42 research outputs found

    Design and protection algorithms for path level aggregation of traffic in WDM metro optical networks

    Get PDF
    Wavelength Division Multiplexing (WDM) promises to offer a cost effective and scalable solution to meet the emerging demands of the Internet. WDM splits the tremendous bandwidth latent in a fiber into multiple non-overlapping wavelength channels, each of which can be operated at the peak electronic rate. Commercial systems with 128 wavelengths and transmission rates of up to 40 Gbps per wavelength have been made possible using state of the art optical technologies to deal with physical impairments. Systems with higher capacities are likely to evolve in the future. The end user requirements for bandwidth, on the other hand, have been ranging from 155 Mbps to 2.5 Gbps. Dedicating a wavelength for each end user will lead to severe underutilization of WDM channels. This brings to forefront the requirement for sharing of bandwidth in a wavelength among multiple end users.;The concept of wavelength sharing among multiple clients is called grooming. Grooming can be done purely at the optical layer (optical grooming) or it can be done with support from the client layer (electronic grooming). The advantage of all optical grooming is the ease of scalability due to its transparency as opposed to electronic grooming which is constrained by electronic bottlenecks. Efforts towards enhancing optical grooming is pursued through increasing optical switching speeds. However, technologies to make optical switches with high speeds, large port counts and low insertion losses have been elusive and may continue to remain so in the near future.;Recently, there have been some research into designing new architectures and protocols focused on optical grooming without resorting to fast optical switching. Typically, this is achieved in three steps: (1) configure the circuit in the form of a path or a tree; (2) use optical devices like couplers or splitters to allow multiple transmitters and/or receivers to share the same circuit; and (3) provide an arbitration mechanism to avoid contention among end users of the circuit. This transparent sharing of the wavelength channel utilizes the network resources better than the conventional low-speed circuit switched approaches. Consequently, it becomes important to quantify the improvement in achieved performance and evaluate if the reaped benefits justify the cost of the required additional hardware and software.;The contribution of this thesis is two fold: (1) developing a new architecture called light-trails as an IP based solution for next generation WDM optical networks, and (2) designing a unified framework to model Path Level Aggregation of Traffic in metrO Optical Networks (PLATOONs). The algorithms suggested here have three features: (1) accounts for four different path level aggregation strategies---namely, point to point (for example, lightpaths), point to multi-point (for example, source based light-trails), multi-point to point (for example, destination based light-trails) and multi-point to multi-point (for example, light-trails); (2) incorporates heterogenous switching architectures; and (3) accommodates multi-rate traffic. Algorithms for network design and survivability are developed for PLATOONs in the presence of both static and dynamic traffic. Connection level dedicated/shared, segregated/mixed protection schemes are formulated for single link failures in the presence of static and dynamic traffic. A simple medium access control protocol that avoids collisions when the channel is shared by multiple clients is also proposed.;Based on extensive simulations, we conclude that, for the studied scenarios, (1) when client layer has no electronic grooming capabilities, light-trails (employing multi-point to multi-point aggregation strategy) perform several orders of magnitude better than lightpaths and (2) when client layer has full electronic grooming capabilities, source based light-trails (employing point to multi-point aggregation strategy) perform the best in wavelength limited scenarios and lightpaths perform the best in transceiver limited scenarios.;The algorithms that are developed here will be helpful in designing optical networks that deploy path level aggregation strategies. The proposed ideas will impact the design of transparent, high-speed all-optical networks.</p

    Study of architectures & protection schemes for high-speed WDM-based passive optical access networks utilizing centralized light sources for colorless optical network units

