IN transport communication networks two rather diverse

Size: px
Start display at page:

Download "IN transport communication networks two rather diverse"

Transcription

1 apacity-efficient Planning of Resilient Networks with p-ycles laus G. Gruber, ominic. Schupke fclaus.gruber, Munich University of Technology Institute of ommunication Networks Munich, Germany bstract The p-ycle concept is an efficient way to protect the network traffic against failures of network elements. We present the methods and issues related to network planning, management and operations of p-ycles and highlighttheadvantages usingthis concept. urthermore we report efficiency results of a case-study of the deployment of p-ycles in Wavelength ivison Multiplex (WM) networks. I. INTROUTION IN transport communication networks two rather diverse restoration concepts were developed and implemented in the last years: Ring-based and mesh-based restoration. Ring concepts such as the bi-directional lineswitched ring (LSR) provide cyclic structures to protect the network against failures of network elements. The switching mechanisms of ring are quite simple. Restoration times of ms can be achieved []. However, the ring concepts need at least 00% capacity redundancy for the primary, non-preemtible traffic. ecause of scalability problems and ring-constrained routing % redundancy can be observed in real networks. In mesh restoration networks the spare capacity is much more accessible and reusable in the network. The required spare to working resources ratio can achieve values of 50-70% []. However, due to the more complex distributed signalling the restoration speeds of ring-concepts can hardly be reached. urthermore in SONT/SH networks mesh restoration is traditionally centralized and needs an interaction with a central management system. This involves slow restoration times and all problems of a centralized system (e.g. the single point of failure issue). In 998 Grover and Stamatelakis introduced the concept of p-ycles that unites the advantages of both schemes - the fast recovery speed of rings with the capacity efficiency of mesh restorable networks [2], [3]. The p-ycle concept can be applied to a great variety of network types such as WM, IP, MPLS, MP S, SH, SONT, SON and STN networks. In this paper we summarize the general concept of p-ycles. We present the methods and issues related to network planning, management and operations of p-ycles and highlight the advantages using the p-ycle concept. urthermore we report efficiency results of a case-study of the deployment of p-ycles in Wavelength ivison Multiplex (WM) networks..g. Gruber is supported by the German ederal Ministry of ducation and Research and Siemens G, project KING... Schupke is supported by the German ederal Ministry of ducation and Research, project TransiNet. The next section gives an overview of the general concept of p-ycles. Section III describes a method of combining different p-ycles to protect a whole network. Section IV gives an overview of the procedures to obtain an optimal set of p-cycles. Section V deals with possible alternatives to reconfigure a network. In Section VI we summarize the pros and cons of the concept. Then we present results of a case study considering the deployment of p-ycles in WM networks and conclude the paper. II. TH p-yl ONPT Similar to LSR the p-ycle concept is based on cyclic structures, but unlike LSR p-ycles have higher coverage. Spare capacity is reserved along a cycle and can be shared to protect several elements of a network (:N ). ctions from two nodes at the endpoints of the failure are sufficient to detour the traffic around the failure using the pre-configured capacities given through the cycle. (c) X ig.. network with one link p-ycle that protects on-cycle links (by one path, ) and straddling links (by two paths, (c) and (d)) (d) X X

2 There are two basic types of p-ycles. Link p-ycles are able to protect the working capacity of a link. Node-encircling p-ycles protect all traversing paths through a single node. igure shows an example of a network with one link p- ycle. The p-ycle is able to protect on-cycle links as shown in igure (Links -, -, -, -, -). dditionally, the same p-ycle is able to protect straddling links. straddling link is a link whose endpoints are on-cycle nodes of one p-ycle but does not belong to the cycle itself (Links -, -). The working capacity of a straddling link can be protected by the two alternative paths provided by the p-ycle (igure (c),(d)). This characteristic is one of the main advantages of the p-ycle concept. The working capacity of a straddling link can be divided into two parts and the required detour-capacity along the cycle can be halved. The p-ycle of igure is able to protect 5 on-cycle and 2 straddling links. The additional of straddling links provides much more working capacity coverage by p-ycle compared to pure ring-based schemes. G ig. 2. network with one node p-ycle protecting node G. The traffic is detoured on two paths aroung the failed node until it reaches the outgoing node igure 2 shows an example of a node p-ycle. fter detecting a failure of node G neighbor node detours the traffic that originally would traverse the failed node G to the preconfigurednode cycle. The detoured traffic visits the neighbor nodes of the failed node until it reaches its outgoing node [4]. The p-ycles are embedded in a mesh topology. p-ycles can be installed as a fixed cycle infrastructure in the network (similar to SH/Sonet rings) or as virtual cycles, which we consider in the following. p-ycles are formed in the spare capacity of the network. reconfiguration of the cycles can be done without affecting the working traffic. ecause of this, the cycles can be assigned freely and flexibly in the network. epending on the network type, different assignments for p- ycles are necessary. or instance, in WM networks capacity, i.e. wavelengths, must be reserved. or the switching, a local action of, e.g., a pair of micro-mirrorswitches in the neighbor node are sufficient to detour the traffic to its p-ycle. In IP-networks the capacity of IP p-ycles need not to be reserved explicitly. In MPLS, for example, additional GX labels can be used to define a p-ycle that are used as a route around a failure. III. TH OMINTION O p-yls To protect working traffic at 00%, the reserved capacity on the cycle links must equal the maximum of the highest on-cycle capacity and the highest portion (e.g. /2) of the straddling capacity. n example is given in igure 3. When using only one p-ycle to protect the demand pattern of igure 3, a cycle must be found that is able to detour the highest traffic demand, i.e. protecting a failure of link - (igure 3). reduction of reserved resources can be achieved by using two different p-ycles each protecting a fraction of the traffic demand of the links (igure 3(c)). If the link - fails, its entire traffic can be detoured around the failure using two different cycles. dditionally, due to the straddling, link - is protected by 2*6+4 = 6 capacity units. 0 6 (c) 6 4 ig. 3. Protection of a network with demand with one p-ycle (reserved capacity = 4*0 = 40) and with a combination of two p-ycles (c) (reserved capacity = 4*6 + 3*4 = 36) It is obvious, that the possible number of straddling links of a p-ycle will increase by its length. In fact, longer p-ycles are accessible to more links than shorter ones [5]. However, they do require a reservation of the highest capacity amount on each of its links. or that reason, a combination of several smaller cycles each protecting a part of the network or even capacity fractions of protected links may reduce the total sum of reserved capacity. or efficient planning, an optimal set of p- ycles can be computed. IV. OTINING N OPTIML ST O p-yls setofp-ycles must be found that minimizes the used reservation capacity costs and protects all considered network elements. igures 4 to 6 outline the general high-level process 6 0

