WAVELENGTH-DIVISION multiplexed (WDM) optical
|
|
- Bruno Cain
- 5 years ago
- Views:
Transcription
1 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER A Dynamic Routing Algorithm With Load Balancing Heuristics for Restorable Connections in WDM Networks Lu Ruan, Member, IEEE, Haibo Luo, and Chang Liu Abstract Dynamic routing of a restorable connection requires a pair of link-disjoint primary and backup lightpaths to be found online when a connection request arrives at the network. We present a distributed dynamic routing algorithm for restorable connections that uses load balancing heuristics in both primary and backup path computations to achieve low demand blocking. The key idea is to assign costs to links so that heavily loaded links will be avoided in the routing of the primary and backup paths and links with a high chance of including a sharable backup channel will be included in the backup path. Simulation results showed that the algorithm performs significantly better than a simple distributed algorithm and achieves comparable performance as a centralized algorithm. Index Terms Dynamic routing, load balancing heuristics, optical networks, restorable connections, wavelength-division multiplexed (WDM). I. INTRODUCTION WAVELENGTH-DIVISION multiplexed (WDM) optical networks are believed to be the backbone transport networks for the next-generation Internet [1]. A WDM network consists of optical cross-connects (OXCs) interconnected by multiwavelength optical fibers with each wavelength channel operating at gigabits-per-second speed. Connections in WDM networks are supported by lightpaths, where a lightpath is a circuit-switched communication pipe occupying one wavelength channel in each link along its route. If the OXCs are capable of wavelength conversion, different links on a lightpath can use different wavelengths; otherwise, the same wavelength must be used by all links on the lightpath. Since fiber cut is the predominant form of failures in WDM networks [2], it is important to support restorable connections that can survive any single fiber failure. A restorable connection can be realized by establishing two link-disjoint lightpaths. One lightpath is called primary lightpath, which is used to carry traffic under normal condition; the other lightpath is called backup lightpath, which is used to carry traffic when the primary lightpath fails. To reduce the spare capacity reservation for a backup lightpath, the technique of backup sharing can be used. In backup sharing, two backup lightpaths can share the Manuscript received March 27, 2003; revised May 27, This work was supported in part by the National Science Foundation (NSF) under CAREER Award ANI L. Ruan and C. Liu are with the Department of Computer Science, Iowa State University, Ames, IA USA ( ruan@cs.iastate.edu; liuc@cs.iastate.edu). H. Luo is with Microsoft Corporation, Redmond, WA USA ( haiboluo@microsoft.com). Digital Object Identifier /JSAC same wavelength on a common link if their primary lightpaths are link-disjoint. The sharing is possible since under the single link failure assumption two link-disjoint primary lightpaths cannot fail simultaneously, therefore their backup lightpaths will not be needed at the same time. The problem of restorable connection establishment has been studied under two traffic models: static traffic model and dynamic traffic model. Under the static traffic model, the set of connections to be established is given a priori and the problem is to find the primary and backup lightpaths for each connection so that the total wavelength consumption is minimized [3] [8]. Approaches to solve this problem include integer linear programming and combinatorial techniques such as simulated annealing and genetic algorithms. Under the dynamic traffic model, connection requests arrive at the network one by one and the problem is to compute a pair of primary and backup lightpaths online as a connection request arrives at the network with the goal of minimizing the connection blocking probability [9] [15]. In this paper, we consider the problem of restorable connection establishment under the dynamic traffic model. We propose a distributed online algorithm to compute primary and backup lightpaths for a given connection request based on the current network status. The algorithm uses load balancing heuristics to guide the routing of the primary and backup lightpaths and can achieve a blocking performance comparable to that of a centralized algorithm. We assume all network nodes have wavelength conversion capability so that a lightpath can use different wavelengths on its links. The rest of the paper is organized as follows. We introduce some terminologies in Section II. A review of previous work is given in Section III. In Section IV we present our distributed online routing algorithm for restorable connections. The control mechanism for establishing the primary and backup lightpaths is presented in Section V. We study the performance of the proposed algorithm in Section VI. Finally, a conclusion is given in Section VII. II. TERMINOLOGIES A wavelength channel in a link may be occupied by a primary lightpath, reserved by one or more backup lightpaths (backup sharing allows more than one backup lightpaths to share a wavelength channel), or free. We refer to these three types of channels as primary channel, backup channel, and free channel, respectively /04$ IEEE
2 1824 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 Consider a backup channel and a satisfied demand. (In this paper we use demand and connection interchangeably.) s primary lightpath is said to be supported by if is reserved for s backup lightpath. The graph consisting of all nodes in the network and those links in the primary lightpaths supported by is called s supported graph. The complement of s supported graph is called s supportable graph. If an incoming demand s primary path is contained in s supportable graph, then it must be link-disjoint with the existing primary lightpaths supported by. Thus, the backup lightpath for can share with other backup lightpaths that have reserved.wedefine the ratio of the number of links in the s supported graph to the total number of links in the network as s supported ratio. We call a link P-only if it contains only primary channels. Clearly, neither the primary lightpath nor the backup lightpath of an incoming demand can use a P-only link. A primary lightpath can use a link only if the link contains a free channel. A backup lightpath can use a link if the link contains either a free channel or a sharable backup channel. III. PREVIOUS WORK We first describe two routing algorithms for restorable connection establishment that will be compared with our proposed algorithm later for the purpose of performance evaluation. Other related work is then reviewed. A. Centralized Algorithm (CA) In centralized scenario, when a demand arrives at the source node, the node sends the demand information to a network management system (NMS), which runs a centralized routing algorithm to compute a primary/backup path pair for the demand. The NMS then sends the computed routes back to the source node and the source node performs a signaling procedure to set up the primary lightpath and reserve backup channels along the backup path. A centralized routing algorithm is proposed in [16]. The algorithm requires the NMS to maintain a complete view of the current network status, including channel types (primary, backup, or free) in each network link and the supportable