2015/6/291 Fault Management in IP- Over-WDM Networks: WDM Protection Versus IP Restoration Adviser: Ho-Ting Wu Presenter: Ze-Yang Guo.

Slides:



Advertisements
Similar presentations
In the name of God, The Beneficent, The Merciful
Advertisements

Protection and Restoration in Optical Network
Jaringan Komputer Lanjut Packet Switching Network.
Optical Networks BM-UC Davis122 Part III Wide-Area (Wavelength-Routed) Optical Networks – 1.Virtual Topology Design 2.Wavelength Conversion 3.Control and.
Protection Mechanisms for Optical WDM Networks based on Wavelength Converter Multiplexing and Backup Path Relocation Techniques Presented by: Brian V.
Lecture: 4 WDM Networks Design & Operation
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
1 Wide-Sense Nonblocking Multicast in a Class of Regular Optical Networks From: C. Zhou and Y. Yang, IEEE Transactions on communications, vol. 50, No.
9/22/2003Kevin Su Traffic Grooming in WDM Networks Kevin Su University of Texas at San Antonio.
Dynamic Routing and Wavelength Assignment Scheme for Protection against Node Failure Ying Wang1, Tee Hiang Cheng1,2 and Biswanath Mukherjee3 1School of.
Traffic Grooming in WDM Networks Wang Yao. WDM Technology increases the transmission capacity of optical fibers allows simultaneously transmission of.
PROFITABLE CONNECTION ASSIGNMENT IN ALL OPTICAL WDM NETWORKS VISHAL ANAND LANDER (Lab. for Advanced Network Design, Evaluation and Research) In collaboration.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
IP layer restoration and network planning based on virtual protection cycles 2000 IEEE Journal on Selected Areas in Communications Reporter: Jyun-Yong.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
ECS H. Zang and B. Mukherjee, UC Davis 1 Routing and Wavelength Assignment for Wavelength-Routed WDM Networks  Combined routing and wavelength.
Sponsored by BellSouth, Cisco, UC Micro Program Design and Development of an MPLambdaS Simulator Jian Wang, Biswanath Mukherjee, S, J, Ben Yoo University.
Introduction to Protection & Restoration for OBS Copyright, 2000, SUNY, Univ. at Buffalo Presented by Zaoyang Guo & Dahai Xu.
Outline Introduction Switching Techniques Optical Burst Switching
Finding Protection Cycles in DWDM Networks 2002 IEEE ICC on Volume 5, 28 April-2 May Page(s): Reporter: Jyun-Yong Du.
Control and Traffic Management Paper: Banerjee et al.: ” Generalized multiprotocol label switching: an overview of signaling enhancements and recovery.
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
1 Introduction to Optical Networks. 2 Telecommunications Network Architecture.
NTNU Protection switching TTM1: Optical transport and access networks By Steinar Bjørnstad 2014.
Flow Models and Optimal Routing. How can we evaluate the performance of a routing algorithm –quantify how well they do –use arrival rates at nodes and.
Integrated Dynamic IP and Wavelength Routing in IP over WDM Networks Murali Kodialam and T. V. Lakshman Bell Laboratories Lucent Technologies IEEE INFOCOM.
Survivable Logical Topology Design in WDM Optical Ring Networks Hwajung Lee, Hongsik Choi, Suresh Subramaniam, and Hyeong-Ah Choi* The George Washington.
Helsinki 19 May 2006 Fine Protection of Data-Paths in Multi-Layer Networks Based on the GMPLS paradigm G.Oriolo, Università Tor Vergata, Roma joint work.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
1 Protection Mechanisms for Optical WDM Networks based on Wavelength Converter Multiplexing and Backup Path Relocation Techniques Sunil Gowda and Krishna.
