Progress Report No. 15. Shared Segments Protection

Size: px
Start display at page:

Download "Progress Report No. 15. Shared Segments Protection"

Transcription

1 NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006

2 Abstract As a complement to the Canterbury NGN report 14 titled Service Availability and Recovery Time Models, this report introduces a promising network resilience mechanism named Shared Segments Protection (SSP), which can achieve the optimal trade-off solutions between connection availability, recovery time and spare capacity efficient. By dividing a primary working path into a sequence of segments and protecting each segment separately (or dividing the whole network into different domains where a sub path segment in one domain must be protected by the resources in the same domain), SSP can achieve a high scalability and fast recovery time for a modest sacrifice in resource utilization. 1. Background In the traditional IP networks with a connectionless transmission mode, data traffic on a link subject to a failure is recovered via Layer 3 or IP rerouting, or by some lower layer mechanisms such as SONET Automatic Protection Switching. These options may be used to restore IP packets of which the corresponding connections do not require further guarantee of service continuity and restoration time. With the emergence of some commercially important and delay-sensitive applications, such as high-priority voice and video traffic, equipping the connections of these applications with an end-to-end service-guaranteed protection and restoration plane becomes one of the major design issues in an NGN. The above task is particularly important when the photonic infrastructure is adopted in the backbone networks, where a fiber cut may influence million of end-users with different service requirements. In such a circumstance, not only the restorability of any service interruption must be guaranteed, but the restoration time for each connection subject to the failure within a specific limit to the corresponding application. In addition, network resources should be managed in such a way that the connections with a high-quality restoration requirement must be allocated with fast and prioritized restoration services, while the connections with lower restoration requirements can be equipped with slower restoration services (which is possibly more capacity efficient). Therefore, the development of the network resiliency schemes that can guarantee the restorability and also address spare capacity allocation efficiency and the maximum allowable interruption time should be the most critical issue in this NGN project. That is also the main reason that Canterbury Team highlights it several times and is continuing work on it. Before the Shared Segments Protection (SSP) mechanism is presented, the critical resiliency constraint imposed by the Shared Risk Link Group (SRLG) is firstly described and the conventional shared protection schemes (including shared path- and linkprotection) are also briefly overviewed.

3 1.1 Shared Risk Link Group (SRLG) Constraint Shared Risk Link Group (SRLG) [1] is defined as a group of network elements (i.e., links, nodes, physical devices, software/protocol identities, or a mix) subject to the same risk of single failure. The SRLG constraint defines the availability of protection resources to a working path, which stipulates that any two working paths sharing the same risk of failure (or in the same SRLG) cannot make use of the same protection resources. The SRLG constraint is imposed on the selection of protection resources for a newly arrived working path, which marks some of the existing protection paths as prohibited avoiding a resource conflict during a restoration process after failure. The purpose of following the SRLG constraint is to guarantee 100 percent restorability for failure on any single link or node in the network. An example demonstrating the SRLG constraint is given in Figure 1 below. Figure 1 An illustration of SRLG Since W2 traverses the link A-B, which shares the same risk of single failure with W1, the protection path for W2 should exclude the possibility of using any of the protection resources used by W1. Otherwise, a failure on link A-B will result in a resource conflict between W1 and W2 when both paths switch their traffic to the same protection channel. Therefore, the SRLG constraint stipulates that W2 cannot take any network resources along P1 for protection purposes. It is clear that as W1 becomes longer, there would be more working network components belonging to the same SRLG that suffers the sharing constraint. The SRLG constraint can be relaxed if extra switch-merge node pairs are allocated along a working path (or divide a large SRLG into several small ones) so that the sharing of protection resources can be improved. 1.2 Shared Path Protection For path-based protection, the source node of a working path computes a protection path by ensuring that the protection path is diversely routed from the working path according to the SRLG constraint. If a fault occurs on the working path, the terminating node in its control plane realizes the fault and sends a notification indicator signal (NIS) to the first hop node of the path to activate a switchover. The source then immediately sends a wake-up packet to activate the configuration of the nodes along the protection path and then switches traffic over from the working path to the protection path. The restoration time of path protection is strongly determined by the total length of the

