Professional Documents
Culture Documents
SPIEDigitalLibrary.org/conference-proceedings-of-spie
Meiling Pan, Yang Qiu, "Leaf-looping based multicast protection algorithm for
elastic optical network," Proc. SPIE 11435, 2019 International Conference on
Optical Instruments and Technology: Optical Communication and Optical
Signal Processing, 1143504 (12 March 2020); doi: 10.1117/12.2541004
ABSTRACT
Nowadays, with the increasing complexity of network structure and the application of diverse kinds of services, some
problems, such as multicast-enabled routing, spectrum allocation and traffic protection, have become complicated in
elastic optical networks (EONs). Since the transmission failure in EONs may lead to traffic interruption and thus causes
serious economic loss, their ability to provide different modes of transmission, including unicast and multicast
transmissions, with survivability is highly desirable. In this paper, aiming at improving the service blocking performance
in realizing efficient protection for multicast services in EONs, we propose a leaf-looping based multicast protection
algorithm, namely Multicast Protection with Leaf Loops (MPLL), which divides the destination nodes of multicast
services into several groups according to their distance and constructs one loop for each group to provide protection for
each destination node in the group. In constructing each destination loop, the shortest path algorithm is employed to
minimize the cost of each generated loop. Besides, distance-adaptive spectrum allocation strategy is adopted for resource
assignment to reduce the spectrum consumption in the proposed algorithm. In the research of protection technology,
traditional P-cycle technology is an efficient optical network protection strategy, which has the characteristics of fast
loop recovery speed and effective network recovery capacity. However, the P-cycle protection technology is
pre-computed, which cannot meet the requirements of dynamic recovery. The leaf loops proposed in this paper are
generated dynamically according to the destination nodes generated by each service, and can meet the dynamic business
requirements. In addition, under the same blocking conditions, MPLL saves more path resources than P-cycle based
algorithms in the protection path. Simulation results show that the proposed MPLL algorithm can realize multicast
protection for EONs with low service blocking probability and high flexibility.
key words:Elastic optical network; multicast; service blocking rate; protection
1. INTRODUCTION
The advent of the technology era has promoted the development of Internet technology, but also brought challenges to
the transmission and survivability of the network. The fixed bandwidth model adopted by traditional wavelength division
multiplexing technology has been difficultly to meet the current growing network data traffic. In order to meet the needs
of network development, Elastic Optical Network (EON) carries services by dividing network resources into smaller
granularities, changing the modulation format according to the transmission distance of services [1]. Multicast technology
is a point-to-multipoint high-efficiency data transmission technology. When achieving one-to-many data transmission,
multiple data channels must be established separately, which will waste a large amount of bandwidth resources in the
unicast mode. Multicast transmission is the establishment of a set of multicast trees in the network [2]. At this point, data
transmission to all destination nodes can be achieved only by copying and forwarding one packet at the fork, which
greatly saves bandwidth resources. Network disruptions can be disconnected due to natural disasters and human factors,
such as equipment failures and cable failures,which will cause serious economic losses because of huge amount of
optical network traffic. Therefore, no matter which generation of optical network, protection technology is very
important. Compared with the traditional WDM network, the multicast protection technology in the elastic optical
network is more restricted [3]. And the protection algorithm of the multicast routing is getting more and more attention of
researchers.
The protection strategy of EON is to pre-configure the service before the failure occurs, and the resources are not
2019 International Conference on Optical Instruments and Technology: Optical Communication and Optical
Signal Processing, edited by Jian Chen, Yi Dong, Fabien Bretenaker, Proc. of SPIE Vol. 11435,
1143504 · © 2020 SPIE · CCC code: 0277-786X/20/$21 · doi: 10.1117/12.2541004
We assume that the composition of the elastic optical network is G(V, E, B, L), where V is the set of nodes and E is the
set of directed links. Each fiber link may accommodate B frequency slots at most, with L=[l(1),l(2),...,l(E)] representing
link lengths for each e ∈ E. We also represent a multicast requests by R = (s, D,N), where s is the source node and D =
(d1, d2, d3...) is a set of destination nodes generated randomly, and N represents the number of nodes. Here, each node in
the network has the ability of multicast capable (MC). When the network generates multicast requests, the multicast tree
is constructed from the source node to all the destination nodes. The spectrum allocation is carried out under the three
constraints: spectrum continuity, spectrum consistency and spectrum connectivity constraints[12]. In elastic optical
networks, the RSA problem has been proved to be a NP hard problem[13]-[15].
In this subsection,we propose a new multicast protection algorithm. In the protection scheme based on leaf loops, MPLL
divides the destination nodes of multicast services into several groups according to their distance and constructs one loop
for each group to provide protection for each destination node in the group. When a multicast request arrives, the number
of loops is determined based on the number of destination nodes generated. We discuss two cases in this algorithm. One
case is that when the number of multicast destination nodes is small, the algorithm will only form a loop.Another case is
when the number of multicast destination nodes is large, the algorithm will construct two or even more loops. Figure 1
illustrates the MPLL scheme that we consider in this paper based on the above basic concepts. We assume that node a in
the graph is the source node. In this case, we suppose the number of destination nodes is 2 or 3, and the multicast
requests generated are assumed to be R={s, D(d1,d2,d3...)}={a,D(c,d)}. It will form a loop between destination
nodes.The loop of this algorithm is based on the shortest path, so the shortest leaf loop in the graph is h→c→d→h.
Figure 1(b) shows the two loops. When the number of destination nodes is four or more, it forms two loops. Here,
suppose the given multicast requests is R={s, D(d1,d2,d3...)}={a,D(c,d,f,g)}. According to the shortest distance of the
loop, the route of the first leaf loop is h→c→d→h and another route is h→f→g→h. As for the non-loop part, For example,
a →h in figure 1(c), we prepare another backup path a→g→h.
(c) (d)
Figure 1. Protection in different situations. (a) with one loop, (b) with two loops, (c) with no loop, (d) DDP algorithm
After the request arrives, we first check whether there are appropriate spectrum blocks on several candidate working
paths. Then we check the resource allocation of the protection path. Table 1 shows the details of the proposed algorithm.
We will compare MPLL algorithm with the Dedicated Path Protection algorithm (DDP). In DPP algorithm,each
3. SIMULATION RESULTS
In this paper, the performance of the proposed algorithm is analyzed by simulating the NSFNET network with 14 nodes
and 22 edges. There are 320 frequency slots per fiber in the network, and the bandwidth of each frequency slot is 12.5
GHz. The source node and destination nodes of the service request obey the uniform distribution, the arrival of the
service request obeys the Poisson distribution of the parameter λ, and the service duration obeys the exponential
distribution of the parameter 1/µ. The service size in the network is generated from {100,150,300}. Adaptive
distance-modulation technique is employed in this simulation with the candidate modulation formats as BPSK, QPSK,
8QAM and 16QAM. In the simulation, the number of candidates for multicast tree is three.
3.2 Simulation result
The main purpose of this simulation is to compare the performance of different protection algorithms. We use blocking
rate as the main index to evaluate the performance of the algorithm. At the same time, we define a index, Spectrum
Alignment Rate (SAR), to measure the spectrum alignment after service accommodation. If the frequency gap state at the
same location in all links is the same, it is counted. In the formula, we count the available alignment spectrum number as
variable An, and set the total spectrum number as variable Tn. The mathematical expression is expressed as follows:
(1)
The graphs show the results of bandwidth blocking rate and available alignment spectrum under different traffic loads.
As we can observe from figure 3, when the traffic load is low, the performance of both algorithms is better and the
blocking rate of both algorithms is relatively low. However, in order to achieve the protection function, BBP will
increase rapidly with the increase of traffic load. DPP algorithm provides 1+1 protection and uses more bandwidth
resources, which leads to higher blocking rate. In the case of blocking rate, we can see that MPLL algorithm is always
better than DDP algorithm. This is due to the MPLL algorithm using fewer protection path resources. MPLL algorithm
significantly improves the performance of blocking rate reduction.
Figure 4 illustrates how the available spectrum alignment rate change under different traffic loads. The SAR of DDP
algorithm is obviously lower than that of MPLL, because MPLL algorithm saves a lot of backup resource paths. As the
load increases, DDP algorithm will use more and more backup protection resources than MPLL algorithm, DDP
algorithm will use more and more backup protection resources, and the gap in bandwidth usage will be larger. Therefore,
we can see that with the increase of traffic, the SAR of MPLL algorithm obviously has greater advantages. The
simulation results validate the superiority of MPLL algorithm.
4. CONCLUSION
In this paper, we propose a leaf-looping based multicast protection algorithm to improve the service blocking
performance in realizing efficient protection for multicast services in EONs. By dividing the destination nodes of a
multicast service into several groups dynamically and constructing one loop for each group to provide protection for each
destination node in the group, the proposed algorithm realizes protection for each destination node of the multicast
service.Simulation results show that the proposed MPLL algorithm can realize multicast protection for EONs with low
service blocking probability and high flexibility.
5. ACKNOWLEDGMENTS
This work was partly supported by National Natural Science Foundation of China (No. 61705190), and the Fundamental
Research Funds for the Central Universities, Southwest University for Nationalities (No. 2018HQZZ26).
[1] M. Jinno et al., “Distance-adaptive spectrum resource allocation in spectrum-sliced elastic optical path network,”
IEEE Commun. Mag.,vol. 48,no. 8, pp. 138–145, Aug. 2010.
[2] Z. Yu, Y. Zhao, J. Zhang, X. Yu, B. Chen, and X. Lin, “Multicast routing and spectrum assignment in elastic optical
networks,” in Asia Communications and Photonics Conference. Optical Society of America, 2012, pp. AF3E–3.
[3] L. Yang, L. Gong, F. Zhou, B. Cousin, M. Molnár, and Z. Zhu, “Leveraging light forest with rateless network coding
to design efficient all-optical multicast schemes for elastic optical networks,” J. Lightw. Technol., vol. 33,no. 18, pp.
3945–3955, Sep. 15, 2015.
[4] M.Klinkowski and K.Walkowiak,“Offlflinersa algorithms for elastic optical networks with dedicated path protection
consideration,” in International Congress on Ultra Modern Telecommunications and Control Systems and
Workshops, 2012, pp. 670–676.
[5] G. Shen and M. Zukerman, “Spectrum-effificient and agile co-ofdm optical transport networks: architecture, design,
and operation,” IEEE Communications Magazine, vol. 50, no. 5, pp. 82–89, 2012.
[6] Tarhan A, Cavdar C,“Shared Path Protection for Distance Adaptive Elastic Optical Networks under Dynamic
Traffic,”TeknikOchTeknologier,2013,7(1):29-34
[7] MichalAibin, and K. Walkowiak, “Different Strategies for dynamic multicast traffic protection in elastic optical
networks,” Resilient Networks Design and Modeling IEEE, 2016.
[8] Din, Der Rong , and I. R. Lai, “Multicast Protection Problem on Elastic Optical Networks Using Segment-base
Protection” IEEE 2015 international conference on informatics, electronics and vision (iciev), 2015:1-6.
[9] W. Grover and D. Stamatelakis, “Cycle-oriented distributed preconfiguration: Ring-like speed with mesh-like
capacity for self-planning network restoration,” in Proc. Int. Conf. Commun, Jun. 1988, pp. 537–543.
[10] Panayiotou T, Ellinas G,Antoniades N “P-cycle-based protection of multicast connections in metropolitan area
optical networks with physical layer impairments constrains,” Optical Switching and Networking,201619(2):66-77
[11] Min Ju, Fen Zhou, Shilin Xiao, Zuqing Zhu “Energy-efficient Protection with Directed p-Cycles for Asymmetric
Traffic in Elastic Optical Networks,”2016 21st European Conference on Networks and Optical Communications.
[12] A. Cai, J. Guo, R. Lin, G. Shen, and M. Zukerman, “Multicast routing and distance-adaptive spectrum allocation in
elastic optical networks with shared protection,” J. Lightw. Technol., vol. 34, no. 17, pp. 4076–4088, Sep. 1, 2016.
[13] K. Walkowiak, A. Kasprzak, and M. Wozniak, “Algorithms for calculation of candidate trees for efficient
multicasting in elastic optical networks,” in Transparent Optical Networks (ICTON), 2015 17th International
Conference on. IEEE, 2015, pp. 1–4.
[14] L. Ruan and N. Xiao,“Survivable multipath routing and spectrum allocation in OFDM-based flexible optical
networks,”IEEE/OSA J. Opt.Commun. Netw., vol. 5, no. 3, pp. 172–182, Mar. 2013.
[15] X. Wan, N. Hua, and X. Zheng,“Dynamic routing and spectrum assignment in spectrum-flexible transparent optical
networks,”IEEE/OSA J.Opt. Commun. Netw., vol. 4, no. 8, pp. 603–613, Aug. 2012.