• Aucun résultat trouvé

Network Survivability: End-to-End Recovery Using Local Failure Information

4. Span: Perform combined routing of nominal and protection flow using Span protection

5.4.4 Second Case Study: Connection Availability Under Path ProtectionProtection

5.4.4.4 Routing Strategy

Routing was carried out along the shortest path, the metric being distance (in km).

Candidate shortest paths that did not have enough capacity for the arriving demand were filtered out. Node-disjoint working and protection paths were chosen. Block-ing resulted when no path could be found to satisfy a demand with a given protec-tion scheme. Dijkstra’s algorithm was used to find shortest paths, and a two-step approach was applied to select protection paths.

5.4.4.5 Results

Table 5.4 presents the average connection availability under both DPP and SPP. In the case of continental-size network topologies (Cost266, KL, Janos-US-CA, and NSFnet), the average availability values are very different compared to the small or medium size networks, where no differences can be observed, independently of the application of DPP or SPP. In the case of SPP, however, the worst-performing one (Janos-US-CA) has more than six times less availability than the best (KL) one. Nonetheless, these larger topologies can only achieve a maximum of “three nines” of availability, even when DPP is applied. On the other hand, results show that the dominant component in the network availability model is the fiber optic cable, due to the frequency of cable cuts and the relatively long duration of repair times.

Therefore, connection availability is dependent on the lengths of links, or in general terms, on the link length distribution of its network topology. Figure 5.7 shows how the mean downtime of connections in two of the studied topologies (Germany50 and COST266) increases when the link lengths are multiplied by a given factor;

Figure 7(a) shows that the average downtime increases linearly when connections are unprotected, with different slopes for different topologies. When protection is applied, however, the degradation rate is lower (see Figure 7(b)). With respect to the restoration overbuild, it can be seen in Table 5.4 that DPP requires almost two times the working capacity for protection, while DPP requires approximately the same capacity for both working and protection paths.

Table 5.4 Average availability and average restoration overbuild under DPP and SPP Figure of Merit DfnGwin Germany50 Cost266 KL Janos-US-CA NSFnet DPP - Conn. Availability 0.999983 0.999985 0.999790 0.999838 0.999723 0.999620 DPP - Restoration Overbuild 2.45 2.78 2.70 2.65 2.73 2.96 SPP - Conn. Availability 0.999932 0.999884 0.998272 0.999483 0.996525 0.998842 SPP - Restoration overbuild 1.69 1.85 2.02 2.24 2.06 2.30

Another interesting result concerns the average minimum distance, evaluated in hops between node pairs. For topologies with a small average minimum distance, a short total hop count can be expected in both DPP and SPP, yielding a suitable availability value. However, other factors such as link length distribution and shar-ing rules can modify the expected values. It has also been observed in SPP that the sharing group size can change the expected availability values if only topology fea-tures are considered. With respect to average node degree, it can be noted that under DPP it improves restoration overbuild because it helps in finding disjoint paths for backup.

(a) Unprotected connections

(b) Protected with DPP and SPP

Fig. 5.7 Average downtime as a function of scaled link length

References

1. Andersen, R., Chung, F., Sen, A., Xue, G.: On disjoint path pairs with wavelength continuity constraint in WDM networks. In: INFOCOM (2004)

2. Autenrieth, A., Kirst¨adter, A.: Engineering end-to-end ip resilience using resilience-differentiated QoS. IEEE Communications Magazine 40(1), 50–57 (2002). DOI 10.1109/

35.978049

3. Batchelor, P., Daino, B., Heinzmann, P., Hjelme, D., Inkret, R., Jager, H., Joindot, M., Kuchar, A., Coquil, E., Leuthold, P., Marchis, G., Matera, F., Mikac, B., Nolting, H. P., Spath, J., Tillerot, F., Caenegem, B., Wauters, N., Weinert, C.: Study on the implementation of optical transparent transport networks in the european environment-results of the research project cost 239. Photonic Network Communications 2, 15–32(18) (March 2000)

4. Berger, L., Bryskin, I., Papadimitriou, D., Farrel, A.: GMPLS segment recovery. IETF RFC 4873 (2007)

5. Chołda, P.: The Reliability Analysis of Recovery Procedures in GMPLS-based Optical IP Networks. Ph.D. thesis, AGH University of Science and Technology, Krak´ow, Poland (2005).

