failure recovery, where a secondary path is computed at the same time as the primary path. ․ otherwise, the connection request is rejected. Two forms of protection mechanism : ․ Dedicated ․ Shared

Survivability strategies - Protection (contd.) Dedicated ․ use 100% of the protection capacity overbuilt for dedication to the primary connection.

Survivability strategies - Protection (contd.) The main advantage of dedicated backup reservation method is shorter restoration time. ․ However, this method has a defect of low resource utilization. For better resource utilization, multiplexing techniques have been studied extensively.

Survivability strategies - Protection (contd.) Shared protection scheme

Survivability strategies - Protection (contd.) Issue of shared protection scheme : ․ The reversion from secondary path to corresponding primary path after failure has been restored. The shared protection scheme requires the primary paths whose secondary paths share the resources cannot incur the same risk. ․ SRLG (Shared Risk Link Group)

Survivability strategies - Protection (contd.) Example of SRLG

Survivability strategies - Protection (contd.) Protection architectures : ․ 1+1 ․ 1 : 1 - two types of 1 : 1 protection - The 1 : 1 protection can be extended to M : N protection. 1+1 architecture is faster and simpler than 1 : 1 but at the expense of lower network utilization.

Survivability strategies - Restoration Restoration is after-the-fact dynamic signaled recovery. ․ centralized ․ distributed In both restoration approaches, if an alternative path cannot be discovered for a broken connection, that connection is blocked. ․ No recovery guarantee and long restoration time.

Survivable routing algorithms Depending on the different traffic patterns, many researchers have proposed different approaches to solve the RWA problem. ․ SLE (Static Lightpath establishment) - RWA objective : minimize the wavelength utilization. ․ DLE (Dynamic Lightpath establishment) - RWA objective : minimize the request blocking probability. - two choice of DLE : 1. hop-by-hop 2. explicit routing

Survivable routing algorithms - Cost function There are many definitions of link cost in the literature, which can be classified into topology based, resource use based, or topology and resource use integrated. An integrated link cost function is as follows : resource weightshop count cost

Survivable routing algorithms - Cost function Generally, for the working path or dedicated protection path, the path cost is the sum of the link cost at each hop. However, for the shared protection path, there are two possible scenarios. ․ the protection path is defined similar to the case of working path ․ if shared protection is considered, the protection path cost is more related to resource consumption than to link cost.

Survivable routing algorithms - Cost function The working path cost CW and the protection path cost CP are defined as follow : φ(l(i,j), α) equals to l(i,j) when p has noλsharing with other protection path(s). Otherwise, 0<= φ(l(i,j), α) < l(i,j)

Survivable routing algorithms - Conventional survivable routing The method adopts a two-step algorithm : 1. selects a route with minimum cost for the working path at first, and then removes the links along the working path. 2. selects a route with minimum cost for the protection path. Although both the working and protection paths are selected separately with minimum cost, the sum of the working and protection costs may not be minimal.

Survivable routing algorithms - Conventional survivable routing (contd.) Sd Total cost from S to D = 11 Total cost from S to D = 10

Survivable routing algorithms - Suurballe`s Algorithms To overcome the shortcomings of the conventional approach, Suurballe`s algorithms were developed to search for the shortest pairs of disjointed paths. Unfortunately, the tasks of this algorithm take time to finish, and as the number of links in the network increases, this time can be substantial.

Survivable routing algorithms - Suurballe`s Algorithms (contd.) Step 1: Find the shortest path SP (by Dijkstra's algo.) from source S to destination D. Label each node by d(i), which is defined as the shortest distance from source node to node i. Step 2: Reverse all arcs along the shortest path SP, and multiply their cost with – 1. Step 3: Modify the cost of all arcs according to the following formula: ce´ (i-> j) = ce (i->j) + d(i) – d(j), so as to get a non-negative arc cost. The modified graph is denoted by G´. Step 4: Find the shortest path SP´ in the modified graph G´. Step 5: Map the shortest path of SP´ to G and eliminate the common arcs of SP and SP´ in G to obtain the two desired paths with minimum total cost.

Survivable routing algorithms - Suurballe`s Algorithms (contd.) Step5:elimination total cost =4+3=7

Survivable routing algorithms - Joint Working and Protection Routing Approach To simplify computation and make the disjoint path algorithm more practical, a joint lightpath selection has been proposed.

Survivable routing algorithms - Joint Working and Protection Routing Approach (contd.) n2 n4n3 n1 d S 1 2

Survivable routing algorithms - Joint Working and Protection Routing Approach (contd.) Step1 : Compute K candidate routes with Wi representing the ith (1<=i<=K) route and CWi as the cost of Wi. W1 : S->n1->n2->D, CW1=4 W2 : S->n1->n4->D, CW2=3 W3 : S->n3->n4->D, CW3=3 W4 : S->n3->D, CW4= n2 n4n3 n1 d S 1 2

Survivable routing algorithms - Joint Working and Protection Routing Approach (contd.) Step2 : For Wi(1<=i<=K), compute an edge-disjoint route, represented as Pi and the cost of Pi denoted as CPi. P1 : S->n3->n4->D, CP1=3 S->n3->D, CP1=2 P2 : S->n3->D, CP2=2 P3 : S->n1->n2->D, CP3=4 P4 : S->n1->n2->D, CP4=4 S->n1->n4->D, CP4= n2 n4n3 n1 d S 1 2

Survivable routing algorithms - Joint Working and Protection Routing Approach (contd.) Step3: Find h such that CWh + CPh = min (CWi + CPi), 1<=i<=K. Step4: Select Wh as the working path and Ph as the protection path. CW1 + CP1 = 7 or 6 CW2 + CP2 = 5 CW3 + CP3 = 7 CW4 + CP4 = 6 or n2 n4n3 n1 d S 1 2