Finding Protection Cycles in DWDM Networks 2002 IEEE ICC on Volume 5, 28 April-2 May Page(s): 2756-2760 Reporter: Jyun-Yong Du.

Slides:



Advertisements
Similar presentations
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Advertisements

Protection and Restoration in Optical Network
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
~1~ Infocom’04 Mar. 10th On Finding Disjoint Paths in Single and Dual Link Cost Networks Chunming Qiao* LANDER, CSE Department SUNY at Buffalo *Collaborators:
Native-Conflict-Aware Wire Perturbation for Double Patterning Technology Szu-Yu Chen, Yao-Wen Chang ICCAD 2010.
TX- 1 Faculty ALTTC, Ghaziabad Survivability Of SDH Network By: TX-I Faculty ALTTC, Ghaziabad.
LOGO Video Packet Selection and Scheduling for Multipath Streaming IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 9, NO. 3, APRIL 2007 Dan Jurca, Student Member,
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
9/22/2003Kevin Su Traffic Grooming in WDM Networks Kevin Su University of Texas at San Antonio.
Computational problems, algorithms, runtime, hardness
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
Dynamic Routing and Wavelength Assignment Scheme for Protection against Node Failure Ying Wang1, Tee Hiang Cheng1,2 and Biswanath Mukherjee3 1School of.
Optimal Sleep-Wakeup Algorithms for Barriers of Wireless Sensors S. Kumar, T. Lai, M. Posner and P. Sinha, BROADNETS ’ 2007.
Understand p-Cycles, Enhanced Rings, and Oriented Cycle Covers Wayne D. Grover TRLabs and University of Alberta TRLabs and University of Alberta Edmonton,
PROFITABLE CONNECTION ASSIGNMENT IN ALL OPTICAL WDM NETWORKS VISHAL ANAND LANDER (Lab. for Advanced Network Design, Evaluation and Research) In collaboration.
Exploiting Forcer Structure to Serve Uncertain Demands and Minimize Redundancy of p-Cycle Networks Gangxiang Shen & Wayne D. Grover TRLabs and University.
High-Availability Network Architectures (HAVANA): High-Availability Network Architectures (HAVANA): Comparative Study of Fully Pre-Cross- Connected Protection.
IP layer restoration and network planning based on virtual protection cycles 2000 IEEE Journal on Selected Areas in Communications Reporter: Jyun-Yong.
ECS H. Zang and B. Mukherjee, UC Davis 1 Routing and Wavelength Assignment for Wavelength-Routed WDM Networks  Combined routing and wavelength.
Path Protection in MPLS Networks Using Segment Based Approach.
2015/6/291 Fault Management in IP- Over-WDM Networks: WDM Protection Versus IP Restoration Adviser: Ho-Ting Wu Presenter: Ze-Yang Guo.
University of Alberta ECE Department Network Systems Gangxiang Shen, Wayne D. Grover Extending the p-Cycle Concept to Path-Segment Protection Gangxiang.
© Rui Wang Cycle-Oriented Distributed Preconfiguration Ring-like Speed with Mesh-like Capacity for Self-planning Network Restoration 1 Sep Rui Wang.
Advances in Optical Network Design with p-Cycles: Joint optimization and pre-selection of candidate p-cycles (work in progress) Wayne D. Grover, John Doucette.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
1 Introduction to Optical Networks. 2 Telecommunications Network Architecture.
EQ-BGP: an efficient inter- domain QoS routing protocol Andrzej Bęben Institute of Telecommunications Warsaw University of Technology,
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
Survivable Logical Topology Design in WDM Optical Ring Networks Hwajung Lee, Hongsik Choi, Suresh Subramaniam, and Hyeong-Ah Choi* The George Washington.
1 Protection Mechanisms for Optical WDM Networks based on Wavelength Converter Multiplexing and Backup Path Relocation Techniques Sunil Gowda and Krishna.
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Optimized QoS Protection of Ethernet Trees Tibor.
