DISA under NSA-LUCITE Contract

Slides:



Advertisements
Similar presentations
Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Advertisements

Optimization Problems in Optical Networks. Wavelength Division Multiplexing (WDM) Directed: Symmetric: Undirected: Optic Fiber.
Optical networks: Basics of WDM
Jaringan Komputer Lanjut Packet Switching Network.
Optimization Problems in Optical Networks. Wavelength Division Multiplexing (WDM) Directed: Symmetric: Optic Fiber.
Label Placement and graph drawing Imo Lieberwerth.
Improvement on LEACH Protocol of Wireless Sensor Network
1 Routing and Wavelength Assignment in Wavelength Routing Networks.
Lecture: 4 WDM Networks Design & Operation
Efficient Realization of Hypercube Algorithms on Optical Arrays* Hong Shen Department of Computing & Maths Manchester Metropolitan University, UK ( Joint.
Global Flow Optimization (GFO) in Automatic Logic Design “ TCAD91 ” by C. Leonard Berman & Louise H. Trevillyan CAD Group Meeting Prepared by Ray Cheung.
1 Wide-Sense Nonblocking Multicast in a Class of Regular Optical Networks From: C. Zhou and Y. Yang, IEEE Transactions on communications, vol. 50, No.
Approximation Algorithms
PROFITABLE CONNECTION ASSIGNMENT IN ALL OPTICAL WDM NETWORKS VISHAL ANAND LANDER (Lab. for Advanced Network Design, Evaluation and Research) In collaboration.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Virtual Topology Adaptation in WDM Mesh Networks (for ECS 259: A. Gencata and B. Mukherjee, UC Davis) 1 Virtual Topology  Wavelength routed network 
1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Finding Protection Cycles in DWDM Networks 2002 IEEE ICC on Volume 5, 28 April-2 May Page(s): Reporter: Jyun-Yong Du.
Survivable Logical Topology Design in WDM Optical Ring Networks Hwajung Lee, Hongsik Choi, Suresh Subramaniam, and Hyeong-Ah Choi* The George Washington.
A Dynamically Adaptive Hybrid Algorithm for Scheduling Lightpaths in Lambda-Grids Neena R. Kaushik and Silvia M. Figueira Santa Clara University Presented.
IP Restoration on WDM Optical Networks Hwajung Lee*, Hongsik Choi, Hyeong-Ah Choi The George Washington University Department of Computer Science.
Data Communications & Computer Networks, Second Edition1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks.
November 18, Traffic Grooming in Optical WDM Networks Presented by : Md. Shamsul Wazed University of Windsor.
Survivable Lightpath Routing: A New Approach to the Design of WDM – Based Networks Jared Strickland, Stephanie Kinsella, Travis Grosch, Sean Lunsford,
Logical Topology Design
CP Summer School Modelling for Constraint Programming Barbara Smith 2. Implied Constraints, Optimization, Dominance Rules.
Multi-layered Optical Network Security
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
1 Multicasting in a Class of Multicast-Capable WDM Networks From: Y. Wang and Y. Yang, Journal of Lightwave Technology, vol. 20, No. 3, Mar From:
Optical Networking University of Southern Queensland.
Traffic grooming in WDM Networks Dynamic Traffic Grooming in WDM Mesh Networks Using a Novel Graph Model by Hongyue Zhu, Hui Zang, Keyao Zhu, and Biswanath.
11/02/2001 Workshop on Optical Networking 1 Design Method of Logical Topologies in WDM Network with Quality of Protection Junichi Katou Dept. of Informatics.
Survivable Paths in Multilayer Networks Marzieh Parandehgheibi Hyang-won Lee Eytan Modiano 46 th Annual Conference on Information Sciences and Systems.
Optimal Design of Survivable Mesh Networks Based on Line Switched WDM Self-Healing Rings IEEE/ACM Transactions on Networking, Vol 11, NO.3, June,2003 Andrea.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Virtual-Topology Adaptation for WDM Mesh Networks Under Dynamic Traffic.
The NP class. NP-completeness
Chap 10. Sensitivity Analysis
Networks Network:end-node and router C 2 B 1 3 D 5 A 4 6 E 7 Router F
BroadNets 2004, October 25-29, San Jose
A Study of Group-Tree Matching in Large Scale Group Communications
CS137: Electronic Design Automation
The minimum cost flow problem
Eulerian tours Miles Jones MTThF 8:30-9:50am CSE 4140 August 15, 2016.
Surviving Holes and Barriers in Geographic Data Reporting for
CS137: Electronic Design Automation
IGCSEFM :: Domain/Range
Routing and Logistics Arc Routing 2018/11/19.
A stability-oriented approach to improving BGP convergence
Network Optimization Research Laboratory
Instructor: Shengyu Zhang
ESE535: Electronic Design Automation
of the Artificial Neural Networks.
The University of Adelaide, School of Computer Science
Algorithms for Budget-Constrained Survivable Topology Design
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
1.3 Modeling with exponentially many constr.
Solving the Minimum Labeling Spanning Tree Problem
ESE535: Electronic Design Automation
Chapter 6 Network Flow Models.
ECE 753: FAULT-TOLERANT COMPUTING
SURVIVABILITY IN IP-OVER-WDM NETWORKS (2)
Trevor Brown DC 2338, Office hour M3-4pm
The Greedy Approach Young CS 530 Adv. Algo. Greedy.
B-Trees.
Heaps & Multi-way Search Trees
Authors: Jinliang Fan and Mostafa H. Ammar
Communication Driven Remapping of Processing Element (PE) in Fault-tolerant NoC-based MPSoCs Chia-Ling Chen, Yen-Hao Chen and TingTing Hwang Department.
EMIS 8374 Max-Flow in Undirected Networks Updated 18 March 2008
CS137: Electronic Design Automation
Presentation transcript:

DISA under NSA-LUCITE Contract Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks Hwajung Lee, Hongsik Choi, Suresh Subramaniam, and Hyeong-Ah Choi The George Washington University Supported in part by DARPA under grant #N66001-00-18949 (Co-funded by NSA) DISA under NSA-LUCITE Contract NSF under grant ANI-9973098 My name is Hwajung Lee from the George Washington University. This work is collaborated with others. Today, I’ll present about “Reconfiguration of Survivable Logical Topologies in WDM Optical Ring Networks”.

Outline Introduction – Network Survivability Motivation Problem Formulation Problem Complexity Simple Reconfiguration Approach & its Limitation MinCostReconfiguration Algorithm Concluding Remarks In the Introduction, I’ll briefly mention what the network survivability is. Then, motivation of this work, Problem Formulation, and Problem Complexity will be discussed. As a solution, Reconfiguration Algorithm will be provided. And Limitation of Reconfiguration algorithm will be mentioned. Concluding remarks will be the last part of my presentation.

Network Survivability Introduction Network Survivability To guarantee for users to use the network service without any interruption. Each layer has its own fault recovery functions. Fault propagation ATM IP WDM Optical Network Physical Fiber Plant SONET/ SDH Network Survivability is an effort to guarantee for users to use the network service without any interruption. If we use some protocol stack, for example like this, to support network Survivability, each layers have their own fault recovery functions. Sometimes, a single fault of a lower layer can propagate into a multiple failures of an upper layer so that the upper layer topology can be disconnected into at least two part, which can damage the fault recovery function of the upper layer. So careful mapping from an upper layer to a lower layer is necessary to minimize the impact of the fault propagation.

Survivable Logical Topology Introduction Survivable Logical Topology Logical topology (Upper Layer) is called survivable if it remains connected in the presence of a single optical link failure. Faulty Model : Single optical link failure. So, if the upper layer is still connected from the impact of the fault propagation, we can call the upper layer of the mapping survivable.

Survivable Logical Topology Introduction Survivable Logical Topology Survivable Electronic layer is connected even when a single optical link fails 1 Optical Layer = Physical Topo. Upper Layer = Logical Topology 5 2 Not Survivable Desirable! 1 3 4 3 4 1 2 5 Now, what I mean by mapping is this. ====== This example shows that if you do not carefully map a logical topology to a physical topology, you might not have a survivable logical topology. Suppose the left topology is a logical topology and each edge represents a connection request between two electronic devices. And the right topology is a physical topology of optical devices. For each connection request of the logical topology, we establish a lightpath over the physical topology. For example, for (0,1), a lightpath (0,1) is established. And (0,4) is embedded on the lightpath (0,4) and so on. Both physical rings are identical except a lightpath (2,5) embedding. Now, if the link (0,1) is failed, three lightpaths are broken so that the shown edges of the logical links are failed. At this moment, we can see that all the devices in the logical topology are still connected each other. Whereas, in the case of the second embedding, if the link (0,1) is failed, four lightpaths are broken so that the shown edges of the logical links are failed. At this moment, we can see that the logical topology is divided into two parts so that there is no way to deliver data from the left to the right vice versa. Map each connection request to an optical lightpath. 2 5 3 4

