OSA's Digital Library

Journal of Optical Communications and Networking

Journal of Optical Communications and Networking

  • Editors: K. Bergman and O. Gerstel
  • Vol. 6, Iss. 2 — Feb. 1, 2014
  • pp: 127–137

Exploiting Excess Capacity for Survivable Traffic Grooming in Optical Backbone Networks

Ferhat Dikbiyik, Massimo Tornatore, and Biswanath Mukherjee  »View Author Affiliations


Journal of Optical Communications and Networking, Vol. 6, Issue 2, pp. 127-137 (2014)
http://dx.doi.org/10.1364/JOCN.6.000127


View Full Text Article

Enhanced HTML    Acrobat PDF (1079 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

Backbone networks usually have some excess capacity (EC) to accommodate traffic fluctuations and to avoid early capacity exhaustion. Network operators can exploit EC in optical wavelength division multiplexed (WDM) backbone networks to support survivable traffic grooming, where connection requests are of subwavelength granularity and each provisioned request has to be protected from single-link failures. We investigate novel EC management techniques that can improve network performance, in terms of Service-Level Agreement (SLA) violations and bandwidth blockings, with no requirement of deploying additional capacity. We investigate exploiting and managing EC by the following techniques. i) Preprovisioning: When traffic is light, network resources are reserved by a preprovisioning scheme, i.e., a connection can be provisioned on reserved protected links to increase availability. We show that preprovisioning also decreases connection setup time, an important metric for delay-sensitive services. iiBackup reprovisioning: Since high-availability protection schemes usually consume more resources, connections in our solution can be switched to a protection scheme that provides lower availability (but higher resource efficiency) by reprovisioning backup resources when traffic increases. iiiHold-lightpath: We propose a new “hold-lightpath” scheme to exploit EC. This scheme prevents the termination of pre-established (but unused) resources to increase availability and decrease connection setup time. We compare our techniques with traditional protection schemes for typical daily fluctuating traffic on typical backbone network topologies and find that significant improvements can be achieved in terms of decreasing SLA violations, bandwidth blocking, and connection setup time.

© 2014 Optical Society of America

OCIS Codes
(060.4250) Fiber optics and optical communications : Networks
(060.4257) Fiber optics and optical communications : Networks, network survivability
(060.4261) Fiber optics and optical communications : Networks, protection and restoration

ToC Category:
Research Papers

History
Original Manuscript: April 24, 2013
Revised Manuscript: November 29, 2013
Manuscript Accepted: November 29, 2013
Published: January 20, 2014

Citation
Ferhat Dikbiyik, Massimo Tornatore, and Biswanath Mukherjee, "Exploiting Excess Capacity for Survivable Traffic Grooming in Optical Backbone Networks," J. Opt. Commun. Netw. 6, 127-137 (2014)
http://www.opticsinfobase.org/jocn/abstract.cfm?URI=jocn-6-2-127