November 18, Traffic Grooming in Optical WDM Networks Presented by : Md. Shamsul Wazed University of Windsor.
Survivable Lightpath Routing: A New Approach to the Design of WDM – Based Networks Jared Strickland, Stephanie Kinsella, Travis Grosch, Sean Lunsford,
SMUCSE 8344 Protection & Restoration of Optical Networks.
Load Balancing in Protection Switching of Optical Networks Hongkyu Jeong, Gyu-Myoung Lee Information and Communications Univ. (ICU) Student ID : ,
E E 681 Fall Lecture 23 Course Wrap-up & Challenges for Future Optical Networking Matthieu Clouqueur TR Labs & University of Alberta.
Lightpath Restoration in WDM Optical Networks A Survey in IEEE Network Magazine Nov/Dec 2000.
Logical Topology Design
On Survivable Routing of Mesh Topologies in IP-over-WDM Networks Maciej Kurant, Patrick Thiran EPFL, Switzerland Infocom 2005, March 13-17, Miami.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
1 Multicasting in a Class of Multicast-Capable WDM Networks From: Y. Wang and Y. Yang, Journal of Lightwave Technology, vol. 20, No. 3, Mar From:
Optical Network Security Daniel Stewart. Preliminary work Dijkstra's Algorithm Dijkstra's algorithm, is a graph search algorithm that solves the single-
Survivable Traffic Grooming with Differentiated End-to-End Availability Guarantees in WDM Mesh Networks Proceedings of the 13th IEEE Workshop on Local.
10/6/2003Kevin Su Traffic Grooming for Survivable WDM Networks – Shared Protection Kevin Su University of Texas at San Antonio.
Ahmed Musa, John Medrano, Virgillio Gonzalez, Cecil Thomas University of Texas at El Paso Circuit Establishment in a Hybrid Optical-CDMA and WDM All- Optical.
1 P-Cycles. 2 What’s a p-Cycle? A preconfigured cycle formed out of the spare capacities in the network –A p-cycle uses one unit of spare capacity on.
作者 :Satyajeet Ahuja and Marwan Krunz 出處 :IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 7, NOVEMBER 2008 報告者 : 黃群凱 1.
(Slide set by Norvald Stol/Steinar Bjørnstad
Optical Networking University of Southern Queensland.
1 Why Optical Layer Protection? Optical layer provides lightpath services to its client layers (e.g., SONET, IP, ATM) Protection mechanisms exist in the.
Survivable Paths in Multilayer Networks Marzieh Parandehgheibi Hyang-won Lee Eytan Modiano 46 th Annual Conference on Information Sciences and Systems.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
QoS-specified Traffic Grooming Algorithm in WDM Mesh Networks Bing Xiang, Hongfang Yu, Sheng Wang, Lemin Li Communications, Circuits and Systems, 2004.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Optimal Design of Survivable Mesh Networks Based on Line Switched WDM Self-Healing Rings IEEE/ACM Transactions on Networking, Vol 11, NO.3, June,2003 Andrea.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
1 Chapter 6 Reformulation-Linearization Technique and Applications.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Abstract In this paper, the k-coverage problem is formulated as a decision problem, whose goal is to determine whether every point in the service area.
Compressive Coded Aperture Video Reconstruction
MMLAB NETWORK SEMINAR Tree-Based Data Broadcast in IEEE and ZigBee Networks Written by Gang Ding(Purdue Univ.), Zafer Sahinoglu(MERL), Philip.
DISA under NSA-LUCITE Contract
BroadNets 2004, October 25-29, San Jose
A Study of Group-Tree Matching in Large Scale Group Communications
The minimum cost flow problem
Network Survivability
CPS 173 Computational problems, algorithms, runtime, hardness
SURVIVABILITY IN IP-OVER-WDM NETWORKS (2)
Alan Kuhnle*, Victoria G. Crawford, and My T. Thai
Presentation transcript:

Finding Protection Cycles in DWDM Networks 2002 IEEE ICC on Volume 5, 28 April-2 May Page(s): Reporter: Jyun-Yong Du

Outline Introduction P-cycle protection problem Classical ring finding methods A new protection cycle finding algorithm Performance analyses Conclusions

Introduction(1/3) Optical networks based on single physical ring are favored for their fast restoration (usually within 50ms). The down side of single-ring-based networks is that they are bandwidth inefficient, since half of the total bandwidth has to be reserved for protection purpose. Also self-healing ring technique is usually used in metro networks, it is impractical to cover all the switches in a long-haul network with a single ring.

Introduction(2/3) On the other hand, mesh networks have a much higher link diversity which implies a lower bandwidth redundancy. It is generally hard to find a protection path upon link failure and finish all the required optical cross-connects within 50ms before protocols in upper layers timeout. As a compromised yet reasonable solution in practice, multiple logical rings can be chosen to cover the whole physical mesh networks; each of them behaves like a single physical self-healing ring by itself.

Introduction(3/3) The approach of protecting mesh network with logical rings can be further categorized as follows: 1) Pure ring cover (intra-ring and inter-ring) 2) Protection cycle (P-cycle) cover This paper is aimed at introducing mesh optical network logical ring cover problem in general, then proposing a new and efficient ring/cycle-finding algorithm in detail.

P-cycle protection problem(1/2) The problem of protecting mesh networks by multiple ring/p-cycles, under the constraint of a limited number of wavelengths on each physical fiber link, is an NP- complete problem. Hence, the authors propose to divide the whole problem into 2 independent sub-problems to reduce the complexity.  Sub-problem #1: Ring finding.  Sub-problem #2: Bandwidth planning.

P-cycle protection problem(2/2) Sub-problem #2 is usually based on linear programming (LP). There are various LP formulations for this sub-problem, based on their respective cost models. Each bandwidth planning formulation addresses it’s own specific objective function. This paper mainly focuses on sub-problem #1, i.e., to find a scalable, state-of-art ring/cycle finding algorithm.

Classical ring finding methods(1/2) There are various ring finding algorithms, some of them are classical methods that can select all the rings exhaustively from a network (graph). The classical algorithms belong to one of the following four classes: 1) Circuit vector space [6,8,9] 2) Backtracking algorithms [6,7,10] 3) Powers of adjacency matrix [6] 4) Edge-digraph [6]

Classical ring finding methods(2/2) In addition to classical methods, which are exhaustive, there is another category of ring-finding methods based on heuristics, such as: 1) Ring node routing [12] 2) Incapacitated ring cover [13] 3) Node disjoint routing [11] The heuristics can run faster than classical methods and yield good node/link coverage in most cases.

A new protection cycle finding algorithm(1/10) It has been proved theoretically [15,16,17] that in network protection, p-cycle topology is more efficient than any other topology patterns, such as trees and line segments, in the sense that p-cycle provides more protection paths per unit spare capacity consumed. As the authors have found from classical ring-finding algorithms introduced before, the number of rings/cycles in a graph/network increases exponentially, as the number of network nodes and links increases.

A new protection cycle finding algorithm(2/10) Here, the authors propose a scalable algorithm based on the idea of cycle straddling link. Such a new idea is based on the following observation: a p-cycle could be looked on as the combination of two node-disjoint paths between the two end nodes of a cycle-straddling link.

A new protection cycle finding algorithm(3/10) Given a general mesh network G=G(V,E) Before finding a set of p-cycle covering the network links, we can always first prune off those nodes of nodal degree 1 and the links adjacent to them, because no cycle could cover such nodes. Upon looking at the remaining links for p-cycle finding purposes, we can identify the following cases:

A new protection cycle finding algorithm(4/10) 1) Case of node degrees>=3 for both end nodes: there are 3 sub-cases

A new protection cycle finding algorithm(5/10) 2) Case of the node degree of at least one end node=2: there are 2 sub-cases

A new protection cycle finding algorithm(6/10)

A new protection cycle finding algorithm(7/10)

A new protection cycle finding algorithm(8/10)

A new protection cycle finding algorithm(9/10)

A new protection cycle finding algorithm(10/10)

Performance analyses

Conclusions To solve the scalability problem in sub-problem #1 (ring finding), the authors proposed the straddling link ring finding algorithm The algorithm has the feature that the number of p- cycles found does not exceed the number of links in the network. At the same time the resultant p-cycle set covers most network links which has been confirmed by the simulation results.