Sharedbackup Liu2013
Sharedbackup Liu2013
Abstract—This study investigates the survivable traffic groom- flow on a lightpath decreases, some frequency slots it occupied
ing problem for elastic optical networks with flexible spectrum before can now be released and used by other lightpaths [7].
grid employing new transmission technologies. In such networks, In optical networks, the failure of a network element (e.g.,
instead of following the traditional fixed ITU-T wavelength grid,
optical transponders are capable of properly tuning their rates, a fiber cut) can cause huge data loss, resulting in the failure
and consequently their spectrum occupation, by introducing the of several lightpaths. This problem becomes more compelling
fine-granular spectrum unit, called a frequency slot. The number when lightpaths are migrated to high bit rates, such as 40, 100
of contiguous frequency slots allocated to an optical path (i.e., Gbps and beyond, which are expected to be accommodated
lightpath) is adjusted to the current network flow. In this study, in future elastic networks. Hence, survivability in elastic
we propose a novel shared protection specific to elastic networks,
namely, elastic separate-protection-at-connection (ESPAC). It not networks is a critical issue. Shared protection has been studied
only provides traditional backup sharing, but also offers a new with static traffic (where a traffic demand matrix is known
opportunity of spectrum sharing enabled by the elasticity of the [8]), and for dynamic provisioning using online approaches
transponders: 1) if the working paths of two connections are [9]. Ref. [10] proposed dedicated protection in transparent
link disjoint physically, and 2) if their backup paths traverse two flexible-grid network, showing better spectrum utilization by
lightpaths which are adjacent on a fiber link, then the two backup
lightpaths can share spectrum. The new opportunity of spectrum flexible bandwidth assignment. Ref. [11] proposed a best-effort
sharing is realized by using First-Fit to assign working traffic restoration while satisfying the service level specifications,
and Last-Fit to assign backup traffic, and allowing spectrum taking advantage of the elastic bandwidth variation.
overlap between adjacent backup wavelengths. The elasticity of However, most studies on elastic networks are based on the
the transponder enables the expansion and contraction of the assumption that one lightpath is provided for each connection
lightpaths, thus when a single failure occurs in the network,
lightpaths carrying backup flows can be tuned to appropriate request [6]–[12], which cannot guarantee optimum spectrum
rates in such a way that the overlap spectrum is used by only utilization because a fair amount of spectrum is wasted as
one of the adjacent lightpaths. The results show ESPAC is very guard bands. To further improve the spectrum efficiency, we
spectrum efficient in elastic network setting. recast in elastic networks the classical problem of protected
Index Terms—Shared protection, Elastic optical network, Traf- traffic grooming in WDM networks [13], which allows us to
fic grooming, Dynamic provisioning, Spectrum assignment. multiplex different connections on one lightpath. Therefore,
grooming capabilities for transit signals must be incorporated
in the bandwidth-variable wavelength cross-connects (BV-
I. I NTRODUCTION
WXCs) to switch elastic lightpaths [1]. Note that the problem
The term “elasticity” refers to a set of recent innovations of traffic grooming in elastic networks is a nascent research
in optical networks. In an elastic optical network, rather field and has been so far considered only in unprotected
than following the ITU-T fixed grid with its rigid 50/100 networks, e.g., [14] proposed an electrical-traffic-grooming
GHz bandwidth, appropriate-sized optical bandwidth in sub- network design and showed that it saves at least 8% average
and super-wavelength granularity is allocated to an end-to- spectrum utilization compared to the non-traffic-grooming
end path [1], achieving significant gains in network design approach. The work in [15] proposed an optical-grooming
and operation in terms of CAPEX, and OPEX [2]–[4]. Such network design where they groom the traffics from the same
evolution is particularly beneficial for the increasing hetero- source onto one lightpath, and drop or switch optically a subset
geneity of today’s traffic, thanks to the new advances in of frequency slots at the intermediate nodes along the route
transmission technologies (e.g., new modulation techniques, to their corresponding destinations. Traffic grooming can also
such as optical OFDM, coherent detection, and advanced dig- lead to a saving of energy consumption, according to [3].
ital signal processing) that promise to provide flexibility [5], In this study, we propose to use First-Fit to assign spectrum
reconfigurability, and higher network agility. Such advances for the working paths, and Last-Fit to assign spectrum for
facilitate the flexible expansion and contraction of lightpaths the backup paths. We allow spectrum overlap between backup
(which are therefore referred to as elastic lightpaths) according wavelengths. Based on these spectrum assignment schemes,
to the traffic volume and user request [6]. Thus, when the we propose a protection approach – elastic separate-protection-
at-connection (ESPAC), providing end-to-end protection at
Menglin Liu ([email protected]) and Biswanath Mukherjee are with the connection level [16]. A path that carries traffic during normal
Department of Computer Science, University of California, Davis, CA USA. operation is called a working path. When any fiber link on the
Massimo Tornatore is with the Department of Computer Science, University
of California, Davis, CA USA, and with the Department of Electronics and working path fails, the connection is rerouted on a backup
Information, Politecnico di Milano, Italy. path. Under ESPAC, the spectrum of a lightpath can be used
Copyright (c) 2011 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
In this section, we first give a brief review of shared protec- Fig. 2. Traditional shared protection in WDM network c1 :1→2, c2 :5→6,
tion in WDM networks (non-elastic shared protection). Then both of which are full-wavelength capacity.
we introduce the spectrum assignment schemes in ESPAC and
we describe it with examples. B. Spectrum Assignment Schemes in ESPAC
The flow on a lightpath is bounded by the maximum
A. Traditional Shared protection capacity of a transponder. Correspondingly, the spectrum used
We explain shared protection in WDM networks in Fig. 2. by a lightpath, adjusted to the flow on it, is limited by a
Assume there are two connections: c1 is from node 1 to 2, spectrum range. For example, in Fig. 3, the spectrum range
and c2 is from node 5 to 6, both of which are full-wavelength is 8 slots. If we assume the spectrum used by a lightpath is
capacity. In Fig. 2(a), c1 ’s working path traverses lightpath l1 , allocated around its central frequency, then the transponder can
and its backup path is the concatenation of lightpaths l3 , l4 , be tuned so that the lightpath occupies 2/4/6/8 slots (shown
and l5 . c2 ’s working path traverses l2 , and its backup path is as different degree of gray). We define a wavelength channel
the concatenation of l6 , l4 , and l7 . Since l1 and l2 are link as the spectrum range of a lightpath with its guard bands. For
disjoint, their backup paths can share l4 . An alternative shared example, in Fig. 3, guard band is 2 slots, and a wavelength
protection is shown in Fig. 2(b): l1 and l2 are protected by l3 channel is 10 slots.
and l4 respectively. On link 3→4, l3 and l4 can share the same We use First-Fit spectrum assignment for the routing of the
wavelength because their working paths are link disjoint. The Working flows (FFW), and Last-Fit spectrum assignment to
difference between these two is the number of transponders route the Backup flows from the other end of the fiber (LFB).
used for backup provisioning: in Fig. 2(a), we need five pairs Between the wavelengths assigned to carry backup flow, we
of transponders, while in Fig. 2(b), we need two pairs. allow spectrum overlap. For example, in Fig. 1, the number
Figure 2 represents two sharing opportunities offered by of frequency slots that backup wavelength channels overlap
non-elastic shared protection. (1) If the working paths of two with each other is 3. The overlapped frequency slot is shared
connections are link disjoint, they can share the same backup between adjacent wavelength channels in the time domain: it is
lightpath (Fig. 2(a)). (2) If the working paths of two backup occupied by at most one of the adjacent wavelengths at a time.
lightpaths are link disjoint and these two backup lightpaths If the flow on lightpath 2 decreases but the flow on lightpath
go through the same physical link, then they can share the 1 increases, the elastic transponder can be tuned as shown in
same wavelength on that link (Fig. 2(b)). But since in WDM the callout in Fig. 1, where the shaded region represents the
networks, each wavelength channel is limited within its rigid used spectrum. Enough guard band must be satisfied between
grid, non-elastic shared protection cannot provide spectrum the flows on adjacent wavelengths.
sharing between adjacent wavelength channels.