graph of each backup channel. To compute the primary path, the algorithm removes all links without a free channel and then finds the shortest path between the source and the destination nodes as the primary path. To compute the backup path, the algorithm removes all links used by the primary path and all P-only links, then set the cost of the remaining links as follows: if a link contains a backup channel that can support the primary path (i.e., the primary path is contained in the channel s supportable graph), set the link cost to ; else if the link contains a free channel, set the cost to 1; else set the cost to infinity. The least-cost path is then computed as the backup path. Here, provides a tradeoff between capacity efficiency and backup path length. When is set to 0, the backup path uses the least number of free channels at the expense of taking more hops. Since the algorithm computes the primary path and the backup path in separate steps, although the backup path is optimal with respect to the primary path, it is not necessarily true that the total cost of the primary/backup path pair is minimum. An integer linear program (ILP) formulation was given in [10] to compute the minimum cost primary/backup path pair. However, the computation time of the ILP is on the order of minutes for medium sized networks and therefore is not suitable for online routing of dynamic demands. B. Simple Distributed Algorithm (SDA) In distributed scenario, the source node is responsible for computing the primary and backup paths for an arriving demand. Since it is not feasible for each node to maintain the complete network status information, each node only maintains a limited network status information and uses this limited information for path computation. In the simple distributed algorithm (SDA) presented here, each node only knows whether each link has a free channel. The primary path computation is the same as that of the centralized algorithm. In backup path computation, the algorithm excludes the links along the chosen primary path and the links with no free channels, and then find the shortest path in the graph as the backup path. Although the source node does not have enough information to exploit backup sharing in backup path computation, a technique proposed in [12] can be used to determine the shareability of backup channels and reserve a channel for the backup path accordingly during the signaling of the backup path. The technique requires each OXC to maintain a sharing database that contains the supportable graphs for each backup channel in each link that is adjacent to the node. During the signaling of the backup path, each node along the path determines, using the sharing database, whether the backup path can share a backup channel in the link connecting itself and the next node. If so, a sharable backup channel is reserved for the backup path; otherwise, a free channel is reserved. In both cases, the sharing database should be updated. Although SDA is not as capacity efficient as CA, it is more scalable and practical to implement since the algorithm is distributed and the required network status information (i.e. whether each link contains a free channel) can be disseminated to every network node with little overhead. A drawback of SDA is that it may cause unnecessary blocking, i.e., it may reject a demand because it can t find a feasible backup path for it even though such a path exists in the network. To see why, recall that SDA only allows the backup path to use links that have a free channel. However, a backup path does not have to use a free channel in every link because it sometimes can share a backup channel with existing backup paths. To overcome this problem, we can exclude P-only links instead of excluding links with no free channels in backup path computation. This allows a backup path to use a link that has backup channels but no free channels. However, a backup path found this way may be blocked during the signaling of the backup path if a link in the path has no free channels and none of the backup channels in the link can support the primary path. In this case, a retry scheme [12] could be used to try to find another backup path at the cost of longer demand admission latency.
3 RUAN et al.: A DYNAMIC ROUTING ALGORITHM WITH LOAD BALANCING HEURISTICS 1825 C. Other Related Work Many dynamic routing algorithms for restorable connections have been proposed in recent years [9] [14]. The algorithms can be classified into two categories: alternate routing and adaptive routing. In alternate routing, a set of candidate primary/backup path pairs are precomputed and the pair with the minimum cost is chosen [13], [14]. In adaptive routing, a pair of primary/backup paths are computed online based on the current network status [9] [12]. A commonly used approach for backup path computation is to assign each link a cost that is an estimate of the additional bandwidth needs to be reserved on the link if the link is included in the backup path and then compute the least-cost path as the backup path [9] [11]. Either complete network status information or aggregate network status information can be used to compute the link costs; they provide a tradeoff between the performance of the routing algorithm and the amount of network status information needs to be maintained by the network nodes. In [12], the authors proposed to set the cost of a link for backup path computation to be the estimate of the probability that the link contains a sharable backup channel. To compute the cost of a link, a random sample of source-destination pairs is chosen first. For each pair in the sample, a set of shortest paths are computed as the potential primary paths, and the fraction of these paths that the link can support is determined. The average is then taken over all pairs in the sample to obtain the probability that this link contains a sharable backup channel. As mentioned in the simulation results, the method does not lead to significant savings in backup capacity. What s more, the computation time is rather long when a large sample is used. In this paper, we propose a new distributed dynamic routing algorithm for restorable connections. The algorithm uses adaptive routing method, i.e., it computes a pair of primary/backup paths online based on the current network status as a connection request arrives at the network. Unlike existing algorithms, we use load balancing heuristics in path computation. The key idea is to avoid using heavily loaded links in both primary and backup paths to achieve low connection blocking. Load balancing heuristics have been proposed previously for routing nonrestorable connections to achieve low connection blocking. In [17], a dynamic routing algorithm called least congested path (LCP) routing was proposed. LCP uses alternate routing method where a set of routes is precomputed for each pair of source-destination nodes. The number of free channels of a path is defined as the minimum number of free channels of all links in the path. When a demand arrives at the network, the numbers of free channels of all precomputed paths for this demand are collected and the path with the maximum number of free channels is chosen as the least congested path to accommodate the demand. A variant of LCP is proposed in [18] to reduce its computation time. Instead of searching all the links on the precomputed paths to obtain the number of free channels of the paths, only the first (a parameter to the algorithm) links on each path are searched to decide which path to select. In [19], an adaptive routing strategy called weighted-shortest path (WSP) was proposed. WSP seeks to find a path that minimizes Fig. 1. Assume links b-e and c-f have no free channels and all other links have 2 free channels. (a) Without considering load balancing, demand (c, d) is blocked. (b) Demand (c, d) can be satisfied if load balancing is considered. the resource cost while keeping the traffic load among the links as balanced as possible. To our best knowledge, the algorithm to be presented in the next section is the first to include load balancing heuristics in the routing of restorable connections. IV. ROUTING RESTORABLE CONNECTIONS WITH LOAD-BALANCING HEURISTICS The goal of dynamic routing algorithm is to accept as many demands as possible under the network resource constraint. CA can achieve this goal by finding a primary/backup lightpath pair that uses the minimum number of free channels for the current demand so that more network resources are left for the future demands. However, due to its centralized nature, CA is not scalable to large networks and the failure of the NMS can bring down the entire network. On the other hand, although SDA does not have the scalability problem and the single point of failure problem of CA, its performance in terms of the number of demand blocking is much worse than that of CA (as will be shown in Section VI). In this section, we present a new distributed routing algorithm that can achieve a performance close to that of CA. The key idea of the algorithm is to consider load balancing in path computation, i.e., lighter-loaded links are preferred over heavier-loaded links when routing the primary and backup paths. The benefit of considering load balancing in path computation can be seen from the example shown in Fig. 1. Here, we assume links - and - currently have no free channels and all other links have two free channels. Now suppose three demands (, ), (, ), (, ) arrive at the network sequentially. Without considering load balancing, we may route the first two demands as shown in Fig. 1(a), which will cause the third demand to be blocked. If we consider load balancing, we would route the second demand over the path since this path has lighter load than the path In this case, the third demand can be routed over link -, as shown in Fig. 1(b). Thus, considering load balancing in demand routing can improve the demand blocking performance. In the next section, we describe our routing algorithm, called Routing with Load Balancing Heuristics (RLBH). RLBH computes primary path and backup path for a demand in two separate steps. In each step, a cost is assigned to very network link and the least-cost path is chosen. A. Primary Path Computation in RLBH The link cost function for primary path computation is designed based on the following two rules. 1) The primary path should use the shortest path as long as every link along the path
4 1826 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 has plenty of free channels. 2) When the number of free channels in a link is less than or equal to a threshold, the link becomes critical and we take precautionary step to avoid using it. To these ends, we assign a cost of 1 to every link with more than free channels and a cost greater than 1 to every link with no more than free channels, where is a constant called critical index. Formally, given a link, we define its link cost for primary path computation as follows: cost if has no free channels if has and 0 free channels if has free channels where is a constant and. After we assign each link a cost using the above formula, Dijkstra s algorithm is then used to compute the least-cost path as the primary path. If the least-cost path has a cost of infinity, then the demand is blocked; otherwise a backup path is computed using the method given in the next subsection. Note that when, primary path computation in RLBH becomes the same as that of CA and SDA. B. Backup Path Computation in RLBH In backup path computation, it is desirable not only to avoid using heavily loaded links as in primary path computation but also to use links that have high chance of containing a sharable backup channel. Both goals can be achieved by using a properly designed link cost function that allows us to use the number of free channels in every link as well as the usage of backup channels in every link to guide the backup path computation. In our algorithm, a backup channel with supported ratio larger than (called venture index) is considered not able to support any more primary paths; therefore such a backup channel is not considered as a backup channel candidate for new demands. Based on this, we define a link s backup channel candidates for new demands to contain those backup channels with supported ratio less than or equal to and all the free channels in the link. Clearly, links with more backup channel candidates would be preferred over links with less backup channel candidates when routing the backup path. Thus, we let the link cost function for backup path computation to be inversely related to the number of the link s backup channel candidates. Given a link, we let cand denote the number of s backup channel candidates. The link cost function for backup path computation is defined as follows: cost cand if cand or is on the primary path otherwise where is an integer greater than 1. After we assign each link a cost using the above formula, Dijkstra s algorithm is then used to compute the least-cost path as the backup path. If the least-cost path has a cost of infinity, then the demand is blocked; otherwise, the demand is admitted. The reason we include an exponent in the cost function is that when the difference between two link costs Fig. 2. r s effect on backup path computation. may be too small to reflect the preference in backup path computation even though a notable difference exists between the number of backup channel candidates in those two links. For example, consider Fig. 2, which shows part of a network with 16 wavelengths per link. We want to find the backup path for demand (, ), which will pass through and. Suppose both link and link currently have seven free channels and two backup channels with supported ratio less than or equal to,so cand cand. As for link, cand with only three free channels left. When, cost of,, and are 0.111, 0.111, and 0.2, respectively, and the algorithm will include link in the backup path. Consequently, will have only two free channels left (or still three left if a sharable backup channel for the demand exists in the link), aggravating the imbalance of wavelength consumption among,, and. On the other hand, if, cost of,, and will be 0.012, 0.012, and 0.04, respectively, so and will be chosen for the backup path. In this case, will have three free channels left, and each will have six or seven free channels left, giving more balanced wavelength consumption. V. CONTROL MECHANISM After a pair of primary and backup paths is computed by RLBH, signaling procedures need to be carried out to setup the primary lightpath and reserve wavelength channels for the backup lightpath. For primary lightpath setup, a reservation message is sent along the primary path. Each intermediate node reserves one free channel using first-fit wavelength assignment (i.e., the first free channel is reserved). After the destination receives the reservation message, it sends an acknowledgment message (ACK) back to the source node. Each intermediate node configures its cross-connect upon receiving the ACK and forward the message to the next node toward the source. In parallel with primary lightpath setup, a similar procedure is carried out for backup lightpath reservation. For each link on the backup path, first-fit wavelength assignment is used to choose a backup channel or a free channel for the backup lightpath. That is, the first backup channel that can support the primary lightpath is chosen if such a channel exists; else, the first free channel is chosen if such a channel exists; if neither a sharable backup channel nor a free channel exists, the demand cannot be admitted and a REJECT message is send back toward the source. Each intermediate node will cancel the channel reservation already made for the backup lightpath upon receiving the REJECT message. If channel reservation is successful, then the following update is performed: If a backup channel is chosen, the primary path is added to the channel s supported graph; if a free channel is chosen, the channel status is changed to backup
