27 research outputs found

    Design and provisioning of WDM networks for traffic grooming

    Get PDF
    Wavelength Division Multiplexing (WDM) is the most viable technique for utilizing the enormous amounts of bandwidth inherently available in optical fibers. However, the bandwidth offered by a single wavelength in WDM networks is on the order of tens of Gigabits per second, while most of the applications\u27 bandwidth requirements are still subwavelength. Therefore, cost-effective design and provisioning of WDM networks require that traffic from different sessions share bandwidth of a single wavelength by employing electronic multiplexing at higher layers. This is known as traffic grooming. Optical networks supporting traffic grooming are usually designed in a way such that the cost of the higher layer equipment used to support a given traffic matrix is reduced. In this thesis, we propose a number of optimal and heuristic solutions for the design and provisioning of optical networks for traffic grooming with an objective of network cost reduction. In doing so, we address several practical issues. Specifically, we address the design and provisioning of WDM networks on unidirectional and bidirectional rings for arbitrary unicast traffic grooming, and on mesh topologies for arbitrary multipoint traffic grooming. In multipoint traffic grooming, we address both multicast and many-to-one traffic grooming problems. We provide a unified frame work for optimal and approximate network dimensioning and channel provisioning for the generic multicast traffic grooming problem, as well as some variants of the problem. For many-to-one traffic grooming we propose optimal as well as heuristic solutions. Optimal formulations which are inherently non-linear are mapped to an optimal linear formulation. In the heuristic solutions, we employ different problem specific search strategies to explore the solution space. We provide a number of experimental results to show the efficacy of our proposed techniques for the traffic grooming problem in WDM networks

    Schemes for building an efficient all-optical virtual private network.

    Get PDF
    by Tam Scott Kin Lun.Thesis submitted in: October 2005.Thesis (M.Phil.)--Chinese University of Hong Kong, 2006.Includes bibliographical references (leaves 58-64).Abstracts in English and Chinese.Chapter 1. --- Introduction --- p.1Chapter 1.1. --- Optical Networks --- p.1Chapter 1.1.1. --- IP over Optical Networks --- p.1Chapter 1.1.2. --- Challenges in Optical Networks --- p.4Chapter 1.2. --- Virtual Private Networks (VPN) --- p.5Chapter 1.2.1. --- CE Based VPN --- p.6Chapter 1.2.2. --- Network Based VPN --- p.7Chapter 1.2.2.1. --- MPLS Layer 2 VPN --- p.8Chapter 1.2.2.2. --- MPLS Layer 3 VPN --- p.9Chapter 1.2.3. --- Optical VPN --- p.9Chapter 1.2.4. --- Challenges in VPN Technologies --- p.11Chapter 1.3. --- Objective of this Thesis --- p.11Chapter 1.4. --- Outline of this Thesis --- p.12Chapter 2. --- Architecture of an All-Optical VPN --- p.13Chapter 2.1. --- Introduction --- p.13Chapter 2.2. --- Networking Vendor Activities --- p.13Chapter 2.3. --- Service Provider Activities --- p.15Chapter 2.4. --- Standard Bodies Activities --- p.16Chapter 2.5. --- Requirements for All-Optical VPN --- p.17Chapter 2.6. --- Reconfigurability of an All-Optical VPN --- p.19Chapter 2.7. --- Switching Methods in All-Optical VPN --- p.20Chapter 2.8. --- Survivability of an All-Optical VPN --- p.23Chapter 3. --- Maximizing the Utilization Of A Survivable Multi-Ring WDM Network --- p.25Chapter 3.1. --- Introduction --- p.25Chapter 3.2. --- Background --- p.25Chapter 3.3. --- Method --- p.26Chapter 3.3.1. --- Effect on packet based services --- p.28Chapter 3.3.2. --- Effect on optical circuit based services --- p.28Chapter 3.4. --- Simulation results --- p.29Chapter 3.5. --- Chapter Summary --- p.36Chapter 4. --- Design of an All-Optical VPN Processing Engine --- p.37Chapter 4.1. --- Introduction --- p.37Chapter 4.2. --- Concepts of Optical Processors --- p.38Chapter 4.3. --- Design Principles of the All-Optical VPN Processing Engine --- p.40Chapter 4.3.1. --- Systolic System --- p.41Chapter 4.3.2. --- Design Considerations of an Optical Processing Cell --- p.42Chapter 4.3.2.1. --- Mach-Zehnder Structures --- p.43Chapter 4.3.2.2. --- Vertical Cavity Semiconductor Optical Amplifier --- p.43Chapter 4.3.2.3. --- The Optical Processing Cell --- p.44Chapter 4.3.3. --- All-Optical VPN Processing Engine --- p.47Chapter 4.4. --- Design Evaluation --- p.49Chapter 4.5. --- Application Example --- p.50Chapter 4.6. --- Chapter Summary --- p.54Chapter 5. --- Conclusion --- p.55Chapter 5.1. --- Summary of the Thesis --- p.55Chapter 5.2. --- Future Works --- p.56Chapter 6. --- References --- p.5

    Survivability through pre-configured protection in optical mesh networks

    Get PDF
    Network survivability is a very important issue, especially in optical networks that carry huge amount of traffic. Network failures which may be caused by human errors, malfunctional systems and natural disaster (eg. Earthquakes and lightening storms), have occurred quite frequently and sometimes with unpredictable consequences. Survivability is defined as the ability of the network to maintain the continuity of service against failures of network components. Pre-configuration and dynamic restoration are two schemes for network survivability. For each scheme, survivability algorithms can be applied at either Optical Channel sublayer (Och) known as link-based. Or, Optical Multiplex Section sublayer (OMS) known as path-based. The efficiency of survivability algorithms can be assessed through such criteria as capacity efficiency, restoration time and quality service. Dynamic restoration is more efficient than pre-configuration in terms of capacity resource utilization, but restoration time is longer and 100% service recovery cannot be guaranteed because sufficient spare capacity may not be available at the time of failures. Similarly, path-based survivability offers a high performance scheme for utilizing capacity resource, but restoration time is longer than link based survivability

    Using GRASP and GA to design resilient and cost-effective IP/MPLS networks

    Get PDF
    The main objective of this thesis is to find good quality solutions for representative instances of the problem of designing a resilient and low cost IP/MPLS network, to be deployed over an existing optical transport network. This research is motivated by two complementary real-world application cases, which comprise the most important commercial and academic networks of Uruguay. To achieve this goal, we performed an exhaustive analysis of existing models and technologies. From all of them we took elements that were contrasted with the particular requirements of our counterparts. We highlight among these requirements, the need of getting solutions transparently implementable over a heterogeneous network environment, which limit us to use widely standardized features of related technologies. We decided to create new models more suitable to fit these needs. These models are intrinsically hard to solve (NP-Hard). Thus we developed metaheuristic based algorithms to find solutions to these real-world instances. Evolutionary Algorithms and Greedy Randomized Adaptive Search Procedures obtained the best results. As it usually happens, real-world planning problems are surrounded by uncertainty. Therefore, we have worked closely with our counterparts to reduce the fuzziness upon data to a set of representative cases. They were combined with different strategies of design to get to scenarios, which were translated into instances of these problems. Finally, the algorithms were fed with this information, and from their outcome we derived our results and conclusions

    Software Defined Applications in Cellular and Optical Networks

    Get PDF
    abstract: Small wireless cells have the potential to overcome bottlenecks in wireless access through the sharing of spectrum resources. A novel access backhaul network architecture based on a Smart Gateway (Sm-GW) between the small cell base stations, e.g., LTE eNBs, and the conventional backhaul gateways, e.g., LTE Servicing/Packet Gateways (S/P-GWs) has been introduced to address the bottleneck. The Sm-GW flexibly schedules uplink transmissions for the eNBs. Based on software defined networking (SDN) a management mechanism that allows multiple operator to flexibly inter-operate via multiple Sm-GWs with a multitude of small cells has been proposed. This dissertation also comprehensively survey the studies that examine the SDN paradigm in optical networks. Along with the PHY functional split improvements, the performance of Distributed Converged Cable Access Platform (DCCAP) in the cable architectures especially for the Remote-PHY and Remote-MACPHY nodes has been evaluated. In the PHY functional split, in addition to the re-use of infrastructure with a common FFT module for multiple technologies, a novel cross functional split interaction to cache the repetitive QAM symbols across time at the remote node to reduce the transmission rate requirement of the fronthaul link has been proposed.Dissertation/ThesisDoctoral Dissertation Electrical Engineering 201

    Availability Constrained Routing And Wavelength Assignment And Survivability In Optical Wdm Networks

    Get PDF
    Tez (Doktora) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2009Thesis (PhD) -- İstanbul Technical University, Institute of Science and Technology, 2009Bu çalışmada, optik ağlarda kullanılabilirlik kısıtı altında yol ve dalgaboyu atama konusu farklı sürdürülebilirlik politikaları altında çalışılmış ve elde edilen sonuçlar benzetim aracılığıyla doğrulanarak sunulmuştur. Öncelikle paylaşılan yol koruması altında sınırsız kaynak bulunması durumunda kullanılabilirlik kısıtı altında yol ve dalgaboyu atamaya yönelik planlama amaçlı bağlantı kurma yöntemleri sezgisel ve optimizasyona dayalı olarak önerilmiştir. Sonrasında bu teknikler kısıtlı kaynak altında ve farklılaştırılmış kullanılabilirlik düzeyi gereksinimleri ile gelen bağlantı isteklerinin olması koşulu altında çalışabilecek şekilde adapte edilmiş ve başarımları sınanmıştır. Önerilen tekniklerin literatürde yaygın olarak bilinen bağlantı kurma tekniklerinin başarımını bağlantı düşürme olasılığı ve bağlantı kullanılabilirliği açısından yükselttiği, bunun yanında yedek kaynak tüketim fazlasını da gözeterek kabul edilir bir düzeyde tuttuğu gözlenmiştir. Özellikle optimizasyon tabanlı bağlantı kurma tekniğinin, farklılaştırılmış bağlantı isteklerinin bulunduğu ortamda kaynak tüketimini de düşürdüğü gösterilmiştir. Son olarak da, segmanlı koruma için önceden önerilmiş bir kullanılabilirlik analizine rastlanamadığı için, paylaşılan segmanlı koruma için kullanılabilirlik analizi yöntemi önerilerek benzetim aracılığıyla doğrulanmıştır. Bu analiz kullanılarak da segmanlı koruma altında kullanılabilirliği gözeten yol ve dalgaboyu atama yöntemleri oluşturularak başarımları kaynak kısıtlı ve kaynakça zengin ortamlarda denenerek uygulanabilirlikleri belirlenmiştir.In this study, we have proposed availability aware routing and wavelength assignment schemes for optical networks under different survivability policies. The proposed techniques are evaluated by simulation. First, we have proposed heuristic and optimization driven connection provisioning schemes under shared backup path protection in resource plentiful environment. Then, the proposed schemes are modified to work in resource limited environment where connections arrive with differentiated availability requirements. The proposed techniques are compared to a conventional reliable connection provisioning algorithm. The simulation results show that the proposed techniques lead to lower connection blocking probability and better connection availability. Besides this, it is also shown that the proposed techniques also keep the resource overbuild due to protection in a feasible range. Moreover, the experimental results also show that the optimization driven technique leads to a decreased resource overbuild under resource limited environment for connection arrivals with differentiated availability requirements. The last part of this work deals with shared segment protection. Since there is no specific availability analysis method for shared segment protection, an availability analysis method for this protection scheme is proposed and validated by simulation. Based on this analysis, availability aware connection provisioning schemes are constructed, their performance is evaluated in resource plentiful and resource scarce environments, and the applicability of the schemes are determined in terms of environmental constraints.DoktoraPh