Survivable Logical Topology Introduction Survivable Logical Topology Sometimes, there is no way to have a Survivable Logical Topology Embedding on a Physical Topology. Optical Layer = Physical Topo. Electronic Layer = Logical Topology e1 … d b c a b a … … In this slide, I would like to show that, sometimes, there is no way to have a Survivable Logical Topology Embedding on a Physical Topology. If we have a logical topology which is 2-edge connected, the logical topology can not be survivable if (a,b) and (c,d) are located as shown. What I mean by 2-edge connected is that, if we delete two edges e1 and e2, the topology will be divided into two components. Both e1 and e2 are failed by a physical link fault. Here is the example of the Survivable Logical Topology for the logical topology in the left side. Please note that the node location. As long as all the edge cuts, e1 and e2, are not overlapped on one optical link, the Logical Topology can have a survivable embedding. Thus, we observe that, depending the node embedding, it is possible not to have a Survivable Logical Topology. e2 c d 2-Edge Connected

Survivable Logical Topology Design Problem (SLTDP) Introduction Survivable Logical Topology Design Problem (SLTDP) Given a physical topology, and a logical topology = a set of connection requests. Objectives Find a route of lightpath for each connection request, such that the logical topology remains connected after a single link failure if possible. Otherwise, determine and embed the minimum number of additional lightpaths to make the logical topology survivable. Now, here is the summary of our objectives. Given a physical topology and a logical topology, we first try to find a route for each logical link and, if it is the case that we can not have a survivable logical topology no matter how we try to, we add the a few additional lightpaths based on our algorithm.

Survivable LT design possible Introduction H. Lee, H. Choi, S. Subramaniam, and H.-A. Choi, “Survivable Logical Topology Design in WDM Optical Ring Networks,” The 39th Annual Allerton Conference, October 2001, Invited Paper Survivable LT design possible Completely connected (i.e., (n-1)-edge connected) NO survivable LT design when logical topology G is 2-edge connected 3-edge connected 4-edged connected Degree Constraints Survivable LT design possible when min. degree >= No survivable LT design for min. degree <= ( -1) Experimental Results – Near Optimal Here is the summary of the results of the Survivable Logical Topology Design Problem. We have a near optimal solution, which is presented in Allerton Conference. =========== Let’s look into the edge-connectivity first. In case of 2, 3, 4, and up to (n/2)-1 edge connected logical topology, we can NOT guarantee to have a survivable logical topology whereas the completely connected logical topology always have a SURVIVABLE logical topology. Each case will be shown briefly from the next slide. Currently, we are working on tightening this gap between those two groups to find the value k of k-connectivity which always guarantees to have a SURVIVABLE logical topology. Now, let’s consider with the degree constraints. We find out that we can guarantee to have a SURVIVABLE logical topology if the minimum degree of the logical topology is greater than equal to (2n)/3. And we can NOT guarantee the SURVIVABILITY of the logical topology if the minimum degree of the logical topology is less than equal to (n/2)-1. 2n 3 n 2

Reconfiguration of Survivable Logical Topologies Motivation Reconfiguration of Survivable Logical Topologies What if # of Wavelength < 3 or # of Ports < 3 Survivable Logical Topology = G1 Survivable Logical Topology = G2 1 1 3 2 3 2 Physical Topology = Gp # of Ports = 3 # of Wavelength = 3 Now, let’s think about the reconfiguration. Suppose we have a logical topology, a physical topology, and a survivable mapping from the two topologies. While time passed, the connection requests can be modified so that the logical topology can be changed. Therefore, we need to reconfigure the current mapping to support the new logical topology with holding the survivability of the logical topology throughout all the reconfiguration steps. If we don’t have any restriction, we can easily add all the new connection requests and then delete all the old ones. Let me briefly introduce two terms. First one is # of port of a node which is the number of points that lightpaths can arrive at and depart from. Second one is # of wavelength of a link which is the number of lightpaths that pass on the link. If we have some restrictions on the # of port and # of wavelength, the reconfiguration is more complicated. ======= As long as the logical topology is connected, there is a way to transfer data from any node to any other node. Add G2\G1 to form G1  G2 1 3 2 Delete G1\G2

Reconfiguration of Survivable Logical Topologies Problem Formulation Reconfiguration of Survivable Logical Topologies Given Two Survivable Logical Topology G1 and G2 on a physical topology Gp Constraints the number of port p, the number of wavelength W Objectives During the entire period of reconfiguration, The logical topology remains survivable The port p and wavelength W constraints are satisfied. This is the problem formulation of the reconfiguration issue. What we want to do is, during the entire period of reconfiguration, to guarantee that the logical topology remains survivable and the port and wavelength constraints are satisfied.

