An Algorithm for Traffic Grooming in WDM Mesh Networks with Dynamically Changing Light-Trees

Similar documents
Efficient Online Traffic Grooming Algorithms in WDM Mesh Networks with Drop-and-Continue Node Architecture

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER

A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks

Available online at ScienceDirect

Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks

Splitter Placement in All-Optical WDM Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Network Topology Control and Routing under Interface Constraints by Link Evaluation

An Improved Multicast Routing Algorithm in Sparse Splitting WDM Networks

Energy-Efficient Traffic GroominginWDM Networks With Scheduled Time Traffic

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0

Optical Communications and Networking 朱祖勍. Nov. 27, 2017

1. INTRODUCTION light tree First Generation Second Generation Third Generation

I R TECHNICAL RESEARCH REPORT. A Local Optimization Algorithm for Logical Topology Design and Traffic Grooming in IP over WDM Networks

A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks

Design of Hierarchical Crossconnect WDM Networks Employing a Two-Stage Multiplexing Scheme of Waveband and Wavelength

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

Virtual Topologies for Multicasting with Multiple Originators in WDM Networks

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

Traffic Grooming for Survivable WDM Networks Shared Protection

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks

Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms

IO2654 Optical Networking. WDM network design. Lena Wosinska KTH/ICT. The aim of the next two lectures. To introduce some new definitions

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

ROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING

Virtual Source-Based Minimum Interference Path Multicast Routing with Differentiated QoS Guarantees in the Next Generation Optical Internet

A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization

Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks

Deadline-Aware Co-Scheduling Using Anycast Advance Reservations in Wavelength Routed Lambda Grids

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Link Bundled Auxiliary Graph Model for Constrained Dynamic Traffic Grooming in WDM Mesh Networks

Elsevier Editorial System(tm) for Optical Switching and Networking Manuscript Draft

On Optimal Traffic Grooming in WDM Rings

On-Line Routing in WDM-TDM Switched Optical Mesh Networks

Is Light-Tree Structure Optimal for Multicast Routing in Sparse Light Splitting WDM Networks?

A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS

A Study of Waveband Switching With Multilayer Multigranular Optical Cross-Connects

An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks

PROOF COPY [124021] JOC

Cost-Effective Traffic Grooming in WDM Rings

Power Efficient Traffic Grooming in Optical WDM Networks

Efficient Segmentation based heuristic approach for Virtual Topology Design in Fiber Optical Networks

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS

Survivability with P-Cycle in WDM Networks

Toward the joint design of electronic and optical layer protection

WDM Network Provisioning

Analysis and Algorithms for Partial Protection in Mesh Networks

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

Light-tree routing under optical power budget constraints

A Customizable Two-Step Framework for General Equipment Provisioning in Optical Transport Networks

Synchronous Stream Optical Burst Switching

ECE442 Communications Lecture 4. Optical Networks

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks

Design of CapEx-Efficient IP-over-WDM Network using Auxiliary Matrix based Heuristic

An Efficient Mechanism for Dynamic Multicast Traffic Grooming in Overlay IP/MPLS over WDM Networks

An Integer Programming Approach to Packing Lightpaths on WDM Networks 파장분할다중화망의광경로패킹에대한정수계획해법. 1. Introduction

Link Selection Algorithms for Link-Based ILPs and Applications to RWA in Mesh Networks

Efficient path protection using Bi-directional WDM transmission technology. Title

Performance Analysis on Various Wavelength Assignment Algorithms with Traffic Grooming

Optical networking technology

Maximization of Single Hop Traffic with Greedy Heuristics

Performance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License

n = 2 n = 1 µ λ n = 0

Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

A Comparison of Path Protections with Availability Concern in WDM Core Network

Multi-Layer Traffic Engineering through Adaptive λ-path Fragmentation and De-Fragmentation

Supporting multipoint-to-point communications in all-optical WDM networks

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 20, NO. 1, FEBRUARY

Lightpath Blocking Performance Analytical Model for a Single ROADM Node with Intra-Node Add/Drop Contention [Invited]

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Designing WDM Optical Networks using Branch-and-Price