    Get PDF
    Zhang Bo.Thesis (M.Phil.)--Chinese University of Hong Kong, 2006.Includes bibliographical references (leaves 55-59).Abstracts in English and Chinese.Chapter Chapter 1 --- Introduction to Passive Optical Networks --- p.1Chapter 1.1 --- Passive Optical Network (PON) --- p.2Chapter 1.1.1 --- PON architecture --- p.3Chapter 1.1.2 --- PON benefits --- p.4Chapter 1.2 --- The History of PON --- p.4Chapter 1.3 --- WDM-PON --- p.5Chapter 1.4 --- Outline of This Thesis --- p.8Chapter Chapter 2 --- Previous Schemes for Colorless ONU Operation in WDM-PON --- p.9Chapter 2.1 --- Introduction --- p.10Chapter 2.2 --- Previous WDM-PON Architectures for Colorless ONU Operation --- p.10Chapter 2.2.1 --- Spectrum slicing BLS employed at the ONU --- p.11Chapter 2.2.2 --- Centralized broadband light source (BLS) for upstream optical carrier supply --- p.12Chapter 2.2.3 --- Reuse of the downstream carrier at the ONU --- p.17Chapter 2.3 --- Summary --- p.21Chapter Chapter 3 --- WDM-PON with a Centralized Supercontinuum Broadband Light Source for Colorless ONUs --- p.23Chapter 3.1 --- Introduction --- p.24Chapter 3.1.1 --- Introduction to Supercontinuum Generation --- p.24Chapter 3.1.2 --- Introduction to Photonic Crystal Fibers --- p.25Chapter 3.1.3 --- Supercontinuum Generation in a Photonic Crystal Fiber --- p.27Chapter 3.2 --- WDM-PON with Centralized Supercontinuum Broadband Light Source --- p.27Chapter 3.2.1 --- Motivation --- p.27Chapter 3.2.2 --- Proposed access network --- p.28Chapter 3.2.3 --- Experimental demonstration and results --- p.30Chapter 3.2.4 --- Discussions --- p.32Chapter 3.2.5 --- Conclusion --- p.34Chapter 3.3 --- Broadcast Signal Delivery over a WDM-PON based on Supercontinuum Generation --- p.34Chapter 3.3.1 --- Motivation --- p.34Chapter 3.3.2 --- Proposed network architecture --- p.35Chapter 3.3.3 --- Experiment results and discussions --- p.36Chapter 3.3.4 --- Conclusion --- p.38Chapter 3.4 --- Summary --- p.38Chapter Chapter 4 --- A Survivable WDM-PON with Colorless Optical Network Units --- p.39Chapter 4.1 --- Introduction --- p.40Chapter 4.2 --- Previous Protection Schemes --- p.40Chapter 4.3 --- A Survivable WDM-PON with Centralized BLS --- p.44Chapter 4.3.1 --- Network topology and wavelength assignment --- p.45Chapter 4.3.2 --- Protection operation principles --- p.46Chapter 4.3.3 --- Experimental results --- p.47Chapter 4.4 --- Summary --- p.48Chapter Chapter 5 --- Summary and Future Work --- p.50Chapter 5.1 --- Summary of the Thesis --- p.51Chapter 5.2 --- Future Work --- p.52LIST OF PUBLICATIONS --- p.54REFERENCES --- p.5

    Energy Efficient IP over WDM Networks Using Network Coding

    Get PDF
    In this thesis we propose the use of network coding to improve the energy efficiency in core networks, by reducing the resources required to process traffic flows at intermediate nodes. We study the energy efficiency of the proposed scheme through three approaches: (i) developing a mixed integer linear programme (MILP) to optimise the use of network resources. (ii) developing a heuristic based on minimum hop routing. (iii) deriving an analytical bounds and closed form expressions. The results of the MILP model show that implementing network coding over typical networks can introduce savings up to 33% compared to the conventional architectures. The results of the heuristic show that the energy efficient minimum hop routing in network coding enabled networks achieves power savings approaching those of the MILP model. The analytically calculated power savings also confirm the savings achieved by the model. Furthermore, we study the impact of network topology on the savings obtained by implementing network coding. The results show that the savings increase as the hop count of the network topology increases. Using the derived expressions, we calculated the maximum power savings for regular topologies as the number of nodes grows. The power savings asymptotically approach 45% and 23% for the ring (and line) and star topology, respectively. We also investigate the use of network coding in 1+1 survivable IP over WDM networks. We study the energy efficiency of this scheme through MILP, a heuristic with five operating options, and analytical bounds. We evaluate the MILP and the heuristics on typical and regular network topologies. Implementing network coding can produce savings up to 37% on the ring topology and 23% considering typical topologies. We also study the impact of varying the demand volumes on the network coding performance. We also develop analytical bounds for the conventional 1+1 protection and the 1+1 with network coding to verify the results of the MILP and the heuristics and study the impact of topology, focusing on the full mesh and ring topologies, providing a detailed analysis considering the impact of the network size