4 working and protection path segments that circumvent the failed network element. Although path-based protection yields a simple signaling mechanism by circumventing any failure in an end-to-end fashion, it cannot guarantee the failure recovery time for the working path that need to meet stringent requirements on service continuity. In addition, with the path-based protection scheme, the SRLG constraint may limit resource sharing without any relaxation, and as a result impair performance. 1.3 Shared Link Protection Link-based protection was originally devised for ring-based network architectures such as synchronous optical network (SONET), where network planning efforts significantly influence performance. In general, link-based protection in mesh networks is defined as a protection mechanism that performs fault localization during the occurrence of a failure, restores the interrupted services by circumventing the traffic from a failed link or node at the upstream neighbor node, and merges the traffic back to the original working path at the downstream neighbor node. With this definition, two switch nodes must be arranged for every node along a working path. A. link-based protection provides the fastest restoration due to fault localization and better throughput due to the relaxation of the SRLG constraint. However, the downstream neighbor node and link are required to have separate protection segments, which may impair performance by consuming extra protection resources. 2. Framework of Shared Segments Protection (SSP) 2.1 Shared Segments Protection The promising protection scheme, i.e., Shared Segments Protection (SSP) [2] is an end-to-end service-guaranteed shared protection scheme, which enhances the link- and path-based shared protection to provide finer service granularity and higher network throughput. The main idea of SSP is to subdivide a working path into several reasonable length and overlapped segments when the working path is allocated. Each of the segments forms a protection domain (or called P domain), which has a local significance to the working path as shown in Figure 2 below: Figure 2 SSP scheme with overlapped P domains

5 The overlap between adjacent protection domains is for the purpose of protecting node failure along a working path. Each P domain has a path switch LSR (PSL) and a path merge LSR (PML), which switches over and merges back the affected traffic during a failure, respectively. For example, the PSL in each of the three P domains in Figure 2 above is A, E, and I, respectively; the PML is F, J, and N, respectively. A disjoint-routed protection path segment is searched for each working path segment in a P domain. Unlike the conventional resilience schemes, SSP performs the restoration process within a predefined P domain instead of along the whole path. With each working path segmented, restoration service can be guaranteed by limiting the size (or the sum of the distance of working and protection path segments) of P domains. Compared with path-based protection, the segmentation of working paths also yields less computation latency during path selection by using a fully distributed computing process. With this, the task of end-to-end diverse routing is divided into several subtasks, each of which deals with much reduced amount of link-state and computation efforts in the PSLs of the working path. The advantages of the SSP framework over the ordinary protection schemes (path-based and link-based shared protection) are summarized as below: Guaranteed recovery time: Both the notification and the traveling of the wake-up message are performed within a P domain; therefore, the restoration time can be guaranteed by adjusting the size of the P domains along a working path. Scalable: The computational complexity of protection paths is simplified due to the segmentation of working paths. The protection domain allocation process is scalable to the length of working paths (and also to the network size). Capacity Efficient: Compared with link-based shared protection, SSP provides flexibility and capacity efficiency to yield protection services adaptive to the requirements. SRLG Effective: Compared with the end-to-end path-based shared protection, the total computation complexity for correlating the SRLG constraint can be reduced due to the segmentation of working paths. In addition, more resource sharing can be explored by relaxing the SRLG constraint. 2.2 SSP Recovery Time Model The SSP recovery time model is extensively studied in [3]. The average recovery time [ms] expressed in ms (i.e., ) for SSP just in WDM layer can be modeled as follows: t r

6 t [ ms] r = f + 10n + n 1 j= l [ km] i + 10 P k + P k i= l where f is the number of lightpaths interrupted by one link failure. Variable n denotes the number of OXC nodes, from (and including) the upstream node adjacent to the failure, to the branch node of the recovery segment. The length of the ith link of the segment [km] (measured in km), after the branch node and before the merge node, is denoted by l i. The recovery time for shared path protection can also be represented using this analytical formula by setting the branch node (respectively the merge node) as the source (respectively destination) node. The term P is the number of links on the k-th protecting segment of the failed k-th working segment. More detailed information on SSP modeling and the methods of how to calculate its spare capacity allocation and recovery time could be found in [2], [3]. The numerical results significantly show that the restoration time of SSP can be shortened and guaranteed. In addition, a higher possibility of resource sharing can happen between different protection segments under considering the SRLG constraint. In summary, we want to highlight that, in our understanding, the main purpose of this NGN resiliency project is to develop a systematic methodology to quantitatively estimate a connection's availability, especially when various dedicated or shared protection and restoration schemes are applied to the connection. Such a methodology can essentially help Telecom to understand how well and at what cost a connection is protected and whether or not a service quality can be guaranteed instead of simply stating that a connection is protected. As a consequence, the main outcome of this NGN project should be to determine cost-effective, service availability-aware and connection provisioning schemes for differentiated services. Shared Segments Protection (SSP) is a promising solution to achieve this goal by flexibly adjusting segment sizes. It needs to be further studied in the light of the previous proposal of using the outage/recovery time distribution in the resiliency model, which is an applicable model for holistically evaluating several resilience issues, i.e., recovery time, spare capacity allocation and service availability. Discussion Points Point 1 The Canterbury team suggests further exploration of the shared segment protection scheme in this NGN project, for possible consideration as one of selected resilience mechanisms for the NZ Telecom NGN. Point 2 The Canterbury team also suggests verification of the SSP recovery time model in the NGN measurement plan. k [ km] i

