You are on page 1of 9

Protection in Elastic O ptical Networks

Roza Goscien, Krzysztof Walkowiak, Miroslaw Klinkowski, and Jacek Rak

Abstract
In this a rtic le , w e a n a ly z e g a in s resulting from the use of E O N arch itectu res with
s p e c ia l fo cus on tran sp o rtatio n of clo u d -re a d y an d content-oriented traffic in the
context of netw ork re silie n ce . E O N s a re a pro m ising a p p ro a c h for future o p tical
transport networks a n d , a p a rt from im proving the netw ork spectral efficie n cy, bring
such new ca p ab ilitie s a s squeezed protection, w h ich reduces resource requirements
in fa ilu re s c e n a rio s . In the in tro d u cto ry p a rt, w e present a b a ckg ro u n d on new
n etw ork s e rv ic e s b a se d on clo ud com puting an d content o rien tatio n p a ra d ig m s,
E O N arch itectu re s, an d their su rv iv ab ility m echanism s. N e xt, w e sh o w the im pact
of disasters on E O N perform ance. To support the discussio n, in the evaluation part
w e pro vid e sim ulation results to co m p are su rvivab le E O N s an d wavelength-sw itch-
ing o p tical n etw orks, estim ate the e fficie n cy of different su rv iv a b le E O N schem es
supporting cloud- an d content-oriented traffic, an d a sse ss the robustness of E O N s
to disasters.

s a benefit of the fast electronic signal processing and this technology. Also, we focus on large-scale disasters and
Silicon photonic integrated circuit technologies, opti­ examine the efficiency of different protection methods. We
cal networking has recently experienced significant advances present a case study with realistic data traffic models devel-
that have been governed by developments of spectrally effi- oped based on Cisco traffic predictions and using two repre-
cient modulation techniques and new functional optical com- sentative network topologies. Obtained results show that EON
ponents, as well as other developments. With the advent of significantly outperforms WSON for all analyzed protection
new networking capabilities and network services, it is broadly approaches. WSON requires much more resources compared
expected that optical transport networks will evolve from the to EON in terms of all considered performance metrics. Final-
current wavelength-switched optical network (WSON) archi- ly, the results show that even for relatively large-scale disasters
tectures built with wavelength-division multiplexing (WDM) (a circular area with radius up to 500 km), protection methods
technology toward elastic optical network (EON) architectures with link-disjoint paths provide good performance and protect
[1]. most demands (less than 7 percent of demands need resto-
Communication networks operate in unpredictable environ- ration).
ments, and are based on devices and media that are likely to
fail due to many causes including various disasters. Thus, it is N ew Services in Communication Networks
impossible to predict and eliminate all factors that can affect
connectivity in the network. Concurrently, the consequences Content-Oriented Networks
of network failures can become critical, especially when relat- The content-oriented network (CON) approach was recently
ed to backbone networks. Therefore, network resilience is an proposed to facilitate the distribution of various content over
indispensable part of analyzing existing and designing new the Internet to provide a network infrastructure service that is
networks. better suited to contemporary customer needs and more resil-
In this article, we show advantages of EONs in terms ient to disruptions and failures. The “Cisco Visual Networking
of resilience compared to WSONs for backbone networks Index” report predicts that content delivery networks (CDNs)
carrying standard unicast traffic as well as cloud traffic and will carry over 51 percent of Internet traffic in 2017 compared
content-oriented traffic. In particular, we compare both to 34 percent in 2012. Note that the idea of CON is also
approaches under different protection schemes including known under many other names including information-centric
dedicated path protection (DPP) and shared backup path networking, content-centric networking, content-aware net-
protection (SBPP) according to such performance metrics work, and so on [2].
as capital/operational expenditure (CAPEX/OPEX), power The general idea of the CON approach is to apply various
consumption, and spectrum usage. In addition, for EONs, we techniques and architectures including in-network caching,
analyze squeezed protection — a new approach available for multiparty communications through replication, and inter-
action models decoupling senders and receivers. However,
Roza Goscien and Krzysztof Walkowiak are with the Faculty o f Electron­ since the whole implementation of the CON concept requires
ics, Wroclaw University o f Technology. numerous new solutions and changes in existing networks, a
compromise solution currently used in the Internet is CDN,
Miroslaw Klinkowski is with the National Institute o f Telecommunica- defined as a large distributed system of dedicated data centers
tions. and servers placed strategically across the Internet provid-
ing replication of content, which ensures high availability and
Jacek Rak is with the Faculty o f Electronics, Telecommunications, and improves network resilience. Examples of popular CDNs are
Informatics, Gdansk University o f Technology. Akamai, Level3, and Limelight.

88 0890-8044/15/$25.00 © 2015 IEEE IEEE Network • November/December 2015


Cloud Computing accommodating ultra-high-capacity client signals within a com-
According to “Cisco Global Cloud Index” reports, global cloud mon network. The key elements of EON architectures, which
IP traffic will increase nearly 4.5-fold from 2012 to 2017 with should be gradually introduced in optical networks, are band-
a compounded annual growth rate (CAGR) of 35 percent. width-variable transponders (BV-Ts), bandwidth-variable
Moreover, by 2017, 63 percent of all workloads processed in wavelength cross-connects (BV-WXCs), and flexible frequency
data centers will be executed in the cloud. This unprecedented grids.
popularity of cloud computing has been triggered mostly by IT The role of BVTs is to adapt the client data signal to be
trends like [3]: sent to/received from the optical network with just enough
• The growing attractiveness of Internet streaming services frequency resources and according to transmission path char-
(e.g., video and game streaming) acteristics. Therefore, advanced modulation formats (e.g.,
• The emergence of the big data concept defined as a general phase shift keying, PSK, and quadrature amplitude modula­
idea to explain the exponential increase, availability, and tion, QAM) and transmission techniques, both single-carrier
use of information coming from different sources, for exam- and multi-carrier (e.g., optical orthogonal frequency-division
ple, social networking services (Facebook, Twitter, etc.), multiplexing, O-OFDM), are applied. Adaptation of the trans-
research units, state and local governments, companies, and mitted signal bandwidth/bit rate can be achieved by either
healthcare institutions adjustment of modulation levels or allocation of subcarri-
• The “dot-com boom” and parallel explosion of interest in ers. Concurrently, BV-WXCs allow an optical routing path
outsourcing of IT services through the network to be created by switching transmitted
• The popularity, maturity, and scalability of the present net- signals within their frequency bandwidth to appropriate switch
work infrastructure output ports. The International Telecommunication Union
• The advent of data centers established by companies such as — Telecommunication Standardization Sector (ITU-T) has
Google, Amazon, and Microsoft updated the G.694.1 recommendation and included the defi-
The two key elements of the cloud computing concept are an nition of a flexible WDM grid. Refer to [1, 6] for more details
easily accessible network and distributed computing resources. and proof-of-concept results concerning EONs.
Referring to these two factors, we can define three major types
of services provided in cloud computing systems: infrastructure Resilience in Elastic Optical Networks
as a service (IaaS), platform as a service (PaaS), and software In general, there are two main approaches for providing net-
as a service (SaaS). The last architecture seems to be the sim- work resilience: protection and restoration. Protection meth-
plest from the business perspective and the farthest ahead due ods are based on actions undertaken in the network design
to fast development of technologies that support web services phase and require reserving some redundant backup resources
and service-oriented architecture (SOA) [3-5]. like bandwidth for working connections. Thus, their applica-
A key element of cloud computing is virtualization, defined tion increases the CAPEX and OPEX cost of the network, but
as a set of techniques that abstracts the details of a physical provides quick recovery time. On the contrary, the restoration
element (e.g., hardware platform, storage device, or network process is applied when a failure occurs and aims to update
resources) and provides virtualized resources. Virtualization is routing rules in order to restore the required connectivity
usually implemented through the concept of a virtual machine in the network. Restoration does not reserve any redundant
(VM) that emulates a physical computing environment, which resources in advance, and therefore is more cost-efficient than
can easily be moved between host servers or data centers. This protection. However, the main disadvantage of restoration
migration capability allows sharing of computing resources mechanisms is long recovery time when compared to protec-
in data centers, which provides cost efficiency, elasticity, and tion mechanisms. Thus, the processing time is a crucial issue
resilience. If migration is made between various data cen- when planning and implementing restoration mechanisms
ters, the VMs and associated data must be sent (i.e., migrat- and algorithms. In this article, our main focus is on protection
ed) between data centers; next, all network traffic related to methods in EONs.
migrated systems is carried to/from a new data center. The In optical networks like EONs and WSONs, a very common
relatively easy migration mechanism allows for application of constraint is spectrum/wavelength continuity, in which a single
anycasting, defined as one-to-one-of-many transmission. Note lightpath established for a connection demand must occupy
that anycasting also appears in the context of CONs, where the same spectrum range (wavelength) on all the links includ-
the same content is available in multiple data centers, and the ed in the routing paths. This assumption follows from the fact
customers can be redirected to one of the sites according to that spectrum/wavelength converters are expensive, so using
criteria like cost, performance, and resilience [3-5]. spectrum/wavelength conversion significantly increases the net-
work cost. Accounting for the spectrum continuity constraint,
Elastic Optical Networks there are two basic protection methods considered in the liter-
ature for EONs: dedicated path protection (DPP) and shared
Evolution of Optical Transport Networks backup path protection (SBPP). In both methods, apart from
Nowadays, optical transport networks rely on WDM technol- provisioning a working (primary) lightpath for each connection
ogy and implement WSON architectures, enabling all-opti- demand, a backup (secondary) lightpath is pre-calculated.
cal transmission and switching of data streams of 10 Gb/s, 40 The main difference between DPP and SBPP follows from
Gb/s, and, recently, 100 Gb/s rates. Such networks operate the fact that SBPP allows spectrum resources to be shared
within rigid/fixed frequency grids and with single-line-rate between backup lightpaths belonging to different demands
transponders, making use of single-carrier modulation tech- under the condition that these resources can be used only
niques. Although WDM provides high transport capacities, the by one demand in a given failure scenario. On the contrary,
main drawbacks of current WSON architectures remain their backup lightpaths in DPP have their own dedicated spectrum
low spectral efficiency and lack of adaptability to heteroge- resources. By these means, SBPP brings spectrum and cost
neous bandwidth demands. savings compared to DPP. Moreover, there are two categories
The main innovation of EONs with respect to convention- of DPP schemes: 1 + 1 and 1:1. In the former method, the
al WSONs is the provisioning of sub-wavelength granularity signal (traffic) is permanently duplicated on both the work-
for low-rate transmission and super-channel connectivity for ing path and the backup path. The receiving node selects the

IEEE Network • November/December 2015 89


Figure 1. Protection methods for EONs: a) DPP; b) SBPP; c) squeezed DPP; d) squeezed SBPP.

signal with the highest quality. The 1+ 1 protection approach in Fig. 1 we present an example. We consider a simple six-
is very efficient in terms of recovery time but quite expensive node network with two demands: A to B and E to F. We
in terms of bandwidth usage. The 1:1 method in turn assumes assume that both spectrum segments assigned to the primary
that in failure-free conditions the signal (traffic) is transmitted and backup lightpaths are located around the same central
over the working path, which allows some extra traffic to be frequency. The former demand uses primary path A-B and
transported along the backup path in failure-free conditions. backup path A-C-D-B. The working path — according to the
When a failure occurs along the working path, the extra traffic bit rate of the demand and the selected modulation format
must be preempted from the backup path to enable switch- — needs four slices of spectrum assigned within a flexible fre­
ing the traffic affected by the failure onto the backup path. quency grid, for example, ITU-T Recommendation G.694.1,
Consequently, in comparison with the 1+ 1 technique, the 1:1 while the backup path (which is much longer) uses six slices
approach requires higher recovery time values [7]. due to using another modulation format. Demand E to F is
Additionally, in EONs for both methods (DPP and SBPP) allocated to primary path E-F and backup path E-C-D-F. Both
a special protection mechanism called bandwidth squeezing paths need four slices. For each link, we report the corre-
can be applied [8]. Bandwidth squeezing assumes that after a sponding slice occupancy. We can easily notice that the DPP
failure, only a part (e.g., 20 percent) of the primary (working) method consumes more spectrum compared to SBPP. This
flow is to be protected (or restored); for instance, it can con- follows directly from the possibility provided by SBPP to share
cern only high-priority traffic. Thus, less backup traffic is to be the spectrum along link C-D. In bandwidth squeezed scenari-
supported. As a repercussion, cheaper transponders with less os, we assume that backup paths of both demands carry lower
power consumption can be applied, and less spectrum resourc- bit rates compared to primary paths, and consequently, both
es (i.e., narrower channels) are necessary. That mechanism backup paths need only two slices of spectrum. This assump-
provides additional resource savings (in terms of all perfor­ tion provides additional savings in spectrum usage.
mance metrics), the amount of which depends on the part of Besides path-based protection schemes like DPP and SBPP,
the traffic to be protected. Note that bandwidth squeezed pro- link-based protection schemes, such as p-cycle and cooperative
tection, feasible in EONs due to the use of flexible frequency fast protection (CFP), can also be applied to protect the opti-
grids, is not available in fixed-grid WSONs. cal network. In link protection, the affected traffic is rerouted
The protection methods described above are designed to around the failed link. In general, path-based protection meth-
protect the network against a specific type of failure, which ods typically use less capacity than link-based protection, since
influences the process of selecting backup lightpaths. Most under link protection, the backup paths are commonly longer
commonly, these methods protect only against single link fail- than with path protection [7]. Moreover, p-cycle and CFP
ures. Two link-disjoint routing paths are thus selected for the approaches in the basic form are formulated for networks with
primary and backup lightpaths. spectrum/wavelength conversion possibility. Therefore, the
To illustrate the EON protection methods described above, applicability of these methods is significantly limited in a case

90 IEEE Network • November/December 2015


when spectrum/wavelength continuity constraint is imposed,
which is a very common assumption in optical networks. More
specifically, after a failure, the part of a broken lightpath (e.g.,
a failed link) is omitted by a new routing path (e.g., using a
p-cycle), but the same spectrum range must be used as in the
unchanged parts of the working path. Consequently, p-cycles
(or other protection structures) must be reserved for a par­
ticular spectrum range, which complicates the network design
process. To avoid spectrum overlapping, finding backup light-
paths bypassing the failed link (but using the same spectrum
range as the working paths) may significantly increase the
overall transmission distance of a backup path for a particular
lightpath. As a consequence, either a less efficient modulation
format must be used for the backup path, or additional equip-
ment like transponders or regenerators are required to pro-
vision the lightpath with an efficient modulation format. The
former case will increase spectrum requirements, while the
latter will lead to an increase of the network cost and power
consumption. Therefore, in this article we focus only on path-
based protection schemes like DPP and SBPP.
(a)

Disasters in Backbone Networks Seattl


Disaster events can strike the backbone networks at any time,
anywhere. Although by definition they are considered rare,
their occurrence is inevitable, and their risk is rising. Another
important observation is that their negative effects, always con-
sidered significant, cannot be precisely evaluated in advance.
San Francis*
Instead, vulnerability of network nodes/links to disaster-based
Los Angel
failures can only be based on probability analysis depending
on, for example, the distance of the network element from the
event epicenter, the area topography, as well as the character-
istics of a network element itself (also comprising its physical
protection features, such as location of the element in the
building) [9].
Disasters in communication networks are frequently the (b)

result of natural factors, including hurricanes, tsunamis, floods,


earthquakes, solar flares, or even meteor collisions [9, 10]. Figure 2 .Network topologies, locations of data centers, and
Every year, we observe tens of hurricanes worldwide, often interconnection points: a) Euro28; b) US26.
leading to power outages disrupting communications on a
massive scale for a relatively long time (i.e., 10 days on aver-
age). Examples include Hurricane Katrina, which caused vice models. The protection approaches discussed in previ-
severe losses in Louisiana and Mississippi in the southeastern ous sections for both EON and WSON optical architectures
United States in August 2005 [10]. Earthquakes can bring are compared for two representative network topologies: a
about even greater destruction to communication networks pan-European network and a U.S. long-haul network (called
due to the long time of manual repair actions. For instance the Euro28 and US26 in the article, accordingly), shown in Fig. 2.
earthquake of 7.1 magnitude in December 2006 in southern Traffic patterns were generated according to Cisco predictions.
Taiwan resulted in simultaneous failures of seven submarine As the optimization method, we applied an algorithm similar
links providing Internet connectivity between Asia and North to the one from [11] modified according to the examined pro-
America, which visibly affected the international communica- tection methods.
tions to China, Taiwan, Hong Kong, Korea, and Japan [10].
Another example is the Greatest Japan Earthquake on March Optical Architecture Assumptions
11, 2011 (of 9.0 magnitude), which caused widespread damage We used similar optical architecture assumptions as in [12].
to undersea cables, as well as completely or partially destroyed In particular, for EONs we assumed BV-Ts implementing the
telecom switching offices. polarization-division multiplexing (PDM)-OFDM technology
Other reasons for disasters in communication networks with multiple modulation formats selected adaptively between
include intentional human activities, such as bombing or binary phase shift keying (BPSK), quadrature PSK (QPSK),
weapons of mass destruction attacks. Finally, disasters may and x-quadrature amplitude modulation (QAM), where x
also occur as a result of technological issues (e.g., the North- belongs to {8, 16, 32, 64}. Here, the spectral efficiency was
east Power Grid Blackout in the United States) or malicious equal to 1, 2, ..., 6 b/s/Hz, respectively, for these modulation
actions, such as electromagnetic pulse (EMP) attacks with formats. PDM allows the spectral efficiency to be doubled.
intense energy fields, disrupting nodes and links in a specific The BV-T can combine a required (i.e., not fixed) number of
geographic area. contiguous subcarriers, each one occupying 12.5 GHz, modu-
lated with the same format and allocated to serve at a given
Case Studies bit rate. For instance, a 50 Gb/s demand can be carried by a
To study potential advantages of EONs in the context of 100 Gb/s PDM-capable transponder using one subcarrier and
resilience in cloud-ready and content-oriented networks, we QPSK modulation. EON operates within a flexible ITU-T
present a case study with real network topologies and ser- grid of 6.25 GHz granularity. Two types of BV-Ts were used,

IEEE Network • November/December 2015 91


□ WSON_NP □ WSON_SBPP □ WSON_DPP □ WSON_NP □ WSON_SBPP □ WSON_DPP
□ EON NP m EON SBPP □ EON DPP □ EON NP m EON SBPP □ EON DPP

(a) (b)
□ WSON_NP □ WSON_SBPP □ WSON_DPP □ WSON_NP □ WSON_SBPP □ WSON_DPP
□ EON_NP ■ EON_SBPP □ EON_DPP □ EON NP ■ EON SBPP □ EON DPP
^ 1200
â 1050
I 900
o. 750
Ito 600
§ 450
^ 300
ã 150
£ 0

□ WSON_NP □ WSON_SBPP □ WSON_DPP O WSON_NP □ WSON_SBPP □ WSON_DPP


□ EON NP ■ EON SBPP □ EON DPP □ EON NP ■ EON SBPP □ EON DPP
16.0
14.0
£12.0
—10.0
| 8.0
(v
6.0
4.0
2.0
0.0

Figure 3 . Comparison of EON and WSON performance for various protection methods: a-b) cost for Euro28 and US26;
c-d) power consumption for Euro28 and US26; e-f) spectrum usage for Euro28 and US26.

each characterized by a different capacity limit (i.e., 100 Gb/s tion of regenerators are 1.6 and 1.2 times higher, respectively
and 400 Gb/s, respectively). We made use of the transmission [12]. Lastly, the spectrum usage was calculated according to
model presented in [13] to estimate the transmission reach of the width of spectrum in terahertz required in the network to
an optical signal as a function of the selected modulation level serve all demands.
and bit rate. We introduced a 12.5 GHz guard band between
neighboring connections. In the case of WSON, we assumed Simulation Setup
that the network operated within the fixed 50 GHz ITU-T In Fig. 2, we show for each network location of nine data cen-
grid with fixed 100 Gb/s transponders and transmission reach ters and three interconnection points used to forward interna-
equal to 2100 km. In all analyzed scenarios, we assumed that tional traffic to other networks (e.g., locations of submarine
the transmission reach is extended by means of regenerators, cable landing stations). Locations of both data centers and
which were applied whenever necessary. interconnection points were selected according to data avail-
In this section, we show analysis of three performance met- able at http://www.datacentermap.com/.
rics: CAPEX/OPEX cost, power consumption, and spectrum The traffic model was created for a period of six subsequent
usage. Cost included the CAPEX cost of equipment (tran- years starting from 2014 under the forecast of Cisco shown in
sponders, regenerators) and one-year OPEX cost according the “Cisco Visual Networking Index” and “Cisco Global Cloud
to fiber leasing (e.g., as in [14]). Regenerators, if used, were Index” reports. The data included in the reports was used to
dedicated to lightpaths and not shared between different con- obtain values of compound annual growth rate (CAGR) to
nections. All cost results are given in Euros in terms of the create the traffic matrix including service demands of four types:
current prices including inflation. Following [14], the uniform • City — City (CC) traffic representing all non-data center
cost of transponders is equal to 3.75 and 5.5, respectively, for traffic (CAGR 18 percent);
100 (in WSON and EON) and 400 Gb/s (in EON). The power • City — Data Center (CD) traffic representing all data-cen-
consumption denotes the sum of energy requirements of all ter-to-user traffic (CAGR 31 percent);
transponders and regenerators. The power consumption of the • Data Center — Data Center (DD) traffic (CAGR 32 per-
100 Gb/s WDM transponder is fixed and equal to 215 W. The cent);
power consumption of a BV-T depends on both the number • International (IN) traffic — all traffic leaving/entering the
of subscribers and the modulation format used. It is calculated particular network calculated as a percentage of all network
using the same model as in [12]. The costs and power cosum- traffic.

92 IEEE Network • November/December 2015


Figure 4 . EON squeezed protection versus WSON as a function of squeezing factor SQ for year 2019: a) Euro28; b) US26.

The ratio of each traffic type in the overall traffic was calcu- section only the DPP approach was considered. We simulated
lated according to Cisco reports with an additional assump- various squeezing parameters (SQ) in the range from 10 per­
tion that the ratio of international traffic was 20 percent and cent up to 90 percent. For instance, SQ = 20 percent means
10 percent of the overall traffic for Euro28 and US26 net- that only 20 percent of the primary path traffic (bit-rate) was
works, respectively. We assumed that in the first year (2014), to be protected by the backup path.
the overall traffic was 15 Tb/s and 20 Tb/s for Euro28 and In Fig. 4, we show the relative performance of squeezed
US26 networks, respectively. Next, in subsequent years the protection for different values of SQ param eter and EON
traffic grew according to the CAGR growth for each partic­ DPP in relation to WSON DPP results. Presented results
ular type of traffic. Traffic demands were generated analo- refer to the traffic m atrix for year 2019 and nine data
gously as in [11] using a multivariable gravity model with real centers located in each network. For each traffic pat-
data related to population of the region served by the network tern, we obtained the value of the considered p e rfo r­
node, geographical distance between cities, and economy level mance m etric of a particular squeezed scenario (e.g.,
expressed by gross domestic product (GDP). Note that we COST_SQ), as well as the corresponding value yielded
applied anycast approach to provision CD traffic, while other using WSON (COST_WSON), and calculated the relative
types of demands (i.e., CC, DD, and IN) were served by uni- perform ance as a quotient C o ST_SQ / COST_WSON.
cast demands. For instance, the value of 40 percent means that the par­
ticular squeezing scenario required only 40 percent of
EO N vs. W S O N resources needed for the WSON DPP m ethod and thus
In the beginning, we compared EON and WSON with regard provided 60 percent savings.
to the performance of DPP and SBPP protection schemes. In We can see that for both networks, bandwidth squeez-
more detail, each tested traffic matrix, related to the case with ing reduces resources requirements. The largest gains are
nine data centers and years 2014-2019, was allocated in the observed for the power consumption. This can be explained by
network (either EON or WSON) according to the selected our power consumption model, in which power consumption
protection method. To show the additional costs of introduc- of BVTs depends on the number of used subscribers. Since
ing the protection, here we also report the “no protection” in the traffic pattern there are many demands with relative-
(NP) case, which corresponds to an unprotected network. As ly small bit-rate requirements, it is more power-efficient to
a failure scenario, we considered a single link failure implying use BVTs than the WDM transponders of fixed power con-
link-disjointness of the corresponding primary and backup sumption. However, with subsequent years the gap between
paths. WSONs and EONs decreases due to the growing bit-rate of
In Fig. 3, we present all investigated performance met- demands.
rics (i.e., network cost, power consumption, and spectrum In Fig. 5, we rep o rt cost, power consum ption, and
usage) of both EON and WSON with different protection spectrum usage for three evaluated squeezed protection
techniques. We can easily notice that EON significantly out- scenarios (SQ = 10 percent, SQ = 30 percent, SQ = 50
performs WSON for all reported performance metrics and percent) and pure DPP (SQ = 100 percent). The main
analyzed protection approaches. On average, WSON requires observation is that for subsequent years, the benefits fol-
about 65 percent more resources in terms of cost and spec- lowing from using the squeezed protection increase in
trum and about 250 percent more resources in terms of power com parison to the pure DPP approach. For US26 net-
consumption, when compared to EON. A detailed analysis of work and year 2019, the SQ = 10 percent approach pro-
the EON performance in terms of the examined protection vides gains of 14 percent, 45 percent and 23 percent, over
methods shows that for cost and power consumption, SBPP the respective results of DPP scheme referring to cost,
and DPP provide similar results (being about 130 percent power consumption, and spectrum usage metrics, accord-
higher, compared to the network without protection). In terms ingly. The corresponding values obtained for the Euro28
of the spectrum usage, we can observe significant differenc- network are very similar. The largest gains observed for
es between SBPP and DPP (80 percent versus 180 percent the power consumption function can be explained in the
increase of the spectrum usage, compared to the “no protec- same way as above.
tion” case). This dependency clearly follows from the fact that Note, that the less is the value of the SQ parameter, the
SBPP enables spectrum sharing. Finally, we point out that for bigger are resource savings, but at the same time, less traffic
subsequent years, all performance metrics grow due to larger is protected in case of a failure. Similarly, the bigger SQ value,
traffic volumes. the more data is protected, but the less resource savings can
be obtained. Therefore, squeezed protection is a compromise
Squeezed Protection between the amount of additional resources and the data that
In this section, we focus on the performance of squeezed pro- is protected in case of a failure. As a consequence, squeezed
tection. Recall that squeezed protection can be applied only in protection is a good approach if only a part of primary traffic
EONs for both DPP and SBPP approaches. However, in this flows is to be protected.

IEEE Network • November/December 2015 93


|□ SQ = 10% □ SQ = 30% □ SQ = 50% □ DPP | |□ SQ = 10% □ SQ = 30% □ SQ = 50% □ DPP |

| □ SQ = 10% □ SQ = 30% □ SQ = 50% □ DPP | | □ SQ = 10% □ SQ = 30% □ SQ = 50% □ DPP |

| □ SQ = 10% □ SQ = 30% □ SQ = 50% □ DPP | | □ SQ = 10% □ SQ = 30% □ SQ = 50% □ DPP |

(f)

Figure 5 . EON squeezed protection for various squeezing parameters in comparison to pure DPP: a-b) cost for Euro28 and US26;
c-d) power consumption for Euro28 and US26; e-f) spectrum usage for Euro28 and US26.

Large-Scale Disasters
checked the effect of a particular disaster on each demand and
The last part of simulations refers to large-scale disasters. reported the percentage distribution of four categories:
According to [15], many large-scale disasters and other • Released demands: At least one of the end nodes of a
network challenges can be modeled as a circle centered at demand is broken; thus, the demand cannot be restored and
specified geographical coordinates with radius r. Note that is released from the network.
large-scale disasters can be also modeled using some other • No path affected: Both primary and backup paths of a
figures like line or irregular polygon [15]. However, the line demand operate after the failure.
model in many cases causes only a single link failure and recall • One path affected: Either the primary or backup path of a
that this type of a failure scenario was concerned in previous demand is cut by the failure.
sections. Results for the polygon model in our opinion would • Both paths affected: Both primary or backup paths of the
follow the general trends observed in the context of the circle demand are broken due to the failure.
model. Therefore, performance evaluation is confined in this Notice that only in the last case, the DPP approach with
section to circular disaster regions (CDRs) only. link-disjoint paths does not protect the demand, and conse-
We examined CDRs of various sizes scaling the radius from quently restoration is required to provide the uninterrupted
50 km up to 500 km with a step of 50 km. For each size of the service. The results show that even for radius of 500 km, the
radius, 1000 CDRs were generated with location of CDR cen- percentage of lightpaths that require restoration is relatively
ters determined using the uniform distribution function. In Fig. small (6.73 percent for the Euro28 network and 4.70 percent
6, we report the average results for both analyzed topologies. for the US26 network accordingly). Consequently, the DPP
Results for link failures are presented first in Figs. 6a and b method experiences good performance even for large-scale
showing the percentage distribution of three categories: disasters. Note that in the case of SBPP, the results are com-
• No link failure: No link is covered by the disaster. parable to DPP.
• Single link failure: Only one link is broken.
• Multiple link failure: More than one link is broken).
Similarly, in Figs. 6c and d we report characteristics referring
Conclusions
to node failures. Finally, the last two graphs (Figs 6e and f) We have analyzed the main advantages of optical transport
present the influence of the disaster on EON demands (light- networks implementing the elastic optical network technology
paths). In more detail, all demands included in the traffic in the context of network resilience. Apart from discussing the
matrix for 2019 and with nine data centers were established main features of EONs, we have focused on new network ser-
in the network with DPP protection. Next, for each CDR we vices, including cloud computing and content-oriented applica-

94 IEEE Network • November/December 2015


I No link failure O Single link failure ■ Multiple link failure No link failure O Single link failure ■ Multiple link failure

50 100 150 200 250 300 350 400 450 500 50 100 150 200 250 300 350 400 450 500
Radius (km) Radius (km)
(a) (a)

IN o node failure O Single node failure ■ Multiple node failure No node failure O Single node failure ■ Multiple node failure

50 100 150 200 250 300 350 400 450 500 50 100 150 200 250 300 350 400 450 500
Radius (km) Radius (km)
(c) (d)

Released demands □ No path affected I Released demands □ No path affected


One path affected □ Both paths affected I One path affected □ Both paths affected
100% 100%
90% • 90%
80% • 80%
70% • 70%
60% • 60%
50% • 50%
40% • 40%
30% • 30%
20%
10%
0%

50 100 150 200 250 300 350 400 450 500


20%
10%
0%
50 100 150 200
d□□□□d
250 300 350 400 450 500
Radius (km) Radius (km)
(e) (f)

Figure 6 . Impact of large-scale disasters — network performance as a function of circular disaster region radius: a-b) link failures
for Euro28 and US26; c-d) node failures for Euro28 and US26; e-f) demand failures for Euro28 and US26.

tions that introduce new challenges in network planning and even for relatively large disaster areas (circles with radius up
dimensioning. Also, we have briefly discussed the potential to 500 km).
impact of disasters on optical network performance. To verify
the quality and performance of various protection methods Acknowledgments
in EONs, we have considered a case study with realistic data The work of Roza Goscien, Miroslaw Klinkowski and Krzysz-
traffic models built on Cisco traffic predictions and two repre- tof Walkowiak was supported by the Polish National Science
sentative network topologies. Centre (NCN) under Grant DEC-2012/07/B/ST7/01215. In
The results clearly show that the EON concept significant- addition, the work of Miroslaw Klinkowski was supported in
ly outperforms conventional WDM networks in the context part by the FP7 project IDEALIST (Grant Agreement no.
of network resilience in cloud-ready and content-oriented 317999), while the work of Jacek Rak was supported in part by
networks. For all analyzed performance metrics (CAPEX/ Grant P0KL04.03.00-00-238/12. This research was supported
OPEX cost, power consumption, and spectrum usage), WDM in part by PL-Grid infrastructure. The authors are grateful to
needs much more resources compared to EON. Regarding Wroclaw Networking and Supercomputing Center for granting
the resource overhead related to the path protection provi- access to the computing infrastructure being the outcome of
sioning in EONs, the protected network is about 130 percent the project no. P0IG.02.03.00-00-028/08 “PLATON - Science
more costly and power-demanding than the unprotected net- Services Platform.”
work, wherein the additional spectrum usage strongly depends
on the applied protection method. In particular, there is a References
need for up to 180 percent and only 80 percent more spectrum [1] M. Jinno et al., "Spectrum-Efficient and Scalable Elastic Optical Path Net­
resources, respectively, if DPP and SBPP protection schemes Work: Architecture, Benefits, and Enabling Technologies," IEEE Commun.
are used. Besides, squeezed protection allows significant redu- M a g ., vol. 4 7 , no. 11, 2 0 0 9 , pp. 6 6 -7 3 .
cuction of the need for additional resources, but at the cost of [2] B. Ahlgren et al., "A Survey of Information-Centric Networking," IEEE Com­
mun. M a g ., vol. 5 0 , no. 7 , 2 0 1 2 , pp. 2 6 -3 6 .
protecting only a fraction of traffic. Eventually, in the analysis [3] W . Venters and E. A . W hitley, "A Critical Review of Cloud Computing:
of large-scale disasters, the DPP method with link-disjoint Researching Desires and Realities," J. Info. Tech., vol. 2 7 , no. 3, 2 0 1 2 ,
paths provides good performance and protects most demands pp. 179-97.

95 IEEE Network • November/December 2015


[4] C . Develder et a l., "O ptical Networks for G rid and Cloud Computing
Applications," Proc. IEEE, vol. 100, no. 5 , 2 0 1 2 , pp. 1 1 49-67.
Biographies
[5] M. Klinkowski and K. W alkow iak, "On Advantages of Elastic Optical Net­ RO ZA G o s c i e n received a B .Sc. degree in engineering in teleinformatics in
works for Provisioning of Cloud Computing Traffic," IEEE Network, vol. 27, 2 0 1 2 and an M .Sc. degree with distinction in 2 0 1 3 from W ro claw Univer-
no. 6, 2 0 1 3 , pp. 4 4 -5 1 . sity of Technology, Poland. She was recognized as the best faculty graduate
[6] F. Cugini et a l., "Demonstration of Flexible O ptical Network Based on by the Rector of W roclaw University of Technology. She is currently a Ph.D.
Path Computation Element," IEE E /O SA J. Lightwave Tech., vol. 3 0 , no. 5, student at the same university. Her current research interests are primarily in
2 0 1 2 , pp. 7 2 7 -3 3 . the areas of network modeling, dimensioning, and optimization with special
[7] J. Vasseur, M. Pickavet, and P. Demeester, "Network Recovery: Protec­ regard to elastic optical networks.
tion and Restoration of O p tical, SO N ET-SD H , IP and M PLS," Morgan
Kaufmann, 2004. K RZYSZTOF W ALKOW IAK received his Ph.D. and D.Sc. (habilitation) degrees in
[8] Y. Sone et al., "Bandwidth Squeezed Restoration in Spectrum-Slices Elastic computer science from W roclaw University of Technology in 2 0 0 0 and 2 0 0 8 ,
Optical Path Networks (SLICE)," IEE E /O SA J. O ptical Commun. N et., vol. respectively. Currently, he serves as an associate professor at the Department
3, no. 3, 2 0 1 1 , pp. 2 2 3 -3 3 . of Systems and Computer Networks, W ro claw University of Technology. He
[9] P. K. A garw al et al., "The Resilience of W D M Networks to Probabilistic received the Best Paper A w ard at DrCN 2 0 0 9 and RNDM 2 0 1 5 , and the
Geographical Failures," IEEE/A C M Trans. Net., vol. 2 1 , no. 5 , 2 0 1 3 , pp. Fabio Neri Best Paper Award 2 0 1 4 . He has published more than 2 00 scientif-
1 5 2 5-38. ic papers in international conferences and journals.
[10] J. P. G . Sterbenz et al., "Resilience and Survivability in Communication
Networks: Strategies, Principles, and Survey of Disciplines," Computer Net- M lROSLAW K LINKOWSKI is an associate professor at the Department of Transmis-
works, Elsevier, vol. 5 4 , no. 8, 20 1 0 , pp. 1 2 4 5-65. sion and Optical Technologies at the National Institute of Telecommunications,
[11] K. W a lkow iak and M. Klinkowski, "Joint Anycast and Unicast Routing Poland. He received his Ph.D. degree (2008) from Universitat Politecnica de
for Elastic Optical Networks: Modeling and Optimization," Proc. IEEE ICC Catalunya, Spain, and his D .Sc. (habilitation) degree (2013) from W a rsaw
2 0 1 3 , 2 0 1 3 , pp. 3 9 0 9 -1 4 . University of Technology, Poland. He has co-authored several book chapters
[12] R. Goscien, K. W alkow iak, and M. Klinkowski, "Distance-Adaptive Trans- and over 120 papers presented in leading journals and conference proceed-
mission in Cloud-Ready Elastic Optical Networks," IE E E /O S A J. Optical ings. His research interests concentrate on algorithm design, modeling, and
Commun. N et., vol. 6, no. 10, 2 0 1 4 , pp. 8 1 6 -2 8 . optimization in communication networks.
[13] C . Politi et a l., "Dynam ic Operation of Flexi-Grid OFDM-Based Net­
works," Proc. O FC 2 0 1 2 , 2 0 1 2 , pp. 1-3. J ACEK RAK (SM IEEE'13) is an assistant professor at Gdansk University of Tech-
[14] E. Palkopoulou et al., "Quantifying Spectrum, Cost, and Energy Efficiency nology (GUT). He received his Ph.D. degree from GUT in 2 0 0 9 . He has been
in Fixed-Grid and Flex-Grid Networks," IE E E / O S A J. O ptical Commun. involved in numerous research projects related to network resilience, served as
N et., vol. 4 , no. 11, 2 0 1 2 , pp. B 42-B51. a member of Steering Committees/TPCs of conferences, and as a Guest Editor
[15] E. Cetinkaya et al., "Modelling Communication Network Challenges for of journals. He is also Vice Chair of IFIP TC6 W G 6 .1 0 , and the founder and
Future Internet Resilience, Survivability, and Disruption Tolerance: A Simula- General Chair of the International Workshop on Reliable Networks Design and
tion-Based Approach," Telecommun. Sys., Springer, vol. 5 2 , no. 2, 20 1 3 , Modeling.
pp. 7 5 1 -6 6 .

96 IEEE Network • November/December 2015

You might also like