Network Protection Design Models, a Heuristic, and a Study for Concurrent Single-Link per Layer Failures in Three-Layer Networks

Size: px
Start display at page:

Download "Network Protection Design Models, a Heuristic, and a Study for Concurrent Single-Link per Layer Failures in Three-Layer Networks"

Transcription

1 Network Protection Design Models, a Heuristic, and a Study for Concurrent Single-Link per Layer Failures in Three-Layer Networks Iyad Katib a,, Deep Medhi b a King Abdulaziz University, Jeddah, Saudi Arabia b University of Missouri Kansas City, USA Abstract Multilayer network design has received significant attention in current literature. However, the explicit modeling of IP/MPLS over OTN over DWDM in which the OTN layer s technological constraints are specifically considered has not been investigated before. In this paper, we present an optimization design model for protecting an IP/MPLS over OTN over DWDM three-layer network. While considering the technological constraints of each layer, we provide a protection mechanism at each layer that guarantees the multilayer network survivability when three links fail simultaneously where each layer suffers a single failure. We present a heuristic approach to reduce the complexity of the problem and present a study based on varying several network parameters to understand their impacts on the protection capacity and the overall network cost. In addition, we present and solve three variations of our original model where we exclude each layer protection in each one of them to compare the cost performance of all models. We observe that generally the DWDM layer protection is the most expensive capacity component. The IP/MPLS layer protection becomes more expensive only when the IP/MPLS unit cost is high. Keywords: DWDM, IP/MPLS, Multilayer Network, Network Optimization, OTN, Protection, Survivable Design. 1. Introduction Multilayer network survivability has been a crucial research topic in recent years as network traffic is unstoppably rising. A survivable network, in general, is a network that provides some ability to recover ongoing traffic disrupted by a network failure. Large ISPs need to ensure their networks can meet customer satisfaction and expectations. In addition, in today s world where businesses rely heavily on computer networks, network failures can severely affect their revenues. Thus, network survivability has always been a vital factor in designing current and future communication networks. In two-layer networks such as IP-over-WDM, a single recovery mechanism could be provided at either layer. In this design, a critical question arises: where do we provide the protection mechanism? The benefits of an upper layer protection are: (1) in case of failure (either at the upper or lower layer), the network could be fully recovered, (2) since the upper layer often carries Corresponding Author addresses: Iyad.Katib@gmail.com (Iyad Katib), DMedhi@umkc.edu (Deep Medhi) differentiated services with different QoS requirements, it is generally easier to offer differentiated survivability at the upper layer. Nonetheless, recovery at the upper layer has some disadvantages: (1) recovery time at the upper layer is usually higher than recovery time at the lower layer due to the nature of the IP, (2) in case of failure at the lower layer, there could be a huge amount of upper layer traffic affected by the failure in which case, a great amount of recovery process at the upper layer is required. On the other hand, recovery at the lower layer has some advantages. It is faster than recovery at the upper layer and it requires considerably fewer actions due to the coarser granularity of the lower layer. The drawback, however, is that some failures (e.g. an IP router failure) cannot be handled by the lower layer. The above discussion elucidates the need for a recovery mechanism to be deployed at each layer of the network to recover from various network failures. Despite the extensive research devoted to multilayer networks, the explicit modeling of IP/MPLS-over- OTN-over DWDM in which the OTN (optical transport network) layer is specifically considered has not been addressed before except in our previous work [1, 2, 3, 4]. We can visualize the OTN layer as being the virtual Preprint submitted to COMPUTER COMMUNICATIONS October 7, 2012

2 optical layer on top of the physical DWDM layer. This architecture, that bridges integration and interaction between the IP and optical layers [5], has been identified as promising. In this paper, we consider a survivability design specifically for a three-layer IP/MPLS-over-OTN-over- DWDM network where only the normal flow of each layer is 100% protected against any single link failure. This leads to a survivable network in case of three concurrent link failures where each layer suffers a single failure. In this architecture, the label switched routers (LSRs) in the IP/MPLS layer are physically connected to optical transport networks that are slated on top of optical cross-connects (OXCs) that are interconnected by a DWDM fiber transmission medium at the physical level. In this setting, we present the network capacity (Normal-protection) design model and a study based on various network parameters. The contributions of this work are as follows: The explicit consideration of each layer in the network and its modularity requirement, including the OTN layer that results in a three-layer model. The consideration of the OTN layer sublayer technological constraints. Note that although each OTN signal quantum (see Section 3 for U k ) can form its own virtual network (sublayer), we can consider them together without considering each sublayer separately because of the way the costing is defined in the objective function; this reduces the number of constraints considerably. The design that is based on the separation of capacity components at each layer to avoid double or triple protection of the upper layer capacity. A study and analysis of results obtained by solving four different network protection design models based on various network parameters to understand their impacts on three-layer networks. 2. Related Work For multilayer network survivability, the problem is how to design a survivable multilayer network with two goals in mind: (1) to maximize the network protection and, (2) to reduce the cost of the network resources. Several survivability mechanisms have been discussed in literature for two-layer networks [6, 7, 8, 9]. The most traditional approach is the redundant protection. In this case, the spare capacity of the upper layer is twice protected; once in the upper layer, and once in the 2 lower layer. Clearly, this leads to a poor utilization of the expensive network resource. A cost reduction can be achieved in this design if the protection (spare) capacity of the upper layer is left unprotected in the lower layer. Fumagalli and Valcarenghi, in [10], review the most common restoration and protection mechanisms available at the IP and WDM layers that can be implemented concurrently in the IP over WDM architecture. Sahasrabuddhe et al., in [11], address the problem of in which layer to provide the fault-management technique (either the IP or WDM layer). Kubilinskas and Pióro, in [12], also present two design problems providing protection in either the WDM layer or the IP layer. Zhang and Durresi, in [13], investigate the necessity, methods, and advantages to coordinate multilayer survivability in the IP over WDM networks. Lei et al. in [14], and Qin et al. in [15], investigate and study joint multilayer survivability in IP/WDM networks. In [16], Bigos et al. compare single layer and multilayer survivability in MPLS over optical transport networks. In [17, 18], the impact of GMPLS on multi-layer survivability has been addressed. We note, however, that in all previous works, the OTN layer that imposes unique technological constraints is not explicitly considered. We observe that usually when an OTN is mentioned, a reconfigurable optical backbone is meant. That is, the core routers are connected through electro-optical cross-connects (OXCs) with no consideration for OTN as a distinct layer. Design models based on this assumption are missing the sub-layer technological constraints within the lightpath. Thus, our capacity design model is more realistic and precise because it goes into the middle layer s (OTN) technological constraints and models its associated sub-component cost, allowing us to investigate its impact on the network. In [4, 19], we have laid the foundation behind the three layer networks including how the three layers interact with each other in operation and provided detailed motivation to aggressively consider this three layer architecture. In [4], we addressed the integrated design problem without survivability. In this paper, we extend our previous work [3] on protection design of threelayer networks. Mainly, we emphasize the benefit of employing a protection mechanism in each layer leading to a fully survivable network in case three links - possibly more - of different switching capabilities fail simultaneously. We also present three different variations of our original comprehensive protection design model. These models differ based on which layers to employ protection. While our main model is overencompassing of all the model variations by providing protection at every layer, in the three sub-models