URLhttp://kt.agh.edu.pl/˜cholda/Papers/PhD.pdf. Submitted

6. Cholda, P., Mykkeltveit, A., Helvik, B., Wittner, O., Jajszczyk, A.: A survey of resilience dif-ferentiation frameworks in communication networks. Communications Surveys and Tutorials, IEEE 9(4), 32–55 (2007). DOI 10.1109/COMST.2007.4444749

7. Doucette, J., Grover, W. D.: Comparison of mesh protection and restoration schemes and the dependency on graph connectivity. In: Design of Reliable Communication Networks, pp.

121–128 (2001)

8. Doucette, J., He, D., Grover, W., Yang, O.: Algorithmic approaches for efficient enumeration of candidate p-cycles and capacitated p-cycle network design. Design of Reliable Commu-nication Networks, 2003. (DRCN 2003). Proceedings. Fourth International Workshop on pp.

212–220 (2003). DOI 10.1109/DRCN.2003.1275359

9. Ellinas, G., Bouillet, E., Ramamurthy, R., Labourdette, J. F., Chaudhuri, S., Bala, K.: Routing and restoration architectures in mesh optical networks. Optical Networks Magazine pp. 91–

106 (2003)

10. Feldman, J., Ruhl, M.: The directed steiner network problem is tractable for a constant number of terminals. In: Proc. 40th annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 299–308 (1999)

11. Grover, W., Doucette, J., Clouqueur, M., Leung, D., Stamatelakis, D.: New options and in-sights for survivable transport networks. IEEE Communications Magazine 40(1), 34–41 (2002)

12. Gummadi, K. P., Pradeep, M. J., Murthy, C. S. R.: An efficient primary-segmented backup scheme for dependable real-time communication in multihop networks. IEEE/ACM Transac-tions on Networking 11(1), 81–94 (2003)

13. Haider, A., Harris, R.: Recovery techniques in next generation networks. Communications Surveys and Tutorials, IEEE 9(3), 2–17 (2007). DOI 10.1109/COMST.2007.4317617 14. Ho, P. H., Tapolcai, J., Mouftah, H. T.: On optimal diverse routing for shared protection in

mesh WDM networks. IEEE Transactions on Reliability 53(6), 2216–225 (2004)

15. Hu, J. Q.: Diverse routing in optical mesh networks. IEEE Transactions on Communications 51, 489–494 (2003)

16. H¨ulsermann, R., J¨ager, M., Koster, A., Orlowski, S., Wess¨aly, R., Zymolka, A.: Availability and cost based evaluation of demand-wise shared protection. In: 7th ITG-Workshop on Pho-tonic Networks, Leipzig, Germany, pp. 161–168. VDE Verlag GmbH (2006)

17. Iraschko, R. R., Grover, W. D.: A highly efficient path-restoration protocol for management of optical network transport integrity. IEEE Journal on Selected Areas in Communications (JSAC) 18(5), 779–794 (2000)

18. J¨ager, M., R. H¨uelsermann, D. A. S., Sedlak, R.: Evaluation of novel resilience schemes in dynamic optical transport networks. In: Proc. APOC (2002)

19. Laborczi, P., Tapolcai, J., Ho, P. H., Cinkler, T., Recski, A., Mouftah, H. T.: Algorithms for asymmetrically weighted pair of disjoint paths in survivable networks. In: Design of Reliable Communication Networks, pp. 220–227 (2001)

