P-Cycle Based Protection Schemes for Multi-Domain Networks

Size: px
Start display at page:

Download "P-Cycle Based Protection Schemes for Multi-Domain Networks"

Transcription

1 P-Cycle Based Protection Schemes for Multi-Domain Networks Arnold Farkas, Janos Szigeti, Tibor Cinklert High-Speed Networks Laboratory Department of Telecommunications and Media Informatics Budapest University of Technology and Economics Magyar tudosok krt. 2., H Budapest, Hungary Tel: +(36) Fax: +(36) Abstract- In multi-domain networks, the domains are typically run by different operators, which do not want to share all the internal information with competitors. Furthermore, broadcasting all the internal informations would unnecessarily overload the network with state messages. We decompose the multi-domain resilience problem into two sub-problems, namely the higher level inter-domain protection, and the lower level intra-domain protection. Building p-cycles at the higher level is accomplished by certain tasks at the lower level including straddling link connection, capacity allocation, and path selection. We show that p-cycles offer high availability and acceptable resource usage without the knowledge of paths that makes p- cycles very good candidate for protecting inter-domain traffic. Index Terms-p-cycle, multi-domain networks, resilience, restoration, protection. I. INTRODUCTION In optical transport networks, there is a huge amount of traffic that belongs to different service classes and has typically different availability requirements as well. For enhancing availability of the services, several failure handling methods exist, that vary in their spare resource requirements, re-routing time, and some other properties [1]. The resilience mechanism which uses pre-calculated backup paths and pre-assigned resources, that effects shorter re-routing time, is defined as protection. The mechanism that calculates and sets up backup paths based on topology information update after a failure has taken place is defined as restoration. Resilience has high resource efficiency, however, it is typically slower that protection and often it can not guarantee full restorability of the affected traffic. The resilience methods can be grouped by their scope: a method can be path-, segment- (sub-network) or link- (span)oriented, and the protections can be sorted further according to their accessibility: if only one traffic has the right to use the resources reserved for protection, then that This work has been supported by the EC within the FP6 IP NOBEL ( framework ttibor Cinkler has been supported by the OTKA Postdoctoral Research Grant D42211 and by the Janos Bolyai Postdoctoral Research Fund protection is dedicated, otherwise, if multiple traffic instances may alternatively use the resources, is referred to as shared. The existing traditional failure handling methods, such as 1+1 automatic protection switching (1+1 APS), shared backup path protection (SBPP), BLSR ring, p-cycles, mesh path restoration and mesh link restoration [2] are not feasible in multi-domain networks since they require detailed information about the inner topology of the domains, which is inaccessible. Furthermore, for the shared protection schemes not only the topology and the capacities are required, but the route of the working and of the protection paths for all demands as well. A. p-cycles The p-cycle combines the advantages of the ring and of the mesh: it realizes ring-like recovery speed while retaining the capacity efficiency of the mesh-based methods. The p-cycle is a cyclic, pre-calculated, pre-assigned, closed path with a certain amount of allocated spare capacity [3]. It provides protection for any link that has both end nodes on the cycle as either an on-cycle link or a straddling link. Similarly to the BLSR rings, if an on-cycle link fails, then it is replaced by a protection path along the remaining cycle. In contrast to the BLSR rings, however, the p-cycle is also able to protect straddling links that results in higher capacity efficiency than for the ring of the same size [4]. In the case of a straddling link failure the p-cycle can simultaneously protect two units of working capacity on the straddling link by providing two alternative backup paths around the p-cycle. P-cycle is a shared link protection method and therefore it has higher capacity efficiency than dedicated link protection: a p-cycle of one capacity unit can protect one unit of working capacity of any each on-cycle link if it fails or two units on capacity of any straddling link that fails. Generally, the capacity efficiency of p-cycle based schemes is much higher than that of 1+1 APS, but does not match that of SBPP [5]. Since it is a link protection method, it has a shorter fault detection and re-routing time than path oriented methods. The backup path is pre-calculated and pre-assigned, and therefore it is faster than restorations that must signal and configure switches along the paths at the time of failure occurence /05/$ IEEE 223

2 Applying p-cycles in a network does not restrict the working paths in any way, allowing them to choose the best, i.e. the most reliable routes through the network. The actual working efficiency of a p-cycle can be estimated by Xp,i = E: Xp,i E (p)= ViEL,where whr (1) I 2 if i is a straddling link within cycle p with unprotected working capacity of at least 2 units, I if i is a straddling link within cycle p with unprotected capacity of 1 unit or an on-cycle link with unprotected capacity of at least 1 units, 0 otherwise. L is denoting the set of links in the network, and C is the resource cost of the p-cycle. B. Multi-Domain Network Model In multi-domain networks, the domains are typically operated by competitor providers, who are reluctant to share information with their competitors. Furthermore, broadcasting every minor change in the network state would unnecessarily overload the network with state messages, causing problem in scalability. Applying a network model with hierarchical constitution is an obvious solution for scalability and since different informations are available at the different levels, the hiding of the topology also succeeds. The model we use consists of two levels. At the higher level only the border nodes and inter-domain links are known. The domains are connected, therefore, at the higher level, virtual links between the border nodes form the inner topology. At the lower level, the internal informations of the separated domains are known. An example for such a multi-domain network is shown in Figure 1. II. DEFINING p-cycles FOR THE HIGHER LEVEL The knowledge of the whole topology, available capacities on each link and traffic demands is required for applying conventional shared protection schemes which are not accessible at the higher level. At the lower level only internal informations are available. Therefore a possible solution for multi-domain shared link protection scheme is to handle the failures at the higher level (for the inter-domain links) and at the lower level (for the intra-domain links) separately. At the lower level traditional protection schemes can be applied as intra-domain protection, but for inter-domain link protection a novel method is required. Our goal is to define higher level p-cycles (without the knowledge of the internal structures of the domains) that are capable of protecting inter-domain links similarly to conventional p-cycles. There are three steps of forming a higher level p-cycle: Fig. 1. Multi-domain network model Assign inter-domain links as on-cycle or straddling interdomain links. Define the required logical internal connections for the higher level p-cycle. Realize the required logical internal connections. The first two steps are tasks of the higher level, the last one is the task of the lower level. A. Assigning Inter-Domain Links The first task is to handle domains as simple nodes at the higher level and compose p-cycles in the transformed network in a conventional way. This means defining on the one hand inter-domain links that will be on-cycle links within the higher level p-cycle an on the other hand inter-domain links that the p- cycle can protect as a straddling links (with the proper internal connections). At the lower level, a domain is notified which border nodes are connected to on-cycle inter-domain links within the higher level p-cycle (on-cycle border nodes - cbns), and which border nodes are connected to straddling inter-domain links (straddling border nodes - sbns). Within an affected domain, a higher level p-cycle can have no more than two cbns since only simple cycles can be composed in a conventional way. The limit for the number of sbns is the number of nodes in the domain. Of course, it can occur that within a domain the two cbns of the higher level p- cycle are identical and/or an sbn is a cbn as well, furthermore, there is no sbn. B. Define Required Logical Internal Connections Since the internal structure of the domains is hidden from the higher level, that level can only assign the required logical connections over affected domains to the considered higher level p-cycle. 224

