You are on page 1of 8

Optical Fiber Technology 61 (2021) 102418

Contents lists available at ScienceDirect

Optical Fiber Technology


journal homepage: www.elsevier.com/locate/yofte

Regular Articles

Multiple leaf-ringing based protection algorithm with spectrum


defragmentation for multicast traffic in elastic optical network
Meiling Pan , Yang Qiu *, Chuanwu Zhang
Key Laboratory of State Ethnic Affairs Commission for Electronic and Information Engineering, College of Electrical & Information Engineering, Southwest Minzu
University, Chengdu, China

A R T I C L E I N F O A B S T R A C T

Keywords: Elastic optical networks (EONs) have realized high-speed data transmission with attractively efficiency and
Elastic flexibility in resource utilization. In order to guarantee the reliability and increase the efficiency of the multicast
Protection transmission in EONs, we propose a multiple leaf-ringing based protection algorithm with spectrum defrag­
Multiple leaf-ring
mentation (MLRP-SD) in this article. The proposed algorithm firstly sorts the destination nodes of a multicast
Defragmentation
service into multiple groups. Then, it constructs one leaf ring for all the destination nodes in one group and two
Multicast
dedicated trunk paths (including one protection trunk path) from the source to each constructed ring. Since a leaf
ring can provide protection for the destination nodes in its corresponding group, the reliability of multicast traffic
can be improved. And the use of leaf rings can reduce the spectrum consumed in service protection compared to
the traditional dedicated path protection (DPP) algorithms. In order to further improve the efficiency, the
proposed MLRP-SD algorithm triggers spectrum defragmentation to re-optimize resource utilization in the
network when sufficient available spectrum resources cannot be found along the sought protection trunk paths.
The simulation results show that the proposed MLRP-SD algorithm can guarantee the reliability of multicast
traffic with low service blocking probability.

1. Introduction the essential enabling technologies in EONs [4]. Different from the
routing and wavelength assignment (RWA) algorithms adopted in
With the continuous development of social science and technology, traditional WDM optical networks, RSA algorithms were designed to
the scale of the Internet and the speed of data traffic have experienced tackle finer spectrum allocation granularity (e.g. frequency slot) in EONs
explosive growth. In order to provide high-speed transmission, wave­ and were proved to be NP-hard problems [5]. Due to the use of fre­
length division multiplexing (WDM) optical networks were proposed to quency slot (FS), RSA algorithms had to guarantee the spectrum conti­
deliver diverse kinds of services via a fixed spectrum band (e.g. 50 GHz) nuity and contiguity constraints in resource allocation, which made the
[1]. However, with limited fiber bandwidth resources and fixed spec­ design of efficient RSA algorithms more challenging. Many sophisticated
trum allocation strategy, WDM systems encountered a bottleneck in routing and spectrum-allocation strategies, such as the shortest-path
resource utilization, since they might waste spectrum resources for low- based first-fitting resource allocation mechanism [6], distance-
rate services. Besides, they could hardly provide enough spectrum re­ adaptive routing and resource allocation algorithms [7,8], and group
sources in a single spectrum band for high-rate services beyond 100 Gb/ based spectrum allocation algorithms [9–11], have been proposed to
s. Therefore, elastic optical networks (EONs) have been proposed to realize efficient RSA in EONs.
improve the flexibility and the utilization in source allocation by Although the above RSA algorithms succeeded in optimizing the
assigning spectrum resources to diverse services adaptively according to resource utilization in EONs, they were designed for point-to-point (a.k.
their respective bandwidth requirements [2,3,38–40]. EONs have a. unicast) transmission and thus had limited efficiency in supporting
attracted widespread attention from researchers and are considered as point-to-multi-point (a.k.a. multicast) transmission. This can be under­
promising solutions to next-generation high-speed optical networks. stood from the fact that EONs inherited the transmission characteristics
In order to realize the high flexibility and resource-utilization, from the traditional WDM networks and had few mechanisms to utilize
effective routing and spectrum assignment (RSA) algorithm is one of the resource-sharing properties of multicast transmission. However, the

* Corresponding author.
E-mail address: yqiu@swun.edu.cn (Y. Qiu).