Problem Complexity If no p or W constraint exists, In General, the problem can be solved by Add G2\G1 to form G1  G2. Delete G1\G2. Except CASE 1 in the next slide. If the port and/or wavelength constraints exist(s), more Complicated. CASE 2 and CASE 3. Now, let’s talk how hard this problem is. We have three cases to show the problem complexity.

CASE 1 Problem Complexity Need to change the directions of some lightpaths in G1  G2. Physical topology Logical topologies 6 6 1 5 1 5 1 6 2 5 isolated isolated 3 4 2 4 2 4 3 3 Survivable Survivable 1 6 1 6 2 5 2 5 3 4 3 4

CASE 3 CASE 2 Problem Complexity Need to temporarily add some lightpaths not in G1  G2 to guarantee the survivability and delete later. CASE 3 CASE 2 Need to temporarily delete and re-establish some lightpaths in G1  G2 due to Wavelength Constraints. 3 1 2 4 5 6 Logical topologies Physical topology ! Yes ! (W = 3) ? No ! (W = 4) 1 1 6 6 2 5 2 5 3 3 4 4 W = 3, p = 4 .

Simple Reconfiguration Approach Reconfiguration Algorithm Simple Reconfiguration Approach If the current lightpath setup uses W-1 wavelength in each optical link and upto p-2 ports at each node, add a lightpath btw each pair of adjacent nodes, delete all lightpaths in G1 except the above, and establish all lightpaths in G2 based on its survivable embedding. 1 6 2 5 By using one more wavelength, we can a good benefit which is reconfiguration. With going one step further, this algorithm can be expend to the mapping which uses W wavelengths if we can have an algorithm to modify the mapping with using only W-1 wavelength. We found out a certain condition to guarantee that except the following cases. 3 4 W = 4, p = 6

Limitation of Simple Reconfiguration Approach Reconfiguration Algorithm Limitation of Simple Reconfiguration Approach W = k + 1 The intermediate nodes between n and n-k connect to the nodes n and n-k only. Thus, no lightpath can be removed without violating the survivability. In the green box, each node is connected to its adjacent node only. You can have as many nodes as you want in the green box. So, we are finalizing the conditions to cover this case too.

Reconfiguration Algorithm Algorithm MinCostReconfiguration Cost = # of add * UnitCostadd + # of delete * UnitCostdelete Given Input : M1, M2, Gp Output : Wadd, Wadd = Wreconfig – max{WM1, WM2} Constraints the number of port p, the number of wavelength W Objectives To minimize Wreconfig while reconfiguration cost is preserved minimum. During the entire period of reconfiguration, The logical topology remains survivable The port p and wavelength W constraints are satisfied. This is the problem formulation of the reconfiguration issue. What we want to do is, during the entire period of reconfiguration, to guarantee that the logical topology remains survivable and the port and wavelength constraints are satisfied.

Wreconfig = max{ML1, ML2} = 4 (= Winitial ) From To ML1 = 4 ML2 = 3

Wreconfig = 4 1 7 2 6 3 5 4

Wreconfig = 4 1 7 2 6 3 5 4

Wreconfig = 4

Wreconfig = 4 1 7 2 6 3 5 4

Wreconfig = 5

Wreconfig = 5

Wreconfig = 5 Wadd = Wreconfig - Winitial = 5 – 4 = 1

Numerical Results # of Simulations per each case = 500 n = 8

Numerical Results # of Simulations per each case = 500 n = 16

Numerical Results # of Simulations per each case = 500 n = 32

Numerical Results DiffFactor = 2(|E(G1)-E(G2)|+|E(G2)-E(G1)|)/n(n-1)

Concluding Remarks Develop Algorithms to guarantee min # of Wavelength to find a proper compromising point of reconfiguration cost and the best number of wavelength under the reconfiguration cost constraint and the number of wavelength constraint.