7 References [1] D. Papadimitriou and et al., Inference of shared risk link groups, in Internet draft, Nov [2] P.-H. Ho, J. Tapolcai, and T. Cinkler, Segment shared protection in mesh communication networks with bandwidth guaranteed tunnels, IEEE/ACM Trans, VOL.12, NO.6, December, 2004 [3] J. Tapolcai, P.-H. Ho, D. Verchere, and T. Cinkler, A Novel Shared Segment Protection Method for Guaranteed Recovery Time, in Proc. BROADNETS 2005, Boston, MA, Oct. 3-7, 2005

Resilient IP Backbones. Debanjan Saha Tellium, Inc.

Resilient IP Backbones. Debanjan Saha Tellium, Inc. Resilient IP Backbones Debanjan Saha Tellium, Inc. dsaha@tellium.com 1 Outline Industry overview IP backbone alternatives IP-over-DWDM IP-over-OTN Traffic routing & planning Network case studies Research

More information

The LSP Protection/Restoration Mechanism in GMPLS. Ziying Chen

The LSP Protection/Restoration Mechanism in GMPLS. Ziying Chen The LSP Protection/Restoration Mechanism in GMPLS by Ziying Chen The LSP Protection/Restoration Mechanism in GMPLS by Ziying Chen A graduation project submitted to the Faculty of Graduate and Postdoctoral

More information

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS IT Specialist Dorina LuminiŃa Copaci Gorj Court IT Expert Constantin Alin Copaci ANRCTI Bucharest Abstract: A large number of recovery mechanisms

More information

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS D. Harle, S. Albarrak, F. Ali Department of Electrical and Electronic Engineering, University of Strathclyde, U. K {d.harle,sbarrak,

More information

SHARED MESH RESTORATION IN OPTICAL NETWORKS

SHARED MESH RESTORATION IN OPTICAL NETWORKS SHARED MESH RESTORATION IN OPTICAL NETWORKS OFC 2004 Jean-Francois Labourdette, Ph.D. labourdette@ieee.org Page: 2 Outline Introduction Network & Restoration Arch Evolution Mesh Routing & Provisioning

More information

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modelling Yong Liu 09/19/2006 1 Outline Examples Basic Problems Routing Restriction 2 1 Example: Intra-Domain Traffic Engineering

More information

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland

More information

Progress Report No. 13. P-Cycles and Quality of Recovery

Progress Report No. 13. P-Cycles and Quality of Recovery NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 13 P-Cycles and Quality of Recovery The University of Canterbury Team 12 April 2006 Abstract Since the p-cycle resilience

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY /$ IEEE

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY /$ IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY 2010 67 1+NNetwork Protection for Mesh Networks: Network Coding-Based Protection Using p-cycles Ahmed E. Kamal, Senior Member, IEEE Abstract

More information

10 Optical Network Engineering

10 Optical Network Engineering 10 Optical Network Engineering George N. Rouskas Department of Computer Science North Carolina State University Raleigh, NC 27695-7534 Email: rouskas@csc.ncsu.edu 10.1 INTRODUCTION Over the last few years

More information

A Comparative Study on Protection Methods in MPLS-TP Networks

A Comparative Study on Protection Methods in MPLS-TP Networks A Comparative Study on Protection Methods in MPLS-TP Networks Jiji Soman 1, Devi Murali 2 Semester II, M.Tech Communication Engineering, Sree Buddha College of Engineering for Women, Elavumthitta, Pathanamthitta,

More information

Optical Communications and Networking 朱祖勍. Nov. 27, 2017

Optical Communications and Networking 朱祖勍. Nov. 27, 2017 Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by

More information

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks Iyad Katib and Deep Medhi Computer Science & Electrical Engineering Department University of Missouri-Kansas City, USA {IyadKatib,

More information

Network Survivability

Network Survivability Network Survivability Bernard Cousin Outline Introduction to Network Survivability Types of Network Failures Reliability Requirements and Schemes Principles of Network Recovery Performance of Recovery