9 1 SIT  Today, there is a general consensus that in near future wide area networks (WAN)(such as, a nation wide backbone network) will be based on.
1 Next Few Classes Networking basics Protection & Security.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
November 18, Traffic Grooming in Optical WDM Networks Presented by : Md. Shamsul Wazed University of Windsor.
1 Optical Burst Switching (OBS). 2 Optical Internet IP runs over an all-optical WDM layer –OXCs interconnected by fiber links –IP routers attached to.
SMUCSE 8344 Protection & Restoration of Optical Networks.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Lightpath Restoration in WDM Optical Networks A Survey in IEEE Network Magazine Nov/Dec 2000.
Computer Networks with Internet Technology William Stallings
Network-Coding Multicast Networks With QoS Guarantees Yuanzhe Xuan and Chin-Tau Lea, Senior Member, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19,
1 Traffic Engineering in Multi-Granularity, Heterogeneous, WDM Optical Mesh Networks Through Dynamic Traffic Grooming Keyao Zhu, Hongyue Zhu, and Biswanath.
Logical Topology Design
Multi-layered Optical Network Security
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
1 Multicasting in a Class of Multicast-Capable WDM Networks From: Y. Wang and Y. Yang, Journal of Lightwave Technology, vol. 20, No. 3, Mar From:
CSC Survivability Anuj Dewangan Parinda Gandhi.
Two-layer Restoration Scheme for IP over Optical Networks with MPLS Jia Ke, L. Mason, Q. Yang ICIS, School of EEE, Nanyang Technological University
Survivable Traffic Grooming with Differentiated End-to-End Availability Guarantees in WDM Mesh Networks Proceedings of the 13th IEEE Workshop on Local.
10/6/2003Kevin Su Traffic Grooming for Survivable WDM Networks – Shared Protection Kevin Su University of Texas at San Antonio.
Rate-Based Channel Assignment Algorithm for Multi-Channel Multi- Rate Wireless Mesh Networks Sok-Hyong Kim and Young-Joo Suh Department of Computer Science.
(Slide set by Norvald Stol/Steinar Bjørnstad
Optical Networking University of Southern Queensland.
1 Why Optical Layer Protection? Optical layer provides lightpath services to its client layers (e.g., SONET, IP, ATM) Protection mechanisms exist in the.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
Traffic grooming in WDM Networks Dynamic Traffic Grooming in WDM Mesh Networks Using a Novel Graph Model by Hongyue Zhu, Hui Zang, Keyao Zhu, and Biswanath.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
11/02/2001 Workshop on Optical Networking 1 Design Method of Logical Topologies in WDM Network with Quality of Protection Junichi Katou Dept. of Informatics.
QoS-specified Traffic Grooming Algorithm in WDM Mesh Networks Bing Xiang, Hongfang Yu, Sheng Wang, Lemin Li Communications, Circuits and Systems, 2004.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
Optimal Design of Survivable Mesh Networks Based on Line Switched WDM Self-Healing Rings IEEE/ACM Transactions on Networking, Vol 11, NO.3, June,2003 Andrea.
Wavelength-Routed Optical Networks: Linear Formulation, Resource Budgeting Tradeoffs, and a Reconfiguration Study Dhritiman Banergee and Biswanath Mukherjee,
Chapter 2 PHYSICAL LAYER.
Presented by Tae-Seok Kim
Network Survivability
The University of Adelaide, School of Computer Science
Optical Layer Protection Schemes
The University of Adelaide, School of Computer Science
SURVIVABILITY IN IP-OVER-WDM NETWORKS (2)
Optical communications & networking - an Overview
Chapter 10 RWA 2019/5/9.
Presentation transcript:

2015/6/291 Fault Management in IP- Over-WDM Networks: WDM Protection Versus IP Restoration Adviser: Ho-Ting Wu Presenter: Ze-Yang Guo

2015/6/292 Outline Introduction –Fault-Management Techniques –Illustrative Example –Integer Linear Program (ILPs) An upper bound for the guaranteed network capacity Heuristic Algorithm Recovery Time Analysis –WDM Shared-Path Protection –IP Restoration Illustrative Numerical Results Conclusions References

2015/6/293 Introduction Wavelength-Division Multiplexing –Divide tremendous bandwidth of a fiber (up to 50 Tbits/s) –Each WDM channel may be operated at whatever speed one desires. –Transmissions on different wavelengths are coupled into a single fiber. –An optical crossconnect (OXC) can switch the optical signal on a WDM channel from an input port to an output port.

2015/6/294 Lightpath –A lightpath is a point-to-point all-optical wavelength channel –A set of lightpaths embeds a virtual (or logical) topology on the network. –In the virtual topology, carries not only the direct traffic but also traffic between nodes that are not directly connected by employing the “multihop approach”.

2015/6/295

6 We model the variation in network traffic by multiplying the traffic matrix by a scalar, called the “load factor,” which we denote by α. We are given an IP-over-WDM network and a traffic matrix, we are required to find a virtual topology and the corresponding traffic flow assignment that will –provide protection against a single fiber failure. –maximize α.

2015/6/297 Fault-Management Techniques –Protection Spare capacity is reserved during call setup. –Restoration Spare capacity available after the fault’s occurrence is utilized for rerouting the disrupted traffic.

2015/6/298 Fault-Management Techniques in IP- Over-WDM –Provide protection at the WDM layer Set up a backup lightpath for every primary lightpath in the network. –Provide restoration at IP layer Overprovision the network after a fiber failure, the network should still be able to carry all the traffic it was carrying before the fiber failure.

2015/6/299 WDM Protection –Dedicated-path protection: At the time of call setup, for each primary path, a fiber-disjoint backup path and wavelength are reserved and dedicated to that call. The backup wavelength reserved on the links of the backup path are dedicated to that call and are not shared with other backup paths.

2015/6/2910 –Shared-path protection: T he backup wavelength reserved on the links of the backup path may be shared with other backup paths. Shared-path protection is more capacity efficient when compared with dedicated-path protection.

2015/6/2911 IP Restoration: Routers within an AS exchange routing information by employing an interior gateway protocol (IGP). By using an IGP, an AS can combat a link failure.

2015/6/2912 Illustrative Example –WDM shared-path protection solution –IP-restoration solution

2015/6/2913 WDM shared-path protection solution The primary lightpaths are (4, 5, 6) and(5, 10, 9), on the same wavelength, the backup lightpaths are (4, 8, 0, 6) and (5,4, 8, 7, 9), on the same wavelength.

2015/6/2914 IP-restoration solution The solution consists of two lightpaths between node 4 and node 6 along the routes (4, 5, 6) and (4, 8, 0, 6) on different wavelengths, respectively.

2015/6/2915 Integer Linear Program(CPLEX) –The solution to the ILP formulation provides us with an optimal virtual topology and a traffic flow assignment that maximizes the guaranteed network capacity. –Since the complete ILP formulations were taking a very long time to solve, we experimented by splitting the ILP formulations into two parts.

2015/6/2916 An upper bound for the guaranteed network capacity Capacity –Given: topology G, traffic matrix Λ,C be a cutset that partitions the topology G into two components whose node sets are V1 and V2, is equal to the traffic from node u to node v, define a congestion with a single link failure as

2015/6/2917 Let be the maxixum value of taken over all possible cutset, if the capacity of a lightpath is equal to B, then the load factor α cannot be greater than hence, an upper bound on α is

2015/6/2918 If node i has transmitters an receivers, then the maximum amount of traffic that can be sourced or sinked at node i is bounded by . B and . B, respectively. The amount of traffic sourced from node i is given by and the amount of traffic sinked at node is given by Thus

2015/6/2919 The following upper bound is used only for the IP restoration technique, let the degree of node i be denoted by deg(i), note that in IP restoration, thus

2015/6/2920 Based on the above analysis, tighter upper bounds for the load factor for WDM shared-path protection and IP-restoration can be computed as:

2015/6/2921 Heuristic Algortithm The heuristic algorithm is based on the concept of a “branch- exchange.” The algorithm starts by constructing an initial virtual topology and iterates between the following two phases. In the first phase, the heuristic attempts to tear down as many lightpaths as possible, without increasing the load on the maximally loaded link,and the least loaded lightpath is removed first. In the second phase, the heuristic attempts to decrease the load of the maximally loaded link by setting up as many lightpaths as possible by employing the resources freed up in the first phase. The heuristic iterates between these two phases until either it finds a stable virtual topology

2015/6/2922 –WDM protection

2015/6/2923

2015/6/2924 –IP resoration differences with WDM heuristic: Only needs to set up the primary lightpath.