3 Those border nodes that are either on-cycle cbn or straddling sbn must be interconnected suitably in order that the higher level p-cycle can handle failures analogously to a conventional p-cycle. As an example, consider the case when a straddling interdomain link fails. Then those two domains are responsible for protection switching where its two end nodes (sbns) are. For this purpose, two backup path within both affected domains must exist. These connect sbn to the two cbns. The other case is when an on-cycle inter-domain link fails. Then a backup path must be assigned between the two cbns. Figure 2(a) shows an example for an on-cycle inter-domain link failure, and an example is depicted in Figure 2(b) for a straddling inter-domain link failure. (a) Logical internal connections / / (b) Most Reliable (c) Least Cost (d) Ring Based Fig. 2. (a) On-cycle inter-domain link failure (b) Straddling inter-domain link failure / Failure handling with higher level p-cycle Figure 3(a) shows the required internal connections of a domain (gray shape) that has five border nodes. The upper three are sbns, while the bottom two are cbns. The external dashed lines represent straddling inter-domain links of the higher level p-cycle. C. Realizing Logical Internal Connections To configure the real internal connections is the objective of the lower level, since the required internal informations are accessible only at this level. At the lower level, within the domains there are seven paths that correspond to the seven connections (logical links) between the border nodes of Figure 3(a). These paths are not necessarily disjoint. Assuming that only a single straddling inter-domain link fails at time we can share resources allocated for protecting straddling links. This reduces the cost significantly. Note, that a unit of capacity on the p-cycle can protect Fig. 3. Internal connections two units of capacity of straddling links. Therefore the set of links must be defined, where one unit of spare capacity is not enough, since they are the extensions of the straddling inter-domain links. We have developed different strategies, namely the Most Reliable, the Least Cost and the Ring Based one for realizing the logical connections. 1) Most Reliable: Within a domain the two cbns should be interconnected with the most reliable path. Each sbn should also be interconnected with the cbns via the most reliable paths. On the common segments of the two cbn - sbn paths two capacity units must be allocated. If the two cbns are identical, i.e., the higher level p-cycle does not traverse, just "touches" the domain, then two units of capacity must be allocated on each link in the internal connection, since the whole structure corresponds to the inner extensions of the straddling inter-domain links. This strategy guarantees that, in the case of a failure, the used backup path is the most reliable one, i.e. it provides the best availability. Figure 3(b) shows an example of realizing logical internal connections with the Most Reliable strategy. Within the domain, the thicker links represent the links, where one unit of capacity should be allocated for the higher level p-cycle, while the dashed links represent the part of the internal connection where two units of capacity are needed. 2) Least Cost: The first step is to determine which sbn is the closes to one of the cbns, i.e., which sbn requires the least resources to connect to one of the cbns. That sbn should be connected to the closest cbn with the path that requires the least resources, since that segment cannot be shortened further (i.e., cannot be made cheaper). The next step is to connect the closest sbn among the remaining sbns to the connected structure via the shortest path, thereby that sbn is connected with the minimal resource requirement. This step must be 225

4 repeated until no sbn remains. Finally, connect in the same way the remaining cbn, if any. In this structure, two units of capacity must be allocated in each used link except on the links of the shortest route between the two cbns where one unit is enough. With this greedy strategy the spare-capacity requirement of the the internal connection is minimized. An example for realizing the logical internal connection with the Least Cost strategy is shown in Figure 3(c). 3) Ring Based: To realize the logical internal connections with the Ring Based strategy the shortest ring is used that contains all the cbns and sbns in the domain. Only one unit of capacity must be assigned on each link. In the case when a connected straddling inter-domain link fails, the traffic flows between the two cbns and the affected sbn on the two alternative paths around the ring. In other case of failure the traffic flows between the two cbns on the shortest path along the ring. An example for a Ring-Based realization is depicted in Figure 3(d). The two previous strategies can be applied in any connected graph including trees where a Ring-Based internal connection cannot be established, therefore we do not suggest to use this method. To realize the same logical internal connection in the same domain by the three different strategies require different amount of spare capacity: Most Reliable needs the most (14), Least Cost requires the least (9) and Ring Based is in the middle with the requirement of 12 units of spare capacity. The actual working efficiency of a higher level p-cycle can also be estimated by Equation (1). III. REFERENCE METHOD To analyze the performance of the proposed protection schemes we have applied different kinds of protection strategies. As the reference protection method we have applied the conventional dedicated (end-to-end) path protection, since it is a common scheme. We have compared its performance to the proposed multi-domain oriented methods to analyze the advantages and disadvantages of dividing the network into domains. The generated traffics are assigned with dedicated path protection, where the backup path is disjoint from the working path, and the failure handling is not separated to lower and higher level mechanisms. Full information of topology is required for this protection scheme, which is generally inaccessible in a multi-domain network. IV. PROPOSED METHODS In a multi-domain network, the internal structure of the domains is concealed at the higher level, and therefore the link protection mechanisms should be differentiated to interdomain and intra-domain failure handling. Applying protection schemes at the higher level requires spare capacities for their internal connections at the lower level, but can handle only the failures of the inter-domain links. Furthermore, at the lower-level additional spare capacities are required for intra-domain protections. Therefore the multidomain oriented schemes require more spare capacity to protect the same traffics than the conventional methods do. Previous works have shown that p-cycles have high capacity-efficiency [5] compared to other protection schemes and offer high availability that makes them very good candidate for protecting inter-domain traffic. A. Enumerating p-cycles In order to assign and allocate p-cycles a suitable set of candidate p-cycles must be enumerated. Since the Grow and Expand algorithms [6] do not consider that replacing a link to a disjoint route may restrict the replacement of another link in the p-cycle, therefore the output of the algorithm depends on the sequence of the on-cycle links, which results in a smaller set of p-cycles. Figure 4 shows an example where, starting from the same link of the same primary p-cycle, the result of the Grow algorithm depends on the on-cycle link sequence (clockwise or counterclockwise). Fig. 4. Sequence dependency of the Grow algorithm This fact is not a problem in the case of a dense network topology containing a lot of links and nodes, since the difference in the spare resource requirement to the optimal set of capacitated p-cycles is less significant [6], but in the case of less denser topology the difference is not negligible. For this reason, we suggest the ExhaustiveGrow algorithm based on Grow for less denser networks. Like its predecessor, this algorithm also requires a primary set of p-cycles that can be generated by the Straddling Link Algorithm (SLA) [8], for instance. Unlike the Grow algorithm this considers all the possible sequences of the on-cycle links which effects a larger set of p-cycles. The algorithm can be represented in pseudocode as follows: ExhaustiveGrow( Cycleset) For each cycle p in Cycleset Mark all links and nodes on cycle p For each link i in cycle p { Dijkstra(i, unmarked links/nodes) If Dijkstra() returns a route r Let cycle p' = p Add route r to cycle p' Remove link i from cycle p' Add cycle p' to Cycleset } } } I Dijkstra() Find the shortest route r between the 226

