Survivable Lightpath Routing: A New Approach to the Design of WDM – Based Networks Jared Strickland, Stephanie Kinsella, Travis Grosch, Sean Lunsford,

Slides:



Advertisements
Similar presentations
Linear Programming Problem
Advertisements

Midwestern State University Department of Computer Science Dr. Ranette Halverson CMPS 2433 – CHAPTER 4 GRAPHS 1.
Novembro 2003 Tabu search heuristic for partition coloring1/29 XXXV SBPO XXXV SBPO Natal, 4-7 de novembro de 2003 A Tabu Search Heuristic for Partition.
Optical Networks BM-UC Davis122 Part III Wide-Area (Wavelength-Routed) Optical Networks – 1.Virtual Topology Design 2.Wavelength Conversion 3.Control and.
1 Routing and Wavelength Assignment in Wavelength Routing Networks.
Lecture: 4 WDM Networks Design & Operation
1 Wide-Sense Nonblocking Multicast in a Class of Regular Optical Networks From: C. Zhou and Y. Yang, IEEE Transactions on communications, vol. 50, No.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
1 Discrete Structures & Algorithms Graphs and Trees: II EECE 320.
Computational problems, algorithms, runtime, hardness
Tirgul 12 Algorithm for Single-Source-Shortest-Paths (s-s-s-p) Problem Application of s-s-s-p for Solving a System of Difference Constraints.
Approximation Algorithms
PROFITABLE CONNECTION ASSIGNMENT IN ALL OPTICAL WDM NETWORKS VISHAL ANAND LANDER (Lab. for Advanced Network Design, Evaluation and Research) In collaboration.
ECS H. Zang and B. Mukherjee, UC Davis 1 Routing and Wavelength Assignment for Wavelength-Routed WDM Networks  Combined routing and wavelength.
Finding Protection Cycles in DWDM Networks 2002 IEEE ICC on Volume 5, 28 April-2 May Page(s): Reporter: Jyun-Yong Du.
Multipath Routing Algorithms for Congestion Minimization Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology.
Advances in Optical Network Design with p-Cycles: Joint optimization and pre-selection of candidate p-cycles (work in progress) Wayne D. Grover, John Doucette.
The Research of Applying Random Early Blocking strategy to Dynamic Lightpath Routing National Yunlin University of Science & Technology.
Introduction to Graph Theory
1.3 Modeling with exponentially many constr.  Some strong formulations (or even formulation itself) may involve exponentially many constraints (cutting.
Survivable Logical Topology Design in WDM Optical Ring Networks Hwajung Lee, Hongsik Choi, Suresh Subramaniam, and Hyeong-Ah Choi* The George Washington.
IP Restoration on WDM Optical Networks Hwajung Lee*, Hongsik Choi, Hyeong-Ah Choi The George Washington University Department of Computer Science.
All that remains is to connect the edges in the variable-setters to the appropriate clause-checkers in the way that we require. This is done by the convey.
Modeling and Evaluation with Graph Mohammad Khalily Dermany Islamic Azad University, Khomein branch.
Algorithms for Allocating Wavelength Converters in All-Optical Networks Authors: Goaxi Xiao and Yiu-Wing Leung Presented by: Douglas L. Potts CEG 790 Summer.
SMUCSE 8344 Protection & Restoration of Optical Networks.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Logical Topology Design
Multi-layered Optical Network Security
Models in I.E. Lectures Introduction to Optimization Models: Shortest Paths.
1 Multicasting in a Class of Multicast-Capable WDM Networks From: Y. Wang and Y. Yang, Journal of Lightwave Technology, vol. 20, No. 3, Mar From:
1 1 © 2003 Thomson  /South-Western Slide Slides Prepared by JOHN S. LOUCKS St. Edward’s University.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
10/6/2003Kevin Su Traffic Grooming for Survivable WDM Networks – Shared Protection Kevin Su University of Texas at San Antonio.
Network topology, cut-set and loop equation
ELEC692 VLSI Signal Processing Architecture Lecture 3
Traffic grooming in WDM Networks Dynamic Traffic Grooming in WDM Mesh Networks Using a Novel Graph Model by Hongyue Zhu, Hui Zang, Keyao Zhu, and Biswanath.
CPS Computational problems, algorithms, runtime, hardness (a ridiculously brief introduction to theoretical computer science) Vincent Conitzer.
1 Slides by Yong Liu 1, Deep Medhi 2, and Michał Pióro 3 1 Polytechnic University, New York, USA 2 University of Missouri-Kansas City, USA 3 Warsaw University.
Survivable Paths in Multilayer Networks Marzieh Parandehgheibi Hyang-won Lee Eytan Modiano 46 th Annual Conference on Information Sciences and Systems.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
1 Dynamic RWA Connection requests arrive sequentially. Setup a lightpath when a connection request arrives and teardown the lightpath when a connection.
Tunable QoS-Aware Network Survivability Presenter : Yen Fen Kao Advisor : Yeong Sung Lin 2013 Proceedings IEEE INFOCOM.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Introduction to Graph Theory
Computer Network Architecture Lecture 2: Fundamental of Network.
Optimal Design of Survivable Mesh Networks Based on Line Switched WDM Self-Healing Rings IEEE/ACM Transactions on Networking, Vol 11, NO.3, June,2003 Andrea.
Linear Programming Chapter 1 Introduction.
1.3 Modeling with exponentially many constr. Integer Programming
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
Introduction to Multiple-multicast Routing Chu-Fu Wang.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
Wavelength-Routed Optical Networks: Linear Formulation, Resource Budgeting Tradeoffs, and a Reconfiguration Study Dhritiman Banergee and Biswanath Mukherjee,
Physical Network Topology. When working with a network What is Physical Topology????? The physical topology of a network refers to the configuration of.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Virtual-Topology Adaptation for WDM Mesh Networks Under Dynamic Traffic.
Integer Programming An integer linear program (ILP) is defined exactly as a linear program except that values of variables in a feasible solution have.
Qian Hu, Yang Wang, Xiaojun Cao Department of Computer Science
DISA under NSA-LUCITE Contract
BroadNets 2004, October 25-29, San Jose
Isabella Cerutti, Andrea Fumagalli, Sonal Sheth
Distributed Control Plane
Network Survivability
1.3 Modeling with exponentially many constr.
Integer Programming (정수계획법)
Optical Layer Protection Schemes
Physical Network Topology
Algorithms for Budget-Constrained Survivable Topology Design
1.3 Modeling with exponentially many constr.
Linear Programming Problem
Presentation transcript:

Survivable Lightpath Routing: A New Approach to the Design of WDM – Based Networks Jared Strickland, Stephanie Kinsella, Travis Grosch, Sean Lunsford, Mohammad Alsawwaf

Introduction: What is the problem? The paper discusses the problem of embedding logical topologies on a WDM physical topology so that in the event of a physical link failure, the network remains connected.

Problem Formulation

Integer Linear Programming Formulation ILP formulation ▫requires that not all logical links can be carried n a single physical link. ▫focus on minimizing total number of wavelengths used ▫solution must be survivable (failure of any physical link leaves logical link connected used ILP, shortest-path, two relaxed versions of the constraints ▫ILP found solutions for networks of degree 3, 4, 5 ▫SP failed to find solutions for all the networks, performance improved with topologies of higher degree ▫relaxing integer constraint to LP provided solutions quickly, left only 10 deg-3 topologies unprotected ▫enforcing survivability constraints only for cut-sets less than or equal to degree of logical topology plus one found protected solutions for all topologies computation time: ▫ILP longest, relaxations much shorter

Ring Logical Topologies The study only focused on bidirectional ring topology – Meaning data can travel in both directions Corollary 1: a bidirectional logical ring is survivable if and only if no two logical links share the same physical link Since no two lightpaths can share a physical link, the objective of minimizing the total number of physical links and that of minimizing the total number of wavelengths*links used are in fact the same

Necessary conditions for survivable routing Not always possible to route a logical topology on a given physical topology in a manner that preserver the survivability of the logical topology In some instances lightpaths will have to share a physical link and the ring would not be survivable Theorem 3 says that for all cuts of the physical topology, the number of physical links in the cut set must be greater than or equal to twice the number of nodes on the smaller side of the cut

Logical ring Results Notice that there are 120 (5!) 6-node logical ring topologies and 362,880 (9!) 10-node logical ring topologies To make sure the results were survivable they would remove a light path if it was already used in order to protect survivability at the cost of shortest path The more nodes they added the harder it was for them to maintain survivability – Once they hit 10 nodes a little under 10 percent were left unprotected

Conclusion With the formulation of conditions necessary for survivable routing of the logical topology, they came up with an ILP formulation. This ILP formulation allowed them to find survivable routings for a variety of network topologies. The results show that the new approach offers a higher degree of protection compared to shortest path routing.

Conclusion cont. Because solving ILP for large scale networks is usually difficult, they examined relaxations to the ILP formulation that find survivable routings with reducing complexity. The basic idea behind these relaxations is to enforce only a subset of the constraints. They found that this approach creates survivable routings with very high probability, especially for densely connected networks.