5 RUAN et al.: A DYNAMIC ROUTING ALGORITHM WITH LOAD BALANCING HEURISTICS 1827 TABLE I NUMBER OF BLOCKED DEMANDS UNDER DIFFERENT VALUES AND LOADS TABLE II NUMBER OF BLOCKED DEMANDS UNDER DIFFERENT r, AND LOADS Fig node 51-link network. and its supported graph contains only the primary path. Note that this requires the primary path information to be included in the reservation message. Unlike primary lightpath setup, the cross-connects in the nodes along the backup path cannot be configured at this time due to backup sharing. The configurations are done when the backup lightpath needs to be activated to restore traffic after the primary lightpath fails. The RLBH algorithm needs to know the number of free channels and the number of candidate backup channels in every link in order to perform the primary and backup path computations. This information can be disseminated to all nodes in the network using an augmented Interior Gateway Protocol (IGP) with appropriate extensions to its link state advertisement messages [20]. VI. NUMERICAL RESULTS To evaluate the performance of RLBH, we conducted simulations on a network topology with 32 nodes and 51 links used in [21], which is shown in Fig. 3. Dynamic traffic is used in the simulations. The arrival of traffic follows Poisson distribution with demands per second. The demand holding time is exponentially distributed with a mean of. The traffic load measured in erlangs is. The same set of random demands is loaded to the network for each simulation run and the number of blocked demands is recorded. Note that in RLBH, demand blocking can occur during either path computation or backup lightpath reservation. During path computation, a demand will be blocked if a finite-cost primary path or a finite-cost backup path cannot be found. During the reservation of the backup lightpath, the demand will be blocked if a link on the backup path has no free channels and no backup channel in the link can support the primary lightpath. Results presented in this section are obtained with link capacity set to 16 (i.e., there are 16 wavelength channels in every link). Although not shown due to space limitation, similar results are also obtained with link capacity set to 8. A. On Primary Path Computation The first set of simulations is aimed to study the impact of the link cost function for primary path computation in RLBH. To this end, we use the backup path computation procedure of SDA to compute the backup path in this set of simulations. For primary path computation, is set to 1.5. The number of blocked demands for different values and loads are shown in Table I. The bold number in each column is the smallest value of that column, so the corresponding value is the best choice for the load of that column. Note that when is 0, the algorithm becomes SDA. As shown in the table, for a fixed load, the number of blocked demands tends to first decrease and then increase as increases. Under all loads, proper choice can reduce the number of blocked demands compared with SDA (i.e., ) and the reduction is significant under light and medium loads. In general, or gives the best performance. B. On Backup Path Computation The second set of simulations is aimed to study the impact of the link cost function for backup path computation in RLBH. To this end, we do not adopt the precautionary step in the primary path computation, i.e., is set to 0 in this set of simulations. Table II shows the number of blocked demands for different values and loads under two different values ( and ). For comparison, the number of blocked demands by CA and SDA
6 1828 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 TABLE III NUMBER OF BLOCKED DEMANDS BY SDA, RLBH, AND CA are also listed in the table. Note that primary path computation is the same in CA, SDA, and RLBH, the difference lies only in the backup path computation. The bold numbers in the table stand for the smallest number of blocked demands under different values for a fixed load and value. The results showed that increasing value can reduce the number of blocked demands. However, increasing to 4 and 5 (results not shown in the table) does not bring considerable reductions. As shown in the table, CA has much better blocking performance than SDA. When a proper value for is chosen, the performance gap between RLBH and CA is much smaller than the performance gap between SDA and CA, which shows the effectiveness of our backup path computation algorithm. Another finding from the table is that as the load increases, the value corresponds to the bold number tends to increase. This indicates that in order to achieve good performance, backup channels with higher supported ratio should be considered as backup channel candidates as the traffic load increases. C. Overall Comparison We now evaluate the complete RLBH, which includes load balancing heuristics in both primary and backup path computations. In the simulations, we set for primary path computation and for backup path computation. We also set the value of based on the traffic load as follows: for the traffic load ranges of [40, 70], [80, 90], and 100, is set to 10%, 20%, and 30%, respectively. The number of blocked demands by SDA, RLBH, and CA are shown in Table III. The results showed that the performance of RLBH is very close to that of CA under all traffic loads and RLBH performs significantly better than SDA. In summary, RLBH is a scalable and efficient algorithm for routing restorable connections since it requires very limited information (i.e., the number of free channels and the number of candidate backup channels in every link) for path computation while achieving comparable performance as the centralized algorithm that requires complete network status information for path computation. VII. CONCLUSION In this paper, we presented a distributed routing algorithm called RLBH for computing a pair of primary and backup paths for a restorable connection in WDM networks. The algorithm aims to achieve low demand blocking by including load balancing heuristics in both primary and backup path computations. RLBH assigns link cost based on the link channel usage information to guide the computation of the primary and backup paths. For primary path computation, a link is assigned a higher cost if the number of free channels in the link is smaller than or equal to a threshold. For backup path computation, the link cost is a function of the estimated number of backup channel candidates in the link. Simulation results show that the blocking performance of RLBH is very close to that of CA. However, RLBH requires much less network status information for path computation compared with CA. ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their valuable comments that greatly helped improve the quality of the paper. REFERENCES [1] B. Mukherjee, WDM optical communication networks: progress and challenges, IEEE J. Select. Areas Commun., vol. 18, pp , Oct [2] L. Sahasrabuddhe, S. Ramamurthy, and B. Mukherjee, Fault management in IP-over-WDM networks: WDM protection versus IP restoration, IEEE J. Select. Areas Commun., vol. 20, pp , Jan [3] M. Herzberg, S. J. Bye, and A. Utano, The hop-limit approach for spare-capacity assignment in survivable networks, IEEE/ACM Trans. Networking, vol. 3, pp , Dec [4] B. Van Caenegem, N. Wauters, and P. Demeester, Spare capacity assignment for different restoration strategies in mesh survivable networks, in Proc. Int. Conf. Communications, 1997, pp [5] Y. Liu, D. Tipper, and P. Siripongwutikorn, Approximating optimal spare capacity allocation by successive survivable routing, in Proc. IEEE INFOCOM, 2001, pp [6] B. Van Caenegem, W. Van Parys, F. De Turck, and P. M. Demeester, Dimensioning of survivable WDM networks, IEEE J. Select. Areas Commun., vol. 16, pp , Sept [7] M. Alanyali and E. Ayanoglu, Provisioning algorithms for WDM optical networks, IEEE/ACM Trans. Networking, vol. 7, pp , Oct [8] Y. Miyao and H. Saito, Optimal design and evaluation of survivable WDM transport networks, IEEE J. Select. Areas Commun., vol. 16, pp , Sept [9] C. Qiao and D. Xu, Distributed partial information management (DPIM) schemes for survivable networks part I, in Proc. IEEE INFOCOM, 2002, pp [10] M. Kodialam and T. V. Lakshman, Dynamic routing of bandwidth guaranteed tunnels with restoration, in Proc. IEEE INFOCOM, 2000, pp [11] G. Li, D. Wang, C. Kalmanek, and R. Doverspike, Efficient distributed path selection for shared restoration connections, in Proc. IEEE IN- FOCOM, 2002, pp [12] S. Sengupta and R. Ramamurthy, Capacity efficient distributed routing of mesh-restored lightpaths in optical networks, in Proc. IEEE GLOBECOM, 2001, pp [13] G. Mohan and C. Murthy, Routing and wavelength assignment for establishing dependable connections in WDM networks, in Proc. IEEE Int. Symp. Fault-Tolerant Computing, 1999, pp [14] C. Xin, Y. Ye, S. Dixit, and C. Qiao, A joint working and protection path selection approach in WDM optical networks, in Proc. IEEE GLOBECOM, 2001, pp [15] G. Mohan, C. S. R. Murthy, and A. K. Somani, Efficient algorithms for routing dependable connections in WDM optical networks, IEEE/ACM Trans. Networking, vol. 9, pp , Oct [16] L. Ruan and H. Luo, Dynamic routing of restorable lightpaths: a tradeoff between capacity efficiency and resource information requirement, in Proc. Conf. Optical Network Design and Modelling (ONDM), 2003, pp [17] K. Chan and T. P. Yum, Analysis of least congested path routing in WDM lightwave networks, in Proc. IEEE INFOCOM, 1994, pp [18] L. Li and A. K. Somani, Dynamic wavelength routing using congestion and neighborhood information, IEEE/ACM Trans. Networking, vol. 7, pp , Oct [19] C.-F. Hsu, T.-L. Liu, and N.-F. Huang, Performance of adaptive routing strategies in wavelength-routed networks, in Proc. IEEE Int. Performance, Computing, And Communications Conf. (IPCCC), 2001, pp
7 RUAN et al.: A DYNAMIC ROUTING ALGORITHM WITH LOAD BALANCING HEURISTICS 1829 [20] D. Katz, K. Kompella, and D. Yeung, Traffic engineering (TE) extensions to OSPF version 2, RFC 3630, Sept [21] W. D. Grover and J. Doucette, Design of a meta-mesh of chain subnetworks: enhancing the attractiveness of mesh-restorable WDM networking on low connectivity graphs, IEEE J. Select. Areas Commun., vol. 20, pp , Jan Haibo Luo received the B.E. degree from Beijing University of Aeronautics and Astronautics, Beijing, China, in 1996, the M.E. degree from Zhejiang University, Hangzhou, China, in 1999, and the M.S. degree in computer science from Iowa State University, Ames, in He is currently with Microsoft Corporation, Redmond, WA. His research interests included restoration in optical networks. Lu Ruan (M 02) received the B.E. degree in computer science from Tsinghua University, Beijing, China, in 1996, and the M.S. and Ph.D. degrees in computer science from the University of Minnesota, Twin Cities, in 1999 and 2001, respectively. She is currently an Assistant Professor of Computer Science at Iowa State University, Ames. Her research interests include next-generation Internet, optical networks, and wireless networks. Dr. Ruan is a recipient of a CAREER Award from the National Science Foundation. Chang Liu received the B.E. degree in computer science and engineering from Beijing Institute of Technology, Beijing, China, in 1994, the M.S. degree in computer science from Peking University, Beijing, China, in 1999, and the M.S. degree in computer science from Iowa State University, Ames, in He is currently working toward the Ph.D. degree in the Department of Computer Science, Iowa State University. His research interests include optical networks, wireless networks, and distributed systems.
A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks
A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland
More informationEfficient path protection using Bi-directional WDM transmission technology. Title
Title Efficient path protection using Bi-directional WDM transmission technology Author(s) Li, J; Yeung, KL Citation Globecom - Ieee Global Telecommunications Conference, 2005, v. 4, p. 1910-1914 Issued
More informationADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS
ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National
More informationAn Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks
An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks Timothy Hahn, Shen Wan March 5, 2008 Montana State University Computer Science Department Bozeman,
More informationNew and Improved Approaches for Shared-Path Protection in WDM Mesh Networks
JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 22, NO. 5, MAY 2004 1223 New and Improved Approaches for Shared-Path Protection in WDM Mesh Networks Canhui (Sam) Ou, Student Member, IEEE, Jing Zhang, Student Member,
More informationOptical Communications and Networking 朱祖勍. Nov. 27, 2017
Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by
More informationSimple Layout Algorithms To Maintain Network Connectivity Under Faults
Simple Layout Algorithms To Maintain Network Connectivity Under Faults Galen H. Sasaki 1 Department of Electrical, University of Hawaii 2540 Dole Street, Honolulu, HI 96822 USA Ching-Fong Su and David
More informationSurvivable WDM Mesh Networks
870 JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 21, NO. 4, APRIL 2003 Survivable WDM Mesh Networks S. Ramamurthy, Laxman Sahasrabuddhe, Member, IEEE, and Biswanath Mukherjee, Member, IEEE Abstract In a wavelength-division-muliplexing
More informationDYNAMIC ROUTING WITH PARTIAL INFORMATION IN MESH-RESTORABLE OPTICAL NETWORKS *
DYNAMIC ROUTING WITH PARTIAL INFORMATION IN MESH-RESTORABLE OPTICAL NETWORKS * Murari Sridharan, R. Srinivasan and Arun K. Somani Dependable Computing & Networking Laboratory Department of Electrical and
More informationTRAFFIC GROOMING WITH BLOCKING PROBABILITY REDUCTION IN DYNAMIC OPTICAL WDM NETWORKS
TRAFFIC GROOMING WITH BLOCKING PROBABILITY REDUCTION IN DYNAMIC OPTICAL WDM NETWORKS K.Pushpanathan 1, Dr.A.Sivasubramanian 2 1 Asst Prof, Anand Institute of Higher Technology, Chennai-603103 2 Prof &
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER 2003 1173 A Comprehensive Study on Next-Generation Optical Grooming Switches Keyao Zhu, Student Member, IEEE, Hui Zang, Member,
More informationA Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks
Proceedings of the International Conference on Computer and Communication Engineering 008 May 3-5, 008 Kuala Lumpur, Malaysia A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks
More informationOn-Line Routing in WDM-TDM Switched Optical Mesh Networks
On-Line Routing in WDM-TDM Switched Optical Mesh Networks Arun Vishwanath and Weifa Liang Department of Computer Science The Australian National University Canberra, ACT-0200, Australia Email: {arunv,wliang}@cs.anu.edu.au
More informationn = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0
A Comparison of Allocation Policies in Wavelength Routing Networks Yuhong Zhu a, George N. Rouskas b, Harry G. Perros b a Lucent Technologies, Acton, MA b Department of Computer Science, North Carolina
More information704 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 3, JUNE Xiaowen Chu, Member, IEEE, and Bo Li, Senior Member, IEEE
704 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 3, JUNE 2005 Dynamic Routing and Wavelength Assignment in the Presence of Wavelength Conversion for All-Optical Networks Xiaowen Chu, Member, IEEE,
More informationEfficient Distributed Restoration Path Selection for Shared Mesh Restoration
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 5, OCTOBER 2003 761 Efficient Distributed Restoration Path Selection for Shared Mesh Restoration Guangzhi Li, Member, IEEE, Dongmei Wang, Member, IEEE,
More informationNew QoS Measures for Routing and Wavelength Assignment in WDM Networks
New QoS Measures for Routing and Wavelength Assignment in WDM Networks Shi Zhong Xu and Kwan L. Yeung Department of Electrical & Electronic Engineering The University of Hong Kong Pokfulam, Hong Kong Abstract-A
More informationDelayed reservation decision in optical burst switching networks with optical buffers
Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of
More informationSPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS
SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS D. Harle, S. Albarrak, F. Ali Department of Electrical and Electronic Engineering, University of Strathclyde, U. K {d.harle,sbarrak,
More informationRollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks
Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks Kwangil Lee Department of Electrical and Computer Engineering University of Texas, El Paso, TX 79928, USA. Email:
More informationFault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue
Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue Sandip R. Shinde Research Scholar, Sathyabama University, Chennai & Assistant Professor, Vishwakarma
More informationAdaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks
Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Tibor Fabry-Asztalos, Nilesh Bhide and Krishna M. Sivalingam School of Electrical Engineering &
More informationWDM Network Provisioning
IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the
More informationWDM Network Provisioning
IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the
More informationNetwork Topology Control and Routing under Interface Constraints by Link Evaluation
Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu
More informationConfiguration of Offset Time in Optical Burst Switching Networks for Delay Sensitive Traffic
Configuration of Offset Time in Optical Burst Switching Networks for Delay Sensitive Traffic Anupam Soni and Yatindra Nath Singh anusoni@iitk.ac.in,ynsingh@iitk.ac.in. Abstract In Optical Burst Switching
More informationFault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee
DIMACS Series in Discrete Mathematics and Theoretical Computer Science Fault-Tolerant Design of Wavelength-Routed Optical Networks S. Ramamurthy and Biswanath Mukherjee Abstract. This paper considers optical
More informationDynamic Wavelength Assignment for WDM All-Optical Tree Networks
Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of
More informationROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING
ROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING Mohamed KOUBAA, Nicolas PUECH, and Maurice GAGNAIRE Telecom Paris - LTCI -
More informationAn Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks
An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks Hui Wang, George N. Rouskas Operations Research and Department of Computer Science, North Carolina State University, Raleigh,
More informationConstraint-Based Loose Explicit Routing and Signaling for Inter- Domain Lightpath Provisioning in Wavelength Routed Optical Network
Constraint-Based Loose Explicit Routing and Signaling for Inter- Domain Lightpath Provisioning in Wavelength Routed Optical Network Shoib Siddiqui *a, Hussein.T. Mouftah a, Jing Wu b, Michel Savoie b a
More informationEnergy-Efficient Traffic GroominginWDM Networks With Scheduled Time Traffic
JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 29, NO. 17, SEPTEMBER 1, 2011 2577 Energy-Efficient Traffic GroominginWDM Networks With Scheduled Time Traffic Shuqiang Zhang, Student Member, IEEE, Dong Shen, Student
More informationOn Disjoint Path Pairs with Wavelength Continuity Constraint in WDM Networks
On Disjoint Path Pairs with Wavelength Continuity Constraint in WDM Networks Reid Andersen Fan Chung Arunabha Sen Guoliang Xue Department of Computer Science and Engineering Department of Computer Science
More informationAbsolute QoS Differentiation in Optical Burst-Switched Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 1781 Absolute QoS Differentiation in Optical Burst-Switched Networks Qiong Zhang, Student Member, IEEE, Vinod M. Vokkarane,
More informationAutomatic Service and Protection Path Computation - A Multiplexing Approach
Automatic Service and Protection Path Computation - A Multiplexing Approach Loay Alzubaidi 1, Ammar El Hassan 2, Jaafar Al Ghazo 3 1 Department of Computer Engineering & Science, Prince Muhammad bin Fahd
More informationDynamic service Allocation with Protection Path
www.ijcsi.org 115 Dynamic service Allocation with Protection Path Loay Alzubaidi Department of Computer Engineering & Science, Prince Muhammad bin Fahd University AL-Khobar, Saudi Arabia Abstract Path
More informationTHE EXPLOSIVE growth of Web-related services over the. A Practical Approach to Operating Survivable WDM Networks
34 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 A Practical Approach to Operating Survivable WDM Networks Murari Sridharan, Student Member, IEEE, Murti V. Salapaka, and
More information218 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 1, FEBRUARY 2006
218 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 14, NO 1, FEBRUARY 2006 Survivable Virtual Concatenation for Data Over SONET/SDH in Optical Transport Networks Canhui (Sam) Ou, Student Member, IEEE, Laxman
More informationDistributed Clustering Method for Large-Scaled Wavelength Routed Networks
Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima Graduate School of Information Science and Technology, Osaka University - Yamadaoka, Suita, Osaka 60-08, Japan
More informationSurvivability with P-Cycle in WDM Networks
Survivability with P-Cycle in WDM Networks K. Aparna 1, P. Ramya Krishna 2 JNTUA College of Engineering, Pulivendula Abstract: In this paper we discuss about the Pre-Configured survivability schemes. Network