3 of this optimization that is part of network planning and operations. To find an optimal set of cycles all potential cycles of the network must be known. possible cycle search process is shown in igure 4. The cycles of a network (or graph) can easily be found by applying well studied algorithms like readth irst Search (S) or Johnson s algorithm [6] to a given topology. The number of cycles of a graph can be rather large [7] and the computation times of these algorithms can be long. However, this calculation needs to be performed only once for a given network topology. dditional constraints for the cycle search like the maximum allowed physical length or hop-count can decrease the number of found cycles and reduce the size of the optimization, which can yield sub-optimal results. However, these constraints are also required when considering the longer path lengths during the detouring along a cycle, in order to restrict delay and signal degradation. ycle Reduction links/nodes removed ig. 4. ycle Search ycle atabase ycle onstraints (e.g. length) ycle determination process links/nodes added If links or nodes are removed from the topology (e.g. deinstallation), cycles using these links or nodes have to be taken out of the database. fter this, a p-ycle reconfiguration can be necessary. n addition of links or nodes can help to improve the capacity consumption and thus the p-ycles (to be selected) can be recalculated. lthough a combined routing and p-ycle optimization may increase the efficiency of the network, the two processes can be separated from each other. This allows the network operator to use a flexible routing and the algorithm of his or her choice that meets his or her requirements. igure 5 shows that the demand routing of the process is based on the network topology, the capacity on the network links, the demand matrix and additional routing constraints of the network operator. The algorithm must be processed at the installation of a new network, if a rerouting of the network traffic is desired and if new demand(s) occur. In particular for new networks a global routing can be performed, whereas for new demands paths can be added without changing the present paths ( incremental ). The results of the routing process, i.e. the paths and the capacity of the working traffic, are assigned to the network. ased on this information the optimal set of cycles can be found using the process shown in igure 6. emands new demand emand Routing (global or incremental) Ressource llocation (working capacity) ig. 5. apacity on links Routing of the demands onstraints The cycles are assigned (virtually emedded) in the remaining spare capacity of the network. This spare capacity results via reducing the total network capacity by the already assigned working capacity of the demand traffic. set of cycles is chosen from all possible cycles of the network (obtained by the cycle search algorithm, igure 4) that is based on the known topology. The topology and the capacity along these cycles must be adjusted to be able to protect the working traffic in case of an element failure. The optimization problem can be formulated as an Integer Linear Problem (ILP) as shown in [], [8] and solved in a centralized way. lternatively it can be solved using distributed techniques as shown in [2]. fter this optimization process, the optimized set of cycles can be allocated and associated to their appropriate working paths. ach working capacity is protected by at least one p-ycle. V. RONIGURTION O TH NTWORK p-ycles are able to protect the network against one failure within a cycle domain only [9]. of two simultaneously failed elements by a single p-ycle is not possible. If there is no additional unused p-ycle that is able to protect the second failing element, the network will be vulnerable until the initial failure is repaired. igure 6 shows a possible reconfiguration process (dasheddotted lines). If an element of the configured network fails, the neighbor nodes switch the affected working traffic to the p- ycles. The traffic is detoured around the failure. fter repair of the failure the working traffic can be reverted back to the original paths. uring the failure, however, the elements that were originally protected by the cycles in use are not protected. fast readjustment of the p-ycles can temporarily protect these paths. To readjust the set of p-ycles, either a global or an incremental optimization can be performed. In the case of a global optimization the whole network topology is readjusted. The failing element itself as well as cycles that include the failing element must be erased from the topology and the cycle-database (dashed-dotted in igure 4). l-

4 dapted Spare apacity total - (working + ) deassignment (unprotected elements) ycle atabase dapted ycle atabase of the unprotected elements Rerouting of the affected demands Optimization Optimized Set of ycles Spare apacity (total - working) onstraints of all demands of the new demand dapted Spare apacity (total - working) dapted Spare apacity total - (working + ) no dapted global incremental Reconfiguration? Reconfiguration Protection Switching in the network (automatic) ig. 6. failure in the network Ressource allocation () working to assignment yes new incremental routed demand Process to find an optimal set of p-ycles global optimisation no Present p-ycles reconfiguration? lready protectable? fix present p-ycles though a rerouting of a demand is not necessary, the detoured traffic-paths along the cycles may be rather long compared to a direct routing and may be rerouted. Given the updated information, a new optimal set of p-ycles can be found using the optimation methods described in Section IV. The optimization of the whole network may take long. However, almost all elements are still protected by the remaining p- ycles that are not used for. The only elements that are no longer protected are the elements that were previously protected by the now used cycles. dditionally, network elements along the used cycles carry more demand capacity compared to the optimized failure free network. t the beginning of the incremental optimization process the traffic on the elements that are no longer protected as well as the unprotected traffic along the used p-ycles must be identified and deallocated from the cycles. Only this traffic must be protected by additional cycles. Since the remaining traffic needs not to be reoptimized, the spare capacity, i.e. the free capacity of the network, can now be recalculated as the total network capacity diminished by the remaining fixed working and capacity. The network topology, reduced by the failing element as well as the cycle database, reduced by all cycles that traverse the failing element, can be used as input for the following optimization. This process yields additional cycles that protect the traffic on previously unprotected network elements. The reduced number of elements allows faster recalculation times for the optimization process but the results may not be as capacity efficient as the results from the global reconfiguration process. Similar to the failure scenario, a change of the demand matrix and a reconfiguration of the network can either be done globally or incrementally (right part of igure 6). Using global rerouting, all demands are rerouted according to igure 5. With the updated spare capacity information a new optimal set of cycles following Section IV can be obtained. When using incremental rerouting, only the new demand is routed in the network. The other demand routes remain fixed. If the resulting working traffic on the paths is not already protectable by assigned cycles, new p-ycles must be found by the