https://doi.org/10.1016/j.yofte.2020.102418
Received 18 August 2020; Received in revised form 10 November 2020; Accepted 18 November 2020
Available online 10 December 2020
1068-5200/© 2020 Elsevier Inc. All rights reserved.
M. Pan et al. Optical Fiber Technology 61 (2021) 102418

application of some novel multicast services, such as live video deliv­ technology as in [26–28], the proposed MLRP-SD algorithm has neither
ering, has made efficient multicast transmission highly desirable. And requirements for the recovery of the lost signal nor the synchronization
thus many multicast-enabled RSA (MRSA) algorithms were proposed at the intermediate node. The simulation results show that the proposed
[12–18]. In [12], two MRSA algorithms, known as the shortest-path-tree MLRP-SD algorithm can increase the reliability of multicast traffic in
(SPT) and the minimum-spanning-tree (MST) based MRSA algorithms EONs with low service blocking probability.
were proposed to utilizing the resource-sharing properties of the mul­ The rest of this paper is organized as follows. In Section II, the pro­
ticast transmission. In [13–15], sub-tree based MRSA algorithms were tection mechanism adopted by the proposed MLRP-SD algorithm is
proposed for the multicast traffic. By constructing multiple sub-trees for illustrated. In Section III, the details of the proposed MLRP-SD algorithm
one multicast service and allowing different sub-trees to select diverse are analyzed. In Section IV, the performance of the proposed MLRP-SD
modulation formats (MFs), these sub-tree based MRSA algorithms algorithm is presented and investigated. Finally, Section V summarizes
further increased the efficiency and the flexibility in service accommo­ this paper.
dation. But, diverse MFs required in these algorithms complicated the
structure of the transponders in EONs. Besides, layered-approach [16], 2. The protection mechanism adopted by the proposed MLRP-SD
resource-partition [17], and time-awareness [18] techniques were algorithm
introduced into EONs to optimize the spectrum resources allocated to
multicast services. In order to guarantee the reliability of the multicast services in EONs,
All these MRSA algorithms promoted the efficiency of EONs in sup­ protection mechanism is the essential technology in the proposed MLRP-
porting multicast traffic, but they neglected the survivability of multi­ SD algorithm. We illustrate the protection mechanism adopted by the
cast traffic and provided no protection mechanisms for its failure. proposed algorithm in this section. In the procedure of protecting mul­
However, even a single failure may induce enormous data loss, espe­ ticast services, the proposed MLRP-SD algorithm sorts the destination
cially for high-rate multicast traffic. Thus, the survivability of the mul­ nodes of a multicast service into multiple groups, and constructs a leaf
ticast traffic in EONs should be considered and effective protection ring for each group and two dedicated trunk paths from the source node
mechanisms should be adopted. Many protection algorithms, such as to each ring. Since a leaf ring can provide protection for all the nodes in
dedicated path protection (DPP) [19] and shared backup path protection the ring and the two dedicated trunk paths can guarantee the trans­
(SBPP) [20] were proposed to improve the survivability of traffic in mission from the source to the ring, the traffic of a multicast service can
EONs. In [21], the authors compared the existence of tunable balise in be protected from its source to all of its destination nodes. Compared to
SBPP and DPP by using bandwidth compression recovery technology, the typical dedicated path protection mechanism, the adopted leaf rings
and proposed ILP formula. Besides, p-cycle protection technology was can help reduce the spectrum resources consumed in service protection,
proposed based on self-healing ring [22,23]. In [22], the authors pro­ which can enhance the efficiency of proposed algorithm in supporting
posed an ILP model to solve the problem of p-cycle configuration. multicast traffic.
However, seeking an effective p-cycle is an NP hard problem, and ILP In this section, we explain the protection mechanism of the proposed
model has high computational complexity. Thus, the algorithm model in MLRP-SD algorithm by illustrating how it constructs leaf rings and trunk
[22] was only applicable to small-scale networks, not large-scale dy­ paths for a multicast service in an 8-node network. Such network to­
namic networks. In [23], a new p-cycle heuristic algorithm was pro­ pology is similar to that in [30]. It is worth notice that the proposed
posed to solve the single link failure problem considering load balance. algorithm can only recover the traffic in a leaf ring against a single
But the frequent setting and deletion of working path and backup path in failure, but cannot protect for more than two failures in a leaf ring.
this algorithm might induce severe spectrum fragmentation. In [24,25], Besides, in our illustrative example, one link is constructed by two
p-cycle protection algorithms based on failure independent path were directional fibers to guarantee bi-directional transmission in a leaf ring.
proposed, in which the optical path could be added to the disjoint route In the illustration, the network is assumed to be composed of 12 links
set of the cycle. But these p-cycle algorithms did not consider the with each one labeled by its distance value. For simplicity, we adopt R (s,
distance-adaptive modulation technique. This may affect their spectrum D, b) to represent a multicast service, where s, D, and b are its source
efficiency in supporting the traffic with diverse transmission range. In node, destination node set, and required data rate, respectively. Fig. 1.
[26–28], network coding technology was adopted in designing protec­ illustrates the service protection of the proposed MLRP-SD algorithm
tion algorithms for EONs. Besides the survivability issue, spectrum when a multicast service R (A, {C, D, F, G}, b) arrives. As shown in Fig. 1
fragments may also greatly affect the efficiency of the multicast traffic in (a), the proposed MLRP-SD algorithm first divides the four destination
EONs, since the accumulation of spectrum fragments will exhaust the nodes of R into two groups: group #1 containing nodes C and D, group
available FSs for the subsequent multicast services and deteriorate the #2 containing nodes F and G. Then, the proposed algorithm constructs
networking performance of EONs [29–30]. All these decreased the two leaf rings, H → C → D → H and H → F → G → H, and two trunk paths
success probability of accommodating multicast services in EONs, and (including one protection trunk path), A → B → H and A → H. By
thus affected the efficiency of EONs in supporting multicast traffic. comparison, traditional dedicated path protection (DPP) algorithm
In this paper, we propose a multiple leaf-ringing based protection constructs two dedicated light-trees, the light-tree A → H→{C, D, F, G}
algorithm with spectrum defragmentation (MLRP-SD) to reduce the and the light-tree composed of A → B → C → D and A → G → F. In Fig. 1
unreliability and the spectrum fragments of EONs in supporting multi­ (c) and Fig. 1(d), when the link H → C in the ring fails, the leaf ring
cast services. The proposed algorithm divides the destination nodes of realizes automatic reverse ring protection like a self-healing ring, and
the multicast service request into multiple groups, and constructs one protects the H → C path through the link H → D → C path. When the
leaf ring for each group and two dedicated trunk paths from the source trunk path A → H fails, the H → C path is protected by the dedicated
to each constructed ring. Since a leaf ring can provide protection for the protection path A → B → H. We also assume that different amount of FSs
destination nodes in its corresponding group, the reliability of multicast is assigned to R during different transmission range to emulate the
traffic can be improved in EONs. Compared to the p-cycle based pro­ distance-adaptive modulation technique. For instance, 2 FSs are
tection algorithms in [23–25], the proposed MLRP-SD algorithm em­ assigned to R when the transmission distance is less than 300 m 3 FSs are
ploys distance-adaptive modulation technique to achieve higher spectral assigned to R when the transmission distance is more than 300 m but less
efficiency. Besides, different from the previous p-cycle based algorithms, than 400 m. 4 FSs are assigned to R when the distance is greater than
the proposed algorithm employs defragmentation technique to re- 400 m. As shown in Fig. 1(b), the traditional dedicated path protection
optimize resource utilization when sufficient available spectrum re­ requires a maximum transmission distance of 550 m, and totally 40 FSs
sources cannot be found along the constructed protection trunk paths. along 10 links. By comparison, the proposed MLRP-SD algorithm only
When compared to the protection algorithms employing network coding requires a maximum transmission distance of 350 m, and totally 27 FSs

