99 research outputs found

    Design and provisioning of WDM networks for traffic grooming

    Get PDF
    Wavelength Division Multiplexing (WDM) is the most viable technique for utilizing the enormous amounts of bandwidth inherently available in optical fibers. However, the bandwidth offered by a single wavelength in WDM networks is on the order of tens of Gigabits per second, while most of the applications\u27 bandwidth requirements are still subwavelength. Therefore, cost-effective design and provisioning of WDM networks require that traffic from different sessions share bandwidth of a single wavelength by employing electronic multiplexing at higher layers. This is known as traffic grooming. Optical networks supporting traffic grooming are usually designed in a way such that the cost of the higher layer equipment used to support a given traffic matrix is reduced. In this thesis, we propose a number of optimal and heuristic solutions for the design and provisioning of optical networks for traffic grooming with an objective of network cost reduction. In doing so, we address several practical issues. Specifically, we address the design and provisioning of WDM networks on unidirectional and bidirectional rings for arbitrary unicast traffic grooming, and on mesh topologies for arbitrary multipoint traffic grooming. In multipoint traffic grooming, we address both multicast and many-to-one traffic grooming problems. We provide a unified frame work for optimal and approximate network dimensioning and channel provisioning for the generic multicast traffic grooming problem, as well as some variants of the problem. For many-to-one traffic grooming we propose optimal as well as heuristic solutions. Optimal formulations which are inherently non-linear are mapped to an optimal linear formulation. In the heuristic solutions, we employ different problem specific search strategies to explore the solution space. We provide a number of experimental results to show the efficacy of our proposed techniques for the traffic grooming problem in WDM networks

    Efficient communication using multiple cycles and multiple channels

    Get PDF
    Initially, the use of optical fiber in networks was to create point-to-point links. Optical paths were not altered once they were setup. This limits the ability of the network to respond to changing traffic demands. There were expensive solutions to handle dynamic traffic. One could set up multiple paths for additional traffic. Alternately, traffic that did not have a dedicated optical path needed to be received, the next hop found electronically, and then transmitted again. Current research in optical networking is looking to minimize or even eliminate electronic packet processing in the network. This will reduce the numbers of transmitters, receivers, and processing hardware needed in the network. If a signal can be kept entirely optical, new signal formats can be added to the network by only upgrading systems sending or receiving the new format. Research is currently looking at hardware designs to support electrically changing optical paths, and algorithms to route the optical paths. The topic of this work is the routing algorithms. We wish to keep cost as low as possible, while being able to recover quickly from or completely hide hardware failures. Several strategies exist to meet these expectations that involve a mix of handing routing and failure at the optical or at the electronic layer. This dissertation considers the use of cycles or rings in both establishing optical connections in response to connection requests, and electronic routing on optical cycle\u27s setup when a network is built. Load balancing is an important issue for both approaches. In this dissertation we provide heuristics and integer linear program (ILP) that can be used to find cycles in a network. We report on experiments showing the effectiveness of the heuristics. Simulations show the importance of load balancing. In the case of electronic routing, we setup cycles in the network which allow nodes on the cycle to communicate with each other. We select cycles so that they have two properties. One property is that all node pairs appear on at least one cycle. The other property is that each cycle contains a cyclical quorum. The first property allows for a network to support all-to-all communication entirely in the optical domain. The second property allows for quorum based distributed systems to send a message to an entire quorum in an all optical one-to-many connection. The use of quorums makes distributed systems efficient at tasks such as coordinating mutual exclusion or database replication. There is a need for the optical layer of the network to provide support for keeping latency of this type of communication low because as designers have scarified the benefits of using quorums in higher latency networks. Combined with light trails, cycles based on quorums requires fewer transmitter and receivers than light-paths to support all-to-all traffic

    Design and protection algorithms for path level aggregation of traffic in WDM metro optical networks

    Get PDF
    Wavelength Division Multiplexing (WDM) promises to offer a cost effective and scalable solution to meet the emerging demands of the Internet. WDM splits the tremendous bandwidth latent in a fiber into multiple non-overlapping wavelength channels, each of which can be operated at the peak electronic rate. Commercial systems with 128 wavelengths and transmission rates of up to 40 Gbps per wavelength have been made possible using state of the art optical technologies to deal with physical impairments. Systems with higher capacities are likely to evolve in the future. The end user requirements for bandwidth, on the other hand, have been ranging from 155 Mbps to 2.5 Gbps. Dedicating a wavelength for each end user will lead to severe underutilization of WDM channels. This brings to forefront the requirement for sharing of bandwidth in a wavelength among multiple end users.;The concept of wavelength sharing among multiple clients is called grooming. Grooming can be done purely at the optical layer (optical grooming) or it can be done with support from the client layer (electronic grooming). The advantage of all optical grooming is the ease of scalability due to its transparency as opposed to electronic grooming which is constrained by electronic bottlenecks. Efforts towards enhancing optical grooming is pursued through increasing optical switching speeds. However, technologies to make optical switches with high speeds, large port counts and low insertion losses have been elusive and may continue to remain so in the near future.;Recently, there have been some research into designing new architectures and protocols focused on optical grooming without resorting to fast optical switching. Typically, this is achieved in three steps: (1) configure the circuit in the form of a path or a tree; (2) use optical devices like couplers or splitters to allow multiple transmitters and/or receivers to share the same circuit; and (3) provide an arbitration mechanism to avoid contention among end users of the circuit. This transparent sharing of the wavelength channel utilizes the network resources better than the conventional low-speed circuit switched approaches. Consequently, it becomes important to quantify the improvement in achieved performance and evaluate if the reaped benefits justify the cost of the required additional hardware and software.;The contribution of this thesis is two fold: (1) developing a new architecture called light-trails as an IP based solution for next generation WDM optical networks, and (2) designing a unified framework to model Path Level Aggregation of Traffic in metrO Optical Networks (PLATOONs). The algorithms suggested here have three features: (1) accounts for four different path level aggregation strategies---namely, point to point (for example, lightpaths), point to multi-point (for example, source based light-trails), multi-point to point (for example, destination based light-trails) and multi-point to multi-point (for example, light-trails); (2) incorporates heterogenous switching architectures; and (3) accommodates multi-rate traffic. Algorithms for network design and survivability are developed for PLATOONs in the presence of both static and dynamic traffic. Connection level dedicated/shared, segregated/mixed protection schemes are formulated for single link failures in the presence of static and dynamic traffic. A simple medium access control protocol that avoids collisions when the channel is shared by multiple clients is also proposed.;Based on extensive simulations, we conclude that, for the studied scenarios, (1) when client layer has no electronic grooming capabilities, light-trails (employing multi-point to multi-point aggregation strategy) perform several orders of magnitude better than lightpaths and (2) when client layer has full electronic grooming capabilities, source based light-trails (employing point to multi-point aggregation strategy) perform the best in wavelength limited scenarios and lightpaths perform the best in transceiver limited scenarios.;The algorithms that are developed here will be helpful in designing optical networks that deploy path level aggregation strategies. The proposed ideas will impact the design of transparent, high-speed all-optical networks.</p