5 optimization process. If a global reoptimization of the used p-ycles is desired, a new set of cycles must be found that protects all demands. Should the present p-ycles remain fixed, the only unprotected traffic results from the new demand. dditional cycles must be found protecting the new routed traffic. or that reason the spare capacity is set to the total capacity of the network reduced by the remaining protected working and capacity. The optimization process configured with this spare capacity yields additional cycles that protect the new demand. In general, due to the decreased complexity and amount of traffic that should be protected, an incremental optimization is faster but may yield lower capacity efficiencies compared to a global optimization process. WP WM-network consists of nodes that are not able to perform any wavelength conversion. Thus the entire path as well as the p-ycle must have the same wavelength. If a lightpath becomes too long, it can be degraded too much or does not meet the delay requirements anymore. Thus, in this simulation we survey the capacity efficiency and calculation times of the p-ycle concept regarding a restriction of the allowed p-ycle lengths. In the study we optimize the pan-european OST-239 network with nodes and 26 links (igure 7) []. Throughout the simulation we use two bi-directional fiber-pairs per link. The number of wavelengths in a fiber is 28. VI. PROS N ONS O TH p-yl ONPT The p-ycle concept is a very fast and capacity efficient way to protect a network against element failures. The capacity efficiencies of mesh-restorable networks can be reached. urthermore local actions of neighbor nodes of the failing element are sufficient to detour the traffic around the failure and no complex signaling is needed in case of a failure. ue to the simple mechanisms low-cost nodal elements are possible and the fast restoration times of ring concepts can be reached []. The cycles are virtually embedded in a mesh network. There is no fixed association of the capacities with the network demand traffic like it is in known ringconcepts. If necessary, an easy reconfiguration of the cycles can be done using a network management system. lthough the capacity efficiency can further be increased by a combined routing and process, it is possible to separate them from each other. The flexible and adaptive method of the p-ycle process is then independent of the used routing methods giving the full freedom to choose the desired routing method. urthermore the failure-affected traffic is detoured along predictable and well-defined paths. differentiation of quality of service and recovery classes [0] can be done using different cycles or even different recovery concepts for each class. s with ring and mesh concepts the path-length must be considered. ue to the cyclic structure, the route around the failure can become long in comparison to the original failure-free route. The p-ycle concept may be better in more connected networks where the number of candidate cycles is higher. ig. 7. of the node core pan-european test network OST 239. istances in km The demand is based on [] where the traffic matrix is adjusted to a usable amount of lightpath demands (yielding a load of 348 lightpath demands). emands are routed on the shortest path, in the case of routing with equal link metrics, and with routing2 we use metrics reciprocal to the number of free wavelengths of the link that are recalculated each time a demand has been routed. link with no remaining available capacity will be removed for the routing process. The p-ycle optimization was formulated in MPL [2] and solved by PLX [3]. The optimization process minimizes the number of required spare wavelengths. Obviously, the best p-ycle candidates can be chosen, if there are no restrictions to the set of possible cycles. VII. PLOYMNT O p-yls IN WM NTWORKS In this section we present solutions from a case study considering the deployment of p-ycles in WM-networks [8]. We consider virtual wavelength path (VWP) and wavelength path (WP) networks. VWP WM-network consists of nodes that are able to perform full wavelength conversion, i.e. a route can disregard the wavelength.. apacity fficiency igure 8 shows the wavelength efficiency ratio capacity to working capacity over the maximum allowed cycle length for the scaled demand pattern that is routed according to the two routing alternatives. or cycle lengths greater than 3000 km feasible solutions can be obtained for the unscaled demand. ven efficiency ratios of

6 spare capacity to working capacity ratio demand_, routing_ 0 * demand_, routing_ 0 * demand_, routing_2 4 * demand_, routing_ infinity maximum allowed p-cycle length in km ig. 8. VWP case: the efficiency ratio over the allowed maximum physical p-ycle length for the scaled patterns. less than 60% can be reached allowing cycle-lengths greater than 4500 km. This efficiency improves in the situation where more traffic is routed in the network through a scaling by 0 of the pattern. n explanation of this behavior can be seen in igure 9. scaling of the demand pattern by 0 may yield better spare to working ratios ig. 9. scaling of the demand pattern may yield better spare to working ratios: 7/7 = 00%, compared to the scaled demand pattern 60/70 = 86%. 0 lthough feasible solutions are available for cycle lengths greater 4000 km only, the capacity needs between 45% to 59% as much as working capacity. significant gain can be reached by using routing2. The routed demand is distributed more evenly in the network, as it is the case for the scaled pattern. ongested links, links with much more demand capacity in comparison to their neighbor links, can be prevented and cycles with less capacities are sufficient to detour the traffic. The network capacity limit is achieved through a scaling by 4 of the demand pattern. However, feasible solutions can still be achieved using routing2 with a cycle-length restriction greater than 5500 km. Working demands use 6% of the network capacity and the capacity takes not more than 36% of the working capacity. Similar results on capacity efficiencies can be found in [], [2]. lthough the OST 239 network has 7062 different elementary cycles, the set of p-ycles used by the optimization process is only between 7 and 26 for routing. The overall spare to working capacity ratio of the Wavelength Path (WP) network is given in igure 0. The wavelengths are routed by routing and assigned first by order of the fiber and then by the first fit principle. The behavior of the efficiency ratio is similar to the VWP case (ig. 8). In a WP network, however, a p-ycle must have the same wavelength along its entire cycle. No wavelength conversion is possible at any node in case of a failure. Thus, a p-ycle has to have a color. The cycle is only accesible for lightpaths with the same wavelength as the cycle. This characteristic adds additional constraints to the optimization process [8]. Thus the WP case performs slightly less efficient. fficiency ratios lower 73% can still be reached by restricting the maximum allowed p-ycle length to values greater 5000 km. spare capacity to working capacity ratio demand_, routing_ 2.5 * demand_, routing_ 5.0 * demand_, routing_ infinity maximum allowed p-cycle length in km ig. 0. WP case: the efficiency ratio over the allowed maximum physical p-ycle length for the scaled patterns.. omputation Times igure shows the computation times of the optimization process. The long lasting cycle search algorithms must be performed only once for any given network. This computation can be done off-line. or VWP the MPL/PLX optimization times are very fast and are in the order of seconds for our testnetwork. n optimization and adaption of the chosen set of cycles can be done in a very short time. This offers the possibility to add, drop or reroute traffic in the network with a following on-line optimization or adaption process of p-ycles. VIII. ONLUSION The p-ycle concept represents an attractive solution for the of a large variety of networks: oth fast restoration times, and high capacity efficiency can be achieved while the planning and management process can be kept simple.