Comparison of Protection Cost at IP or WDM Layer

TRAFFIC GROOMING WITH BLOCKING PROBABILITY REDUCTION IN DYNAMIC OPTICAL WDM NETWORKS

WDM Network Provisioning

Design of Large-Scale Optical Networks Λ

On The Complexity of Virtual Topology Design for Multicasting in WDM Trees with Tap-and-Continue and Multicast-Capable Switches

On Efficient Protection Design for Dynamic Multipath Provisioning in Elastic Optical Networks

New QoS Measures for Routing and Wavelength Assignment in WDM Networks

Designing physical topologies for wavelength-routed all-optical networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

Hierarchical Traffic Grooming Formulations

A PRACTICAL AND COST-EFFECTIVE APPROACH TO EFFICIENT TRAFFIC GROOMING IN WDM MESH NETWORKS

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability

A Review of Traffic Management in WDM Optical Networks: Progress and Challenges

Delayed reservation decision in optical burst switching networks with optical buffers

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks

Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks

Establishment of Survivable Connections in WDM Networks using Partial Path Protection

A New Architecture for Multihop Optical Networks

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks

Optimal Multicast Routing Using Genetic Algorithm for WDM Optical Networks

Progress Report No. 15. Shared Segments Protection

Transcription:

An Algorithm for raffic rooming in WDM Mesh Networks with Dynamically Changing Light-rees Xiaodong Huang, Farid Farahmand, and Jason P. Jue Department of Computer Science Department of Electrical Engineering he University of exas at Dallas ichardson, exas 75083-0688 Email: {xxh0000, ffarid, jjue}@utdallas.edu Abstract In this paper, we address the traffic grooming problem in WDM mesh networks with dynamic unicast traffic. We develop a dynamic tree grooming algorithm (DA) that can support multi-hop traffic grooming by taking advantage of light-trees. In this algorithm, a light-tree can be dropped, branched, and extended when a route is to be established for a new request. In order to implement the DA, wedevelopa layered graph model which can support different routing policies. Extensive simulation shows that DA has better performance than lightpath-based algorithms when transceivers are limited. I. INODUCION Wavelength division multiplexing (WDM) is becoming the dominant technology in backbone networks. o effectively utilize the huge bandwidth of a WDM network, lightpaths can be established in the network []. A lightpath is an all-optical communication channel that spans one or more links between a source and a single destination. enerally, the capacity of a lightpath is much higher than the bandwidth requirement of an individual user. Dedicating an exclusive lightpath to each request results in low channel efficiency. One approach to improve the network efficiency is to pack several sub-wavelength traffic requests into a single wavelength channel. he problem of multiplexing and routing low speed traffic requests over lightpaths, as well as determining their routing and wavelength assignments of lightpaths is known as the traffic grooming problem []. A number of traffic grooming studies have been dedicated to SONE over WDM ring networks under static traffic scenarios, where the traffic is known in advance. ecently, traffic grooming in WDM mesh networks has begun to receive considerable attention. In [3], the authors formulate the traffic grooming problem as an Integer Linear Programming (ILP) problem and propose several simple heuristic algorithms. A generic graph model is presented in [4] to support traffic grooming. his model was further applied to the dynamic traffic grooming scenerio [5], in which traffic requests dynamically arrive (or leave), and lightpaths are dynamically set up (or torn down). hese previous works on traffic grooming adopted lightpaths as their building blocks. An alternative approach is to establish and share light-trees to satisfy incoming requests. A light-tree is a wavelength channel that can reach more than one destinations all-optically [6]. A light-tree-based grooming algorithm has been proposed in [7]. In this approach, when a new request arrives, it attempts to extend existing light-trees rooted at the source node of the request in order to reach the new destination. If no such light-tree is found, a new lightpath will be established for the request. his algorithm supports only single-hop traffic grooming. In this paper, we address the traffic grooming problem in WDM mesh networks with dynamic unicast traffic, based on a dynamically changing light-tree model. We develop a dynamic tree grooming algorithm (DA) that can support multi-hop traffic grooming by taking advantage of light-trees. In this algorithm, a light-tree can drop and/or branch at an intermediate node and can extend at leaf nodes as we set up the route for a new request. A branch on a light-tree will be torn down when no more routing passes through it. he algorithm is implemented using a layered graph model. Our graph model can support both light-path and light-tree paradigms while the model in [4][5] supports only lightpath. Extensive simulation shows that DA has better performance than lightpath-based algorithms when transceivers are limited. he rest of this paper is organized as follows. In Section II, we describe the node architecture supporting the DA algorithm. We define the grooming problem in Section III. Details of the DA algorithm will be discussed in Section IV. In Section V, we will present the simulation results. Section VI concludes the paper. II. NODE ACHIECUE In this section we describe the architecture for supporting the proposed dynamic tree grooming algorithm. We consider a two-layered node architecture consisting of an electronic and a photonic layer with two distinct capabilities: traffic grooming and optical multicasting. We refer to this architecture, shown in Fig. (a), as a multicast-capable grooming optical crossconnect (MC-OXC). In this architecture, traffic grooming capability is offered by the electronic layer, which allows the multiplexing of low speed traffic into high-speed channels as well as the demultiplexing of incoming high-speed traffic. he demultiplexed traffic can be fully dropped and switched to local clients or lobecom 004 83 0-7803-8794-5/04/$0.00 004 IEEE