3 Table 1: OTN Signals, Data Rates and Multiplexing. U k Signal Bit-Rate (Gbps) Max. U k s in a wavelength U U U U U we exclude a protection component from one layer at a time. That is, the first variation has no DWDM layer protection, the second one has no OTN layer protection, and the last variation has no IP/MPLS layer protection. Then, we solve all models and compare their cost performance to investigate each layer protection from a cost standpoint. We also use another real-world existing topology to analyze the results obtained by solving the models. 3. OTN Overview To support network management and supervision functionalities, the OTN system is structured in layered networks consisting of several sublayers [20]. Each sublayer is responsible for specific services and is activated at its termination points. For this paper, we are interested in the Optical Data Unit (ODU) sublayer that provides (1) tandem connection monitoring, (2) end-to-end path supervision, (3) adaptation of client data that can be of diverse formats such as SDH, Ethernet, IP/MPLS, T- MPLS, and so on. The ODU sublayer currently defines five bit-rate client signals, i.e., 1.25, 2.5, 10, 40, and 100 Gbps that are referred to as ODUk (k = 0, 1, 2, 3, 4), respectively. In the rest of the paper, U k denotes ODUk for k = 0, 1, 2, 3, 4. Then, for the multiplexing process, we can write: 2U 0 = U 1, 4U 1 = U 2, 4U 2 = U 3, and 2U 3 = U 4 (see Table 1 rates and how these fit into a wavelength). OTN also defines the ODUk time division multiplexing sublayer. It supports the multiplexing and transporting of several lower bit-rate signals into a higher bit-rate signal and maintains an end-to-end trail for the lower bit-rate signals. This typically occurs when a client signal does not occupy an entire wavelength. The multiplexing of ODUk signals is easy to visualize from the the bit-rates shown in Table 1. There are two additional specifications: ODU2e and ODUflex. For the purpose of capacity planning modeling, ODU2e can be treated as ODU2, which is not considered separately. ODUflex is any rate over ODU1, which from a modelling purpose can be treated as a real variable with a lower bound of 1 Gbps. Since in our 3 model, any ODU modular variables can be relaxed to be real variables, ODUflex is not considered separately. 4. Protection Mechanisms Resource protection can be performed in different layers of a multilayer network. In our architecture, the IP/MPLS layer is protected in the underlying OTN layer that is protected by the DWDM layer. In this case, a failure in a lower layer cannot be seen by the upper layer. For instance, the IP/MPLS layer does not see the failure of the OTN link. Several protection and restoration mechanisms have been introduced in literature [10]. The choice of which method to implement in a network depends on the requirements of the ISP and whether a method is technologically meaningful. In this section, we present our selection of the protection mechanism used per layer of the multilayer network and explain why we selected each one of them. MPLS tunnels can be set up to carry demand volumes for different traffic demand types that require different QoS. This indicates that the MPLS layer can provide transport services through the use of tunnels. In our design model, we assume that each IP demand d can be carried over a single end-to-end primary tunnel. In this case, one of the suitable protection mechanisms from the service provider standpoint is the hot-standby path protection. In this method, a demand is carried over the primary path only, while the protection path is reserved for future use in case that the primary path fails. This is a 1:1 protection technique in which the primary and protection paths are link-disjoint. Note that the protection capacity for one path is not shared with the protection capacity used for other paths that fail in other failure situations. In addition, each failed flow is restored on one single protection path. Since each OTN link carries U k signals, we provide a protection for each U k by using a link restoration on a single path. In this mechanism, the entire capacity of the failed U k is restored on a single path between the end nodes of the failed OTN link. Note that in link restoration the protection capacity is shared by protection paths. However, primary and protection paths are link-disjoint. For the DWDM layer, we provide protection at the aggregate signal level. A common method of protection, at this lambda layer, is protection by using fixed backup paths. In this method, a copy of the data signal is transmitted respectively on a primary and a protection path that are link and node-disjoint. Based on the signal quality, the receiver can make a decision to accept which copy of signal. This is a 1+1 protection technique.

4 Figure 1: IP/MPLS over OTN over DWDM Network 5. An Integrated Capacity (Normal and Protection) Optimization Model Figure 1 shows how we approach the problem. First, we have an IP/MPLS layer normal capacity and its protection capacity. Both must be realized by the OTN layer. However, the OTN layer will only protect its normal capacity that is needed to realize the normal IP/MPLS capacity to avoid protecting the IP/MPLS layer capacity twice; one in the IP/MPLS layer and one in the OTN layer. Then, all OTN layer capacities will be realized by the DWDM layer. Again, only the normal capacity of the DWDM layer is protected to avoid protecting the OTN layer capacity twice; one in the OTN layer and one in the DWDM layer. Note that by separating the capacity components and protecting the normal capacity of each layer, the multilayer network can fully survive three link failures at minimum in case a single link fails in each layer simultaneously. Tables 2 and 3 list the notations used in our formulation Constraints Since protection will be provided to the normal capacity of each layer, we have separated the capacity components at each layer. In our formulation, there are two general sets of constraints. The first is the set of capacity feasibility constraints that assures all flows routed on a particular link do not exceed the capacity of the link. The second is the set of demand constraints that specifies how the capacity of each upper layer link is realized by means of flow allocated to its candidate paths from the routing list in the lower layer. Note that in our model capacity variables are expressed in terms of the number of modules of certain sizes. Next, we start introducing the design constraints. 4 Table 2: List of Notations (Given entities) Indices: d = 1, 2,..., D demands between source-destination pairs of the IP/MPLS layer. p = 1, 2,..., P d candidate pair of (primary, protection) paths (P dp, R dp ) for realizing demand d. e = 1, 2,..., E links of the IP/MPLS layer. q = 1, 2,..., Q e candidate paths of OTN layer for realizing capacity of link e. g, l = 1, 2,..., G links of the OTN layer. r = 1, 2,..., R g candidate restoration paths for link g. z = 1, 2,..., Z g candidate pair of (primary, protection) paths (Z g, A g ) of DWDM layer for realizing capacity of link g. v = 1, 2,..., V g candidate paths of DWDM layer for realizing capacity of link g. f = 1, 2,..., F links of the DWDM layer. k = 0, 1, 2, 3, 4. modular interfaces of OTN link g. Constants: h d : Volume of demand d. δ edp : =1 if link e belongs to the primary path P dp realizing demand d; 0, otherwise. µ edp : =1 if link e belongs to the protection path R dp protecting path P dp of demand d; 0, otherwise. γ geq : =1 if link g belongs to path q realizing capacity of link e; 0, otherwise. ϑ f gz : =1 if link f belongs to primary path Z g realizing capacity of link g; 0, otherwise. θ f gz : =1 if link f belongs to the protection path A g protecting path Z g of link g; 0, otherwise. π f gv : =1 if link f belongs to the path v realizing capacity of link g; 0, otherwise. lgkr : =1 if link l belongs to path r restoring OTN interface k on link g; 0, otherwise. M: Module size for IP/MPLS layer. U k : Module size for OTN layer link capacities k = 0, 1, 2, 3, 4. N: Module size for DWDM layer link capacities. η e : Cost of one capacity unit of module M of IP/MPLS layer link e. β gk : Cost of one capacity unit of type U k of OTN layer link g. ξ f : Cost of one capacity unit of module N of WDM layer link f. In this architecture, we assume that an IP demand d can be carried over a single pair of primary and protection paths ( pp-path-pair ) out of the set of candidate pairs of (primary, protection) paths that are numbered 1, 2,..., P d. Path pairs are obtained after computing a number of paths off-line using k-shortest paths based on Dijkstra s algorithm and fed to the model. We define x dp as a binary decision variable for selection of a pppath-pair for demand d. This can be expressed as in constraints (1). Constraints (2) are the capacity feasibility constraints of the normal flows routed on link e where M is the allowable granularity of each MPLS tunnel. Here, δ edp determines if link e belongs to the primary path P dp carrying the normal flow of demand d. Protection in the IP/MPLS layer is achieved using a hot-standby path for each primary path. Constraints (3) are the capacity feasibility constraints of the protection

5 Table 3: List of Notations (Variables) Variables: x dp : IP/MPLS flow allocated to path pair p (P dp, R dp ) of demand d (non-negative, binary). m eq : OTN flow allocated to path q realizing normal capacity of link e (non-negative integral). m eq: OTN flow allocated to path q realizing protection capacity of link e (non-negative integral). s gkz : DWDM flow allocated to path pair z (Z g, A g ) realizing normal capacity of link g of interface k (non-negative integral). s gkv : DWDM flow allocated to path v realizing protection capacity of link g of interface k (non-negative integral). s gkv : DWDM flow allocated to path v realizing OTN capacity of link g of interface k that realizes protection capacity of the IP/MPLS layer (non-negative integral). c gkr : flow restoring normal capacity of interface k of link g on restoration path r. u gkr : binary flow variable associated with c gkr. y e : Number of modules M to be installed on link e for normal capacity of the IP/MPLS layer (non-negative integral). y : Number of modules M to be installed for protection capacity e of link e. w gk : Number of modules U k to be installed on link g for normal capacity in the OTN layer (non-negative integral). w gk : Number of modules U k to be installed for protection capacity of link g (non-negative integral). w gk : Number of modules U k to be installed on link g in the OTN layer for realizing IP/MPLS layer protection capacity (nonnegative integral). b f : Number of modules N to be installed on link f in the DWDM layer (non-negative integral). b f : Protection capacity on link f in the DWDM layer (nonnegative integral). b f : Number of modules N to be installed on link f in the DWDM layer for realizing OTN layer protection capacity (nonnegative integral). b f : Number of modules N to be installed on link f in the DWDM layer for realizing OTN capacity that realizes IP/MPLS layer protection capacity (non-negative integral). flows on link e. Here, µ edp determines if link e belongs to the protection path R dp that protects the primary path P dp. Pd p=1 x dp = 1 d = 1, 2,..., D (1) Dd=1 h Pd d p=1 δ edpx dp My e e = 1, 2,..., E (2) Dd=1 h Pd d p=1 µ edpx dp My e e = 1, 2,..., E (3) Constraints (4) are the demand constraints that specify how the normal capacity of each IP/MPLS layer link e is realized by means of flow m eq and is allocated to its candidate paths from the routing list in the OTN layer. Similarly, Constraints (5) are the demand constraints of the protection capacity of the IP/MPLS layer. Qe q=1 m eq = y e e = 1, 2,..., E (4) 5 Qe q=1 m eq = y e e = 1, 2,..., E (5) The OTN layer s normal capacity feasibility constraints are expressed in (6). These constraints assure that all normal flows routed on each OTN layer link g do not exceed their capacity that is allocated in modules of sizes U k that represent the five modular interfaces of OTN. Likewise, constraints (7) are the OTN layer protection capacity feasibility constraints. M E e=1 Qe q=1 γ geqm eq 4 k=0 U k w gk g = 1, 2,..., G (6) M E e=1 Qe q=1 γ geqm eq 4 k=0 U k w gk g = 1, 2,..., G (7) Protection in the OTN layer is achieved using a link restoration on a single path. Constraints (8) (11) assure that only normal capacity of each link g can be restored using only the protection capacity of the remaining links l(l g) on a single restoration path r. Note that we avoid double protection of the IP/MPLS protection capacity by protecting only the capacity w gk required for m eq flow of the IP/MPLS normal capacity y e. Note that constraints (8) to (10) force that c gkr = u gkr w gk, but the right-hand side cannot be used directly in the formulation because it is a term containing a multiplication of two variables. Also, constraints (11) assure that normal capacity of each OTN interface k can be restored using only the protection capacity of the remaining links l(l g). Rg r=1 c gkr = w gk g = 1, 2,..., G k = 0, 1, 2, 3, 4 (8) Rg r=1 u gkr = 1 g = 1, 2,..., G k = 0, 1, 2, 3, 4 (9) c gkr U k u gkr g = 1, 2,..., G k = 0, 1, 2, 3, 4, r = 1, 2,..., R g (10) Rg r=1 lgkrc gkr w lk k = 0, 1, 2, 3, 4, l = 1, 2,..., G, g = 1, 2,..., G l g (11) Constraints (12) and (13) are the OTN over DWDM demand constraints for the normal, and protection capacity, respectively. They specify how the capacity of each OTN layer interface k of link g is realized by means of flow allocated to its candidate paths from the routing list in the DWDM layer. Note that we separated the normal capacity w gk from protection capacity w gk to avoid protecting the OTN signals twice, once in the OTN layer and once in the DWDM layer. Constraints (14) are the OTN over DWDM demand constraints for the OTN capacity required to realize the IP/MPLS protection capacity.