C. Examples
However, enabled by the elasticity of the transponders,
ESPAC offers a new opportunity of spectrum sharing: if the Below, we illustrate ESPAC via examples on NSFNET
working paths of two connections are link disjoint, and if their in Fig. 4, where each edge corresponds to a bidirectional
backup paths traverse two lightpaths which are adjacent on a fiber. We make the following assumptions: each frequency
fiber link, then the two backup lightpaths can share spectrum. slot utilizes 12.5 GHz; the modulation level for used slot is 4
We introduce spectrum assignment schemes in ESPAC next. bits/symbol; when additional flow is groomed into an existing
Copyright (c) 2011 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Copyright (c) 2011 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Copyright (c) 2011 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Algorithm 1 ESPAC
Require: G = (V, E, W ), c = hs, d, B, ti, routing and
spectrum usage of existing lightpaths/connections, GB, C,
OVLP, and K.
Ensure: link-disjoint working and backup paths, return
NULL if no such paths are found.
1: construct the auxiliary graph Ga to represent the current
Fig. 7. An example of Cmax (l1 ) < C.
network state (including wavelength usage and existing
lightpath information), as shown in Section IV.A.
2: compute K minimum-cost paths Pw = {pkw |1 ≤ k ≤ lightpaths or wavelengths with layer index smaller than W · p.
K 0 , 0 ≤ K 0 ≤ K} in Ga from the lightpath-layer vertex The free capacity of a backup wavelength/lightpath edge e
of node s to the lightpath-layer vertex of node d based on in this step is denoted as Cb (e), where Cb (e) = Cmax (e) −
the following edge-cost function κw (e) (if there are less Cbackup (e), Cmax (e) is the maximum capacity that can be
than K paths between the vertices, then the algorithm will carried on e, and Cbackup (e) is the backup capacity already
compute all the K 0 eligible paths, 0 ≤ K 0 ≤ K); return reserved on e (Cbackup (e) = 0 if e is a wavelength). Here,
NULL if Pw is empty, Cmax (e) may not be as much as C, an example of which
1) if e represents a transponder, then κw (e) = κ(e) is shown in Fig. 7. Lightpath l1 has an adjacent lightpath l2 .
2) otherwise Since l2 is using the overlap between l1 and l2 , the maximum
(a) if Cw (e), the free capacity of e is less than capacity of l1 is s2 , which is smaller than C, marked as s1 .
B or the wavelength layer index of e is larger Thus, to compute Cmax (e) of a backup wavelength/lightpath
than W · p, κw (e) = ∞ e, we need to first compute Cbackup (l), where l is the adjacent
(b) otherwise, κw (e) = κ(e) backup lightpath of e, and Cbackup (l) is the total backup
capacity that has been reserved for backup flow. To compute
3: k = 1,
Cbackup (l), we associate l with a conflict set νl represented
4: while k ≤ K 0 and backup path pkb is not found do 0 0 0
as an integer set, {νle |∀e0 ∈ E, 0 ≤ νle ≤ C}, where νle
5: for candidate working path pkw , compute a minimum-
represents the amount of flow that will be rerouted on lightpath
cost link-disjoint path pkb from the lightpath-layer vertex
l when link e0 fails:
of node s to the lightpath-layer vertex of node d based
0
on the following edge-cost function κb (e): Cbackup (l) = max∀e0 ∈pkw {νle }, (1)
1) if e does not represent a lightpath or a wavelength,
where pkw is the kth candidate working path calculated in
then κb (e) = κ(e)
Step 2. In traditional shared protection, Cmax (e) is C when
2) otherwise
e denotes a backup wavelength/lightpath, and the spectrum
(a) if Cb (e), the free capacity of e is less than B reserved on one backup lightpath does not affect the maximum
or the wavelength layer index of e is smaller capacity of its adjacent wavelengths and lightpaths.
than W · p, or e is not link disjoint with pkw
κb (e) = ∞ IV. I LLUSTRATIVE N UMERICAL R ESULTS
(b) otherwise, κb (e) = κ(e) A. Network and Traffic Model
6: k=k+1 if pkb is not found,
We simulate a dynamic network environment with the
7: end while
assumptions that the connection arrival process is Poisson and
8: return NULL if pkb is not found,
the connection holding time follows a negative exponential
9: update network state: update the spectrum usage of light-
distribution with unit (normalized) mean. Connections requests
paths involved in the paths pkw and pkb ; set up new
are unidirectional and uniformly distributed among all node
lightpaths (if necessary).
pairs. 100,000 connections are simulated in each experiment.
10: for every lightpath l that pkb traverses, νle ← νle + B for
We consider a typical backbone network topology in Fig. 4.
every link e used by the lightpaths that pkw traverses,
Assume each fiber has a total spectrum of 4400 GHz (the same
11: return pkw as the working path and pkb as the backup path.
as 88 wavelengths with 50 GHz grid as in WDM networks).
