fault-tolerance-oriented topology, routing and...

160
FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND WAVELENGTH ASSIGNMENT OPTIMIZATION FOR WDM ALL-OPTICAL NETWORKS By DEXIANG WANG A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2011

Upload: others

Post on 12-May-2020

14 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND WAVELENGTHASSIGNMENT OPTIMIZATION FOR WDM ALL-OPTICAL NETWORKS

By

DEXIANG WANG

A DISSERTATION PRESENTED TO THE GRADUATE SCHOOLOF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT

OF THE REQUIREMENTS FOR THE DEGREE OFDOCTOR OF PHILOSOPHY

UNIVERSITY OF FLORIDA

2011

Page 2: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

c⃝ 2011 Dexiang Wang

2

Page 3: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

To my family

3

Page 4: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

ACKNOWLEDGMENTS

All the works presented in this dissertation are under the guidance of my advisor Dr.

Janise McNair. Her wisdom, generosity, and encouraging smile have been supporting

me through one-after-another tough times that I encountered during this long process as

a Ph.D. pursuer. Hereby, although way far from sufficient, I want to express my sincere

gratefulness for every encouragement that she gave to me, every piece of guidance

that she offered me, and every step of progress that she helped me achieve. The spirits

that I learned from her in so many aspects of scholarship will be carried on and play a

priceless role throughout my future career.

I also want to thank all other members of my Ph.D. supervisory committee: Dr.

Alan George, Dr. Huikai Xie, and Dr. My Thai, for their academic advices and support

on my Ph.D. proposal and dissertation. I started my research under Dr. Alan George

on a green-internet project where I identified my interests of research in computer

networks. Dr. Huikai Xie shared his knowledge with me in fundamental principles of

fiber-optic communications, which formed my essential understanding in the area of

optical communication networks. Dr. My Thai brought me into the area of approximation

algorithms and optimization theory. The knowledge that I learned from her facilitated

solving many problems in this dissertation.

Along the entire way of producing this dissertation, I received numerous helps from

so many people at different times in different ways that there is no way to enumerate all

my thanks. Last but not least, my special thanks go to all the members of the Wireless

And Mobile Systems (WAM) Laboratory: Dr. Dawood Al-Ari, Arvindhan Kumar, Madhan

Sivakumar, Gustavo Vejarano, Xiaoyuan Li, Obulapathi Challa, Seshupriya Alluru,

Gunjan Gupta, Jing Qin, Xiang Mao, Jose Almodovar-Faria, JinJing Pan, Paul Muri,

Ritwik Dubey, Gokul Bhat, and Joey Makar, for so many beneficial discussions and

advices that they offered me on a daily basis.

4

Page 5: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

TABLE OF CONTENTS

page

ACKNOWLEDGMENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

ABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

CHAPTER

1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141.2 Dissertation Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

2 TORUS-BASED FOUR-WAY DISJOINT-LIGHTPATHS COMMUNICATIONFOR AVIONIC WDM LANS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

2.1 Related Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182.1.1 Topological Options . . . . . . . . . . . . . . . . . . . . . . . . . . . 182.1.2 Fault Tolerance in WDM Optical Networks . . . . . . . . . . . . . . 182.1.3 Routing and Wavelength Assignment (RWA) . . . . . . . . . . . . . 19

2.2 Contributions and Chapter Organization . . . . . . . . . . . . . . . . . . . 202.3 Network Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

2.3.1 SAE Requirements and Evaluation Metrics . . . . . . . . . . . . . 202.3.2 Torus-Based Architecture . . . . . . . . . . . . . . . . . . . . . . . 212.3.3 Single-Wavelength Lightpaths . . . . . . . . . . . . . . . . . . . . . 22

2.4 Non-Overlapping Lightpath Setup Algorithm: Four-way OptimaL Disjointrouting (FOLD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232.4.1 Scenario 1: X-Y Routing . . . . . . . . . . . . . . . . . . . . . . . . 252.4.2 Scenario 2: X Routing . . . . . . . . . . . . . . . . . . . . . . . . . 272.4.3 Scenario 3: Y Routing . . . . . . . . . . . . . . . . . . . . . . . . . 292.4.4 Destination Group . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

2.5 Wavelength Allocation and Reuse (WAR) . . . . . . . . . . . . . . . . . . 302.5.1 A Lower Bound (Ideal Wavelength Utilization) . . . . . . . . . . . . 302.5.2 Wavelength Allocation and Reuse (WAR) Algorithm . . . . . . . . . 32

2.6 Controller Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . 452.7 Performance Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

2.7.1 Probabilistic Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 462.7.2 Network Capacity Analysis . . . . . . . . . . . . . . . . . . . . . . . 51

3 TRADEOFF STUDY ON FAULT TOLERANCE CAPACITY AND RESOURCEUTILIZATION FOR THE TORUS-BASED ALL-OPTICAL WDM LANS . . . . . 54

3.1 Wavelength Assignment Schemes . . . . . . . . . . . . . . . . . . . . . . 55

5

Page 6: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

3.2 Failure Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583.3 Reliability Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593.4 Simulation and Numerical Results . . . . . . . . . . . . . . . . . . . . . . 61

4 CIRCULANT-GRAPH-BASED FAULT-TOLERANT ROUTING FOR ALL-OPTICALWDM LANS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

4.1 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664.2 Fault-Tolerant Routing Algorithm . . . . . . . . . . . . . . . . . . . . . . . 67

4.2.1 Circulant Network Architecture . . . . . . . . . . . . . . . . . . . . 684.2.2 Node-Disjoint Lightpaths Setup . . . . . . . . . . . . . . . . . . . . 69

4.3 Network Resource Utilization . . . . . . . . . . . . . . . . . . . . . . . . . 744.4 Network Reliability Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 77

5 TOPOLOGICAL OPTIMIZATION FOR SPARE-SHARING-BASED WAVELENG-TH-ROUTED ALL-OPTICAL NETWORKS . . . . . . . . . . . . . . . . . . . . . 80

5.1 Spare-Sharing-Based Topological Optimization . . . . . . . . . . . . . . . 815.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835.3 Contributions and Chapter Organization . . . . . . . . . . . . . . . . . . . 845.4 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

5.4.1 Matrix-Based Representation . . . . . . . . . . . . . . . . . . . . . 855.4.2 Integer Linear Program Formulation . . . . . . . . . . . . . . . . . 885.4.3 K-Shortest Disjoint Routing Based Formulation . . . . . . . . . . . 915.4.4 Problem Size Exemplification . . . . . . . . . . . . . . . . . . . . . 93

5.5 A Greedy Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 945.5.1 The Underlying Idea . . . . . . . . . . . . . . . . . . . . . . . . . . 945.5.2 Data Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 955.5.3 The Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 975.5.4 Performance Comparison . . . . . . . . . . . . . . . . . . . . . . . 975.5.5 Approximation Ratio Analysis for Working Paths Allocation under

Adequate Wavelength Provision . . . . . . . . . . . . . . . . . . . . 1005.5.6 Complexity and Memory Requirement Analysis . . . . . . . . . . . 101

5.6 Enhanced Heuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1025.6.1 Drawbacks of the Greedy Approach . . . . . . . . . . . . . . . . . 1025.6.2 Two Initial Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . 1035.6.3 Solution Perfection (PER) . . . . . . . . . . . . . . . . . . . . . . . 106

5.7 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1075.7.1 Performance Comparison . . . . . . . . . . . . . . . . . . . . . . . 1075.7.2 Performance Indicator . . . . . . . . . . . . . . . . . . . . . . . . . 112

6 ORDERED-PATH-ENUMERATION-BASED CANDIDATE ROUTING: A FACILI-TATING APPROACH TO SOLVING RWA PROBLEMS FOR OPTICAL NET-WORKS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

6.1 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1176.2 Contributions and Chapter Organization . . . . . . . . . . . . . . . . . . . 118

6

Page 7: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

6.3 Ordered Path Enumeration . . . . . . . . . . . . . . . . . . . . . . . . . . 1186.3.1 Definition of Terminologies . . . . . . . . . . . . . . . . . . . . . . . 1186.3.2 Theorems regarding Ordered Path Enumeration . . . . . . . . . . . 1196.3.3 The Ordered Path Enumeration Algorithm . . . . . . . . . . . . . . 1236.3.4 Container Cover Minimality Detection . . . . . . . . . . . . . . . . . 1236.3.5 Potential Algorithmic Advantages . . . . . . . . . . . . . . . . . . . 125

6.4 Application I: Wavelength Utilization Minimization for RWA with Shared--Path Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1256.4.1 Problem Description . . . . . . . . . . . . . . . . . . . . . . . . . . 1266.4.2 Candidate Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . 1266.4.3 Problem Formulations . . . . . . . . . . . . . . . . . . . . . . . . . 128

6.4.3.1 Notations Used in Three Formulations . . . . . . . . . . . 1296.4.3.2 The Original Formulation . . . . . . . . . . . . . . . . . . 1306.4.3.3 k-Shortest Disjoint Routing Based Formulation . . . . . . 1326.4.3.4 Candidate Routing Based Formulation . . . . . . . . . . . 1336.4.3.5 Formulation Comparison . . . . . . . . . . . . . . . . . . 133

6.4.4 Numerical Results . . . . . . . . . . . . . . . . . . . . . . . . . . . 1356.5 Application II: Topological Optimization for Shared-Path Protection RWA . 136

6.5.1 Problem Description . . . . . . . . . . . . . . . . . . . . . . . . . . 1366.5.2 Candidate Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . 1376.5.3 Problem Formulations . . . . . . . . . . . . . . . . . . . . . . . . . 138

6.5.3.1 Notations . . . . . . . . . . . . . . . . . . . . . . . . . . . 1386.5.3.2 The Original Formulation . . . . . . . . . . . . . . . . . . 1386.5.3.3 k-Shortest Disjoint Routing Based Formulation . . . . . . 1396.5.3.4 Candidate Routing Based Formulation . . . . . . . . . . . 1396.5.3.5 Formulation Comparison . . . . . . . . . . . . . . . . . . 140

6.5.4 Numerical Results . . . . . . . . . . . . . . . . . . . . . . . . . . . 140

7 CONCLUSIONS AND FUTURE WORK . . . . . . . . . . . . . . . . . . . . . . 142

7.1 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1427.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143

APPENDIX

A OPTIMALITY PROOF OF THE PROPOSED NON-OVERLAPPING LIGHTPATHSSETUP ALGORITHM (FOLD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

B DERIVATION OF LS EXPRESSIONS . . . . . . . . . . . . . . . . . . . . . . . 151

REFERENCES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154

BIOGRAPHICAL SKETCH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160

7

Page 8: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

LIST OF TABLES

Table page

2-1 Summary of LS,D expressions for different cases . . . . . . . . . . . . . . . . . 31

2-2 Summary of LS expressions for different N . . . . . . . . . . . . . . . . . . . . . 32

2-3 Summary ofWWAR expressions for different torus sizes . . . . . . . . . . . . . 44

2-4 Wavelength requirement for varied torus sizes . . . . . . . . . . . . . . . . . . 45

3-1 Spare wavelength requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 57

5-1 Basic notations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

5-2 Problem size exemplification: number of variables . . . . . . . . . . . . . . . . 93

5-3 Problem size exemplification: number of constraints . . . . . . . . . . . . . . . 94

5-4 Topological cost comparison among k-shortest path based ILP and the greedyapproach for a randomly generated network with 6 nodes and 6 wavelengthson each link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

6-1 Problem size comparison among formulations: number of variables . . . . . . 134

6-2 Problem size comparison among formulations: number of constraints . . . . . 134

6-3 Route processing time comparison (in second, running on a Windows machinewith a 3GHz processor) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

6-4 Average candidate route disjointedness comparison (averaged over flows) . . . 135

8

Page 9: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

LIST OF FIGURES

Figure page

2-1 A 4× 4 torus backbone connected via optical fibers . . . . . . . . . . . . . . . 22

2-2 General non-overlapping lightpath setup algorithm . . . . . . . . . . . . . . . . 24

2-3 Source-destination positional relationship . . . . . . . . . . . . . . . . . . . . . 24

2-4 Lightpaths setup for X-Y routing . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

2-5 Case I’ lightpaths setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

2-6 Case II’ lightpaths setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

2-7 Summary of lightpaths setup cases in the destination group (N odd) . . . . . . 29

2-8 Summary of lightpaths setup cases in the destination group (N even) . . . . . 30

2-9 WAR demonstration for the 3× 3 torus . . . . . . . . . . . . . . . . . . . . . . . 33

2-10 WAR demonstration for the 4× 4 torus . . . . . . . . . . . . . . . . . . . . . . . 34

2-11 Grouping lightpaths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

2-12 Group mirroring lightpaths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

2-13 New lightpath setup cases with consideration of WAR (N is odd) . . . . . . . . 38

2-14 New lightpath setup cases with consideration of WAR (N is even) . . . . . . . . 39

2-15 WAR algorithm performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

2-16 Reception structure of the controller . . . . . . . . . . . . . . . . . . . . . . . . 46

2-17 Network unreliability analysis for a 4× 4 torus . . . . . . . . . . . . . . . . . . . 49

2-18 TTUR distribution for a 4× 4 torus (f = 0.1) . . . . . . . . . . . . . . . . . . . . 49

2-19 Conditional probabilities of connection failures for a 4× 4 torus . . . . . . . . . 50

2-20 Effects of network failures on network capacity . . . . . . . . . . . . . . . . . . 52

2-21 Average capacity degradation comparison between the proposed 4-lightpathscommunication and single-lightpath communication . . . . . . . . . . . . . . . 53

3-1 Examples of 4 disjoint lightpaths setup between different S-D pairs in a 4 × 4torus (the lightpath in dark red is the working path and the three lightpaths inolive green are spare paths) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

3-2 Wavelength assignment for two spare sharing schemes . . . . . . . . . . . . . 56

9

Page 10: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

3-3 Total numbers of wavelengths required for four WA schemes . . . . . . . . . . 57

3-4 Lightpath state transition diagram for resource-shared WA schemes . . . . . . 58

3-5 An example of spare lightpath re-enabling in a 4× 4 torus . . . . . . . . . . . . 59

3-6 Connection unreliabilities in the 4× 4 torus . . . . . . . . . . . . . . . . . . . . 62

3-7 Conditional network unreliabilities in the 4× 4 torus . . . . . . . . . . . . . . . 63

3-8 Conditional network capacity in the 4× 4 torus . . . . . . . . . . . . . . . . . . 64

3-9 Conditional blocking/success rates in the 4× 4 torus . . . . . . . . . . . . . . . 65

4-1 Circulant-graph-based network architecture and examples of fault-tolerantrouting via establishing node-disjoint lightpaths . . . . . . . . . . . . . . . . . . 68

4-2 Fault-tolerant routing for destination nodes with modulo index difference fromthe source node byW , greater thanW , and smaller thanW . . . . . . . . . . 70

4-3 Last D node-disjoint lightpaths setup for Scenario I and II (the “last-stop” nodegroup and associated routing links are colored green) . . . . . . . . . . . . . . 72

4-4 Link utilization for different destinations with respect to variedW (N = 16) . . . 76

4-5 Wavelength requirement with respect to variedW for all-node simultaneouscommunication (N = 16) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

4-6 Disconnection probability change with fL and fN (N = 16,W = 2,S = 0,D = 8) . 78

4-7 Disconnection probability change with fL for variedW (N = 16,S = 0,D = 8) . . 78

4-8 Disconnection probability distribution across the network (N = 16,W = 2,fL =0.1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

5-1 Topological solutions without and with spare sharing . . . . . . . . . . . . . . . 81

5-2 Validity demonstration of spare sharing . . . . . . . . . . . . . . . . . . . . . . 82

5-3 Element value transition diagram for WAMW. . . . . . . . . . . . . . . . . . . . 96

5-4 Element value transition diagram for WAMB. . . . . . . . . . . . . . . . . . . . 96

5-5 Pseudo code of the greedy approach . . . . . . . . . . . . . . . . . . . . . . . 98

5-6 Solving process for the three ILP instances without reaching optimality afterrunning MOSEK for 8 hours . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

5-7 Original greedy approach solution. . . . . . . . . . . . . . . . . . . . . . . . . . 103

5-8 Link potential based greedy search solution . . . . . . . . . . . . . . . . . . . . 104

10

Page 11: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

5-9 Largest ratio first based search solution . . . . . . . . . . . . . . . . . . . . . . 107

5-10 Pseudo code of the perfection algorithm (PER) . . . . . . . . . . . . . . . . . . 108

5-11 Locations of 16 US major cities . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

5-12 Performance improvements from greedy solutions due to heuristic algorithmsfor varied wavelength provisions . . . . . . . . . . . . . . . . . . . . . . . . . . 110

5-13 Convergence process of the perfection algorithm taking three different initialsolutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

5-14 Weighted wavelength/link utilization for working and backup lightpaths in theLRF+PER induced topological solutions . . . . . . . . . . . . . . . . . . . . . . 111

5-15 Solution performance indication for the network with 5 wavelengths provision . 113

5-16 Weighted wavelength utilization / average bending factor distribution for variedtopological solutions in the networks with 5, 10, 15, 20, and 25 wavelengthsprovision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

6-1 Pseudo code of the ordered path enumeration algorithm . . . . . . . . . . . . . 124

6-2 NSF network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126

6-3 Pseudo code of the candidate routing scheme . . . . . . . . . . . . . . . . . . 128

6-4 Solution optimality comparison between k-shortest disjoint routing and 3-can-didate routing after running MOSEK for 8 hours . . . . . . . . . . . . . . . . . . 136

6-5 Solution optimality comparison between k-shortest disjoint routing and 4-can-didate routing after running MOSEK for 8 hours . . . . . . . . . . . . . . . . . . 136

6-6 Solution performance comparison between k-shortest disjoint routing and 4-can-didate routing after running MOSEK for 8 hours . . . . . . . . . . . . . . . . . . 141

6-7 Solution performance comparison between k-shortest disjoint routing and 5-can-didate routing after running MOSEK for 8 hours . . . . . . . . . . . . . . . . . . 141

A-1 Non-optimality demonstration for a greedy disjoint routing solution . . . . . . . 146

A-2 Path augmentation based 2-shortest disjoint routing . . . . . . . . . . . . . . . 147

A-3 “Progressive” and “regressive” links . . . . . . . . . . . . . . . . . . . . . . . . 148

11

Page 12: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Abstract of Dissertation Presented to the Graduate Schoolof the University of Florida in Partial Fulfillment of theRequirements for the Degree of Doctor of Philosophy

FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND WAVELENGTHASSIGNMENT OPTIMIZATION FOR WDM ALL-OPTICAL NETWORKS

By

Dexiang Wang

December 2011

Chair: Janise Y. McNairMajor: Electrical and Computer Engineering

Wavelength-routed all-optical communication technologies have immense

potential to become a qualified solution to next-generation communication networks

satisfying both long-haul networking and special local communication requirements,

as in avionic communication systems, due to its efficient one-shot data delivery, wide

bandwidth provision, magneto-electrical interference resistance, light-weight signal

carrying medium (fibers), etc. However, fiber optic components are susceptible to a

range of operating faults, such as stability issues in both mechanical placements and

electro-optic operations, especially under hazardous operating conditions. Therefore,

it becomes more than desirable to propose efficient fault-tolerant network architectures

and protocols to meet varied fault-tolerance requirements under certain resource

provision limits.

This dissertation is dedicated to studying optimal resource (in form of wavelengths

and optical links) allocation problems in designing different types of fault-tolerant

Wavelength Division Multiplexing (WDM) network architectures and then searching

for best solutions. A range of classic topologies, such as torus and circulant graphs,

are studied on which optimal fault-tolerant routing algorithms are developed. The

Wavelength Assignment (WA) problem is investigated in depth and a Wavelength

Allocation and Reuse (WAR) algorithm for the two-dimensional N × N torus of arbitrary

sizes is developed which performs close to the best possible solution (lower bound).

12

Page 13: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Spare sharing technology, in favor of reducing redundant resource utilization, is also

studied in fault-tolerant architecture design and different levels of spare sharing are

proposed on the torus topology to evaluate the tradeoff between network connection

reliability and resource utilization. Circulant graph, featuring scalable network sizes and

flexible connectivity, is exploited and a node-disjoint routing algorithm for arbitrary sizes

and connectivity degrees of the circulant graph is proposed to facilitate the multi-level

fault-tolerant implementation of all-optical Local Area Networks (LANs).

From another perspective of fault-tolerant WDM architecture design, topological

optimization under certain resource provision constraints is studied, in which a

number of Integer Linear Programs (ILPs) are developed to model the problem in

varied granularities. Based on the drawbacks analysis of the greedy approach, a

two-phase heuristic algorithm is proposed that jointly considers the routing and

wavelength assignment problems. Numerical simulations show that the proposed

heuristic algorithm performs much better than the traditional method for the Routing

and Wavelength Assignment (RWA) problems in which the routing and wavelength

assignment are treated consecutively in a separate fashion.

This dissertation also touches upon a fundamental problem: ordered path

enumeration (or k-shortest path enumeration). Based on a series of graph-theoretical

derivation, a new ordered path enumeration algorithm is proposed to help form a

pool of possible paths for the flow requests. Then a problem-aware candidate routing

scheme is developed to select candidate routes from the pool of enumerated paths.

This ordered-path-enumeration-based candidate routing method is examined on two

shared-path-protection RWA problems and the numerical results indicate its great

performance advantage over the traditional k-shortest disjoint routing based method.

13

Page 14: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

CHAPTER 1INTRODUCTION

In this chapter, the motivation of investigating the fault-tolerance-oriented resource

allocation optimization problems in the context of WDM all-optical networks is presented.

Then the organization of this dissertation follows.

1.1 Motivation

The technological advance in the area of fiber optic communication especially on

optical switching techniques makes it possible to design WDM all-optical networks that

eliminate all intermediate Optical-Electrical-Optical (OEO) conversions and queuing

process such that the data can be delivered from its source to its destination in a

one-shot fashion [6, 13, 19, 48]. Together with the traditional bandwidth advantage of the

optical networks, all-optical networks enable design of a next-generation communication

architecture that is targeted to satisfy many time-critical and bandwidth-demanding

applications.

Due to many advantages that WDM optical networks can provide, besides

their use in traditional long-haul communication networks, they are expanding their

applications into many other fields where other types of communication technologies

were being used. For example, US NAVY is trying to establish new Society of

Automotive Engineering (SAE) standards for fiber-optic-networks-based avionic onboard

communication systems that were operating via traditional copper-based electrical

communication [29, 39, 44, 45, 63]. The new fiber optic communication based network

design can greatly help lower equipment Size, Weight and Power (SWaP) [11], improve

magneto-electrical interference resistance and provide a much higher communication

bandwidth [18, 43].

Although the wavelength-routed all-optical networks open up a range of

opportunities for applying all-optical technologies to next-generation network design,

it is still not easy to reach an optimal design solution without deep understanding on

14

Page 15: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

resource allocation problems due to the challenge from the limited wavelength resource

and wavelength-dependent implementation cost in the switching fabrics.

In addition, the solutions to modern communication networks are facing stronger

and stronger fault tolerance requirements especially for those applications with stringent

time limit of data delivery under harsh environmental conditions or the risk of disasters

[3, 18].

Therefore, resource-utilization-efficient design solutions that also have to satisfy the

fault tolerance requirements are needed in developing qualified all-optical architectures,

routing and failure recovery protocols, and wavelength assignment algorithms.

This dissertation is dedicated to exploiting efficient ways to address those design

challenges via a comprehensive study on routing, wavelength allocation and topological

optimization under a variety of fault tolerance demands.

1.2 Dissertation Organization

This dissertation is organized into 7 chapters. The motivation of investigating

routing, wavelength assignment, and topology optimization problems in all-optical

WDM networks is presented in this chapter. Through Chapters 2 to 6, the focuses

of discussion are moved to solving above resource-allocation-related problems, for

various applications, in great detail. Chapter 7 concludes this dissertation by highlighting

findings, contributions, and future research goals on this very topic of the dissertation.

The main body of this dissertation is as follows.

Chapter 2 is centered around the torus topology focusing on developing the

Four-way Optimal Link-Disjoint routing algorithm (FOLD) and the Wavelength

Allocation and Reuse (WAR) algorithm in order to enable a fault-tolerant all-terminal

communication architecture with the minimum wavelength requirement for the

next-generation avionic onboard communication systems.

Chapter 3 proposes four wavelength assignment schemes for the 3 redundant

lightpaths (spare lightpaths) out of the 4 link-disjoint paths developed in Chapter

15

Page 16: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

2. A enhanced failure recovery algorithm is proposed to facilitate communication

switches upon failure occurrence. A tradeoff between spare resource allocation and fault

tolerance performance is discerned via an exhaustive simulation over a 4× 4 torus.

Chapter 4 studies the fault-tolerance potential of the circulant graphs via exploiting

node-disjoint routing in a circulant graph of an arbitrary size and connectivity degree.

A node-disjoint routing algorithm that fully leverages the circulant graph connectivity is

proposed for all possible source and destination positions.

In Chapter 5, a spare-sharing-based topological optimization problem is identified

and addressed, which targets to find a low-cost topological solution to adapt the network

topology over the disastrous network attacks (earthquakes, hurricanes, floods, etc.)

The problem is formulated in different forms of Integer Linear Programs (ILPs) and it

is shown that the traditional routing and wavelength assignment decomposition based

method does not perform well for this problem. A two-phase heuristic algorithm, based

on drawback analysis of the greedy approach, is proposed and simulation results

demonstrates its performance and computational advantages over the traditional

methods that are used for solving the RWA-related problems.

In Chapter 6, a new ordered path enumeration algorithm is formally proposed along

the way of a series of theoretical derivations. Based on the pool of enumerated paths,

a candidate routing scheme is developed to identify a set of candidate routes for each

flow request that fit specific problems’ nature. Finally, two shared-path-protection-based

RWA problems are tested and numerical results show great performance advantages

of the ordered-path-enumeration-based candidate routing over the traditional k-shortest

disjoint routing based method.

16

Page 17: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

CHAPTER 2TORUS-BASED FOUR-WAY DISJOINT-LIGHTPATHS COMMUNICATION FOR

AVIONIC WDM LANS

Optical Networking with Wavelength Division Multiplexing (WDM) has immense

potential to satisfy the future needs of both military and commercial communication

systems, due to its high bandwidth provision, low electromagnetic interference, and light

weight [24]. In recent years, there has been an interest in replacing copper with optical

fiber in avionic systems. However, fiber optic components are susceptible to faults

due to their operational uncertainty. In addition, hazardous working conditions make

time-critical communication even vulnerable [18]. The Society of Automobile Engineers

(SAE) has specified various design Requirements for Optical Networks in Avionic

(RONIA) onboard communication, which are briefly listed in Section 2.3. Therefore,

there is a need to design appropriate communication network architectures that are able

to offer both fault tolerance and efficient data delivery to leverage the advantageous

features of WDM technologies.

In this chapter, we focus on the requirements of communication latency and fault

tolerance. We propose setting up multiple (4) non-overlapping1 lightpaths on the torus

toplogy to enable both one-shot data transimission and lightpath-switching-based

failure recovery controlled purely on the receiver side. We first develop an efficient

non-overlapping lightpaths setup algorithm (called FOLD (Four-way OptimaL Disjoint

routing)) and prove its optimality in terms of optical link resource utilization. Then, based

on FOLD, a wavelength allocation and reuse (WAR) scheme enforcing wavelength

continuity is proposed to minimize the wavelength utilization for all-to-all communication.

1 In this chapter, the lightpaths are non-overlapping as long as they are link-disjoint.

17

Page 18: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

2.1 Related Works

2.1.1 Topological Options

Regarding the topological choice in avionic network architecture design, various

optical architectures that encompass a wide range of topologies and routing protocols

have been proposed in [43]. However, most of them do not provide the high-level

connectedness, which is required to achieve high-level fault tolerance [61]. Physically

based on a torus topology, [66] develops different types of logical topologies using a

k-hop routing model. [64] and [51] discuss the routing and wavelength allocation (RWA)

problems under the ring topology. However, these papers provide very limited or no

support against network failures. In [60], we propose a preliminary non-overlapping

four-lightpaths setup algorithm on the torus structure. However, that work does not detail

routing and wavelength allocation for tori of arbitrary sizes, which will be fully addressed

in this chapter.

2.1.2 Fault Tolerance in WDM Optical Networks

With respect to fault-tolerance-oriented studies for WDM optical networks, [41]

provides a comprehensive classification of general mesh-network-based fault-tolerant

technologies. It concludes that path-based protection outperforms link-based protection

in terms of resource utilization, and that dedicated-path protection outperforms

shared-path protection in terms of connection reliability however with the cost of

higher resource utilization. [53] discusses the capacity provisioning bounds for one

failure recovery in torus-based networks and develops both link-based and path-based

restoration strategies. Actually, all restoration-based strategies require non-negligible

processing time on fault detection and resource reallocation. Therefore they may not

meet the requirements of time-critical communication, as of avionic communication.

[62] raises the idea of lightpath diversity to enable a much faster failure response, in

which the source delivers multiple copies of data to the destination by splitting the

light onto multiple independent lightpaths. However, it does not discuss any lightpath

18

Page 19: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

setup algorithms based on concrete topologies. Moreover, since the replacement of

the failed links is almost impossible during missions of flight, and more than one failure

can happen during a short period especially under hazardous operating conditions, all

“1+1”-based or ”1:1”-based2 protections that are well-studied in the literature as in [41],

[21] and [37] may not fit the fault-tolerant needs of avionic communication. Therefore, a

dedicated multi-path protection design, as proposed in this chapter, becomes desirable.

2.1.3 Routing and Wavelength Assignment (RWA)

Concerning routing and wavelength assignment (RWA) algorithms, [67] provides

a general integer linear program (ILP) formulation for the RWA problems and offers

solutions by decoupling the problem into the routing (R) part and wavelength assignment

(WA) part. [26] and [9] propose an RWA algorithm for single-lightpath all-to-all

communication under the torus topology. It achieves optimal wavelength utilization

(demanding N3/8 wavelengths) for a 2-dimensional torus when the one-dimensional size

of the torus, N, is even. It is also shown in [47] that, for an odd N in the 2-dimensional

torus, there exists an optimal RWA scheme requiring N(N2 − 1)/8 wavelengths. Due to

the routing complexity of 4-lightpath setup for any communication pair under the torus

topology, the RWA problem become much harder and it is the focus of this chapter.

[31] discerns the tradeoff of data delivery efficiency and wavelength utilization between

the one-shot all-optical architecture and the multi-hop optical/electrical architecture.

It offers a general multi-hop routing algorithm pursuing balance between fast delivery

and wavelength utilization. [46] develops on-line RWA algorithms for bidirectional ring

and torus architectures, which attempts to minimize average blocking probability for

a new traffic session given a fixed number of wavelengths. However, the algorithm is

2 In the literature, “1+1” refers to the protection scheme consisting of two dedicated lightpaths for eachprotected flow, whereas “1:1” corresponds to the protection scheme in which the secondary (backup) light-path can be used for low-priority traffic transmission until a failure along the primary (working) lightpathoccurs [35] [14].

19

Page 20: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

centralized in nature and requires correct knowledge of the instantaneous RWA over the

entire network. Hence it is not suitable for distributed network implementation.

2.2 Contributions and Chapter Organization

In this chapter, we apply the idea of redundant lightpaths, as in [62], to protect the

network against failures and to achieve fast failure recovery and zero data loss. Because

of its connectivity richness and symmetry, the torus topology is explored. The former

one is used to develop disjoint lightpaths and the latter one is explored when developing

the WAR algorithm.

The major contributions of this chapter include: 1. A torus-based 3-critical-fault-free

WDM backbone architecture that can satisfy requirements of both data delivery

effectiveness and high-level fault tolerance. 2. An optimal 4-lightpaths setup algorithm

(called FOLD) with efficient wavelength allocation and reuse for all-to-all communication

in an arbitrary N × N torus. 3. A comprehensive probabilistic and network capacity

analysis for fault tolerance performance demonstration.

The rest of this chapter is organized as follows: Section 2.3 defines the network

architecture. Section 2.4 describes the non-overlapping lightpaths setup algorithm.

Section 2.5 discusses WAR for all-to-all communication. The controller implementation

is described in Section 2.6. Section 2.7 provides the fault tolerance performance

analysis of the proposed architecture and summarizes this chapter.

2.3 Network Architecture

2.3.1 SAE Requirements and Evaluation Metrics

The SAE design requirements for optical avionic communication systems are

specified briefly as follows [23, 24]:

• Transparency and High Bandwidth - the WDM LANs are expected to supportsvariety of signal protocols for both legacy and new applications without anycompatibility issue

• Scalable and Secure - scalable and reconfigurable systems with potentialMulti-Level Security (MLS) support

20

Page 21: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

• Flexible Networking - WDM LANs can be operated with simple control &management to enable ease of use and ease of future network capacity upgrade

• Fault Tolerant - reliability provision by redundancy and diversity

• Reduce Size, Weight and Power (SWaP) - compact, low power and low cost WDMsystems

The focus of this work is primarily on the fault tolerance requirements of SAE

specification, for which we propose a torus-based multi-lightpath architecture with ability

to tolerate up to 3 critical fiber link failures.

Along with the SAE requirements for avionic WDM LANs, there are a set of metrics

for practical or performance evaluation of the proposed architecture design.

• Recovery Speed. Our work applies dedicated redundant lightpaths protection andhence failure recovery is based on switching reception among disjoint lightpaths,which leads to very fast recovery.

• Reconfiguration (after failure). In our work, no reconfiguration is needed duringfailure recovery because all dedicated lightpaths are set up in advance in thedesign phase and no switching logic needs to be reconfigured.

• Latency. Latency is negligible in our case, because lightpath communicationeliminates Optical-Electrical-Optical (OEO) conversion and queuing process alongthe data delivery path.

• Capacity of Fault Tolerance. Up to 3 critical link failures are supported due to the 4non-overlapping lightpaths setup proposed in this work.

• Size, Weight and Power (SWaP). Our work is expected to be much morecapacity/size-, capacity/weight-, and capacity/power-efficient than the traditionalcopper wiring based avionic systems due to the weight advantage of the fibers andrecent technological advance in optical switching device [11].

2.3.2 Torus-Based Architecture

Due to the advantages mentioned above, the torus is explored as the basic

backbone topology, on which all follow-on architectural and protocol designs are based.

21

Page 22: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Without loss of generality, take the 4 × 4 torus as an example. 16 controllers3 , as

shown in Figure 2-1, are connected via optical fibers carrying WDM signals in a circular

fashion in both row (or X) and column (or Y) directions. Neighboring controllers are

bridged via two unidirectional fibers (Figure 2-1 only shows the connection instead of

two separate links) in order to allow for bidirectional communications. Each controller

has 4 input/output ports connecting 4 neighbors from the east, south, west and north

directions respectively. 11 12 13 14

21 22 23 24

31 32 33 34

41 42 43 44

Figure 2-1. A 4× 4 torus backbone connected via optical fibers

2.3.3 Single-Wavelength Lightpaths

Time-critical communication has requirements of minimum queuing and

transmission delay, as well as reliable protection against network faults, all of which

require multiple lightpaths to be set up between each source-destination (S-D)

pair. Depending on whether wavelength converters are used in the controllers, a

lightpath can either take on a single wavelength or multiple wavelengths on different

links along the path. The use of wavelength converters can lead to better routing

flexibility and eventually better wavelength utilization, but it also results in extra

3 Here we use ”controller” instead of ”node” because the architecture discussed in this chapter is de-signed for backbone use. Different types of second-tier networks may be connected to the backbone viathe ”controller”.

22

Page 23: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

considerable photoelectric device cost. Current optical technologies either rely on

optical-electrical-optical (OEO) conversion or semiconductor optical amplifier (SOA) to

implement wavelength conversion [40]. The former technology introduces OEO delay

while the latter one is still facing stability issues and some operational constraints. In this

work, we enforce single wavelength allocation on a lightpath, which leads to a low-cost

controller design. However, as a result, the design difficulty is moved from the hardware

level to the routing and wavelength allocation level. Next, we describe the lightpaths

setup algorithm to establish four non-overlapping lightpaths for all S-D pairs in an N × N

torus, which enables the network to tolerate at least three critical link failures.

2.4 Non-Overlapping Lightpath Setup Algorithm: Four-way OptimaL Disjointrouting (FOLD)

Assume the optical links fail in an independent fashion with a failure probability f .

The normal operation probability p is thereby 1 − f . Then, given that the four lightpaths

are link-disjoint, the probability of an S-D pair being disconnected is calculated by

Pdisconnection = [1− (1− f )l1][1− (1− f )l2][1− (1− f )l2][1− (1− f )l2]

= (1− pl1)(1− pl2)(1− pl3)(1− pl4),(2–1)

where l1, l2, l3 and l4 denote the lengths of the four non-overlapping lightpaths in number

of hops.

From equation (2–1) we observe that shorter-length lightpaths can lead to a

lower disconnection probability. Besides, from the perspective of resource utilization,

a lightpaths setup that requires the lower number of optical links leads to the lighter

link utilization. Since both of the above design concerns agree on developing short

lightpaths, we propose a greedy approach to set up the four non-overlapping lightpaths.

The general description of the algorithm is listed in Figure 2-2.

Since the network architecture includes two opposite unidirectional optical links for

each one-hop connection, the reverse lightpaths setup from the destination to the source

23

Page 24: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Algorithm1. Initialization: keep all the optical links in the torus structure, S ← Φ, i ← 1 (S is the

lightpath set and i is the iteration indicator of the algorithm)2. While i ≤ 4, do 3:3. Find the shortest path, Path(i), from the source to the destination in the current

torus structure, S ← S ∪ Path(i), remove all the links in Path(i) from the torusstructure, i ← i + 1, go to 2

4. Output S

Figure 2-2. General non-overlapping lightpath setup algorithm

can be obtained by reversing the lightpaths setup from the source to the destination. As

such, the lightpaths setup algorithm works for bi-directional communication.

S

D

dX

d Y

N

Figure 2-3. Source-destination positional relationship

In order to specify in detail how the algorithm works for the torus topology, we first

introduce several notations. As shown in Figure 2-3, dX and dY are the horizontal and

vertical distances from a source to a destination, and N is the one-dimensional size of

the torus topology. If the source and the destination are located in the different rows and

different columns, we call the routing X-Y routing (Scenario 1). If they are in the same

row, we call the routing X routing (Scenario 2), and if they are in the same column, we

call the routing Y routing (Scenario 3).

24

Page 25: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

2.4.1 Scenario 1: X-Y Routing

Use the traditional shortest X-Y routing to find the first lightpath of the length

dX + dY , then use the traditional shortest Y-X routing to find the second lightpath of

the length dY + dX . The rules for the first and second lightpaths setup are the same

regardless of relative S-D positions and the torus size. However, depending on the

magnitude relation among dX , dY and N, the rule of developing the third and fourth

lightpaths varies. We illustrate all four cases in Figure 2-4 and describe them below in

terms of setting up the third and fourth lightpaths.

S1

S2 S

D D1

D2

A Case I

S

D

B Case II

S1 S2

S

D

D2 D1

C Case III

S1 S

S2 D2

D D1

D Case IV

Figure 2-4. Lightpaths setup for X-Y routing

25

Page 26: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Case I (Figure 2-4(A)): 1 ≤ dX ≤ ⌊(N−4)/2⌋ and 1 ≤ dY ≤ ⌊(N−4)/2⌋. Move from

the source vertically and horizontally by one hop along the opposite directions of the

second and first lighpaths, respectively, to the neighbor controllers S1 and S2, then move

from the destination horizontally and vertically by one hop along the same directions of

the second and first lightpaths to the neighbor controllers D1 and D2, then route S1 to D1

using shortest X-Y routing and S2 to D2 using shortest Y-X routing to obtain the third and

fourth lightpaths of the same length dX + dY + 4.

Case II (Figure 2-4(B)): dX > ⌊(N − 4)/2⌋ and dY > ⌊(N − 4)/2⌋. Move from the

source horizontally along the opposite direction of the first lightpath until the controller

in the column next to that of the destination is reached. Then move vertically using

shortest Y routing to the controller right next to the destination. Close the route by the

last hop to form a lightpath of the length N − dX + dY . Similarly, move from the source

vertically along the opposite direction of the second lightpath until the controller in the

row next to that of the destination is reached, then move horizontally using shortest X

routing to the controller right next to the destination, and close the route by the last hop

to form another lightpath of the length N − dY + dX . The third lightpath is the shorter

one while the fourth lightpath is the longer one of these two lightpaths, depending on

magnitude of dX and dY .

Case III (Figure 2-4(C)): dX > ⌊(N − 4)/2⌋ and 1 ≤ dY ≤ ⌊(N − 4)/2⌋. Use

the technique for routing the first lightpath in case II to form the third lightpath of length

N − dX + dY . For the fourth lightpath, move from the source vertically by one hop along

the opposite direction of the second lightpath to its neighbor S1, then go horizontally

by one hop along the shortest X routing direction to S2. Make a vertical turn and route

along the shortest Y routing direction over the row of the destination by one hop to D2.

Switch the route into horizontal direction along the shortest X routing direction to the

neighbor of the destination D1, and finally close the route by the last one hop to the

destination with the lightpath length dX + dY + 4.

26

Page 27: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Case IV (Figure 2-4(D)): 1 ≤ dX ≤ ⌊(N − 4)/2⌋ and dY > ⌊(N − 4)/2⌋. Use the

technique for routing the second lightpath in case II to form the third lightpath of length

N − dY + dX . For the fourth lightpath, move from the source horizontally by one hop

along the opposite direction of the first lightpath to its neighbor S1. Go vertically by one

hop along the shortest Y routing direction to S2. Make a vertical turn and route along the

shortest X routing direction over the column of the destination by one hop to D2. Switch

the route into the vertical direction along the shortest Y routing direction to the neighbor

the destination D1. Finally, close the route by the last one hop to the destination with the

lightpath length dX + dY + 4.

2.4.2 Scenario 2: X Routing

Use the traditional shortest X routing to find the first lightpath with length dX . The

rule of setting up the first lightpath is the same for all cases in Scenario 2 regardless of

relationship between dX and N. However, the setup is different for the second, third and

fourth lightpaths as described below. S4 D4

S1 D1

S3 S D S3

S2 D2

Figure 2-5. Case I’ lightpaths setup

27

Page 28: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Case I’ (Figure 2-5): 1 ≤ dX ≤ ⌊(N − 8)/2⌋. Move from the source vertically

by one hop towards the north to S1, route along the shortest X routing direction to the

north neighbor of the destination D1, and close by the last hop the route with length

dX + 2 to form the second lightpath. Route the path symmetrically towards the south to

form the third lightpath with the length dX + 2. We call these two paths mirroring paths.

Finally, move from the source along the opposite direction of the first lightpath by one

hop to the neighbor S3, turn to the north by two hops to S4, switch into the horizontal

direction along the shortest X routing direction over the column of the destination by one

hop to D4, and then turn to the south and move by two hops to the east neighbor of the

destination D3. Close the route by the last hop to form the fourth lightpath with the length

dX + 8.

S D

Figure 2-6. Case II’ lightpaths setup

Case II’ (Figure 2-6): dX > ⌊(N − 8)/2⌋. Use the technique above to form the two

symmetrical lightpaths of the length dX + 2. Then move from the source horizontally

along the opposite direction of the first lightpath to the destination to form another

lightpath of the length N − dX . We call this path the complementary path. If dX + 2 is

28

Page 29: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

smaller than N − dX , the first two lightpaths of the length dX + 2 are the second and third

lightpaths and the one of the length N − dX is the fourth lightpath. Otherwise, the order

is reversed accordingly.

2.4.3 Scenario 3: Y Routing

This is exactly the mirrored scenario of Scenario 2 except the main routing direction

is the Y direction and dX is replaced with dY . Corresponding to Cases I’ and II’, we

introduce Cases I” and II” for this scenario (routing is not shown).

Theorem 2.1. The above 4-way non-overlapping lightpaths setup reaches optimal

link-disjoint routing in terms of the total number of links used.

Proof: See Appendix A for proof. dX=(N-1)/2

dy =

(N-5)/2

dy =

(N-1)/2

Case I’ Case II’

S D D D D

D D D D D D D D

D

D D D D D D D D D

D D D D D D D D D

D D D D D D D D D

Case I Case I

dX=(N-1)/2

dX=(N-3)/2

dX=(N-7)/2

Case III

Case II

Case IV

Case IV Case II

Case III

Case I’’

Case II’’

Figure 2-7. Summary of lightpaths setup cases in the destination group (N odd)

2.4.4 Destination Group

We define a destination group with respect to a source as a group of destinations,

as shown in Figures 2-7 and 2-8, which uniquely contribute to the complete set of S-D

combinations, of cardinality N2(N2−1)/2, in an N×N torus. All the lightpath setup cases

can be summarized into the destination group. According to the relationship among dX ,

dY and N, the destination group can be partitioned into subgroups corresponding to

Cases I, II, III, IV, I’, II’, I” and II” as shown in the dashed line surrounded areas in Figure

2-7 and Figure 2-8.

29

Page 30: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

S D D D D

D D D D D D D

D

D D D D D D D D

D D D D D D D D

D D D D D

Case I Case I

dX=N/2

dX=N/2-1

dX=N/2-3 dX=N/2-1

Case II Case II

Case III Case III

Case IV

Case IV

Case I’ Case II’

Case I’’

Case II’’

dy =

N/2-2

dy =

N/2

Figure 2-8. Summary of lightpaths setup cases in the destination group (N even)

In the next section, we propose a wavelength allocation and reuse scheme for torus

all-to-all 4-way communications with a target to minimize wavelength utilization.

2.5 Wavelength Allocation and Reuse (WAR)

A naive way to allocate wavelengths is to assign a separate wavelength to each S-D

pair, such that the four non-overlapping lightpaths for one S-D pair take on the same

wavelength. As a result, the number of wavelengths required for all S-D communications

is given by the number of S-D pairs of a torus of size N × N:

Wnaive =N2(N2 − 1)

2. (2–2)

However, the four non-overlapping lightpaths are not necessarily associated with the

same wavelength. An efficient wavelength allocation algorithm can allow reuse of the

same wavelength on multiple lightpaths of different S-D pairs, with the goal of achieving

better wavelength utilization.

We define link wavelength (LW) as the wavelength associated with a specific optical

link. An LW is identified by both the link index and the associated wavelength.

2.5.1 A Lower Bound (Ideal Wavelength Utilization)

We first calculate a lower bound, i.e. the lowest possible number of wavelengths

required when all lightpaths for all S-D pairs are set up and no link wavelength is left idle.

30

Page 31: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

This lower bound can be expressed as

WLower bound =Lall−to−all2N2

, (2–3)

where Lall−to−all is the total number of LWs required for all-to-all communication using

the optimal lightpaths setup algorithm proposed in Section 2.4, and 2N2 is the number of

LWs that one wavelength can provide throughout an N × N torus.

Table 2-1. Summary of LS,D expressions for different casesLS,D ExpressionsLS,D(I ) 4(dX + dY + 2)LS,D(II ) 2(N + dX + dY )LS,D(III ) N + 2(2dY + dX + 2)LS,D(IV ) N + 2(2dX + dY + 2)LS,D(I ′) 4(dX + 3)

LS,D(II ′) N + 2(dX + 2)

LS,D(I ′′) 4(dY + 3)

LS,D(II ′′) N + 2(dY + 2)

We define the total number of LWs required for an S-D pair as LS,D , which includes

the total number of hops on the four lightpaths of the S-D pair. Table 2-1 provides a

summary of LS,D expressions derived based on the proposed non-overlapping lightpaths

setup algorithm (FOLD), with respect to different cases of the source and the destination

locations. Then Lall−to−all can be calculated as

Lall−to−all =∑S,D

LS,D = N2 × LS , (2–4)

where LS is the number of LWs required for a specific source to set up the 4-lightpath

connections to all the destinations in its destination group (see Figures 2-7 and 2-8).

N2 × LS makes the equality hold due to the symmetric characteristic of the torus

structure, which puts an even position to all the sources regardless of their positions in

the torus structure. The calculation of LS is:

LS =∑D

LS,D , (2–5)

31

Page 32: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

where the expressions of LS with respect to various ranges and parities of N are listed in

Table 2-2. The detailed derivation of those expressions is provided in Appendix B.

Table 2-2. Summary of LS expressions for different NLS ExpressionsLS (2 ≤ N ≤ 5, N is odd) (3N3 − 2N2 + 7N − 8)/2LS (2 ≤ N ≤ 5, N is even) (3N3 − 2N2 + 8N − 8)/2LS (6 ≤ N ≤ 9, N is odd) (2N3 + 9N2 − 28N + 17)/2LS (6 ≤ N ≤ 9, N is even) (2N3 + 9N2 − 26N + 16)/2LS (N ≥ 10, N is odd) (N3 + 4N2 − 5N − 32)/2LS (N ≥ 10, N is even) (N3 + 4N2 − 4N − 32)/2

After calculating LS , we can use equations (2–3) and (2–4) to calculateWLower bound

for an N × N torus.

We note that due to the structural symmetry of the N × N torus, all the links have

the same set of positional relations to each controller in the network. In addition, all

the controllers have the same lightpath setup scheme. Therefore, the total number

of lightpaths arranged on each link is the same throughout the whole network, which

means that the number of wavelengths required for the wavelength-convertible torus

network is alsoWLower bound .

Next, we show how the wavelengths, for different torus sizes, are assigned to all the

lightpaths to which wavelength continuity is enforced.

2.5.2 Wavelength Allocation and Reuse (WAR) Algorithm

In order to minimize wavelength utilization and however to maintain wavelength

continuity on all the lightpaths, we need to find the best lightpaths arrangement on each

wavelength, which leads to the best resource utilization. The following discussion is

organized in the order of increasing torus sizes.

N = 2: Wavelength allocation for the 2 × 2 torus is trivial, i.e., the naive way

to allocate the wavelengths described at the beginning of this section can achieve

optimality (6 wavelengths). So we start description of the proposed WAR algorithm from

the 3× 3 torus as shown in Figure 2-9.

32

Page 33: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

A

B

C

D

E

F

Figure 2-9. WAR demonstration for the 3× 3 torus

N = 3: In total there are 36 S-D pairs for the 3 × 3 torus, half of which require X-Y

routing and another half of which require X or Y routing. For the S-D pairs requiring

X-Y routing, Figure 2-9(A) shows the arrangement of two of four lightpaths (in red)

for each of 3 S-D pairs (horizontally circulated) on one wavelength, and Figure 2-9(B)

shows the arrangement of the other two lightpaths (in red) for each of 3 S-D pairs

(vertically circulated) on another wavelength. As observed in Figure 2-9(A) andure

2-9(B), an unallocated ring (in blue) is left unallocated on each wavelength. If we

rotate the arrangement in Figure 2-9(A) vertically twice and rotate the arrangement in

Figure 2-9(B) horizontally twice, followed by a reversion of all above arrangements, we

can accommodate the lightpaths setups for all X-Y routing S-D pairs (18 pairs) on 12

wavelengths and there will be in total 12 unallocated rings on different wavelengths

left evenly distributed in the torus structure, which can be used to arrange two

complementary lightpaths for 6 X-routing and 6 Y-routing S-D pairs as shown in blue

in Figures 2-9(A) and 2-9(B). For the X-routing S-D pairs, the other two lightpaths

are shown in Figures 2-9(C) and 2-9(D) respectively (in red) for 3 S-D pairs. There is

still room for arranging 4 mirroring lightpaths of Y-routing S-D pairs shown in blue in

Figures 2-9(C) and 2-9(D). As we rotate the arrangements shown in Figures 2-9(C) and

2-9(D) horizontally twice, all requirements for arranging the mirroring lightpaths of all 9

X-routing S-D pairs and 6 Y-routing S-D pairs are satisfied. Arrangement of mirroring

lightpaths for the rest 3 Y-routing S-D pairs can be made on 2 extra wavelengths as

shown in Figures 2-9(E) and 2-9(F). Thereby, 2 × 3 + 2 additional wavelengths are

33

Page 34: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

used to the 12 wavelengths discussed previously. Finally one last wavelength is needed

to provide 6 rings to accommodate 6 pairs of complementary lightpaths that the 12

wavelengths cannot. Following this approach, in total, 21 wavelengths (WWAR(3×3) = 21)

are required to enable all-to-all communications for the 3 × 3 torus, compared with

WLower bound(3×3) = 19 andWNaive(3×3) = 36 as calculated by equations (2–2) and (2–3).

A

B

C

D

E

F

G

H

I

J

Figure 2-10. WAR demonstration for the 4× 4 torus

N = 4: For the 4 × 4 torus, there are in total 120 S-D pairs, 72 of which require X-Y

routing, 24 of which require X routing and the rest 24 of which require Y routing. Figures

2-10(A) and 2-10(B) show how to arrange four lightpaths (in red) on two wavelengths

for the source and the destination one hop away from each other in both X and Y

directions. By circularly rotating and reversing the arrangements, we can enable

4-lightpaths connections for all such S-D pairs (32 pairs in total) using 2 × 4 × 2 = 16

wavelengths and there are 32 unallocated rings evenly distributed throughout the torus

structure on the 16 wavelengths. Figures 2-10(C) and 2-10(D) show how to arrange four

lightpaths on two wavelengths for the source and the destination one hop away from

each other in one direction and two hops away from each other in the other direction.

Similarly, by rotating horizontally and mirroring along the diagonal the arrangements,

34

Page 35: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

we can enable the 4-lightpaths setup for all those S-D pairs (32 pairs in total) using

2 × 4 × 2 = 16 wavelengths with 16 unallocated rings evenly distributed across

the torus. The 8 S-D pairs with the source and the destination two hops away from

each other in both X and Y directions can have the 4-lightpaths setups as shown in

Figures 2-10(E) and 2-10(F). By rotating horizontally by one hop, the lightpaths setup

for those 8 S-D pairs is made using 4 fully utilized wavelengths. The 32 + 16 = 48

evenly distributed unallocated rings can be used for arranging the complementary

lightpaths of the 48 S-D pairs which require X or Y routings. The two mirroring lightpaths

of those 48 S-D pairs can be arranged as shown in Figures 2-10(G), 2-10(H), 2-10(I)

and 2-10(J). Figures 2-10(G) and 2-10(H) show how the two mirroring lightpaths are

arranged for the source and destination two hops away from each other in X direction

via routing the second lightpath with the same length in the opposite X direction. By

rotating horizontally by one hop and mirroring along the diagonal the arrangements,

all the mirroring lightpaths for 2-hop-away (both horizontally and vertically) S-D pairs

(16 pairs in total) can be arranged on 8 wavelengths, on which one mirroring lightpath

for 32 one-hop-away S-D pairs can also be arranged as shown. The other mirroring

lightpath setup can be finalized as shown in Figures 2-10(I) and 2-10(J), together

with their mirrored setups along the diagonal, which in total requires 4 wavelengths.

Therefore, the 4-lightpaths setup for 4 × 4 torus all-to-all communications can be

enabled by 16 + 16 + 4 + 8 + 4 = 48 wavelengths (WWAR(4×4) = 48), compared with

WLower bound(4×4) = 46 andWNaive(4×4) = 120.

N ≥ 5: When N grows large, all routing cases (I, II, III, IV, I’, II’, I” and II”) will

appear. Instead of illustrating the WAR algorithm for each torus size, starting from the

5 × 5 torus, we develop a general method to deal with lightpaths arrangement in light of

the following observations.

As shown in Figure 2-11(A), the third lightpaths (in red) of N Case-I-routing S-D

pairs can be piled up along the diagonal direction together with the second lightpaths (in

35

Page 36: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

N-dX-dY-2

N-d

X-d

Y-2

dY

d X

A

|dX-dY|

|dX -d

Y |

B

N-dX-dY-2 dY+2

N-d

X-d

Y-2

d X

-2

C

N-2dX

N-2

d Y

D

N-dX-dY

N-d

X-d

Y

E

F

Figure 2-11. Grouping lightpaths

36

Page 37: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

blue) of other N S-D pairs on the same wavelength, which are formed by interchanging

dX and dY of the first N S-D pairs. Similarly the fourth lightpaths and first lightpaths can

be arranged together on one wavelength for above S-D pairs of Case I.

As shown in Figure 2-11(B), the third lightpaths (in red) of N S-D pairs (dX > dY )

in cases II or III can be piled up along the diagonal direction together with the third

lightpaths (in blue) of other N S-D pairs (dX < dY ) in cases II or IV on the same

wavelength as shown in Figure 2-11(B).

As shown in Figure 2-11(C), the fourth lightpaths of N S-D pairs in case III can be

piled up diagonally, and the fourth lightpaths of N S-D pairs in case IV can be piled up

similarly by mirroring above setup along the diagonal direction.

For all the X-Y routing cases (I, II, III, IV), the first and second lightpaths of N

S-D pairs of the same positional relationship can be piled up together on the same

wavelength circularly in the diagonal direction as shown in Figure 2-11(D), and the first

lightpaths of N S-D pairs can be piled up together with the second lightpaths of N S-D

pairs of diagonally mirrored positional relation to the former N S-D pairs as shown in

Figure 2-11(E).

For each destination controller with one dimension distance of N/2 from the source

(in Cases II, III, IV) when N is even, if the fourth lightpath can be routed as in Case II,

then N fourth lightpaths (in red) can be piled up together with N second lightpaths (in

blue) for the same set of S-D pairs on one wavelength, as shown in Figure 2-11(F).

We call those destination controllers edge controllers. Hence, we can group those

destination controllers into Case II to achieve higher wavelength utilization through

trading the disjoint routing optimality for those destinations.

Similarly, when N is odd, we group the four destination controllers right above and

besides two bottom corner destination controllers in the destination group into their

neighboring partitions (Cases III and IV), in order to make their fourth lightpaths piled up

in the way shown in Figure 2-11(C).

37

Page 38: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

N-dX

Figure 2-12. Group mirroring lightpaths

Finally, for the source and destination located in the same row or column, a full ring

can accommodate the two complementary lightpaths and N mirroring lightpaths can be

piled up in a way shown in Figure 2-12. Since efficient arrangement of multiple fourth

lightpaths for the S-D pairs (refer to Figure 2-5) of cases I’ and I” is almost impossible,

we apply the complementary routing for Cases II’ and II” to the S-D pairs of cases I’ and

I”. D

S D D D D

D D D D D D D D D

D D D D D D D D D

D D D D D D D D D

D D D D D D D D D

Case I Case I

dX=(N-1)/2

dX=(N-3)/2

dX=(N-5)/2

Case II Case II

Case III Case III

Case IV Case IV

Case II’

dy =

(N-5)/2

dy =

(N-1)/2

Case II’’

dX=(N-1)/2

D

D D

D

D

D

D

2N wls 2.5N wls N wls

Figure 2-13. New lightpath setup cases with consideration of WAR (N is odd)

Hence, new routing diagrams considering wavelength allocation and reuse on the

destination group for both parities of N become Figures 2-13 and 2-14. Different dashed

38

Page 39: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

2N wls 2.5N wls N wls

S D D D D

D D D D D D D D

D D D D D D D D

D D D D D D D D

D D D D D

Case I Case I

dX=N/2

dX=N/2-1

dX=N/2-2

dX=N/2-1

Case II Case II

Case III

Case IV Case IV

Case II’

Case II’’

dy =

N/2-2

dy =

N/2

Case III

Figure 2-14. New lightpath setup cases with consideration of WAR (N is even)

line covered areas represent the different routing cases described in Section 2.4. Next,

we show the general WAR algorithm for N ≥ 5 in following procedures.

Firstly, for each destination controller in the partition of Case I, two wavelengths

are needed to arrange four lightpaths of N such S-D pairs of the same positional

relationship along the diagonal direction (as shown in Figure 2-11(A)), and after rotating

the arrangement along either X or Y direction N times all N2 S-D pairs of such positional

relationship are arranged with 4 lightpaths set up on 2N wavelengths.

For each destination controller in the partition of case II on the diagonal, Figure

2-11(B) can be applied to arrange N third and N fourth shortest lightpaths on one

wavelength, and the N first and N second shortest lightpaths can be arranged on one

wavelength in the way shown in Figure 2-11(E).

For the edge controllers when N is even, two wavelengths are needed to pile four

lightpaths up for N such S-D pairs of the same positional relationship, where the second

and fourth shortest lightpaths are arranged using Figure 2-11(F), two third shortest

lightpaths coming from two S-D pairs mirroring each other along the diagonal can be

arranged on one wavelength using Figure 2-11(B) and two first shortest lightpaths

coming from two S-D pairs mirroring each other along the diagonal can be arranged on

39

Page 40: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

one wavelength using Figure 2-11(E). Hence, in general, we need 2N wavelengths to

complete lightpaths setup for N2 S-D pairs of such positional relations.

For the destination controllers in the area of cases III and IV, we notice that the

fourth shortest lightpath in general cannot be piled up with other lightpaths so only N of

them occupy one wavelength as shown in Figure 2-11(C), although the first and second

shortest lightpaths can be piled up together onto one wavelength as shown in Figure

2-11(D) and the third shortest lightpath for the destination controller in case III can be

piled up with the third shortest lightpath for the destination controller in case IV as shown

in Figure 2-11(B). Therefore, in general 2.5N wavelengths are needed to set up four

lightpaths for all such N2 S-D pairs.

Secondly, we observe that the unused links for the destination controllers in case I

can accommodate the same amount of arrangement for other destination controllers in

case I. For example, after two lightpaths arrangement for the destination controller with

dX = 1 and dY = 1 we can have N − dX − dY − 2 = N − 4 connected unused links

in both X and Y directions, which can accommodate another two lightpath arrangement

for the destination controller with dX = (N − 5)/2 and dY = (N − 7)/2 (when N is odd)

or with dX = (N/2) − 3 and dY = (N/2) − 3 (when N is even). As a result, in fact we

only need one wavelength to arrange four lightpaths of N S-D pairs with the destination

controllers colored in olive green. Besides, when N is odd, in Case III or IV, for the two

destination controllers by two hops away from the diagonal, the fourth shortest lightpaths

can be piled up with the first or the second shortest lightpaths (since dX = dY + 2 or

dY = dX + 2), so the wavelength requirement for these destination controllers decreases

form 2.5N to 2N for N2 such S-D pairs. The areas in different colors in Figures 2-13 and

2-14 indicate different number of wavelengths required in the WAR algorithm.

Finally, we need to deal with the lightpaths arrangement for the destination

controllers in the same row or column of the source controller. Since there are many

unallocated links left during lightpaths setup for X-Y routing S-D pairs, many lightpaths

40

Page 41: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

for those X or Y routing destination controllers can be arranged on those unallocated

links.

While N is odd:

N ≥ 11: The unallocated links (as shown in Figure 2-11(E)) for the first shortest

lightpath for the destination controller of coordinates (dX = (N − 3)/2, dY = 1) and

the second shortest lightpath for the destination controller of coordinates (dX = 1,

dY = (N − 3)/2) can accommodate N mirroring lightpaths in the diagonal direction (as

shown in Figure 2-12) for the destination controller of coordinates (dX = (N − 1)/2,

dY = 0), the other half of the mirroring lightpaths can be arranged together similarly with

other two lightpaths for above two destination controllers. In addition, the unallocated

links (as shown in Figure 2-11(A)) on two allocated wavelengths for the destination

controllers of coordinates from (dX = (N − 5)/2, dY = 1) to (dX = (N − 5)/2,

dY = (N − 5)/2) can accommodate two mirroring lightpaths of the destination controllers

of coordinates from (dX = (N − 3)/2, dY = 0) to (dX = 2, dY = 0). The last two

mirroring lightpaths for the destination controller (dX = 1, dY = 0) can be arranged with

the first and second shortest lightpaths for two destination controllers of coordinates

(dX = (N − 1)/2, dY = (N − 3)/2) and (dX = (N − 3)/2, dY = (N − 1)/2) separately.

Following the same idea, we can use the unallocated links for the corresponding

destination controllers in the left half to accommodate two mirroring lightpaths for the

destination controllers of coordinates from (dX = 0, dY = 1) to (dX = 0, dY = (N − 1)/2).

For the two complementary lightpaths of the length from 1 to N − 1, we explore the

unallocated links for the first and second shortest lightpaths arranged in the way shown

in Figure 2-11(D) for the destination controllers of case III and IV. We observe that,

except for the lightpath of length N − 1, all the lightpaths can be arranged using those

unallocated links. The unarranged lightpaths (of length N−1) need extra N wavelengths.

41

Page 42: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

So, the total number of wavelengths required to arrange all lightpaths is

WWAR =

N − 72× N − 5

2× 2× 1 + N − 5

2× 2× 2

+

[(N − 12

)2−(N − 52

)2]× 2× 2.5− 12× 0.5

× N + N

=1

2N(N2 + 12N − 55) .

(2–6)

N = 9: Now the first and second shortest lightpaths to the destination controllers of

coordinates (dX = (N − 3)/2, dY = (N − 7)/2) and (dX = (N − 7)/2, dY = (N − 3)/2)

need to be arranged in the way shown in Figure 2-11(E) in order to accommodate X

or Y routing lightpaths, so wavelength requirement becomes 2.5 for these destination

controllers andWWAR becomes

WWAR =

N − 72× N − 5

2× 2× 1 + N − 5

2× 2× 2

+

[(N − 12

)2−(N − 52

)2]× 2× 2.5− 8× 0.5

× N + N

=1

2N(N2 + 12N − 51) .

(2–7)

N = 7: Similarly since the first and second shortest lightpaths to the destination

controllers of coordinates (dX = (N − 5)/2, dX = (N − 1)/2) and (dX = (N − 1)/2,

dY = (N−5)/2) need to be arranged in the way shown in Figure 2-11(D), the wavelength

requirement for these destination controllers becomes 2.5 and henceWWAR becomes

WWAR =

N − 72× N − 5

2× 2× 1 + N − 5

2× 2× 2

+

[(N − 12

)2−(N − 52

)2]× 2× 2.5− 4× 0.5

× N + N

=1

2N(N2 + 12N − 47) .

(2–8)

N = 5: Since destination controllers of coordinates (dX = (N − 3)/2 = 1, dY = 1)

and (dX = 1, dY = (N − 3)/2 = 1) become the same controllers, the unallocated links

of the arrangement of the first and second shortest lightpaths for this controller can only

42

Page 43: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

accommodate N mirroring lightpaths in the diagonal direction (as shown in Figure 2-12)

for the destination controller of coordinates (dX = (N − 1)/2 = 2, dY = 0), extra 2N

wavelengths are needed to accommodate the other half of above mirroring lightpaths.

HenceWWAR becomes

WWAR =

N − 72× N − 5

2× 2× 1 + N − 5

2× 2× 2

+

[(N − 12

)2−(N − 52

)2]× 2× 2.5− 8× 0.5

× N + N + 2N

=1

2N(N2 + 12N − 43) .

(2–9)

While N is even and N ≥ 6:

Similar to the method for N being odd, we use the unallocated links for the

destination controllers of coordinates (dX = (N/2)− 1, dY = 1), (dX = (N/2)− 2, dY = 1)

through (dX = (N/2) − 2, dY = (N/2) − 2) to accommodate the two mirroring lightpaths

for the destination controllers of coordinates from (dX = (N − 2)/2, dY = 0) to (dX = 1,

dY = 0). However, the lightpaths for the destination controller (dX = N/2, dY = 0) are

left without being arranged, so together with the lightpaths for the destination controller

(dX = 0, dY = N/2), extra 2N wavelengths are needed to arrange those lightpaths. In

addition, 3N wavelengths are needed to arrange 3 complementary lightpaths with length

N − 1, N − 2 and N − 3 for the destination controllers in the same row or column of the

source by 1, 2 and 3 hops away. ThenWWAR becomes

WWAR =

(N − 62

)2× 1 + 2×

[(N − 12

)2−(N − 62

)2]× 2

+N − 42× 4× 0.5

× N + 2N + 3N

=1

2N(N2 + 10N − 32) .

(2–10)

The expressions ofWWAR with respect to different torus sizes are listed in Table

2-3. Based on theWWAR expressions, we can plot the number of wavelengths required

for all-to-all communications with comparison amongWNaive ,WWAR andWLower bound ,

43

Page 44: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Table 2-3. Summary ofWWAR expressions for different torus sizesWWAR ExpressionsWWAR (N = 2) 6WWAR (N = 3) 21WWAR (N = 4) 48WWAR (N = 5) N(N2 + 12N − 43)/2WWAR (N = 7) N(N2 + 12N − 47)/2WWAR (N = 9) N(N2 + 12N − 51)/2WWAR (N ≥ 11, N is odd) N(N2 + 12N − 55)/2WWAR (N ≥ 6, N is even) N(N2 + 10N − 32)/2

as shown in Figure 2-15. The numerical details for tori with one-dimensional size

ranging from 2 to 10 are shown in Table 2-4. From the results, we can observe the great

wavelength saving via using the proposed WAR algorithm and thatWWAR is actually very

close to the lower boundWLower bound . It is also noticed that WAR performs better when

N is even than when N is odd, mainly due to the lightpath arrangement easiness for an

even N as shown in Figure 2-14. For the tori in small sizes, such as 2×2, 3×3, 4×4, the

WAR-derived results are equal or very close to the best possible results (lower bounds).

This hence can lead to elimination of wavelength converters from the controller design

without noticeable wavelength utilization degradation.

0 5 10 15 20 25 300

2000

4000

6000

8000

10000

12000

14000

16000

18000

One Dimension Size (N) in NxN Torus

Num

ber

of w

ls R

equi

red

for

All−

to−

All

Com

mun

icat

ions

NaiveWARLower bound

Figure 2-15. WAR algorithm performance

44

Page 45: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Table 2-4. Wavelength requirement for varied torus sizesN WLower bound WWAR WNaive2 6 6 63 19 21 364 46 48 1205 88 105 3006 154 192 6307 237 301 11768 352 448 20169 488 621 324010 664 840 4950

We note that the number of wavelengths approaches an unusually large number

(ten thousand when the dimension size N is above 25,) which may seem unrealistic.

These results are academically informative. However, the research project that this

chapter is based upon is limited to a more realistic sized 4 × 4 torus, which supports

16 backbone controllers and requires 48 wavelengths on each one-hop connection, or

N = 4 in Table 2-4 [45].

2.6 Controller Implementation

The actual controller implementation needs to integrate functionalities of the

controller as the source, destination and intermediate router together. As a data source,

data targeting to a specific destination need to be modulated onto wavelengths allocated

by the WAR algorithm and then multiplexed with all “pass-through” wavelengths before

being sent. As an intermediate router, all-optical 1 × 3 switches can be used to switch

the signal from a specific input port to any of the remaining 3 output ports based on the

lightpaths setup. The use of all-optical switches eliminates OEO conversion along all

lightpaths and hence enables efficient one-shot transmission. Finally, as a data sink,

the specific wavelengths are dropped based on the WAR algorithm again from all 4

receiving directions. The controller reception structure is shown in Figure 2-16.

In the fault-free case, 4 copies of demodulated data are buffered and the one

received from the shortest lightpath is passed onto the application layer for processing.

45

Page 46: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

123..

Choose the buffer to read

To the Application layer

123..

123..

123..

LSN update

Msg ID(for packet retirement)

Figure 2-16. Reception structure of the controller

Upon data reception by the application layer, the data received from the remaining 3

directions are deleted from the corresponding buffers.

Upon occurrence of a link failure, a special type of message called Link Status

Notification (LSN) will reach each controller through broadcast from the detecting

controller. The controller then can make decision of whether or not to switch its receiving

direction based on knowledge of the lightpaths setup.

2.7 Performance Analysis

In this section, we first introduce probabilistic models to analyze network connection

reliabilities for the proposed architecture. Then we show the impact on network

throughput caused by a series of network faults to provide additional insight on the

network fault tolerance performance.

2.7.1 Probabilistic Analysis

The fault tolerance metrics used are two-terminal reliability (TTR), one-to-all-others

reliability (OAR) and all-terminal reliability (ATR) for comprehensive analysis. TTR

indicates communication reliability for a single S-D pair. OAR signifies the ”broadcast”

reachability from a specific source, while ATR reflects the functioning possibility of the

whole network.

To carry out the probabilistic analysis, we associate the probability of failure (f ) to

each one-hop connection between neighboring controllers. Under the assumption of

46

Page 47: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

independent one-hop connection failure with identical probability, general approaches to

calculating probabilities of TTR, OAR and ATR are as follows.

The probability of two-terminal reliability is

PTTR = 1−e∑

i=λSD

CSDi fi(1− f )e−i , (2–11)

where f is the uniform probability of failure for all one-hop connections, e is the number

of one-hop connections in the network, λSD is the minimum number of one-hop

connection failures required to disconnect the S-D pair and CSDi is the number of

failure sets with respect to the source (S) and destination (D) of cardinality i .

The probability of one-to-all-others reliability is

POAR = 1−e∑i=λS

CSi fi(1− f )e−i , (2–12)

where λS is the minimum number of one-hop connection failures required to disconnect

the source from at least one controller in the rest of the network and CSi is the number of

failure sets of cardinality i with respect to the source (S).

The probability of all-terminal reliability is:

PATR = 1−e∑i=λ

Ci fi(1− f )e−i , (2–13)

where λ is the minimum number of one-hop connection failures required to disconnect

any S-D pairs and Ci is the number of failure sets of cardinality i with respect to any S-D

pairs.

Instead of showing TTR, OAR and ATR, this chapter presents analysis of

two-terminal unreliability (TTUR), one-to-all-others unreliability (OAUR) and all-terminal

unreliability (ATUR), which take on complementary probabilities of TTR, OAR and ATR

respectively. The lower the above probabilities, the better the network reliability can be

achieved.

47

Page 48: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

The general calculation approaches to calculating probabilities of network

connectedness, as shown in equations (2–11), (2–12) and (2–13), have been proved to

belong to NP-hard problems [61]. Researchers usually apply bounding techniques or

use Monte Carlo sampling methods to obtain reliability measures. However, with respect

to the proposed non-overlapping 4-lightpaths setup algorithm (FOLD) and fault tolerance

protocol, the TTUR probability can be calculated by a simple closed-form expression.

For the two-terminal connectedness, it can be shown that only after all four

lightpaths are blocked can the S-D pair lose connectivity. Hence, the probability of

TTUR is given by the same expression as in equation 2–1, rewritten as follow

PTTUR = (1− pl1)(1− pl2)(1− pl3)(1− pl4) . (2–14)

Due to the symmetric nature of the torus structure, there is no difference for

selection of the source controller, so we fix the source at the controller 11 and take a

4 × 4 torus as an example of analysis (refer to Figure 2-1 for controller indices). Figure

2-17 shows the probabilities of two-terminal disconnection (PTTUR) of 11 from 12 and

from 33, which are two extreme cases in terms of the distance between the source

and the destination in a 4 × 4 torus. It can be observed that the connection reliability

gets greatly improved by comparing with the probability of one path failure (such as the

path between 11 and 33). The distribution of PTTUR from the controller 11 across the

network to all other controllers is given in Figure 2-18, which provides insight on relative

positional impact of the source and the destination in a torus on TTUR.

With respect to the one-to-all-others and the all-terminal reliability analysis, following

equations (2–12) and (2–13), for all possible combinations of one-hop connection

failures, the one-to-all-others connectivity and the all-terminal connectivity are examined

under the proposed lightpaths setup. An exhaustive calculation of POAUR and PATUR

for a 4 × 4 torus is carried out and the results are shown in Figure 2-17. The results

show that the proposed fault-tolerant architecture offers good reliability even for

48

Page 49: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

10−2

10−1

100

10−8

10−6

10−4

10−2

100

Probability of Link Failure (f)

Pro

babi

lity

of D

isco

nnec

tion

One path failure between 11 and 33All−terminal11 to all othersTwo−terminal between 11 and 33Two−terminal between 11 and 12

Figure 2-17. Network unreliability analysis for a 4× 4 torus

Figure 2-18. TTUR distribution for a 4× 4 torus (f = 0.1)

all-terminal connectivity under regular failure stress (f ≪ 0.1). It is expected that

the one-to-all-others connectivity is less reliable than the two-terminal connectivity and

the all-terminal connectivity is least reliable.

Sometime people may be concerned about the chance of connection sustenance

upon occurrences of a number of one-hop connection failures. The conditional PTTUR ,

POAUR and PATUR on a fixed number of one-hop connection failures are given by

49

Page 50: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

equations (2–15), (2–16) and (2–17):

PTTUR |n one−hop connection failures =CSDn(en

) (2–15)

POAUR |n one−hop connection failures =CSn(en

) (2–16)

PATUR |n one−hop connection failures =Cn(en

) (2–17)

where(en

)is the number of combinations of n one-hop connections out of the one-hop

connection set of cardinality e. The meanings of rest items in above formulae are

the same as they are in equations (2–11), (2–12) and (2–13). Figure 2-19 shows the

results for those conditional evaluations of connection reliability. The results testify our

architecture design against any 3 critical cuts without loss of any network connectivity.

The results also show the trends of conditional reliability variation with the number of

failed one-hop connections. It can be observed that there is a big probability (> 0.8) for a

two-terminal connection to survive over even 8 one-hop connection failures.

Figure 2-19. Conditional probabilities of connection failures for a 4× 4 torus

50

Page 51: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

2.7.2 Network Capacity Analysis

Not only is the connection reliability affected by the network faults, but also the

network capacity, because the blocked transmissions will degrade the network capacity.

We define the network capacity as the sum of communication capacities of all S-D

pairs. Assume the communication is operated via optical lasers with a transmission

rate of 1 Gbps. Then the network capacity simply equals the product of the number of

communication pairs and the bidirectional transmission rate (2 Gbps) in the failure-free

case. Here we consider all-to-all communication and hence the failure-free network

capacity is given by

Tfault−free =N2(N2 − 1)

2C , (2–18)

where C is the bidirectional transmission rate.

The network capacity upon a number of one-hop connection failures can be

measured in terms of average degraded network capacity, best-case degraded network

capacity and worst-case degraded capacity. The average degraded network capacity is

the expected network capacity under a certain number of one-hop connection failures

(n) that can evenly take place across the network. It is defined by

Tavg | n failures = Tfault−free − C(en)∑i=1

Di(en

) , (2–19)

where Di is the number of disconnected S-D pairs caused by the i th n one-hop

connection failure combination.

The worst-case degraded capacity under n one-hop connection failures is defined

by

Tworst | n failures = Tfault−free − C ·maxiDi , (2–20)

where the index i varies from 1 to(en

).

51

Page 52: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

The best-case degraded capacity under n one-hop connection failures is defined by

Tbest | n failures = Tfault−free − C ·miniDi . (2–21)

We still use the 4 × 4 torus to exemplify the fault impact on network capacity and

demonstrate fault tolerance performance of the proposed architecture. The calculation of

all degraded network capacities in equations (2–19), (2–20) and (2–21) is via exhaustive

failure enumeration and connection check due to the acceptable size of the selected

torus.

Figure 2-20. Effects of network failures on network capacity

Figure 2-20 shows how the network capacity degrades with the number of one-hop

connection failures under the proposed 4-lightpaths protective architecture. First, it

is proved again that the network can survive over 3 arbitrary faults without loss of

network capacity. Second, the huge gap between the best-case capacity and worst-case

capacity indicates the great impact of positional difference of failures on the network

capacity. Besides, the best-case and worst-case capacities also serve as bounds when

predicting the network capacity under a given number of connection failures. Last,

on average, the network can still maintain 92% of its original capacity after 8 one-hop

connections fail, which count for 25% of one-hop connections in the network.

52

Page 53: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Figure 2-21. Average capacity degradation comparison between the proposed4-lightpaths communication and single-lightpath communication

Figure 2-21 shows how different the network capacity degrades for the proposed

4-lightpaths architecture and the 1-lightpath architecture with the routing and wavelength

assignment proposed by [9] respectively. The advantage of 4-way protection against

network capacity degradation is evident as shown in the figure especially for a small

number of one-hop connection failures, which is the normal case when a network

operates.

In this chapter, we propose a torus-based fault-tolerant all-optical architecture

that applies four optimal non-overlapping lightpaths to achieve a fast 3-failures-free

protection. In order to minimize wavelength utilization, we also propose a wavelength

allocation and reuse scheme via a comprehensive discussion over varied sizes of torus.

Besides efficient data delivery via lightpath communication and fast failure recovery via

redundant non-overlapping lightpaths protection, the proposed network architecture

shows a huge fault tolerance performance improvement that is demonstrated via

comprehensive connection reliability and network capacity analysis. All in all, the

architecture proposed in this chapter has a great potential to become a satisfying

solution to modern avionic communication systems.

53

Page 54: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

CHAPTER 3TRADEOFF STUDY ON FAULT TOLERANCE CAPACITY AND RESOURCE

UTILIZATION FOR THE TORUS-BASED ALL-OPTICAL WDM LANS

In the last chapter, we discuss the torus-based fault tolerance scheme for

all-terminal communications, in which an optimal 4-way fault-tolerant routing algorithm

(FOLD) is proposed and a wavelength allocation and reuse (WAR) scheme is developed

to allocate wavelength resources to disjoint lightpaths in a dedicated fashion. Actually,

the wavelengths allocated to the protective (spare) lightpaths have potential to be shared

by those lightpaths and that results in a lower level of spare wavelength utilization. In

this chapter, we examine the wavelength efficiency in fault tolerance by comparing

the dedicated wavelength assignment schemes with shared wavelength assignment

schemes.

The main contributions of this chapter are as follows: 1. a tradeoff study is

conducted to examine the protection efficiency of spare wavelengths for four Wavelength

Assignment (WA) schemes spanning from no protection, through shared protections, to

dedicated protection in the spare wavelength utilization spectrum; 2. two spare sharing

schemes are developed to allocate wavelength resources to spare lightpaths in order to

lower the overall spare wavelengths demand; 3. a comprehensive reliability evaluation

framework is exhibited and extensive simulation results provide insight into the essential

performance-cost tradeoff of fault tolerance and protective resource allocation.

The rest of this chapter is organized as follows. Section 3.1 describes four WA

schemes for all-to-all communications spanning from the lowest end to the highest end

of the spare wavelength utilization spectrum. The failure recovery scheme is illustrated

in Section 3.2. Section 3.3 provides mathematical formulations of network reliabilities.

Section 3.4 describes simulation techniques, shows simulation results, and concludes

this chapter.

54

Page 55: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

3.1 Wavelength Assignment Schemes

In this section, we develop four WA schemes along the spare wavelength utilization

spectrum, each of which protects the network at a different level. The first WA scheme

does not assign any protective wavelengths to spare lightpaths and hence provides no

protection to failed connections. Hence, this WA scheme only needs to consider WA

for working paths. As indicated in the last chapter, there exist optimal single-lightpath

RWA solutions for both parities of N in a N × N torus (demanding N3/8 and N(N2 − 1)/8

wavelengths for even and odd N respectively). In the optimal RWA solution, each

lightpath is routed via its shortest path and all the wavelengths allocated are fully

occupied. Since no spare wavelength is allocated in this WA scheme, we label this WA

scheme ”No Spare” (NS).

The second WA scheme, in addition to allocating wavelengths to working paths in

the way as described in the first WA scheme (NS), groups all the spare paths of all S-D

pairs, as depicted in Figure 3-1 in green, onto one single spare wavelength. Since this

very spare wavelength is intensively shared by all spare paths of all S-D pairs, high-level

resource contention is expected during failure-recovery-induced lightpath switches.

However, since there are three alternative disjoint paths that are possible to take over

the communication, the probability of a successful switch is higher than the traditional

”1:1”- or ”1+1”-based protection, which is an advantage of four-way disjoint routing

in fault tolerance. We label this WA scheme ”Single Spare” (SS). This WA scheme is

illustrated in Figure 3-2(A).

The third WA scheme, instead of allocating only one spare wavelength to the entire

group of spare paths, assigns one spare wavelength to a subgroup of the spare paths

that belong to the S-D pairs whose working paths are allocated on the same wavelength

(working wavelength). Due to lowered contention level on the spare wavelengths, the

successful switching probability is expected to be higher than the second WA scheme

(SS). Besides, this WA scheme can tolerate one arbitrary link failure because the

55

Page 56: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

A Source and destination in dif-ferent dimensions

B Source and destination in thesame dimension

Figure 3-1. Examples of 4 disjoint lightpaths setup between different S-D pairs in a 4× 4torus (the lightpath in dark red is the working path and the three lightpaths inolive green are spare paths)

A Single Spare (SS)

B Spare Working Interleaving (SWI)

Figure 3-2. Wavelength assignment for two spare sharing schemes

communications carried on the working lightpaths affected by the link failure can be

individually switched to one of their link-disjoint spare paths without resource conflicts.

We label this WA scheme ”Spare Working Interleaving” (SWI) and this scheme is

illustrated in Figure 3-2(B).

The fourth WA scheme, by allocating dedicated wavelengths to each working and

spare lightpaths , avoids resource conflicts resulting from the failure-recovery-induced

switches. Thereby, the network will be able to tolerate at least three arbitrary link

failures without loss of any connections. The RWA solution to this dedicated four-way

all-terminal communication is described in the last chapter for all possible sizes of an

56

Page 57: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

N×N torus. Although the solution achieves good optimality, the total wavelength number

required is more than 4 times of that for pure-working-path communication (in the ”No

Spare” scheme), which only requires 8 wavelengths for the 4 × 4 torus. The gain in fault

tolerance capacity may not balance the spare wavelength expenditure. We label this WA

scheme ”DEDICATED”. Figure 3-3 shows the total numbers of wavelengths required for

the four WA schemes when N varies. Table 3-1 summarizes the number of protective

(spare) wavelengths required by the four WA schemes described above for the N × N

torus.

1 2 3 4 5 6 7 80

50

100

150

One dimension size (N) in an NxN torus

Tot

al n

umbe

r of

wav

elen

gths

req

uire

d

NSSSSWIDedicated

Figure 3-3. Total numbers of wavelengths required for four WA schemes

Table 3-1. Spare wavelength requirementsWA scheme NS SS SWI DEDICATED

Number or equivalent numberof protective wavelengthsfor a N × N torus

0 1

N is even:N3/8N is odd:N(N2 − 1)/8

N is even:W ∗WAR − N3/8N is odd:W ∗WAR − N(N2 − 1)/8

∗ WWAR is the number of wavelengths allocated for dedicated 4-way protection. Theexpressions ofWWAR for different N can be found in Table 2-3. In general,WWAR is morethan 4 times of the wavelength number required by pure-working-path communicationespecially when N goes large.

57

Page 58: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

3.2 Failure Recovery

The first WA scheme does not involve any fault tolerance support while the fourth

WA scheme simply makes the destination independently switch reception from among

the four dedicated lightpaths. The complicacy of failure recovery only comes from the

second and third WA schemes because of the need to handle the resource conflicts

among spare lightpaths. ! " !#!Figure 3-4. Lightpath state transition diagram for resource-shared WA schemes

Figure 3-4 shows possible state transitions of lightpaths, which are essentially

triggered by failure recovery. The transition between SPARE and UNAVAIL may result

from resource conflicts, for which an example is demonstrated in Figure 3-5, where the

spare lightpath from 31 to 33 experiences two state transitions, SPARE→ UNAVAIL and

UNAVAIL→ SPARE, successively.

Once a failure occurs to a link, more than one working lightpath can be affected.

The order of selecting failed working paths for recovery makes difference to the fault

tolerance results because of the resource conflicts among their spare paths. We

examine two selection strategies as follows.

• RANDOM: randomly select a working lightpath for recovery from the pool ofaffected working lightpaths

• SHORTEST: select the working lightpath with the shortest spare lightpath

58

Page 59: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

A blocked spare lightpath (31→ 33)

B Re-enabled spare lightpath

C

Figure 3-5. An example of spare lightpath re-enabling in a 4× 4 torus

3.3 Reliability Analysis

We evaluate the fault tolerance performance of all four WA schemes via measuring

the connection reliabilities and the under-failure network capacity.

The connection reliabilities are equivalently captured by the probability of their

complementary events, connection unreliabilities, as defined as follows.

• Two-Terminal UnReliability (TTUR), One-to-All-others UnReliability (OAUR), andAll-Terminal UnReliability (ATUR):

PTTUR =

e∑i=λSD

(ei)∑k=1

CSDkP iif i(1− f )e−i , (3–1)

POAUR =

e∑i=λS

(ei)∑k=1

CSkP iif i(1− f )e−i , (3–2)

and

PATUR =

e∑i=λ

(ei)∑k=1

Ck

P iif i(1− f )e−i , (3–3)

• Conditional TTUR, OAUR, and ATUR on a given number (n) of bidirectional fiberlink (bilink) failures:

59

Page 60: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

PTTUR | n bilink failures =

(en)∑k=1

CSDkPnn

, (3–4)

POAUR | n bilink failures =

(en)∑k=1

CSkPnn, (3–5)

and

PATUR | n bilink failures =

(en)∑k=1

CkPnn. (3–6)

The notations used in the above six equations are explained as follows. f is the

uniform bilink failure probability. e is the total number of bilinks in the torus. λSD , λS ,

and λ are the minimum numbers of bilink failures required to disconnect a specific S-D

pair, the source (S) from any of other controllers, and any S-D pair, respectively.(ei

)is the number of combinations of i bilink failures coming from e possible bilinks. P ii is

the number of permutations for the selected i bilink failures. CSDk , CSk , and Ck are the

numbers of bilink failure permutations disconnecting a specific S-D pair, the source (S)

from any of other nodes, and any S-D pair, respective, for the k th failure combination.

In order to evaluate the impact of bilink failures on the network capacity, we

calculate the average network capacity conditioned on a number of bilink failures as

follows.

Tavg | n bilink failures = Tfault−free − C ·1

Pen

Pen∑i=1

Di (3–7)

Tfault−free is the fault-free network capacity, which is actually the sum of capacities

of all source-destination pairs. C is the full transmission rate for a S-D pair (1 Gbps

assumed in the simulation that follows). Di is the number of disconnected S-D pairs for

the i th permutation of n bilink failures.

60

Page 61: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

3.4 Simulation and Numerical Results

All of above reliability performance metrics involve counting the number of bilink

failure permutations that result in disconnections. We again resort to the Monte-Carlo

sampling technique to uniformly generate 100, 000 random bilink failure permutations

when the cardinality of the bilink failure set exceeds 5. We then approximate the

calculations of the above equations using Monte-Carlo samples triggered simulation. A

4 × 4 torus is selected as the example network and numerical results are reported as

follows.

Figure 3-6 shows the connection unreliability difference among different WA

schemes and path selection orders. The difference is evident because of the quantity

difference in spare resource provision. Also observed is that the path selection order

makes difference in the second WA scheme (SS) but makes negligible difference in the

third WA scheme (SWI). This is because resource contention in SS is much severer

than in SWI such that selection of shorter spare paths makes the spare resources

more efficiently utilized. However, SHORTEST selection favors the S-D pair with a

shorter spare lightpath while disfavors the S-D pair with a longer spare lightpath. This is

observed in Figures 3-6(A) and 3-6(B) for which the shortest spare lightpaths of the S-D

pairs 11 → 22 (refer to Figure 3-1 for node indexing) and 11 → 33 are of length 2 and

4. The conditional connection unreliabilities, on a number of bilink failures, are shown

in Figure 3-7. Besides the similar trend observed from unconditional unreliabilities, it

is confirmed that the SWI and DEDICATED WA schemes make the network able to

tolerate one and three arbitrary bilink failures, respectively.

Figure 3-8(A) shows the difference of capability in maintaining network capacity

upon a certain number of bilink failures among different WA schemes. Further insight

into the wavelength efficiency can be obtained in Figures 3-8(B) and 3-8(C). The former

one shows the comparison of per-wavelength capacity among different WA schemes.

The latter one shows the comparison of per-spare-wavelength capacity gain, which is

61

Page 62: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

A PTTUR (11→ 22) B PTTUR (11→ 33)

C POAUR (from 11)

Figure 3-6. Connection unreliabilities in the 4× 4 torus

defined as the ratio of the overall capacity gain (from that of WA scheme NS) to the

number of spare wavelengths. The number of spare wavelengths for a 4 × 4 torus is

0, 1, 8, and 48 for the four WA schemes respectively. From Figure 3-8(B), we observe

that, although the DEDICATED scheme achieves the best overall capacity protection

(as shown in Figure 3-8(B)), it is the least cost-efficient WA option. From Figure 3-8(C),

we observe that SS is the most spare-resource-efficient WA scheme since the only

spare wavelength is maximally utilized due to the highest-level failure-recovery-induced

switching demand on it.

62

Page 63: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

A Conditional PTTUR (11→ 22) B Conditional POAUR (from 11)

C Conditional PATUR

Figure 3-7. Conditional network unreliabilities in the 4× 4 torus

The underlying reason for the performance difference among different WA schemes

is revealed by Figure 3-9. Figure 3-9(A) shows the average switch blocking rate

conditioned on a number of bilink failures, which is defined as the ratio of the number of

unsuccessful failure-recovery-induced switches (no available lightpath for switch) to the

total number of switching trials. Reversely, Figure 3-9(B) shows the successful switching

rate contributed, on average, by a spare wavelength. This, from another perspective,

indicates the wavelength efficiency in tolerating failures. The comparison shown in

63

Page 64: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

A Average network capacity (Gbps) B Average per-wavelength capacity (Gbps/wl)

C Average per-spare-wavelength capacity gain(Gbps/wl)

Figure 3-8. Conditional network capacity in the 4× 4 torus

Figure 3-9(B) among different WA schemes has an indication similar to the comparison

shown in Figure 3-8(C) in wavelength efficiency.

This chapter proposes and examines four WA schemes on the torus topology,

three of which provide fault tolerance support in different degrees. The pure

working-lightpath-oriented WA scheme demands no spare wavelength provision

and however supports no failure protection. The dedicated 4-way protection WA

scheme provides the highest level of fault tolerance but does not efficiently leverage

the spare wavelengths. In the middle of the spare wavelength utilization spectrum, the

64

Page 65: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

A Blocking rate (%) B Per-spare-wavelength success rate (%/wl)

Figure 3-9. Conditional blocking/success rates in the 4× 4 torus

two spare-resource-sharing WA schemes provide reasonable balance between spare

resource utilization and fault tolerance capacity in the sense of wavelength-protection

efficiency in supporting failure-recovery-induced switches and maintaining network

capacity.

65

Page 66: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

CHAPTER 4CIRCULANT-GRAPH-BASED FAULT-TOLERANT ROUTING FOR ALL-OPTICAL WDM

LANS

Alluring features of the all-optical WDM network, such as huge bandwidth provision,

negligible transmission latency, and resistance to electromagnetic interference, identify

the all-optical WDM network itself a promising design option for the next-generation

mission-crucial local area networks (LANs), such as avionic onboard communication

systems. However, the combination of the hazardous working condition and operational

uncertainty of fiber-optic devices makes the communication subject to faults. Hence,

it becomes critical to equip the communication system with qualified fault tolerance

capability in the network design phase.

4.1 Related Work

In the recent literature, redundant lightpaths protection becomes a fault-tolerant

solution that can meet the fast recovery requirement. In [62], the authors focus on

physical layer issues such as the model of combining signals from different lightpaths,

optimality of the decision rule and error probability bound. At the network layer, our

previous work studies the routing and wavelength allocation issues based on a 2-D

torus topology [60]. However, the 2-D torus topology puts certain restrictions both on

the number of supported nodes and on the network connectivity, because the number

of supported nodes has to be a product of two integers (numbers of nodes in a row

and a column respectively) and each node is of a connection degree 4. Therefore no

more than 4 disjoint lightpaths can be established simultaneously. In [61], a reliability

analysis model is constructed for the all-optical network over various network topologies:

circulant, Harary, Cages and Moore graphs. It concludes that circulant graphs are

principal candidate topologies. However, its reliability analysis is purely based on

associating a failure probability onto each link and does not consider any routing issues.

In this chapter, we focus on circulant graphs and explore their fault-tolerant

potentials. In [32], a directed circulant graph is studied and an algorithm is provided

66

Page 67: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

for establishing n node-disjoint paths between a node pair. However, the algorithm

puts a limitation on the number of supported nodes and on the network connectivity.

In this work, instead of the directed graph, we consider undirected graph and hence

double the network connectivity and fault-tolerance capacity. In addition, we relax the

limitations on the number of supported nodes and on the network connectivity. In other

words, any number of supported nodes and node degree can be accommodated in

our architecture. In [16], based on a circulant graph containing k redundant nodes, a

k-fault-tolerant solution is proposed to maintain isomorphism of the original graph under

any k node failures. This design applies only for parallel computing processors because

the computation can be switched between any two processors after one of them fails.

However, in our architecture we assume each node is positionally tied to a data source

or sink and hence arbitrary functional switch between nodes is almost impossible.

The major contributions of this chapter are follows: 1. we propose a

circulant-graph-based all-optical WDM LAN architecture; 2. we develop a fault-tolerant

routing algorithm that fully explores the circulant graph connectivity via setting up a

maximum number of node-disjoint lightpaths; 3. we analytically calculate network

resource utilization measured by the numbers of required links and wavelengths; and 4.

we derive a reliability model combining effects of both node and link failures.

The rest of this chapter is organized as follows: Section 4.2 defines the network

architecture and describes the node-disjoint lightpaths setup algorithm. Based on

the lightpaths setup, network resource utilization is analyzed in Section 4.3. Section

4.4 provides a probabilistic model and shows the network-reliability related numerical

results, followed by a chapter summary in the end.

4.2 Fault-Tolerant Routing Algorithm

In this section, we describe the circulant-graph-based all-optical network

architecture that offers flexibility in the number of supported nodes and network

67

Page 68: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

connectivity. Then based on the architecture definition, we develop a node-disjoint

lightpath setup algorithm to fully explore fault-tolerance capability.

4.2.1 Circulant Network Architecture A C12(1, 2, 3)

D S

B 6 node-disjoint lightpathsbetween nodes 0 and 3

D S

C 6 node-disjoint lightpathsbetween nodes 0 and 6

D S

D 6 node-disjoint lightpathsbetween nodes 0 and 1

Figure 4-1. Circulant-graph-based network architecture and examples of fault-tolerantrouting via establishing node-disjoint lightpaths

A circulant graph CN(A), where N is a positive integer and A ⊆ a | 1 ≤ a ≤ ⌊N/2⌋,

is a graph of N vertices1 in which the i th vertex is adjacent to the (i + j)th and (i − j)th

vertices2 for each j in set A. For instance, CN(1, ..., ⌊N/2⌋) corresponds to a complete

graph and CN(1) represents a ring. Thereby we define the circulant-graph-based

1 We index the N vertices from 0 to N − 1 clockwise.

2 If (i + j) or (i − j) is beyond the range (0,N − 1), their modulo values (by N) should be taken.

68

Page 69: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

all-optical architecture as follows: 1. replace all vertices by data delivery and reception

nodes; 2. replace all edges by two unidirectional optical fibers running in opposite

directions. Each node has direct optical connections to 2|A| other nodes3 . Since

transmission latency is negligible in all-optical networks which deliver data through

all-optically-switched lightpaths, the graph diameter is not a great concern and hence we

fix the offset set A = 1, ...,W , whereW ∈ 1, ..., ⌊N/2⌋. The value ofW depends on

fault-tolerance requirement (the number of disjoint lightpaths). A circulant-graph-based

architecture example is shown in Figure 4-1(A), in which 12 nodes are connected in a

circulant fashion and every node has 6 direct optical connections to its index-closest

neighbors.

4.2.2 Node-Disjoint Lightpaths Setup

Since in the network architecture described above each node can simultaneously

send and receive data through its 2W neighboring nodes4 , there may exist 2W disjoint

paths for any communication pairs. We assume that the destination node uses the same

lightpath in reverse to reach the source so ”directed lightpath” can be simply replaced

by ”lightpath”. In this section we develop a 2W -node-disjoint-lightpaths setup algorithm

for any source and destination. Due to the symmetric nature of circulant graphs, in our

discussion we fix the source at node 0 and vary the destination node index from 1 to

⌊N/2⌋. According to the positional relationship between the destination node (indexed

by D) and the node indexed byW , the discussion on fault-tolerant routing falls into

following three cases respectively.

3 If N is even and A = 1, ...,N/2 (a complete graph), the number of direct connections from node ibecomes 2|A| − 1 because node (i + N/2) and node (i − N/2) are actually the same node.

4 For a complete graph containing a even number of nodes in whichW = N/2, the number of neigh-boring nodes of each node becomes 2W − 1. The fault-tolerant routing in this case is trivial to discussbecause any source can take one-hop direct connection and other 2W − 2 two-hop node-disjoint con-nections to reach any destination regardless of the source and destination positions. Hence the followingdiscussion only focuses on circulant graphs in which each node has exactly 2W neighbors.

69

Page 70: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

D=W

S=0

A

D>W

S=0

B

D<W S=0

C

Figure 4-2. Fault-tolerant routing for destination nodes with modulo index difference fromthe source node byW , greater thanW , and smaller thanW

Case 1: D = W . As shown in Figure 4-2(A), the firstW node-disjoint lightpaths can

be set up clockwise as follows:

0→ 1→ D

0→ 2→ D

...

0→W − 1→ D

0→ D

OtherW node-disjoint lightpaths are set up counter-clockwise as follows:

0→ N − 1→ N − 1−W → ...→ N − 1− (⌈N−1−WW⌉ − 1)W →W

0→ N − 2→ N − 2−W → ...→ N − 2− (⌈N−2−WW⌉ − 1)W →W

...

0→ N −W → N −W −W → ...→ N −W − (⌈N−W−WW

⌉ − 1)W →W

The idea of routing aboveW lightpaths is to make each lightpath stride over

the maximum number of nodes at each hop without hitting the same node that other

lightpaths may choose to pass through. The maximum striding can also minimize

the number of hops needed, which corresponds to a resource saving and connection

reliability improvement under certain link or node reliability. Obviously above 2W

lightpaths are node-disjoint and valid paths because there is no node overlap between

70

Page 71: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

different paths except at the source and the destination. Figure 4-1(B) shows an

example of lightpaths setup for Case 1.

Case 2: W < D ≤ ⌊N/2⌋. As shown in Figure 4-2(B), firstW node-disjoint

lightpaths can be set up clockwise as follows:

0→ 1→ 1 +W → ...→ 1 + (⌈D−1W⌉ − 1)W → D

0→ 2→ 2 +W → ...→ 2 + (⌈D−2W⌉ − 1)W → D

...

0→W →W +W → ...→W + (⌈D−WW⌉ − 1)W → D

The otherW node-disjoint lightpaths are set up counter-clockwise as follows:

0→ N − 1→ N − 1−W → ...→ N − 1− (⌈N−1−DW⌉ − 1)W → D

0→ N − 2→ N − 2−W → ...→ N − 2− (⌈N−2−DW⌉ − 1)W → D

...

0→ N −W → N −W −W → ...→ N −W − (⌈N−W−DW

⌉ − 1)W → D

Similarly, above 2W lightpaths are also node-disjoint and valid paths. Figure 4-1(C)

shows an example of lightpath setup for Case 2.

Case 3: 0 < D < W . As shown in Figure 4-2(C), first 2W − D node-disjoint

lightpaths can be set up as follows:

0→ 1→ D

0→ 2→ D

...

0→ D

0→ D + 1→ D

...

0→W → D

0→ N − 1→ D

...

0→ N − (W −D)→ D

71

Page 72: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

The first D paths are purely clockwise routed, followed byW − D clockwise

/counterclockwise routed paths and then byW − D counterclockwise/clockwise routed

paths.

Finally, the remaining D node-disjoint lightpaths can be developed in a way such

that each lightpath tries the biggest stride counter-clockwise until hits the group of nodes

indexed fromW + 1 toW + D. Then the direct connections from that group of nodes

to destination node D finalize the lightpaths setup. There are two scenarios in which

the D lightpaths hit the group of nodes indexed fromW + 1 toW + D in different ways,

as shown in Figures 4-3(A) and 4-3(B) respectively. The lightpaths setup is detailed as

follows.

D<W S=0

A

D<W S=0

B

Figure 4-3. Last D node-disjoint lightpaths setup for Scenario I and II (the “last-stop”node group and associated routing links are colored green)

Scenario I: [N − (W +D + 1)]%W ≤ [(N −W +D − 1)− (W +D + 1)]%W .

“%” is the modulo operator. The left-hand side represents the index distance that

the lightpath taking the biggest stride (W ) in its first hop, named as heading lightpath,

has from the nodeW + D + 1 before hitting the node group (indexed fromW + 1 to

W + D). The right-hand side represents the index distance that the lightpath taking the

smallest stride (W − D) in its first hop, named as tailing lightpath, has from the node

72

Page 73: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

W + D + 1 before hitting the node group (indexed fromW + 1 toW + D). The equality

holds when D = 1, i.e., the heading lightpath becomes the same as the tailing lightpath.

We term the first distance as H and the second distance as T . This scenario states that

the last closest counterclockwise touch before hitting the node group is from the heading

lightpath and a stride of H + D will make all D lightpaths uniquely hit one node in the

node group. The D lightpaths are then developed as follows.

0→ N−W+D−1→ ...→ N−W+D−1−(⌈ (N−W+D−1)−(W+D)W

⌉−1)W →W+D → D

0 → N −W + D − 2 → ... → N −W + D − 2 − (⌈ (N−W+D−2)−(W+D−1)W

⌉ − 1)W →

W +D − 1→ D

...

0→ N −W → ...→ N −W − (⌈ (N−W )−(W+1)W

⌉ − 1)W →W + 1→ D

Scenario II: [N − (W +D + 1)]%W ≥ [(N −W +D − 1)− (W +D + 1)]%W .

This scenario states that the heading lightpath will run into the node group together

with other D −T − 1 successive lightpaths. The remaining T lightpaths can take a stride

of index distance D to uniquely hit the rest T nodes in the node group. The detailed D

lightpaths setup is as follows.

0→ N−W+D−1→ ...→ N−W+D−1−(⌈ (N−W+D−1)−(W+D)W

⌉−1)W →W+T → D

...

0 → N −W + D − T → ... → N −W + D − T − (⌈ (N−W+D−T )−(W+D)W

⌉ − 1)W →

W + 1→ D

0→ N−W +D−T−1→ ...→ N−W +D−T−1−(⌈ (N−W+D−T−1)−(W+D)W

⌉−1)W →

W +D → D

...

0→ N −W → ...→ N −W − (⌈ (N−W )−(W+D)W

⌉ − 1)W →W + T + 1→ D

From the discussion of 2W lightpaths development for case 3, it can be concluded

that they are also node-disjoint and valid paths. Figure 4-1(D) shows an example of

lightpath setup for Case 3.

73

Page 74: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Theorem 4.1. The circulant graph CN(1, ...,W ), whereW ∈ 1, ..., ⌊N/2⌋, is

both a 2W (or 2W − 1 for a complete graph consisting of an even number of vertices)-

edge-connected and a 2W (or 2W − 1)-vertex-connected graph.

Proof: The above redundant lightpath setup algorithm shows that there exist

2W (or 2W − 1) edge-disjoint paths between any pairs of nodes, so the removal of

arbitrary 2W − 1(or 2W − 2) edges cannot disconnect any node pairs and therefore

CN(1, ...,W ) is 2W (or 2W − 1)-edge-connected. In addition, since the 2W (or 2W − 1)

paths are also vertex-disjoint, which means no two paths share any nodes except the

source and destination, the removal of arbitrary 2W − 1(or 2W − 2) nodes cannot

disconnect any node pairs in the remaining graph and hence CN(1, ...,W ) is also

2W (or 2W − 1)-vertex-connected. 2

Therefore, based on above node-disjoint lightpaths setup algorithm, a

circulant-graph-based all-optical architecture can be established to satisfy

communication latency and fault tolerance requirements for designated numbers of

nodes and tolerable network faults (link or node faults).

4.3 Network Resource Utilization

In this section, we calculate link resource utilization for any source-destination

pairs with varied fault tolerance support indicated byW . Based on the results, we

derive wavelength requirement for all node pairs’ simultaneous communications

given wavelength conversion is provided, which is also the lower bound of achievable

wavelength number under the wavelength-continuity constraint.

The number of links through which 2W disjoint lightpaths connecting S and D pass

is the sum of the lengths of individual lightpaths as follows

LSD =

2W∑i=1

LiSD . (4–1)

Based on the disjoint lightpaths setup algorithm described in Section 4.2, LSD can

be further analytically derived by cases and scenarios defined in Section 4.2 as follows.

74

Page 75: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

For non-complete CN(1, ...,W ):

LSD =W

⌊N −WW

⌋+ (N −W )%W + 3W − 2, for D =W (4–2)

LSD =W

(⌊N −DW

⌋+

⌊D

W

⌋)+ ((N −W )%W +D%W ) + 2W − 2, for D >W (4–3)

LSD =

⌈N − (W +D)

W

⌉D + 4W −D − 1, for D <W (Scenario I) (4–4)

LSD =

⌈N − (W + 1)

W

⌉D + [N − (W + 1)]%W + 4W − 2D − 1, for D <W (Scenario II)

(4–5)

For complete CN(1, ...,W ),

LSD = 2(N − 1)− 1, for all D (4–6)

Since CN(1, ...,W ) is symmetric in nature and the proposed lightpaths setup

algorithm applies to all sources regardless of their positions, the number of times that

the lightpaths developed for all-node communication pass through each link is the

same, which is also the number of required wavelengths for all-node simultaneous

communication given wavelength conversion is offered. Hence, the required wavelength

number is given by

V =

∑all S−D pairs LSD

NW=N2

∑all D LSD

NW=

∑all D LSD2W

, (4–7)

where NW is the number of links in CN(1, ...,W ).

Figure 4-4 shows the required numbers of links from the source (indexed by 0) to all

possible destinations in C16(1, ...,W ) with respect to differentW . First, it is observed

that the link requirement distribution across different destinations is fairly flat except for

the destinations index-close to the source. Secondly, also observed is that link utilization

increase for the same destination withW is comparably slow to the increase ofW

itself, which is due to larger strides that the source can take towards the destination if

W is increased. This unparallel increase actually results in a wavelength requirement

75

Page 76: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Figure 4-4. Link utilization for different destinations with respect to variedW (N = 16)

Figure 4-5. Wavelength requirement with respect to variedW for all-node simultaneouscommunication (N = 16)

decrease for all-node simultaneous communication as shown in Figure 4-5 Since the

number of available wavelengths ties with the complexity of the node structure, such

as the size of MUX/DEMUX and switching matrix, densely-connected CN(1, ...,W )

offers extra benefit in wavelength requirement besides network reliability gain. Further

wavelength reduction might resort to traffic grooming techniques, which is a subject of

future work.

76

Page 77: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

4.4 Network Reliability Analysis

Both nodes and links may be subject to faults. We model the network faults via

associating a failure probability fN to each node and another failure probability fL

to each link under an assumption that all nodes and links fail in an independent

fashion. In addition, it is also assumed that a node failure will block all incoming and

outgoing communications. Thereby the probability of disconnection for a specific

source-destination pair can be derived as following:

PS/D disconnection = P(S/D disconnection | no fault on S and D) · P(no fault on S and D)

+ P(S/D disconnection |faulty S or D) · P(faulty S or D)

(4–8)

The four terms in the above equation are as follows:

P(S/D disconnection | no fault on S and D) =2W∏i=1

[1.0− (1.0− fL)L

iSD(1.0− fN)(L

iSD−1)

](4–9)

P(no fault on S and D) = (1.0− fN)2 (4–10)

P(S/D disconnection |faulty S or D) = 1.0 (4–11)

P(faulty S or D) = 1.0− (1.0− fN)2 (4–12)

Figure 4-6 shows how the disconnection probability for the source-destination pair

(0 → 8) in C16(1, 2) varies with different fN and fL. It can be observed that fN plays a

bigger role than fL in the disconnection probability because both source and destination

nodes are subject to node failures while the pressure of link failures is mitigated by

multiple disjoint lightpaths. The effects of differentW values on the connection reliability

can be observed in Figure 4-7 in which all nodes are assumed to be fault-free (fN = 0).

77

Page 78: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

10−2

10−1

100

10−2

10−1

100

10−2

10−1

100

Probability of Node Failure (f−n)

Probability ofLink Failure (f−l)

Pro

babi

lity

of D

isco

nnec

tion

Figure 4-6. Disconnection probability change with fL and fN(N = 16,W = 2,S = 0,D = 8)

Figure 4-7. Disconnection probability change with fL for variedW (N = 16,S = 0,D = 8)

The disconnection probability decreases almost proportionally to the increase ofW in

the logarithmic scale, which demonstrates vast fault-tolerance performance improvement

by increasing network connectivity. The disconnection probability distribution for a

source with respect to all destinations across the network is shown in Figure 4-8. It

can be observed that the destinations with closer indices to the source are of higher

connection reliability because they can be routed to through more 2-hop lightpaths and

78

Page 79: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

hence require a lower number of links in their disjoint lightpath setups, as shown in

Figure 4-4.

Figure 4-8. Disconnection probability distribution across the network(N = 16,W = 2,fL = 0.1)

In this chapter, we propose a circulant-graph-based all-optical WDM network

architecture and develop a node-disjoint fault-tolerant routing algorithm that offers

flexible fault-tolerance options. Both node failure and link failure are modeled and

probabilistic analysis results show evident reliability improvement with moderate link

resource increase. In future, we plan to develop a wavelength assignment method for all

node pairs’ communication with the proposed fault-tolerant routing algorithm under the

wavelength-continuity constraint.

79

Page 80: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

CHAPTER 5TOPOLOGICAL OPTIMIZATION FOR SPARE-SHARING-BASED

WAVELENGTH-ROUTED ALL-OPTICAL NETWORKS

Wavelength Division Multiplexing (WDM) provides huge bandwidth potential

and design flexibility by arranging wavelengths to serve different traffic flows on the

same communication link. Wavelength-routed all-optical networks offer instantaneous

communication by avoiding the slow Optical-Electrical-Optical (OEO) conversion and

intermediate queuing in all switching nodes along the transmission path (lightpath). The

restriction of wavelength continuity throughout the path can be imposed to eliminate

wavelength conversion cost in the switching node [40]. However, the restriction also

increases Routing and Wavelength Assignment (RWA) difficulty [40]. In addition, in order

to protect the network against failures, it is desirable to design a fault-tolerant network

in which an arbitrary link failure can be tolerated without the loss of any communication

sessions.

In this chapter, we attempt to develop a low-cost one-link-failure-free network

topology that obeys wavelength continuity and is able to accommodate a required

number of traffic flows with a uniform number of wavelengths available on each link.

Although the resulting topological solution can be the choice of physical deployment,

it would also be applied to redefine the logical fiber-communication topology on the

existing physical infrastructure once single or multiple disastrous attacks (earthquakes,

hurricanes, floods, as well as electromagnetic pulses) happen to certain parts of the

network [3]. We call this topological adaptation to hazardous physical attacks, which

potentially affect a large geographical area. The traditional small-scale protections,

such as Shared Risk Link Group (SRLG) based schemes [20] [49], may not be fully

capable of tiding the communication over those unpredictable large-scale disasters. The

topological adaptation can be achieved by solving a topological optimization problem,

as studied in this chapter, according to the changed network resource provision. We

propose the use of the topological adaptation to respond to large-scale disaster-induced

80

Page 81: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

resource outage and leverage the traditional shared-path-based protection to tolerate

normal single fiber link failures. Thereby, two protection levels addressing different

failure scales can be realized.

5.1 Spare-Sharing-Based Topological Optimization

Spare sharing provides opportunities to save wavelength and link resources [34]

[52], which results in a lower-cost topological solution. As shown in Figure 5-1, there

are two bidirectional flows A ↔ D and B ↔ D. Given only one wavelength, if no spare

sharing is applied, the topological solution to accommodate two working and two backup

paths must include links B − E and D − E (as shown in Figure 5-1(A)). However, the use

of these two links can be avoided by allowing the two backup paths to share the links

B − C and C −D (as shown in Figure 5-1(B)). B

A

D

C

E

A Without spare sharing

B

A

D

C

E

B With spare sharing

Figure 5-1. Topological solutions without and with spare sharing

As described in many shared-path protection based works [41] [21] [37], the routing

and wavelength assignment for the working and backup paths has to obey the following

rules:

1. The working path and its backup path for any flow request must be link-disjoint

2. No wavelength on the same link can be shared neither between two working

paths nor between a working path and a backup path

3. No two backup paths can share the same wavelength on the same link if their

working paths join each other anywhere in the network

The first rule ensures that at least one path (working or backup), for any flow,

can survive over any one link failure. The second rule avoids collision between two

81

Page 82: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

working paths as well as enables a valid switch from a working path to its backup path

by guaranteeing availability of the backup path. The third rule prevents any two switches

from conflicting on their backup paths when a link failure disables two working paths.

The above rules on spare sharing can be demonstrated in Figure 5-2. Figure 5-2(A) is

a valid spare sharing example (on link B → E ) because the two working paths of flow

B → C and flow A → E are link-disjoint and hence any link failure over the network

cannot trigger both flows to switch. Figure 5-2(B) is an invalid spare sharing example

because the failure on link A → D would force both flows to switch and collision will

happen on their backup paths if the two backup paths share the same wavelength on

links A → B and B → C . Therefore, two separate wavelengths have to be used on the

two backup paths. B

A

D

C

E

A Valid spare sharing

B

A

D

C

E

B Invalid spare sharing

Figure 5-2. Validity demonstration of spare sharing

In general, the routing and wavelength assignment (RWA) problem without

involving fault protection is NP-complete [42]. When fault protection is considered,

the problem becomes even harder because the feasible solutions have to account

for backup resource allocation and are subject to more complicated constraints, as

shown in Integer Linear Program (ILP) formulations in Section 5.4. We anticipate

that the topological optimization problem studied in this chapter is NP-hard because

many of its sub problems have been shown to be NP-complete. For example, the

wavelength assignment in a Static Lightpath Establishment (SLE) problem is shown to

be equivalent to graph coloring and hence is NP-complete [13]. Besides, the routing

and wavelength assignment for a single working and backup path pair satisfying

82

Page 83: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

spare-sharing constraints is also NP-complete [38] [57]. The studied topological

optimization problem requires all flow requests to be equipped with valid working and

backup path pairs at the lowest topological cost, and it hence is computationally more

complicated. The topological cost is defined as the total cost of the group of bidirectional

links included in the final topology.

5.2 Related Work

Past research on fault-tolerance-oriented topological optimization problems mainly

focused on minimization of total link cost on a general graph constrained on satisfaction

of either k-connectivity or a connection reliability threshold. The applied methods are

branch & bound based decomposition as in [27], approximation algorithms as in [68], or

evolutionary algorithms as in [55]. However, with respect to the topological optimization

for wavelength-routed all-optical networks, previously no specific work was involved to

the best of authors’ knowledge.

In the context of wavelength-routed WDM networks, the RWA problem has been

extensively studied [67] [7]. Since then, more and more focuses are given to fault

tolerance enhanced RWA problems. [41] provides a comprehensive classification in fault

tolerance schemes and shows the tradeoff among resource utilization and connection

reliability. [33] focuses on developing a set of traffic-pattern-aware link-disjoint

lightpaths to achieve lower connection blocking probability. [36] exploits primary-backup

multiplexing technique to allow a primary lightpath share wavelengths with one or

more backup lightpaths, in order to increase the number of established lightpaths at

the cost of reduced recovery guarantee. [56] applies flow aggregation to developing

computationally less complicated ILP formulations. However, the problems addressed

by those papers are based on a predetermined network topology and no topological

change can be made. Besides, in [41], the goal is to minimize the resource capacity

utilization defined as the total number of wavelength links. The optimum solution to the

problem may lead to very different wavelength requirements on different links. In our

83

Page 84: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

work, we consider uniform wavelength provision on each link, which will render design

uniformity to the MUX/DEMUX logics for each node. Moreover, most of previous works

use a set of alternative routes that are predetermined in order to control the problem

size [41] [21] [37] [36]. However, we show, in Section 5.5, this decomposition does not

fit the nature of the topological optimization well and hence cannot lead to satisfying

performance. We jointly consider routing and wavelength assignment in one problem

whose optimal solution will perform better than the one without routing being considered

simultaneously.

5.3 Contributions and Chapter Organization

The major contributions of this chapter are listed as follows. First, we develop an

ILP model considering both routing and wavelength assignment, which fully exploits

the best possible solution to the studied spare-sharing-based topological optimization

problem. Second, we discern that applying traditional formulations, which base the

solutions on a set of predetermined alternative routes, cannot result in convincing

solutions by comparing to the greedy approach. Thirdly, we propose a two-phase

heuristic algorithm based on observation of the drawbacks of the greedy approach and

experimentally exhibit the efficiency of the algorithm.

The rest of this chapter is organized as follows: Section 5.4 provides an original ILP

formulation and a decomposed ILP formulation which is based on a set of k-shortest

disjoint routes. The performance of the decomposed ILP formulation is compared with

a greedy approach developed in Section 5.5. In Section 5.6, we propose a two-phase

heuristic algorithm to improve the performance of the greedy approach. The numerical

results and algorithm performance analysis are discussed in Section 5.7, where a

chapter summary is also provided.

5.4 Problem Formulation

In this section, to provide high-level insight in design constraints and objective,

we first introduce a matrix-based representation for the topological optimization

84

Page 85: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

problem, considering both routing and wavelength assignment, for spare-sharing-based

wavelength-routed all-optical networks. Then, an equivalent ILP is developed to

model the problem in a form that can be processed by professional solvers such as

MOSEK1 . Finally, a k-shortest disjoint routing based ILP formulation that only considers

route selection and wavelength assignment is developed. The decomposition of the

problem into routing and wavelength assignment is also the traditional way to solve the

RWA-related problems [41].

5.4.1 Matrix-Based Representation

Table 5-1. Basic notationsNotation DefinitionN Number of nodesL Number of directed links in the complete graph of N nodes, i.e. N(N − 1)F Number of flow requestsW Number of provided wavelengths

The basic network parameters are listed in Table 5-1, based on which the following

parameterized matrices are defined.

P = [pij ]F×L and Q = [qij ]F×L

P and Q are flow-link incidence matrices for the working and backup paths respectively,

in which pij and qij indicate whether flow i passes through link j or not for the working

path and backup path respectively by taking on 1 or 0.

A = [aij ]W×F and B = [bij ]W×F

A and B are wavelength-flow incidence matrices for the working and backup paths

respectively, in which aij and bij indicate whether wavelength i is assigned to flow j or not

1 MOSEK is a large-scale mixed-integer linear program solver using a combination of the interior point,branch and cut technologies [1] [2].

85

Page 86: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

for the working path and backup path by taking on 1 or 0.

D = [dij ]F×N

D is the flow-node incidence matrix in which dij = 1 if node j is the source of flow i and

dij = −1 if node j is the destination of flow i . Otherwise dij = 0. For a specific problem, D

is known and indicated by the flow setup.

G = [gij ]N×L

G is the node-link incidence matrix for a graph of N nodes and L directed links

(complete graph), in which gij = 1 if node i is the tail of link j , gij = −1 if node i is

the head of link j and gij = 0 if node i is not incident to link j .

In light of the above matrix definitions, the spare-sharing-based routing and

wavelength assignment rules together with path validity can be paraphrased equivalently

using the following matrix-based constraints:

1. Path validity for working and backup paths.

P × GT = D (5–1)

Q × GT = D (5–2)

“×” is a regular matrix multiplication operator.

2. Disjointedness of working and backup paths.

P +Q ≤ 1F×L (5–3)

1 is a F × L matrix in which all elements are 1.

3. Conflict avoidance between paths.

86

Page 87: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

a. Working/working and working/backup conflict avoidance.

A× P + B ⊙Q ≤ 1W×L (5–4)

where “⊙” works as a regular matrix multiplication operator except that it uses

Boolean addition in which 1 + 1 = 1 when calculating elements in the resulting matrix.

b. Conflict avoidance between backup paths.

Here we introduce two matrices as below:

C = [cij ]F×F = P ⊙ PT

C is called the working path conflict matrix in which cij = 1 when the working path of

flow i joins the working path of flow j at least on one link.

Cij = [cijkm]F×L

Cij is induced from C and called the conflict possession matrix with respect to flow i

and flow j , where cijkm = 1 if k = i or j and cij = 1. Otherwise cijkm = 0. Therefore, the

backup/backup conflict avoidance is governed by the following inequality:

B × (Cij ∗Q) ≤ 1, for all i = j (5–5)

where “∗” is an element-to-element multiplication operator and Cij ∗Q represents the

induced flow-link incidence matrix in which only the path information of the two conflicted

flows is kept.

Finally, the objective function can be formulated through the last two steps as

follows:

T = max |G | (5–6)

minS · T (5–7)

87

Page 88: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

where “max | |” operation selects all the links that are allocated in topology formation

and forms a link existence vector in which the existence of a link is denoted by 1 or

0. S is the link cost vector in which each element represents the cost of selecting the

corresponding link. The optimization goal is therefore to minimize the inner product S ·T ,

which corresponds to the topological cost.

5.4.2 Integer Linear Program Formulation

The matrix-based representation discussed in Section 5.4.1 fully considers routing

and wavelength assignment issues, and hence its optimal solution leads to the lowest

possible topological cost. Equivalent to the matrix-based representation, the topological

optimization problem can also be formulated into an integer linear program as follows.

Constants:.

• N: Number of nodes

• W : Number of provided wavelengths on each link

Indices:.

• i , j , k : Node index taking integers from 0 to N − 1

• s : Source node index taking integers from 0 to N − 1

• d : Destination node index taking integers from 0 to N − 1

• w : Wavelength index taking integers from 0 toW − 1

• b: Bidirectional link index taking integers from 0 to N(N − 1)/2− 1

Data:.

• cb: Cost of the bidirectional link b

Decision variables (integer):.

• x sdwij : Represent whether flow request s → d routes its working path throughwavelength w on unidirectional link i → j by taking on 1 or 0

• y sdwij : Represent whether flow request s → d routes its backup path throughwavelength w on unidirectional link i → j by taking on 1 or 0

88

Page 89: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Auxiliary variables (integer):.

• λsdw1 , λsdw2 : Represent whether the working and backup paths of flow s → d ,

respectively, take on wavelength w by taking on 1 or 0

• zb: Represent whether the working or backup path of any node pair passesthrough bidirectional link b by taking on 1 or 0

Model:.

min∑b

cbzb (5–8)

subject to following constraints:

1. Path validity and wavelength continuity for working and backup paths.

∑i

x sdwij −∑k

x sdwjk =

−λsdw1 , if s = j

+λsdw1 , if d = j

0, O.W .

(5–9)

∑i

y sdwij −∑k

y sdwjk =

−λsdw2 , if s = j

+λsdw2 , if d = j

0, O.W .

(5–10)

∑w

λsdw1 = 1 (5–11)

∑w

λsdw2 = 1 (5–12)

where λsdw1 and λsdw2 represent whether the working and backup paths of flow s → d

takes on wavelength w by taking on 1 or 0.

2. Link disjointedness between working and backup paths for the same flow

request.

89

Page 90: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

∑w

x sdwij +∑w

y sdwij ≤ 1 (5–13)

3. Conflict avoidance between paths.

a. Working/working and working/backup conflict avoidance.

∑sd

x sdwij + y sdwij ≤ 1 (5–14)

b. Backup/backup conflict avoidance.∑w

x s1d1wi1j1+∑w

x s2d2wi1j1+ y s1d1wi2j2

+ y s2d2wi2j2≤ 3

s1d1 = s2d2 and i1j1 = i2j2

(5–15)

Equation (5–14) indicates that, on any wavelength of any link, either only one

working path or several backup paths are allowed to be allocated, which enforces

rules 2 and 3 mentioned in Section 5.1. Equation (5–15) makes the rule 4 hold in

which two backup paths cannot take the same wavelength on the same link (then

y s1d1wi2j2+ y s2d2wi2j2

= 2) if the corresponding two working paths join each other anywhere

(∑w xs1d1wi1j1

+∑w xs2d2wi1j1

= 2).

4. Inclusion of all bidirectional links, through which either working or backup paths

are arranged, into the final link set on which the topological cost is calculated.

x sdwij ≤ zb , x sdwji ≤ zb (i < j) (5–16)

and

y sdwij ≤ zb , y sdwji ≤ zb (i < j) (5–17)

b = i · N + j − (i + 2)(i + 1)2

, i < j

90

Page 91: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

5.4.3 K-Shortest Disjoint Routing Based Formulation

Since the traditional way in the literature to solve the RWA-related problems (usually

based on a fixed topology) is to decompose the problem into the routing part and

the wavelength assignment part. In the routing part, k-shortest disjoint routing based

alternative routes are often applied. Although this problem decomposition shrinks the

feasible solution space (because of limited routing choices), the size of the problem

can be reduced to certain degree such that a small-scale problem may be optimally

solved. In order to evaluate the feasibility of decomposition to the studied topological

optimization problem, we develop a k-shortest disjoint routing based ILP as follows.

Constants:.

• W : Number of provided wavelengths on each link

• F : Number of flow requests

• K : Number of link-disjoint routes developed by the k-shortest path algorithm foreach node pair in the complete graph of N nodes

Sets:.

• Rl : Set of all possible routes passing through the unidirectional link l given by thek-shortest path algorithm for all node pairs

• R′

b: Set of all possible routes passing through the bidirectional link b given by thek-shortest path algorithm for all node pairs

Indices:.

• i : Node pair index taking integers from 0 to F − 1

• w : Wavelength index taking integers from 0 toW − 1

• r : Route index for a specific node pair taking integers from 0 to K − 1

• l : Unidirectional link index taking integers from 0 to N(N − 1)− 1

• b: Bidirectional link index taking integers from 0 to N(N − 1)/2− 1

Data:.

• cb: Cost of the bidirectional link b

91

Page 92: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Decision variables (integer):.

• uwir : Represent whether the working path of node pair i takes on route r onwavelength w by taking on 1 or 0

• vwir : Represent whether the backup path of node pair i takes on route r onwavelength w by taking on 1 or 0

Auxiliary variables (integer):.

• zb: Represent whether the working or backup path of any node pair passesthrough bidirectional link b by taking on 1 or 0

Model:.

min∑b

cbzb (5–18)

subject to following constraints:

1. Path validity and wavelength continuity (automatically satisfied ).

2. Link disjointedness between working and backup paths for the same flow

request.

∑w

uwir +∑w

vwir ≤ 1 (5–19)

∑r

∑w

uwir = 1 (5–20)

∑r

∑w

vwir = 1 (5–21)

3. Conflict avoidance between paths.

a. Working/working and working/backup conflict avoidance (on each unidirectional

link l , no wavelength w can be shared among more than one working paths or between

working and backup paths).

92

Page 93: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

∑(i ,r)∈Rl

uwir + vwir ≤ 1, for (i , r) ∈ Rl (5–22)

b. Backup/backup conflict avoidance (for an unidirectional link l1, through which the

working paths of two node pairs i1 and i2 pass, the backup paths of these two node pairs

cannot share any wavelength w on any unidirectional link l2).

∑w

uwi1r1 +∑w

uwi2r2 + vwi1r3+ vwi2r4 ≤ 3

i1 = i2 , r1 = r3 and r2 = r4

(i1, r1) ∈ Rl1, (i2, r2) ∈ Rl1, (i1, r3) ∈ Rl2, (i2, r4) ∈ Rl2

(5–23)

4. Inclusion of all bidirectional links, through which either working or backup paths

are arranged, into the final link set on which the topological cost is calculated.

uwir ≤ zb , if (i , r) ∈ R′

b (5–24)

and

vwir ≤ zb , if (i , r) ∈ R′

b (5–25)

Table 5-2. Problem size exemplification: number of variablesNumber of flows 5 10 15 20 25 30

k = 2 135 255 375 495 615 735k = 3 195 375 555 735 915 1095k = 4 255 495 735 975 1215 1455k = 5 315 615 915 1215 1515 1815

Original ILP 1875 3735 5595 7455 9315 11175

5.4.4 Problem Size Exemplification

In order to provide insight in the size of the original problem formulated in Section

5.4.2 and the decomposed problem formulated in Section 5.4.3, we use an exemplar

network in which there are 6 nodes with 6 wavelengths on each unidirectional link, and

93

Page 94: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Table 5-3. Problem size exemplification: number of constraintsNumber of flows 5 10 15 20 25 30

k = 2 218 550 864 1190 1564 1872k = 3 379 1004 1779 2584 3473 4458k = 4 600 1830 3594 5352 7656 10284k = 5 947 3148 6783 10688 15649 21630

Original ILP 107620 476240 1105860 1996480 3148100 4560720

the bidirectional link costs are randomly generated between any pairs of nodes. For

each node pair, there are at most 5 link-disjoint routes and at least 2 link-disjoint routes

are needed for a flow request to route its working and backup paths. The numbers

of decision and auxiliary variables are shown in Table 5-2 whereas the numbers of

constraints are listed in Table 5-3 for different formulations and flow numbers. From the

tables we observe that the original ILP is of a huge size even for a small network, which

makes solving it almost unaffordable for any modern ILP solver [41] [7]. Comparably the

k-shortest disjoint routing based ILP formulations holding a few thousand variables and

constraints for a small network have better potential to be solved by an ILP solver.

5.5 A Greedy Approach

In this section, we develop a greedy approach to solve the topological optimization

problem which can be implemented by a low-order polynomial-time algorithm.

5.5.1 The Underlying Idea

We treat the potential network resource (links and wavelengths in the

completely-connected network) as a number (W ) of wavelength-associated graphs

on which wavelength-routed lightpaths can be established. For the studied topological

optimization problem, the goal is to find a group of bidirectional links that can

accommodate all flow requests at a cost as low as possible while satisfying all design

constraints specified in Section 5.1. The idea of the greedy approach is to, at each

iteration, search for and arrange a flow request which leads to minimum topological cost

increase until all flow requests are accommodated. The greedy approach makes the

94

Page 95: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

path search tend to reuse those links that have been allocated but still hold assignable

wavelengths.

With respect to the order of working path and backup path arrangement, we choose

to arrange all the working paths before the backup paths are established. This is

because, under the spare-sharing scheme, the working paths dominate the resource

utilization and therefore, following the intuition, lower working paths resource utilization

is directly related to a better overall topological cost. Hence the resource allocation

priority should be given to working paths. Another advantage of prioritizing working

paths arrangement is that this can help working paths to pick up relatively short routes,

which makes working paths less vulnerable to link failures although this is not explicitly

included in the problem specification.

5.5.2 Data Structures

Wavelength-associated Adjacency Matrices for Working lightpaths (WAMW ): an

adjacency matrix tagged by a specific wavelength that contain elements indicating

assignment availability and cost of corresponding links on that specific wavelength for

working lightpath search. There are three possible values on which an element can take

during algorithm operation:

• Original cost: the real cost to set up a bidirectional link between two nodes,meaning that the link carrying this very wavelength has not been selected forrouting any path.

• Infinity: this value indicates that the wavelength on that specific unidirectional linkhas already been allocated and hence is not be available for allocation.

• Zero: this value indicates that a bidirectional link carrying this very wavelength hasalready been selected for routing some paths but this specific wavelength has notbeen allocated and is still available for allocation with no topological cost increase.

The algorithm starts with allWAMW s equal to the original adjacency matrix

in which each element takes on the cost of the original bidirectional link. As the

algorithm operates, the value of a matrix element, corresponding to a specific link

95

Page 96: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

and a wavelength, may transit among three values according to transition diagram

shown in Figure 5-3. Figure 5-3. Element value transition diagram for WAMW.

Wavelength-associated Adjacency Matrices for Backup lightpaths (WAMB): defined

in the same way as above for working lightpaths. The only difference is in the value

transitions in which a link wavelength allocation for a backup path does not switch the

value to infinity but to zero because a later backup path has potential to reuse this

wavelength given that the spare-sharing RWA rules are followed, as shown in Figure

5-4. Figure 5-4. Element value transition diagram for WAMB.

Conflict Table (CT ): a square matrix of F × F elements, where F is the number

of flows and each element indicates whether the two working lightpaths of the two

flows are link-disjoint or not by taking on value 1 or 0. This table can be incrementally

established by checking confliction between the newly allocated working path and

allocated working paths.

96

Page 97: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

5.5.3 The Algorithm

For each iterative working lightpath search, the Dijkstra shortest path algorithm is

applied directly on each of WAMWs and the ”shortest” path (corresponding to the one

leading to lowest cost increase) among all wavelengths is picked for candidacy among

all unsatisfied flow requests in that very iteration.

For each iterative backup lightpath search, the similar procedure as above for

working lightpath search is used except that the adjacency matrices on which the

Dijkstra algorithm works are not the WAMBs directly but are constructed from WAMBs

in the following way: make a copy from the WAMB on the corresponding wavelength,

set to infinities the elements corresponding to the unidirectional links through which

the under-search backup lightpath’s working lightpath passes, and also set to infinities

the elements of unidirectional links if they have already been allocated to other backup

lightpaths whose working lightpaths are not link-disjoint with the under-search backup

lightpath’s working lightpath (using Conflict Table). The pseudo code of the algorithm is

shown in Figure 5-5.

5.5.4 Performance Comparison

Table 5-4. Topological cost comparison among k-shortest path based ILP and thegreedy approach for a randomly generated network with 6 nodes and 6wavelengths on each link

Number of flows 5 10 15 20 25 30

k = 2 43.39∗ 51.67∗ 71.96∗ 79.36∗ 79.36∗ 87.08∗

k = 3 37.32∗ 42.61∗ 53.16∗ 53.16∗ 53.16∗ 53.16∗

k = 4 37.32∗ 40.14∗ 40.14∗ 45.76∗ 45.76∗ 45.76∗

k = 5 36.66∗ 40.14∗ 43.89∗ 45.76∗∗ 45.76∗∗ 45.76∗∗

Greedy 25.15 25.15 32.54 44.88 44.88 52.60Greedy+PER 20.99 20.99 32.54 32.54 35.82 41.21

∗ Optimal solutions for k-shortest disjoint routing based ILP formulations∗∗ The best results (all within 3.08% relative gap to the best possible solutions) after running MOSEK for 8hours. The solving process is shown in Figure 5-6 that demonstrates the converging process of both theobjective function value and the relative gap for the three ILP instances

97

Page 98: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Algorithm: GreedySearch1. procedure GreedySearch(WAMWs,WAMBs)2. //Search for working lightpaths3. for i = 0 to F − 14. LowestCostW ←∞5. for j = 0 to F − 16. if the j th flow request is not satisfied7. for k = 0 toW − 18. run Dijkstra’s algorithm onWAMWs[k ]9. if resulting cost < LowestCostW

10. LowestCostW ← resulting cost11. set flow j as candidate flow and record resulting path and wavelength k12. end if13. end for14. end if15. end for16. mark the candidate flow as satisfied17. update elements ofWAMWs andWAMBs corresponding to links on the

allocated path according to transition diagram in Figure 5-318. end for19. form the working path conflict table CT20. //Search for backup lightpaths21. for i = 0 to F − 122. LowestCostB ←∞23. for j = 0 to F − 124. if the j the flow request is not satisfied25. for k = 0 toW − 126. construct adjacency matrix as described in Section 5.5.327. run Dijkstra’s algorithm on the constructed adjacency matrix28. if resulting cost < LowestCostB29. LowestCostB ← resulting cost30. set flow j as candidate flow and record resulting path and wavelength k31. end if32. end for33. end if34. end for35. mark the candidate flow as satisfied36. update elements ofWAMBs corresponding to links on the allocated path

according to transition diagram in Figure 5-437. end for38. output all developed working and backup lightpaths39. end procedure

Figure 5-5. Pseudo code of the greedy approach

98

Page 99: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Figure 5-6. Solving process for the three ILP instances without reaching optimality afterrunning MOSEK for 8 hours

Table 5-4 shows the performance comparison between the greedy approach and

the k-shortest disjoint routing based ILP formulations2 for the network exemplified

in Section 5.4.4. The k disjoint routes for each flow request are developed using the

path-augmentation-based disjoint routing algorithm which generates k link-disjoint routes

between a node pair with minimum total link cost [54] [65] [22]. Due to the overwhelming

size of the original ILP as shown in Section 5.4.4, the corresponding extremely large

memory requirement makes solving the original ILP formulation almost impossible. The

results listed in the last row are from an algorithmic combination of the greedy approach

and a solution perfection process (PER) which will be discussed in the next section.

First, we observe that, in general, the higher number of alternative routes (k) leads

to lower topological cost because the flow requests can have more choices in picking

2 All the k-shortest disjoint routing based ILP instances are solved by MOSEK 5.0.0.90 on the NEOSserver with 8 hours running time limit.

99

Page 100: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

routes for their working and backup paths. The only exception happens to the instance

with 15 flow requests in which 5 alternative routes result in a higher topological cost

than 4 alternative routes. This is because the 4 alternative routes are not necessarily

a subset of the 5 alternative routes between a node pair and hence the solution space

for 4-shortest routing based ILP is not necessarily a subset of that for 5-shortest routing

based ILP. Actually, by the definition of k-shortest disjoint routing, the total cost of 4

shortest disjoint routes should be lower than or at most equal to the cost of any of 4

disjoint routes out of the 5 shortest disjoint routes, which also makes this exception

possible. Second, we can observe that the solutions of the greedy approach on average

are much better than those of k-shortest disjoint routing based ILP formulations. The

reason for that is the k shortest routes are developed based on a connectivity-rich

topology (usually a complete graph if any two nodes can have a direct connection) than

the topology assumed to be fixed by most of previous works. Thereby the disjoint routes

developed for different node pairs may have less chance of being overlapped and hence

a higher number of links are expected to be included into the topological solution. This

shows that the traditional alternative routes based methods are not efficient in solving

the topological optimization problem. Lastly, by taking the greedy solution as an initial

solution, a perfection process can improve the results to a great extent, showing that

there still exists considerable improvement space, which will be further explored by

heuristics discussed in the next section.

5.5.5 Approximation Ratio Analysis for Working Paths Allocation under Ade-quate Wavelength Provision

Since in general the working paths dominate resource utilization compared

with the backup paths, as shown in Section 5.7, we derive an approximation ratio

analysis for resource allocation of working paths to capture the optimality of the greedy

approach. We assume that there are adequate wavelengths on each links, i.e., at least

F wavelengths are provided. The optimal topological cost is denoted by OPT . The

100

Page 101: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

topological cost of the greedy solution is denoted by Costgreedy . Let P1, P2, ..., PF be the

working paths that the greedy approach develops for the F flow requests in the order

of being generated. For path Pi , we define Price(Pi) as the topological cost increase

after generating working path Pi . We also define the optimal topological cost increase to

generate working paths for the rest flow requests after P1, ..., Pi−1 have been developed

by the greedy approach as OPT ′

i . Since Cost(Pi) leads to the optimal cost increase for

the working path Pi , we have

Price(Pi) ≤ OPT′

i . (5–26)

In addition, since OPT ′

i is the optimal cost increase for the subset of flow requests i ,

..., F under the cost-reduced graph (the costs of the links on which the paths developed

by the greedy approach are reduced to 0), we also have

OPT′

i ≤ OPTi ≤ OPT , (5–27)

where OPTi represents the induced topological cost of flow requests i , ..., F in the

optimal solution.

Hence, finally we have

Costgreedy =

F∑i=1

Price(Pi) ≤F∑i=1

OPT′

i ≤F∑i=1

OPTi ≤F∑i=1

OPT = F ·OPT (5–28)

and

CostgreedyOPT

≤ F (5–29)

5.5.6 Complexity and Memory Requirement Analysis

By observing the structure of the algorithm, we find that, when an O(N2) Dijkstra’s

algorithm is applied, the computational complexity of the algorithm is O(F 2WN2), where

F is the number of flow requests,W is the number of available wavelengths and N is the

101

Page 102: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

number of nodes. With respect to the memory requirement, a working space in the order

of O(WN2 + F 2) is needed for algorithm operation which comes from two dominating

data structures: wavelength-associated adjacency matrices and the conflict table.

5.6 Enhanced Heuristics

In the section, we first identify two drawbacks of the greedy approach that may

prohibit it from achieving better performance in certain scenarios. Based on the

drawback analysis, we propose two approaches featuring different initial solution

generation to the topological optimization problem. Then, we develop a perfection

process working on the generated initial solutions with the goal of lowering the

topological cost of the initial solutions. The combination of the initial solution generation

and the perfection process forms the proposed heuristic algorithm as the first and the

second phases respectively.

5.6.1 Drawbacks of the Greedy Approach

Since the greedy approach, described in Section 5.5, only pursues the

iteration-wide optimality, there exists potential for it to lose global optimality. Figure

5-7(A) shows a network that still has two flow requests (A → C and B → D) to which

resource needs to be assigned. We assume that all the links missing in the figure either

run out of wavelength resource or cost too high to be considered. The dashed links refer

to those links on which no wavelength is assigned to any flow. The solid links represent

those links that have been assigned but still hold available wavelengths. We also

assume that each link in the figure has at least 2 available wavelengths for allocation.

There are two values on each link. The first indicates the current cost increase by

routing through the corresponding link and the second (in the parentheses) indicates the

original cost of the bidirectional link.

The greedy approach will find route A → C for flow request A → C and then find

route B → A→ C → D for flow request B → D, as shown in Figure 5-7(B), which results

in cost increase 17 + 8 + 8 = 33. However, if we make the flow A → C take on the route

102

Page 103: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

B A

D C

E

F

8(8)

8(8)

17(17) 17(17) 18(18)

0(1) 0(1)

0(1) 0(1)

A

B A

D C

E

F

0(8)

0(8)

0(17) 17(17) 18(18)

0(1) 0(1)

0(1) 0(1)

B

Figure 5-7. Original greedy approach solution.

A → E → F → C and make the flow B → D take on the route B → E → F → D,

the cost will be only increased by 18. This example illustrates myopia of the greedy

approach under certain scenario.

Besides potential miss of global optimality, the greedy approach tends to route

paths in a “zigzag” way in order to reuse those allocated links as shown in Figure

5-7(B) in routing flow request B → D. Such a routing fashion makes the routes more

likely be “twisted” together, which not only potentially leads to higher overall resource

consumption but also renders difficulty to improving the solution in dissolving the

“twisted” situation. For example, the two routes coupled on link A → C are not easy

to be “moved” to their optimal positions compared with the scenario in which they are

separate and routed close to their shortest paths. The way to “move” (or reroute) paths

will be discussed in Section 5.6.3.

5.6.2 Two Initial Solutions

In order to assist the routing process of the original greedy approach to identify

right paths for routing flow requests, we propose using the link potential ρl , a numerical

factor ranging from 0 to 1, to evaluate the potential that a link should be included into

the topological solution. The underlying idea is that the link, by routing through which

the paths are closer to their shortest paths in length, should have higher potential to be

103

Page 104: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

picked for allocation. As we can see in Figure 5-7(A), although flow A→ C favors picking

link A → C , flow B → D does not because route B → A → C → D is much longer

than the shortest route (B → D) of flow B → D. However, link E → F can balance the

closeness requirement of both flow A → C and flow B → D to their shortest paths. If

link E → F can be picked for routing flow A → C , the resulting routes of the two flow

requests will become optimal, as shown in Figure 5-8(B). B A

D C

E

F

(8)

(8)

136/33 27/10

0(1) 0(1)

0(1) 0(1)

136/33 (17) (18) (17)

A

B A

D C

E

F

(8)

(8)

(17) (17) 0(18)

0(1) 0(1)

0(1) 0(1)

B

Figure 5-8. Link potential based greedy search solution

We first define flow-associated link potential, ρfl , as the ratio of the original path cost

pcf of routing the flow in the original network to the original path cost pc ′f of routing the

flow through the unidirectional link l under current network resource condition. pc ′f can

be decomposed into three parts: the cost of routing the flow from its source to the tail

node of link l pc ′f 1, the cost of link l cl , and the cost of routing the flow from the head

node of link l pc ′f 2 to the destination.

ρfl =pcf

pc′f

=pcf

pc′f1+ cl + pc

′f2

(5–30)

We define link potential, ρl , as the average of ρfl over flows that still wait for routing

and resource allocation, as following

ρl =1

F ′

∑f

ρfl , (5–31)

104

Page 105: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

where F ′ represents the number of unassigned flow requests. Since pcf is the shortest

path cost in the original network, ρfl is a value smaller than or at most equal to 1, so is

ρl . Intuitively, ρl with a higher value indicates link l , on average, is closer to the shortest

paths of unassigned flow requests and hence should have higher potential to be

selected. This is because the close-to-shortest routes can help save network resource

and, combined with the greedy search, eventually may lead to a lower topological cost.

In the shortest path search algorithm, the link with lower cost has higher potential to

be selected into the shortest path. Hence, we define link cost coefficient, αl , as

αl = 1− ρl (5–32)

and use the product of αl and the link current cost to replace the link cost used in the

greedy search algorithm. In this way, we integrate the use of link potential into the

greedy search algorithm and we call the new algorithm link potential based greedy

search. Still take the network shown in Figure 5-7(A) for example, under the current

network resource condition, flow A → C costs 17 and flow B → D costs 33 to route

through link A → C . The shortest path costs of both flow A → C and flow B → D

are 17 in the original network. Hence ρA→C = (17/17 + 17/33)/2 = 25/33 and

αA→C = 1 − 25/33 = 8/33. The cost of link A → C is replaced with 178/33 = 136/33.

Follow the same process, the costs of link B → D and link E → F are replaced with

136/33 and 27/10 respectively. The updated network with new link costs is shown in

Figure 5-8(A). The costs of the rest links are not shown because they do not affect the

routing decisions. Apply the greedy algorithm onto the new network shown in Figure

5-8(A). Then route A → E → F → C becomes the decision route instead of the original

route A → C . After that flow B → D would pick up route B → E → F → D, instead of

route B → A → C → D, because of zero cost increase. The resulting routes are shown

in Figure 5-8(B), which is optimal for the two flow requests.

105

Page 106: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

With respect to the second drawback identified in Section 5.6.1, we propose another

modification on the original greedy search algorithm with the aim to avoid generating

“zigzag” paths. Instead of trying to change the link costs as in link potential based

greedy search, at every iteration, the algorithm selects the flow request that leads to the

largest path ratio. Path ratio is defined, with respect to a specific flow request, as the

ratio of the shortest path cost in the original network to the cost of the shortest route

developed in the greedy search algorithm on the current network. This flow selection

order tends to select the route that is close to its shortest path in length and hence can

avoid generation of those “zigzag” paths to a great extent. We call this modified search

largest ratio first (LRF) search.

Take the example as shown in Figure 5-9(A), we assume wavelength resource on

link A → C are all assigned and hence link A → C is not shown in the figure. The

original greedy approach will find route A→ G → C with cost increase 9 for flow request

A → C and then route flow request B → D through B → A → G → C → D, as shown

in Figure 5-9(B). The resulting two routes are closely coupled together on many links

away from their shortest paths. However, LRF search will select route B → D for flow

request B → C and then route flow request A → C through A → G → C , as shown in

Figure 5-9(C). This is because, instead of pursuing minimum cost increase, LRF search

renders priority to selecting the route closer to its shortest path. Although LRF search

induced routing leads the cost to be increased higher (by 17 + 9 = 26) than the original

greedy search (by 9 + 8 + 8 = 25), the potential to move the two loosely coupled routes

to their optimal positions would be higher. The detailed routes “moving” procedure will

be discussed in the next subsection.

5.6.3 Solution Perfection (PER)

The solutions generated by the original greedy approach, link potential based

greedy search, and LRF search can be used as initial solutions and we propose

a solution perfection process working on those initial solutions. The initial solution

106

Page 107: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

B A

D C

E

F

8(8)

8(8)

0(9)

17(17) 18(18)

0(1) 0(1)

0(1) 0(1)

G

9(9)

A

B A

D C

E

F

0(8)

0(8)

0(9)

17(17) 18(18)

0(1) 0(1)

0(1) 0(1)

G

0(9)

B

B A

D C

E

F

8(8)

8(8)

0(9)

0(17) 18(18)

0(1) 0(1)

0(1) 0(1)

G

0(9)

C

Figure 5-9. Largest ratio first based search solution

generation and the perfection process are two phases of the heuristic algorithm

proposed in this section.

The idea of the perfection process is trying to reroute all the flows passing through

a specific bidirectional link by leveraging the rest of unassigned network resource. If the

rerouted solution leads to a lower topological cost, the rerouted solution becomes

the new solution. This process will continue on another bidirectional link until no

improvement can be achieved by rerouting the flows on whichever bidirectional link.

The pseudo code of the perfection algorithm is listed in Figure 5-10.

5.7 Results

In this section, we evaluate the performance of the proposed heuristic methods

proposed in the last section. The advantage of applying spare sharing techniques in

resource saving is also shown. Finally, by defining performance indicator, we reveal the

underlying reason for performance different resulting from varied algorithm options.

5.7.1 Performance Comparison

We use an exemplar network in which 16 US major cities, as shown in Figure 5-11,

are treated as nodes and the bidirectional link costs are assigned to be proportional

107

Page 108: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Algorithm: Perfection1. procedure Perfection(init solution,WAMWs,WAMBs, CT )2. current solution ← init solution3. do4. improvement ← 05. for each assigned bidirectinal link l6. TWAMWs ←WAMWs, TWAMBs ←WAMBs, TCT ← CT7. release wavelength resource along working and backup paths passing

through bidirectional link l by updating TWAMWs and TWAMBs8. reroute the working paths through rest of network, update TWAMWs,

TWAMBs, and TCT9. reroute the backup paths following all spare-sharing constraints through rest

of network, update TWAMWs and TWAMBs10. if rerouting is successful11. calculate resulting topological improvement12. if resulting improvement > improvement13. improvement ← resulting improvement14. update current solution15. end if16. end if17. end for18. if improvement > 019. WAMWs ← TWAMWs,WAMBs ← TWAMBs, CT ← TCT20. end if21. while improvement > 022. output current solution23. end procedure

Figure 5-10. Pseudo code of the perfection algorithm (PER)

to the distance between cities 3 . Each node is required to establish communication

to all other nodes in the network, which indicates the number of flows requests is

16× (16− 1) = 240.

3 In case of disaster-induced link failures, the corresponding link costs are set to infinity in order to re-flect the changed network resource condition. Thereby the resulting topology solution will avoid utilizingany of the links affected by the disaster. In this chapter, focusing purely on performance comparison forthe topological optimization problem among different algorithms, we do not model and consider a specificset of link failures. This will be the focus of future work.

108

Page 109: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Figure 5-11. Locations of 16 US major cities

We test the above problem configuration via the original greedy approach (Greedy),

link potential based greedy search (Potential), largest ratio first search (LRF), and

the combinations of those approaches and the perfection process (Greedy+PER,

Potential+PER, and LRF+PER). The solutions of the approaches other than the original

greedy approach are compared with the initial greedy solutions and their improvements,

defined as

ImprovementX =Topological Costgreedy − Topological CostX

Topological CostX, (5–33)

are recorded, where X represents the approach used for comparison. The results, with

different wavelength provision, are shown in Figure 5-12. As we can observe, except

the solutions of LRF, all other approaches in general lead to better performance than

the original greedy approach. In terms of initial solutions, link potential based greedy

search on average produces the lowest-cost topological solutions. With respect to the

final solutions, all PER-induced solutions are much better than their corresponding

initial solutions. The LRF+PER induced solutions, with improvement of 20% 30% from

the greedy solutions, outperform all other solutions although the initial LRF-induced

solutions are worse than the corresponding greedy solutions. This is because the initial

109

Page 110: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

LRF-induced solutions are better shaped in terms of ”twisting” condition, which makes

the PER easier to reroute the flows to their optimal positions.

Figure 5-12. Performance improvements from greedy solutions due to heuristicalgorithms for varied wavelength provisions

Figure 5-13. Convergence process of the perfection algorithm taking three differentinitial solutions

Figure 5-13 demonstrates the convergence process of the perfection algorithm

taking the Greedy, Potential, and LRF solutions as initial solutions for the problem

configuration with 5 wavelengths available on each link. It shows that Potential can

produce the lowest initial solution whereas the initial solution of LRF is very costly and

110

Page 111: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

however it has higher potential to be “perfected” by running the perfection algorithm after

a large number of iterations.

Figure 5-14. Weighted wavelength/link utilization for working and backup lightpaths inthe LRF+PER induced topological solutions

Figure 5-14 illustrates the benefit of applying spare sharing techniques in resource

saving. The weighted wavelength/link utilization is defined as

U =

∑l

∑w O

lw · Cl∑

lW · Cl, (5–34)

where Cl is the cost of the unidirectional link l and O lw indicates if the wavelength w on

link l is occupied or not by taking on 1 or 0. This utilization takes on value between 0 and

1, and the higher value indicates more efficient resource utilization. Since on wavelength

on the same link can be shared between working and backup paths, the total weighted

resource utilization can be decomposed into working path utilization and backup path

utilization, as indicated by the blue and red bars in Figure 5-14. The advantage that

the backup paths can share wavelengths among each other makes backup resource

utilization extremely low compared with resource utilized by working paths, especially

considering the fact that the working paths are routed before the backup paths and

hence they can take comparably shorter routes. The trend that the backup resource

111

Page 112: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

utilization is increased with the number of available wavelengths is observed. This

is because the network topology becomes “thinner” (including less number of links

when increasing the number of wavelengths, as shown in Figure 5-14) and the spare

sharing constraints start playing a heavier role in routing the backup paths. For the

same reason, the narrower routing choices for both working and backup paths make the

overall wavelength/link utilization decrease with the number of wavelengths.

5.7.2 Performance Indicator

In order to better discern how differently algorithms perform, we identify two

essential factors that can indicate the solution performance for the topological

optimization problem. One is the weighted resource utilization U as defined in the

last subsection and another is average bending factor B, defined as

B =1

2F

(∑f

pcfpwf+∑f

pcfpbf

), (5–35)

where pcf is the shortest path cost of flow f , pwf is the solution working path cost of flow

f , and pbf is the solution backup path cost of flow f . The average bending factor shows

how far on average the solution paths deviate (or “bend”) from their shortest paths.

A value close to 1 signifies that the solution paths are in cost close to their shortest

paths and hence are individually cost-efficient in wavelength utilization, whereas a value

towards 0 indicates the solution paths are costly routed.

Intuitively, an ideal topological solution (best-possible or lower-bound solution)

would fully utilize the wavelength in the solution topology with all paths routed through

their shortest paths. Hence, a topological solution having high wavelength utilization

and high average bending factor simultaneously would lead to good performance (low

topological cost.) Thereby we define performance indicator of the topological solutions

as

PI = B · U . (5–36)

112

Page 113: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Figure 5-15. Solution performance indication for the network with 5 wavelengthsprovision

The validity of this definition (logical correspondence between PI values and

topological costs) is verified by observing Figure 5-15 in which the performance indicator

values and topological costs resulting from different algorithms are shown. As observed,

the highest PI appears with the LRF+PER induced solution that leads to the best

performance, whereas the lowest PI happens on the initial solution of LRF that is

worst-performed among the comparing approaches. PI corresponding to the initial

greedy solution is the lowest, indicating the highest topological cost of the initial greedy

solution. Also observed is that all PIs corresponding to PER-enhanced solutions are

higher than PIs of their initial solutions.

Figure 5-16 shows more details on how the topological solutions from different

algorithms are distributed with respect to weighted wavelength utilization and average

bending factor. In general, the LRF induced solutions have higher average bending

factors. The reason for LRF+PER to perform the best is in that its solutions score high

in both weighted wavelength utilization and average bending factor compared with other

algorithms. The PER induced improvement for the greedy search and link potential

113

Page 114: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Figure 5-16. Weighted wavelength utilization / average bending factor distribution forvaried topological solutions in the networks with 5, 10, 15, 20, and 25wavelengths provision

based greedy search is because the PER process improves the wavelength utilization

by rerouting paths without degrading the “bending” situations.

In this chapter, we focus on understanding the complexity of the topological

optimization problem for spare-sharing based all-optical networks by studying its ILP

formulation. Next, due to computational difficulty of solving reasonably large problems

through ILP formulation, our effort is dedicated to searching algorithmic solutions

to the problem. We first develop a greedy search algorithm whose performance is

verified to be better than the traditional RWA methods based on routing and wavelength

assignment decomposition. Then we propose a two-phase heuristic algorithm in which

two different initial solution search approaches are developed. Through exhibiting results

on an exemplar network, the goodness of the proposed heuristic algorithm is verified by

comparing with the greedy solutions. Finally, a metric, performance indicator, is defined

114

Page 115: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

and verified to reveal the underlying reason of performance difference from varied

algorithms.

115

Page 116: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

CHAPTER 6ORDERED-PATH-ENUMERATION-BASED CANDIDATE ROUTING: A FACILITATING

APPROACH TO SOLVING RWA PROBLEMS FOR OPTICAL NETWORKS

As the study of routing and wavelength assignment (RWA) problems migrates from

solving single lightpath establishment problems to dealing with protective (spare)

lightpath setup in order to tolerate network faults, the hardness of solving those

problems rises dramatically. This is not only because of the extra decision variables

created for the protective lightpaths, but also due to much more complicated constraints

generated to avoid resource conflict and enforce path-disjointedness between the

working and spare lightpaths. The combined effect is the creation of huge constraint

matrices associated with the optimization models for those RWA problems, which

severely challenges the capacity of storage systems and the computational power of

current state-of-the-art machines.

To relax the hardness of fully solving those problems to their global optimality,

researchers traditionally decouple the problems into the routing part and the wavelength

assignment part [41, 67]. By potentially sacrificing the global optimality, the size of

two subproblems can be well controlled for networks of a moderate size. Actually,

often for a specific RWA problem, there exists an intrinsic coupling relation between

the routing part and the wavelength assignment part in order for the problem to be

solved close to its global optimality. In this chapter, we are especially interested in

those RWA problems that are designed to protect the network in a shared-path fashion

[21, 36–38, 41, 57]. The routing parts of those problems are traditionally solved by

searching for a set of link-disjoint paths as routing candidates, because otherwise the

working and spare lightpaths would be subject to simultaneous failures induced by the

fault on the link shared between them. Then the wavelength assignment part takes

those routing options as working and spare lightpath candidates for best wavelength

resource arrangement. The classic link-disjoint path search widely applied in the

116

Page 117: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

literature is k-shortest link-disjoint routing [22, 54], which finds k link-disjoint paths (if

exist) in a directed graph with the lowest total link cost.

However, we will show in this chapter that the paths developed by k-shortest

link-disjoint routing may not best fit the coupling relation between the two subproblems

because of two major reasons: (1) the amount of disjoint paths developed may not

be enough for less-densely connected networks, and (2) the sets of disjoint paths

for different flow requests may not be the best options for the problem as a whole.

In fact, in order to find the best set of candidate routes, the set of possible paths for

routing selection has to be sufficiently large. In this chapter, we propose a new path

enumeration algorithm which can find a pre-described number of paths in an increasing

order of cost for a specific node pair. Based on the pool of enumerated paths, certain

selection rules are applied to form candidate routing sets of a proper size for wavelength

assignment optimization.

6.1 Related Work

The shared-path protection scheme has been investigated in many works, such as

in [21, 36–38, 41, 57], with different problem setups. Both mathematical programming

based formulations [37, 41] and algorithmic heuristics [21, 36, 38, 57] have been applied

to solve the problem. It has been proved in [38] that establishing a single working/spare

lightpath pair is an NP-complete problem. Fully solving the RWA problem for all flow

requests becomes prohibitive even for a small-size network. Hence, k-shortest disjoint

routing is widely applied as the routing solution [41]. However, in [33], the authors

observe that the lack of awareness of the real traffic pattern by k-shortest disjoint routing

leads to a poor connection success rate. It is indicated that the candidate routing set

should be developed in a problem-dependent fashion.

The study on path enumeration (commonly called k-shortest path enumeration)

dates back to Yen’s and Lawler’s algorithms [30, 65]. The basic idea of those algorithms

is to partition the searching space (all un-enumerated paths) into mutually exclusive

117

Page 118: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

subsets based on the enumerated paths, and the next enumerated path is picked as

the shortest one from among all those subsets. [12] provides a comparative study over

seventy related works and concludes Lawler’s method gives the best performance

when considering only acyclic paths and directed graphs. Cyclic-path-allowed path

enumeration is studied in [15]. A more recent work in [25] leverages the replacement

paths algorithm and applies it to work with the shortest path branching structure, which

leads to a factor-Θ(n) improvement when the replacement paths rarely fails. [50, 58]

further consider path enumeration under a set of constraints.

6.2 Contributions and Chapter Organization

The major contributions of this chapter are as follows. First, we formally propose a

new path enumeration algorithm based on a series of theoretical derivation. Second, we

develop a candidate routing scheme to find candidate routing sets that best fit specific

problems. Third, by formulating and solving two concrete RWA problems, we numerically

show evident potential of the path-enumeration-based candidate routing in improving

resource allocation performance.

The rest of this chapter is organized as follows: Section 6.3 describes the proposed

ordered path enumeration algorithm. The candidate routing scheme is discussed in

Sections 6.4 and 6.5, where two specific RWA problems are studied for performance

illustration.

6.3 Ordered Path Enumeration

This section formally describes the ordered path enumeration algorithm that we

propose to develop a pool of possible paths for candidate routes selection.

6.3.1 Definition of Terminologies

Network : denoted by G(N,L), where N is a set of nodes and L is a set of directed

links composing the network.

Ordered Path Container : denoted by Pk(s, d), a sequence of k shortest paths

connecting the source s and the destination d in an increasing order of cost (or length)

118

Page 119: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

in which the first path p1 is indeed the shortest path among all possible paths, the

second path p2 is the second shortest path, ..., and the k th path pk is the k th shortest

path. We call it container for short in the rest of the chapter if the context is clear. We

also assume that all the paths in Pk(s, d) are loop-free because it is of no benefit

to consider the paths with loops for the resource allocation problems studied in this

chapter.

Ordered Path Container Cover : denoted by C(Pk(s, d)), a group of directed links

whose removal from the network leads all the paths in the container Pk(s, d) to be

broken. We call it container cover in the rest chapter if the context is clear.

Minimal Ordered Path Container Cover : denoted by C(Pk(s, d)), a group of directed

links that is an ordered path container cover but is not an ordered path container cover

anymore if any link in the group is removed.

Complete Minimal Container Cover Set: denoted by S(Pk(s, d)), the complete set

of all possible C(Pk(s, d)) that contain minimal numbers of directed links to cover the

ordered path container Pk(s, d).

Complete Covering Link Set: denoted by L(Pk(s, d)), the complete set of directed

links that cover at least one path in Pk(s, d) (i.e., the set of directed links taken by the

paths in Pk(s, d)).

6.3.2 Theorems regarding Ordered Path Enumeration

Theorem 6.1. (k-shortest Path Enumeration) Given the ordered path container

Pk(s, d), Pk+1(s, d) can be formed by adding the (k + 1)th shortest path that is ob-

tained by selecting the shortest path among shortest paths of the networks induced by

removing all links in C(Pk(s, d)) from the original network G(N,L).

Proof: Assume that pk+1 is the (k + 1)th shortest path from s to d in the original

network. According to the uniqueness of path pk+1 and the assumption that all the paths

considered are loop-free, along each path in Pk(s, d) there must be at least one link

not belonging to path pk+1. Then we group those links into a set which by definition

119

Page 120: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

becomes an container cover C(Pk(s, d)). Clearly, there must exist a minimal container

cover C(Pk(s, d)) as a subset of C(Pk(s, d)). Since pk+1 is a valid path in the network

induced by C(Pk(s, d)), in which however all paths in Pk(s, d) are not valid, and pk+1

is the (k + 1)th shortest path in the original network, pk+1 must be the shortest path of

the network induced by C(Pk(s, d)). In other words, the (k + 1)th shortest path pk+1

can be found among the shortest paths of the networks induced by all C(Pk(s, d)) of

S(Pk(s, d)). 2

Theorem 6.1 indeed shows a way to enumerate the paths for a specific

source-destination pair, starting from the first shortest path, in an increasing-cost

order.

Lemma 6.1. Any minimal container cover C(Pk+1(s, d)) in S(Pk+1(s, d)) must

contain a subset that is a minimal container cover C(Pk(s, d)) in S(Pk(s, d)).

Proof (by contradiction): If C(Pk+1(s, d)) does not contain any subset that is a

C(Pk(s, d)), the first k shortest paths then cannot be covered by C(Pk+1(s, d)) and

therefore C(Pk+1(s, d)) is not even a valid container cover, which is a contradiction to the

definition of C(Pk+1(s, d)). 2

This lemma implies that all C(Pk+1(s, d)) can be developed by expanding

C(Pk(s, d)) in S(Pk(s, d)).

Lemma 6.2. The cardinality of any minimal container cover C(Pk+1(s, d)) is at most

greater than the cardinality of its contained minimal container cover C(Pk(s, d)) by 1.

Proof (by contradiction): Assume that the cardinality difference is greater

than 1, which means that there are more than 1 link in C(Pk+1(s, d)) that are not

included in C(Pk(s, d)). Since all first k shortest paths are already covered by the

links in C(Pk(s, d)) and at most one extra link is needed to cover the (k + 1)th path,

C(Pk+1(s, d)) will not be a minimal cover , which contradicts its definition. 2

Lemma 6.3. Any minimal container cover C(Pk+1(s, d)) can only contain one

C(Pk(s, d)).

120

Page 121: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Proof: If C(Pk+1(s, d)) is the same as C(Pk(s, d)), the proof becomes trivial.

If C(Pk+1(s, d)) is not the same as C(Pk(s, d)), according to lemma 6.2, C(Pk(s, d))

can be different from C(Pk+1(s, d)) that contains it by at most one link. Assume that

there are more than one C(Pk(s, d)) contained in C(Pk+1(s, d)) and we name two

of them C1(Pk(s, d)) and C2(Pk(s, d)). Then the cardinality of C1(Pk(s, d)) and

C2(Pk(s, d)) must be |C(Pk+1(s, d))| − 1. Moreover, since neither C1(Pk(s, d))

nor C2(Pk(s, d)) can contain a link covering the (k + 1)th shortest path (otherwise

C(Pk+1(s, d)) is not a minimal container cover ), there is no way to develop C(Pk+1(s, d))

from C1(Pk(s, d)) or C2(Pk(s, d)) by adding only one link unless C1(Pk(s, d)) is the same

as C2(Pk(s, d)). 2

In light of lemmas 6.1, 6.2, and 6.3, we have a formal mechanism to derive the

complete minimal container cover set via container cover expansion, as stated in

theorem 2.

Theorem 6.2. (Container Cover Expansion) Given S(Pk(s, d)), S(Pk+1(s, d))

can be developed from all C(Pk(s, d)) of S(Pk(s, d)) as follows: keep a C(Pk(s, d)) in

S(Pk+1(s, d)) if it can cover the (k + 1)th shortest path or expand a C(Pk(s, d)) that

cannot cover the (k + 1)th shortest path by trying to include one link on the (k + 1)th

shortest path. According to whether the link belongs to the complete covering link set

L(Pk(s, d)), there are two cases:

1. If the link does not belong to L(Pk(s, d)), include it into C(Pk(s, d)) forming a

C(Pk+1(s, d)).

2. If the link does belong to L(Pk(s, d)), include it to form a C(Pk+1(s, d)) if the

resulting container cover is minimal.

Proof: According to lemmas 6.1 and 6.2, all C(Pk+1(s, d)) can be developed from

C(Pk(s, d)) by adding at most one link. According to lemmas 6.2 and 6.3, no two distinct

C(Pk(s, d)) can be expanded to the same C(Pk+1(s, d)), which means there will be no

redundant expansion in developing S(Pk+1(s, d)).

121

Page 122: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

With respect to the expansion from a C(Pk(s, d)) to a C(Pk+1(s, d)), since adding

any link that is not on the (k + 1)th path will not help form a C(Pk+1(s, d)), checking

through the links on the (k + 1)th path is enough to find all possible C(Pk+1(s, d))

expanded from a specific C(Pk(s, d)).

If the added link on the (k + 1)th shortest path does not belong to L(Pk(s, d)),

then it cannot cover any path in Pk(s, d). Taking out any link from C(Pk(s, d)) will leave

Pk(s, d) not fully covered. Therefore the expanded link set by including such a link is a

valid C(Pk+1(s, d)).

If the added link on the (k + 1)th shortest path does belong to L(Pk(s, d)), it

may cover some path(s) in Pk(s, d). Taking out some link from C(Pk(s, d)) may leave

Pk(s, d) still fully covered. If not, the expanded link set is a valid C(Pk+1(s, d)). 2

Theorem 6.2 actually describes a formal way to build up S(Pk+1(s, d)) from

S(Pk(s, d)) through independent expansions on each C(Pk(s, d)) in S(Pk(s, d)).

Theorem 6.3. If the (k + 1)th shortest path has a unique cost in the ordered path

spectrum (a sequence of all possible paths), the minimal container cover expansions

from S(Pk(s, d)) to S(Pk+1(s, d)) only happen on C(Pk(s, d)) that leads to generation

of the (k + 1)th shortest path by removing all the links in C(Pk(s, d)) from the original

network G(N,L).

Proof (by contradiction): Assume an expansion happens on a C(Pk(s, d)) that

does not lead to generation of the (k + 1)th shortest path but another path p. According

to the process of ordered path enumeration and the cost uniqueness of the (k + 1)th

shortest path, path p must have a higher cost than the (k + 1)th shortest path. Since

by assumption the C(Pk(s, d)) does not cover the (k + 1)th shortest path (because it

is expanded to cover the (k + 1)th shortest path), path p cannot be the shortest path

induced by C(Pk(s, d)), which contradicts path p’s definition. 2

Theorem 6.3 provides insight in the scope of minimal container cover expansions

after a new path is enumerated.

122

Page 123: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Theorem 6.4. All the C(Pk(s, d)) that lead to generation of a shortest path with

a cost greater than the cost of the (k + 1)th shortest path will not be expanded when

developing S(Pk+1(s, d)).

Proof (by contradiction): Assume such a C(Pk(s, d)) gets expanded when

developing S(Pk+1(s, d)), which means the C(Pk(s, d)) cannot cover the (k + 1)th

shortest path. Since the shortest path generated by removing all the links in C(Pk(s, d))

has a greater cost than the (k + 1)th shortest path has, that path is not a valid shortest

path associated with C(Pk(s, d)). That is a contradiction. 2

Theorem 6.4 states that expansions, at each round of path enumeration, are well

bounded and hence wasted expansions are thereby avoided.

6.3.3 The Ordered Path Enumeration Algorithm

Based on the derivation of above theorems and lemmas, we formulate the ordered

path enumeration algorithm in Figure 6-1 1 2 , which enumerates K shortest paths

connecting s and d in network G(N,L). Theorem 6.4 can be applied in line 9 of the

algorithm to ease the condition check because C(Pk(s, d)) must cover pk+1 if the

shortest path cost of the network G(N,L\C(Pk(s, d))) is higher than the cost of pk+1.

6.3.4 Container Cover Minimality Detection

As indicated in line 24 in Figure 6-1, decision on minimality of the expanded

container cover C(Pk(s, d)) ∪ l is a necessary step to guarantee the minimality of and

to control the growth of the complete container cover set S(Pk+1(s, d)).

A naive way to examine the minimality of the expanded container cover

C(Pk(s, d)) ∪ l is by definition to check if any of its subsets formed by removing

one link in C(Pk(s, d)) can still cover all the paths in Pk(s, d) (there is no need to check

1 The set operator ”\” in line 11 refers to the relative complement, i.e., L\C(Pk(s, d)) , l | l ∈ L, l /∈C(Pk(s, d)).

2 The function call “shortest path( )” in line 11 can be saved by storing the shortest path and its cost innetwork G(N,L\C(Pk(s, d))) the first time when C(Pk(s, d)) is formed.

123

Page 124: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Algorithm: Ordered Path EnumerationInput: G(N,L), s , d , K //network, source, destination, required number of pathsOutput: paths[K ] // orderly enumerated paths

1. procedure Ordered Path Enumeration2. P0(s, d)← Ω, C(P0(s, d))← Ω3. L(P0(s, d))← Ω, S(P0(s, d))← C(P0(s, d))4. (paths[1], paths cost[1])← shortest path(G(N,L), s, d)5. k ← 06. while (k < K)7. S(Pk+1(s, d))← Ω, next cost ←∞8. for each C(Pk(s, d)) in S(Pk(s, d))9. if C(Pk(s, d)) covers paths[k + 1]

10. S(Pk+1(s, d))← S(Pk+1(s, d)) ∪ C(Pk(s, d))11. (path, cost)← shortest path(G(N,L\C(Pk(s, d))), s, d)12. if next cost > cost13. next cost ← cost, next path ← path14. end if15. else16. for each link l on paths[k + 1]17. if l /∈ L(Pk(s, d))18. S(Pk+1(s, d))← S(Pk+1(s, d)) ∪ C(Pk(s, d)) ∪ l19. (path, cost)← shortest path(G(N,L\l\C(Pk(s, d))), s, d)20. if next cost > cost21. next cost ← cost, next path ← path22. end if23. else24. if C(Pk(s, d)) ∪ l is a minimal container cover25. S(Pk+1(s, d))← S(Pk+1(s, d)) ∪ C(Pk(s, d)) ∪ l26. (path, cost)← shortest path(G(N,L\l\C(Pk(s, d))), s, d)27. if next cost > cost28. next cost ← cost, next path ← path29. end if30. end if31. end if32. end for33. end if34. end for35. L(Pk+1(s, d))← L(Pk(s, d)) ∪ l |l ∈ paths[k + 1]36. k ← k + 137. paths[k + 1]← next path38. end while39. end procedure

Figure 6-1. Pseudo code of the ordered path enumeration algorithm

124

Page 125: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

the coverage of the (k + 1)th shortest path because it is covered by link l). When there

is such a subset found that is able to cover all the paths in Pk(s, d), we decide that

C(Pk(s, d))∪l is not minimal. Instead of checking coverage of all the paths in Pk(s, d),

a smarter way is to only check if link l can cover the paths that are uniquely covered by

the removed link (but not by any other link in C(Pk(s, d))). This unique coverage relation

needs to be maintained through the container cover expansion process, which is not a

complex operation and is not described in detail in the interest of space. There also exist

heuristic opportunities and the detailed discussion is skipped as well.

6.3.5 Potential Algorithmic Advantages

As we show in algorithm description, the minimal container cover expansion based

path enumeration features bounded expansions. Besides, each time the shortest path

call operates on a network different from its last call (before container cover expansion)

only by one link absence (such difference however is huge in Lawler’s method). Hence,

incremental implementation of the shortest path call is potentially possible.

6.4 Application I: Wavelength Utilization Minimization for RWA with Shared-PathProtection

As mentioned at the beginning of this chapter, one of the reasons for which

k-shortest disjoint routing may not perform well is that the network is less-densely

connected and hence not many disjoint paths can be developed. For example, in

the NSF network as shown in Figure 6-2, the average number of link-disjoint paths

developed by the k-shortest disjoint routing algorithm over all possible node pairs

is 2.32. However, for the RWA problem with shared-path protection, as studied in

[21, 36–38, 41, 57] and described afterwards, there should be two link-disjoint paths for

each flow request (one for the working lightpath and the other for the spare lightpath).

Hence, the pool of candidate routes given by k-shortest link-disjoint routing may not

provide enough routing choices for solving the problem to good optimality.

125

Page 126: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Figure 6-2. NSF network

6.4.1 Problem Description

Given a network G(N,L) and a group of flow requests, the problem is to find and

assign continuous wavelengths to a pair of working and spare lightpaths for each flow

request with a set of design rules. The objective of the solution is to minimize the total

wavelengths used throughout the network. The design rules are described as follows:

1. The working path and its spare path for any flow request must be link-disjoint;

2. No wavelength on any link can be shared neither between two working paths nor

between a working path and a spare path;

3. No two spare paths can share the same wavelength on any link if their working

paths join each other anywhere in the network.

Shared-path protection can effectively help lower the resource requirement for the

protective paths and it guarantees that the network can survive over one arbitrary link

failure.

6.4.2 Candidate Routing

Since the lack of routing choices caused by applying k-shortest disjoint routing

to a less-densely connected network potentially degrades the optimality in solving

the problem, more routing options need to be explored with the following three

considerations: (1) the candidate routes are expected to have short length for resource

saving; (2) the disjointedness relation among the candidate routes for a flow request

should be high enough for broader choices on selecting disjoint working/spare path pairs

126

Page 127: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

among them; (3) the number of candidate routes needs to be moderately controlled in

order for the problem complexity to stay comparable to the k-shortest disjoint routing

based method.

We treat the paths in PK(s, d) developed by the proposed path enumeration

algorithm as vertices, and there is an undirected edge between two vertices if the two

paths that the two vertices represent are link-disjoint. We then call such graph path −

disjointedness graph, denoted by G(PK(s, d)). In addition, we sort all the vertices based

on their corresponding path costs. According to the three considerations described

above, our goal is to find a subgraph (containing a controlled number of vertices) in

G(PK(s, d)) that is as dense as possible and meanwhile contains vertices with costs as

low as possible.

With respect to the latest studies on dense subgraphs [4, 5, 17, 28], although

finding a subgraph of maximum density 3 without size constraints on it is shown to be a

polynomial-time problem [28], solving the size-constrained densest subgraph problem

remains NP-hard [5, 17]. In addition, those studies do not consider vertex costs in

selecting subgraphs. We propose a simple heuristic scheme to balance the density

and the cost considerations at the same time, which searches for a subgraph with a

pre-described number of vertices in G(PK(s, d)).

The idea is to start the search from the lowest-cost vertex. From there each time

we try to find a path that is of the lowest cost among all the unselected paths that are

link-disjoint with the path selected at the last round. If there is no such path available,

then the search backtracks returning to the most recent vertex along the search tree and

starts again. The merit of this method is that the search is always trying to find low-cost

paths and at the same time keeps a certain level of path disjointedness. Figure 6-3

3 The density of a subgraph on vertex set S is defined as d(S) , |E(S)|/|S | , where E(S) is the set ofedges in the subgraph induced by vertices in S .

127

Page 128: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

shows the pseudo code of the candidate routing scheme, from which we can see the

algorithm is indeed a depth-first-search (DFS) traversal over a pre-described number of

vertices in a vertex-cost-sorted graph.

Algorithm: Candidate Routes SearchInput: PK(s, d), G(PK(s, d)), M // p1, ..., pK are sorted by costOutput: RM(s, d) // candidate route set of cardinality M

1. procedure Candidate Routes Search2. RM(s, d)← p13. set all elements of last visit[K ] to UNVISITED4. i ← 2, last visit[1]← DEADEND5. while(i ≤ M) // search for i th candidate path6. j ← index of the latest included path in RM(s, d)7. found ← NO8. while (j = DEADEND)9. for (k from 1 to K )

10. if ((pj , pk are link-disjoint) and (last visit[k ] ==UNVISITED))11. RM(s, d)← RM(s, d) ∪ pk // found a new path12. found ← YES, last visit[k ]← j // record the search tree13. break14. end if15. end for16. if (found == YES)17. break18. else19. j ← last visit[j ] // backtrack20. end if21. end while22. i ← i + 123. end while24. end procedure

Figure 6-3. Pseudo code of the candidate routing scheme

6.4.3 Problem Formulations

We provide three integer linear programming (ILP) formulations for the

shared-path-protection-based RWA problem. The first one provides an original

formulation that leaves the choices on routing and wavelength assignment fully open.

The second one limits the routing options to the paths developed by the k-shortest

128

Page 129: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

link-disjoint routing algorithm. The third one applies candidate routing, as described

above, to create routing options.

6.4.3.1 Notations Used in Three Formulations

Constants:.

• N: Number of nodes in network G(N,L)

• L: Number of directed links in network G(N,L)

• F : Number of flow requests

• W : Number of provided wavelengths on each link

• Rf : Number of candidate routes provided to flow f , which depends on the routingscheme used

Indices:.

• i : Node index taking integers from 0 to N − 1

• l : Unidirectional link index taking integers from 0 to L− 1

• f : Flow index taking integers from 0 to F − 1

• r : Route index taking integer from 0 to Rf − 1

• w : Wavelength index taking integers from 0 toW − 1

Sets:.

• Rl : Set of all candidate routes of all flows passing through the unidirectional link l

• Lini : Set of unidirectional links terminating at node i

• Louti : Set of unidirectional links starting from node i

• C fr : Set of conflicting routes in flow f ’s candidate routing set that are notlink-disjoint with route r of flow f

Decision variables (integer):.

• x fwl , y fwl : Represent whether flow f routes its working and spare paths,respectively, through wavelength w on link l by taking on 1 or 0

129

Page 130: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

• ufwr , v fwr : Represent whether the working and spare paths, respectively, of flow ftake route r through wavelength w by taking on 1 or 0

Auxiliary variables (integer):.

• λfw1 , λfw2 : Represent whether the working and spare paths of flow f , respectively,

take on wavelength w by taking on 1 or 0

• ewl : Represents whether wavelength w on link l is assigned (to either a working ora spare lightpath) by taking on 1 or 0

• Ew : Represents whether wavelength w is assigned anywhere in the network bytaking on 1 or 0

6.4.3.2 The Original Formulation

Model:.

min∑w

Ew (6–1)

subject to following constraints:

1. Working/spare path validity and wavelength continuity.

∑l1∈Lini

x fwl1 −∑l2∈Louti

x fwl2 =

−λfw1 , if s(f ) = i

+λfw1 , if d(f ) = i

0, O.W .

(6–2)

∑l1∈Lini

y fwl1 −∑l2∈Louti

y fwl2 =

−λfw1 , if s(f ) = i

+λfw1 , if d(f ) = i

0, O.W .

(6–3)

∑w

λfw1 = 1 (6–4)

∑w

λfw2 = 1 (6–5)

130

Page 131: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

where s(f ) and d(f ) in (6–2) and (6–3) refer to the source and destination nodes of

flow f .

2. Working/spare path link disjointedness.

∑w

x fwl +∑w

y fwl ≤ 1 (6–6)

3. Conflict avoidance between paths.

a. Resource conflict avoidance on each wavelength link:

∑f

x fwl + yfwl ≤ 1 (6–7)

b. Spare/spare resource conflict avoidance on the same wavelength link:∑w

x f1wl1 +∑w

x f2wl1 + yf1wl2+ y f2wl2 ≤ 3

f1 = f2 and l1 = l2

(6–8)

Equation (6–7) indicates that, on any wavelength link, either only one working path

or multiple spare paths are allowed to be established, which enforces design rule 2

described in Section 6.4.1. Equation (6–8) makes design rule 3 hold in which two spare

paths cannot take the same wavelength link (then y f1wl2 + yf2wl2= 2) if the corresponding

two working paths join each other (then∑w xf1wl1+∑w xf2wl1= 2).

4. Wavelength link occupation accounting.

x fwl ≤ ewl (6–9)

y fwl ≤ ewl (6–10)

ewl ≤ Ew (6–11)

131

Page 132: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

6.4.3.3 k-Shortest Disjoint Routing Based Formulation

Model:.

min∑w

Ew (6–12)

subject to following constraints:

1. Path validity and wavelength continuity (automatically satisfied since all

paths developed by k-shortest disjoint routing are valid paths).

2. Working/spare path link disjointedness.

∑w

ufwr +∑w

v fwr ≤ 1 (6–13)

∑r

∑w

ufwr = 1 (6–14)

∑r

∑w

v fwr = 1 (6–15)

3. Conflict avoidance between paths.

a. Resource conflict avoidance on each wavelength link:

∑(f ,r)∈Rl

ufwr + vfwr ≤ 1, for (f , r) ∈ Rl (6–16)

b. Spare/spare resource conflict avoidance on the same wavelength link:∑w

uf1wr1 +∑w

uf2wr2 + vf1wr3+ v f2wr4 ≤ 3,

f1 = f2, r1 = r3, and r2 = r4,

(f1, r1) ∈ Rl1, (f2, r2) ∈ Rl1, (f1, r3) ∈ Rl2,and (f2, r4) ∈ Rl2,

l1 = l2.

(6–17)

132

Page 133: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

4. Wavelength link occupation accounting.

ufwr ≤ ewl , for (f , r) ∈ Rl (6–18)

v fwr ≤ ewl , for (f , r) ∈ Rl (6–19)

ewl ≤ Ew (6–20)

It should be noticed that, in above formulation, route index r ranges over all possible

routes developed by k-shortest disjoint routing, and it can vary from flow to flow because

of different local connectivity among node pairs in the network.

6.4.3.4 Candidate Routing Based Formulation

The candidate routing based formulation is essentially very similar to the k-shortest

disjoint routing based formulation except that the range of the route index r now

depends on the candidate routing set, and the disjointedness constraint formulated

in (6–13) is replaced by

∑w

ufwr +∑w

v fwr +∑

(f ,r)∈C fr

∑w

v fwr ≤ 1. (6–21)

The additional term∑(f ,r)∈C fr

∑w v

fwr added to the constraint expression is to avoid

selecting the working and spare paths that are not link-disjoint, which is not needed in

the k-shortest disjoint routing based formulation because all routes developed there are

link-disjoint.

6.4.3.5 Formulation Comparison

We compare above three formulations on the NSF network in the following aspects:

problem size, route processing time, and average candidate route disjointedness. For the

k-shortest disjoint routing based formulation, all the link-disjoint routes developed for

133

Page 134: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

each flow are included for routing options. For the candidate routing based formulation,

the candidate routing sets of sizes 3 and 4, respectively, are considered for each flow.

Table 6-1. Problem size comparison among formulations: number of variablesNumber of flow requests 10 20 30 40 50

Original formulation 8190 15990 23790 31590 39390k-shortest disjoint routing based 850 1330 1790 2250 27103-candidate routing based 990 1590 2190 2790 33904-candidate routing based 1190 1990 2790 3590 4390

Table 6-2. Problem size comparison among formulations: number of constraintsNumber of flow requests 10 20 30 40 50

Original formulation 1280380 5372380 12276380 21992380 34520380k-shortest disjoint routing 3003 8017 14420 23703 349063-candidate routing based 4690 13180 25030 41310 584904-candidate routing based 9720 35040 70840 123020 185990

Table 6-3. Route processing time comparison (in second, running on a Windowsmachine with a 3GHz processor)

Number of flow requests 10 20 30 40 50

Original formulation 0 (no route search required)k-shortest disjoint routing based < 0.001 < 0.001 < 0.001 < 0.001 < 0.0013-candidate routing based 0.016 0.047 0.078 0.094 0.1254-candidate routing based 0.016 0.047 0.078 0.094 0.125

The problem size comparison is characterized in Tables 6-1 and 6-2, which record

the numbers of variables and constraints generated for different problem formulations

when 10 wavelengths are available on each link. As we can observe, the original

formulation leads to a huge problem size even for a small problem, which indeed

prohibits modern ILP solvers 4 from obtaining a valid solution. However, the sizes of

those candidate path based formulations are moderately controlled.

The route processing time is compared in Table 6-3, which is defined as the time

spent on generating routes for different formulations. For the candidate routing based

4 Modern ILP solvers can, depending on the problem structure, solve a problem with up to a few tensof thousands variables/constraints in general.

134

Page 135: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Table 6-4. Average candidate route disjointedness comparison (averaged over flows)Number of flow requests 10 20 30 40 50

k-shortest disjoint routing based 1.60 1.70 1.67 1.65 1.643-candidate routing based 2.30 2.35 2.33 2.30 2.284-candidate routing based 3.90 4.00 3.97 3.98 3.90

formulation, this time includes enumerating all possible paths for each flow on the NSF

network and running the candidate routing algorithm (listed in Figure 6-3). It is observed

that, although the candidate routing based formulation requires higher route processing

time, the time cost is on average still very low.

Table 6-4 shows the potential benefit of applying candidate routing by comparing

average candidate route disjointedness, which is defined as the average number of

link-disjoint path pairs in a candidate routing (or k-shortest disjoint routing) set over all

flow requests. This quantity indicates the flexibility in choosing a work/spare path pair

when solving the RWA problem. As observed from Table 6-4, candidate routing leads

to much higher flexibility in working/spare paths selection, which can be leveraged for

better solution optimality.

6.4.4 Numerical Results

We test the above ILP formulations and evaluate their performance by sending them

to an ILP solver MOSEK, a large-scale mixed-integer linear program solver applying a

combination of the interior point, branch and cut technologies [1]. Figures 6-4 and 6-5

shows the best results after running MOSEK on different formulations for 8 hours. We

can clearly observe the performance advantage of candidate routing over k-shortest

disjoint routing when the number of flow requests and the size of the candidate routing

set increase. On average, the performance improvement reaches 8.25% and 14.68%,

respectively, for 3-candidate routing and 4-candidate routing over the problem instances

with flow numbers from 20 to 50.

135

Page 136: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Figure 6-4. Solution optimality comparison between k-shortest disjoint routing and3-candidate routing after running MOSEK for 8 hours

Figure 6-5. Solution optimality comparison between k-shortest disjoint routing and4-candidate routing after running MOSEK for 8 hours

6.5 Application II: Topological Optimization for Shared-Path Protection RWA

Another reason for potential unsatisfactory performance of k-shortest disjoint

routing is that the routing set developed may not best fit the problem nature as we

discuss in this section.

6.5.1 Problem Description

The problem is similar to the problem discussed in the last section in the sense that

all the flow requests have to be addressed by allocating working/spare path pairs and

all the design rules described in Section 6.4.1 must hold. The difference in topological

optimization is that there is no fixed topology and the objective is to find the least-cost

136

Page 137: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

topology that can accommodate all the flow requests. The topological cost is defined

as the sum of the costs of all bidirectional links that are allocated to flow requests. The

solution to this problem can be potentially used as a topological choice of initial network

deployment, or it can also be used for generating a new logic topology to adapt the

traffic over a new physical network condition, as we discuss in the last chapter.

6.5.2 Candidate Routing

The nature of the problem indicates, in order to use less link resources

(corresponding to having a lower-cost topology), the wavelengths on each assigned

link should be as fully utilized as possible and therefore the link resources can be

efficiently shared among the flows. Such indication implies that the candidate routes of

flows are expected to have high potential to overlap. However, the k-shortest disjoint

routing algorithm develops routing sets for each flow independently and no overlap

potential among the routing sets is considered.

We first define bidirectional link potential ρb as

ρb ,F∑f=1

Kf∑k=1

I fkb , (6–22)

where I fkb indicates whether the k th enumerated path of flow f passes through

bidirectional link b by taking on 1 or 0, F is the number of flow requests, and Kf is

the number of enumerated paths for flow f . Hence, ρb becomes a frequency counter

indicating the overlap potential of all possible paths on link b.

We then define path potential ρfk for enumerated paths as

ρfk , (∑b∈pfk

ρb · cb)/(∑b∈pfk

cb), (6–23)

where cb is the cost of bidirectional link b and pfk is the k th enumerated path (a set

of bidirectional links) of flow f . ρfk essentially can be treated as a score, averaged over

the links that path pfk passes through, indicating the path’s overlap potential with other

paths.

137

Page 138: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

The candidate routing for the topological optimization problem takes similar

considerations as for the problem discussed in the last section except that, instead

of choosing short-length paths, the selected candidate routes are expected to have

high path potentials. Then the candidate routing selection scheme described in Figure

6-3 can still apply to the topological optimization problem with the only change that

the vertices in the path − disjointedness graph G(PK(s, d)) are sorted based on their

corresponding path potentials.

6.5.3 Problem Formulations

The three types of formulations corresponding to the ones in the last section are

shown after introducing several new notations.

6.5.3.1 Notations

Only the notations that uniquely apply to the topological optimization problem are

listed. The rest of notations can be referred to in the last section.

Indices:.

• l : Unidirectional link index ranging from 0 to N(N − 1)− 1

• b: Bidirectional link index ranging from 0 to N(N − 1)/2− 1

Sets:.

• Rb: Set of all candidate routes of all flows passing through bidirectional link b

Data:.

• cb: Cost of bidirectional link b

Auxiliary variables (integer):.

• zb: Indicates whether bidirectional link b is allocated by taking on 1 or 0

6.5.3.2 The Original Formulation

Model:.

min∑b

cb · zb (6–24)

138

Page 139: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

subject to the following constraints 1-4:

Constraints 1, 2, and 3 are the same as those listed for the original formula-

tion in the last section. Constraint 4 is as follows.

4. Bidirectional link utilization accounting.

x fwl ≤ zb, b = ⌊l/2⌋ (6–25)

y fwl ≤ zb, b = ⌊l/2⌋ (6–26)

6.5.3.3 k-Shortest Disjoint Routing Based Formulation

Model:.

min∑b

cb · zb (6–27)

subject to the following constraints 1-4:

Constraints 1, 2, and 3 are the same as those listed for the k-shortest disjoint

routing based formulation in the last section. Constraint 4 is as follows.

4. Bidirectional link utilization accounting.

ufwr ≤ zb, for (f , r) ∈ Rb (6–28)

v fwr ≤ zb, for (f , r) ∈ Rb (6–29)

It should be noticed that there is no harsh limit on the cardinality of k-shortest

disjoint routing sets because the topology now is open for the problem discussed in this

section.

6.5.3.4 Candidate Routing Based Formulation

The candidate routing based formulation for the topological optimization problem

is very similar to the above k-shortest disjoint routing based formulation with the same

exception as described in the corresponding place of Section 6.4.3.4.

139

Page 140: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

6.5.3.5 Formulation Comparison

Since the hard limit on the cardinality of k-shortest disjoint routing sets is removed,

we can apply the same number of candidate routes to both the k-shortest disjoint

routing based and the candidate routing based formulations. Therefore, the resulting

problem size is very close for the above two formulations while the problem size of

the original formulation is still overwhelming for any modern ILP solver. The route

processing time for all the candidate routing based ILP instances that take the first 100

enumerated paths into candidate routing selection is below 5 seconds on a network

described in the next subsection. In the interest of space, those comparison details are

not listed.

6.5.4 Numerical Results

The performance of the ILP formulations is shown in Figures 6-6 and 6-7, where the

best topological costs for the various traffic loads among 16 US major cities (as shown

in Figure 5-11) are illustrated. There are 10 wavelengths available on each link and the

link cost is assumed proportional to the distance between cities. We can observe that

(1) increase of the number of candidate routes helps achieving better optimality (as we

compare Figures 6-6 and 6-7), and (2) the candidate routing based formulation brings

down the topological cost induced by the k-shortest disjoint routing based formulation,

on average, by 14.14% and 14.92% for the 4-candidate routing and 5-candidate routing

respectively.

Although the apparent benefit of k-shortest disjoint routing (algorithmic easiness

and low link utilization) traditionally makes it an easy option for developing candidate

routes, the lack of awareness of the specific problems’ nature may lead the solutions

to deviate from their global optimality. Hence, in-depth exploration of possible routing

choices for the best fit to the problem is needed. In this chapter, we first formally

propose a new container-cover-expansion-based path enumeration algorithm and

then develop a candidate routing scheme with special consideration on the problem

140

Page 141: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Figure 6-6. Solution performance comparison between k-shortest disjoint routing and4-candidate routing after running MOSEK for 8 hours

Figure 6-7. Solution performance comparison between k-shortest disjoint routing and5-candidate routing after running MOSEK for 8 hours

nature. The numerical results show that a great performance benefit can be obtained by

applying such methods to two shared-path-protection-based RWA problems.

141

Page 142: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

CHAPTER 7CONCLUSIONS AND FUTURE WORK

7.1 Conclusions

This dissertation carries out an in-depth study on fault-tolerant all-optical

communication networks involving many aspects of the resource-allocation-related

problems, which include routing, wavelength assignment, and topology optimization.

We start with a fault-tolerant routing and wavelength assignment problem under the

N × N torus structure, in which we propose an optimal non-overlapping lightpath setup

algorithm (FOLD) to establish 4 link-disjoint lightpaths for all source-destination pairs.

The development of an efficient wavelength assignment and reuse (WAR) scheme

follows which efficaciously fits lightpaths together into a low number of wavelengths. The

efficiency of the scheme is verified by showing a very small performance gap between

the scheme and the lower bound solution in which wavelength conversion is applied.

In the end, we validate the proposed fault-tolerance-enhanced torus architecture

with respect to the connection reliability and under-failure throughput degradation via

extensive simulation results. The observation from the numerical comparisons states

that, via applying the proposed fault-tolerant architecture,

• the network can tolerate up to 3 arbitrary critical link failures without loss of anyconnection,

• the connection reliability is improved by an order of more than 104 under theregular failure probability (≪ 102) in the 4× 4 torus,

• and the average network throughput can sustain over a much larger number offailures without evident degradation than the regular network architecture withoutfault-tolerance design enabled.

In order to reduce the wavelength utilization while keeping the fault-tolerance

feature, varied spare sharing schemes are developed and applied to the torus-based

architecture. The tradeoff between the capacity of fault tolerance and resource utilization

is demonstrated via a Monte Carlo sampling based simulation over a 4× 4 torus.

142

Page 143: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

The other examined classic topology for fault-tolerance study is the circulant

graphs, in which any number of communication nodes and arbitrary connectivity can be

supported. In light of Menger’s theorem, we develop a node-disjoint routing algorithm

for all source-destination pairs in the circulant graphs of the form CN(1, ...,W ), in

which all the routes are analytically calculated with respect to the node indices. We

also provide a thorough resource utilization analysis and derive a probabilistic model

to capture both node and link failures’ effect to the connection reliability. A numerical

analysis based on a 16-node circulant graph shows:

• the link resource utilization does not vary much over different source-destinationpair locations for the same degree of network connectivity,

• and the connection reliability increase almost linearly in the logarithmic scale withthe increase of the degree of network connectivity, showing the vast fault tolerancepotential of the circulant graphs.

Besides developing fault-tolerant routing and wavelength assignment algorithm

based on the classic topologies, the study is also given to the problem that targets

to construct or define, upon disaster occurring certain part of existing network

infrastructure, a new fault-tolerant topology with the lowest cost. We name this

type of problems as the topological optimization or adaptation problems, which are

anticipated to be computationally NP-hard. The problem is formulated into two forms

of ILPs with different characterizing granularity. We show the lack of optimality of the

traditional solving method in which routing and wavelength assignment are treated as

two independent subproblems by comparing with a greedy approach. Finally, based

on the study of the problem nature, we propose a two-phase heuristics for the problem

and the numerical results show a vast topological cost improvement from the greedy

approach.

7.2 Future Work

Along the process of the fault-tolerance study with findings on many

resource-allocation-related problems, this dissertation is aware that there still exist

143

Page 144: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

many facets of research worthy of further investigation and the focuses of the next-stage

effort may flow into following directions:

• In the torus-based non-overlapping lightpaths setup algorithm, the controllerdisjointedness is not explicitly emphasized although only Cases III and IVcan cause lightpaths to join at two controllers. In the future, either a clearanalytical analysis on the fault-tolerance performance difference betweenthe proposed FOLD and a controller-disjointedness-enforced design or acontroller-disjointedness-oriented RWA optimization could be studied.

• In the probabilistic study of the torus-based fault-tolerant architecture, a uniformlydistributed traffic pattern and failure pattern across the torus are assumed.However, the traffic pattern may not be distributed in this way and may even varywith time. The failure probability distribution may depend on the specific structuralor operational vulnerability of the avionic systems on the aircrafts. Hence, atraffic-pattern-aware or failure-distribution-aware routing and resource allocationadaptation study may need further study in order for the torus architecture to beexamined in more practical aspects.

• In the fault-tolerant routing study on the circulant graphs, we assume that theoffset A is restricted to take a set of continuous integers 1, ...,W . However,this restriction may not lead the proposed routing algorithm to optimality in linkresource utilization or connection reliability. Future study may be dedicated tooptimizing the integer offset A in CN(A) with the goal of maximizing connectionreliability or minimizing resource utilization by relaxing the elements of A to take onany integers in [1, ⌊N/2⌋].

• In the topological optimization problem, we anticipate its complexity to be NP-hardvia being aware that many of its subproblems are NP-complete. However, that isnot a rigorous statement without a strict proof. Proper well-known NP-completeproblems need to be identified for the topological optimization problem to bereducible to and then the NP-hard statement about the topological optimizationproblem can strictly hold.

• We provide a preliminary analysis on the approximation of the greedy approach tothe topological optimization problem. However, the analysis works only on workingpaths allocation and the resulting ratio is not tight enough to show the performanceof the greedy approach. There may still exist space of analysis to further tightenthe ratio and we expect to include both working and backup paths allocation intothe analysis.

• We formally propose a new ordered-path-enumeration algorithm. However, acomprehensive analysis on its algorithm efficiency is not fully conducted. Inthe future, we plan (1) to analyze the algorithm complexity by comparing it indetail with the well-known path enumeration methods such as Yen’s and Lawler’s

144

Page 145: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

algorithms, and (2) to utilize the path enumeration to identify potential multipleoptimal k-shortest disjoint routing solutions that the current k-shortest disjointrouting algorithm cannot.

145

Page 146: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

APPENDIX AOPTIMALITY PROOF OF THE PROPOSED NON-OVERLAPPING LIGHTPATHS

SETUP ALGORITHM (FOLD)

We base the optimality proof of the proposed non-overlapping lightpaths setup

algorithm (FOLD) on the k-shortest link-disjoint paths algorithm [10] [54] [22]. Here k is

equal to 4 with respect to FOLD.

In general, the greedy algorithm described in Figure 2-2 does not necessarily lead

to an optimal solution, as shown in Figure A-1. A pair of link-disjoint paths (in orange

and blue) generated via the greedy algorithm takes 3 + 6 = 9 links (as shown in Figure

A-1(A)), which is greater than the number of links that the optimal solution (as shown in

Figure A-1(B)) takes. A

S D

B C

E F G

H I J K L

A Greedy solution

A

S D

B C

D E F

H I J K L

B Optimal solution

Figure A-1. Non-optimality demonstration for a greedy disjoint routing solution

The optimal k-shortest link-disjoint paths algorithm is based on path augmentation

and it guarantees reaching optimality via finding one of optimal solutions if there are

many. The algorithm finds optimal k shortest link-disjoint paths by augmenting optimal

k − 1 shortest link-disjoint paths. Take 2-shortest link-disjoint paths as an example, as

shown in Fig. 22, to illustrate how the algorithm works.

Step 1: Find the shortest path P1 from the source to the destination, as shown in

Figure A-2(A);

Step 2: Replace P1 with −P1 (reverse the link direction and change the link weight

from +1 to −1), as shown in Figure A-2(B);

Step 3: Find a shortest path P2 from the source to the destination in the modified

graph, as shown in Figure A-2(C);

146

Page 147: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

A

S D

B C

E F G

H I J K L

A

A

S D

B C

E F G

H I J K L

-1 -1 -1

B A

S D

B C

E F G

H I J K L

-1 -1

-1

C

A

S D

B C

E F G

H I J K L

-1 +1

D

Figure A-2. Path augmentation based 2-shortest disjoint routing

Step 4: Take the union of P1 and P2, remove from the union the link set that consists

of the P1 links whose reversed links appear in P2, then group the remaining links into

two link-disjoint paths P ′1 and P ′

2, which are an optimal 2-shortest link-disjoint paths, as

shown in Figure A-2(D).

We call the shortest path generated in Step 3 the augmenting path. Based on the

optimal 2-shortest link-disjoint solution just obtained, we can extend above procedures

to obtain an optimal 3-shortest link-disjoint solution by replacing P ′1 and P ′

2 with −P ′1

and −P ′2 and following similar steps to Steps 3 and 4. Then, any optimal k-shortest

link-disjoint paths can be obtained based on optimal (k − 1)-shortest link-disjoint paths.

From above description of the optimal k-shortest link-disjoint routing, we observe

that the greedy algorithm will perform the same as the optimal algorithm if the shortest

path generated in Step 3 does not overlap any paths in the optimal link-disjoint paths set

generated after the previous iteration.

Hence, if each greedy path developed in Section III can satisfy the above condition,

we can conclude that the proposed lightpaths setup algorithm (FOLD) can generate

optimal solutions for any S-D positional relation.

147

Page 148: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

D

Figure A-3. “Progressive” and “regressive” links

To facilitate the proof of the above claim, we re-examine all the links in the torus

with respect to a destination (D), as shown in Figure A-3, in terms of their facilitation in

routing towards the destination. The links in orange indicate those links by taking which

the route gets close to the destination (we call them progressive links). The links in blue

indicate those links by taking which the route gets away from the destination (we call

them regressive links).

Regarding X-Y routing, since the first and second shortest paths are both the

shortest paths throughout the network, they are optimal 2-shortest disjoint paths. Then

we find optimal 3-shortest disjoint paths via augmenting the 2-shortest disjoint paths

by reversing the 2 paths and associating each reversed link with weight −1. It can be

observed that all reversed links on the 2 paths are regressive links for all cases (I, II,

III and IV) of S-D positional relationship. Although by taking any of those links a route

can gain −1 weight benefit, at least one ”turn-back” hop has to be paid for the route to

reach the destination. Hence, taking those reversed links leads to no benefit in routing

a shortest path as in Step 3 during path augmentation. Therefore, the augmenting path

does not need to take on any links on the 2-shortest paths and the first 3 greedy paths

generated by FOLD are optimal. For the fourth greedy paths, the discussion has to be

148

Page 149: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

based on cases. For Cases II, III and IV, it can be observed that all reversed links on

the third shortest path are regressive links but possibly the link incident to the source

is not. According to the loop-free property of the path augmentation algorithm [15],

the augmenting path will not retake any links including the link incident to the source.

Therefore, the augmenting path for generating 4-shortest paths does not need to take

on any links on the 3-shortest paths, and all the four greedy paths are optimal. For

Case I, it can be observed that all reversed links on the third shortest path are either

regressive or incident to the source except one horizontal link at the up right corner

of the third greedy path (as shown in Figure 2-4(A)). We label the tail controller as D3

and the head controller as S3 incident to that link. However, the benefit of taking this

link is overwhelmed by the cost of routing from the source to D3 followed by routing

from S3 to the destination after removal of links on three optimal shortest paths. Hence,

the augmenting path can also be routed independently of the three optimal paths.

Accordingly, the four greedy paths proposed for all X-Y routing cases (I, II, III and IV) are

optimal.

Regarding X routing and Y routing, since the paths setup of Y routing is exactly

mirrored from that of X routing, we only need to consider the optimality of X routing

paths setup. Since all reversed links of the first shortest path are regressive, the

augmenting path can be routed independently without taking any links of the first

shortest path. If the two mirroring paths are the second and third shortest paths, since

all the reversed links on them are regressive but the two links incident to the source,

for the same reason mentioned, the augmenting paths can be routed independently

when developing the 3- and 4-shortest link-disjoint paths. If the complementary path is

the second shortest path, it can be observed that all reversed links on it are regressive.

Then, the augmenting path can also be routed independently. Therefore, the four greedy

paths are optimal link-disjoint paths for both X and Y routing.

149

Page 150: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

Combining the discussion on X-Y, X and Y routing, it can be concluded that the

proposed non-overlapping lightpaths setup reaches optimality.

150

Page 151: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

APPENDIX BDERIVATION OF LS EXPRESSIONS

The calculations of LS are derived as follows.

• While 2 ≤ N ≤ 5, only routing cases II, II’ and II” appear in each destination group

– N is odd

LS =

N−12∑

dX=1

[N + 2(dX + 2)] +

N−12∑

dY=1

[N + 2(dY + 2)] + 2

N−12∑

dX=1

N−12∑

dY=1

2(N + dX + dY )

=1

2(3N3 − 2N2 + 7N − 8)

(B–1)

– N is even

LS =

N2−1∑

dX=1

[N + 2(dX + 2)] + [N + 2(N/2 + 2)]/2

+

N2−1∑

dY=1

[N + 2(dY + 2)] + [N + 2(N/2 + 2)]/2

+ 2

N2−1∑

dX=1

N2−1∑

dY=1

2(N + dX + dY ) +

N2−1∑

dX=1

2(N + dX + N/2)

+

N2−1∑

dY=1

2(N + dY + N/2) + (N + N/2 + N/2)

=1

2(3N3 − 2N2 + 8N − 8)

(B–2)

• While 6 ≤ N ≤ 9, cases I, III and IV are included additionally in the destinationgroup

151

Page 152: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

– N is odd

LS =

N−12∑

dX=1

[N + 2(dX + 2)] +

N−12∑

dY=1

[N + 2(dY + 2)]

+ 2

N−52∑

dX=1

N−52∑

dY=1

4(dX + dY + 2) +

N−12∑

dX=N−32

N−52∑

dY=1

[N + 2(2dY + dX + 2)]

+

N−52∑

dX=1

N−12∑

dY=N−32

[N + 2(2dX + dY + 2)] +

N2−1∑

dX=N−32

N2−1∑

dY=N−32

2(N + dX + dY )

=1

2(2N3 + 9N2 − 28N + 17)

(B–3)

– N is even

LS =

N2−1∑

dX=1

[N + 2(dX + 2)] + [N + 2(N/2 + 2)]/2

+

N2−1∑

dY=1

[N + 2(dY + 2)] + [N + 2(N/2 + 2)]/2

+ 2

N2−2∑

dX=1

N2−2∑

dY=1

4(dX + dY + 2) +

N2−1∑

dX=N2−1

N2−2∑

dY=1

[N + 2(2dY + dX + 2)]

+

N2−2∑

dX=1

N2−1∑

dY=N2−1

[N + 2(2dX + dY + 2)] +

N2−1∑

dX=N2−1

N2−1∑

dY=N2−1

2(N + dX + dY )

+

N2−2∑

dY=1

[N + 2(2dY + N/2 + 2)] +

N2−2∑

dX=1

[N + 2(2dX + N/2 + 2)]

+ 2[N + N/2 + (N/2− 1)] + 2[N + (N/2− 1) + N/2] + (N + N/2 + N/2)

=1

2(2N3 + 9N2 − 26N + 16)

(B–4)

• While N ≥ 10, cases I’ and I” join in the destination group

152

Page 153: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

– N is odd

LS =

N−92∑

dX=1

4(dX + 3) +

N−12∑

dX=N−72

[N + 2(dX + 2)]

+

N−92∑

dY=1

4(dY + 3) +

N−12∑

dY=N−72

[N + 2(dY + 2)]

+ 2

N−52∑

dX=1

N−52∑

dY=1

4(dX + dY + 2) +

N−12∑

dX=N−32

N−52∑

dY=1

[N + 2(2dY + dX + 2)]

+

N−52∑

dX=1

N−12∑

dY=N−32

[N + 2(2dX + dY + 2)] +

N2−1∑

dX=N−32

N2−1∑

dY=N−32

2(N + dX + dY )

= N3 + 4N2 − 5N − 32

(B–5)

– N is even

LS =

N2−4∑

dX=1

4(dX + 3) +

N2∑

dX=N2−3

[N + 2(dX + 2)]

+1

2[N + 2(N/2 + 2)] +

N2−4∑

dY=1

4(dY + 3)

+

N2∑

dY=N2−3

[N + 2(dY + 2)] +1

2[N + 2(N/2 + 2)]

+ 2

N2−2∑

dX=1

N2−2∑

dY=1

4(dX + dY + 2) +

N2−1∑

dX=N2−1

N2−2∑

dY=1

[N + 2(2dY + dX + 2)]

+

N2−2∑

dX=1

N2−1∑

dY=N2−1

[N + 2(2dX + dY + 2)] +

N2−1∑

dX=N2−1

N2−1∑

dY=N2−1

2(N + dX + dY )

+

N2−2∑

dY=1

[N + 2(2dY + N/2 + 2)] +

N2−2∑

dX=1

[N + 2(2dX + N/2 + 2)]

+ 2[N + N/2 + (N/2− 1)] + 2[N + (N/2− 1) + N/2] + (N + N/2 + N/2)= N3 + 4N2 − 4N − 32

(B–6)

153

Page 154: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

REFERENCES

[1] [Online], 2010. The MOSEK website.

URL http://www.mosek.com

[2] [Online], 2010. The NEOS website.

URL http://neos.mcs.anl.gov

[3] Agarwal, Pankaj K., Efrat, Alon, Ganjugunte, Shashidhara K., Hay, David,Sankararaman, Swaminathan, and Zussman, Gil. “Network Vulnerability to Single,Multiple, and Probabilistic Physical Attacks.” Military Communications Conference,2010. MILCOM 2010. IEEE. 2010, 1947 –1952.

[4] Andersen, Reid. “A local algorithm for finding dense subgraphs.” ACM Trans.Algorithms 6 (2010): 60:1–60:12.

URL http://doi.acm.org/10.1145/1824777.1824780

[5] Asahiro, Yuichi, Hassin, Refael, and Iwama, Kazuo. “Complexity of finding densesubgraphs.” Discrete Applied Mathematics 121 (2002): 15–26.

[6] Bala, K., Chung, F.R.K., and Brackett, C.A. “Optical wavelength routing, translation,and packet/cell switched networks.” Lightwave Technology, Journal of 14 (1996).3:336 –343.

[7] Banerjee, D. and Mukherjee, B. “A practical approach for routing and wavelengthassignment in large wavelength-routed optical networks.” Selected Areas inCommunications, IEEE Journal on 14 (1996).5: 903 –908.

[8] Barry, R.A. and Humblet, P.A. “Models of blocking probability in all-optical networkswith and without wavelength changers.” Selected Areas in Communications, IEEEJournal on 14 (1996).5: 858 –867.

[9] Beauquier, B. “All-to-all communication for some wavelength-routed all-opticalnetworks.” Networks (1999).33.

[10] Bhandari, R. “Optimal diverse routing in telecommunication fiber networks.”INFOCOM ’94. Networking for Global Communications., 13th Proceedings IEEE.1994, 1498 –1508 vol.3.

[11] Bowers, J. “Low power 3D MEMS optical switches.” Optical MEMS and Nanopho-tonics, 2009 IEEE/LEOS International Conference on. 2009, 152 –153.

[12] Brander, A. W. and Sinclair, M. C. “A Comparative Study of k-Shortest PathAlgorithms.” In Proc. of 11th UK Performance Engineering Workshop. 1995,370–379.

154

Page 155: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

[13] Chlamtac, I., Ganz, A., and Karmi, G. “Lightpath communications: an approachto high bandwidth optical WAN’s.” Communications, IEEE Transactions on 40(1992).7: 1171 –1182.

[14] Choi, Don, Taylor, D., and Seibel, R. “Priority-based optical network protectionand restoration with application to DOD networks.” Military CommunicationsConference, 2003. MILCOM 2003. IEEE. vol. 1. 2003, 298 – 303 Vol.1.

[15] Eppstein, David. “Finding the k Shortest Paths.” SIAM J. Comput. 28 (1999):652–673.

URL http://dx.doi.org/10.1137/S0097539795290477

[16] Farrag, A.A. “Algorithm for constructing fault-tolerant solutions of the circulant graphconfiguration.” Frontiers of Massively Parallel Computation, 1995. Proceedings.Frontiers ’95., Fifth Symposium on the. 1995, 514 –520.

[17] Feige, Uriel, Peleg, David, and Kortsarz, Guy. “The Dense k-Subgraph Problem.”Algorithmica 29 (2001): 410–421.

[18] Gardner, R.D., Andonovic, I., Hunter, D.K., McLaughlin, A.J., Aitchison, J.S., andMarsh, J.H. “High performance photonic avionics networking using WDM.” MilitaryCommunications Conference Proceedings, 1999. MILCOM 1999. IEEE. 1999.

[19] Gerstel, O. “On the future of wavelength routing networks.” Network, IEEE 10(1996).6: 14 –20.

[20] Group, IETF Internet Working. “Inference of Shared Risk Link Groups.” InternetDraft [Online], 2001.

URL http://tools.ietf.org/html/draft-many-inference-srlg-02

[21] Guo, Lei, Cao, Jin, Yu, Hongfang, and Li, Lemin. “Path-based routing provisioningwith mixed shared protection in WDM mesh networks.” Lightwave Technology,Journal of 24 (2006).3: 1129 –1141.

[22] Guo, Yuchun, Kuipers, O, and Mieghem, Piet Van. “Link-disjoint paths for reliableQoS routing.” Intl. Journal of Communication Systems (2003): 779–798.

[23] Habiby, S.F. and Hackert, M.J. “Ronia results: WDM-based optical networks inaircraft applications.” Avionics, Fiber-Optics and Photonics Technology Conference,2008 IEEE. 2008.

[24] Habiby, S.F. and Vaidyanathan, R. “WDM Optical Backbone Networks in aircraftapplications: Networking challenges and standards progress.” Military Communica-tions Conference, 2009. MILCOM 2009. IEEE. 2009, 1 –6.

155

Page 156: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

[25] Hershberger, John, Maxel, Matthew, and Suri, Subhash. “Finding the k shortestsimple paths: A new algorithm and its implementation.” ACM Trans. Algorithms 3(2007).

URL http://doi.acm.org/10.1145/1290672.1290682

[26] Hinrichs, Susan, Kosak, Corey, O’Hallaron, David R., Stricker, Thomas M., andTake, Riichiro. “An architecture for optimal all-to-all personalized communication.”Proceedings of the sixth annual ACM symposium on Parallel algorithms andarchitectures. SPAA ’94. New York, NY, USA: ACM, 1994, 310–319.

URL http://doi.acm.org/10.1145/181014.181427

[27] Jan, Rong-Hong, Hwang, Fung-Jen, and Chen, Sheng-Tzong. “Topologicaloptimization of a communication network subject to a reliability constraint.” Reliabili-ty, IEEE Transactions on 42 (1993).1: 63 –70.

[28] Khuller, Samir and Saha, Barna. “On finding dense subgraphs.” In ICALP 09. 2009,597–608.

[29] Kumar, A., Sivakumar, M., Wang, Dexiang, and McNair, J.Y. “Effect of trafficpatterns on optical time-division-multiplexed/WDM networks for avionics.” Avionics,Fiber-Optics and Photonics Technology Conference, 2008 IEEE. 2008.

[30] Lawler, E.L. Combinatorial optimization: networks and matroids. DoverPublications, 2001.

URL http://books.google.com/books?id=m4MvtFenVjEC

[31] Liang, Weifa and Shen, Xiaojun. “A general approach for all-to-all routing inmultihop WDM optical networks.” Networking, IEEE/ACM Transactions on 14(2006).4: 914 –923.

[32] Liaw, Sheng-Chyang, Chang, Gerald, Cao, Feng, and Hsu, D. “Fault-tolerant routingin circulant networks and cycle prefix networks.” Annals of Combinatorics 2 (1998):165–172. 10.1007/BF01608486.

URL http://dx.doi.org/10.1007/BF01608486

[33] Lin, Hwa-Chun, Wang, Sheng-Wei, and Hung, Meng-Lin. “Finding Routing Pathsfor Alternate Routing in All-Optical WDM Networks.” Lightwave Technology, Journalof (2008).

[34] Liu, Yu, Tipper, D., and Siripongwutikorn, P. “Approximating optimal spare capacityallocation by successive survivable routing.” Networking, IEEE/ACM Transactionson 13 (2005).1: 198 – 211.

156

Page 157: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

[35] Maier, Guido, Pattavina, Achille, De Patre, Simone, and Martinelli, Mario. “OpticalNetwork Survivability: Protection Techniques in the WDM Layer.” Photonic NetworkCommunications 4 (2002): 251–269. 10.1023/A:1016047527226.

URL http://dx.doi.org/10.1023/A:1016047527226

[36] Mohan, G., Siva Ram Murthy, C., and Somani, A.K. “Efficient algorithms for routingdependable connections in WDM optical networks.” Networking, IEEE/ACMTransactions on 9 (2001).5: 553 –566.

[37] Ni, Wenda, Zheng, Xiaoping, Zhu, Chunlei, Li, Yanhe, Guo, Yili, and Zhang, Hanyi.“Achieving Resource-Efficient Survivable Provisioning in Service DifferentiatedWDM Mesh Networks.” Lightwave Technology, Journal of (2008).

[38] Ou, Canhui, Zhang, Jing, Zang, Hui, Sahasrabuddhe, L.H., and Mukherjee, B. “Newand improved approaches for shared-path protection in WDM mesh networks.”Lightwave Technology, Journal of 22 (2004).5: 1223 – 1232.

[39] Poulsen, H.N., Richards, D.H., Ramapanicker, A., and Blumenthal, D.J. “NetworkLayer Modeling of WDM Fiber Optic Network Architectures for AerospacePlatforms.” Avionics, Fiber-Optics and Photonics Technology Conference, 2007IEEE. 2007, 60 –61.

[40] Ramamurthy, B. and Mukherjee, B. “Wavelength conversion in WDM networking.”Selected Areas in Communications, IEEE Journal on 16 (1998).7: 1061 –1073.

[41] Ramamurthy, S., Sahasrabuddhe, L., and Mukherjee, B. “Survivable WDM meshnetworks.” Lightwave Technology, Journal of 21 (2003).4: 870 – 883.

[42] Ramaswami, R. and Sivarajan, K.N. “Routing and wavelength assignment inall-optical networks.” Networking, IEEE/ACM Transactions on 3 (1995).5: 489 –500.

[43] Reardon, C., Profumo, J., and George, A.D. “Comparative Simulative Analysis ofWDM Lans for Avionics Platforms.” Military Communications Conference, 2006.MILCOM 2006. IEEE. 2006, 1 –7.

[44] Report, NAVY STTR Phase I. “Wavelength Division Multiplexed (WDM) Fiber-OpticNetwork Architecture Analysis, Modeling, Optimization and Demonstration forAerospace Platforms.” Report period - september 13, 2005 through february 28,2006, University of Florida, 2006.

[45] Report, NAVY STTR Phase II. “Wavelength Division Multiplexed (WDM) Fiber-OpticNetwork Architecture Analysis, Modeling, Optimization and Demonstration forAerospace Platforms.” May 2007 through june 2008, University of Florida, 2008.

[46] Saengudomlert, P., Modiano, E., and Gallager, R.G. “On-line routing andwavelength assignment for dynamic traffic in WDM ring and torus networks.”Networking, IEEE/ACM Transactions on 14 (2006).2: 330 – 340.

157

Page 158: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

[47] Schroder, H., Sykora, O., and Vrto, I. “Optical All-to-All Communication for SomeProduct Graphs (Extended Abstract).” Proc. of the 24th Seminar on Current Trendsin Theory and Practice of Informatics, SOFSEM’97, Lecture Notes in ComputerScience 1338. Springer Verlag, 1997, 555–562.

[48] Shankaranarayanan, N.K. “Wavelength-routed optical networks.” Lasers andElectro-Optics Society Annual Meeting, 1994. LEOS ’94 Conference Proceedings.IEEE. vol. 2. 1994, 107 vol.2.

[49] Shen, L., Yang, X., and Ramamurthy, B. “Shared Risk Link Group (SRLG)-DiversePath Provisioning Under Hybrid Service Level Agreements in Wavelength-RoutedOptical Mesh Networks.” Networking, IEEE/ACM Transactions on 13 (2005).4: 918– 931.

[50] Shi, Ning. “K Constrained Shortest Path Problem.” Automation Science andEngineering, IEEE Transactions on 7 (2010).1: 15 –23.

[51] Stefanakos, S. and Erlebach, T. “Routing in all-optical ring networks revisited.”Computers and Communications, 2004. Proceedings. ISCC 2004. Ninth Interna-tional Symposium on. 2004.

[52] Sue, C.-C. “Wavelength routing with spare reconfiguration for all-optical WDMnetworks.” Lightwave Technology, Journal of 23 (2005).6: 1991 – 2000.

[53] Sun, Jun and Modiano, Eytan. “Capacity Provisioning and Failure Recovery for LowEarth Orbit Satellite Networks.” International Journal on Satellite Communications(2003).21: 259–284.

[54] Suurballe, J. W. “Disjoint paths in a network.” Networks 4 (1974).2: 125–145.

[55] Szlachcic, E. “Fault Tolerant Topological Design for Computer Networks.” De-pendability of Computer Systems, 2006. DepCos-RELCOMEX ’06. InternationalConference on. 2006, 150 –159.

[56] Tornatore, M., Maier, G., and Pattavina, A. “WDM Network Design by ILP ModelsBased on Flow Aggregation.” Networking, IEEE/ACM Transactions on 15 (2007).3:709 –720.

[57] Tornatore, M., Ou, Canhui, Zhang, Jing, Pattavina, A., and Mukherjee, B. “PHOTO:an efficient shared-path-protection strategy based on connection-holding-timeawareness.” Lightwave Technology, Journal of 23 (2005).10: 3138 – 3146.

[58] van der Zijpp, N.J. and Catalano, S. Fiorenzo. “Path enumeration by finding theconstrained K-shortest paths.” Transportation Research Part B: Methodological 39(2005).6: 545 – 563.

URL http://www.sciencedirect.com/science/article/pii/S019126150400102X

158

Page 159: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

[59] Wang, D. and McNair, J. “A Torus-Based 4-Way Fault-Tolerant Backbone NetworkArchitecture for Avionic WDM LANs.” Optical Communications and Networking,IEEE/OSA Journal of 3 (2011).4: 335 –346.

[60] Wang, Dexiang, Kumar, A., Sivakumar, M., and McNair, J.Y. “A Fault-TolerantBackbone Network Architecture Targeting Time-Critical Communication for AvionicWDM LANs.” Communications, 2009. ICC ’09. IEEE International Conference on.2009, 1 –5.

[61] Weichenberg, G., Chan, V.W.S., and Medard, M. “High-reliability topologicalarchitectures for networks under stress.” Selected Areas in Communications, IEEEJournal on 22 (2004).9: 1830 – 1845.

[62] Wen, Yonggang and Chan, V.W.S. “Ultra-reliable communication over unreliableoptical networks via lightpath diversity: system characterization and optimization.”Global Telecommunications Conference, 2003. GLOBECOM ’03. IEEE. vol. 5.2003, 2529 – 2535 vol.5.

[63] Whitlock, B.K., Poulsen, H.N., Richards, D.H., and Blumenthal, D.J. “Physical-layerModeling and Simulation of WDM Fiber Optic Network Architectures for AerospacePlatforms.” Avionics Fiber-Optics and Photonics, 2006. IEEE Conference. 2006, 26–27.

[64] Wuttisittikulkij, L., Leelanunnukul, S., Arreewanit, S., and Prapinmongkolkarn, P.“Routing and wavelength allocation in multi-wavelength all-optical ring networks.”Communications, 1999. ICC ’99. 1999 IEEE International Conference on. 1999.

[65] Yen, Jin Y. “Finding the K Shortest Loopless Paths in a Network.” ManagementScience 17 (1971).11: pp. 712–716.

URL http://www.jstor.org/stable/2629312

[66] Yuan, X., Melhem, R., and Gupta, R. “Performance of multihop communicationsusing logical topologies on optical torus networks.” Computer Communications andNetworks, 1998. Proceedings. 7th International Conference on. 1998, 494 –501.

[67] Zang, Hui, Jue, Jason P, and Mukherjee, Biswanath. “A review of routing andwavelength assignment approaches for wavelength-routed optical WDM networks.”Optical Networks Magazine. 2000, 47–60.

[68] Zili, Deng, Nenghai, Yu, and Zheng, Li. “Designing Fault Tolerant NetworksTopologies Based on Greedy Algorithm.” Dependability of Computer Systems,2008. DepCos-RELCOMEX ’08. Third International Conference on. 2008, 227–234.

159

Page 160: FAULT-TOLERANCE-ORIENTED TOPOLOGY, ROUTING AND …ufdcimages.uflib.ufl.edu/UF/E0/04/27/39/00001/Wang_D.pdf · fault-tolerance-oriented topology, routing and wavelength assignment

BIOGRAPHICAL SKETCH

Dexiang Wang received his Ph.D. from the University of Florida in the fall of 2011.

During his PhD study in the Department of Electrical and Computer Engineering at the

University of Florida, he was a member of the Wireless and Mobile Systems Laboratory

directed by Dr. Janise McNair. He received his B.E. degree in 1999 and M.E. degree

in 2002 from Huazhong University of Science & Technology (Wuhan, China), both in

Material Science & Engineering.

Before starting his PhD research at the University of Florida in 2006, he worked

for the telecommunication R&D team of Huawei Technologies on SDH optical network

switching equipments. After that, he worked as a software engineer for the R&D team

of UTStarcom Telecom on WCDMA-RNC products. He has been conducting his

PhD research in the areas of fault-tolerant all-optical communication systems, robust

multimedia communication over heterogeneous networks, green internet, wireless

network throughput optimization via transmission power control, and energy-efficient

cognitive radio sensor networks.

160