10/6/2003Kevin Su Traffic Grooming for Survivable WDM Networks – Shared Protection Kevin Su University of Texas at San Antonio.

Slides:



Advertisements
Similar presentations
In the name of God, The Beneficent, The Merciful
Advertisements

Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
Optimization Problems in Optical Networks. Wavelength Division Multiplexing (WDM) Directed: Symmetric: Undirected: Optic Fiber.
Optical networks: Basics of WDM
1 Traffic Engineering (TE). 2 Network Congestion Causes of congestion –Lack of network resources –Uneven distribution of traffic caused by current dynamic.
Optimization Problems in Optical Networks. Wavelength Division Multiplexing (WDM) Directed: Symmetric: Optic Fiber.
Protection Mechanisms for Optical WDM Networks based on Wavelength Converter Multiplexing and Backup Path Relocation Techniques Presented by: Brian V.
Lecture: 4 WDM Networks Design & Operation
A Waveband Switching Architecture and Algorithm for Dynamic Traffic IEEE Communications Letters, Vol.7, No.8, August 2003 Xiaojun Cao, Vishal Anand, Chunming.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
Apoorv Nayak Prathyusha Dasari Traffic Grooming. Agenda  Improved approaches for cost effective traffic grooming in WDM ring networks  Motivation 
Traffic Grooming in WDM Ring Networks Presented by: Eshcar Hilel.
1 Wide-Sense Nonblocking Multicast in a Class of Regular Optical Networks From: C. Zhou and Y. Yang, IEEE Transactions on communications, vol. 50, No.
AGH University of Science and Technology NOBEL WP2 Meeting, Berlin May QoS/GoS Routing in Optical Networks.
A Review of Traffic Grooming in WDM Optical Networks: Architectures and Challenges* Keyao Zhu and Biswanath Mukherjee.
9/22/2003Kevin Su Traffic Grooming in WDM Networks Kevin Su University of Texas at San Antonio.
Dynamic Routing and Wavelength Assignment Scheme for Protection against Node Failure Ying Wang1, Tee Hiang Cheng1,2 and Biswanath Mukherjee3 1School of.
Quantitative Comparison of End-to-End Availability of Service Paths in Ring and Mesh- Restorable Networks Matthieu Clouqueur, Wayne D. Grover
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
ASWP – Ad-hoc Routing with Interference Consideration June 28, 2005.
Traffic Grooming in WDM Networks Wang Yao. WDM Technology increases the transmission capacity of optical fibers allows simultaneously transmission of.
Performance Analysis of Wavelength-Routed Optical Networks with Connection Request Retrials Fei Xue+, S. J. Ben Yoo+, Hiroyuki Yokoyama*, and Yukio Horiuchi*
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
ECS H. Zang and B. Mukherjee, UC Davis 1 Routing and Wavelength Assignment for Wavelength-Routed WDM Networks  Combined routing and wavelength.
Introduction to Protection & Restoration for OBS Copyright, 2000, SUNY, Univ. at Buffalo Presented by Zaoyang Guo & Dahai Xu.
2015/6/291 Fault Management in IP- Over-WDM Networks: WDM Protection Versus IP Restoration Adviser: Ho-Ting Wu Presenter: Ze-Yang Guo.
1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Advances in Optical Network Design with p-Cycles: Joint optimization and pre-selection of candidate p-cycles (work in progress) Wayne D. Grover, John Doucette.
1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Control and Traffic Management Paper: Banerjee et al.: ” Generalized multiprotocol label switching: an overview of signaling enhancements and recovery.
Performance and Power Efficient On-Chip Communication Using Adaptive Virtual Point-to-Point Connections M. Modarressi, H. Sarbazi-Azad, and A. Tavakkol.
1 Distributed Computing Optical networks: switching cost and traffic grooming Shmuel Zaks ©
The Research of Applying Random Early Blocking strategy to Dynamic Lightpath Routing National Yunlin University of Science & Technology.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Integrated Dynamic IP and Wavelength Routing in IP over WDM Networks Murali Kodialam and T. V. Lakshman Bell Laboratories Lucent Technologies IEEE INFOCOM.
Helsinki 19 May 2006 Fine Protection of Data-Paths in Multi-Layer Networks Based on the GMPLS paradigm G.Oriolo, Università Tor Vergata, Roma joint work.
1 Protection Mechanisms for Optical WDM Networks based on Wavelength Converter Multiplexing and Backup Path Relocation Techniques Sunil Gowda and Krishna.
9 1 SIT  Today, there is a general consensus that in near future wide area networks (WAN)(such as, a nation wide backbone network) will be based on.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
November 18, Traffic Grooming in Optical WDM Networks Presented by : Md. Shamsul Wazed University of Windsor.
Algorithms for Allocating Wavelength Converters in All-Optical Networks Authors: Goaxi Xiao and Yiu-Wing Leung Presented by: Douglas L. Potts CEG 790 Summer.
Wavelength Assignment in Waveband Switching Networks with Wavelength Conversion Xiaojun Cao; Chunming Qiao; Anand, V. Jikai LI GLOBECOM '04. IEEE Volume.
1 Optical Burst Switching (OBS). 2 Optical Internet IP runs over an all-optical WDM layer –OXCs interconnected by fiber links –IP routers attached to.
SMUCSE 8344 Protection & Restoration of Optical Networks.
Load Balancing in Protection Switching of Optical Networks Hongkyu Jeong, Gyu-Myoung Lee Information and Communications Univ. (ICU) Student ID : ,
Lightpath Restoration in WDM Optical Networks A Survey in IEEE Network Magazine Nov/Dec 2000.
1 Traffic Engineering in Multi-Granularity, Heterogeneous, WDM Optical Mesh Networks Through Dynamic Traffic Grooming Keyao Zhu, Hongyue Zhu, and Biswanath.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
1 Distributed Computing Optical networks: switching cost and traffic grooming Shmuel Zaks ©
CSC Survivability Anuj Dewangan Parinda Gandhi.
Two-layer Restoration Scheme for IP over Optical Networks with MPLS Jia Ke, L. Mason, Q. Yang ICIS, School of EEE, Nanyang Technological University
Survivable Traffic Grooming with Differentiated End-to-End Availability Guarantees in WDM Mesh Networks Proceedings of the 13th IEEE Workshop on Local.
Ahmed Musa, John Medrano, Virgillio Gonzalez, Cecil Thomas University of Texas at El Paso Circuit Establishment in a Hybrid Optical-CDMA and WDM All- Optical.
1 P-Cycles. 2 What’s a p-Cycle? A preconfigured cycle formed out of the spare capacities in the network –A p-cycle uses one unit of spare capacity on.
1 Why Optical Layer Protection? Optical layer provides lightpath services to its client layers (e.g., SONET, IP, ATM) Protection mechanisms exist in the.
Traffic grooming in WDM Networks Dynamic Traffic Grooming in WDM Mesh Networks Using a Novel Graph Model by Hongyue Zhu, Hui Zang, Keyao Zhu, and Biswanath.
1 Dynamic RWA Connection requests arrive sequentially. Setup a lightpath when a connection request arrives and teardown the lightpath when a connection.
QoS-specified Traffic Grooming Algorithm in WDM Mesh Networks Bing Xiang, Hongfang Yu, Sheng Wang, Lemin Li Communications, Circuits and Systems, 2004.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
Optimal Design of Survivable Mesh Networks Based on Line Switched WDM Self-Healing Rings IEEE/ACM Transactions on Networking, Vol 11, NO.3, June,2003 Andrea.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
1 Minimum Interference Algorithm for Integrated Topology Control and Routing in Wireless Optical Backbone Networks Fangting Sun Mark Shayman University.
Survivability in IP over WDM networks YINGHUA YE and SUDHIR DIXIT Nokia Research Center, Burlington, Massachusetts.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Page 1 Page 1 Dynamic Provisioning and Survivability in Hybrid Circuit/Packet Optical Networks DoE New Projects Kick-Off Meeting Chicago, Sept
Isabella Cerutti, Andrea Fumagalli, Sonal Sheth
Distributed Control Plane
Network Survivability
Optical Layer Protection Schemes
The University of Adelaide, School of Computer Science
Presentation transcript:

10/6/2003Kevin Su Traffic Grooming for Survivable WDM Networks – Shared Protection Kevin Su University of Texas at San Antonio

10/6/2003Kevin Su Outline Introduction Motivation System Model –Grooming Node Architecture –Network Model Proposed Schemes –Protection-at-lightpath (PAL) level –Mixed protection-at-connection (MPAC) level –Separated protection-at-connection (SPAC) level Heuristic Algorithms Performance Evaluation

10/6/2003Kevin Su Introduction WDM: stands for wavelength division multiplexing, it is a technology that divides the bandwidth of an optical fiber into many non-overlapping wavelengths, so that multiple communication channels can operate simultaneously on different wavelengths. –Increases the transmission capacity of optical fibers. –Allows simultaneously transmission of multiple wavelengths within a single fiber. –Up to 320 wavelengths per fiber; per wavelength, 10Gb/s, STS-192 (OC-192), today; expected to grow to 40Gb/s, STS-768(OC-768), soon.

10/6/2003Kevin Su Introduction Traffic Grooming: refers to problem of efficiently packing low- speed connections onto high-capacity lightpaths to better utilize network resourses. –The bandwidth requirement of a typical connection request is between STS-1 (51.84 Mb/s) and STS-192(full wavelength) Protection: is a proactive procedure in which spare capacity is reserved during connection setup. –Working path: a path that carries traffic during normal operation –Backup path: a path over which the connection is rerouted when a working path fails –Single Failure (single-fiber failure, single-node failure) –Dedicated Protection –Shared Protection

10/6/2003Kevin Su Introduction

10/6/2003Kevin Su Motivation Survivable Traffic Grooming –Efficiently utilize the network resources (traffic grooming) –A failure of a network element can cause the failure of several lightpaths, thereby leading to large data and revenue loss (protection) Static Case Dynamic Case

10/6/2003Kevin Su Grooming Node Architecture

10/6/2003Kevin Su Network Model A network is represented as a weighted, directed graph G=(V, E, C, λ, P) –V: set of nodes –E: set of unidirectional fibers (referred to links) –C: the cost function for each link –λ: the number of wavelengths on each link –P: number of grooming ports at each node Connection request is represented as a quadruple –s: source node –d: destination node –B: bandwidth requirement – : holding time

10/6/2003Kevin Su Proposed Schemes - PAL Protection-at-lightpath (PAL) level provides end-to-end protection w.r.t. lightpath. Under PAL, a connection is routed through a sequence of protected lightpath, or p-lightpath. A p-lightpath has a lightpath as working path and link-disjoint path as backup path Working path consumes a grooming-add port at the source node and a grooming-drop port at the destination node Backup path doesn’t consume any grooming port and wavelengths along a backup path are only reserved When working path fails, backup path is set up as a lightpath by utilizing the grooming ports previously used by the working path Two p-lightpaths can share wavelengths along common backup links if their working paths are link-disjoint.

10/6/2003Kevin Su Proposed Schemes - PAL Initial network configuration Edge represents bidirectional fiber, each fiber has 2 wavelengths Wavelength capacity STS-192, every node has 3 grooming ports c1 ; c2 ; c3

10/6/2003Kevin Su Proposed Schemes - PAL After provisioning c1 c1 ; c2 ; c3

10/6/2003Kevin Su Proposed Schemes - PAL After provisioning c2 c1 ; c2 ; c3

10/6/2003Kevin Su Proposed Schemes - PAL After provisioning c3 c1 ; c2 ; c3

10/6/2003Kevin Su Proposed Schemes – MPAC Mixed Protection-at-Connection (MPAC) level provides end-to-end protection w.r.t. connection. Under MPAC, a connection is routed via link-disjoint working path and backup path, each of which traverses a sequence of lightpaths. A lightpath traversed by a working path utilizes a portion of its capacity to carry traffic during normal operation A lightpath traversed by a backup path reserves part of its capacity for that backup path “Mixed” means that capacity of one wavelength can be utilized by both working paths and backup paths.

10/6/2003Kevin Su Proposed Schemes - MPAC After provisioning c1 c1 ; c2 ; c3

10/6/2003Kevin Su Proposed Schemes - MPAC After provisioning c2 c1 ; c2 ; c3

10/6/2003Kevin Su Proposed Schemes - MPAC After provisioning c3 c1 ; c2 ; c3

10/6/2003Kevin Su Proposed Schemes – SPAC Separated Protection-at-Connection (MPAC) level provides end-to- end protection w.r.t. connection. Under SPAL, a connection is routed via link-disjoint working path and backup path. A working path traverses a sequence of lightpath. A backup path traverses a sequence of links, each of which has judiciously reserved a number of wavelengths as backup resourses “Separated” means that the capacity of a wavelength can be utilized by either working paths or backup paths, but not both.

10/6/2003Kevin Su Proposed Schemes - SPAC After provisioning c1 c1 ; c2 ; c3

10/6/2003Kevin Su Proposed Schemes - SPAC After provisioning c2 c1 ; c2 ; c3

10/6/2003Kevin Su Proposed Schemes - SPAC After provisioning c3 c1 ; c2 ; c3

10/6/2003Kevin Su Proposed Schemes

10/6/2003Kevin Su Heuristic Algorithm It is NP-complete to provision a connection request with shared protection. The Author proposed heuristic for MPAC, SPAC, PAL MPAC –Backup-sharing measuring Every lightpath is associated with a conflict set to identify the sharing potential between paths. conflict set for lightpath can be represented as an integer set { } where represents the amount of traffic that will be rerouted on lightpath when link e fails. The amount of backup capacity reserved on lightpath is thus –Route computation Enumerates K candidate working paths For each candidate working path, computes a disjoint minimal-cost path as backup path based on some cost function Selects the path pair of minimal cost

10/6/2003Kevin Su Heuristic Algorithm SPAC (the same as MPAC except) –Different backup-sharing measurement –Different cost function in route computation PAL –Different backup-sharing measurement –Route computation Extend a stand shortest-path algorithm such that every hop along the resultant shortest path corresponds to a p-lightpath, which can be either an exisiting p- lightpath or a new p-lightpath consisting of fresh wavelength links and free grooming ports

10/6/2003Kevin Su Performance Evaluation Connection-arrival process is Poisson process Connection-holding time follows a negative exponential distribution Capacity of wavelength is STS-192 # of connection requests follows the distribution STS-1: STS-3: STS-12: STS-48: STS-192 = 300: 20: 6: 4 :1 Load (in Erlang) is defined as connection-arrival rate times average holding time times a connection’s average bandwidth normalized in the unit of STS-192 Number of grooming ports is set as # of wavelengths times its nodal degree times a scalar ( implies that any incoming wavelength to the W-Fabric can be dropped to the G-Fabric) The number of alternate paths K = 2 Measurement metrics –Bandwidth-blocking Ratio –Resource-Efficiency Ratio

10/6/2003Kevin Su Network Topology 24-node example network topology

10/6/2003Kevin Su Performance Evaluation

10/6/2003Kevin Su Performance Evaluation

10/6/2003Kevin Su Performance Evaluation BBR versus network offered load with k =1,2 and 3

10/6/2003Kevin Su Conclusion and Future Work Investigate the survivable traffic-grooming problem in dynamic case –PAL, MPAC, SPAC –Findings: It is beneficial to groom working paths and backup paths separately as in PAL and SPAC Separately protecting each individual connection yields the best performance when the number of ports is suffcient Protecting each specific lightpath achieves the best performance when the # of grooming ports is moderate or small Future work –Considering the residual connection holding time

10/6/2003Kevin Su References C. Ou, K. Zhu, H. Zang, L. H. Sahasrabuddhe, and B. Mukherjee. “Traffic Grooming for Survivable WDM Networks – Shared Protection”. Accepted to IEEE Journal of Selected Area in Communication H. Zhu, H.Zang, K. Zhu, and B. Mukherjee, “A novel, generic graph model for traffic grooming in heterogeneous WDM mesh networks” IEEE/ACM Trans. Neworking, vol.11 pp , Apr. 2003