1. Trang chủ
  2. » Kỹ Thuật - Công Nghệ

Tài liệu AN ALGORITHMIC FRAMEWORK FOR PROTECTION SWITCHING IN WDM NETWORKS doc

9 299 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề An algorithmic framework for protection switching in wdm networks
Tác giả Kayi Lee, Kai-Yeung (Sunny) Siu
Trường học Massachusetts Institute of Technology
Thể loại Bài báo
Định dạng
Số trang 9
Dung lượng 95,3 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

In particular, we study the problem of finding a pair of disjoint paths in the network, so that a single failure on a network will disrupt at most one of the paths.. In a network where

Trang 1

AN ALGORITHMIC FRAMEWORK FOR PROTECTION SWITCHING IN

WDM NETWORKS

Massachusetts Institute of Technology Raza Foundries, Inc

Abstract

In a WDM network, a single component failure may lead to multiple failures in the logical topology Protection switching schemes that adopt traditional edge-disjoint or node-disjoint path-selection algorithms may not be able to protect the active connections properly In this paper, we generalize the disjoint path problem by providing a framework that can model arbitrary types of failures, so that a solution to the problem can be applied to protection switching in WDM networks We prove the necessary and sufficient condition for the existence of disjoint paths that are free from simultaneous disruption by a single failure The necessary and sufficient condition suggests a way to find such disjoint paths Based on the result, we formulate an integer linear program (ILP) that finds the disjoint paths

1 Introduction

Protection switching is a mechanism designed for providing reliable connection-oriented services

resilient to network failures With protection switching, a network provisions a working path and a

protection path between the source and destination when a connection request is initiated The working

and protection paths are routed in the network such that any network failure would affect at most one of the paths In a normal situation, the source/destination pair of a connection communicate over the working path However, when there is a network failure breaking the working path, the source and destination can immediately switch their communication channel to the protection path, so that transmission of data will not be disrupted by the network failure Figure 1 illustrates the concept of

protection switching Under normal conditions, the nodes A and B communicate via the working path In

the case of a link failure, the working path is broken As a result of protection switching, the two end nodes switch to the protection path to communicate From the perspective of the end users, the link failure

is invisible to them as long as the switching is fast enough

Figure 1: Protection Switching

1 K.-Y Siu is currently on leave from MIT

Working path Protection path

Trang 2

In practice, there are different ways to implement protection switching For example, the source node may transmit data over the working and protection paths simultaneously The destination node will try to retrieve the data from the working path In the case of a failure on the working path, the destination node will detect the loss of connection and switch to the protection path for the data This is usually called

1+1 protection On the other hand, the source may only transmit data along the working path, but not the

protection path, during normal operation of the network When a failure breaks the working path, the destination node will detect the failure and signal the source node to switch to the protection path Since the protection path is not normally used, the bandwidth along the protection path can be shared with other

protection paths [2, 3, 4] The latter implementation, typically referred to as shared protection, is more

bandwidth efficient but requires a more complicated signaling protocol The actual implementation adopted for protection switching is outside the scope of this paper For more previous work about protection switching in optical networks, please refer to [2-8, 13, 14]

This paper focuses on the routing issue for protection switching In particular, we study the

problem of finding a pair of disjoint paths in the network, so that a single failure on a network will disrupt

at most one of the paths A special case of this general disjoint path problem has been widely studied in the literature, which mostly focused on link failures This gives rise to an interesting problem of finding

edge-disjoint paths in the network Two paths are edge-disjoint if they do not share any edge Similarly,

node failures in a network have also been considered, which results in a similar problem of finding

node-disjoint paths In a network where single node or link failure is the primary concern, node-node-disjoint or

edge-disjoint paths between the source and destination can serve well as the working and protection paths for the purpose of protection switching Fast algorithms have been designed to find node and edge disjoint paths [9-12, 15-18]

However, in WDM networks [20], diverse routing of working and protection paths can be more

complicated For a WDM network, traffic is routed on a logical topology, which is formed by establishing

lightpaths over the physical network [21] A single failure of an optical component, however, may result

in a number of lightpaths failing simultaneously In an example of a fiber cut, all the lightpaths that traverse the fiber will be broken Figure 2 and 3 give a simple example illustrating the problem Figure 2 illustrates the physical topology of a WDM network that supports 2 wavelengths Lightpaths are established and routed on the physical topology using the 2 wavelengths In Figure 3, the corresponding

logical topology formed by the lightpaths is illustrated Note that between nodes A and F, there are 2 edge-disjoint paths A-C-F and A-D-E-F on the logical topology Now consider a failure at the physical link C-D Since there are two lightpaths A-C and D-E traversing the link, they will be broken on the

logical topology at the same time As a result, multiple failures on the logical topology occur even if only

a single component fails, and the two edge-disjoint paths are broken simultaneously Therefore, routing algorithms based on the assumption of single node/edge failure are not particularly useful in WDM logical networks In addition, sometimes it may be necessary to consider other failure events in addition

to a single node or link failure, such as a power outage in a region that causes multiple nodes to break down It is difficult to augment such specially designed algorithms to accommodate the more general problem

In this paper, we consider a unified framework for the disjoint path problem, where arbitrary failure events can be modeled as input parameters In particular, the assumptions about the single node and single edge failure can be easily captured in the framework as special cases The framework is closely tied to the concept of “shared risk link group” (SRLG) proposed in the IETF IP-over-WDM standard [1] Within this framework, we prove the necessary and sufficient condition for the existence of a pair of paths

that are free from simultaneous disruption by a single failure This necessary and sufficient

Trang 3

condition suggests a way to find such disjoint paths Based on this result, we present an integer linear program (ILP) formulation to find disjoint paths

Figure 2: Physical topology with lightpath connections

Figure 3: Logical topology and the broken logical links

The paper is organized as follows In Section 2, we describe the framework and formulate the disjoint path problem as a graph problem Section 3 discusses some of the most related work to our problem and points out the contribution of our work In Section 4, we present some graph theoretic results related to the disjoint path problem and, in particular, state the necessary and sufficient condition for a pair of disjoint paths to exist We also discuss how this result may lead us to algorithms for finding the disjoint paths In Section 5, we formulate the disjoint path problem as an optimization problem, and present an integer linear program to solve it Section 6 concludes the paper and suggests some future work

2 Problem Formulation

We are interested in finding a pair of disjoint paths, that is, a pair of paths that are not vulnerable

to a common failure We describe a framework that captures arbitrary types of failure events and formulate the disjoint path problem as a graph problem We first describe the input parameters of the framework, and then define the disjoint path problem

The logical topology of the network is modeled by an undirected graph G=(V, E), where V is the set of nodes and E is the set of edges The input parameters consist of a pair of source and destination

E

F

E

D

A

Lightpaths

λ1

λ2

C

F

B

D

A

Trang 4

nodes (s, t), where s and t are nodes in V, and a family of edge-sets F = {S 1 , S 2 , … S k } that models the

failure events Each S i is a subset of E and corresponds a single failure event Specifically, each S i

contains the set of edges in the graph G that are affected by the failure For example, if S i corresponds to a

fiber cut in a WDM network, then S i will contain all the lightpaths on the logical topology that traverse

the fiber By assuming each S i to be arbitrary, we allow a very general framework to model different types

of failures

Let P be a path in the graph and let S i be an edge-set The path P hits the set S i if P contains an edge in S i Also, given a family of failure events F = {S 1 , S 2 , … S k }, two paths are F-disjoint if they do

not hit a common edge-set in F Given the above definitions, the disjoint path problem is formulated as finding a pair of F-disjoint paths between nodes s and t, given the input parameters

We note that this framework can easily capture the node-disjoint and edge-disjoint paths

problems, by defining F in different ways For example, if each S i in F contains exactly one edge in G such that each edge in the graph is represented by a set in F, the problem is reduced to finding a pair of edge-disjoint paths On the other hand, if each S i corresponds to a node v in the graph and contains all the edges adjacent to the node v, the problem is reduced to finding a pair of node-disjoint paths

Before we proceed, we first define some notions for the framework Most of these definitions are

extensions from classical graph theory, with the family of failure events F incorporated into the

notions

1 F-disjoint paths: As defined above, two paths are F-disjoint if they do not hit a common

edge-set in F.

2 F-biconnectivity: A graph G with a family of failure events F is F-biconnected if

removing any edge-set in F from the graph G does not disconnect G

Note that this generalizes the notions of node-biconnectivity and edge-biconnectivity in graph theory

graph disconnected Similarly, a family of edge-sets F = {S 1 , S 2 , … S k }

is a cut set if

F

S i

i

S is a cut set

disconnects s and t in the graph Similarly, a family of edge-sets F =

{S 1 , S 2 , … S k } is an s-t cut if

F

S i

i

S is an s-t cut

5 Minimal s-t Cut: A family of edge-sets F is a minimal s-t cut if it is an s-t cut and any

proper sub-family of F is not.

3 Related Work

The complexity of the disjoint path problem formulated in the previous section remains to be an open question To the best of our knowledge there is neither a proof of NP-completeness nor a polynomial

Trang 5

time algorithm that solves the problem In the paper of Bhandari [9] and subsequently the book written by the same author [11], the same problem presented in a different setting was tackled In [11], it was suggested that this general problem is very complicated and believed to be NP-complete However, a formal proof was not given As a result, in [11] an algorithm that enumerates all the feasible disjoint paths exhaustively was proposed In [11, 12], heuristic algorithms were presented

The problem of survivable routing of logical topologies, studied by Armitage et al [13] and Modiano et al [14], is closely related to our problem A survivable routing of a given logical topology is

an embedding (that is, a routing of every lightpmath on the logical network over the physical topology,)

of the logical topology over a given physical topology, so that a failure of any physical link does not

disconnect the logical network (we call this the connectivity requirement) In [13], the authors proposed

an algorithm minimizing the number of disconnected node pairs on the logical topology upon a single physical link failure In [14], the authors proved the necessary and sufficient condition for a routing to be survivable, and formulated the problem as an integer linear program, the solution of which represents a survivable routing of the logical network over the physical topology However, the connectivity requirement considered in the problem in [13, 14] only enables an alternate path to be discovered after a

failure occurs (known as restoration in the literature) For mission-critical services that require traffic

switch to the protection path instantaneously when a failure occurs, it is necessary to predetermine the protection path a priori, independent of the type of failure that may affect the working path, so that the end nodes can switch to the protection path without further path computation As we will show in the following section, the connectivity requirement is not sufficient to guarantee the existence of such a predetermined protection path In fact, a more stringent requirement on the logical network is needed We will state the requirement precisely in the following section

4 Some Graph Theoretic Results

Efficient algorithms for finding node-disjoint and edge-disjoint paths can be designed based on the famous Menger’s Theorem [19], a version of which states that a pair of node/edge-disjoint paths exist

between the node pair (s, t) if and only if removing any node/edge in the network does not disconnect the

nodes, that is, the node pair is node/edge-biconnected

It is tempting to generalize Menger’s Theorem to our framework and then apply the similar techniques used in existing algorithms for finding node/edge-disjoint paths A natural conjecture for the

generalized Menger’s Theorem would be that there exists a pair of F-disjoint paths between two nodes in the graph G if and only if the two nodes are F-biconnected This is not true, however, as illustrated in the Figure 4 In Figure 4, a connection request is to be established between s and t Consider the case where the family of failure events F is {{a, b}, {b, c}, {a, c}} Even though removing any of the edge-sets

from the graph does not disconnect the pair of nodes, it is impossible to find a pair of F disjoint paths connecting s and t, since any s-t path in the graph hits two of the three edge-sets Therefore, even if a

logical network remains connected upon a single failure, it cannot guarantee a predetermined protection path for the working path A more stringent condition on the logical network is required to provide such a guarantee

The necessary and sufficient condition for the existence of F-disjoint paths on a network is stated

in Theorem 1 Before we proceed, we assume that the family of edge-sets F is a cut set This assumption

is justified for the following reason: If F is not a cut set, then there is an s-t path in the graph that does not hit any of the edge-sets in F at all In other words, this particular path is not vulnerable to any failures,

and it is not necessary to find a protection path for it

Trang 6

a

b

c

Figure 4: A network with the failure event descriptions

Theorem 1

Given an undirected graph G=(V, E), a pair of nodes (s ,t) and a family F of subsets of E, there is a pair

of F-disjoint paths between s and t if and only if F can be partitioned into two non-empty sub-families F 1

and F 2 , such that none of them is an s-t cut

Proof

Suppose F can be partitioned into F 1 and F 2 such that none of them is an s-t cut Then we can find a pair of F-disjoint paths connecting the two nodes, in the following way: First, remove all the edges

in F 1 from the graph G Since F 1 does not cut s and t, there is a path between s and t in the resulting graph Let this path be P 1 By the way P 1 is constructed, it does not hit any set in F 1 Now we remove all the

edges in F 2 from G and let a path connecting s and t in the resulting graph be P 2 This path does not hit

any edge-set in F 2 As a result, P 1 and P 2 are F-disjoint

On the other hand, suppose there is a pair of F- disjoint paths between s and t, namely P 1 and

P 2 Let F 1 be the sub-family of edge-sets hit by P 1 and set F 2 = F \F 1 Then F 1 and F 2 form a partition of

F Also, note that both F 1 and F 2 are non-empty, since otherwise this would imply that F is not a cut set,

contradicting our assumption

Now we prove that none of F 1 and F 2 is an s-t cut First, by the way F 1 and F 2 are constructed, the

path P 1 does not hit any sets in F 2 Therefore, if all the edges in F 2 are removed from the graph, the path

P 1 still remains in the graph Therefore, F 2 is not an s-t cut In addition, since P 1 and P 2 are F-disjoint, P 2

does not hit any set in F 1 Therefore, the path P 2 will remain in the graph if all the edges in F 1 are

removed Therefore, F 1 is not an s-t cut either

From the proof of Theorem 1, once we find a partition for the family F, obtaining a pair of F-disjoint paths is straightforward This suggests a way of finding F-F-disjoint paths between a pair of nodes

In particular, the disjoint path problem is reduced to the problem of partitioning F into two non-cut

sub-families In the next section, this partitioning problem is reconsidered as an optimization problem, which will be formulated as an integer linear program

t

s

Failure Events Event 1 Event 2 Event 3

Trang 7

5 An Integer Linear Program Formulation

In the case where a pair of F-disjoint paths cannot be found in the network, it is still desirable to

find a pair of paths that are the least likely to be both affected by a single failure This can be formulated

as an optimization problem, where the objective function is the number of common failures that the two paths are vulnerable to If each failure event is given a certain weight that captures its likelihood, the objective would be to minimize the total weight of the common failures

Equivalently, we can reformulate the partitioning problem to achieve the same objective

Assuming each edge-set in the family F is weighted, the reformulated problem would be partitioning the family of edge-sets F into 3 sub-families F 1 , F 2 and F 3 , such that neither F 1 nor F 2 are cut sets The

objective is to minimize the total weight of the elements in F 3 The reasoning of the formulation can be

explained as follows If F 1 is not a cut set, then we can find a path P 1 in the graph without the edges in F 1

Potentially, P 1 may hit the sets in F 2 and F 3 Similarly, with the edges in F 2 removed from the graph, we

can find a path P 2 that potentially hits the sets only in F 1 and F 3 As a result, F 3 contains the edge-sets corresponding to failures that are potentially disruptive to both paths Therefore, the objective of

minimizing the weight of F 3 helps to reduce the likelihood that two paths are disrupted by a single failure

To formulate the partitioning problem as an integer linear program, we create 3 variables x i , y i , z i

for each edge-set S i in F These variables take the values of 0 or 1 indicating whether the set S i belongs to

partition F 1 , F 2 or F 3 Given that the weight of each set S i is w i, the integer program can be formulated as follows:

Min w i z i

s.t ≤| |−1

C

i

x minimal s-t cut C

1

|

C

C

i

y minimal s-t cut C

x i +y i +z i=1 ∀ S iF

x i , y i , z i∈{0, 1}

A solution given by the integer program determines how the family F should be partitioned If

x i =1, the edge-set S i belongs to F 1 If y i =1, the edge-set S i belongs to F 2 Similarly, if z i =1, the edge-set S i

belongs to F 3

In the integer program formulation, the first two sets of constraints make sure that neither F 1 nor

F 2 contains a minimal s-t cut This implies none of the sub-families F 1 and F 2 are s-t cuts The third constraint requires that each edge-set S i belong to exactly one of the three sub-families In other words,

the constraint ensures a partitioning of F The objective of the integer program is to minimize the total

Trang 8

weight of edge-sets in F 3 Therefore, by solving this ILP, we can find a pair of s-t paths that are the least

likely to be disrupted by a single failure

6 Conclusion and Future Work

We describe a framework for the general disjoint path problem The general framework allows us

to model arbitrary types of failure events by capturing them as input parameters We show that this generalization from the traditional node/edge-disjoint paths problem is non-trivial, and may make the disjoint path problem considerably harder We also prove a necessary and sufficient condition for the logical network under which a pair of disjoint paths can be found This necessary and sufficient condition

is useful in two ways: First, it helps us look at the problem in a different way and reduces the disjoint path problem to a set partitioning problem, for which an integer linear program is formulated Second, the necessary and sufficient condition describes a requirement for the design of a logical network that supports protection switching Such a requirement sets an important guideline for routing lightpaths on the physical network

There are a number of interesting problems related to our work First, design and performance study of heuristic or approximation algorithms for the disjoint path problem would be useful when solving the integer linear program is considered impractical Second, our work has only considered protection switching for a single connection on the logical topology A natural extension of the problem is

to consider multiple connections, in which case the capacity of the logical links would become an issue if they can be shared by several connections Finally, the survivable routing problem studied in [13, 14] can

be reconsidered, with the notion survivable routing defined differently Instead of routing the lightpaths such that the logical network remains connected upon a single link failure, lightpaths should be routed in

a way that satisfies the necessary and sufficient condition presented in this paper In that case, the logical network created is able to support protection switching

References

[1] R Doverspike and J Yates, “Challenges for MPLS in optical network restoration,” IEEE

Communications Magazine, vol 39, no 2, pp.89-96, February 2001

[2] S Ramamurthy and B Mukherjee, “Survivable WDM mesh networks, part I – protection,” in

Proceedings of IEEE INFOCOM ’99

[3] S Ramamurthy and B Mukherjee, “Survivable WDM mesh networks, part II – restoration,” in

Proceedings of the IEEE International Conference on Communications, 1999

[4] G Sahin and M Azizoglu, “Optical layer survivability: single service class case,” in Proceedings

of Opticomm 2000

[5] M Alanyali and E Ayanoglu, “Provisioning algorithms for WDM optical networks,” in

Proceedings of IEEE INFOCOM ’98

[6] S Lumetta and M Medard, “Towards a deeper understanding of link restoration algorithms for

mesh networks,” in Proceedings of IEEE INFOCOM ’01

[7] R Barry, S Finn and M Medard, “WDM loop-back in mesh networks,” in Proceedings of IEEE

INFOCOM ’99

[8] T Wu, Fiber Network Service Survivability, Artech House, 1992

Trang 9

[9] R Bhandari, “Optimal diverse routing in telecommunication fiber networks,” in Proceedings of

IEEE INFOCOM ’94

[10] R Bhandari, “Optimal physical diversity algorithms and survivable networks”, in Proceedings of

IEEE Symposium on Computers and Communication, 1997

[11] R Bhandari, Survivable Networks: Algorithms for Diverse Routing, Kluwer Academic Publishers,

1999

[12] S Shaikh, “Span-disjoint paths for physical diversity in networks,” in Proceedings of IEEE

Symposium on Computers and Communications, 1995

[13] J Armitage, O Crochat and J.-Y Le Boudec, “Design of a survivable WDM photonic network,” in

Proceedings of IEEE INFOCOM ’97

[14] E Modiano and A Narula-Tam, “Survivable routing of logical topologies in WDM networks,” in

Proceedings of IEEE INFOCOM ’01

[15] J Suurballe, “Disjoint paths in a network,” Networks, vol 4, 1974, pp 125-145

[16] J Suurballe and R Tarjan, “A quick method for finding shortest pairs of disjoint paths,” Networks,

vol 14, 1984, pp.325-336

[17] D Sidhu, R Nair and S Abdallah, “Finding disjoint paths in networks,” in Proceedings of the

conference on Communications architecture and protocols, SIGCOMM ’91

[18] R Ogier and N Shacham, “A distributed algorithm for finding shortest pairs of disjoint paths,” in

Proceedings of IEEE INFOCOM ’89

[19] R Diestel, Graph Theory, Springer-Verlag, 2000, pp.50-55

[20] R Ramaswami and K Sivarajan, Optical Networks: A Practical Perspective, Morgan Kaufmann

Publishers, 1998

[21] R Ramaswami and K Sivarajan, “Design of logical topologies for wavelength-routed optical

networks,” IEEE JSAC/JLT Special Issue on Optical Networks, vol 14, no 5, June 1996

Ngày đăng: 20/01/2014, 23:20

w