More informationSpare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection
Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Victor Yu Liu Network Advanced Research, Huawei Technologies Santa Clara, California, USA yuliu@ieee.org Abstract
More informationTraffic Grooming for Survivable WDM Networks Shared Protection
Traffic Grooming for Survivable WDM Networks Shared Protection Canhui (Sam) Ou, Keyao Zhu, Hui Zang, Laxman H. Sahasrabuddhe, and Biswanath Mukherjee Abstract This paper investigates the survivable trafficgrooming
More informationDistributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks
Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry
More informationPerformance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License
Title Performance analysis of realistic optical time division multiplexed wavelength routed networks Author(s) Li, CY; Li, G; Wai, PKA; Li, VOK Citation The 8th IEEE Annual Workshop on Computer Communications
More informationOutline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006
EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modelling Yong Liu 09/19/2006 1 Outline Examples Basic Problems Routing Restriction 2 1 Example: Intra-Domain Traffic Engineering
More informationDesign of Hierarchical Crossconnect WDM Networks Employing a Two-Stage Multiplexing Scheme of Waveband and Wavelength
166 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 Design of Hierarchical Crossconnect WDM Networks Employing a Two-Stage Multiplexing Scheme of Waveband and Wavelength
More informationHeuristic Algorithms for Multiconstrained Quality-of-Service Routing
244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service
More informationEXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 69-72 EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS Sushil Chaturvedi
More informationA Link Bundled Auxiliary Graph Model for Constrained Dynamic Traffic Grooming in WDM Mesh Networks
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 8-2005 A Link Bundled Auxiliary Graph Model for Constrained
More informationIO2654 Optical Networking. WDM network design. Lena Wosinska KTH/ICT. The aim of the next two lectures. To introduce some new definitions
IO2654 Optical Networking WDM network design Lena Wosinska KTH/ICT 1 The aim of the next two lectures To introduce some new definitions To make you aware about the trade-offs for WDM network design To
More informationA Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks
A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks Iyad Katib and Deep Medhi Computer Science & Electrical Engineering Department University of Missouri-Kansas City, USA {IyadKatib,
More informationBuffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks
JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 18, NO. 6, JUNE 2000 757 Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks Jinhan Song and Saewoong Bahk Abstract In this paper we
More informationAnalysis and Algorithms for Partial Protection in Mesh Networks
Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT
More informationAn Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops
An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops Harsha V. Madhyastha Department of Computer Science and Engineering Indian Institute of Technology, Madras Chennai,
More information254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007
254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 A Scalable Path Protection Mechanism for Guaranteed Network Reliability Under Multiple Failures Changcheng Huang, Senior Member, IEEE, Minzhe
More informationEstablishment of Survivable Connections in WDM Networks using Partial Path Protection
Establishment of Survivable Connections in WDM Networks using Partial Path Protection G. Xue 1, Senior Member, IEEE, W. Zhang 1,J.Tang 1, and K. Thulasiraman 2, Fellow, IEEE Abstract As a generalization
More informationA Study of Waveband Switching With Multilayer Multigranular Optical Cross-Connects
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER 2003 1081 A Study of Waveband Switching With Multilayer Multigranular Optical Cross-Connects Xiaojun Cao, Student Member, IEEE,
More informationToward a Reliable Data Transport Architecture for Optical Burst-Switched Networks
Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University
More informationToward the joint design of electronic and optical layer protection
Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS
More informationWavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks
Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Amit Shukla, L. Premjit Singh and Raja Datta, Dept. of Computer Science and Engineering, North Eastern Regional Institute
More informationEfficient Distributed Solution for MPLS Fast Reroute
Efficient Distributed Solution for MPLS Fast Reroute Dongmei Wang and Guangzhi Li AT&T Labs- Research, 180 Park Avenue, Florham Park, NJ 07932 {mei,gli}@research.att.com Ahstract. As service providers
More informationResearch on Control Routing Technology in Communication Network
Appl. Math. Inf. Sci. 6 No. 1S pp. 129S-133S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Research on Control Routing Technology
More informationA Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,
More informationDesign of CapEx-Efficient IP-over-WDM Network using Auxiliary Matrix based Heuristic
IEEE ANTS 2014 1570023335 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 60 61 62 63 64
More informationOn Optimal Survivability Design in WDM Optical Networks under Scheduled Traffic Models
Wright State University CORE Scholar Browse all Theses and Dissertations Theses and Dissertations 27 On Optimal Survivability Design in WDM Optical Networks under Scheduled Traffic Models Tianjian Li Wright
More informationComparison of Protection Cost at IP or WDM Layer
Comparison of Protection Cost at IP or WDM Layer Mauro Cuna Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it Marco Mellia Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it
More informationResearch Article Comparative Analysis of Routing and Wavelength Assignment Algorithms used in WDM Optical Networks
Research Journal of Applied Sciences, Engineering and Technology 7(13): 2646-2654, 2014 DOI:10.19026/rjaset.7.581 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationOPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005
OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in
More informationA NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS
A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS Nizar Bouabdallah^'^, Emannuel Dotaro^ and Guy Pujolle^ ^Alcatel Research & Innovation, Route de Nozay, F-91460 Marcoussis, France
More informationTraffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks
Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Ankitkumar N. Patel, Chengyi Gao, and Jason P. Jue Erik Jonsson School of Engineering and Computer Science The University
More informationSpectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks
Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks André C. S. Donza, Carlos R. L. Francês High Performance Networks Processing Lab - LPRAD Universidade
More informationApplication-Aware Protection in DWDM Optical Networks
Application-Aware Protection in DWDM Optical Networks Hamza Drid, Nasir Ghani, Bernard Cousin To cite this version: Hamza Drid, Nasir Ghani, Bernard Cousin. Application-Aware Protection in DWDM Optical
More informationPrioritized Shufflenet Routing in TOAD based 2X2 OTDM Router.