5 } end nodes of i using the unmarked links and nodes only Return route r We have used the aforementioned ExhaustiveGrow algorithm to assign the on-cycle inter-domain links of higher level p- cycles, and have realized the internal connections with Least Cost and Most Reliable strategy either. To enumerate the set of candidate internal p-cycles at the lower level we have used the ExhaustiveGrow or Grow algorithm depending on the size and the density of the domain. B. Multi-Domain Oriented Schemes Since the p-cycle allocation and assignment methods based on ILP [7] [8] [9] are difficult and time-consuming, we applied the CIDA algorithm [6] to allocate and assign capacitated p- cycles at both levels. The applied protection schemes: CIDAO - we have applied only higher level p-cycles, there was no intra-domain protection. CIDA - the higher level CIDAO protection scheme is combined with p-cycles at the lower level. CIDED - at the higher level we have used CIDAO protection scheme, and at the lower level the intra-domain protections were dedicated segment protections. The realizations of logical internal connections for CIDAO, CIDA and CIDED strategies can be either Most Reliable (M) or Least Cost (L) strategy, depending on whether the higher availability or the minimized allocated resource is primary. V. EVALUATING CRITERIA The performance of the applied protection scheme can be evaluated by many properties such as availability, reliability, traffic loss, traffic delay etc., we have chosen the full capacity requirement, the availability and the relative thrift that considers both of them. A. Capacity Requirement Since in the real networks the available capacity is not infinite, however, applying a protection scheme enhances the availability of the traffics, it is also important how many allocated resources are needed to provide it, therefore the first property is the extra-capacity requirement, i.e. the redundancy. B. Availability Since the failure probability of a real optical link is of the order of 10 6, a long simulation time is required for an appropriate simulation, therefore we have estimated the availabilities. The evaluation of the availability needs extensive calculations being in the range of 0(22N), so we have applied a worst-case based estimation which is suitably fast, and has an acceptable accuracy. To estimate the availability of a segment of traffic t in domain d with shared link protections, we have used the following formula: As(t,d) =JJpi ±+ (1 ler ler where r is the set of links in the affected segment of the route, pl denotes the probability of link 1 is operational, B is denoting the set of links in the backup path for link 1, and S is the set of links that the protection is also assigned for. In the case of applying dedicated segment protection the formula for estimating the availability of the inner segment can be expressed as: As(t,d) HPI + (1 HP) fpi ler ler ieb The availability of the whole traffic can be estimated with two different formulae depending on applying dedicated path protection or combined inter-domain and intra-domain protection schemes. When using dedicated path protection the formula for estimating the availability of a traffic is the following: A(t)Ipi +R(1]p B)pi, 1ER 1ER ie:b where R is denoting the set of links in the whole route and B is the set of links in the backup path for the route. In the cases of combined inter-domain and intra-domain resilience mechanisms the availability can be estimated by the following formula: A(t) Pi As(t, i) +,(1 Ppi) pi, (5) IEI ied IEI ierubus\{i} where I denotes the set of inter-domain links in the whole route, D is the set of domains used by the traffic. This estimation is worst-case based, because it allows only one failure in each internal segment or one in the external segment of the path, and in case of shared link protection all the other links that can be protected with the same protection must be operational, otherwise the traffic fails. In fact a traffic can still operate in the case of a multiple failure if they are handled with independent protections and/or the failed link of the traffic has the priority to use the shared protection. Although it is a worst-case based estimation formula, it gives a low-bound with acceptable accuracy since the probability of a traffic is operational in the case of a multiple failure is very low, and therefore it causes a little difference in availability when considering all possible states. C. Relative Thrift The relative thrift of protection method i can be defined as: 1 Ai 1 Ao (6) ri + 1' where Ai is the average availability that the protection offers, Ao is the average availability of the unprotected traffics, and ri is the redundancy of the applied protection scheme. Pi) IH. Pi, (2) ierubus\{l} (3) (4) 227

6 VI. NUMERICAL RESULTS We have performed tests in two multi-domain networks. The first is a hypothetical, randomly generated network where all the links have enough free capacity to apply any kind of resilience mechanism without any restrictions. That network is named TNet that is depicted in Figure 5(a). And we have performed several tests in the model of the European core network - El-Net [10], which is shown in Figure 5(b). 50% of the links of the route of traffics is protected for single link failure in the TNet is shown in Table I. The multi-domain oriented methods handle the failures of the two levels separately, therefore allocated resources are required at the lower level for the intra-domain protections, and for the internal connections of the inter-domain protections, that results in higher capacity requirement than the conventional methods. TABLE I CAPACITY REQUIREMENTS OF TNet Prot. scheme Cap. req. Redundancy >0% >50% 100% Unprotected % 0% 0% 0% I % 98.2% 98.2% 98.2% CIDAO-L % 84.3% 3.1% 0.3% CIDAO-M % 84.3% 3.1% 0.3% CIDA-L % 100% 100% 100% CIDA-M % 100% 100% 100% CIDED-L % 100% 100% 100% CIDED-M % 100% 100% 100% (a) TNet Fig. 5. (b) El-Net Tested networks The probability of link failure in the networks can be calculated as: q = l qo, (7) where 1 is denoting the length of the link in km, and qo denotes the link failure coefficient (LFC) with a default empirical value of [ 1 ]. If the weight of a link is set as: C = logi q = logp (8) then the shortest route is the most reliable one as well. Since q C (0; 1), its logarithm is definitely negative, therefore the weight must be positive, and Dijkstra's algorithm can be applied to find the most reliable routes, and it is unnecessary to use the Belmann-Ford algorithm as opposed to [11]. By altering the value of LFC, we have examined the alteration of the availability, which is equivalent to analyze the behaviour of a metropolitan, national, continental, and worldwide network with the same topology. We have generated randomly 1000 traffic demands of average bandwidth requirement of 5 units to both networks. Since the traffics are generated at random, the distribution of the capacity requirement on each link is not uniform. A. Capacity Requirement The full capacity requirement of the traffics and the applied protection schemes, and the rate where 100% and at least The capacity requirements of the El-Net is shown in Table II. Although applying traditional dedicated path protection would require less spare capacity, in the case of a realistic network such as this network, where a domain may have only one border node and/or has a tree-structure, the two disjoint path do not definitely exist, that makes dedicated path and segment protection infeasible. This explains why only 7.4% of the traffic demands could be protected with end-to-end protection. On the other hand, in a multi-domain network, where the internal structures are not visible at the higher level, the conventional link protection schemes are not usable. Therefore a multi-domain oriented protection scheme with higher capacity requirement must be applied. TABLE 11 CAPACITY REQUIREMENTS OF El-Net Prot. scheme Cap. req. Redundancy >0% >50% 100% Unprotected % 0% 0% % 7.4% 7.4% 7.4% CIDAO-L % 74.7% 0.9% 0% CIDAO-M % 74.7% 0.9% 0% CIDA-L % 99.4% 95.8% 21.6% CIDA-M % 99.4% 95.8% 22.5% CIDED-L % 95.3% 64.6% 20.1% CIDED-M % 95.3% 65.7% 20.9% B. Availability The relation between LFC and the estimated average availabilities of the traffics of the El-Net is depicted in Figure 6. The X axis indicates the altering LFC and on the Y axis is the average availability of the traffics. Since in the El- Net only a small portion of traffic could have been protected with dedicated path protection, the improvement of average availability is irrelevant. At smaller LFC values, the CIDA- M strategy resulted the highest average availability, only at greater LFC values was it better to apply CIDED-M. For 228