7 computation time in seconds Preparation ycle search MPL processing PLX infinity maximum allowed p-cycle length in km ig.. omputation times for preparation (graph construction and routing) for the cycle search, for the MPL preprocessing (data generation and processing) and for the execution of the solver PLX in the VWP case with 0 * demand and routing [6] onald. Johnson, inding all the elementary circuits of a directed graph, SIM J. omput., vol. 4, no., pp , 975. [7] H. lt, U. uchs, and K. Kriegel, On the Number of Simple ycles in Planar Graphs, in Springer Lecture Notes in omputer Science and 335, erlin, 997, Proceedings, Workshop on Graph-Theoretic oncepts in omputer Science - WG 97, pp [8] ominic. Schupke, laus G. Gruber, and chim utenrieth, Optimal onfiguration of p-ycles in WM Networks, in Proc. of the I I 2002, New York, [9] ominic. Schupke, chim utenrieth, and Thomas ischer, Survivability of Multiple iber uct ailures, in Proc.of RN Workshop, 200. [0] chim utenrieth and ndreas Kitrstaedter, R-QoS The Integrated Provisioning of Resilience and QoS in MPLS-based Networks, in Proc. of the I I 2002, New York, 200. [] P. atchelor et al., Ultra high capacity optical transmission networks: inal report of action OST 239, [2] R. ourer,. M. Gay, and. W. Kernighan, MPL: Modeling Language for Mathematical Programming, oyd & raser Publishing o., anvers, M, US, 993. [3] PLX 6.6.0, In this paper we described the functionality of p-ycles protecting nodes and links. n optimal configuration of p-ycles can be obtained by off-line methods for the green-field planning case and for the in-the-loop management of topology and demand changes or reconfigurations. However, automated plug-and-play like methods using decentralized configuration instances are also possible. p-ycles involve advantages for the operations of the networks. Since p-ycles adapt to a given demand routing, paths selected for working demands can be chosen independently from the mechanism. ny (re-)configuration of the capacity for the p-ycles does not affect the (active) working paths. We further presented a case study that shows high efficiency values of link p-ycles in WM-networks. One specific issue becomes the lengths of the p-ycles. The paths can become long. Improvements are possible by using heuristic methods instead of an integer linear optimization for the off-line computation and are for further study. RRNS [] W.. Grover and. Stamatelakis, ridging the Ring-Mesh ichotomy with P-ycles, in Proc. of RN Workshop, [2] W.. Grover and. Stamatelakis, ycle-oriented distributed preconfiguration: ring-like speed with mesh-like capacity for self-planning network restoration, in Proc. of I, 998. [3] W.. Grover, John ourcette, and Matthieu loqueur, New Options and Insights for Survivable Transport Networks, in I ommunications Magazine 0/2002, [4]. Stamatelakis and W.. Grover, IP layer restoration and network planning based on virtual cycles, I JS, vol. 8, no. 0, Oct [5]. Stamatelakis and W.. Grover, Theoretical underpinnings for the efficiency of restorable networks using preconfigured cycles ( p-cycles ), I Trans. on omm., vol. 48, no. 8, ug 2000.

p 2 -Cycles: p-cycles with Parasitic Protection Links

p 2 -Cycles: p-cycles with Parasitic Protection Links p -ycles: p-ycles with Parasitic Protection Links Long Long hmed. Kamal ept. of lectrical and omputer ng., Iowa State University, mes, I, U.S.. -mail: {longlong, kamal}@iastate.edu bstract The p-cycle

More information

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland

More information

Progress Report No. 13. P-Cycles and Quality of Recovery

Progress Report No. 13. P-Cycles and Quality of Recovery NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 13 P-Cycles and Quality of Recovery The University of Canterbury Team 12 April 2006 Abstract Since the p-cycle resilience

More information

Bridging the Ring-Mesh Dichotomy with p-cycles:

Bridging the Ring-Mesh Dichotomy with p-cycles: Bridging the Ring-Mesh Dichotomy with p-cycles: Ring-like speed with mesh-like capacity Wayne D. Grover, Demetrios Stamatelakis TRLabs, University of Alberta, Edmonton, Alberta, Canada DRCN 2000 April

More information

Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks

Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks Hwajung Lee, Hongsik hoi, Suresh Subramaniam, and Hyeong-Ah hoi Department of omputer Science and Electrical and omputer

More information

p-cycle Protection in Wavelength Routed Networks

p-cycle Protection in Wavelength Routed Networks p-cycle Protection in Wavelength Routed Networks Christian Mauz Communication Technology Laboratory ETH Zurich Switzerland mauz@nari.ee.ethz.ch Abstract The concept of p-cycle protection (PCP) in virtual

More information

IO2654 Optical Networking. WDM network design. Lena Wosinska KTH/ICT. The aim of the next two lectures. To introduce some new definitions

IO2654 Optical Networking. WDM network design. Lena Wosinska KTH/ICT. The aim of the next two lectures. To introduce some new definitions IO2654 Optical Networking WDM network design Lena Wosinska KTH/ICT 1 The aim of the next two lectures To introduce some new definitions To make you aware about the trade-offs for WDM network design To

More information

Progress Report No. 15. Shared Segments Protection

Progress Report No. 15. Shared Segments Protection NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury

More information

Resilient IP Backbones. Debanjan Saha Tellium, Inc.