6 Zg z=1 s gkz = w gk g = 1, 2,..., G k = 0, 1, 2, 3, 4 (12) Vg v=1 s gkv = w gk g = 1, 2,..., G k = 0, 1, 2, 3, 4 (13) Vg v=1 s gkv = w gk g = 1, 2,..., G k = 0, 1, 2, 3, 4 (14) Protection in the DWDM layer is achieved using fixed back-up paths. Constraints (15) to (18) are the DWDM layer capacity feasibility constraints. They assure that the capacity of each physical link f is not exceeded by the flow using this link. Note that N is the module size of the DWDM layer link capacity that is equal to the wavelength capacity, and b f would be the normal number of wavelengths to be installed on link f. At this layer, we have four capacity components: b f for the normal DWDM layer capacity, b f for the protection capacity, b f for the capacity required to realize the OTN protection capacity, and b f for the capacity required to realize the OTN capacity that realizes the IP/MPLS protection capacity. Figure 1 shows all capacity components at each layer. G 4k=0 g=1 U k Zg z ϑ f gz s gkz Nb f f = 1, 2,..., F G 4k=0 Zg g=1 U k z=1 θ f gzs gkz Nb f f = 1, 2,..., F (15) G 4k=0 Vg g=1 U k v=1 π f gvs gkv Nb f (16) f = 1, 2,..., F (17) G 4k=0 Vg g=1 U k v=1 π f gvs gkv Nb f 5.2. Objective and Cost Model f = 1, 2,..., F (18) The goal in our design model is to minimize the total network planning cost of the normal and protection capacity. The objective is given by: F = E η e (y e + y ) + G e e=1 g=1 k=0 4 β gk (w gk + w gk + w gk ) (19) + F ξ f (b f + b f + b f + b f ) f =1 This objective function captures the total cost of network resources over all three layers generically, where η e, β gk, and ξ f are the weights across the three metrics associated with the three layers. The three layer cost structure is shown in Figure 2. An advantage of our cost structure model is that this allows us to consider a number of different cost combinations that are helpful in understanding inter-layer interactions. 6 Figure 2: Cost Structure of The Three-Layer Network For the IP/MPLS layer, η e is the unit cost of link e; this is defined as the sum of the interface cost for the upper layer η U e ends of the connection between the IP/MPLS layer node and the OTN layer node, i.e., η e = 2η U e, where 2 is to count for both ends. At the OTN layer, β gk is the unit cost of link g, and is equal to the cost of the interface of the U k signal on link g, β U g, plus the cost of multiplexing OTN signals β k g, i.e., β gk = 2β U g + 2β k g. For the DWDM layer, ξ f is the cost of link f, and is equal to the interface cost for line-cards connected to the transport end of a physical node to another physical node ξ I f, the optical transponders cost ξt f, the OXC ports ξ o f, plus a physical link distance cost f, i.e., ξ f = 2(ξ I f + ξ t f + ξo f ) + f. The capacity (Normal and Protection) optimization problem (P) for the IP/MPLS-over-OTN-over-DWDM multilayer is to minimize the cost F given by (19) subject to the set of constraints (1) (18), with variables as defined in Table A Three-Phase Solution Approach Problem (P) has a large number of discrete variables and constraints. The number of variables is P D + 2(E(1 + Q)) + 8G(1 + R) + 12GZ + 4F, where P denotes the average number of paths for each demand d, and the number of constraints is D + 4(E +GR + F +G 2 ) + 22G. Furthermore, the problem is NP-hard, since simpler forms of network design problems, such as the singlepath flow allocation or modular link design, are shown to be NP-hard [9]. It is extremely difficult to solve problem (P) using an ILP solver such as CPLEX even for a small size network. We note, however, that if we decompose the problem into three subproblems, then we can solve the problem for moderate size networks tak-

7 Table 4: Summary of Cost Values for Each Layer. Cost Notation Unit Cost Values IP-cost (η e ) 5, 10, 20, 40 U k -cost (β gk ) 2/4/8/16/32, 2/5/13/20/50, 2/6/18/54/162 W-cost (ξ f ) 140 Figure 3: Phases of the Solution Approach ing a phased approach. Therefore, we solve Model (P) in three phases as follows: Phase 1: Solve the following design problem: Minimize E η e (y e + y ) + G e e=1 g=1 k=0 4 β gk (w gk + w gk ) (20) subject to the set of constraints (1) (7). Then, w gk will be a constant in the phase 2. Phase 2: Solve the following design problem: Minimize G g=1 k=0 4 β gk w gk + F ξ f b f (21) subject to the set of constraints (8) (11), (13), and (17). Phase 3: Solve the following design problem: Minimize F f =1 f =1 ξ f (b f + b f + b f ) (22) subject to the set of constraints (12), (14) (16), and (18). Note that w gk and w gk are constant to this phase made by solving phase 1. Figure 3 shows the phases of the solution. Note that even by breaking the original problem into three subproblems, each one of the them is still NP-hard on its own. We have managed to reduce the magnitude of its complexity but it is still difficult to solve for large networks. 7. Study Environment In the formulation of problem (P), η e is defined as the cost of one unit of module M of the IP/MPLS layer link e. In our study, this is also referred to as the IP-cost. Likewise, β gk is the cost of one capacity unit of module type U k of the OTN layer link g. We refer to this cost as the U k -cost for (k = 0, 1, 2, 3, 4). At the DWDM layer, ξ f is the cost of one capacity unit of module N of the 7 DWDM layer link f. This will be referred to as the W- cost. According to [16], one of the cost ratios of future network elements is 8, 0.5, and 1, representing costs of a DWDM transponder, an IP/optical interface card, and a photonic OXC port, respectively. Based on our cost model in Section 5.2, the IP/MPLS layer cost becomes 2 (0.5) = 1, and the DWDM layer cost considering only the transponders and OXC port is 2 (8 + 1) = 18. Then, we add other costs to the DWDM layer to include the interface cost for line-cards connected to the transport end of a physical node to another physical node plus a physical distance cost; we assume this is a fixed cost of 10. This means when the IP/MPLS layer cost is 1, the DWDM cost 28. We transform this value so that when the IP-cost is 5, the W-cost is 140. We fixed the W-cost at 140 throughout our study and adjusted the other units costs to understand the impact due to the cost ratio change at different layers. Specifically, for the IP-cost, we vary the cost starting from IPcost= 5 and double the cost to IP-cost= 10, 20, and 40 to study the impact of different IP-cost scenarios while the W-cost is fixed. For the OTN layer parameter values, we have three possible cost scenarios of U k (0 k 3): UK-cr1: 2 U k = U k+1 UK-cr2: 3 U k > U k+1 UK-cr3: 3 U k = U k+1 To represent them, we consider the following U k cost (k = 0, 1,..., 4), 2/4/8/16/32, 2/5/13/20/50, and 2/6/18/54/162, for UK-cr1, UK-cr2, UK-cr3, respectively. Note that the actual values of U k s are not as important as the relationships between them. Note that we avoid unrealistic U k cost relationships such as when U k = U k+1 or when 4U k = U k+1. The former indicates an equal cost of two different OTN units, and the latter follows one of the signal multiplexing rules we explained in Section 3. We summarize each layer s cost values in Table 4. The experiments we conducted for this study with various parameter values allowed us to examine the impact of each layer cost and IP/MPLS modularity on