7 realistic optical links, the link failure coefficient is of the order of 10 6, therefore it can be concluded that applying CIDA-M resulted in the highest average availability in this network. ma Average availabilities figure the rate of traffics is shown on the Y axis where the availability was at least that is indicated on the X axis. It can be observed that using CIDA-M resulted in the highest availabilities, and therefore applying p-cycles at both levels were the most efficient. As it can be seen in this figure either, applying dedicated path protection has not improved the availabilities significantly. Tail behaviours CIDA-M-- CIDA-L---' CIDED-L --A-- CIDAO-M - CIDA0-L Unprotercted - - _ - 1 e-06 1 e-05 LFC E E- Fig. 6. Average estimated availabilities in the El-Net The estimated average availabilities of the traffics of the TNet are shown in Figure 7. Applying dedicated path protection requires less spare capacity than the other methods, at the same time, only the CIDED-type strategies resulted in higher average availabilities. In the latter case, the inter-domain protection is combined with dedicated segment protection at the lower level. Because of the inner topology, the internal segments are very short, sometimes contain only one link, therefore sometimes the applied dedicated segment protection is dedicated link protection, which offers higher availability than a shared link protection scheme does. The CIDA-M and CIDA-L strategies were less efficient, because the backup paths for the inter-domain links were almost as long as the backup paths of the dedicated path protection, and in case of multiple failures -multiple long backup paths are required to be operational. Average availabilities Fig. 8. Availability > X Tail behaviours in El-Net Figure 9 shows the tail behaviour of availabilities in TNet at the link failure coefficient of [ 1 ]. The curves of the reference and CIDAO strategies are staged because according to the size of the network, a lot of traffic have used the same link, and since there has been no protection, or only applied at the higher level, in the case of failure of one of the unprotected links a lot of traffic has been interrupted.the CIDED-M strategy resulted the highest availabilities, that can also be explained by the dedicated short segment or link protection Tail behaviours E I CIDED-M _--, CiDED-L --A-: 1 + ti-.-',' CIDA-M -U- CIDA-L -y CIDA0-M *-: CIDAO-L - ' Unprotected ,...,.. 1e-06 I e-05 LFC Fig. 7. Average estimated availabilities in TNet Tihe tail behaviour of the availabilities in El-Net is depicted in Figure 8 at the LFC value of [ ']. In this 200 O Availability > X Fig. 9. Tail behaviours in TNet C. Relative Thrift The relative thrift of the applied protections schemes in the El-Net is depicted in Figure 10. The Y axis indicates the 229

8 relative thrift while the LFC, that is indicated on the X axis, is altering. The CIDA-type strategies have the highest relative thrift in this network. Applying dedicated path protection resulted so low thrift that the thrift of the unprotected case was even higher. The CIDAO methods have the two lowest thrift, since both of them protect only against the failures of the inter-domain links, but require allocated resources inside the domains.. r- a: 2 Relative thrift ofthe protection schemes -.~~~-_-_- - CIDA-M - CIDA-L - CIDED-L - -v CIDED-M - CIDED-L - - Unprotected 1 +1 CIDAO-L ~~~CIDAO-M _- 1 e-06 LFC 1 e-05 Fig. 10. Relative thrifts in El-Net The relative thrift of the applied protections schemes in TNet is shown in Figure 11. It can be observed that the thrift of the CIDED methods are the two highest, since both methods offer outstanding availability. At lower coefficients the CIDA schemes have higher thrift than dedicated path protection has. The realistic LFC is of the order of 10 6, therefore the CIDA methods have higher thrift than dedicated end-to-end protection. r-.a,1 100' 10I 1 Relative thrift of the protection schemes e-06 e-05 LFC Fig. 11. Relative thrifts in TNet CIDED-M _.- CIDED-L CIDA-M 1 +1-,- -a. Unprotected CIDAO-M CIDAO-L **^ *. ~~~~~~~CIDA-L _ It can be seen in both figures that a scheme using higher level p-cycles with Most Reliable realization has the highest thrift, however, in every other cases, a scheme with Least Cost realization has higher thrift than the corresponding scheme of Most Reliable strategy. e CONCLUSION The most significant advantage of using higher level p- cycles is that it can be applied without the knowledge of the internal structure of the domains in contrast to the traditional shared link protection schemes, which are infeasible without knowing intemnal informations. A higher level p-cycle retains the benefits of a conventional p-cycle by offering high availability with acceptable sparecapacity requirement. One disadvantage of the higher level p-cycle is, that it is a link-protection method, and therefore it is not able to handle node failures in contrast to the path protections, which offer backup path if an inner node fails, thereby the service remains operational after a very short interruption. The disadvantage of the proposed multi-domain oriented protection schemes is, that they require more allocated resources than the traditional methods, since at the lower level spare capacity is needed for the intra-domain protection, and for the inner segments of the inter-domain protections. REFERENCES [1] D. Zhou, S. Subramaniam, "Survivability in optical networks," IEEE Network, vol. 14, no. 6, Nov./Dec. 2000, pp [2] D. A. Schupke, M. Jager, R. Huilsermann, "Comparison of resilience mechanisms for dynamic servcies in intelligent optical networks," Proc. Fourth International Workshop on the Design of Reliable Communication Networks (DRCN 2003), Banff, Alberta, Canada, Oct. 2003, pp [3] F. J. Blouin, A. Sack, W. D. Grover, H. Nasrallah, "Benefits of p- cycles in a mixed protection and restoration approach," Proc. Fourth International Workshop on the Design of Reliable Communication Networks (DRCN 2003), Banff, Alberta, Canada, Oct. 2003, pp [4] W. D. Grover, D. Stamatelakis, "Bridging the ring-mesh dichotomy with p-cycles," Proc. IEEE/VDE Workshop on Design of Reliable Communication Networks (DRCN 2000), Munich, Germany, April 2000, pp [5] J. Doucette, W. D. Grover, "Comparison of mesh protection and restoration schemes and the dependency on graph connectivity," Proc. Third International Workshop on the Design ofreliable Communication Networks (DRCN 2001), Budapest, Hungary, 7-10 Oct. 2001, pp [6] J. Doucette, D. He, W. D. Grover, 0. Yang, "Algorithmic approaches for efficient enumeration of candidate p-cycles and capacitated p-cycle network design," Proc. of Fourth International Workshop on the Design of Reliable Communication Networks (DRCN 2003), Banff, Alberta, Canada, Oct. 2003, pp [7] D. A. Schupke, C. G. Gruber, A. Autenrieth, "Optimal configuration of p-cycles in WDM networks," Proc. IEEE International Conference on Communications (ICC 2002), New York City, NY, 28 April - 2 May, 2002, vol. 5, pp [8] W. D. Grover, J. Doucette, "Advances in optical network design with p-cycles: Joint optimalization and pre-selection of candidate p-cycles," Proc. of IEEE/LEOS Summer Topicals 2002, Mont Tremblant, PQ, July 2002, pp [9] J. Kang, M. J. Reed, "Bandwith protection in MPLS networks using p- cycle structure," Proc. Fourth International Workshop on the Design of Reliable Communication Networks (DRCN 2003), Banff, Alberta, Canada, Oct. 2003, pp [10] Didna Mesk6 [Online], "European core network - El-Net," [11] A. Banati, I. Koncz, "Novel algorithms for graph reliability in packet switched networking," Proc. 5th International Workshop on Rare Event Simulation and Combinatorial Optimization (RESIM COP 2004), Budapest, Hungary, September