SaD Switch SaD Switch W Electronic rooming Layer (a) L Splitter XQ X SW Q (b) Fig.. Multicast-capable grooming optical cross-connect (MC-OXC) architecture. (a) he node architecture; (b) he SaD switch. partially aggregated with other incoming and local traffic to be retransmitted optically to the next hop. Multicast-capable optical cross-connects, residing in the photonic layer of the MC-OXC, perform optical power splitting and optical switching. One approach to realize the multicasting capability is to employ splitter-and-delivery (SaD) switch architecture [8], shown in Fig. (b). In SaD-based cross-connects, each incoming wavelength goes through an optical power splitter and can be sent to any number of output ports. he strictly non-blocking characteristic of SaD-based cross-connects ensures that no existing connection will be interrupted as light-trees change dynamically. III. POBLEM DEFINIION We formulate the traffic grooming problem as follows: iven: he topology of the physical network he number of wavelengths on each fiber link he number of transceivers on each node Under the assumptions: Each node is an MC-OXC with full splitting and full grooming capability and with no wavelength converters. All transceivers are tunable to all wavelengths. equests are unicast with sub-wavelength bandwidth demand. hey arrive and depart randomly. A request can not be split at the source node or any intermediate nodes. he routing of a request could be single hop or multihop. If a routing can not be found for a request, the request will be blocked and discarded immediately. Find: he routing for an incoming request Minimize: he average blocking probability. IV. ALOIHM In this section, we first propose an approach to generate an auxiliary graph according to the state of the network. Based on this auxiliary graph, we propose a new dynamic tree grooming algorithm. A shortest path found on the auxiliary graph can be mapped back to a routing in the network. By changing the weight of different edges in the auxiliary graph, different routing policies can be applied to the algorithm. he basic principles behind the algorithm are that light-trees are adopted to groom low speed traffic flows and that the light-trees can extend or contract dynamically as needed. A. Definitions and notations he physical network can be represented by 0 =(V 0,E 0 ). here are w wavelengths on each fiber. We will generate an auxiliary graph =(V,E), which has w + layers: w wavelength layers and one grooming layer. Wavelength layers are used to map the network state on each wavelength. he grooming layer is used to abstract the grooming capability of the network. All wavelength layers are connected to the grooming layer by AddEdges and DropEdges (defined in the next subsection). Note that there is no direct connection between wavelength layers. We define three types of vertices to abstract the capability of an MC-OXC as follows. rooming Vertex (V): represents the grooming capability of an MC-OXC. Any wavelength can be added to or dropped on a V if there are available transmitters or receivers, respectively. In, there is a V for each node. ransmitting Vertex (V): abstracts a transmitting port for a specific wavelength on an MC-OXC. he V is connected to a remote V (see below) on a neighbor node according to the physical network topology. here are w Vs in for each transmitting port on a node, one for each wavelength. eceiving Vertex (V): abstracts a receiving port for a specific wavelength on an MC-OXC. he V is connected to a remote V on a neighbor node according to the physical network topology. here are w Vs in for each receiving port on a node, one for each wavelength. herefore, for each node u on the physical network, there will be one V, wd u Vs and wd u Vs on the auxiliary graph, where d u denotes the degree of node u. B. eneration of the auxiliary graph he auxiliary graph is initially generated as follows. enerate a wavelength layer for each wavelength. First, for each node on 0, add a V and a V to the layer for each transmitting and receiving port, respectively. hen, for each node on 0, add a pass-through edge (PEdge) from each V to each V within the node. At last, for each fiber link on 0, add a wavelength link edge (WLKEdge) from the V at a node to the V at the neighboring node. enerate the grooming layer. For each node on 0, add a V to the layer. Note that there are no edges between Vs. Connect wavelength layers and the grooming layer. Within each node, add an Adding Edge (AddEdge) from the V to the Vs at each layer; add a Dropping Edge (DropEdge) from the Vs at each layer to the V. lobecom 004 84 0-7803-8794-5/04/$0.00 004 IEEE

o A o A A D C (a) o C o C (b) B o B o B o A o A o C (c) Fig.. An illustrative example for implementing the DA algorithm.,, and represent V, V, and V, respectively. Dash-lines indicate edges which have been deleted from the graph. hick lines represent light-tree. (a) Physical network; (b) Layered representation of node D; (c) A light-tree passing through node D; (d) A light-tree dropping and branching at node D. As an example, consider a four-node network shown in Fig. (a), in which all physical links are bi-directional and there are two wavelengths on each fiber. Fig. (b) shows the initial graph representation of node D. here is a V at the grooming layer; there is a V and a V connecting to nodes A, B and C, at wavelength layer and wavelength layer. On both wavelength layers, Vs can reach all Vs through PEdges. All Vs can reach the V through DropEdges and the V can reach all Vs through AddEdges, since initially node D has available transceivers. An edge can either be used by a light-tree or be freely available. Each edge has an associated weight, capacity, and residual capacity. he weight will be assigned according to the routing policy (see next subsection). he capacity is the maximum traffic an edge can carry. Note that the capacity of a WLKEdge is equal to the capacity of the wavelength channel, whereas, all other edges have unlimited capacity. he residual capacity is the available capacity of an edge which can be used to carry new traffic. he WLKEdge is the only edge type that has limited residual capacity which is initially equal to its capacity and changes dynamically. o C C. Dynamic ree grooming algorithm (DA) he DA algorithm has two routines, DA.SEUP and DA.EADOWN. Once the auxiliary graph is initially constructed, the DA.SEUP routine will be executed each time a new request arrives. If the request can be satisfied, the DA.SEUP will set up the route and update the auxiliary graph to reflect the current state of the network; otherwise, the request will be blocked. On the other hand, each time a request terminates, the DA.EADOWN will be executed and the auxiliary graph will be updated. We describe the details of DA.SEUP for a new request eq(s, d, B), where s and d are the source and destination (d) o B o B nodes, respectively, and B is the bandwidth demand of the request. Step : Check the residual capacity of each WLKEdge on each layer and delete it if its residual capacity is less than B. Step : Search the shortest path on from the V at the source node to the V at the destination node by running Dijkstra s shortest path algorithm. If no such a path exists, discard the request and restore all WLKEdges deleted in Step. Otherwise, continue to Step 3. Step 3: Iterate through each edge on the shortest path to establish the route. For each optical hop (starting with and ending at a V), if none of Vs and Vs is on any lighttree, set up a new light-tree along the vertices on the optical hop. On the other hand, if some of Vs and Vs are on a light-tree, extend the light-tree to cover the remaining vertices. For each V on the shortest path, delete all incoming edges, except the AddEdge or the PEdge that is on the path. Update the residual capacity of each WLKEdge along all light-trees on the shortest path. Step 4: Check the number of transceivers at each node. If no transmitter is available, delete unused AddEdges on all wavelength layers at the node. Similarly, if no receiver is available, delete unused DropEdges on all wavelength layers at the node. Step 5: estore all WLKEdges deleted in Step. Every time a request is terminated the DA.EADOWN routine operates as follows. Step : emove the request s traffic demand from all light-trees along the request path. Step : ear down all inactive branches which are no longer carrying effective traffic. If all branches on a lighttree are inactive, remove the entire tree. Step 3: Update the network state accordingly. We omit the details due to space limitation. he complexity of the DA.SEUP routine results primarily from Dijkstra s shortest path algorithm, which is implemented on the auxiliary graph. Let n and d be the number of nodes and the maximum node degree in the network, respectively. We get V =O(dwn) and E =O(dwn). Since is a very sparse graph, the complexity of Dijkstra s algorithm is O(E log V ). he complexity of all other operations in the algorithm is equivalent to O(dwn). herefore, the complexity of the DA.SEUP and DA.EADOWN is O((dwn) log(dwn)) and O(dwn), respectively. We continue our illustrative example in Fig. to demonstrate these concepts. For simplicity, we show only a single wavelength layer in Fig. (c) and Fig. (d). Fig. (c) demonstrates the status of node D as a portion of a light-tree (shown by the thick line) entering node D from node A and continuing to node B. he traversing light-tree in the figure is carried over three distinct edges: the WLKEdge from node A to node D, lobecom 004 85 0-7803-8794-5/04/$0.00 004 IEEE

the PEdge from V vertex to V vertex within node D, and the WLKEdge from node D to node B. Consequently, since the V connected to node B is being used at node D, the AddEdge and the other two PEdges directed to the V vertex must be deleted, shown by dashed lines. Note that DropEdges and PEdges allow light-trees to drop and branch, respectively. For example, Fig. (d) shows the status of node D when the light-tree is dropped at node D and branched to node C. 3 4 5 7 6 8 0 9 3 4 D. Lightpath-based grooming algorithm For the purpose of performance comparison, we implement a lightpath-based algorithm using our proposed auxiliary graph model by adding the following operation to Step 3 in the DA.SEUP routine: For each V on the shortest path, delete all outgoing edges, except the DropEdge or the PEdge that is on the path. In DA, when a light-tree is set up for the first request, the light-tree is actually a lightpath. With the above rule, the algorithm eliminates the possibility of dropping or extending existing light-trees. herefore, it implements the lightpathbased grooming algorithm. E. outing policies In the DA algorithm, the shortest path for a request depends on the weight assignment of edges, which in turn depends on the routing policy. A routing policy is a criterion used to select the best possible route. We consider the following four routing policies for the DA algorithm. ) Minimum physical hops (MPH); ) Minimum logical hops (MLH); 3) Minimum extra transceivers (M); 4) Minimum total on-tree physical hops (MH). he M policy implies that, if existing light-trees can satisfy a request, we should never set up new light-trees. his approach attempts to utilize the minimum number of transmitter used by each request. he MH is different from the MPH policy in the sense that the weight for all edges on a light-tree is the same as the sum of all physical hops on the light-tree. outing polices can be implemented in DA by assigning different weights to different types of edges in. Since the shortest path algorithm always tries its best to avoid edges with high weight values, we can simply assign a huge weight value to those edges which we desire to be used as infrequently as possible. In our algorithm, for MPH and MH, we make WLKEdges as the highest weight edges; for MLH, we make AddEdges and DropEdges as the highest weight edges; for M, we make unused AddEdges as the highest weight edges. V. NUMEICAL ESULS AND ANALYSIS In this section we present the performance results obtained by implementing the DA algorithm. We have chosen the NSFNet backbone, shown in Fig. 3, as our test network, and consider the following assumptions for the simulation environment: Fig. 3. he NSF network with 4 nodes and bi-directional links. raffic requests are generated and terminated dynamically. he traffic arrival is a Poisson process and the request s duration is a negative exponential distribution. raffic is uniformly distributed among all node pairs. Each link on the NSFNet is bi-directional with a fiber in each direction. here are 4 wavelengths in each fiber with the capacity of OC-9. All nodes have full splitting and full grooming capacity but have no wavelength converters. he number of transmitters and receivers per node are 4 and 6, respectively. equests are unidirectional unicast with bandwidth demand at OC-, OC-48, or OC-96 rates with the proportion of 8::. Fig. 4 and Fig. 5 show the performance of the DA algorithm under different routing policies. egardless of the policies, the DA algorithm outperforms the lightpath-based approach, both in terms of blocking probability and average number of logical hops. he reason is that the DA algorithm can use transmitters more efficiently, as much more leaf nodes on a light-tree can share the transmitter on the root of the lighttree than on a lightpath. On the other hand, under either very low or very high network load, DA can still improve the performance, but the improvement is not so significant. Further analysis shows that the DA algorithm can achieve the lowest blocking probability under the MH routing policy. Since any traffic carried on a light-tree will travel over all branches on the tree, the MH routing policy is more accurate than any other polices in describing the amount of wavelength link resources used by the request that will be routed through the light-tree. On the other hand, the MLH policy results in the lowest average number of logical hops, since, under MLH, the DA algorithm will first attempt to satisfy requests by using single-hop optical paths. On the contrary, the M policy results in the worst performance either in terms of blocking probability or average number of logical hops. Under the M policy, existing light-trees extend to a greater number of nodes so that the non-effective traffic carried on WLKEdges increases significantly. Next, we examine the performance of the DA algorithm under the MH routing policy with different number of receivers. For each node, the number of transmitters is set to 4, and the number of receivers varies from 4 to. he results are shown in Fig. 6 and Fig. 7. he results indicate that, lobecom 004 86 0-7803-8794-5/04/$0.00 004 IEEE