    Optimization Methods for Optical Long-Haul and Access Networks

    Get PDF
    Optical communications based on fiber optics and the associated technologies have seen remarkable progress over the past two decades. Widespread deployment of optical fiber has been witnessed in backbone and metro networks as well as access segments connecting to customer premises and homes. Designing and developing a reliable, robust and efficient end-to-end optical communication system have thus emerged as topics of utmost importance both to researchers and network operators. To fulfill these requirements, various problems have surfaced and received attention, such as network planning, capacity placement, traffic grooming, traffic scheduling, and bandwidth allocation. The optimal network design aims at addressing (one or more of) these problems based on some optimization objectives. In this thesis, we consider two of the most important problems in optical networks; namely the survivability in optical long-haul networks and the problem of bandwidth allocation and scheduling in optical access networks. For the former, we present efficient and accurate models for availability-aware design and service provisioning in p-cycle based survivable networks. We also derive optimization models for survivable network design based on p-trail, a more general protection structure, and compare its performance with p-cycles. Indeed, major cost savings can be obtained when the optical access and long-haul subnetworks become closer to each other by means of consolidation of access and metro networks. As this distance between long-haul and access networks reduces, and the need and expectations from passive optical access networks (PONs) soar, it becomes crucial to efficiently manage bandwidth in the access while providing the desired level of service availability in the long-haul backbone. We therefore address in this thesis the problem of bandwidth management and scheduling in passive optical networks; we design efficient joint and non-joint scheduling and bandwidth allocation methods for multichannel PON as well as next generation 10Gbps Ethernet PON (10G-EPON) while addressing the problem of coexistence between 10G-EPONs and multichannel PONs

    Protection architectures for multi-wavelength optical networks.