2015/6/2925

2015/6/2926

2015/6/2927 Recovery Time Analysis –WDM shared-path protection 1)The fiber failure is detected by the network nodes adjacent to the fiber, we assume that the time to detect a fiber failure is F, that F = 100μs. 2) Message processing time at a node is denoted by D, that D = 100μs. 3) Propagation delay on each fiber is denoted by P, we assume that the fiber length is equal to 80 km, which corresponds to a delay of 400μs. 4) The time to configure and test a cross-connect is C, we use C = 5ms in our calculations.

2015/6/2928 5) The number of hops from the node adjacent to the failed fiber to the source node of the connection is. 6) The number of hops in the backup route from the source node to the destination node is. The total time for shared-path protection is given by

2015/6/2929 –IP restoration 1) The fiber failure is detected by the destination nodes of all the failed lightpaths. Since we assume that the WDM hardware is tightly coupled with the IP layer, hence the time to detect a fiber failure F, that F = 10ms 2) The processing time for link-state update messages is dominated by the time it takes to run the broadcast algorithm, We assume that the IP router has dedicated hardware for running the broadcast algorithm. Thus, we use D = 1ms. 3) The propagation delay on a fiber 400μs.

2015/6/2930 4) The time required to recompute the routing table at a node is R, We use R = 200ms. 5) The number of hops from the failed fiber to the destination node of the failed lightpath is 6) The number of hops from the destination node of the failed lightpath to the most distant node in the network is n. The total time for IP restoration is given by

2015/6/2931 Illustrative numerical results We assumed a single transmitter and receiver per wavelength per node in the network

2015/6/2932

2015/6/2933

2015/6/2934

2015/6/2935 Now, since the upper bound is always less than, and in this particular example, since the upper bound is also less than, the upper bound on α for the IP restoration solution is lower than the upper bound for the WDM solution. On the other hand, if we allow multiple transceivers per wavelength per node, then IP restoration performs slightly better than WDM shared-path protection, as the figure.11

2015/6/2936

2015/6/2937 Let us assume that we have three wavelengths in the network and three transceivers each at nodes 0 and 5, also assume that none of the transceivers at nodes 1, 2, 3, 4, 6, and 8 are free. Also, let us assume that none of the wavelengths on link (8, 7) are free. Now, suppose that we want to route two units of traffic from node 0 to node 5.

2015/6/2938 This table shows the average WDM shared-path protection and IP restoration times. We assume that the network has 16 wavelengths and that each node is equipped with multiple transceivers on each wavelength, and maximize the load factor α.

2015/6/2939 Conclusion WDM shared-path protection outperformed IP restoration for our example network, possibly due to the limited number of transceivers per node. Since the recovery times for WDM shared-path protection and IP restoration. We found that the recovery times for WDM shared-path protection are much faster than the recovery times for IP restoration. Under some certain scenario WDM shared-path protection can produce feasible solution, but IP restoration cannot. That hard to say that WDM shared-path or IP restoration which one is better.

2015/6/2940 References O. Gerstel, “Opportunities for optical protection and restoration,” in Optical Fiber Communication Conf., vol. 2, San Jose, CA, Feb. 1998, pp.269–270. S. Ramamurthy and B. Mukherjee, “Survivable WDM mesh networks, Part II—Restoration,” in Proc. IEEE ICC’99, vol. 3, Vancouver, BC,June 1999, pp. 2023–2030. W. D. Grover, “The selfhealing network: A fast distributed restoration technique for networks using digital crossconnect machines,” in Proc.IEEE Globecom’87, 1987, pp – Nasir Ghani, Ph.D. “IP over optical” Industry Program Chair, OPTICOMM 2000 Bala Rajagopalan, Dimitrios Pendarakis, Debanjan Saha, Ramu S. Ramamoorthy,and Krishna Bala, Tellium, Inc. “IP over Optical Networks:Architectural Aspects”