Blocking Probability 0. 0.0 MPH MLH M MH LP-MLH 0.00 0. 0. 0.3 0.4 0.5 0.6 0.7 0.8 0.9 Blocking Probability 0. 0.0 rcvr-4 rcvr-6 rcvr-8 rcvr-0 rcvr- 0.00 0. 0. 0.3 0.4 0.5 0.6 0.7 0.8 0.9 Fig. 4. Blocking probability under different routing policies. Fig. 6. Blocking probability under MH with different number of receivers..4.4.. Average Logic Hops.8.6.4 MPH MLH. M MH LP-MLH 0. 0. 0.3 0.4 0.5 0.6 0.7 0.8 0.9 Average Logic Hops.8.6 rcvr-4.4 rcvr-6 rcvr-8 rcvr-0 rcvr-. 0. 0. 0.3 0.4 0.5 0.6 0.7 0.8 0.9 Fig. 5. Average logical hops under different routing policies. Fig. 7. Average logical hops under MH with different number of receivers. as the number of receivers increases, the blocking probability and average number of logical hops decrease. he decrease is significant when the number of receivers is changed from 4 to 6. he decrease becomes less apparent as the number of receivers continues to increase beyond 8. In fact, hardly any improvement can be observed when the number of receivers is changed from 0 to. Note that a similar trend can be observed when other routing policies are utilized. hese results imply that, in general, the DA algorithm is sensitive to the number of receivers and is able to utilize transceivers efficiently. VI. CONCLUSION In this paper, we have presented a grooming algorithm, DA, for the traffic grooming problem in WDM mesh networks which can support light-trees. his algorithm adopts dynamically changing light-trees as the building block and is implemented by using a graph model. Compared with previous algorithms for the problem, our algorithm has much better performance in terms of blocking probability and average number of logical hops. Our graph model can also be used without modification to support multicast traffic grooming. his topic may be addressed in future work. EFEENCES [] I. Chlamtac, A. anz, and. Karmi, Lightpath communications: an approach to high bandwidth optical WAN s, IEEE rans. Commun. vol. 40, no. 7, pp. 7-8, Jul. 99. []. S. Barr and. A. Patterson, rooming telecommunication networks, Optical Network Magazine, vol., no. 3, pp. 0-3, May/Jun. 00. [3] K. Zhu and B. Mukherjee, raffic grooming in an optical WDM mesh network, IEEE Journal on Selected Areas in Communications, vol. 0, no., pp. -33, Jan. 00. [4] H. Zhu, H. Zang, and B. Mukherjee, A novel generic graph model for traffic grooming in heterogeneous WDM mesh networks, IEEE/ACM rans. Networking, vol., no., pp. 85-99, Apr. 003. [5] H. Zhu, H. Zang, K. Zhu, and B. Mukherjee, Dynamic traffic grooming in WDM mesh networks using a novel graph model, IEEE LOBE- COM 0, vol. 3, pp. 68-685, Nov. 00. [6] L.H. Sahasrabuddhe and B. Mukherjee, Light trees: optical multicasting for improved performance in wavelength routed networks, IEEE, Communications Magazine, vol. 37, no., pp. 67-73, Feb. 999. [7] K. Zhu, H. Zang, and B. Mukherjee, A comprehensive study on nextgeneration optical grooming switches, IEEE Journal on Selected Areas in Communications, vol., no. 7, pp. 73-86, Sep. 003. [8] W.S. Hu and Q.J. Zeng, Multicasting optical cross connects employing splitter-and-delivery switch, IEEE Photonics echnology Letters, vol. 0, no. 7, pp. 970-97, Jul. 998. lobecom 004 87 0-7803-8794-5/04/$0.00 004 IEEE