    Get PDF
    by Lee Chi Man.Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.Includes bibliographical references (leaves 63-65).Abstracts in English and Chinese.Chapter CHAPTER 1 --- INTRODUCTION --- p.5Chapter 1.1 --- Background --- p.5Chapter 1.1.1 --- Backbone network - Long haul mesh network problem --- p.5Chapter 1.1.2 --- Access network ´ؤ Last mile problems --- p.8Chapter 1.1.3 --- Network integration --- p.9Chapter 1.2 --- SUMMARY OF INSIGHTS --- p.10Chapter 1.3 --- Contribution of this thesis --- p.11Chapter 1.4 --- Structure of the thesis --- p.11Chapter CHAPTER 2 --- PREVIOUS PROTECTION ARCHITECTURES --- p.12Chapter 2.1 --- Introduction --- p.12Chapter 2.2 --- Traditional physical protection architectures in metro area --- p.13Chapter 2.2.1 --- Self healing ring --- p.17Chapter 2.2.2 --- Some terminology in ring protection --- p.13Chapter 2.2.3 --- Unidirectional path-switched rings (UPSR) [17] --- p.13Chapter 2.2.4 --- Bidirectional line-switched rings (BLSR) [17] --- p.14Chapter 2.2.5 --- Ring interconnection and dual homing [17] --- p.16Chapter 2.3 --- Traditional physical protection architectures in access networks --- p.17Chapter 2.3.1 --- Basic architecture in passive optical networks --- p.17Chapter 2.3.2 --- Fault management issue in access networks --- p.18Chapter 2.3.3 --- Some protection architectures --- p.18Chapter 2.4 --- Recent protection architectures on a ccess networks --- p.21Chapter 2.4.1 --- Star-Ring-Bus architecture --- p.21Chapter 2.5 --- Concluding remarks --- p.22Chapter CHAPTER 3 --- GROUP PROTECTION ARCHITECTURE (GPA) FOR TRAFFIC RESTORATION IN MULTI- WAVELENGTH PASSIVE OPTICAL NETWORKS --- p.23Chapter 3.1 --- Background --- p.23Chapter 3.2 --- Organization of Chapter 3 --- p.24Chapter 3.3 --- Overview of Group Protection Architecture --- p.24Chapter 3.3.1 --- Network architecture --- p.24Chapter 3.3.2 --- Wavelength assignment --- p.25Chapter 3.3.3 --- Normal operation of the scheme --- p.25Chapter 3.3.4 --- Protection mechanism --- p.26Chapter 3.4 --- Enhanced GPA architecture --- p.27Chapter 3.4.1 --- Network architecture --- p.27Chapter 3.4.2 --- Wavelength assignment --- p.28Chapter 3.4.3 --- Realization of network elements --- p.28Chapter 3.4.3.1 --- Optical line terminal (OLT) --- p.28Chapter 3.4.3.2 --- Remote node (RN) --- p.29Chapter 3.4.3.3 --- Realization of optical network unit (ONU) --- p.30Chapter 3.4.4 --- Protection switching and restoration --- p.31Chapter 3.4.5 --- Experimental demonstration --- p.31Chapter 3.5 --- Conclusion --- p.33Chapter CHAPTER 4 --- A NOVEL CONE PROTECTION ARCHITECTURE (CPA) SCHEME FOR WDM PASSIVE OPTICAL ACCESS NETWORKS --- p.35Chapter 4.1 --- Introduction --- p.35Chapter 4.2 --- Single-side Cone Protection Architecture (SS-CPA) --- p.36Chapter 4.2.1 --- Network topology of SS-CPA --- p.36Chapter 4.2.2 --- Wavelength assignment of SS-CPA --- p.36Chapter 4.2.3 --- Realization of remote node --- p.37Chapter 4.2.4 --- Realization of optical network unit --- p.39Chapter 4.2.5 --- Two types of failures --- p.40Chapter 4.2.6 --- Protection mechanism against failure --- p.40Chapter 4.2.6.1 --- Multi-failures of type I failure --- p.40Chapter 4.2.6.2 --- Type II failure --- p.40Chapter 4.2.7 --- Experimental demonstration --- p.41Chapter 4.2.8 --- Power budget --- p.42Chapter 4.2.9 --- Protection capability analysis --- p.42Chapter 4.2.10 --- Non-fully-connected case and its extensibility for addition --- p.42Chapter 4.2.11 --- Scalability --- p.43Chapter 4.2.12 --- Summary --- p.43Chapter 4.3 --- Comparison between GPA and SS-CPA scheme --- p.43Chapter 4.1 --- Resources comparison --- p.43Chapter 4.2 --- Protection capability comparison --- p.44Chapter 4.4 --- Concluding remarks --- p.45Chapter CHAPTER 5 --- MUL 77- WA VELENGTH MUL TICAST NETWORK IN PASSIVE OPTICAL NETWORK --- p.46Chapter 5.1 --- Introduction --- p.46Chapter 5.2 --- Organization of this chapter --- p.47Chapter 5.3 --- Simple Group Multicast Network (SGMN) scheme --- p.47Chapter 5.3.1 --- Network design principle --- p.47Chapter 5.3.2 --- Wavelength assignment of SGMN --- p.48Chapter 5.3.3 --- Realization of remote node --- p.49Chapter 5.3.3 --- Realization of optical network unit --- p.50Chapter 5.3.4 --- Power budget --- p.51Chapter 5.4 --- A mulTI- wa velength a ccess network with reconfigurable multicast …… --- p.51Chapter 5.4.1 --- Motivation --- p.51Chapter 5.4.2 --- Background --- p.51Chapter 5.4.3 --- Network design principle --- p.52Chapter 5.4.4 --- Wavelength assignment --- p.52Chapter 5.4.5 --- Remote Node design --- p.53Chapter 5.4.6 --- Optical network unit design --- p.54Chapter 5.4.7 --- Multicast connection pattern --- p.55Chapter 5.4.8 --- Multicast group selection in OLT --- p.57Chapter 5.4.9 --- Scalability --- p.57Chapter 5.4.10 --- Experimental configuration --- p.58Chapter 5.4.11 --- Concluding remarks --- p.59Chapter CHAPTER 6 --- CONCLUSIONS --- p.60LIST OF PUBLICATIONS: --- p.62REFERENCES: --- p.6
    corecore