    Groupage et protection du trafic dynamique dans les réseaux WDM

    Full text link
    Avec les nouvelles technologies des réseaux optiques, une quantité de données de plus en plus grande peut être transportée par une seule longueur d'onde. Cette quantité peut atteindre jusqu’à 40 gigabits par seconde (Gbps). Les flots de données individuels quant à eux demandent beaucoup moins de bande passante. Le groupage de trafic est une technique qui permet l'utilisation efficace de la bande passante offerte par une longueur d'onde. Elle consiste à assembler plusieurs flots de données de bas débit en une seule entité de données qui peut être transporté sur une longueur d'onde. La technique demultiplexage en longueurs d'onde (Wavelength Division Multiplexing WDM) permet de transporter plusieurs longueurs d'onde sur une même fibre. L'utilisation des deux techniques : WDM et groupage de trafic, permet de transporter une quantité de données de l'ordre de terabits par seconde (Tbps) sur une même fibre optique. La protection du trafic dans les réseaux optiques devient alors une opération très vitale pour ces réseaux, puisqu'une seule panne peut perturber des milliers d'utilisateurs et engendre des pertes importantes jusqu'à plusieurs millions de dollars à l'opérateur et aux utilisateurs du réseau. La technique de protection consiste à réserver une capacité supplémentaire pour acheminer le trafic en cas de panne dans le réseau. Cette thèse porte sur l'étude des techniques de groupage et de protection du trafic en utilisant les p-cycles dans les réseaux optiques dans un contexte de trafic dynamique. La majorité des travaux existants considère un trafic statique où l'état du réseau ainsi que le trafic sont donnés au début et ne changent pas. En plus, la majorité de ces travaux utilise des heuristiques ou des méthodes ayant de la difficulté à résoudre des instances de grande taille. Dans le contexte de trafic dynamique, deux difficultés majeures s'ajoutent aux problèmes étudiés, à cause du changement continuel du trafic dans le réseau. La première est due au fait que la solution proposée à la période précédente, même si elle est optimisée, n'est plus nécessairement optimisée ou optimale pour la période courante, une nouvelle optimisation de la solution au problème est alors nécessaire. La deuxième difficulté est due au fait que la résolution du problème pour une période donnée est différente de sa résolution pour la période initiale à cause des connexions en cours dans le réseau qui ne doivent pas être trop dérangées à chaque période de temps. L'étude faite sur la technique de groupage de trafic dans un contexte de trafic dynamique consiste à proposer différents scénarios pour composer avec ce type de trafic, avec comme objectif la maximisation de la bande passante des connexions acceptées à chaque période de temps. Des formulations mathématiques des différents scénarios considérés pour le problème de groupage sont proposées. Les travaux que nous avons réalisés sur le problème de la protection considèrent deux types de p-cycles, ceux protégeant les liens (p-cycles de base) et les FIPP p-cycles (p-cycles protégeant les chemins). Ces travaux ont consisté d’abord en la proposition de différents scénarios pour gérer les p-cycles de protection dans un contexte de trafic dynamique. Ensuite, une étude sur la stabilité des p-cycles dans un contexte de trafic dynamique a été faite. Des formulations de différents scénarios ont été proposées et les méthodes de résolution utilisées permettent d’aborder des problèmes de plus grande taille que ceux présentés dans la littérature. Nous nous appuyons sur la méthode de génération de colonnes pour énumérer implicitement les cycles les plus prometteurs. Dans l'étude des p-cycles protégeant les chemins ou FIPP p-cycles, nous avons proposé des formulations pour le problème maître et le problème auxiliaire. Nous avons utilisé une méthode de décomposition hiérarchique du problème qui nous permet d'obtenir de meilleurs résultats dans un temps raisonnable. Comme pour les p-cycles de base, nous avons étudié la stabilité des FIPP p-cycles dans un contexte de trafic dynamique. Les travaux montrent que dépendamment du critère d'optimisation, les p-cycles de base (protégeant les liens) et les FIPP p-cycles (protégeant les chemins) peuvent être très stables.With new technologies in optical networking, an increasing quantity of data can be carried by a single wavelength. This amount of data can reach up to 40 gigabits per second (Gbps). Meanwhile, the individual data flows require much less bandwidth. The traffic grooming is a technique that allows the efficient use of the bandwidth offered by a wavelength. It consists of assembling several low-speed data streams into a single data entity that can be carried on a wavelength. The wavelength division multiplexing (WDM) technique allows carrying multiple wavelengths on a single fiber. The use of the two techniques,WDMand traffic grooming, allows carrying a quantity of data in the order of terabits per second (Tbps) over a single optical fiber. Thus, the traffic protection in optical networks becomes an operation very vital for these networks, since a single failure can disrupt thousands of users and may result in several millions of dollars of lost revenue to the operator and the network users. The survivability techniques involve reserving additional capacity to carry traffic in case of a failure in the network. This thesis concerns the study of the techniques of grooming and protection of traffic using p-cycles in optical networks in a context of dynamic traffic. Most existing work considers a static traffic where the network status and the traffic are given at the beginning and do not change. In addition, most of these works concerns heuristic algorithms or methods suffering from critical lack of scalability. In the context of dynamic traffic, two major difficulties are added to the studied problems, because of the continuous change in network traffic. The first is due to the fact that the solution proposed in the previous period, even if optimal, does not necessarily remain optimal in the current period. Thus, a re-optimization of the solution to the problem is required. The second difficulty is due to the fact that the solution of the problem for a given period is different from its solution for the initial period because of the ongoing connections in the network that should not be too disturbed at each time period. The study done on the traffic grooming technique in the context of dynamic traffic consists of proposing different scenarios for dealing with this type of traffic, with the objective of maximizing the bandwidth of the new granted connections at each time period. Mathematical formulations of the different considered scenarios for the grooming problem are proposed. The work we have done on the problem of protection considers two types of p-cycles, those protecting links and FIPP p-cycles (p-cycle protecting paths). This work consisted primarily on the proposition of different scenarios for managing protection p-cycles in a context of dynamic traffic. Then, a study on the stability of cycles in the context of dynamic traffic was done. Formulations of different scenarios have been proposed and the proposed solution methods allow the approach of larger problem instances than those reported in the literature. We rely on the method of column generation to implicitly enumerate promising cycles. In the study of path protecting p-cycles or FIPP p-cycles, we proposed mathematical formulations for the master and the pricing problems. We used a hierarchical decomposition of the problem which allows us to obtain better results in a reasonable time. As for the basic p-cycles, we studied the stability of FIPP p-cycles in the context of dynamic traffic. The work shows that depending on the optimization criterion, the basic p-cycles (protecting the links) and FIPP p-cycles (protecting paths) can be very stable

    Survivability and performance optimization in communication networks using network coding

    Get PDF
    The benefits of network coding are investigated in two types of communication networks: optical backbone networks and wireless networks. In backbone networks, network coding is used to improve survivability of the network against failures. In particular, network coding-based protection schemes are presented for unicast and multicast traffic models. In the unicast case, network coding was previously shown to offer near-instantaneous failure recovery at the bandwidth cost of shared backup path protection. Here, cost-effective polynomial-time heuristic algorithms are proposed for online provisioning and protection of unicast traffic. In the multicast case, network coding is used to extend the traditional live backup (1+1) unicast protection to multicast protection; hence called multicast 1+1 protection. It provides instantaneous recovery for single failures in any bi-connected network with the minimum bandwidth cost. Optimal formulation and efficient heuristic algorithms are proposed and experimentally evaluated. In wireless networks, performance benefits of network coding in multicast transmission are studied. Joint scheduling and performance optimization formulations are presented for rate, energy, and delay under routing and network coding assumptions. The scheduling component of the problem is simplified by timesharing over randomly-selected sets of non-interfering wireless links. Selecting only a linear number of such sets is shown to be rate and energy effective. While routing performs very close to network coding in terms of rate, the solution convergence time is around 1000-fold compared to network coding. It is shown that energy benefit of network coding increases as the multicast rate demand is increased. Investigation of energy-rate and delay-rate relationships shows both parameters increase non-linearly as the multicast rate is increased

    Resource Allocation for Periodic Traffic Demands in WDM Networks

    Get PDF
    Recent research has clearly established that holding-time-aware routing and wavelength assignment (RWA) schemes lead to significant improvements in resource utilization for scheduled traffic. By exploiting the knowledge of the demand holding times, this thesis proposes new traffic grooming techniques to achieve more efficient resource utilization with the goal of minimizing resources such as bandwidth, wavelength channels, transceivers, and energy consumption. This thesis also introduces a new model, the segmented sliding window model, where a demand may be decomposed into two or more components and each component can be sent separately. This technique is suitable for applications where continuous data transmission is not strictly required such as large file transfers for grid computing. Integer linear program (ILP) formulations and an efficient heuristic are put forward for resource allocation under the proposed segmented sliding window model. It is shown that the proposed model can lead to significantly higher throughput, even over existing holding-time-aware models

    Survivable multicasting in WDM optical networks

    Get PDF
    Opportunities abound in the global content delivery service market and it is here that multicasting is proving to be a powerful feature. In WDM networks, optical splitting is widely used to achieve multicasting. It removes the complications of optical-electronic-optical conversions [1]. Several multicasting algorithms have been proposed in the literature for building light trees. As the amount of fiber deployment increases in networks, the risk of losing large volumes of data traffic due to a fiber span cut or due to node failure also increases. In this thesis we propose heuristic schemes to make the primary multicast trees resilient to network impairments. We consider single link failures only, as they are the most common cause of service disruptions. Thus our heuristics make the primary multicast session survivable against single link failures by offering alternate multicast trees. We propose three algorithms for recovering from the failures with proactive methodologies and two algorithms for recovering from failures by reactive methodologies. We introduce the new and novel concept of critical subtree. Through our new approach the proactive and reactive approaches can be amalgamated together using a criticality threshold to provide recovery to the primary multicast tree. By varying the criticality threshold we can control the amount of protection and reaction that will be used for recovery. The performance of these five algorithms is studied in combinations and in standalone modes. The input multicast trees to all of these recovery heuristics come from a previous work on designing power efficient multicast algorithms for WDM optical networks [1]. Measurement of the power levels at receiving nodes is indeed indicative of the power efficiency of these recovery algorithms. Other parameters that are considered for the evaluation of the algorithms are network usage efficiency, (number of links used by the backup paths) and the computation time for calculating these backup paths. This work is the first to propose metrics for evaluating recovery algorithms for multicasting in WDM optical networks. It is also the first to introduce the concept of hybrid proactive and reactive approach and to propose a simple technique for achieving the proper mix
    • …
    corecore