8 other layers and ultimately the overall network cost. We wish to answer a number of questions. For instance, how do the IP-cost and the size of M influence the required protection capacity at each layer and the overall network cost? How does the cost of each U k scenario affect the final types and numbers of U k s needed to satisfy a given set of demands? In this three-layer work setting, we consider the 14- node NSFNET in addition to a real-world existing 23- node metro topology as DWDM equipments are being employed into this medium-haul metro topology [21]. In our three-layer case, the NSFNET is considered as 14 nodes in each layer that results in 42 total nodes, and the number of physical fiber links F is 21. We assume that the virtual topologies of the IP/MPLS and OTN layers follow the connectivity of the physical layer, hence, E = G = 21 resulting in 63 total links. The total number of demands is 91 bidirectional demands assuming a demand between every LSR pair where the average demand is 5 Gbps. Therefore, we consider three values of M: 2.5, 5, and 10 Gbps to represent three cases: below average, equal average, and above average demand in the network. Similarly, the metro topology is considered as 23 nodes in each layer that results in 69 total nodes, and the number of physical fiber links F is 30. Again, we assume that the virtual topologies of the IP/MPLS and OTN layers follow the connectivity of the physical layer, hence, E = G = 30 resulting in 90 total links. The total number of demands is 253 bidirectional demands assuming a demand between every LSR pair where the average demand is 5 Gbps. Demands between the LSRs in the network are generated according to the demand model in [22]. For each demand, five primary paths and five protection paths are available at each layer. Figure 4 and 5 show the multilayer design of NSFNET and metro network when IPcost=5, M=2.5 Gbps, and the Uk-cost is UK-cr1 using our phased design approach. Here, a black link indicates that all capacity components of the layer are present on the link. If not a black link at the OTN layer, we use a blue dashed link to indicate the normal capacity, a green dashed link for the protection capacity, and a red dashed link for the capacity that realizes the IP/MPLS protection capacity. At the DWDM layer, we use the same colors to relate this layer s capacity with the OTN capacity components except that the orange dashed link is used for the DWDM layer protection capacity. All results are close-to-optimal derived by solving the three phases of problem (P) as described in Section 6 using the CPLEX 12.2 optimization package where we limit the number of nodes to be visited in the branch and cut tree to 500,000 by declaring set mip limits 8 Figure 4: 14-node per Layer NSFNET Design Figure 5: 23-node per Layer Metro Topology Design nodes The average optimality gap of the solutions is 1.83%. Table 5: Notation and Abbreviation Mapping. Notation Abbreviation Discreption y e N-IP Normal IP capacity y e P-IP Protection IP capacity w gk N-OTN Normal OTN capacity w gk P-OTN Protection OTN capacity w gk P-IP-OTN OTN capacity of P-IP b f N-W Normal fiber capacity b f P-W Protection fiber capacity b f P-OTN-W Fiber capacity of P-OTN b f P-IP-OTN-W Fiber capacity of P-IP-OTN 8. Illustrative Numerical Results 8.1. Total Network Cost To make it easier to follow the results, we present Table 5 that maps each capacity notation in the formulation to an abbreviation. Figure 6 and Figure 7 show the

9 Figure 6: Total NSFNET Cost Figure 8: Capacity of Different Components when IP=5 and UK-cr1 in NSFNET Topology Figure 7: Total metro Network Cost total network cost for each considered scenario in considered topologies. We observe that when the IP-cost is fixed, M=2.5 is more expensive than M=5 which is also more expensive than M=10. This is due to the following reason. Under fixed IP-cost, the larger the M the more demands it can satisfy without increasing the cost. We also observe the cost increase as we increase the IPcost from 5 to 40. By observing the effects of M and its cost, we note that both are essential to be considered jointly in multilayer networks. For instance, the cost of the case when IP=20 and M=2.5 is higher than when IP=40 and M=10. This is simply comparing the cost per Gbps (8 vs. 4). However, not only is the cost per Gbps important to consider, but also the size of M as this parameter will impact the lower layers. Obviously, when M and the IP-cost are fixed, the case of UK-cr3 is the most expensive followed by UK-cr2 and UK-cr1. This is because the gap between the U k -cost is the largest in UK-cr3. Moreover, the cost gap between UK-cr3 and UK-cr2 is larger than between UK-cr2 and UK-cr1. We will explain the reason in Section Capacity of Different Components Figure 8 and Figure 9 show the capacity required for each component when the IP-cost=5 and UK-cr1 in NSFNET and metro topology. We note that the protection capacity of each layer is larger than its normal capacity. Furthermore, the gap between the normal capacity and its protection capacity is increased as we go down in the network s layers. That is, the gap between N-IP and P-IP is less than the gap between the N-OTN and P-OTN, which is also less than the gap between N- W and P-W. This is primarily due to the larger granularity of the lower layers and the longer the protection paths. The gap is the largest in the DWDM layer where each wavelength bit rate N=100 Gbps (compared to M=2.5, 5, or 10 Gbps for the IP/MPLS layer) and the protection paths are usually longer than the primary paths. We note the same trends for different IP-cost and UK-cost scenarios in both topologies. We note that on average, 24% over the N-IP is required for N-OTN, and 33% over the N-OTN is required for N-W. In other words, the required N-OTN is N-IP + 24% of N-IP, and the required N-W is N-OTN + 33% of N-OTN Protection Capacity In this section, we present the protection capacity required for each individual layer. Figure 10 and Figure 11 depict the required P-IP for each scenario in NSFNET and metro topologies. We observe that the cases when M=10 requires more protection capacity than when M=2.5 and 5. M=2.5 is the best case to minimize P-IP. An interesting observation is that the IP-cost is not a significant factor when the M=2.5. Increasing the IP-cost when M=2.5 does not significantly change the required capacity. This is unlike the case when the impact of the IP-cost is noticeable in M=10 scenarios.

10 Figure 9: Capacity of Different Components when IP=5 and UK-cr1 in metro Topology Figure 10: Protection Capacity of the IP/MPLS Layer in NSFNET Topology Figure 12 and Figure 13 depict the required P-OTN for each scenario in both topologies. In this capacity component, the smallest required protection capacity is usually achieved under UK-cr3 and the largest is under UK-cr2. Moreover, the case when M=2.5 is often the case that minimizes P-OTN. This suggests that when M is below the average demand, it is often the best case to minimize the required protection capacity at the OTN layer. Figure 14 and Figure 15 show the required P-W under different scenarios. We note that UK-cr3 is the best case to minimize this capacity component along with M=2.5. The largest capacity is required under UK-cr1 and M=10. We also observe that the protection capacity on average is 22% more than the normal capacity at the IP/MPLS layer, 87% of the normal capacity at the OTN layer, and triple the normal capacity of the DWDM layer. We note that the protection capacity does not exceed the normal capacity at the OTN layer since the method of protection is a link restoration on a single path allows resource sharing. On the other hand, paths of the DWDM layer are link and node disjoint leading to much longer protection paths which explains the significant overprovisioned capacity in this layer. Figure 11: Protection Capacity of the IP/MPLS Layer in metro Topology Figure 12: Protection Capacity of the OTN Layer in NSFNET Topology 8.4. No. of OTN Signals for P-OTN Figure 16 and Figure 17 present the OTN layer U k signals required in the P-OTN component in both topologies. We observe that in UK-cr3 scenarios, U 4 is not used. This is because the cost of 2 U 3 is less than the cost of a U 4. And since 2 U 3 take only 80 Gbps of the wavelength, the rest is mostly filled with U 0. We observe that U 4 is used in UK-cr2 but with fewer numbers than U 3. It is only in UK-cr1 that U 4 becomes higher than U 3 due to the small gap between their cost. We 10 also observe the low numbers of U 1 and U 2 in all cases, suggesting their limited benefits in these scenarios. That is, the IP/MPLS demands will largely be served by U 0 and U 3 under UK-cr3 or a mix of U 4, U 3, with very low numbers of U 0, U 1, and U 2, under UK-cr1 and UK-cr2. The same general trends can be observed when varying the IP-cost or for different OTN capacity components. However, the numbers of U k in P-OTN are higher than those in N-OTN which explains the larger capacity required for P-OTN as shown in Figure 8 and Figure 9.

11 Figure 13: Protection Capacity of the OTN Layer in metro Topology Figure 16: No. of U k of P-OTN OTN Layer Components When IP=5 in NSFNET Topology Figure 14: Protection Capacity of the DWDM Layer in NSFNET Topology Figure 17: No. of U k of P-OTN OTN Layer Components When IP=5 in metro Topology Figure 15: Protection Capacity of the DWDM Layer in metro Topology We stated in Section 8.1 that the cost gap between UKcr3 and UK-cr2 is larger than between UK-cr2 and UKcr1. This is because of the costs of the U k used in each U k -cost scenario. For instance, if we want to consume the full capacity of an OTN link (100 Gbps) under UKcr1, then the optimal solution would be to use 1 U 4, which costs 32. Under UK-cr2, the optimal solution would also be 1 U 4 which costs 50. In UK-cr3, U4 is not the optimal solution since 2U 3 +16U 0 = 140 < 162, the cost of a U 4. We note that the gap between UK-cr1 11 and UK-cr2 in this example is (50 32 = 18, or about a 56% increase). On the other hand, the gap between UK-cr2 and UK-cr3 is ( = 90, or about a 180% increase) Cost vs. Protection Capacity We mentioned in Section 8.1 that the case when M=10 achieves the lowest overall network cost performance when the IP-cost is fixed. This may seem contradictory to the observations pointed out in Section 8.3 that more capacity is often required for protection when M=10 leads to more cost for protection. However, it is important to note that the overall network cost is determined by all capacity components not just the protection

12 components. More important, the cost per Gbps plays a significant role in the IP/MPLS layer. To illustrate, when the IP-cost=40, the costs per Gbps are 16 and 4 for the cases M= 2.5 and 10, respectively. To carry a 10 Gbps demand on a link, 4 Ms are required when M=2.5 is clearly more expensive than the 1 M required when M=10. From a cost perspective, the higher the size of M, the better. However, if we look from a capacity standpoint, a higher size of M implies more capacity needed at each layer Model (P) Special Cases Considering Figure 1, we observe a considerable amount of redundant capacity over the basic normal capacity components: N-IP, N-OTN, and N-W. This is because in our design model each layer is a 100% protected against a single link failure. Furthermore, the multilayer network is guaranteed to survive three link failures when each layer encounters a link failure at the same time. It may also survive more than a single failure per layer providing that a failed link of a primary path does not appear in the protection path of another failed primary path. However, in cases that such overallocated capacity for maximum protection is not required at all layers, we could develop special cases models that are derived from Model (P). For instance, if protection is not critical at the DWDM layer, we can eliminate P-W from the model. That is, modify Model (P) and derive Model-(W) that do not provide any protection to the normal DWDM layer capacity. Moreover, we can develop Model-(O) in which there is no OTN protection component for the OTN normal flow. A third model variation is Model-(I) where we exclude the IP protection component (P-IP) and its lower layer capacity components. The new models are as follows: Model-(W): (no DWDM layer protection) minimize (23) subject to constraints (1)-(15), (17) and (18). Model-(O): (no OTN layer protection) minimize (24) subject to constraints (1)-(7), (12), (14)-(16) and (18). Model-(I): (no IP layer protection) minimize (25) subject to constraints (1)-(2), (4), (6), (8)-(13), and (15)- (17). F = E η e (y e + y ) + G e e=1 g=1 k=0 4 β gk (w gk + w gk + w gk ) (23) + F ξ f (b f + b f + b f ) f =1 12 F = E η e (y e + y ) + G e e=1 F = E η e (y e ) + G e=1 g=1 k=0 4 β gk (w gk + w gk ) (24) + F ξ f (b f + b f + b f ) f =1 g=1 k=0 4 β gk (w gk + w gk ) (25) + F ξ f (b f + b f + b f ) f =1 Similar to our approach with Model (P) in section 6, we have solved the new models: Model (W), Model (O), and Model (I) using the same heuristic approach. Figure 18, Figure 19, and Figure 20 show the total cost achieved by these models under different UK-cr in metro topology. We observe the following points: Model (P) is our original comprehensive model that provides protection at every layer encompassing all model variations. Its cost serves as an upper bound since it is the most expensive model. We observe that the most expensive protection capacity component is usually the DWDM layer protection. This is why Model-(W) is the cheapest since it has no DWDM protection. There is an exception to the previous observation and that is when the cost per Gb is high at the IP/MPLS layer. That is, when IP=40 and M=2.5 the cost per Gb is 16, compared with cost per Gb equal 0.5 when IP=5 and M=10. In these cases, the IP layer protection become the most expensive capacity component. This explains why in such cases Model-(I) becomes the cheapest, even cheaper than Model-(W) when IP=40 and M=2.5 in the three figures. Increasing the UK-cost makes the previous incident, IP layer protection being most expensive, comes also with lower cost per Gb, e.g. when cost per Gb equals 8 (IP=20, M=2.5) in UK-cr3. IP-cost and M has no significant impact on cost achieved by Model-(I). This is dissimilar to the cost performance of the other models. This is because varying the IP/MPLS unit cost has no tangible impact on Model-(I) since this model does not include IP-P component.

13 Figure 18: Total Cost of Different Models under UK-cr1 in metro Topology Figure 20: Total Cost of Different Models under UK-cr3 in metro Topology Figure 19: Total Cost of Different Models under UK-cr2 in metro Topology Model-(O) is the most expensive model following the comprehensive Model-(P). This is because Model-(O) includes the two most expensive protection components: the DWDM and IP layer protection. The cost performance of all models is increasing as the the UK-cost values increases from UK-cr1 to UK-cr2 to UK-cr3. 9. Summary and Future Work In this paper, we presented a network protection design model for a IP/MPLS over OTN over DWDM three-layer network. In this architecture, we explicitly considered the OTN layer as a distinct layer with its own technological constraints. The survivability design provides protection only for the normal capacity of each 13 layer to reduce the protection resources while maximizing the protection. The design model ensures the survivability of the multilayer network for a minimum of three concurrent link failures in which each layer suffers a single failure. We present a heuristic solution to the problem by solving it in three phases to reduce the complexity of the problem in order to solve it for moderate size networks. We next presented a study based on various network parameters to understand their effects especially on the protection capacity and overall costs in two different topologies. We find that even though the case when M=10 (above the average demand) would be the best case to reduce the overall network cost, it is often the one that requires more protection capacity. The case when M=2.5 (below the average demand) would achieve the lowest amount of capacity needed for protection at each layer. This indicates that the optimal ratio of M to IP demand size is 1:2 would achieve the lowest amount of protection capacity for each layer. On the other hand, the ratio of 2:1 is the best to reduce the overall network cost. We observed that the protection capacity of each layer is larger than its normal capacity, noticeably at the lowest layer (DWDM layer), due to the longer protection paths and the larger granularity of this layer. We also noted the limited usage of the OTN layer U 1 and U 2 signals. Mainly, the IP/MPLS demands will be accommodated by U 0 s and U 3 s under UK-cr3 or a mix of U 4, U 3, with very low numbers of U 0 s, U 1 s, or U 2 s, under UK-cr1 and UK-cr2. We also present and solve three variations of our original model where we eliminate a protection component from each layer and compare their cost performance. We observe that the DWDM layer protection is often

14 the most expensive component. However, the IP/MPLS layer becomes more expensive when the IP/MPLS unit cost is high. For future work, we plan to expand our study by developing a heuristic algorithm to solve the problem for large size networks and provide an extensive analysis. We also plan to consider other protection mechanisms and compare their performance under the three-layer architecture. It may be noted that the design problem here is based on using a static traffic matrix. For dynamically changing load, a multi-hour approach can be taken, which uses traffic matrices at different time of the day. In our case, this will increase the number of variables significantly depending on the number of traffic snapshots used. Another possible direction is considering the demand uncertainty in the design problem. Acknowledgement This work was supported in part by National Science Foundation Grant # CNS References [1] I. Katib, D. Medhi, A study on layer correlation effects through a multilayer network optimization problem, in: Proc. of 23rd International Teletraffic Congress (ITC 2011), 2011, pp [2] I. Katib, D. Medhi, Optimizing node capacity in multilayer networks, IEEE Communications Letters 15 (5) (2011) [3] I. Katib, D. Medhi, A network protection design model and a study of three-layer networks with IP/MPLS, OTN, and DWDM, in: Proc. of 8th International Workshop on the Design of Reliable Communication Networks (DRCN 2011), 2011, pp [4] I. Katib, D. Medhi, IP/MPLS-over-OTN-over-DWDM multilayer networks: An integrated three-layer capacity optimization model, a heuristic, and a study, IEEE Transactions on Network and Service Management(Accepted). [5] M. Bhatta, Four challenges in backbone network, Huawei Communicate issue 44 (2008) [6] P. Demeester, M. Gryseels, A. Autenrieth, C. Brianza, L. Castagna, G. Signorelli, R. Clemenfe, M. Ravera, A. Jajszczyk, D. Janukowicz, K. Van Doorselaere, Y. Harada, Resilience in multilayer networks, IEEE Communications Magazine 37 (8) (1999) [7] S. De Maesschalck, D. Colle, A. Groebbens, C. Develder, A. Lievens, P. Lagasse, M. Pickavet, P. Demeester, F. Saluta, M. Quagliatti, Intelligent optical networking for multilayer survivability, IEEE Communications Magazine 40 (1) (2002) [8] D. Medhi, A unified approach to network survivability for teletraffic networks: Models, algorithms and analysis, IEEE Trans. on Communications 42 (1994) [9] M. Pióro, D. Medhi, Routing, Flow, and Capacity Design in Communication and Computer Networks, Morgan Kaufmann Publishers, [10] A. Fumagalli, L. Valcarenghi, IP restoration vs. WDM protection: is there an optimal choice?, IEEE Networks 14 (6) (2000) [11] L. Sahasrabuddhe, S. Ramamurthy, B. Mukherjee, Fault management in IP-over-WDM networks: WDM protection versus IP restoration, IEEE Journal on Selected Areas in Communications 20 (1) (2002) [12] E. Kubilinskas, M. Pióro, Two design problems for the IP/MLPS over WDM networks, in: 5th International Workshop on Design and Reliable Communication Networks (DRCN 2005), 2005, pp [13] H. Zhang, A. Durresi, Differentiated multi-layer survivability in IP/WDM networks, in: Proc. of IEEE/IFIP Network Operations and Management Symposium (NOMS 2002), 2002, pp [14] L. Lei, A. Liu, Y. Ji, A joint resilience scheme with interlayer backup resource sharing in IP over WDM networks, IEEE Communications Magazine 42 (1) (2004) [15] Y. Qin, L. Mason, K. Jia, Study on a joint multiple layer restoration scheme for IP over WDM networks, IEEE Networks 17 (2) (2003) [16] W. Bigos, B. Cousin, S. Gosselin, M. Le Foll, H. Nakajima, Survivable MPLS over optical transport networks: Cost and resource usage analysis, IEEE Journal on Selected Areas in Communications 25(5) (2007) [17] P. Pongpaibool, H. Kim, Impacts of GMPLS on topology design and protection planning of survivable IP-over-optical networks, in: Proc. of IEEE GlobeCom Workshops 2004, 2004, pp [18] J. Zhao, S. Wang, Z. Tang, Integrated multi-layer network survivability based on GMPLS to improve fault recovery time, in: Proc. of International Conference on Computer Engineering and Technology (ICCET 2009), Vol. 2, 2009, pp [19] I. Katib, IP/MPLS over OTN over DWDM multilayer networks: Optimization models, algorithms, and analyses, Ph.D. dissertation, University of Missouri Kansas City, May [20] ITU-T Recommendation G.709/Y.1331, Interfaces for the optical transport network (OTN), Geneva, December 2009, itu-t. [21] J. Serrat, A. Galis, Deploying and Managing IP over WDM Networks, ARTECH HOUSE, INC., [22] B. Fortz, M. Thorup, Internet traffic engineering by optimizing OSPF weights, Proc. IEEE INFOCOM (2000)

A Network Protection Design Model and A Study of Three-Layer Networks with IP/MPLS, OTN, and DWDM

A Network Protection Design Model and A Study of Three-Layer Networks with IP/MPLS, OTN, and DWDM A Network Protection Design Model and A Study of Three-Layer Networks with IP/MPLS, OTN, and DWDM Iyad Katib and Deep Medhi University of Missouri Kansas City, USA Abstract In this paper, we present an

More information

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks Iyad Katib and Deep Medhi Computer Science & Electrical Engineering Department University of Missouri-Kansas City, USA {IyadKatib,

More information

A Study on Layer Correlation Effects Through a Multilayer Network Optimization Problem

A Study on Layer Correlation Effects Through a Multilayer Network Optimization Problem A Study on Layer Correlation Effects Through a Multilayer Network Optimization Problem Iyad Katib and Deep Medhi University of Missouri Kansas City, USA Abstract Multilayer network design has received

More information

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland

More information

THE rising number of Internet users and advanced applications

THE rising number of Internet users and advanced applications 1 IP/MPLS-over-OTN-over-DWDM Multilayer Networks: An Integrated Three-Layer Capacity Optimization Model, a Heuristic, and a Study Iyad Katib, Member, IEEE, and Deep Medhi, Senior Member, IEEE Abstract

More information

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modelling Yong Liu 09/19/2006 1 Outline Examples Basic Problems Routing Restriction 2 1 Example: Intra-Domain Traffic Engineering

More information

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS IT Specialist Dorina LuminiŃa Copaci Gorj Court IT Expert Constantin Alin Copaci ANRCTI Bucharest Abstract: A large number of recovery mechanisms

More information

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS D. Harle, S. Albarrak, F. Ali Department of Electrical and Electronic Engineering, University of Strathclyde, U. K {d.harle,sbarrak,

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 5, JUNE

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 5, JUNE IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 5, JUNE 2007 949 Survivable MPLS Over Optical Transport Networks: Cost and Resource Usage Analysis Wojtek Bigos, Bernard Cousin, Stéphane

More information

Network Protection Design for MPLS Networks

Network Protection Design for MPLS Networks Network Protection Design for MPLS Networks Gaurav Agrawal, Dijiang Huang, Deep Medhi Computer Science and Electrical Engineering Department University of Missouri-Kansas City, MO 64110, USA Computer Science

More information

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks Wojciech Molisz, DSc, PhD Jacek Rak, PhD Gdansk University of Technology Department of Computer Communications

More information

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks Timothy Hahn, Shen Wan March 5, 2008 Montana State University Computer Science Department Bozeman,

More information

Design Methodologies and Algorithms for Survivable C-RAN

Design Methodologies and Algorithms for Survivable C-RAN 16 Regular papers ONDM 218 Design Methodologies and Algorithms for Survivable C-RAN Bahare M. Khorsandi, Federico Tonini, Carla Raffaelli DEI, University of Bologna Viale Risorgimento 2, 4136 Bologna,

More information

Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures

Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Anna Urra, Eusebi Calle, and Jose L. Marzo Institute of Informatics and Applications (IIiA), University of Girona, Girona

More information

Index Terms Backbone Networks Optimization, Resilience, Virtual Private Network, Traffic Demands and Traffic Flows

Index Terms Backbone Networks Optimization, Resilience, Virtual Private Network, Traffic Demands and Traffic Flows International Journal of Computer Science and Telecommunications [Volume 2, Issue 8, November 2011] 12 ISSN 2047-3338 Designing Different Models of Robust IP/MPLS over DWDM Networks Marko Rožman University

More information

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006 Master s Thesis Title Cross-Layer Traffic Engineering in IP over WDM Networks Supervisor Professor Masayuki Murata Author Yuki Koizumi February 15th, 2006 Graduate School of Information Science and Technology

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Master s Thesis Defense Ananth Nagarajan EECS Department, University of Kansas 10/13/98 Outline

More information

Optical Communications and Networking 朱祖勍. Nov. 27, 2017

Optical Communications and Networking 朱祖勍. Nov. 27, 2017 Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by

More information

Resilient IP Backbones. Debanjan Saha Tellium, Inc.

Resilient IP Backbones. Debanjan Saha Tellium, Inc. Resilient IP Backbones Debanjan Saha Tellium, Inc. dsaha@tellium.com 1 Outline Industry overview IP backbone alternatives IP-over-DWDM IP-over-OTN Traffic routing & planning Network case studies Research

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

Incorporating Protection Mechanisms in the Dynamic Multi-Layer Routing Schemes

Incorporating Protection Mechanisms in the Dynamic Multi-Layer Routing Schemes Incorporating Protection Mechanisms in the Dynamic Multi-Layer Routing Schemes Anna Urra, Eusebi Calle, Jose L. Marzo and Pere Vila Institute of Informatics and Applications (IIiA), University of Girona,

More information

Diversity Coded 5G Fronthaul Wireless Networks

Diversity Coded 5G Fronthaul Wireless Networks IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University

More information

Optimization Algorithms for Data Center Location Problem in Elastic Optical Networks

Optimization Algorithms for Data Center Location Problem in Elastic Optical Networks Optimization Algorithms for Data Center Location Problem in Elastic Optical Networks Mirosław Klinkowski 1, Krzysztof Walkowiak 2, and Róża Goścień 2 1 National Institute of Telecommunications, Warsaw,

More information

Simple Layout Algorithms To Maintain Network Connectivity Under Faults

Simple Layout Algorithms To Maintain Network Connectivity Under Faults Simple Layout Algorithms To Maintain Network Connectivity Under Faults Galen H. Sasaki 1 Department of Electrical, University of Hawaii 2540 Dole Street, Honolulu, HI 96822 USA Ching-Fong Su and David

More information

Progress Report No. 15. Shared Segments Protection

Progress Report No. 15. Shared Segments Protection NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury

More information

Complexity in Multi-level Restoration and Protection Strategies in Data Networking

Complexity in Multi-level Restoration and Protection Strategies in Data Networking Complexity in Multi-level Restoration and Protection Strategies in Data Networking mailto:dward@cisco.com October, 2002 NANOG 1 What makes it complex? Multi-technology network viewed as a stack of singlelayered