20. Lai, W., McDysan, D.: Network hierarchy and multilayer survivability. IETF RFC 3386 (2002) 21. Liu, Y., Tipper, D.: Spare capacity allocation for non-linear link cost and failure-dependent

path restoration. In: Design of Reliable Communication Networks, pp. – (2001)

22. Liu, Y., Tipper, D., Siripongwutikorn, P.: Approximating optimal spare capacity allocation by successive survivable routing. In: INFOCOM, pp. 699–708. Anchorage, Alaska (2001) 23. Mohan, G., Murthy, C. S. R.: Lightpath restoration in WDM optical networks. IEEE Network

14(6), 24–32 (2000)

24. Orlowski, S., Pi´oro, M., Tomaszewski, A., Wess¨aly, R.: SNDlib 1.0–Survivable Network De-sign Library. In: Proceedings of the 3rd International Network Optimization Conference (INOC 2007), Spa, Belgium (2007)

25. Ou, C. S., Zang, H., Mukherjee, B.: Sub-Path Protection for Scalability and Fast Recovery in WDM Mesh Networks. In: Proc. Optical Fiber Communications Conference (OFC), p. ThO6 (2002)

26. Pan, P., Swallow, G., Atlas, A.: Fast reroute extensions to RSVP-TE for LSP tunnels. IETF RFC 4090 (2001)

27. Ramamurthyt, S., Mukherjee, B.: Survivable WDM mesh networks, part II – restoration. In:

International Conference on Communications, pp. 2023–2030 (1999)

28. Ramasubramanian, S.: On failure dependent protection in optical grooming networks. In:

International Conference on Dependable Systems and Networks, pp. 440–449 (2004) 29. Segovia, J., Calle, E., Vila, P., Marzo, J., Tapolcai, J.: Topology-focused availability analysis

of basic protection schemes in optical transport networks. J. Opt. Netw. 7(4), 351–364 (2008) 30. Optical fiber supply meets expanding application. SK Opto-Electronics Newsletter (2003) 31. Stidsen, T., Kjaerulff, P.: Complete rerouting protection. Journal of Optical Networking 5(6),

481–492 (2006)

32. Tapolcai, J., Cinkler, T.: On-line routing algorithms with shared protection in WDM networks.

In: Optical Network Design and Modelling, pp. 351–364 (2003)

33. Tapolcai, J., Ho, P. H., Cinkler, T.: A compact mathematical formulation for shared path pro-tection with general shared risk groups. In: Conference on Wireless and Optical Communica-tions Networks (WOCN), pp. 270–274. Dubai, UAE (2005)

34. Tapolcai, J., Ho, P. H., Verchere, D., Cinkler, T.: A novel shared segment protection method for guaranteed recovery time. In: Broadband Optical Networking Symposium (BroadNets), pp. 127–136 (2005)

35. Verbrugge, S., Colle, D., Demeester, P., H¨ulsermann, R., J¨ager, M.: General availability model for multilayer transport networks. In: Proc. DRCN 2005. Lacco Ameno, Italy (2005) 36. Wang, D., Li, G.: Efficient distributed solution for MPLS Fast Reroute. In: 4th International

IFIP-TC6 Networking Conference (NETWORKING), p. 804 (2005)

37. Wang, H., Modiano, E., M´edard, M.: Partial path protection for wdm networks: End-to-end recovery using local failure information. In: Seventh International Symposium on Computers and Communications (ISCC), pp. 719–725 (2002)

38. Xiong, Y., Mason, L.: Restoration strategies and spare capacity requirements in self-healing ATM networks. IEEE/ACM Transactions on Networking 7(1), 98–110 (1999)

39. Xu, D., Xiong, Y., Qiao, C., Li, G.: Trap avoidance and protection schemes in networks with shared risk link groups. In: IEEE Journal of Lightwave Technology (2003)

Routing Optimization in Optical Burst