2
M. Pan et al. Optical Fiber Technology 61 (2021) 102418

Fig. 1. An example illustrating the service protection of the proposed MLRP-SD algorithm in an 8-node network: (a) leaf-rings and trunk paths constructed by
employing the proposed algorithm, (b) dedicated light-trees (with no leaf-rings) constructed by the traditional dedicated path protection (DPP) algorithm, (c)
protection for path failure on ring, (d) protection in case of trunk path failure.

along 9 links. From the illustrative example in Fig. 1, we can conclude information of the found FSs and constructs dedicated protection paths
that the proposed algorithm can provide protection for multicast traffic for each trunk paths before checking the availability of the FSs along the
in EONs with fewer FSs when compared to the typical DPP algorithm. protection paths to find enough available contiguous FSs. Otherwise, the
Thus, it can save spectrum resources and enhance the efficiency in proposed algorithm will continue to examine candidate solutions. If no
providing service protection for the multicast services in EONs. enough available FSs are found along dedicated protection paths, the
Noticeably, in additional to the leaf ring based protection mechanism, proposed algorithm triggers the spectrum defragmentation by retuning
the proposed algorithm employs spectrum defragmentation technique to the allocated FSs along the protection trunks for the existing multicast
reduce spectrum fragments and distance-adaptive modulation technique services. If no enough available FSs are found after spectrum defrag­
to increase the resource-utilization efficiency in the spectrum allocation mentation, the proposed algorithm blocks the service R(s, D, b).
procedure. Otherwise, the available FSs found along the leaf rings and the trunk
paths, as well as the FSs on the protection paths are allocated to R(s, D,
3. Details of the proposed MLRP-SD algorithm b). Note that, the proposed MLRP-SD algorithm adopts distance-
adaptive technique for a multicast service according to the distance
In this section, we investigate the details of the proposed MLRP-SD from its source to its farthest destination node. In this way, the spectral
algorithm. As analyzed above, the proposed MLRP-SD algorithm con­ efficiency of the proposed algorithm in provisioning multicast services
structs leaf-rings and trunks paths for the grouped destination nodes of a can be further increased. In order to make the process of the proposed
multicast service to guarantee its reliability. Besides, the proposed algorithm clearer, we also depict its flow chart as in Fig. 2.
MLRP-SD algorithm employs the typical spectrum defragmentation The computational complexity of the proposed MLRP-SD algorithm
mechanism as in [29] to re-optimize the usage of the FSs in the network. is mainly determined by its employed path-constructing, resource-allo­
Table 1 illustrates the details of the proposed MLRP-SD algorithm. As cation, and spectrum-defragmentation strategies. In the path-
shown in Table 1, when a multicast service R(s, D, b) arrives, the pro­ constructing procedure, we adopt typical Dijkstra algorithm [12] to
posed algorithm first sorts its destination nodes set D into multiple compute K shortest-paths in constructing leaf rings and trunk paths for a
groups according to their shortest distance from the source node. Then multicast service, and thus the complexity of the proposed MLRP-SD
the proposed algorithm constructs a leaf ring for each destination node consumed in path-constructing is O(K×|E|×|V|2), where |E| represents
group and a trunk path for source to each ring. Next, the proposed al­ the amount of the edges and |V| represents the amount of nodes in the
gorithm checks the usage of the FSs along the constructed rings and network. In the resource-allocation procedure, we employ the first-
trunk paths to find available contiguous FSs. If there are enough avail­ fitting strategy [31] to seeking available resources for a multicast ser­
able contiguous FSs are found, the proposed algorithm records the vice, and the time complexity of the proposed MLRP-SD algorithm in