An Approach to Dual-failure Survivability for Multi Quality Data Based On Double p-cycle

An Approach to Dual-failure Survivability for Multi Quality Data Based On Double p-cycle An Approach to Dual-failure Survivability for Multi Quality Data Based On Double p-cycle Ajeeth Singh 1 Skyline Institute of Engineering and Technology, Greater Noida, UP, India. 2 MVN Education City Palwal,

More information

P Cycles: Design and Applications

P Cycles: Design and Applications P Cycles: Design and Applications -Aman Nijhawan Abstract Survivability is becoming an increasingly important goal in network design. An important aspect of network design today is designing networks with

More information

Progress Report No. 13. P-Cycles and Quality of Recovery

Progress Report No. 13. P-Cycles and Quality of Recovery NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 13 P-Cycles and Quality of Recovery The University of Canterbury Team 12 April 2006 Abstract Since the p-cycle resilience

More information

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland

More information

Bridging the Ring-Mesh Dichotomy with p-cycles:

Bridging the Ring-Mesh Dichotomy with p-cycles: Bridging the Ring-Mesh Dichotomy with p-cycles: Ring-like speed with mesh-like capacity Wayne D. Grover, Demetrios Stamatelakis TRLabs, University of Alberta, Edmonton, Alberta, Canada DRCN 2000 April

More information

Progress Report No. 15. Shared Segments Protection

Progress Report No. 15. Shared Segments Protection NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury

More information

Survivability with P-Cycle in WDM Networks

Survivability with P-Cycle in WDM Networks Survivability with P-Cycle in WDM Networks K. Aparna 1, P. Ramya Krishna 2 JNTUA College of Engineering, Pulivendula Abstract: In this paper we discuss about the Pre-Configured survivability schemes. Network

More information

Dynamic p-cycles selection in optical WDM Mesh networks

Dynamic p-cycles selection in optical WDM Mesh networks Research Online ECU Publications Pre. 2011 2005 Dynamic p-cycles selection in optical WDM Mesh networks ungmang Lo Daryoush Habibi Quoc Viet Phung Hoang Nguyen Byungkyu ang 10.1109/ICON.2005.1635625 This

More information

p-cycle Protection in Wavelength Routed Networks

p-cycle Protection in Wavelength Routed Networks p-cycle Protection in Wavelength Routed Networks Christian Mauz Communication Technology Laboratory ETH Zurich Switzerland mauz@nari.ee.ethz.ch Abstract The concept of p-cycle protection (PCP) in virtual

More information

Index Terms Backbone Networks Optimization, Resilience, Virtual Private Network, Traffic Demands and Traffic Flows

Index Terms Backbone Networks Optimization, Resilience, Virtual Private Network, Traffic Demands and Traffic Flows International Journal of Computer Science and Telecommunications [Volume 2, Issue 8, November 2011] 12 ISSN 2047-3338 Designing Different Models of Robust IP/MPLS over DWDM Networks Marko Rožman University

More information

Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection

Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Victor Yu Liu Network Advanced Research, Huawei Technologies Santa Clara, California, USA yuliu@ieee.org Abstract

More information

OPTICAL networks based on wavelength division multiplexing

OPTICAL networks based on wavelength division multiplexing IEEE/ACM TRANSACTIONS ON NETWORKING 1 ILP Formulations for p-cycle Design Without Candidate Cycle Enumeration Bin Wu, Member, IEEE, Kwan L. Yeung, Senior Member, IEEE, and Pin-Han Ho Abstract The concept

More information

Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks

Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Franz Rambach Student of the TUM Telephone: 0049 89 12308564 Email: rambach@in.tum.de

More information

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS IT Specialist Dorina LuminiŃa Copaci Gorj Court IT Expert Constantin Alin Copaci ANRCTI Bucharest Abstract: A large number of recovery mechanisms

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

Abstract. Introduction and Motivations. Automatic Switched Optical Networks

Abstract. Introduction and Motivations. Automatic Switched Optical Networks Abstract Protection and restoration based resilience in Automatic Switched Optical Networks T. Jakab 1, Zs. Lakatos 2 Budapest University of Technology and Economics, Dept. of Telecommunications 1: Research

More information

A TRANSPONDER FOR GIGABIT ETHERNET OVER WDM

A TRANSPONDER FOR GIGABIT ETHERNET OVER WDM A TRANSPONDER FOR GIGABIT ETHERNET OVER WDM D.A. Schupkel and S. Weigert l and O. Jahreis 2 1 Munich University of Technology Institute of Communication Networks 80290 Munich, Germany Tel.: +4989289-23511,

More information

Fault management. Acnowledgements

Fault management. Acnowledgements Fault management Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Computer Networks Design and Management - Acnowledgements Inspired by Davide

More information

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modelling Yong Liu 09/19/2006 1 Outline Examples Basic Problems Routing Restriction 2 1 Example: Intra-Domain Traffic Engineering

More information

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks Iyad Katib and Deep Medhi Computer Science & Electrical Engineering Department University of Missouri-Kansas City, USA {IyadKatib,

More information

LSP placement in an MPLS-TP mesh network with shared mesh protection mechanism

LSP placement in an MPLS-TP mesh network with shared mesh protection mechanism LSP placement in an MPLS-TP mesh network with shared mesh protection mechanism CLÁUDIO ROBERTO FERREIRA COSTA, WAGNER LUIZ ZUCCHI Escola Politécnica Departamento de Engenharia de Sistemas Eletrônicos Universidade

More information

Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks

Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks Ahmed Frikha, Samer Lahoud, and Bernard Cousin University of Rennes 1, IRISA,

More information

Fault management. Fault management. Acnowledgements. The impact of network failures. Pag. 1. Inspired by

Fault management. Fault management. Acnowledgements. The impact of network failures. Pag. 1. Inspired by Fault management ndrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 cnowledgements Inspired by Davide

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

AVAILABILITY IMPROVEMENT OF WDM SYSTEM USING RING STRUCTURES

AVAILABILITY IMPROVEMENT OF WDM SYSTEM USING RING STRUCTURES Journal of ELECTRICAL ENGINEERING, VOL. 62, NO. 5, 2011, 297 301 AVAILABILITY IMPROVEMENT OF WDM SYSTEM USING RING STRUCTURES Ivan RADOŠ This work deals with modelling and availability analysis for the

More information

A Novel Efficient Design of Survivable WDM Mesh Networks

A Novel Efficient Design of Survivable WDM Mesh Networks 1684 JOURNAL OF COMPUTERS, VOL. 9, NO. 7, JULY 2014 A Novel Efficient Design of Survivable WDM Mesh Networks HONG HUI LI, XUE LIANG FU College of Computer and Information Engineering Inner Mongolia Agricultural

More information

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Master s Thesis Defense Ananth Nagarajan EECS Department, University of Kansas 10/13/98 Outline

More information

A host selection model for a distributed bandwidth broker

A host selection model for a distributed bandwidth broker A host selection model for a distributed bandwidth broker Christos Bouras Dimitris Primpas Research Academic Computer Technology Institute, Ν.Κazantzaki Str., Patras University 26500 Rion, Patras, Greece

More information

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 A Scalable Path Protection Mechanism for Guaranteed Network Reliability Under Multiple Failures Changcheng Huang, Senior Member, IEEE, Minzhe

More information

Backup segments. Path after failure recovery. Fault. Primary channel. Initial path D1 D2. Primary channel 1. Backup channel 1.

Backup segments. Path after failure recovery. Fault. Primary channel. Initial path D1 D2. Primary channel 1. Backup channel 1. A Segmented Backup Scheme for Dependable Real Time Communication in Multihop Networks Gummadi P. Krishna M. Jnana Pradeep and C. Siva Ram Murthy Department of Computer Science and Engineering Indian Institute

More information

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks Wojciech Molisz, DSc, PhD Jacek Rak, PhD Gdansk University of Technology Department of Computer Communications

More information

Load Balanced Spanning Tree in Metro Ethernet Networks

Load Balanced Spanning Tree in Metro Ethernet Networks Journal of Information Systems and Telecommunication, Vol. 2, No. 2, April-June 2014 119 Load Balanced Spanning Tree in Metro Ethernet Networks Ghasem Mirjalily* Department of Electrical and Computer Engineering,

More information

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:

More information

Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks

Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks Hwajung Lee, Hongsik hoi, Suresh Subramaniam, and Hyeong-Ah hoi Department of omputer Science and Electrical and omputer

More information

SURVIVABLE VNE. By Sedef Savas Networks Lab, May 25, 2017

SURVIVABLE VNE. By Sedef Savas Networks Lab, May 25, 2017 SURVIVABLE VNE By Sedef Savas Networks Lab, May 25, 2017 1 SURVEY ON SURVIVABLE VIRTUAL NETWORK EMBEDDING PROBLEM AND SOLUTIONS Sandra Herker, Ashiq Khan, Xueli An DOCOMO Communications Laboratories Europe

More information

Shared Protection by Concatenated Rings in Optical WDM Networks

Shared Protection by Concatenated Rings in Optical WDM Networks Shared Protection by Concatenated Rings in Optical WDM Networks Hyunseung Choo, Minhan Son, Min Young Chung, and Tae-Jin Lee School of Information and Communication Engineering Sungkyunkwan University

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Resilient IP Backbones. Debanjan Saha Tellium, Inc.

Resilient IP Backbones. Debanjan Saha Tellium, Inc. Resilient IP Backbones Debanjan Saha Tellium, Inc. dsaha@tellium.com 1 Outline Industry overview IP backbone alternatives IP-over-DWDM IP-over-OTN Traffic routing & planning Network case studies Research

More information

THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS

THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS VOLUME: 9 NUMBER: 5 SPECIAL ISSUE THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS Martin MEDVECKY Department of Telecommunications, Faculty of Electrical Engineering and Information Technology,

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

Protection Switching and Rerouting in MPLS

Protection Switching and Rerouting in MPLS Protection Switching and Rerouting in MPLS S. Veni Dr.G.M.Kadhar Nawaz Research Scholar, Director, Dept. of MCA Bharathiar University Sona College of Technology Coimbatore, India Salem, India venii_k@yahoo.com

More information

Shared Risk Link Group (SRLG)-Diverse Path Provisioning Under Hybrid Service Level Agreements in Wavelength-Routed Optical Mesh Networks

Shared Risk Link Group (SRLG)-Diverse Path Provisioning Under Hybrid Service Level Agreements in Wavelength-Routed Optical Mesh Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 8-2005 Shared Risk Link Group (SRLG)-Diverse Path Provisioning

More information

Communication Redundancy User s Manual

Communication Redundancy User s Manual User s Manual Fifth Edition, June 2015 www.moxa.com/product 2015 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Dynamic Routing of Restorable Bandwidth-Guaranteed Tunnels Using Aggregated Network Resource Usage Information

Dynamic Routing of Restorable Bandwidth-Guaranteed Tunnels Using Aggregated Network Resource Usage Information IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 3, JUNE 2003 399 Dynamic Routing of Restorable Bwidth-Guaranteed Tunnels Using Aggregated Network Resource Usage Information Murali Kodialam, Associate

More information

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS D. Harle, S. Albarrak, F. Ali Department of Electrical and Electronic Engineering, University of Strathclyde, U. K {d.harle,sbarrak,

More information

Network Protection Design for MPLS Networks

Network Protection Design for MPLS Networks Network Protection Design for MPLS Networks Gaurav Agrawal, Dijiang Huang, Deep Medhi Computer Science and Electrical Engineering Department University of Missouri-Kansas City, MO 64110, USA Computer Science

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

Analysis of p-cycle Capacity in WDM Networks

Analysis of p-cycle Capacity in WDM Networks Analysis of p-cycle Capacity in WDM Networks Dominic A. Schupke December 20, 2005 Abstract The concept of p-cycles provides many characteristics, which are benficial for deployment and operation in WDM

More information

Multi-layer Restoration in Hierarchical IP/MPLS over WSON Networks

Multi-layer Restoration in Hierarchical IP/MPLS over WSON Networks Multi-layer Restoration in Hierarchical IP/MPLS over WSON Networks F. Muñoz, V. Lopez, O. González de Dios, J.P. Fernández-Palacios. Telefónica I+D c/ Don Ramón de la Cruz, 84. 286, Spain Abstract Network

More information

1. INTRODUCTION light tree First Generation Second Generation Third Generation

1. INTRODUCTION light tree First Generation Second Generation Third Generation 1. INTRODUCTION Today, there is a general consensus that, in the near future, wide area networks (WAN)(such as, a nation wide backbone network) will be based on Wavelength Division Multiplexed (WDM) optical

More information

Diversity Coded 5G Fronthaul Wireless Networks

Diversity Coded 5G Fronthaul Wireless Networks IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer IV Dmitri Loguinov Texas A&M University April 12, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet

Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet Midori Terasawa, Masahiro Nishida, Sho Shimizu, Yutaka Arakawa, Satoru Okamoto and Naoaki Yamanaka Department

More information

Survivability Design for Multiple Link Failures in MPLS Networks with Bandwidth Guarantees to Minimize Spare Capacity Allocation

Survivability Design for Multiple Link Failures in MPLS Networks with Bandwidth Guarantees to Minimize Spare Capacity Allocation Survivability Design for Multiple Link Failures in MPLS Networks with Bandwidth Guarantees to Minimize Spare Capacity Allocation Deepa Srinivasan North Carolina State University dsriniv@unity.ncsu.edu

More information

Global IP Network System Large-Scale, Guaranteed, Carrier-Grade

Global IP Network System Large-Scale, Guaranteed, Carrier-Grade Global Network System Large-Scale, Guaranteed, Carrier-Grade 192 Global Network System Large-Scale, Guaranteed, Carrier-Grade Takanori Miyamoto Shiro Tanabe Osamu Takada Shinobu Gohara OVERVIEW: traffic

More information

Dynamic Provisioning of Shared-Backup Path Protected Connections with Guaranteed Availability Requirements

Dynamic Provisioning of Shared-Backup Path Protected Connections with Guaranteed Availability Requirements Dynamic Provisioning of Shared-Backup Path Protected Connections with Guaranteed Availability Requirements Darli A. A. Mello, Jefferson U. Pelegrini, Rafael P. Ribeiro, Dominic A. Schupke and Helio Waldman

More information

Performance of Optical Burst Switching Techniques in Multi-Hop Networks

Performance of Optical Burst Switching Techniques in Multi-Hop Networks Performance of Optical Switching Techniques in Multi-Hop Networks Byung-Chul Kim *, You-Ze Cho *, Jong-Hyup Lee **, Young-Soo Choi **, and oug Montgomery * * National Institute of Standards and Technology,

More information

Bandwidth Protection in MPLS Networks Using p-cycle Structure

Bandwidth Protection in MPLS Networks Using p-cycle Structure Bandwidth Protection in MPLS Networks Using p-cycle Structure Jianghui Kang, Martin J. Reed Department of Electronic System Engineering University of Essex Colchester, CO4 3SQ, United Kingdom Email: {jkangf,

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY /$ IEEE

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY /$ IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY 2010 67 1+NNetwork Protection for Mesh Networks: Network Coding-Based Protection Using p-cycles Ahmed E. Kamal, Senior Member, IEEE Abstract

More information

Cost-based Pricing for Multicast Streaming Services

Cost-based Pricing for Multicast Streaming Services Cost-based Pricing for Multicast Streaming Services Eiji TAKAHASHI, Takaaki OHARA, Takumi MIYOSHI,, and Yoshiaki TANAKA Global Information and Telecommunication Institute, Waseda Unviersity 29-7 Bldg.,

More information

Local Restoration in Metro Ethernet Networks for Multiple Link Failures

Local Restoration in Metro Ethernet Networks for Multiple Link Failures Local Restoration in Metro Ethernet etworks for Multiple Link Failures Shibu. V Department of Computer Applications. Preetha Mathew K Department of Computer Applications. Jabir.K.V.T Department of Information

More information

Traffic Engineering Algorithms for MPLS Networks

Traffic Engineering Algorithms for MPLS Networks Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Traffic Engineering Algorithms for MPLS Networks Ph.D. Dissertation Summary by Balázs Gábor Józsa

More information

A Novel Optimization Method of Optical Network Planning. Wu CHEN 1, a

A Novel Optimization Method of Optical Network Planning. Wu CHEN 1, a A Novel Optimization Method of Optical Network Planning Wu CHEN 1, a 1 The engineering & technical college of chengdu university of technology, leshan, 614000,china; a wchen_leshan@126.com Keywords:wavelength

More information

Scalable Design of Resilient Optical Grids

Scalable Design of Resilient Optical Grids Scalable Design of Resilient Optical Grids Marc De Leenheer Ghent University - IBBT On-Demand Network Services for the Scientific Community Terena Networking Conference 2009, June 7 th, Malaga, Spain GRID

More information

Designing physical topologies for wavelength-routed all-optical networks

Designing physical topologies for wavelength-routed all-optical networks Designing physical topologies for wavelength-routed all-optical networks D. R. Hjelmi 2 and S. Eikedal Andersen! 1) Department of Physical Electronics, Faculty of Electrical Engineering and Telecommunications,

More information

Chapter 7: Routing Dynamically. Routing & Switching

Chapter 7: Routing Dynamically. Routing & Switching Chapter 7: Routing Dynamically Routing & Switching The Evolution of Dynamic Routing Protocols Dynamic routing protocols used in networks since the late 1980s Newer versions support the communication based

More information

Scheduling Algorithms to Minimize Session Delays

Scheduling Algorithms to Minimize Session Delays Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of

More information

A Study on Layer Correlation Effects Through a Multilayer Network Optimization Problem

A Study on Layer Correlation Effects Through a Multilayer Network Optimization Problem A Study on Layer Correlation Effects Through a Multilayer Network Optimization Problem Iyad Katib and Deep Medhi University of Missouri Kansas City, USA Abstract Multilayer network design has received

More information

MODERN communication networks are constructed

MODERN communication networks are constructed 1000 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 4, AUGUST 2011 Cross-Layer Survivability in WDM-Based Networks Kayi Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, and Hyang-Won Lee, Member,

More information

Extending the p-cycle Concept to Path Segment Protection for Span and Node Failure Recovery

Extending the p-cycle Concept to Path Segment Protection for Span and Node Failure Recovery 1306 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 8, OCTOBER 2003 Extending the p-cycle Concept to Path Segment Protection for Span and Node Failure Recovery Gangxiang Shen, Student Member,

More information

A MAC Layer Abstraction for Heterogeneous Carrier Grade Mesh Networks

A MAC Layer Abstraction for Heterogeneous Carrier Grade Mesh Networks ICT-MobileSummit 2009 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2009 ISBN: 978-1-905824-12-0 A MAC Layer Abstraction for

More information

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National

More information

IN transport communication networks two rather diverse

IN transport communication networks two rather diverse apacity-efficient Planning of Resilient Networks with p-ycles laus G. Gruber, ominic. Schupke fclaus.gruber, dominic.schupkeg@ei.tum.de Munich University of Technology Institute of ommunication Networks

More information

Applying p-cycle Protection Approach for a Reliable IPTV Service in IP-over-DWDM Networks

Applying p-cycle Protection Approach for a Reliable IPTV Service in IP-over-DWDM Networks Frikha et al. RESEARCH Applying p-cycle Protection Approach for a Reliable IPTV Service in IP-over-DWDM Networks Ahmed Frikha *, Bernard Cousin and Samer Lahoud Abstract Today, IPTV service has become

More information

Comparison of Protection Cost at IP or WDM Layer

Comparison of Protection Cost at IP or WDM Layer Comparison of Protection Cost at IP or WDM Layer Mauro Cuna Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it Marco Mellia Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it