More information

Survivability with P-Cycle in WDM Networks

Survivability with P-Cycle in WDM Networks Survivability with P-Cycle in WDM Networks K. Aparna 1, P. Ramya Krishna 2 JNTUA College of Engineering, Pulivendula Abstract: In this paper we discuss about the Pre-Configured survivability schemes. Network

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

A Review of Traffic Management in WDM Optical Networks: Progress and Challenges

A Review of Traffic Management in WDM Optical Networks: Progress and Challenges www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 8 August 2017, Page No. 22309-22313 Index Copernicus value (2015): 58.10 DOI: 10.18535/ijecs/v6i8.13

More information

WDM Network Provisioning

WDM Network Provisioning IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Multi-layer protection and restoration requirements

Multi-layer protection and restoration requirements Multi-layer protection and restoration requirements Date: July 23 rd, 2001 Source: Sudheer Dharanikota Raj Jain Nayna Networks Yong Xue Erik Sherk WorldCom ABSTRACT: This document provides the necessary

More information

Multi Protocol Label Switching

Multi Protocol Label Switching MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 MPLS: introduction

More information

MPLS Multi-Protocol Label Switching

MPLS Multi-Protocol Label Switching MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Computer Networks Design and Management - 1 MPLS: introduction

More information

ECE442 Communications Lecture 4. Optical Networks

ECE442 Communications Lecture 4. Optical Networks ECE442 Communications Lecture 4. Optical Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Network Elements 1 WDM networks provide circuit switched end-to-end optical

More information

OPTICAL NETWORKS. Optical Metro Networks. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Optical Metro Networks. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Optical Metro Networks A. Gençata İTÜ, Dept. Computer Engineering 2005 Introduction Telecommunications networks are normally segmented in a three-tier hierarchy: Access, metropolitan,

More information

Local Restoration in Metro Ethernet Networks for Multiple Link Failures

Local Restoration in Metro Ethernet Networks for Multiple Link Failures Local Restoration in Metro Ethernet etworks for Multiple Link Failures Shibu. V Department of Computer Applications. Preetha Mathew K Department of Computer Applications. Jabir.K.V.T Department of Information

More information

SYSC 5801 Protection and Restoration

SYSC 5801 Protection and Restoration SYSC 5801 Protection and Restoration Introduction Fact: Networks fail. Types of failures: Link failures Node failures Results: packet losses, waste of resources, and higher delay. What IGP does in the

More information

ITU-T Y Protection switching for MPLS networks

ITU-T Y Protection switching for MPLS networks INTERNATIONAL TELECOMMUNICATION UNION ITU-T Y.1720 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2003) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE AND INTERNET PROTOCOL ASPECTS Internet protocol

More information

David Tipper Graduate Telecommunications and Networking Program University of Pittsburgh. Motivation

David Tipper Graduate Telecommunications and Networking Program University of Pittsburgh. Motivation Survivable Network Design David Tipper Graduate Telecommunications and Networking Program University of Pittsburgh Telcom 2110 Slides 12 Motivation Communications networks need to be survivable? Communication

More information

Optical Packet Switching

Optical Packet Switching Optical Packet Switching DEISNet Gruppo Reti di Telecomunicazioni http://deisnet.deis.unibo.it WDM Optical Network Legacy Networks Edge Systems WDM Links λ 1 λ 2 λ 3 λ 4 Core Nodes 2 1 Wavelength Routing

More information

Automatic Service and Protection Path Computation - A Multiplexing Approach

Automatic Service and Protection Path Computation - A Multiplexing Approach Automatic Service and Protection Path Computation - A Multiplexing Approach Loay Alzubaidi 1, Ammar El Hassan 2, Jaafar Al Ghazo 3 1 Department of Computer Engineering & Science, Prince Muhammad bin Fahd

More information

Fault management. Acnowledgements

Fault management. Acnowledgements Fault management Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Computer Networks Design and Management - Acnowledgements Inspired by Davide

More information

Application-Aware Protection in DWDM Optical Networks

Application-Aware Protection in DWDM Optical Networks Application-Aware Protection in DWDM Optical Networks Hamza Drid, Nasir Ghani, Bernard Cousin To cite this version: Hamza Drid, Nasir Ghani, Bernard Cousin. Application-Aware Protection in DWDM Optical

More information

Efficient Distributed Solution for MPLS Fast Reroute

Efficient Distributed Solution for MPLS Fast Reroute Efficient Distributed Solution for MPLS Fast Reroute Dongmei Wang and Guangzhi Li AT&T Labs- Research, 180 Park Avenue, Florham Park, NJ 07932 {mei,gli}@research.att.com Ahstract. As service providers