3
M. Pan et al. Optical Fiber Technology 61 (2021) 102418

Table 1
The details of the proposed MLRP-SD algorithm.
Algorithm :MLRP-SD

1: Input: an arrived multicast service R(s, D, b)


2: Output : multicast service result
3: Pre-compute and store K shortest paths for each s-d node pair
4: Set the initial state of flag as FALSE
5 :while network is running do
6 : Divide the destination nodes into multiple groups according to their shortest
distance from the source node
7 : Each group calculates K different rings and K shortest trunk paths from the source
node to each ring
8 : for each candidate routing scheme do
9: Check the availability of the FSs along the leaf rings and the trunk path
10: if (enough available contiguous FSs are found) then
11: Record the information of the found FSs
12: flag = TURE
13: break
14: end if
15: end for
16: if (flag==TRUE) then
17: Calculate the K different dedicated protection schemes for each trunk path
18: for each candidate protection scheme do
19: Check the availability of the FSs along the protection paths
20: if (enough available contiguous FSs are found) then
21: Allocate the recorded FSs in step 11 and the found FSs along the protection
paths
22: flag = TURE
23: break
24: else
25: flag = FALSE
26: end if
27: end for
28: if (flag==FALSE) then
29: Retuning the FSs allocated on the protection trunks for the existing multicast Fig. 2. Flow chart of the proposed MLRP-SD algorithm.
services
31: Repeat steps 19–27.
32: end if λ/μ, the traffic load in the simulation networks can be calculated with
33: end if the unit of Erlang as in [31]. In the generation of each multicast service,
34: if (flag==FALSE) then
its source and destination nodes are randomly selected from the network
35: Block R(s, D, b)
36: end if
nodes, with its data rate randomly selected from 100 Gb/s to 300 Gb/s.
37: end while In the MF selection, we always choose the MF with the highest spectral
efficiency for a multicast service if its maximum transmission distance
does not exceed the transmission range of the selected MF. For
resource-allocation can be calculated as O(2×|V|2 × K×|N|×|E|×Bmax), simplicity, three shortest paths are pre-computed (i.e. K equaling 3) and
where |N| denotes the total number of FSs on one edge and Bmax denotes two rings are constructed in this simulation.
the maximum number of contiguous FSs required by a multicast service. In order to evaluate the performance of the proposed MLRP-SD al­
As for the spectrum defragmentation procedure, we adopt the typical gorithm, we employ two performance metrics, namely service blocking
defragmentation strategy [29] for the proposed MLRP-SD algorithm, probability and spectrum alignment rate, in the simulation. In the
and its time complexity is O(2×|N|×|E|×|S|×Bmax), where |S| is the evaluation, service blocking probability is defined as the proportion of
numbers of the accommodated multicast services. In general, the time the blocked multicast services among all the generated ones, and the
complexity of the proposed MLRP-SD algorithm is polynomial. spectrum alignment rate is defined as the proportion of the aligned
vacant FSs among all the FSs.
4. Performance evaluation We compare the proposed MLRP-SD algorithm with the shortest-
path-tree based dedicated path protection (SPT-DPP) algorithm, the
In this section, numerical simulations are performed to evaluate the minimum-spanning-tree based dedicated path protection (MST-DPP)
performance of the proposed MLRP-SD algorithm in two typical net­ algorithm, and the multiple leaf-ringing based protection (MLRP) al­
works, namely NSFNET (in Fig. 3(a)) and USNET (in Fig. 3(b)). In the gorithm without spectrum defragmentation in the performance evalu­
two simulation networks, we assume that each edge composes of two ation. The construction details of the multicast tree and the dedicated
directional fiber links with each link containing totally 4000 GHz. There path can be found in [12,32].
are totally 320 FSs on each fiber link when we define a spectrum band of
12.5 GHz as one FS. In the simulation, we employed distance-adaptive
modulation technique in selecting one modulation format (MF) from 4.1. NSFNET
the four typical MFs, namely BPSK, QPSK, 8QAM, and 16QAM, for one
multicast service. Noticeably, the MF selection for one multicast service Fig. 4 depicts the simulation results of the blocking performances of
depends on its transmission range as in Table 2. And such transmission the SPT-DPP, the MST-DPP, the MLRP and the proposed MLRP-SD al­
range for a multicast service is its transmission distance from its source gorithms under different traffic loads in NSFNET. It can be observed that
to its farthest leaf node. Besides, we use one FS as the guard-band in compared with the other three algorithms (i.e. the SPT-DPP, the MST-
spectrum allocation. As for the random generation of multicast services DPP, and the MLRP algorithms), the proposed MLRP-SD algorithm has
in the simulation, we adopt a Poisson traffic model with parameter λ, in a significant reduction in service blocking probability. The blocking
which their holding times are assumed to comply with a negative probability of the MLRP algorithm is always lower than the traditional
exponential distribution with parameter μ. By employing the formula SPT-DPP and MST-DPP algorithms with different traffic loads. After

4
M. Pan et al. Optical Fiber Technology 61 (2021) 102418

Fig. 3. Network topology: (a) NSFNET network; (b) USFNET network.

improve the performance under low traffic load. Even if the network
Table 2
load increases, the proposed algorithm still has obvious advantages over
Some important parameters used in the simulation.
other three algorithms.
number of frequency slots per link 320 Fig. 5 shows the simulation results of spectrum alignment rate in
bandwidth of one FS 12.5 GHz
NSFNET network when SPT-DPP algorithm, MST-DPP algorithm, MLRP
guard band 12.5 GHz
Transmission-range of BPSK 9600 km algorithm and the proposed MLRP-SD algorithm are adopted. As shown
Transmission-range of QPSK 4800 km in Fig. 5, the spectrum alignment rate decreases with the increase of
Transmission-range of 8-QAM 2400 km traffic load, but the proposed MLRP-SD algorithm always has the highest
Transmission-range of 16-QAM 1200 km
spectrum alignment rate in the four algorithms. The differences of the
spectrum alignment among the four algorithms are relatively small at
employing spectrum-defragmentation strategy, such reduction is more low traffic load, but obvious at high traffic load. For example, with the
significant, especially under low traffic load, which enhances the traffic load at 60 Erlang, the spectrum alignment performance of the
advantage of the proposed MLRP-SD on blocking performance over the proposed MLRP-SD algorithm improves by about 69%, 50% and 35%
other three algorithms. For instance, when the traffic load is 80 Erlang, when compared to the SPT-DPP algorithm, the MST-DPP algorithm and
the service blocking probability of the MLRP-SD algorithm is about 97%, the MLRP algorithm, respectively. When the traffic load increases to 160
93% and 85% lower than the SPT-DPP algorithm, the MST-DPP algo­ Erlang, the spectrum alignment performance of the MLRP-SD algorithm
rithm and the MLRP algorithm, respectively. With the increase of traffic is about 188%, 114% and 84% higher than the SPT-DPP algorithm, the
load, the network resources become crowded and the difference in MST-DPP algorithm and the MLRP algorithm, respectively. It is worth
blocking probability decreases gradually. However, the proposed MLRP- noting that the spectrum alignment ratio of MLRP-SD algorithm is al­
SD algorithm still reduces by about 63%, 56% and 42% in service ways higher than the other three algorithms. This can be understood by
blocking probability compared to the SPT-DPP algorithm, the MST-DPP the fact that the proposed MLRP-SD algorithm can help reduce the de­
algorithm and the MLRP algorithm respectively when the traffic load is gree of the spectrum defragmentation and improve the spectrum
150 Erlang. The above comparison of blocking performance in NSFNET alignment rate, especially under high traffic load.
network indicates that the proposed MLRP-SD algorithm can effectively
improve the efficiency of network protection and reduce the service
4.2. USNET
blocking rate through the leaf ring protection and the defragmentation
strategy. Meanwhile, we find that the proposed algorithm can greatly
Fig. 6 illustrates the simulation results of the blocking performances

Fig. 4. Blocking probability in NSFNET.