Resilient IP Backbones. Debanjan Saha Tellium, Inc. Resilient IP Backbones Debanjan Saha Tellium, Inc. dsaha@tellium.com 1 Outline Industry overview IP backbone alternatives IP-over-DWDM IP-over-OTN Traffic routing & planning Network case studies Research

More information

An Approach to Dual-failure Survivability for Multi Quality Data Based On Double p-cycle

An Approach to Dual-failure Survivability for Multi Quality Data Based On Double p-cycle An Approach to Dual-failure Survivability for Multi Quality Data Based On Double p-cycle Ajeeth Singh 1 Skyline Institute of Engineering and Technology, Greater Noida, UP, India. 2 MVN Education City Palwal,

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY /$ IEEE

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY /$ IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY 2010 67 1+NNetwork Protection for Mesh Networks: Network Coding-Based Protection Using p-cycles Ahmed E. Kamal, Senior Member, IEEE Abstract

More information

ECE442 Communications Lecture 4. Optical Networks

ECE442 Communications Lecture 4. Optical Networks ECE442 Communications Lecture 4. Optical Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Network Elements 1 WDM networks provide circuit switched end-to-end optical

More information

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Ankitkumar N. Patel, Chengyi Gao, and Jason P. Jue Erik Jonsson School of Engineering and Computer Science The University

More information

Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection

Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Victor Yu Liu Network Advanced Research, Huawei Technologies Santa Clara, California, USA yuliu@ieee.org Abstract

More information

Optical Communications and Networking 朱祖勍. Nov. 27, 2017

Optical Communications and Networking 朱祖勍. Nov. 27, 2017 Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by

More information

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS IT Specialist Dorina LuminiŃa Copaci Gorj Court IT Expert Constantin Alin Copaci ANRCTI Bucharest Abstract: A large number of recovery mechanisms

More information

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Master s Thesis Defense Ananth Nagarajan EECS Department, University of Kansas 10/13/98 Outline

More information

P Cycles: Design and Applications

P Cycles: Design and Applications P Cycles: Design and Applications -Aman Nijhawan Abstract Survivability is becoming an increasingly important goal in network design. An important aspect of network design today is designing networks with

More information

Arc Perturbation Algorithms for Optical Network Design

Arc Perturbation Algorithms for Optical Network Design Applied Mathematical Sciences, Vol. 1, 2007, no. 7, 301-310 Arc Perturbation Algorithms for Optical Network Design Zbigniew R. Bogdanowicz Armament Research, Development and Engineering Center Building

More information

An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops

An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops Harsha V. Madhyastha Department of Computer Science and Engineering Indian Institute of Technology, Madras Chennai,

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

Engineering End-to-End IP Resilience Using Resilience-Differentiated QoS

Engineering End-to-End IP Resilience Using Resilience-Differentiated QoS SN O RLL OMMUNTON NTWORKS ngineering nd-to-nd P Resilience Using Resilience-ifferentiated QoS chim utenrieth, Technische Universität München ndreas Kirstädter, Siemens STRT Network resilience is becoming

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

Toward the joint design of electronic and optical layer protection

Toward the joint design of electronic and optical layer protection Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS

More information

Shared Protection by Concatenated Rings in Optical WDM Networks

Shared Protection by Concatenated Rings in Optical WDM Networks Shared Protection by Concatenated Rings in Optical WDM Networks Hyunseung Choo, Minhan Son, Min Young Chung, and Tae-Jin Lee School of Information and Communication Engineering Sungkyunkwan University

More information

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks Wojciech Molisz, DSc, PhD Jacek Rak, PhD Gdansk University of Technology Department of Computer Communications

More information

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modelling Yong Liu 09/19/2006 1 Outline Examples Basic Problems Routing Restriction 2 1 Example: Intra-Domain Traffic Engineering

More information

David Tipper Graduate Telecommunications and Networking Program University of Pittsburgh. Motivation

David Tipper Graduate Telecommunications and Networking Program University of Pittsburgh. Motivation Survivable Network Design David Tipper Graduate Telecommunications and Networking Program University of Pittsburgh Telcom 2110 Slides 12 Motivation Communications networks need to be survivable? Communication

More information

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sanjay K. Bose, SMIEEE, Y.N. Singh, MIEEE A.N.V.B. Raju Bhoomika Popat Department of Electrical

More information

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks Proceedings of the International Conference on Computer and Communication Engineering 008 May 3-5, 008 Kuala Lumpur, Malaysia A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

More information

Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks

Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks Ahmed Frikha, Samer Lahoud, and Bernard Cousin University of Rennes 1, IRISA,

More information

Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation

Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation Muhammad S. Javed, Krishnaiyan Thulasiraman, Matthew A. Gaines School of Computer Science, University

More information

A Novel Efficient Design of Survivable WDM Mesh Networks

A Novel Efficient Design of Survivable WDM Mesh Networks 1684 JOURNAL OF COMPUTERS, VOL. 9, NO. 7, JULY 2014 A Novel Efficient Design of Survivable WDM Mesh Networks HONG HUI LI, XUE LIANG FU College of Computer and Information Engineering Inner Mongolia Agricultural

More information

Dynamic Provisioning of Shared-Backup Path Protected Connections with Guaranteed Availability Requirements

Dynamic Provisioning of Shared-Backup Path Protected Connections with Guaranteed Availability Requirements Dynamic Provisioning of Shared-Backup Path Protected Connections with Guaranteed Availability Requirements Darli A. A. Mello, Jefferson U. Pelegrini, Rafael P. Ribeiro, Dominic A. Schupke and Helio Waldman