The capacity of the elastic transponder is 400 Gbps. The
spectrum range of a lightpath is 8 slots. We assume the guard
backup flow, but not both; and 2) all wavelengths with layer band is 25 GHz, which is 2 frequency slots. To quantitatively
index larger than W · p are reserved for backup flow routing present the performance of our approach, we use bandwidth-
in our approach. The maximum capacity of the transponder is blocking ratio (BBR), defined as the amount of bandwidth
C. The free capacity of a working wavelength/lightpath edge blocked over the amount of bandwidth offered.
e in this step is denoted as Cw (e), where Cw (e) = C if e is a In our simulations, we consider the effect of two parameters:
wavelength. Cw (e) = C − Cworking (e) if e is a lightpath and p and OVLP. Table II gives the total number of wavelengths
Cworking (e) is the current working flow on e. and total spectrum reserved as backup on a fiber link according
When we compute the minimal-cost path for the backup to different p and OVLP values. The bigger p and OVLP,
path in Step 5, we do not consider all the existing working the less total backup spectrum we reserve. Here we want to
Copyright (c) 2011 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
TABLE II
N ETWORK R ESOURCE A SSIGNMENT UNDER D IFFERENT S IMULATION
S ETTINGS
Total number Total backup spectrum
OVLP of wavelengths (in terms of GHz)
p = 0.5 p = 0.6 p = 0.5 p = 0.6
0 35 35 2175 1750
1 37 36 2037.5 1587.5
2 39 38 1925 1525
3 41 39 1787.5 1350
4 43 41 1625 1250
B. Results
We first present a set of results where all the connections
request are 100 Gbps. Fig. 8(a) reports the results for p = 0.5,
which means the number of working wavelengths is the
same as that of backup wavelengths. The scenario “100 Gbps (b) p = 0.6
WDM” represents traditional shared protection in a 100-Gbps
WDM network, where a connection will fully fill in one
wavelength. For other scenarios with “OVLP” values, each
lightpath is 400 Gbps. We can see that because grooming
100-Gbps connection unto 400-Gbps lightpath uses much less
spectrum as guard band, results with OVLP values have much
lower BBR than 100 Gbps WDM. Among the ESPAC results,
the best OVLP value depends on the network offered load.
When the traffic load 1100 Erlang, the larger the OVLP, the
more efficiently the spectrum is utilized (i.e., OVLP=4, where
the reserved backup spectrum is 1625 GHz according to Table
II). When the traffic load ≤1100 Erlang, a “medium”-size
overlap spectrum gives the lowest BBR (i.e., OVLP=2 or 3,
where the reserved backup spectrum is 1925 GHz or 1787.5
GHz according to Table II). (c) FFW-LFB with different p values and FF with different
overlap values
The BBR for p = 0.6 are given in Fig. 8(b). We observe
different rules of best OVLP values from p = 0.5. When the Fig. 8. BBR versus network offered load for connection = 100 Gbps.
traffic load ≥1200 Erlang, 2-slot backup sharing gives the
lowest BBR. When load ≤1100 Erlang, 1-slot backup sharing
is the most beneficial. overlap backup spectrum, the BBR is higher because there
In Fig. 8(c), a point of the three FFW-LFB scenarios is not enough spectrum to route working flow. If we reserve
corresponds to the lowest BBR of a specific p value, with less backup spectrum, which means larger p value or more
its corresponding OVLP value shown beside the point. We overlap backup spectrum, the BBR is higher because there
observe that the network setting of p = 0.6 always has the is not enough spectrum to route backup flow. In Fig. 8(c),
lowest BBR with OVLP=1 or 2. According to Table II, in we also compare the FFW-LFB spectrum assignment with FF.
such scenarios, the reserved backup spectrums are 1587.5 GHz Under FF, working and backup traffics are assigned from the
and 1525 GHz out of 4400 GHz on a fiber. If we reserve same end of the fiber without differentiation. For all traffic
more backup spectrum, which means smaller p value or less loads, FFW-LFB p = 0.6 has the lowest BBR. When the
Copyright (c) 2011 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Copyright (c) 2011 IEEE. Personal use is permitted. For any other purposes, permission must be obtained from the IEEE by emailing [email protected].