5
M. Pan et al. Optical Fiber Technology 61 (2021) 102418

Fig. 5. Spectrum alignment rate in NSFNET.

of the SPT-DPP, the MST-DPP, the MLRP and the MLRP-SD algorithms more obvious in USNET than that in NSFNET (as in Fig. 5), especially at
under different traffic loads in a larger network, USNET. Similar to that high traffic load. For example, in USNET, the spectrum alignment per­
depicted in Fig. 4, the service blocking probability of the proposed formance of the proposed MLRP-SD algorithm improves by about 72%,
MLRP-SD algorithm is much lower than those of the other three algo­ 52% and 25% compared to the SPT-DPP algorithm, the MST-DPP al­
rithms, and the differences among their blocking performances are gorithm and the MLRP algorithm respectively, when the traffic load is
especially obvious under low load. As shown in Fig. 6, when the traffic 60 Erlang. When the traffic load increases to160 Erlang, the spectrum
load is 80 Erlang, the proposed MLRP-SD algorithm reduces the service alignment performance of the proposed MLRP-SD algorithm improves
blocking probability by about 99%, 95% and 90% compared to the SPT- by about 320%, 220% and 82%, compared to the SPT-DPP algorithm,
DPP algorithm, the MST-DPP algorithm, and the MLRP algorithm, the MST-DPP algorithm and the MLRP algorithm respectively. All the
respectively. When the traffic load reaches as high as 150 Erlang, the simulation results imply that the proposed MLRP-SD algorithm can
proposed MLRP-SD algorithm can still reduce the service blocking effectively improve the alignment of the spectrum resources, in a larger
probability by about 70%, 61% and 43%compared to the SPT-DPP al­ network, especially with high traffic load.
gorithm, the MST-DPP algorithm, and the MLRP algorithm, respectively.
From the above results, we can conclude that the proposed MLRP-SD 5. Conclusion
algorithm outperforms the other three algorithms in service blocking
probability even in a larger network. In this paper, we investigate the protection properties of the multi­
Fig. 7 shows the simulation results of spectrum alignment rate in a cast traffic in EONs, and propose a MLRP-SD algorithm to reduce the
larger network, USNET, when SPT-DPP algorithm, MST-DPP algorithm, unreliability and the generated spectrum fragments in supporting mul­
MLRP algorithm and the proposed MLRP-SD algorithm are adopted. As ticast services by constructing leaf-rings among their destination nodes
shown in Fig. 7, the spectrum alignment rate of the proposed MLRP-SD and triggering spectrum defragmentation if necessary. In addition,
algorithm is higher than those of the other three algorithms, and the distance-adaptive modulation technique is adopted by the proposed
differences in spectrum alignment rate among the four algorithms are MLRP-SD algorithm, which can further improve the spectral efficiency

Fig. 6. Blocking probability in USNET.

6
M. Pan et al. Optical Fiber Technology 61 (2021) 102418

Fig. 7. Spectrum alignment rate in USNET.