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. F. Dikbiyik, L. Sahasrabuddhe, M. Tornatore, and B. Mukherjee, “Exploiting excess capacity to improve robustness of WDM mesh networks,” IEEE/ACM Trans. Netw., vol.  20, no. 1, pp. 114–124, Feb. 2012. [CrossRef]
  2. F. Dikbiyik, M. Tornatore, and B. Mukherjee, “Exploiting excess capacity, part II: Differentiated services under traffic growth,” IEEE/ACM Trans. Netw., submitted. (Preliminary versions of this work were presented at the PS’10 and ANTS’10 conferences.)
  3. K. Zhu and B. Mukherjee, “Traffic grooming in an optical WDM mesh network,” IEEE J. Sel. Areas Commun., vol.  20, no. 1, pp. 122–133, Jan. 2002. [CrossRef]
  4. C. Ou, K. Zhu, H. Zang, L. Sahasrabuddhe, and B. Mukherjee, “Traffic grooming for survivable WDM networks—shared protection,” IEEE J. Sel. Areas Commun., vol.  21, no. 9, pp. 1367–1383, Nov. 2003. [CrossRef]
  5. C. Ou, K. Zhu, J. Zhang, H. Zhu, B. Mukherjee, H. Zang, and L. Sahasrabuddhe, “Traffic grooming for survivable WDM networks—dedicated protection,” J. Opt. Netw., vol.  3, no. 1, pp. 50–74, Jan. 2004. [CrossRef]
  6. B. Mukherjee, Optical WDM Networks. New York, NY: Springer, 2006.
  7. D. Zhou and S. Subramaniam, “Survivability in optical networks,” IEEE Network, vol.  14, no. 6, pp. 16–23, Nov./Dec. 2000.
  8. S. Ramamurthy, L. Sahasrabuddhe, and B. Mukherjee, “Survivable WDM mesh networks,” J. Lightwave Technol., vol.  21, no. 4, pp. 870–883, Apr. 2003. [CrossRef]
  9. D. Xu, Y. Xiong, and C. Qiao, “Novel algorithms for shared segment protection,” IEEE J. Sel. Areas Commun., vol.  21, no. 8, pp. 1320–1331, Oct. 2003. [CrossRef]
  10. D. Arci, G. Maier, A. Pattavina, D. Petecchi, and M. Tornatore, “Availability models for protection techniques in WDM networks,” in Proc. of Design of Reliable Communication Networks, Oct. 2003, pp. 158–166.
  11. L. Zhou, M. Held, and U. Sennhauser, “Connection availability analysis of shared backup path-protected mesh networks,” J. Lightwave Technol., vol.  25, no. 5, pp. 1111–1119, May 2007. [CrossRef]
  12. L. Song, J. Zhang, and B. Mukherjee, “A comprehensive study on backup-bandwidth reprovisioning after network-state updates in survivable telecom mesh networks,” IEEE/ACM Trans. Netw., vol.  16, no. 6, pp. 1366–1377, Dec. 2008. [CrossRef]
  13. J. Zhang, K. Zhu, H. Zhang, N. Matloff, and B. Mukherjee, “Availability-aware provisioning strategies for differentiated protection services in wavelength-convertible WDM mesh networks,” IEEE/ACM Trans. Netw., vol.  15, no. 5, pp. 1111–1119, May 2007. [CrossRef]
  14. J. M. Simmons, “Cost vs. capacity tradeoff with shared mesh protection in optical-bypass-enabled backbone networks,” in Proc. of Nat. Fiber Optic Engineers Conf., Anaheim, CA, Mar. 2007.
  15. E. Bouillet, J. Labourdette, R. Ramamurthy, and S. Chaudhuri, “Lightpath re-optimization in mesh optical networks,” IEEE/ACM Trans. Netw., vol.  13, no. 2, pp. 437–447, Apr. 2005. [CrossRef]
  16. C. Assi, W. Huo, A. Shami, and N. Ghani, “On the benefits of lightpath reprovisioning in optical mesh networks,” in Proc. of IEEE Int. Conf. on Communications, Seoul, South Korea, May 2005.
  17. C. Assi, W. Huo, and A. Shami, “Multiple link failures survivability of optical networks with traffic grooming capability,” Comput. Commun., vol.  29, no. 18, pp. 3900–3912, 2006. [CrossRef]
  18. F. Dikbiyik, M. Tornatore, and B. Mukherjee, “Exploiting excess capacity for survivable traffic grooming in optical WDM backbone networks,” in Proc. IEEE Globecom, Houston, TX, Dec. 2011.
  19. M. Xia, M. Tornatore, C. U. Martel, and B. Mukherjee, “Service-centric provisioning in WDM backbone networks for the future Internet,” J. Lightwave Technol., vol.  27, no. 12, pp. 1856–1865, June 2009. [CrossRef]
  20. A. Todimala and B. Ramamurthy, “A dynamic partitioning sub-path protection routing technique in WDM mesh networks,” in Proc. of Int. Conf. on Computer Communications, Washington, DC, Aug. 2002.
  21. C. Labovitz, “What Europeans do at night,” Arbor Networks, 2009 [Online]. Available: http://ddos.arbornetworks.com/2009/08/what-europeans-do-at-night/ .
  22. S. Huang, M. Xia, C. Martel, and B. Mukherjee, “Survivable multipath traffic grooming in telecom mesh networks with inverse multiplexing,” J. Opt. Commun. Netw., vol.  2, no. 8, pp. 545–557, Aug. 2010. [CrossRef]
  23. M. Xia, M. Tornatore, C. U. Martel, and B. Mukherjee, “Risk-aware provisioning for optical WDM mesh networks,” IEEE/ACM Trans. Netw., vol.  19, no. 3, pp. 921–931, June 2011. [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited