Skip to main content
Log in

Multilayer Protection with Availability Guarantees in Optical WDM Networks

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

Survivability is a key concern in modern network design. This paper investigates the problem of survivable dynamic connection provisioning in general telecom backbone networks, that are mesh structured. We assume differentiated services where connections may have different availability requirements, so they may be provisioned differently with protection (if needed) based on their availability requirements and current network state. The problem of effectively provisioning differentiated-service requests, that has been widely investigated for connections routed at the physical layer, assumes peculiar features if we consider sub-wavelength requests at the logical layer that have to be protected (or more generically, whose availability target has to be guaranteed), but also have to be groomed for an efficient use of network resources. An integrated multilayer approach is necessary that considers requirements and grooming of connections at the logical layer as well as their routing and availability at the physical layer. Joint availability-guaranteed routing and traffic grooming may lead to a negative interaction, since the objective of the first problem (guaranteeing a given level of availability to the connections) clashes with the objective of the other problem (minimizing resource consumption). For a multilayer WDM mesh network, we propose new multilayer routing strategies that perform effective availability-guaranteed grooming of sub-wavelength connections. These strategies jointly considers connection availability satisfaction and resource optimization and are developed under two different practical hypotheses: guaranteed target, i.e., a connection is routed only if its availability target is satisfied, and best-effort target, a connection is always routed and, when the availability target cannot be guaranteed, the path with the best possible availability is provisioned. Numerical results are reported and discussed for the two approaches mentioned above. In both cases, the results show high effectiveness of our provisioning strategy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Notes

  1. Unfortunately, guaranteeing that a path has a path availability larger than target availability does not ensure that the SLA will not be violated. In literature, various works have dealt with the concept of risk of an SLA violation [19, 20], also called interval availability [21], which provides a metric to evaluate how likely a connection with a given availability will violate its SLA target over a prefixed time period. The theoretical formulations to represent the risk of SLA violation focus mainly on unprotected and/or dedicated protected services and do not consider traffic grooming due to the computational complexity of this problem; furthermore only recently consideration for service availability has been introduced directly in routing problems, and only for unprotected routing [22]. For all of these reasons, in this paper we focus on the availability metric, leaving as a possible extension of this work the investigation of how to include the risk of an SLA violation in our problem.

  2. Note that, since offered connections are characterized by different granularituies of the required capacity, the arrival rate is expressed in terms of OC-1 connections (e.g., each time an OC-48 is offered, that adds a term 48 to the arrival rate).

References

  1. Dutta, R., Rouskas, G.: Traffic grooming in WDM mesh networks: past and future. IEEE Netw. Mag. 43(6), 46–56 (2002)

    Article  Google Scholar 

  2. Ou, C., Zhu, K., Zang, H., Zhang, J., Zhu, H., Sahasrabuddhe, L.H., Mukherjee, B.: Traffic grooming for survivable WDM networks: dedicated protection. IEEE/OSA J. Opt. Netw. 3, 50–74 (2004)

    Article  Google Scholar 

  3. Ou, C., Zhu, K., Zang, H., Sahasrabuddhe, L.H., Mukherjee, B.: Traffic grooming for survivable WDM networks: shared protection. IEEE J. Sel. Areas Commun. 21(9), 1367–1383 (2003)

    Article  Google Scholar 

  4. Yao, W., Ramamurthy, B.: Survivable traffic grooming with path protection at the connection level in WDM mesh networks. IEEE/OSA J. Lightwave Technol. 23(10), 2846–2853 (2005)

    Article  Google Scholar 

  5. Nucci, A., Taft, N., Barakat, C., Thiran, P.: Controlled use of excess backbone bandwidth for providing new services in IP-over-WDM networks. IEEE J. Sel. Areas Commun. 22(9), 1692–1707 (2004)

    Article  Google Scholar 

  6. Fang, J., Sivakumar, M., Somani, A.K., Sivalingam, K.M.: On partial protection in groomed optical WDM mesh networks. In: Proceedings of IEEE International Conference on Dependable Systems and Network (DSN) (2005)

  7. Bigos, W., Cousin, B., Gosselin, S., Le Foll, M., Nakajima, H.: Survivable MPLS over optical transport networks: cost and resource usage analysis. IEEE J. Sel. Areas Commun. 25(5), 949–962 (2007)

    Article  Google Scholar 

  8. Ratnam, K., Gurusamy, M., Zhou, L.: Differentiated QoS routing of restorable sub-lambda connections in IP-over-WDM networks using a multi-layer protection approach. In: Proceedings of International Conference on Broadband Networks (BroadNets 2005), vol. 1, pp. 127–136 (2005, October)

  9. Rai, S., Song, L., Cavdar, C., Andrei, D., Mukherjee, B.: A novel approach to provision differentiated services in survivable IP-over-WDM networks. Opt. Switch. Netw. 5(2–3), 170–176 (2008)

    Article  Google Scholar 

  10. Cholda, P., Mykkeltveit, A., Helvik, B.E., Wittner, O.J., Jajszczyk, A.: A survey of resilience differentiation frameworks in communication networks. IEEE Commun. Surv. Tutor. 9(4), 32–55 (2007)

    Article  Google Scholar 

  11. Song, L., Zhang, J., Mukherjee, B.: Dynamic provisioning with availability guarantee for differentiated services in survivable mesh networks. IEEE J. Sel. Areas Commun. (OCN Supplement) 25(4), 32–44 (2007)

    MATH  Google Scholar 

  12. Yao, W., Ramamurthy, B.: Survivable traffic grooming with differentiated end-to-end availability guarantees in WDM mesh networks. In: Proceedings of IEEE Workshop on Local and Metropolitan Area Networks (LANMAN), pp. 87–90 (2004)

  13. Xiang, B., Yu, H., Wang, S., Li, L.: A differentiated shared protection algorithm supporting traffic grooming in WDM mesh networks. In: Proceedings of International Conference on Communications, Circuits and Systems (ICCCAS), vol. 1, pp. 628–632 (2004)

  14. He, R., Wen, H., Li, L., Wang, G.: Shared sub-path protection algorithm in traffic-grooming WDM mesh networks. Photonic Netw. Commun. 8(3), 239–249 (2004)

    Article  Google Scholar 

  15. Zhu, H., Zang, H., Zhu, K., Mukherjee, B.: Dynamic traffic grooming in WDM mesh networks using a novel graph model. In: Proceedings of IEEE GlobeCom ’02, vol. 3, pp. 2681–2685 (2002)

  16. Tornatore, M., Maier, G., Pattavina, A.: Capacity versus availability trade-offs for availability-based routing. OSA J. Opt. Netw. 5(11), 858–869 (2006)

    Article  Google Scholar 

  17. Zhou, L., Held, M., Sennhauser, U.: Connection availability analysis of shared backup path-protected mesh networks. IEEE/OSA J. Lightwave Technol. 25(5), 1111–1119 (2007)

    Article  Google Scholar 

  18. Zhu, H., Zang, H., Zhu, K., Mukherjee, B.: A novel generic graph model for traffic grooming in heterogeneous WDM mesh networks. IEEE/ACM Trans. Netw. 11(2), 285–299 (2003)

    Article  Google Scholar 

  19. Clemente, R., Bartoli, M., Bossi, M., D’Orazio, G., Cosmo, G.: Risk management in availability SLA. In: Proceedings of International Conference on the Design of Reliable Communication Networks (DRCN) (2005)

  20. Zhou, L., Grover, W.: A theory for setting the safety margin on availability guarantees in an SLA. In: Proceedings of International Conference on the Design of Reliable Communication Networks (DRCN) (2005)

  21. Mello, D.A.A., Quiterio, G.S., Waldman, H., Schupke, D.A.: Specification of SLA survivability requirements for optical path protected connections. In: Proceedings of Optical Fiber Communication Conference (OFC) (2006)

  22. Xia, M., Tornatore, M., Martel, C., Mukherjee, B.: Risk-aware routing for optical transport networks. In: Proceedings of IEEE INFOCOM (2010, April)

  23. Lewis, E.E.: In: Sons, J.W. (ed.) Introduction to Reliability Engeneering. Wiley (1987)

  24. Arci, D., Maier, G., Pattavina, A., Petecchi, D., Tornatore, M.: Availability models for protection techniques in WDM networks. In: Proceedings of International Conference on the Design of Reliable Communication Networks (DRCN) (2003)

  25. Tornatore, M., Lucerna, D., Song, L., Mukherjee, B., Pattavina, A.: Dynamic SLA redefinition for shared-path-protected connections with known duration. In: Proceedings of Optical Fiber Communication Conference (OFC) (2008)

  26. Mello, D.A.A., Schupke, D.A., Waldman, H.: A matrix-based analytical approach to connection unavailability estimation in shared backup path protection. IEEE Commun. Lett. 9(9), 844–846 (2005)

    Article  Google Scholar 

  27. Mello, D.A.A., Waldman, H.: Analytical bounds on the unavailability of protected connections in WDM optical networks. IEEE Commun. Lett. 11(11), 901–903 (2007)

    Article  Google Scholar 

  28. Zhang, J., Zhu, K., Zhang, H., Matloff, N., Mukherjee, B.: Availability-aware provisioning strategies for differentiated protection services in wavelength—convertible WDM mesh networks. IEEE/ACM Trans. Netw. 15(5), 1177–1190 (2004)

    Article  Google Scholar 

Download references

Acknowledgments

A preliminary version of this work has been presented in the 13th Conference on Optical Network Design and Modeling 2009 (ONDM09). The research leading to these results has received funding from the European Communitys Seventh Framework Programme FP7/2007-2013 under grant agreement no. 247674 (STRONGEST project). The authors would like to also thank Stefano Cavallaro and Roberto Lucadello for the active collaboration in the software and algorithm developments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Massimo Tornatore.