More information

Core Networks Evolution

Core Networks Evolution Core Networks Evolution Prof. Daniel Kofman daniel.kofman@enst.fr Telecom Paris - ENST Content Any Service, Any Time, Everywhere, Everyone Towards the triple play and beyond Main trends in Core Networks

More information

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Ankitkumar N. Patel, Chengyi Gao, and Jason P. Jue Erik Jonsson School of Engineering and Computer Science The University

More information

Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection

Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Victor Yu Liu Network Advanced Research, Huawei Technologies Santa Clara, California, USA yuliu@ieee.org Abstract

More information

A Review of Traffic Management in WDM Optical Networks: Progress and Challenges

A Review of Traffic Management in WDM Optical Networks: Progress and Challenges www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 8 August 2017, Page No. 22309-22313 Index Copernicus value (2015): 58.10 DOI: 10.18535/ijecs/v6i8.13

More information

Dynamic service Allocation with Protection Path

Dynamic service Allocation with Protection Path www.ijcsi.org 115 Dynamic service Allocation with Protection Path Loay Alzubaidi Department of Computer Engineering & Science, Prince Muhammad bin Fahd University AL-Khobar, Saudi Arabia Abstract Path

More information

Automatic Service and Protection Path Computation - A Multiplexing Approach

Automatic Service and Protection Path Computation - A Multiplexing Approach Automatic Service and Protection Path Computation - A Multiplexing Approach Loay Alzubaidi 1, Ammar El Hassan 2, Jaafar Al Ghazo 3 1 Department of Computer Engineering & Science, Prince Muhammad bin Fahd

More information

Toward the joint design of electronic and optical layer protection

Toward the joint design of electronic and optical layer protection Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS

More information

Cost-effective Burst-Over-Circuit-Switching in a hybrid optical network

Cost-effective Burst-Over-Circuit-Switching in a hybrid optical network Cost-effective Burst-Over-Circuit-Switching in a hybrid optical network Jens Buysse, Marc De Leenheer, Chris Develder, Bart Dhoedt, Piet Demeester Research Group Broadband Communication Networks (IBCN)

More information

Multi Protocol Label Switching

Multi Protocol Label Switching MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 MPLS: introduction

More information

OnePlanner. Unified Design System

OnePlanner. Unified Design System DATA SHEET OnePlanner Unified Design System OnePlanner is an advanced multi-layer network design and optimization tool that leverages Ciena s extensive background in Layer 1 control plane planning and

More information

IP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks. Dr. Greg M. Bernstein Grotto Networking 2004

IP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks. Dr. Greg M. Bernstein Grotto Networking 2004 IP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks Dr. Greg M. Bernstein Grotto Networking Page - 1 Problem Scope Bandwidth on Demand Medium to high speed bandwidth demands

More information

An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks

An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks Hui Wang, George N. Rouskas Operations Research and Department of Computer Science, North Carolina State University, Raleigh,

More information

MPLS Multi-Protocol Label Switching

MPLS Multi-Protocol Label Switching MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Computer Networks Design and Management - 1 MPLS: introduction

More information

THE EXPLOSIVE growth of Web-related services over the. A Practical Approach to Operating Survivable WDM Networks

THE EXPLOSIVE growth of Web-related services over the. A Practical Approach to Operating Survivable WDM Networks 34 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 A Practical Approach to Operating Survivable WDM Networks Murari Sridharan, Student Member, IEEE, Murti V. Salapaka, and

More information

Layer-Wise Topology Design for Cost Effective IP-Optical Networks

Layer-Wise Topology Design for Cost Effective IP-Optical Networks Communications and Networ, 2012, 4, 88-92 http://dx.doi.org/10.4236/cn.2012.41012 Published Online February 2012 (http://www.scirp.org/journal/cn) Layer-Wise Topology Design for Cost Effective IP-Optical

More information

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in

More information

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering GET/ENST Bretagne - Département Réseaux et Services Multimédia 2 rue de la Châtaigneraie - CS 1767-35576

More information

MODERN communication networks are constructed

MODERN communication networks are constructed 1000 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 4, AUGUST 2011 Cross-Layer Survivability in WDM-Based Networks Kayi Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, and Hyang-Won Lee, Member,

More information

A Novel Optimization Method of Optical Network Planning. Wu CHEN 1, a

A Novel Optimization Method of Optical Network Planning. Wu CHEN 1, a A Novel Optimization Method of Optical Network Planning Wu CHEN 1, a 1 The engineering & technical college of chengdu university of technology, leshan, 614000,china; a wchen_leshan@126.com Keywords:wavelength

More information

Resilient Networks. 3.1 Resilient Network Design - Intro. Mathias Fischer

Resilient Networks. 3.1 Resilient Network Design - Intro. Mathias Fischer Mathias Fischer Resilient Networks. Resilient Network Design - Intro Prepared along: Michal Pioro and Deepankar Medhi - Routing, Flow, and Capacity Design in Communication and Computer Networks, The Morgan

More information

Arc Perturbation Algorithms for Optical Network Design

Arc Perturbation Algorithms for Optical Network Design Applied Mathematical Sciences, Vol. 1, 2007, no. 7, 301-310 Arc Perturbation Algorithms for Optical Network Design Zbigniew R. Bogdanowicz Armament Research, Development and Engineering Center Building

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

1 COPYRIGHT 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED.

1 COPYRIGHT 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED. 1 The Road Towards Packet Optical Transport Networks: Optical Transport Networks Evolution to OTN/DWDM Gil Bento Alcatel-Lucent April 9 th ISCTE-IUL 2 AGENDA 1. BANDWIDTH DRIVERS 2. OPTICAL TRANSPORT NETWORK

More information

Design of Large-Scale Optical Networks Λ

Design of Large-Scale Optical Networks Λ Design of Large-Scale Optical Networks Λ Yufeng Xin, George N. Rouskas, Harry G. Perros Department of Computer Science, North Carolina State University, Raleigh NC 27695 E-mail: fyxin,rouskas,hpg@eos.ncsu.edu

More information

Study on a Joint Multiple Layer Restoration Scheme for IP over WDM Networks

Study on a Joint Multiple Layer Restoration Scheme for IP over WDM Networks Study on a Joint Multiple Layer Restoration Scheme for IP over WDM Networks Yang Qin, Lorne Mason, and Ke Jia, Nanyang Technological University Abstract In this article we investigate the problem of restoration

More information

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sanjay K. Bose, SMIEEE, Y.N. Singh, MIEEE A.N.V.B. Raju Bhoomika Popat Department of Electrical

More information

OPTICAL NETWORKS. Optical Metro Networks. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Optical Metro Networks. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Optical Metro Networks A. Gençata İTÜ, Dept. Computer Engineering 2005 Introduction Telecommunications networks are normally segmented in a three-tier hierarchy: Access, metropolitan,

More information

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111

More information

10 Optical Network Engineering

10 Optical Network Engineering 10 Optical Network Engineering George N. Rouskas Department of Computer Science North Carolina State University Raleigh, NC 27695-7534 Email: rouskas@csc.ncsu.edu 10.1 INTRODUCTION Over the last few years

More information

Standardization Activities for the Optical Transport Network

Standardization Activities for the Optical Transport Network Standardization Activities for the Optical Transport Network Takuya Ohara and Osamu Ishida Abstract The standardized technology for the Optical Transport Network (OTN) is evolving drastically. ITU-T SG15

More information

Assessing IP vs optical restoration using the opensource

Assessing IP vs optical restoration using the opensource Assessing IP vs optical restoration using the opensource Net2Plan tool Jose-Luis Izquierdo Zaragoza, Pablo Pavon-Marino Department of Information Technologies and Communications Universidad Politécnica

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Research on Control Routing Technology in Communication Network

Research on Control Routing Technology in Communication Network Appl. Math. Inf. Sci. 6 No. 1S pp. 129S-133S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Research on Control Routing Technology

More information

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0 A Comparison of Allocation Policies in Wavelength Routing Networks Yuhong Zhu a, George N. Rouskas b, Harry G. Perros b a Lucent Technologies, Acton, MA b Department of Computer Science, North Carolina

More information

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry

More information

ON JOINT RESTORATION OF PACKET-OVER-OPTICAL NETWORKS

ON JOINT RESTORATION OF PACKET-OVER-OPTICAL NETWORKS ON JOINT RESTORATION OF PACKET-OVER-OPTICAL NETWORKS Chunxiao Chigan 1,2 Gary W. Atkinson 1 Ramesh Nagarajan 1 Thomas G. Robertazzi 2 1 Bell Labs, Lucent Technologies, 101 Crawfords Corner Road, NJ 07733

More information

ECE442 Communications Lecture 4. Optical Networks

ECE442 Communications Lecture 4. Optical Networks ECE442 Communications Lecture 4. Optical Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Network Elements 1 WDM networks provide circuit switched end-to-end optical