More information

MPLS OAM Technology White Paper

MPLS OAM Technology White Paper MPLS OAM Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks

A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks Tamkang Journal of Science and Engineering, Vol. 14, No. 1, pp. 81 89 (2011) 81 A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks I-Shyan Hwang 1 *, San-Nan

More information

OSPF IN OPTICAL NETWORKS

OSPF IN OPTICAL NETWORKS Analysis of Enhanced OSPF for Routing Lightpaths in Optical Mesh Networks Sudipta Sengupta, Debanjan Saha, and Sid Chaudhuri Tellium, Inc., 2 Crescent Place PO Box 91 Oceanport, NJ 7757-91, USA. Abstract

More information

Diversity Coded 5G Fronthaul Wireless Networks

Diversity Coded 5G Fronthaul Wireless Networks IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University

More information

Fault management. Fault management. Acnowledgements. The impact of network failures. Pag. 1. Inspired by

Fault management. Fault management. Acnowledgements. The impact of network failures. Pag. 1. Inspired by Fault management ndrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 cnowledgements Inspired by Davide

More information

Bridging the Ring-Mesh Dichotomy with p-cycles:

Bridging the Ring-Mesh Dichotomy with p-cycles: Bridging the Ring-Mesh Dichotomy with p-cycles: Ring-like speed with mesh-like capacity Wayne D. Grover, Demetrios Stamatelakis TRLabs, University of Alberta, Edmonton, Alberta, Canada DRCN 2000 April

More information

SONET Topologies and Upgrades

SONET Topologies and Upgrades CHAPTER 9 Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring

More information

Efficient path protection using Bi-directional WDM transmission technology. Title

Efficient path protection using Bi-directional WDM transmission technology. Title Title Efficient path protection using Bi-directional WDM transmission technology Author(s) Li, J; Yeung, KL Citation Globecom - Ieee Global Telecommunications Conference, 2005, v. 4, p. 1910-1914 Issued

More information

Simulation of All Optical Networks

Simulation of All Optical Networks Simulation of All Optical Networks Raul Valls Aranda Communication Department Polytechnic University of Valencia (UPV) C/ Camino de Vera s/n Valencia, Spain Pablo A. Beneit Mayordomo Communication Department

More information

Simple Layout Algorithms To Maintain Network Connectivity Under Faults

Simple Layout Algorithms To Maintain Network Connectivity Under Faults Simple Layout Algorithms To Maintain Network Connectivity Under Faults Galen H. Sasaki 1 Department of Electrical, University of Hawaii 2540 Dole Street, Honolulu, HI 96822 USA Ching-Fong Su and David

More information

CHAPTER I INTRODUCTION. In Communication Networks, Survivability is an important factor

CHAPTER I INTRODUCTION. In Communication Networks, Survivability is an important factor 1 CHAPTER I INTRODUCTION In Communication Networks, Survivability is an important factor to be considered in planning and designing of Survivable Fiber Optic Networks (SFON). Survivability depicts network

More information

Emerging MPLS OAM mechanisms

Emerging MPLS OAM mechanisms Emerging MPLS OAM mechanisms Answering the interoperability and scalability question Data Networks Operation John Nakulski Product Manager October 2006 Page 1 Agenda Introduction The Need for MPLS OAM

More information

An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation

An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation Telecommunication Systems 19:3,4, 481 495, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation GAEIL

More information

Comparison of Protection Cost at IP or WDM Layer

Comparison of Protection Cost at IP or WDM Layer Comparison of Protection Cost at IP or WDM Layer Mauro Cuna Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it Marco Mellia Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it

More information

A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks

A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 2, APRIL 2003 285 A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks Hongyue Zhu, Student Member, IEEE, Hui Zang, Member,

More information

MPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino)

MPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino) MPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino) http://staff.polito.it/mario.baldi MPLS - 1 From MPLS Forum Documents MPLS is the enabling technology

More information

A Comparison of Path Protections with Availability Concern in WDM Core Network

A Comparison of Path Protections with Availability Concern in WDM Core Network A Comparison of Path Protections with Availability Concern in WDM Core Network M. A. Farabi Photonic Technology Lab, Universiti Teknologi, S. M. Idrus Member, IEEE Photonic Technology Lab, Universiti Teknologi,

More information

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 6, DECEMBER

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 6, DECEMBER IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 6, DECEMBER 2004 1119 Loopback Recovery From Double-Link Failures in Optical Mesh Networks Hongsik Choi, Member, IEEE, Suresh Subramaniam, Member, IEEE,

More information

1. INTRODUCTION light tree First Generation Second Generation Third Generation

1. INTRODUCTION light tree First Generation Second Generation Third Generation 1. INTRODUCTION Today, there is a general consensus that, in the near future, wide area networks (WAN)(such as, a nation wide backbone network) will be based on Wavelength Division Multiplexed (WDM) optical

More information

HUAWEI OceanStor Enterprise Unified Storage System. HyperReplication Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI OceanStor Enterprise Unified Storage System. HyperReplication Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD. HUAWEI OceanStor Enterprise Unified Storage System HyperReplication Technical White Paper Issue 01 Date 2014-03-20 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may

More information

Dynamic service Allocation with Protection Path

Dynamic service Allocation with Protection Path www.ijcsi.org 115 Dynamic service Allocation with Protection Path Loay Alzubaidi Department of Computer Engineering & Science, Prince Muhammad bin Fahd University AL-Khobar, Saudi Arabia Abstract Path

More information

Reading. Read 3 MPLS links on the class website

Reading. Read 3 MPLS links on the class website Reading Read 3 MPLS links on the class website Read the following Wikipedia entries: Advanced Mobile Phone System, GSM, 1xEVDO, Cell site, Cellular network, 802.11ac Beyond IP Routing Traffic engineering

More information

Traffic Grooming for Survivable WDM Networks Shared Protection

Traffic Grooming for Survivable WDM Networks Shared Protection Traffic Grooming for Survivable WDM Networks Shared Protection Canhui (Sam) Ou, Keyao Zhu, Hui Zang, Laxman H. Sahasrabuddhe, and Biswanath Mukherjee Abstract This paper investigates the survivable trafficgrooming

More information

Protection for Tree-Based EPON-FTTH Architecture Using Combination ACS and OXADM

Protection for Tree-Based EPON-FTTH Architecture Using Combination ACS and OXADM Australian Journal of Basic and Applied Sciences, 4(12): 6260-6268, 2010 ISSN 1991-8178 Protection for Tree-Based EPON-FTTH Architecture Using Combination ACS and OXADM Mohammad Syuhaimi Ab-Rahman Computer

More information

Operation Administration and Maintenance in MPLS based Ethernet Networks

Operation Administration and Maintenance in MPLS based Ethernet Networks 199 Operation Administration and Maintenance in MPLS based Ethernet Networks Jordi Perelló, Luis Velasco, Gabriel Junyent Optical Communication Group - Universitat Politècnica de Cataluya (UPC) E-mail:

More information

Shared Protection by Concatenated Rings in Optical WDM Networks

Shared Protection by Concatenated Rings in Optical WDM Networks Shared Protection by Concatenated Rings in Optical WDM Networks Hyunseung Choo, Minhan Son, Min Young Chung, and Tae-Jin Lee School of Information and Communication Engineering Sungkyunkwan University

More information

Data Center Applications and MRV Solutions

Data Center Applications and MRV Solutions Data Center Applications and MRV Solutions Introduction For more than 25 years MRV has supplied the optical transport needs of customers around the globe. Our solutions are powering access networks for

More information

MPLS Traffic Engineering Traffic Protection using Fast Re-route (FRR)

MPLS Traffic Engineering Traffic Protection using Fast Re-route (FRR) MPLS Traffic Engineering Traffic Protection using Fast Re-route (FRR) Santiago Álvarez August 2008 2007 Cisco Systems, Inc. All rights reserved. 1 MPLS TE Use Cases Strategic Bandwidth Optimization Tactical

More information

Optical networking technology

Optical networking technology 1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the

More information

Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet

Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet Midori Terasawa, Masahiro Nishida, Sho Shimizu, Yutaka Arakawa, Satoru Okamoto and Naoaki Yamanaka Department

More information

All-Optical Switches The Evolution of Optical Functionality Roy Appelman, Zeev Zalevsky, Jacob Vertman, Jim Goede, Civcom

All-Optical Switches The Evolution of Optical Functionality Roy Appelman, Zeev Zalevsky, Jacob Vertman, Jim Goede, Civcom All-Optical Switches The Evolution of Optical Functionality Roy Appelman, Zeev Zalevsky, Jacob Vertman, Jim Goede, Civcom Introduction Over the last few years, significant changes in optical networking

More information

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Master s Thesis Defense Ananth Nagarajan EECS Department, University of Kansas 10/13/98 Outline

More information

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER 2003 1173 A Comprehensive Study on Next-Generation Optical Grooming Switches Keyao Zhu, Student Member, IEEE, Hui Zang, Member,

More information

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54 MPLS Technology Overview Ahmed Benallegue A.Benallegue@ecmwf.int RMDCN workshop on the migration to IP/VPN 1/54 Plan 1. MPLS basics 2. The MPLS approach 3. Label distribution RSVP-TE 4. Traffic Engineering

More information

218 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 1, FEBRUARY 2006

218 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 1, FEBRUARY 2006 218 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 14, NO 1, FEBRUARY 2006 Survivable Virtual Concatenation for Data Over SONET/SDH in Optical Transport Networks Canhui (Sam) Ou, Student Member, IEEE, Laxman

More information

Generalized Multiprotocol Label Switching (GMPLS)

Generalized Multiprotocol Label Switching (GMPLS) Generalized Multiprotocol Label Switching (GMPLS) Definition and Overview The premise of multiprotocol label switching (MPLS) is to speed up packet forwarding and provide for traffic engineering in Internet

More information

ARE CONTROL PLANE BENEFITS APPLICABLE TO SUBMARINE NETWORKS?

ARE CONTROL PLANE BENEFITS APPLICABLE TO SUBMARINE NETWORKS? ARE CONTROL PLANE BENEFITS APPLICABLE TO SUBMARINE NETWORKS? Damien Martinet, Julien Meuric, Yann Loussouarn (Orange Labs) Email: Orange Labs, 2 avenue Pierre Marzin,

More information

Network Systems for Emerging WAN Applications

Network Systems for Emerging WAN Applications Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking

More information

Prioritized Shufflenet Routing in TOAD based 2X2 OTDM Router.

Prioritized Shufflenet Routing in TOAD based 2X2 OTDM Router. Prioritized Shufflenet Routing in TOAD based 2X2 OTDM Router. Tekiner Firat, Ghassemlooy Zabih, Thompson Mark, Alkhayatt Samir Optical Communications Research Group, School of Engineering, Sheffield Hallam

More information

Multi-Protocol Lambda Switching for Packet, Lambda, and Fiber Network

Multi-Protocol Lambda Switching for Packet, Lambda, and Fiber Network Multi-Protocol Lambda Switching for Packet, Lambda, and Fiber Network Jun Kyun Choi Tel) (042) 866-6122 1 Contents Backgrounds for Optical Network Review of SONET/SDH Technologies Motivations for IP over

More information

Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection

Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Victor Yu Liu Network Advanced Research, Huawei Technologies Santa Clara, California, USA yuliu@ieee.org Abstract

More information

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks Internet Traffic Characteristics Bursty Internet Traffic Statistical aggregation of the bursty data leads to the efficiency of the Internet. Large Variation in Source Bandwidth 10BaseT (10Mb/s), 100BaseT(100Mb/s),

More information

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 A Scalable Path Protection Mechanism for Guaranteed Network Reliability Under Multiple Failures Changcheng Huang, Senior Member, IEEE, Minzhe

More information

A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS

A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS Nizar Bouabdallah^'^, Emannuel Dotaro^ and Guy Pujolle^ ^Alcatel Research & Innovation, Route de Nozay, F-91460 Marcoussis, France

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Mapping Mechanism to Enhance QoS in IP Networks

Mapping Mechanism to Enhance QoS in IP Networks Mapping Mechanism to Enhance QoS in IP Networks by Sriharsha Karamchati, Shatrunjay Rawat, Sudhir Yarram, Guru Prakash Ramaguru in The 32nd International Conference on Information Networking (ICOIN 2018)

More information

Complexity in Multi-level Restoration and Protection Strategies in Data Networking

Complexity in Multi-level Restoration and Protection Strategies in Data Networking Complexity in Multi-level Restoration and Protection Strategies in Data Networking mailto:dward@cisco.com October, 2002 NANOG 1 What makes it complex? Multi-technology network viewed as a stack of singlelayered

More information

Delayed reservation decision in optical burst switching networks with optical buffers

Delayed reservation decision in optical burst switching networks with optical buffers Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of

More information

IO2654 Optical Networking. WDM network design. Lena Wosinska KTH/ICT. The aim of the next two lectures. To introduce some new definitions

IO2654 Optical Networking. WDM network design. Lena Wosinska KTH/ICT. The aim of the next two lectures. To introduce some new definitions IO2654 Optical Networking WDM network design Lena Wosinska KTH/ICT 1 The aim of the next two lectures To introduce some new definitions To make you aware about the trade-offs for WDM network design To