Appendix: On the Availability Evaluation for Shared Protected Connections

Appendix: On the Availability Evaluation for Shared Protected Connections

There is a relevant body of literature developed in these last years, regarding analytical models for availability calculation for protected connections, based on the classical reliability theory [23]. In the case of dedicated protection, the evaluation of the availability of the protected connection can be easily obtained with the following expression

$$ A= A_w + A_b(1-A_w) $$

where A w and A b represent the availability of the working and the backup path, respectively.

On the contrary, various methodologies have been proposed to solve the problem of availability evaluation with different degree of complexity and precision. In fact, the availability calculation in the case of shared protection has been proven to be NP-complete, and we have to resort to approximations to find practical models for the availability calculation.

The key problem to be solved is how to account for the connections that are “conflicting” with the backup path of the connection under analysis (say b), i.e. those connections that in case of failure (single or multiple) compete with b for the same shared backup capacity. Intuitively, the count of the conflicting connections becomes more and more complex for an increasing number of concurrent failures, and the corresponding number of possible conflict scenarios to be considered increases exponentially. In conclusion, it is not computationally feasible to account for all the possible scenarios.

A first approximated formulation appeared in [24], where the authors consider as “conflicting” connections all the connections that are sharing with b some capacity along their backup path (the set of these connections is referred to as Protection Group). In this case, the formula for the availability A i of the generic protected connection i is given by

$$ A_i \approx A_{w_i}+\left(1-A_{w_i}\right)A_{b_i} \prod_{\forall h \in PG_i (h \neq i)}A_{w_{h}} $$
(2)

where A w_h is the availability of the working path of a generic connection h belonging to the protection group PG i of connection i.

An extension of this model can be found in [25], where a more accurate count of the conflicting connections is proposed. The study in [25] recognizes that only some of the links along the working paths w h in the PG i do actually induce a conflict in case of failures, and that only those links have to be accounted for. The formula 2 is evolved in

$$ A_i = A_{w_i}+ A{b_i}A{c_i} \cdot A_{w_i}A{b_i}A{c_i} $$

where A c i is the product of the availability of all the links conflicting according to the new definition. The authors propose a data structure, called conflict vector, to evaluate the set of conflicting links c i given a connection i. Please refer to [25] for further details.

Also in [11] and [28], the authors propose similar approaches. They use the concept of grabbing probability, i.e. the probability that the connection “grabs” the shared capacity in case of contention. We omit further details for these two works since they are based on a similar formulations to the one in [25], and are leading to a similar performance.

A completely different approach is proposed in [26]. The authors investigate a two-step approach: a first step to be executed once, during the network planning phase and a second step to be applied for each connection whose availability is currently evaluated. The calculation is based on a Markov chain model. An extension of this work is reported in [27], where an investigation of the upper and lower bounds of the previous analytical approach is conducted.

Finally, an extremely precise methodology is proposed in [17]. This work is the first one to apply the concept of conflicting links to each link of the working path. In other words, for each link of the working path the authors evaluate which other links would compete (or “conflict”) with it in case of double failure, while previously, as in [25] and [26] conflicting links where considered as conflicting with any link of the working path. Now a set conflicting links is associated to each link of the working path and not generically to the working path. We will see that this novelty avoids a significant overestimation of connection unavailability.

For this method, each of the competing connections has a probability 0.5 to acquire the shared capacity. Formula 3 describes the calculation in [17]. For each link i on the working path, a “modified” unavailability is calculated. Consider that Cond CT indicates the set of links conflicting with i, i.e., those links that in case of another concurrent failure together with i would cause the loss, for the connection in exam, of a traffic quantity equal to NT, over a total amount of traffic d s,t , then:

$$ U_i^* = U_i \cdot \left[ \sum_{j \notin W \cap i \in B} U_i + 0.5 \cdot \sum_{j \in Cond_{CT}} \left( U_j \cdot \frac{NT_{i,CT}^{i,j}}{d_{s,t}} \right) \right] $$
(3)

returns U * i as the modified link availability that captures the likelyhood of a conflict (note that U i is the actual link availability). Once the U * i has been calculated, under the approximation of rare-events, the entire path unavailability can be expressed as:

$$ U_{path} = \sum_{i=1}^{N} U_i^* $$

where N is the number of links in the working path. Please refer to [17] for further details.

It is worth mentioning that for all these works, the main approximation is that no more than two concurrent failures are explicitly taken into account (as in [25]).

In Fig. 12, we compare some of the approaches described above over a simple network topology: a single protected connection consists of a working path with two links and and a protection path with three links. The three backup links can be shared by no other connections up to ten other connections (x-axis in the Fig. 12). All the links and sharing connections have an availability equal to 0.9. Monte Carlo simulation [24] provides a benchmark for all the approaches. The approach in [17] returns the estimation that is closest to the actual value of availability. So, in our simulation in Sect. 5, we decide to use the approach in [17].

Fig. 12
figure 12

Comparison of the availability estimation provided by the various availability models provided in this section (U link = 0.1)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tornatore, M., Lucerna, D., Mukherjee, B. et al. Multilayer Protection with Availability Guarantees in Optical WDM Networks. J Netw Syst Manage 20, 34–55 (2012). https://doi.org/10.1007/s10922-011-9210-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10922-011-9210-4

Keywords

Navigation