    Groupage et protection du trafic dynamique dans les réseaux WDM

    Full text link
    Avec les nouvelles technologies des réseaux optiques, une quantité de données de plus en plus grande peut être transportée par une seule longueur d'onde. Cette quantité peut atteindre jusqu’à 40 gigabits par seconde (Gbps). Les flots de données individuels quant à eux demandent beaucoup moins de bande passante. Le groupage de trafic est une technique qui permet l'utilisation efficace de la bande passante offerte par une longueur d'onde. Elle consiste à assembler plusieurs flots de données de bas débit en une seule entité de données qui peut être transporté sur une longueur d'onde. La technique demultiplexage en longueurs d'onde (Wavelength Division Multiplexing WDM) permet de transporter plusieurs longueurs d'onde sur une même fibre. L'utilisation des deux techniques : WDM et groupage de trafic, permet de transporter une quantité de données de l'ordre de terabits par seconde (Tbps) sur une même fibre optique. La protection du trafic dans les réseaux optiques devient alors une opération très vitale pour ces réseaux, puisqu'une seule panne peut perturber des milliers d'utilisateurs et engendre des pertes importantes jusqu'à plusieurs millions de dollars à l'opérateur et aux utilisateurs du réseau. La technique de protection consiste à réserver une capacité supplémentaire pour acheminer le trafic en cas de panne dans le réseau. Cette thèse porte sur l'étude des techniques de groupage et de protection du trafic en utilisant les p-cycles dans les réseaux optiques dans un contexte de trafic dynamique. La majorité des travaux existants considère un trafic statique où l'état du réseau ainsi que le trafic sont donnés au début et ne changent pas. En plus, la majorité de ces travaux utilise des heuristiques ou des méthodes ayant de la difficulté à résoudre des instances de grande taille. Dans le contexte de trafic dynamique, deux difficultés majeures s'ajoutent aux problèmes étudiés, à cause du changement continuel du trafic dans le réseau. La première est due au fait que la solution proposée à la période précédente, même si elle est optimisée, n'est plus nécessairement optimisée ou optimale pour la période courante, une nouvelle optimisation de la solution au problème est alors nécessaire. La deuxième difficulté est due au fait que la résolution du problème pour une période donnée est différente de sa résolution pour la période initiale à cause des connexions en cours dans le réseau qui ne doivent pas être trop dérangées à chaque période de temps. L'étude faite sur la technique de groupage de trafic dans un contexte de trafic dynamique consiste à proposer différents scénarios pour composer avec ce type de trafic, avec comme objectif la maximisation de la bande passante des connexions acceptées à chaque période de temps. Des formulations mathématiques des différents scénarios considérés pour le problème de groupage sont proposées. Les travaux que nous avons réalisés sur le problème de la protection considèrent deux types de p-cycles, ceux protégeant les liens (p-cycles de base) et les FIPP p-cycles (p-cycles protégeant les chemins). Ces travaux ont consisté d’abord en la proposition de différents scénarios pour gérer les p-cycles de protection dans un contexte de trafic dynamique. Ensuite, une étude sur la stabilité des p-cycles dans un contexte de trafic dynamique a été faite. Des formulations de différents scénarios ont été proposées et les méthodes de résolution utilisées permettent d’aborder des problèmes de plus grande taille que ceux présentés dans la littérature. Nous nous appuyons sur la méthode de génération de colonnes pour énumérer implicitement les cycles les plus prometteurs. Dans l'étude des p-cycles protégeant les chemins ou FIPP p-cycles, nous avons proposé des formulations pour le problème maître et le problème auxiliaire. Nous avons utilisé une méthode de décomposition hiérarchique du problème qui nous permet d'obtenir de meilleurs résultats dans un temps raisonnable. Comme pour les p-cycles de base, nous avons étudié la stabilité des FIPP p-cycles dans un contexte de trafic dynamique. Les travaux montrent que dépendamment du critère d'optimisation, les p-cycles de base (protégeant les liens) et les FIPP p-cycles (protégeant les chemins) peuvent être très stables.With new technologies in optical networking, an increasing quantity of data can be carried by a single wavelength. This amount of data can reach up to 40 gigabits per second (Gbps). Meanwhile, the individual data flows require much less bandwidth. The traffic grooming is a technique that allows the efficient use of the bandwidth offered by a wavelength. It consists of assembling several low-speed data streams into a single data entity that can be carried on a wavelength. The wavelength division multiplexing (WDM) technique allows carrying multiple wavelengths on a single fiber. The use of the two techniques,WDMand traffic grooming, allows carrying a quantity of data in the order of terabits per second (Tbps) over a single optical fiber. Thus, the traffic protection in optical networks becomes an operation very vital for these networks, since a single failure can disrupt thousands of users and may result in several millions of dollars of lost revenue to the operator and the network users. The survivability techniques involve reserving additional capacity to carry traffic in case of a failure in the network. This thesis concerns the study of the techniques of grooming and protection of traffic using p-cycles in optical networks in a context of dynamic traffic. Most existing work considers a static traffic where the network status and the traffic are given at the beginning and do not change. In addition, most of these works concerns heuristic algorithms or methods suffering from critical lack of scalability. In the context of dynamic traffic, two major difficulties are added to the studied problems, because of the continuous change in network traffic. The first is due to the fact that the solution proposed in the previous period, even if optimal, does not necessarily remain optimal in the current period. Thus, a re-optimization of the solution to the problem is required. The second difficulty is due to the fact that the solution of the problem for a given period is different from its solution for the initial period because of the ongoing connections in the network that should not be too disturbed at each time period. The study done on the traffic grooming technique in the context of dynamic traffic consists of proposing different scenarios for dealing with this type of traffic, with the objective of maximizing the bandwidth of the new granted connections at each time period. Mathematical formulations of the different considered scenarios for the grooming problem are proposed. The work we have done on the problem of protection considers two types of p-cycles, those protecting links and FIPP p-cycles (p-cycle protecting paths). This work consisted primarily on the proposition of different scenarios for managing protection p-cycles in a context of dynamic traffic. Then, a study on the stability of cycles in the context of dynamic traffic was done. Formulations of different scenarios have been proposed and the proposed solution methods allow the approach of larger problem instances than those reported in the literature. We rely on the method of column generation to implicitly enumerate promising cycles. In the study of path protecting p-cycles or FIPP p-cycles, we proposed mathematical formulations for the master and the pricing problems. We used a hierarchical decomposition of the problem which allows us to obtain better results in a reasonable time. As for the basic p-cycles, we studied the stability of FIPP p-cycles in the context of dynamic traffic. The work shows that depending on the optimization criterion, the basic p-cycles (protecting the links) and FIPP p-cycles (protecting paths) can be very stable
    corecore