when accommodating diverse multicast services with different trans­ [3] O. Gerstel, M. Jinno, A. Lord, S.B. Yoo, Elastic optical networking: A new dawn for
the optical layer? IEEE Commun. Mag 50 (2) (2012) s12–s20.
mission distance. The simulation results show that the proposed MLRP-
[4] L. Velasco, M. Klinkowski, M. Ruiz, V. Lopez, and G. Junyent, “Elastic spectrum
SD algorithm can improve the reliability of multicast traffic and reduce allocation for variable traffic in flexible-grid optical networks,” in Proc. OFC/
the service blocking probability when compared to the traditional SPT- NFOEC, Mar. 2012.
DPP and MST-DPP algorithms. Note that, fiber nonlinearities may [5] Y. Wang, X. Cao, and Y. Pan, “A study of the routing and spectrum allocation in
spectrum-sliced elastic optical path networks,” in INFOCOM, 2011 Proceedings
distort the performance of the proposed MLRP-SD algorithm, especially IEEE. IEEE, pp.1503–1511, 2011.
for the high-rate long-range transmission [33]. Some nonlinear [6] W. Zheng, Y. Jin, W. Sun, W. Guo, and W. Hu, “On the spectrum efficiency of
compensation techniques can be used in future EONs, such as probabi­ bandwidth-variable optical OFDM transport networks,” in Proc. Opt. Fiber
Commun. Conf. pp.1–3, 2010.
listic shape constellation full-field nonlinear compensation [34], optical [7] M. Jinno, B. Kozicki, H. Takara, A. Watanabe, Y. Sone, T. Tanaka, A. Hirano,
phase conjugation [35], nonlinear custom detection [36], nonlinear Distance-adaptive spectrum resource allocation in spectrum-sliced elastic optical
Fourier transform [37] to ensure the effectiveness of the proposed path network, IEEE Commun. Mag. 48 (8) (2010) 138–145.
[8] S. Sugihara, Y. Hirota, S. Fujii, H. Tode, T. Watanabe, Dynamic Resource Allocation
MLRP-SD algorithm. for Immediate and Advance Reservation in Space-Division-Multiplexing-Based
Elastic Optical Networks, IEEE/OSA J. Opt. Commun. Networking 9 (3) (2017)
CRediT authorship contribution statement 183–197.
[9] Y. Qiu, “Group-based spectrum assignment in dynamic flex-grid optical networks,
Optical Fiber Technology, Oct. 19 (5) (2013) 437–445.
Meiling Pan: Methodology, Validation, Formal analysis, Data [10] Y. Qiu, J. Xu, Efficient hybrid grouping spectrum assignment to suppress spectrum
curation, Writing - original draft. Yang Qiu: Conceptualization, Vali­ fragments in flexible grid optical networks, IEEE J. Lightwave Technol. 35 (14)
(2017) 2823–2832.
dation, Writing - original draft, Writing - review & editing, Funding [11] Y. Qiu, An efficient spectrum assignment algorithm based on variable-grouping
acquisition. Chuanwu Zhang: Validation, Writing - original draft, mechanism for flex-grid optical networks, Opt. Switching Netw. 24 (2017) 39–46.
Writing - review & editing. [12] Q. Wang, L. Chen, Performance analysis of multicast traffic over spectrum elastic
optical networks. in IEEE/OSA Optical Fiber Communication Conference (OFC),
paper OTh3B.7, 2012.
Declaration of Competing Interest [13] M. Tarhani, M. Khosravi Eghbal, M. Shadaram, A layered Subtree scheme for
multicast communications in large-scale elastic translucent optical networks, IEEE
Access 8 (2020) 37902–37913.
The authors declare that they have no known competing financial [14] Z. Fan, Y. Li, G. Shen, C.K. Chan, Distance-adaptive spectrum resource allocation
interests or personal relationships that could have appeared to influence using subtree scheme for all-optical multicasting in elastic optical networks, IEEE J.
Lightwave Technol. 35 (9) (2017) 1460–1468.
the work reported in this paper.
[15] P.D. Choudhury, R.S. Chauhan, P.V. Sudheer, T. De, Multicast Routing and
Spectrum Assignment in Flexible-Grid Optical Networks based on Light-Tree
Acknowledgements Sharing approach, in: International Conference on Information Technology, 2016,
pp. 173–179.
[16] X. Chen, B. Li, R. Proietti, H. Lu, Z. Zhu, S.J.B. Yoo, Deep RMSA: A Deep
This work was partly supported by National Natural Science Foun­ Reinforcement Learning Framework for Routing, Modulation and Spectrum
dation of China (Nos. 61705190 and 61971378), the Fundamental Assignment in Elastic Optical Networks, J. Lightwave Technol. 37 (16) (2019)
Research Funds for the Central Universities, Southwest Minzu University 4155–4163.
[17] Y. Qiu, Resource-partitioned spectrum assignment to realize efficient multicasting
(No. 2020PTJS19004), the Fundamental project of Science and Tech­ for flexible grid optical networks, Opt. Fiber Technol. 53 (2019), 102067.
nology Department of Sichuan Province (No.2018JY0338), and the [18] Y. Qiu, Time based resource-consumption-aware spectrum assignment for
Graduate Innovative Research Projects (No.CX2020SZ86).We appre­ multicast traffic in elastic optical networks, Opt. Fiber Technol. 59 (2020), 102325.
[19] M. Klinkowski, K. Walkowiak,“Offline rsa algorithms for elastic optical networks
ciate the reviewers’ suggestions on the paper. with dedicated path protection consideration,” in International Congress on Ultra
Modern Telecommunications and Control Systems and Workshops, pp. 670–676,
References 2012.
[20] G. Shen, M. Zukerman, Spectrum-efficient and agile co-ofdm optical transport
networks: architecture, design, and operation, IEEE Commun. Mag. 50 (5) (2012)
[1] ITU-T Recommandation G.694.1, June 2002. 82–89.
[2] M. Jinno, H. Takara, B. Kozicki, Y. Tsukishima, Y. Sone, S. Matsuoka, Spectrum-
Efficient and Scalable Elastic Optical Path Network: architecture, benefits, and
enabling technologies, IEEE Commun. Mag. 47 (11) (2009) 66–73.

7
M. Pan et al. Optical Fiber Technology 61 (2021) 102418

[21] G. Shen, Y. Wei, S.K. Bose, Optimal design for shared backup path protected elastic [31] Z.Y. Fan, Y. Qiu, C.K. Chan, Dynamic Multipath Routing with Traffic Grooming in
optical networks under single-link failure, IEEE/OSA J. Opt. Commun. 6 (7) (2014) OFDM Based Elastic Optical Path Networks, IEEE J. Lightwave Technol. 33 (1)
649–659. (2015) 275–281.
[22] Y. Wei, X.u. Kai, Y. Jiang, H. Zhao, G. Shen, Optimal design for P-cycle-protected [32] K. Walkowiak, R. Goscien, M. Klinkowski, M. Wozniak, Optimization of multicast
elastic optical networks, Photonic Netw. Commun. 29 (3) (2015) 257–268. traffic in elastic optical networks with distance-adaptive transmission, IEEE
[23] Wu. Jingjing, Yejun Liu, Yu Cunqian, Wu Ying, Survivable routing and spectrum Commun. Lett. 18 (12) (2014) 2117–2120.
allocation algorithm based on p-cycle protection in elastic optical networks, Optik [33] J. Zhao, H. Wymeersch, E. Agrell, Nonlinear impairment-aware static resource
– Int. J. Light Electron Opt. 125 (16) (2014) 4446–4451. allocation in elastic optical networks, J. Lightwave Technol. 33 (22) (2015)
[24] Der-Rong Din, “Survivable routing problem in EONs with FIPP p-cycles 4554–4564.
protection,” 2017 IEEE International Symposium on Local and Metropolitan Area [34] D. Semrau, T. Xu, N.A. Shevchenko, M. Paskov, A. Alvarado, R.I. Killey, P. Bayvel,
Networks (LANMAN), Osaka, pp. 1-2, June 2017. Achievable information rates estimates in optically amplified transmission systems
[25] F. Ji, X. Chen, W. Lu, J. J. P. C. Rodrigues and Z. Zhu, “Dynamic p-Cycle Protection using nonlinearity compensation and probabilistic shaping, Opt. Lett. 42 (1) (2017)
in Spectrum-Sliced Elastic Optical Networks,” in Journal of Lightwave Technology, 121–124.
vol. 32, no. 6, pp. 1190-1199, March15, 2014. [35] A.D. Ellis, et al., 4 Tbit/s transmission reach enhancement using 10 × 400 Gbit/s
[26] D.T. Hai, L.H. Chau, N.T. Hung, A priority-based multi objective design for routing, super-channels and polarization insensitive dual band optical phase conjugation,
spectrum, and network coding assignment problem in network-coding-enabled J. Lightwave Technol. 34 (8) (2016) 1–7.
elastic optical networks, IEEE Syst. J. 14 (2) (2020) 2358–2369. [36] G. Liga, A. Alvarado, E. Agrell, M. Secondini, R.I. Killey, P. Bayvel, Optimum
[27] Y.G. Savva, K. Manousakis, G. Ellinas, “Survivable and Secure Elastic Optical detection in presence of nonlinear distortions with memory, Proc. European Conf.
Networks using Network Coding,” 2019 11th International Workshop on Resilient on Optical Communication (ECOC) (2015).
Networks Design and Modeling (RNDM), Nicosia, Cyprus, pp. 1-8, January 2020. [37] J.E. Prilepsky, S.A. Derevyanko, K.J. Blow, I. Gabitov, S.K. Turitsyn, “Nonlinear
[28] G. Savva, K. Manousakis, G. Ellinas, Network coding for security against Inverse Synthesis and Eigenvalue Division Multiplexing in Optical Fiber Channels”,
eavesdropping attacks in elastic optical networks, Optical Network Design and Phys. Rev. Lett., Vol. 113, paper. 013901, 2014.
Modeling. (2020). [38] Y. Zhao, et al., Crosstalk-aware spectrum defragmentation by re-provisioning
[29] R. Wang, B. Mukherjee, “Provisioning in elastic optical networks with non- advance reservation requests in space division multiplexing enabled elastic optical
disruptive defragmentation,” 2013 17th International Conference on Optical networks with multi-core fiber, ptics Express 27 (2019) 5014–5032.
Networking Design and Modeling (ONDM), Brest, pp. 223-228, April2013. [39] J. Yuan, et al., A Spectrum Assignment Algorithm in Elastic Optical Network With
[30] T. Sawa, F. He, T. Sato, B. C. Chatterjee, E. Oki, “Defragmentation Using Minimum Sum of Weighted Resource Reductions in all Associated Paths, Journal of
Reroutable Backup Paths in Toggled 1+1 Path Protected Elastic Optical Networks,” Lightwave Technology 37 (21) (2019) 5583–5592.
2018 24th Asia-Pacific Conference on Communications (APCC), Ningbo, China, pp. [40] R. Zhu, et al., Protected Resource Allocation in Space Division Multiplexing-Elastic
422-427,Nov. 2018. Optical Networks (SDM-EONs) with Fluctuating traffic, Journal of Network and
Computer Applications (2020).

You might also like