More information

Design Methodologies and Algorithms for Survivable C-RAN

Design Methodologies and Algorithms for Survivable C-RAN 16 Regular papers ONDM 218 Design Methodologies and Algorithms for Survivable C-RAN Bahare M. Khorsandi, Federico Tonini, Carla Raffaelli DEI, University of Bologna Viale Risorgimento 2, 4136 Bologna,

More information

Multi-Layer Traffic Engineering through Adaptive λ-path Fragmentation and De-Fragmentation

Multi-Layer Traffic Engineering through Adaptive λ-path Fragmentation and De-Fragmentation Multi-Layer Traffic Engineering through Adaptive λ-path Fragmentation and De-Fragmentation Tibor Cinkler, Péter Hegyi, Márk Asztalos, Géza Geleji, János Szigeti, András Kern {cinkler,hegyi,asztalos,geleji,szigeti,kern}@tmit.bme.hu

More information

ECE442 Communications Lecture 4. Optical Networks

ECE442 Communications Lecture 4. Optical Networks ECE442 Communications Lecture 4. Optical Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Network Elements 1 WDM networks provide circuit switched end-to-end optical

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Spare Capacity Allocation Using Shared Backup Path Protection for Dual Link Failures

Spare Capacity Allocation Using Shared Backup Path Protection for Dual Link Failures Spare Capacity Allocation Using Shared Backup Path Protection for Dual Link Failures Victor Yu Liu David Tipper Huawei Technologies, Boston, Massachusetts, USA Email: yuliu@ieee.org Graduate Telecommunications

More information

Fault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee

Fault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee DIMACS Series in Discrete Mathematics and Theoretical Computer Science Fault-Tolerant Design of Wavelength-Routed Optical Networks S. Ramamurthy and Biswanath Mukherjee Abstract. This paper considers optical

More information

DEPARTMENT of. Computer & Information Science & Engineering

DEPARTMENT of. Computer & Information Science & Engineering CIS-6930: Distributed Multimedia Systems Enhancing aggregate QoS for video streaming Authors: Chung wei Lee, Randy Chow, Jonathan C.L. Liu Aditi Malviya Presented By: Anubha DEPARTMENT of Computer & Information

More information

SIMULATION ISSUES OF OPTICAL PACKET SWITCHING RING NETWORKS

SIMULATION ISSUES OF OPTICAL PACKET SWITCHING RING NETWORKS SIMULATION ISSUES OF OPTICAL PACKET SWITCHING RING NETWORKS Marko Lackovic and Cristian Bungarzeanu EPFL-STI-ITOP-TCOM CH-1015 Lausanne, Switzerland {marko.lackovic;cristian.bungarzeanu}@epfl.ch KEYWORDS

More information

Optimization Algorithms for Data Center Location Problem in Elastic Optical Networks

Optimization Algorithms for Data Center Location Problem in Elastic Optical Networks Optimization Algorithms for Data Center Location Problem in Elastic Optical Networks Mirosław Klinkowski 1, Krzysztof Walkowiak 2, and Róża Goścień 2 1 National Institute of Telecommunications, Warsaw,

More information

Toward the joint design of electronic and optical layer protection

Toward the joint design of electronic and optical layer protection Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS

More information

NETWORK TOPOLOGIES. Application Notes. Keywords Topology, P2P, Bus, Ring, Star, Mesh, Tree, PON, Ethernet. Author John Peter & Timo Perttunen

NETWORK TOPOLOGIES. Application Notes. Keywords Topology, P2P, Bus, Ring, Star, Mesh, Tree, PON, Ethernet. Author John Peter & Timo Perttunen Application Notes NETWORK TOPOLOGIES Author John Peter & Timo Perttunen Issued June 2014 Abstract Network topology is the way various components of a network (like nodes, links, peripherals, etc) are arranged.

More information

SYSC 5801 Protection and Restoration

SYSC 5801 Protection and Restoration SYSC 5801 Protection and Restoration Introduction Fact: Networks fail. Types of failures: Link failures Node failures Results: packet losses, waste of resources, and higher delay. What IGP does in the

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined

More information

Proposal for tutorial: Resilience in carrier Ethernet transport

Proposal for tutorial: Resilience in carrier Ethernet transport Downloaded from orbit.dtu.dk on: Jun 16, 2018 Proposal for tutorial: Resilience in carrier Ethernet transport Berger, Michael Stübert; Wessing, Henrik; Ruepp, Sarah Renée Published in: 7th International

More information

Category: Standards Track. Cisco N. Sprecher. Nokia Siemens Networks. A. Fulignoli, Ed. Ericsson October 2011

Category: Standards Track. Cisco N. Sprecher. Nokia Siemens Networks. A. Fulignoli, Ed. Ericsson October 2011 Internet Engineering Task Force (IETF) Request for Comments: 6378 Category: Standards Track ISSN: 2070-1721 Y. Weingarten, Ed. Nokia Siemens Networks S. Bryant E. Osborne Cisco N. Sprecher Nokia Siemens

More information

Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation

Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation Muhammad S. Javed, Krishnaiyan Thulasiraman, Matthew A. Gaines School of Computer Science, University

More information

CS 622 Distributed Networks

CS 622 Distributed Networks CS 622 Distributed Networks Access Network Design Dr. Xiaobo Zhou Department of Computer Science CS622 AccessNetwork.1 Review: Traffic Normalization Traffic Generators Uniform traffic Random traffic Realistic

More information

GA-Based Hybrid Algorithm for MBR Problem of FIPP p-cycles for Node Failure on Survivable WDM Networks

GA-Based Hybrid Algorithm for MBR Problem of FIPP p-cycles for Node Failure on Survivable WDM Networks GA-Based Hybrid Algorithm for MBR Problem of FIPP p-cycles for Node Failure on Survivable WDM Networks Der-Rong Din Department of Computer Science and Information Engineering, National Changhua University

More information

On the Impact of Route Processing and MRAI Timers on BGP Convergence Times

On the Impact of Route Processing and MRAI Timers on BGP Convergence Times On the Impact of Route Processing and MRAI Timers on BGP Convergence Times Shivani Deshpande and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute, Troy, NY 12180 Abstract Fast convergence

More information

Expected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction

Expected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction Expected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction Shu Sekigawa, Satoru Okamoto, and Naoaki Yamanaka Department of Information and Computer Science, Faculty of Science and Technology,

More information

Resilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements

Resilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements Resilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements Achim Autenrieth (1) *, Andreas Kirstädter (2) (1) Munich University of Technology Institute

More information

Arc Perturbation Algorithms for Optical Network Design

Arc Perturbation Algorithms for Optical Network Design Applied Mathematical Sciences, Vol. 1, 2007, no. 7, 301-310 Arc Perturbation Algorithms for Optical Network Design Zbigniew R. Bogdanowicz Armament Research, Development and Engineering Center Building

More information

Network Systems for Emerging WAN Applications

Network Systems for Emerging WAN Applications Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking

More information

802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP)

802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP) 13 802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP) Contents Overview.................................................... 13-2 How Spanning Tree Operates.................................

More information