More information

Optical Fiber Communications. Optical Networks- unit 5

Optical Fiber Communications. Optical Networks- unit 5 Optical Fiber Communications Optical Networks- unit 5 Network Terminology Stations are devices that network subscribers use to communicate. A network is a collection of interconnected stations. A node

More information

Network Topologies & Error Performance Monitoring in SDH Technology

Network Topologies & Error Performance Monitoring in SDH Technology Network Topologies & Error Performance Monitoring in SDH Technology Shiva Sharma Electronics and Communications Department Dronacharya College of Engineering Gurgaon, Haryana Shiva.92@hotmail.com Abstract

More information

Efficient Distributed Restoration Path Selection for Shared Mesh Restoration

Efficient Distributed Restoration Path Selection for Shared Mesh Restoration IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 5, OCTOBER 2003 761 Efficient Distributed Restoration Path Selection for Shared Mesh Restoration Guangzhi Li, Member, IEEE, Dongmei Wang, Member, IEEE,

More information

Photonic MPLS Network Architecture Based on Hikari-Router [Invited]

Photonic MPLS Network Architecture Based on Hikari-Router [Invited] Photonic MPLS Network Architecture Based on Hikari-Router [Invited] Naoaki Yamanaka, Member, IEEE "IT Network Innovation Laboratories, 3-9-1 1 Midori-cho, Musashino-shi, Tokyo, 180-8585 Japan E-mail: yamanaka.naoaki@lab.ntt.co.jp

More information

Shared Risk Link Group (SRLG)-Diverse Path Provisioning Under Hybrid Service Level Agreements in Wavelength-Routed Optical Mesh Networks

Shared Risk Link Group (SRLG)-Diverse Path Provisioning Under Hybrid Service Level Agreements in Wavelength-Routed Optical Mesh Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 8-2005 Shared Risk Link Group (SRLG)-Diverse Path Provisioning

More information

Building Reliable MPLS Networks Using a Path Protection Mechanism

Building Reliable MPLS Networks Using a Path Protection Mechanism DESIGNING FOR SECURE TRAFFIC Building Reliable MPLS Networks Using a Path Protection Mechanism Changcheng Huang, Carleton University Vishal Sharma, Metanoia, Inc. Ken Owens, Erlang Technology, Inc. Srinivas

More information

Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network

Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network 91 Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network Amit Kumar Garg and R S Kaler School of Electronics and Communication Eng, Shri Mata Vaishno Devi University (J&K),

More information

A NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT

A NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT A NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT Mohd Nazri Ismail Faculty of MIIT, University of Kuala Lumpur (UniKL), MALAYSIA, mnazrii@miit.unikl.edu.my Abstract Most

More information

Incorporating Protection Mechanisms in the Dynamic Multi-Layer Routing Schemes

Incorporating Protection Mechanisms in the Dynamic Multi-Layer Routing Schemes Incorporating Protection Mechanisms in the Dynamic Multi-Layer Routing Schemes Anna Urra, Eusebi Calle, Jose L. Marzo and Pere Vila Institute of Informatics and Applications (IIiA), University of Girona,

More information

Optical Packet Switching: A Network Perspective

Optical Packet Switching: A Network Perspective Optical Packet Switching: A Network Perspective Franco Callegati, Walter Cerroni, Giorgio Corazza, Carla Raffaelli D.E.I.S. - University of Bologna Viale Risorgimento, 2-4036 Bologna - ITALY {fcallegati,wcerroni,gcorazza,craffaelli}@deis.unibo.it

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures

Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Anna Urra, Eusebi Calle, and Jose L. Marzo Institute of Informatics and Applications (IIiA), University of Girona, Girona

More information

WDM Network Provisioning

WDM Network Provisioning IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the

More information

Multiprotocol Label Switching Overview

Multiprotocol Label Switching Overview This chapter describes the Multiprotocol Label Switching (MPLS) distribution protocol. MPLS is a high-performance packet forwarding technology that integrates the performance and traffic management capabilities

More information

Multiservice Optical Switching System CoreDirector FS. Offering new services and enhancing service velocity

Multiservice Optical Switching System CoreDirector FS. Offering new services and enhancing service velocity Multiservice Optical Switching System CoreDirector FS Offering new services and enhancing service velocity Transform your network into a programmable set of network resources, fundamentally changing the

More information

Network on Chip Architecture: An Overview

Network on Chip Architecture: An Overview Network on Chip Architecture: An Overview Md Shahriar Shamim & Naseef Mansoor 12/5/2014 1 Overview Introduction Multi core chip Challenges Network on Chip Architecture Regular Topology Irregular Topology

More information