More information

OPTICAL NETWORKS. Optical Metro Networks. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Optical Metro Networks. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Optical Metro Networks A. Gençata İTÜ, Dept. Computer Engineering 2005 Introduction Telecommunications networks are normally segmented in a three-tier hierarchy: Access, metropolitan,

More information

Multi-Optical Network on Chip for Large Scale MPSoC

Multi-Optical Network on Chip for Large Scale MPSoC Multi-Optical Network on hip for Large Scale MPSo bstract Optical Network on hip (ONo) architectures are emerging as promising contenders to solve bandwidth and latency issues in MPSo. owever, current

More information

A Study of Protection Switching: Wrapping or Steering

A Study of Protection Switching: Wrapping or Steering Study of Protection Switching: Wrapping or Steering Jason Fan Luminous Networks, Inc. March 2001, IEEE 802.17 Luminous Networks/Jason Fan 1 Wrapped Protection Wrapped protection is analogous to LSR Wrapping

More information

THE EXPLOSIVE growth of Web-related services over the. A Practical Approach to Operating Survivable WDM Networks

THE EXPLOSIVE growth of Web-related services over the. A Practical Approach to Operating Survivable WDM Networks 34 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 A Practical Approach to Operating Survivable WDM Networks Murari Sridharan, Student Member, IEEE, Murti V. Salapaka, and

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks

Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks Kwangil Lee Department of Electrical and Computer Engineering University of Texas, El Paso, TX 79928, USA. Email:

More information

WDM Network Provisioning

WDM Network Provisioning IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the

More information

Photonic MPLS Network Architecture Based on Hikari-Router [Invited]

Photonic MPLS Network Architecture Based on Hikari-Router [Invited] Photonic MPLS Network Architecture Based on Hikari-Router [Invited] Naoaki Yamanaka, Member, IEEE "IT Network Innovation Laboratories, 3-9-1 1 Midori-cho, Musashino-shi, Tokyo, 180-8585 Japan E-mail: yamanaka.naoaki@lab.ntt.co.jp

More information

Network Protection Design for MPLS Networks

Network Protection Design for MPLS Networks Network Protection Design for MPLS Networks Gaurav Agrawal, Dijiang Huang, Deep Medhi Computer Science and Electrical Engineering Department University of Missouri-Kansas City, MO 64110, USA Computer Science

More information

SHARED MESH RESTORATION IN OPTICAL NETWORKS

SHARED MESH RESTORATION IN OPTICAL NETWORKS SHARED MESH RESTORATION IN OPTICAL NETWORKS OFC 2004 Jean-Francois Labourdette, Ph.D. labourdette@ieee.org Page: 2 Outline Introduction Network & Restoration Arch Evolution Mesh Routing & Provisioning

More information

WDM Network Provisioning

WDM Network Provisioning IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the

More information

Features, Inputs/outputs for most frequent tools: Exel, PLANITU

Features, Inputs/outputs for most frequent tools: Exel, PLANITU ITU / BDT- COE workshop Nairobi, Kenya, 7 11 October 2002 Network Planning Lecture NP-5.2 Features, Inputs/outputs for most frequent tools: Exel, PLANITU ITU COE Network Planning Workshop, Nairobi, Kenya,

More information

Fault management. Acnowledgements

Fault management. Acnowledgements Fault management Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Computer Networks Design and Management - Acnowledgements Inspired by Davide

More information

On Efficient Protection Design for Dynamic Multipath Provisioning in Elastic Optical Networks

On Efficient Protection Design for Dynamic Multipath Provisioning in Elastic Optical Networks On Efficient Protection Design for Dynamic Multipath Provisioning in Elastic Optical Networks Xiaoliang Chen, Shilin Zhu,DiChen, Shuguang Hu, Chang Li, Zuqing Zhu School of Information Science and Technology,

More information

Network Survivability

Network Survivability Network Survivability Bernard Cousin Outline Introduction to Network Survivability Types of Network Failures Reliability Requirements and Schemes Principles of Network Recovery Performance of Recovery

More information

Modelling direct application to network bandwidth provisioning for high demanding research applications

Modelling direct application to network bandwidth provisioning for high demanding research applications Modelling direct application to network bandwidth provisioning for high demanding research applications H. Wessing, Y. Yan and M. Berger Research Center COM Technical University of Denmark Bldg. 345V,

More information

A Study on Layer Correlation Effects Through a Multilayer Network Optimization Problem

A Study on Layer Correlation Effects Through a Multilayer Network Optimization Problem A Study on Layer Correlation Effects Through a Multilayer Network Optimization Problem Iyad Katib and Deep Medhi University of Missouri Kansas City, USA Abstract Multilayer network design has received

More information

Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks

Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Franz Rambach Student of the TUM Telephone: 0049 89 12308564 Email: rambach@in.tum.de

More information

Optical Burst Transport Network (OBTN) A Novel Architecture for Efficient Transport of Optical Burst Data over Lambda Grids

Optical Burst Transport Network (OBTN) A Novel Architecture for Efficient Transport of Optical Burst Data over Lambda Grids Optical urst Transport Network (OTN) Novel rchitecture for fficient Transport of Optical urst ata over Lambda rids hristoph M. auger University of Stuttgart, IKR Pfaffenwaldring 47, 70569 Stuttgart, ermany

More information

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,

More information

On Optimal Traffic Grooming in WDM Rings

On Optimal Traffic Grooming in WDM Rings 110 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 On Optimal Traffic Grooming in WDM Rings Rudra Dutta, Student Member, IEEE, and George N. Rouskas, Senior Member, IEEE

More information

Survivability with P-Cycle in WDM Networks

Survivability with P-Cycle in WDM Networks Survivability with P-Cycle in WDM Networks K. Aparna 1, P. Ramya Krishna 2 JNTUA College of Engineering, Pulivendula Abstract: In this paper we discuss about the Pre-Configured survivability schemes. Network

More information

Diversity Coded 5G Fronthaul Wireless Networks

Diversity Coded 5G Fronthaul Wireless Networks IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University

More information

P-Cycle Based Protection Schemes for Multi-Domain Networks

P-Cycle Based Protection Schemes for Multi-Domain Networks P-Cycle Based Protection Schemes for Multi-Domain Networks Arnold Farkas, Janos Szigeti, Tibor Cinklert High-Speed Networks Laboratory Department of Telecommunications and Media Informatics Budapest University

More information

Analysis of p-cycle Capacity in WDM Networks

Analysis of p-cycle Capacity in WDM Networks Analysis of p-cycle Capacity in WDM Networks Dominic A. Schupke December 20, 2005 Abstract The concept of p-cycles provides many characteristics, which are benficial for deployment and operation in WDM

More information

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 A Scalable Path Protection Mechanism for Guaranteed Network Reliability Under Multiple Failures Changcheng Huang, Senior Member, IEEE, Minzhe

More information

Design of Hierarchical Crossconnect WDM Networks Employing a Two-Stage Multiplexing Scheme of Waveband and Wavelength

Design of Hierarchical Crossconnect WDM Networks Employing a Two-Stage Multiplexing Scheme of Waveband and Wavelength 166 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 Design of Hierarchical Crossconnect WDM Networks Employing a Two-Stage Multiplexing Scheme of Waveband and Wavelength

More information

SONET Topologies and Upgrades

SONET Topologies and Upgrades 8 CHAPTER Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring

More information

Fault management. Fault management. Acnowledgements. The impact of network failures. Pag. 1. Inspired by

Fault management. Fault management. Acnowledgements. The impact of network failures. Pag. 1. Inspired by Fault management ndrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 cnowledgements Inspired by Davide

More information

Design Methodologies and Algorithms for Survivable C-RAN

Design Methodologies and Algorithms for Survivable C-RAN 16 Regular papers ONDM 218 Design Methodologies and Algorithms for Survivable C-RAN Bahare M. Khorsandi, Federico Tonini, Carla Raffaelli DEI, University of Bologna Viale Risorgimento 2, 4136 Bologna,

More information

Applying p-cycle Protection Approach for a Reliable IPTV Service in IP-over-DWDM Networks

Applying p-cycle Protection Approach for a Reliable IPTV Service in IP-over-DWDM Networks Frikha et al. RESEARCH Applying p-cycle Protection Approach for a Reliable IPTV Service in IP-over-DWDM Networks Ahmed Frikha *, Bernard Cousin and Samer Lahoud Abstract Today, IPTV service has become

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

Index Terms Backbone Networks Optimization, Resilience, Virtual Private Network, Traffic Demands and Traffic Flows

Index Terms Backbone Networks Optimization, Resilience, Virtual Private Network, Traffic Demands and Traffic Flows International Journal of Computer Science and Telecommunications [Volume 2, Issue 8, November 2011] 12 ISSN 2047-3338 Designing Different Models of Robust IP/MPLS over DWDM Networks Marko Rožman University

More information

Third Generation Routers

Third Generation Routers IP orwarding 5-5- omputer Networking 5- Lecture : Routing Peter Steenkiste all www.cs.cmu.edu/~prs/5-- The Story So ar IP addresses are structured to reflect Internet structure IP packet headers carry

More information

Efficient path protection using Bi-directional WDM transmission technology. Title

Efficient path protection using Bi-directional WDM transmission technology. Title Title Efficient path protection using Bi-directional WDM transmission technology Author(s) Li, J; Yeung, KL Citation Globecom - Ieee Global Telecommunications Conference, 2005, v. 4, p. 1910-1914 Issued

More information

A New Architecture for Multihop Optical Networks

A New Architecture for Multihop Optical Networks A New Architecture for Multihop Optical Networks A. Jaekel 1, S. Bandyopadhyay 1 and A. Sengupta 2 1 School of Computer Science, University of Windsor Windsor, Ontario N9B 3P4 2 Dept. of Computer Science,

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Benefits of Metropolitan Mesh Optical Networks

Benefits of Metropolitan Mesh Optical Networks Tellabs 4951 Indiana Avenue Lisle, Illinois 60532 U.S.A. Tel: +1.630.378.8800 Fax: +1.630.852.7346 www.tellabs.com Benefits of Metropolitan Mesh Optical Networks Bert Buescher, senior product marketing

More information

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS D. Harle, S. Albarrak, F. Ali Department of Electrical and Electronic Engineering, University of Strathclyde, U. K {d.harle,sbarrak,

More information

10 Optical Network Engineering

10 Optical Network Engineering 10 Optical Network Engineering George N. Rouskas Department of Computer Science North Carolina State University Raleigh, NC 27695-7534 Email: rouskas@csc.ncsu.edu 10.1 INTRODUCTION Over the last few years

More information

Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue

Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue Sandip R. Shinde Research Scholar, Sathyabama University, Chennai & Assistant Professor, Vishwakarma

More information

Design of Large-Scale Optical Networks Λ

Design of Large-Scale Optical Networks Λ Design of Large-Scale Optical Networks Λ Yufeng Xin, George N. Rouskas, Harry G. Perros Department of Computer Science, North Carolina State University, Raleigh NC 27695 E-mail: fyxin,rouskas,hpg@eos.ncsu.edu

More information

ON JOINT RESTORATION OF PACKET-OVER-OPTICAL NETWORKS

ON JOINT RESTORATION OF PACKET-OVER-OPTICAL NETWORKS ON JOINT RESTORATION OF PACKET-OVER-OPTICAL NETWORKS Chunxiao Chigan 1,2 Gary W. Atkinson 1 Ramesh Nagarajan 1 Thomas G. Robertazzi 2 1 Bell Labs, Lucent Technologies, 101 Crawfords Corner Road, NJ 07733

More information

MODERN communication networks are constructed

MODERN communication networks are constructed 1000 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 4, AUGUST 2011 Cross-Layer Survivability in WDM-Based Networks Kayi Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, and Hyang-Won Lee, Member,

More information

Sycamore Networks Implementation of the ITU-T G.ASON Control Plane

Sycamore Networks Implementation of the ITU-T G.ASON Control Plane Technical Brief Sycamore Networks Implementation of the ITU-T G.SON Control Plane bstract This document provides a detailed overview of the control plane behavior of Sycamore Networks SN 16000 Intelligent

More information

Dynamic Routing and Resource Allocation in WDM Transport Networks

Dynamic Routing and Resource Allocation in WDM Transport Networks Dynamic Routing and Resource Allocation in WDM Transport Networks Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering (IND), Germany Email: spaeth@ind.uni-stuttgart.de

More information

Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network

Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network 91 Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network Amit Kumar Garg and R S Kaler School of Electronics and Communication Eng, Shri Mata Vaishno Devi University (J&K),

More information

Line system design for DWDM networks

Line system design for DWDM networks Line system design for DWDM networks Steve ortune Wim Sweldens Lisa Zhang ell Laboratories, Lucent Technologies, 600 Mountain venue, Murray Hill, New Jersey 07974. Phone: 908-582-5281. ax: 908-582-5857.