Prioritized Shufflenet Routing in TOAD based 2X2 OTDM Router. Tekiner Firat, Ghassemlooy Zabih, Thompson Mark, Alkhayatt Samir Optical Communications Research Group, School of Engineering, Sheffield Hallam
More informationMulti-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures
Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Anna Urra, Eusebi Calle, and Jose L. Marzo Institute of Informatics and Applications (IIiA), University of Girona, Girona
More informationDistributed Clustering Method for Large-Scaled Wavelength Routed Networks
Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima, Hiroaki Harai, Shin ichi Arakawa, and Masayuki Murata Graduate School of Information Science and Technology,
More informationSparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms
Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sanjay K. Bose, SMIEEE, Y.N. Singh, MIEEE A.N.V.B. Raju Bhoomika Popat Department of Electrical
More informationDesign Methodologies and Algorithms for Survivable C-RAN
16 Regular papers ONDM 218 Design Methodologies and Algorithms for Survivable C-RAN Bahare M. Khorsandi, Federico Tonini, Carla Raffaelli DEI, University of Bologna Viale Risorgimento 2, 4136 Bologna,
More informationON THE PARTIAL PATH PROTECTION SCHEME FOR WDM OPTICAL NETWORKS AND POLYNOMIAL TIME COMPUTABILITY OF PRIMARY AND SECONDARY PATHS
JOURNAL OF INDUSTRIAL AND Website: http://aimsciences.org MANAGEMENT OPTIMIZATION Volume 3, Number 4, November 2007 pp. 625 643 ON THE PARTIAL PATH PROTECTION SCHEME FOR WDM OPTICAL NETWORKS AND POLYNOMIAL
More informationProgress Report No. 15. Shared Segments Protection
NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury
More informationSurvivable Multipath Provisioning in OFDM-Based Flexible Optical Networks
Survivable Multipath Provisioning in OFDM-Based Flexible Optical Networks Nan Xiao and Lu Ruan Department of Computer Science Iowa Stat University, Ames, IA 11 Email: {nxiao, ruanlu}@iastate.edu Abstract
More informationA Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 2, APRIL 2003 285 A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks Hongyue Zhu, Student Member, IEEE, Hui Zang, Member,
More informationInternet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks
Internet Traffic Characteristics Bursty Internet Traffic Statistical aggregation of the bursty data leads to the efficiency of the Internet. Large Variation in Source Bandwidth 10BaseT (10Mb/s), 100BaseT(100Mb/s),
More informationGA-Based Hybrid Algorithm for MBR Problem of FIPP p-cycles for Node Failure on Survivable WDM Networks
GA-Based Hybrid Algorithm for MBR Problem of FIPP p-cycles for Node Failure on Survivable WDM Networks Der-Rong Din Department of Computer Science and Information Engineering, National Changhua University
More informationDynamic Routing and Resource Assignment Algorithm in Sloted Optical Networks
TELKOMNIKA, Vol. 11, No. 4, April 2013, pp. 1813~1821 ISSN: 2302-4046 1813 Dynamic Routing and Resource Assignment Algorithm in Sloted Optical Networks Bisheng Quan* 1, Hui Li 2, Zichun Le 3 1,2,3 College
More informationREDUCTION OF BLOCKING PROBABILITY IN SHARED PROTECTED OPTICAL NETWORK
REDUCTION OF BLOCKING PROBABILITY IN SHARED PROTECTED OPTICAL NETWORK Nirmala L Devi 1, V M Pandharipande 2, 1 Department of Electronics and Communications Engineering, Osmania University, Hyderabad, India-500007.
More informationECE442 Communications Lecture 4. Optical Networks
ECE442 Communications Lecture 4. Optical Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Network Elements 1 WDM networks provide circuit switched end-to-end optical
More informationPerformance Analysis on Various Wavelength Assignment Algorithms with Traffic Grooming
Proc. of Int. Conf. on Emerging Trends in Engineering and Technology Performance Analysis on Various Wavelength Assignment Algorithms with Traffic Grooming Vikas Kaushik 1, R.S Chauhan 2 1 JMIT Radaur/ECE
More informationA Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings
A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings Xin Yuan Amit Fulay Department of Computer Science Florida State University Tallahassee, FL 32306 {xyuan, fulay}@cs.fsu.edu Abstract
More informationDYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS
DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS Shinya Ishida Graduate School of Information Science and Technology, Osaka University Machikaneyama 1-32, Toyonaka, Osaka, 0-0043
More informationA load-balancing spare capacity reallocation approach in service-rich SONET metro mesh networks
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Workshop Papers Computer Science and Engineering, Department of 2004 A load-balancing spare capacity
More informationNetwork Survivability Performance Evaluation with Applications in WDM Networks with Wavelength Conversion
Network Survivability Performance Evaluation with Applications in WDM Networks with Wavelength Conversion Manijeh Keshtgary, Fahad A. Al-Zahrani, Anura P. Jayasumana Electrical and Computer Engineering
More information10 Optical Network Engineering
10 Optical Network Engineering George N. Rouskas Department of Computer Science North Carolina State University Raleigh, NC 27695-7534 Email: rouskas@csc.ncsu.edu 10.1 INTRODUCTION Over the last few years
More informationPerformance Assessment of Wavelength Routing Optical Networks with Regular Degree-Three Topologies of Minimum Diameter
Performance Assessment of Wavelength Routing Optical Networks with Regular Degree-Three Topologies of Minimum Diameter RUI M. F. COELHO 1, JOEL J. P. C. RODRIGUES 2, AND MÁRIO M. FREIRE 2 1 Superior Scholl
More informationSignaling schemes for distributed connection management in wavelength-routed optical mesh networks
Signaling schemes for distributed connection management in wavelength-routed optical mesh networks Lu Shen, Xi Yang and Byrav Ramamurthy Department of Computer Science and Engineering University of Nebraska
More informationPerformance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]
Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China
More informationArc Perturbation Algorithms for Optical Network Design
Applied Mathematical Sciences, Vol. 1, 2007, no. 7, 301-310 Arc Perturbation Algorithms for Optical Network Design Zbigniew R. Bogdanowicz Armament Research, Development and Engineering Center Building
More informationResilient IP Backbones. Debanjan Saha Tellium, Inc.
Resilient IP Backbones Debanjan Saha Tellium, Inc. dsaha@tellium.com 1 Outline Industry overview IP backbone alternatives IP-over-DWDM IP-over-OTN Traffic routing & planning Network case studies Research
More informationDynamic GMPLS-based Establishment of Bidirectional Connections in All-Optical Networks
Dynamic GMPLS-based Establishment of Bidirectional Connections in All-Optical Networks Ricardo Martinez, Raül Muñoz Centre Tecnològic de Telecomunicacions de Catalunya, Spain {ricardo.martinez, raul.munoz}@cttc.es
More informationDynamic Wavelength Routing in WDM Networks via Ant Colony Optimization
Dynamic Wavelength Routing in WDM Networks via Ant Colony Optimization Ryan M. Garlick 1 and Richard S. Barr 2 1 CSE Dept., Southern Methodist University, Dallas, TX 75275 USA 2 EMIS Dept., Southern Methodist
More informationA Distributed Clustering Method for Hierarchical Routing in Large-Scaled Wavelength Routed Networks
IEICE TRANS. COMMUN., VOL.Exx??, NO.xx XXXX 0x PAPER Special Section on Next Generation Photonic Network Technologies A Distributed Clustering Method for Hierarchical Routing in Large-Scaled Wavelength
More information