More information

Progress Report No. 13. P-Cycles and Quality of Recovery

Progress Report No. 13. P-Cycles and Quality of Recovery NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 13 P-Cycles and Quality of Recovery The University of Canterbury Team 12 April 2006 Abstract Since the p-cycle resilience

More information

DIVERSION: A Trade-Off Between Link and Path Protection Strategies

DIVERSION: A Trade-Off Between Link and Path Protection Strategies DIVERSION: A Trade-Off Between Link and Path Protection Strategies Srinivasan Ramasubramanian and Avinash S. Harjani Department of Electrical and Computer Engineering University of Arizona, Tucson, AZ

More information

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Tibor Fabry-Asztalos, Nilesh Bhide and Krishna M. Sivalingam School of Electrical Engineering &

More information

WAVELENGTH-DIVISION multiplexed (WDM) optical

WAVELENGTH-DIVISION multiplexed (WDM) optical IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 1823 A Dynamic Routing Algorithm With Load Balancing Heuristics for Restorable Connections in WDM Networks Lu Ruan, Member,

More information

Maximization of Single Hop Traffic with Greedy Heuristics

Maximization of Single Hop Traffic with Greedy Heuristics Maximization of Single Hop Traffic with Greedy Heuristics Esa Hyytiä Networking Laboratory, HUT, Finland, email: esa@netlab.hut.fi, ABSTRACT Maximization of the single hop traffic has been proposed as

More information

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks Internet Traffic Characteristics Bursty Internet Traffic Statistical aggregation of the bursty data leads to the efficiency of the Internet. Large Variation in Source Bandwidth 10BaseT (10Mb/s), 100BaseT(100Mb/s),

More information

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National

More information

Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks

Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks Kwangil Lee Department of Electrical and Computer Engineering University of Texas, El Paso, TX 79928, USA. Email:

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Technical Report, April 2011 Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu

More information

From PoS to GFP - Abstract Thomas Hagmeister (Alcatel)

From PoS to GFP - Abstract Thomas Hagmeister (Alcatel) From PoS to GFP - Abstract Thomas Hagmeister (Alcatel) In multilayer networks for data and optical networks the traditional interconnection is facilitated today with PoS (Packet over SDH/Sonet) interfaces

More information

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 A Scalable Path Protection Mechanism for Guaranteed Network Reliability Under Multiple Failures Changcheng Huang, Senior Member, IEEE, Minzhe

More information

A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks

A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 2, APRIL 2003 285 A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks Hongyue Zhu, Student Member, IEEE, Hui Zang, Member,

More information

Efficient path protection using Bi-directional WDM transmission technology. Title

Efficient path protection using Bi-directional WDM transmission technology. Title Title Efficient path protection using Bi-directional WDM transmission technology Author(s) Li, J; Yeung, KL Citation Globecom - Ieee Global Telecommunications Conference, 2005, v. 4, p. 1910-1914 Issued

More information

DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS

DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS Shinya Ishida Graduate School of Information Science and Technology, Osaka University Machikaneyama 1-32, Toyonaka, Osaka, 0-0043

More information

Analysis of Optimal Sets of Survivable Paths in Undirected Simple Graph Applicable for Optical Networks

Analysis of Optimal Sets of Survivable Paths in Undirected Simple Graph Applicable for Optical Networks Analysis of Optimal Sets of Survivable Paths in Undirected Simple Graph Applicable for Optical Networks Z. R. Bogdanowicz 1,2 Intelligent Systems and Robotics Laboratory Armament Research, Development

More information

Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks

Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks Hwajung Lee, Hongsik hoi, Suresh Subramaniam, and Hyeong-Ah hoi Department of omputer Science and Electrical and omputer

More information

WDM Network Provisioning

WDM Network Provisioning IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the

More information

Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks

Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Franz Rambach Student of the TUM Telephone: 0049 89 12308564 Email: rambach@in.tum.de

More information

Topology Design of Large-Scale Optical Networks. Yufeng Xin

Topology Design of Large-Scale Optical Networks. Yufeng Xin ABSTRACT Yufeng Xin. Topology Design of Large-Scale Optical Networks. (Under the direction of Professor George N. Rouskas and Professor Harry G. Perros). Optical networks consisting of optical cross-connects(oxcs)

More information

Ericsson ip transport nms

Ericsson ip transport nms Ericsson ip transport nms Ericsson IP Transport NMS is the fully integrated and complete end-to-end O&M management solution for the IP and transport products used in mobile backhaul, metro, core and fixed/mobile

More information

Comparison of Protection Cost at IP or WDM Layer

Comparison of Protection Cost at IP or WDM Layer Comparison of Protection Cost at IP or WDM Layer Mauro Cuna Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it Marco Mellia Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it

More information

Optical networking technology

Optical networking technology 1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the

More information

Network Survivability

Network Survivability Network Survivability Bernard Cousin Outline Introduction to Network Survivability Types of Network Failures Reliability Requirements and Schemes Principles of Network Recovery Performance of Recovery

More information

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks Proceedings of the International Conference on Computer and Communication Engineering 008 May 3-5, 008 Kuala Lumpur, Malaysia A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

More information

Strategy for SWITCH's next generation optical network

Strategy for SWITCH's next generation optical network Strategy for SWITCH's next generation optical network Terena Network Architecture Workshop 2012 Felix Kugler, Willi Huber felix.kugler@switch.ch willi.huber@switch.ch 21.11.2012 SWITCH 2012 Introduction!

More information

Flow Isolation in Optical Networks

Flow Isolation in Optical Networks Flow Isolation in Optical Networs Hui Wang, George N. Rousas Operations Research / Department of Computer Science North Carolina State University Raleigh, NC 27695-8206 USA Email: {hwang4,rousas}@ncsu.edu

More information

Features, Inputs/outputs for most frequent tools: Exel, PLANITU

Features, Inputs/outputs for most frequent tools: Exel, PLANITU ITU / BDT- COE workshop Nairobi, Kenya, 7 11 October 2002 Network Planning Lecture NP-5.2 Features, Inputs/outputs for most frequent tools: Exel, PLANITU ITU COE Network Planning Workshop, Nairobi, Kenya,

More information

Trends and evolution of transport networks. F.-Joachim Westphal SL SI, IBU Telco, SSC ENPS (known as Technology Center before)

Trends and evolution of transport networks. F.-Joachim Westphal SL SI, IBU Telco, SSC ENPS (known as Technology Center before) Trends and evolution of transport networks F.-Joachim Westphal SL SI, IBU Telco, SSC ENPS (known as Technology Center before) Carriers Dilemma... Presented 2001 Demand growing slowed down but it still

More information

DYNAMIC ROUTING WITH PARTIAL INFORMATION IN MESH-RESTORABLE OPTICAL NETWORKS *

DYNAMIC ROUTING WITH PARTIAL INFORMATION IN MESH-RESTORABLE OPTICAL NETWORKS * DYNAMIC ROUTING WITH PARTIAL INFORMATION IN MESH-RESTORABLE OPTICAL NETWORKS * Murari Sridharan, R. Srinivasan and Arun K. Somani Dependable Computing & Networking Laboratory Department of Electrical and

More information

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Amit Shukla, L. Premjit Singh and Raja Datta, Dept. of Computer Science and Engineering, North Eastern Regional Institute

More information

LSP placement in an MPLS-TP mesh network with shared mesh protection mechanism

LSP placement in an MPLS-TP mesh network with shared mesh protection mechanism LSP placement in an MPLS-TP mesh network with shared mesh protection mechanism CLÁUDIO ROBERTO FERREIRA COSTA, WAGNER LUIZ ZUCCHI Escola Politécnica Departamento de Engenharia de Sistemas Eletrônicos Universidade

More information

Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks

Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks André C. S. Donza, Carlos R. L. Francês High Performance Networks Processing Lab - LPRAD Universidade

More information

Application-Aware Protection in DWDM Optical Networks

Application-Aware Protection in DWDM Optical Networks Application-Aware Protection in DWDM Optical Networks Hamza Drid, Nasir Ghani, Bernard Cousin To cite this version: Hamza Drid, Nasir Ghani, Bernard Cousin. Application-Aware Protection in DWDM Optical

More information

On Efficient Protection Design for Dynamic Multipath Provisioning in Elastic Optical Networks

On Efficient Protection Design for Dynamic Multipath Provisioning in Elastic Optical Networks On Efficient Protection Design for Dynamic Multipath Provisioning in Elastic Optical Networks Xiaoliang Chen, Shilin Zhu,DiChen, Shuguang Hu, Chang Li, Zuqing Zhu School of Information Science and Technology,

More information

Shared Protection by Concatenated Rings in Optical WDM Networks

Shared Protection by Concatenated Rings in Optical WDM Networks Shared Protection by Concatenated Rings in Optical WDM Networks Hyunseung Choo, Minhan Son, Min Young Chung, and Tae-Jin Lee School of Information and Communication Engineering Sungkyunkwan University

More information

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima Graduate School of Information Science and Technology, Osaka University - Yamadaoka, Suita, Osaka 60-08, Japan

More information