More information

Resilient Networks. 3.1 Resilient Network Design - Intro. Mathias Fischer

Resilient Networks. 3.1 Resilient Network Design - Intro. Mathias Fischer Mathias Fischer Resilient Networks. Resilient Network Design - Intro Prepared along: Michal Pioro and Deepankar Medhi - Routing, Flow, and Capacity Design in Communication and Computer Networks, The Morgan

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

OPTICAL networks based on wavelength division multiplexing

OPTICAL networks based on wavelength division multiplexing IEEE/ACM TRANSACTIONS ON NETWORKING 1 ILP Formulations for p-cycle Design Without Candidate Cycle Enumeration Bin Wu, Member, IEEE, Kwan L. Yeung, Senior Member, IEEE, and Pin-Han Ho Abstract The concept

More information

Automatic Service and Protection Path Computation - A Multiplexing Approach

Automatic Service and Protection Path Computation - A Multiplexing Approach Automatic Service and Protection Path Computation - A Multiplexing Approach Loay Alzubaidi 1, Ammar El Hassan 2, Jaafar Al Ghazo 3 1 Department of Computer Engineering & Science, Prince Muhammad bin Fahd

More information

Optical networking technology

Optical networking technology 1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the

More information

IP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks. Dr. Greg M. Bernstein Grotto Networking 2004

IP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks. Dr. Greg M. Bernstein Grotto Networking 2004 IP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks Dr. Greg M. Bernstein Grotto Networking Page - 1 Problem Scope Bandwidth on Demand Medium to high speed bandwidth demands

More information

Designing physical topologies for wavelength-routed all-optical networks

Designing physical topologies for wavelength-routed all-optical networks Designing physical topologies for wavelength-routed all-optical networks D. R. Hjelmi 2 and S. Eikedal Andersen! 1) Department of Physical Electronics, Faculty of Electrical Engineering and Telecommunications,

More information

Dimensioning of Non-hierarchical Interconnected WDM Ring Networks

Dimensioning of Non-hierarchical Interconnected WDM Ring Networks Dimensioning of Non-hierarchical Interconnected WDM Ring Networks Peter Arijs, Piet Demeester Department of Information Technology, University of Gent -IMEC St-Pietersnieuwstraat 41, B-90oo Gent, Belgium

More information

A TRANSPONDER FOR GIGABIT ETHERNET OVER WDM

A TRANSPONDER FOR GIGABIT ETHERNET OVER WDM A TRANSPONDER FOR GIGABIT ETHERNET OVER WDM D.A. Schupkel and S. Weigert l and O. Jahreis 2 1 Munich University of Technology Institute of Communication Networks 80290 Munich, Germany Tel.: +4989289-23511,

More information

Establishment of Survivable Connections in WDM Networks using Partial Path Protection

Establishment of Survivable Connections in WDM Networks using Partial Path Protection Establishment of Survivable Connections in WDM Networks using Partial Path Protection G. Xue 1, Senior Member, IEEE, W. Zhang 1,J.Tang 1, and K. Thulasiraman 2, Fellow, IEEE Abstract As a generalization

More information

Inter-domain Routing with Shared Risk/Resource Groups (SRG)

Inter-domain Routing with Shared Risk/Resource Groups (SRG) Inter-domain Routing with Shared Risk/Resource Groups (SRG) Sudheer Dharanikota - sudheer@ieee.org Nayna Networks, Inc. MPLS World Congress 2002 February 8 th 2002 Co-authors Sudheer Dharanikota, Raj Jain

More information

Dynamic service Allocation with Protection Path

Dynamic service Allocation with Protection Path www.ijcsi.org 115 Dynamic service Allocation with Protection Path Loay Alzubaidi Department of Computer Engineering & Science, Prince Muhammad bin Fahd University AL-Khobar, Saudi Arabia Abstract Path

More information

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry

More information

Bandwidth Protection in MPLS Networks Using p-cycle Structure

Bandwidth Protection in MPLS Networks Using p-cycle Structure Bandwidth Protection in MPLS Networks Using p-cycle Structure Jianghui Kang, Martin J. Reed Department of Electronic System Engineering University of Essex Colchester, CO4 3SQ, United Kingdom Email: {jkangf,

More information

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks Iyad Katib and Deep Medhi Computer Science & Electrical Engineering Department University of Missouri-Kansas City, USA {IyadKatib,

More information

Splitter Placement in All-Optical WDM Networks

Splitter Placement in All-Optical WDM Networks plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National

More information

IP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing

IP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing IP orwarding - omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSP (Open Shortest Path irst) The Story So ar IP addresses are structure to reflect Internet structure

More information

from ocean to cloud FLEXIBLE WDM AND GMPLS IMPLEMENTATION ON WACS

from ocean to cloud FLEXIBLE WDM AND GMPLS IMPLEMENTATION ON WACS FLEXIBLE WDM AND GMPLS IMPLEMENTATION ON WACS Fanie Pretorius, WACS PG Chairman, Broadband Infraco, Daniel Welt, WACS TWG Chaiman, Tatacommunications, Jean-Francois Baget, Alcatel Lucent Submarine Networks.

More information