integer linear programming
play

Integer Linear Programming Network Design and Planning (2016) - PowerPoint PPT Presentation

Design of Optical WDM Networks using Integer Linear Programming Network Design and Planning (2016) Massimo Tornatore Dept. Electronics and Information Politecnico di Milano Piazza Leonardo da Vinci 32 - 20133 Milan, Italy


  1. Optimization problems Classification Optimization problem – optimization version  – Find the minimum-cost solution Optimization problem – decision version (answer is yes or no)  – Given a specific bound k , tell me if a solution x exists such that x<k  Polynomial problem – The problem in its optimization version is solvable in a polynomial time  NP problem – Class of decision problems that, under reasonable encoding schemes, can be solved by polynomial time non-deterministic algorithms  NP-complete problem – A NP problem such that any other NP problem can be transformed into it in a polynomial time – The problem is very likely not to be in P – In practice, the optimization-problem solution complexity is exponential  NP-hard problem – The problem in its decision version is not solvable in a polynomial time (is NP- complete)  the optimization problem is harder than an NP-problem – Contains an NP-complete problem as a subroutine WDM Network Design 22

  2. Dimensions of Complexity… Routing Cost Mixed Rates Physical layer Protection Grooming Wavelength Energy Time Fiber Vendors Applications Domains WDM Network Design 23

  3. Optimization problem solution Optimization methods  WDM network optimal design is a very complex problem. Various approaches proposed – Mathematical programming (MP) • Exact method (guarantees optimal solution) • Computationally expensive, not scalable – Heuristic methods • An alternative to MP for realistic dimension problems  According to the cost function, the problem is – Linear – Non linear WDM Network Design 24

  4. Outline  Introduction to WDM network design and optimization  Integer Linear Programming approach  Physical Topology Design – Unprotected case – Dedicated path protection case – Shared path & link protection cases  Heuristic approach WDM Network Design 25

  5. Optimization problem solution Mathematical programming solving  WDM-network static-design problem can be solved with the mathematical programming techniques In most cases the cost function is linear  linear programming – Variables can assume integer values  integer linear programming –  LP solution – Variables defined in the real domain – The well-known computationally-efficient Simplex algorithm is employed  ILP solution – Variables defined in the integer domain – The optimal integer solution is found by exploring all integer admissible solutions • Branch and bound technique: admissible integer solutions are explored in a tree-like search WDM Network Design 26

  6. ILP application to WDM network design Approximate methods  A arduous challenge – NP-completeness/hardness coupled with a huge number of variables • In many cases the problem has a very high number of solutions (different virtual-topology mappings leading to the same cost-function value) – Practically tractable for small networks  Simplifications – RFWA problem decomposition: e.g., first routing and then f/w assignment – Constrained routing (route formulation, see in the following ) – Relaxed solutions (randomized rounding) – Other methodologies: • Column generation, Lagrangean relaxation, etc..  ILP, when solved with approximate methods, loses one of its main features: the possibility of finding a guaranteed minimum solution – Still ILP can provide valuable solutions WDM Network Design 27

  7. ILP application to WDM network design ILP relaxation  Simplification can be achieved by removing the integer constraint – Connections are treated as fluid flows (multicommodity flow problem) • Can be interpreted as the limit case when the number of channels and connection requests increases indefinitely, while their granularity becomes indefinitely small • Fractional flows have no physical meaning in WDM networks as they would imply bifurcation of lightpaths on many paths – LP solution is found  In some cases the closest upper integer to the LP cost function can be taken as a lower bound to the optimal solution  Not always it works…  See [BaMu96] WDM Network Design 28

  8. The ILP models: Notation k l  l,k : link identifiers (source and destination nodes)  F l,k : number of fibers on the link l,k   l,k : number of wavelengths on the link l,k  c l,k : weight of link l,k (es. length, administrative weight, etc.) – Usually equal to c k,l WDM Network Design 29

  9. Cost functions Some examples  RFWA  ,  min min – Minimum fiber number M F M l k • Terminal equipment cost ( , ) l k – VWP case – Minimum fiber mileage (cost) M C   min min c F M • Line equipment [BaMu00] , , l k l k C ( , ) l k  RWA – Minimum wavelength number     min min , l k – Minimum wavelength mileage ( , ) l k  ,    min min c • [StBa99],[FuCeTaMaJa03] , l k l k C – Minimum maximal wavelength ( , ) l k   min  number on a link min [ ] max , l k MAX • [Mu97] , l k WDM Network Design 30

  10. Outline  Introduction to WDM network design and optimization  Integer Linear Programming approach  Physical Topology Design – Unprotected case – Dedicated path protection case – Shared path & link protection cases  References WDM Network Design 31

  11. Approaches to WDM design  Two basilar and well-known approaches [WaDe96],[Wi99] – FLOW FORMULATION (FF) – ROUTE FORMULATION (RF) WDM Network Design 32

  12. Flow Formulation (FF) x , s d  Flow variable , l k  Flow on link ( l,k) due to a request generated by to source-destination couple ( s,d)  Fixed number of variables  Unconstrained routing s , d s , d 1 x x , , 2 2 , 1 s d , s d x x 1 2 1 , s 2 , d , s d x , s d x , 1 s , , s d s d d , 2 1 2 x x , 3 , 4 s d , , s d s d x x 3 , 1 4 , 2 , s d s , d x x , 3 s , 4 d 4 3 , s d , x s d x , , s d s d 3 , s 3 x x 4 , d , 4 4 , 3 WDM Network Design 33

  13. ILP application to WDM network design Flow Formulation (FF)  Variables represent the amount of traffic (flow) of a given traffic relation (source-destination pair) that occupies a given channel (link, wavelength)  Lightpath-related constraints – Flow conservation at each node for each lightpath (solenoidal constraint) – Capacity constraint for each link – (Wavelength continuity constraint) – Integrity constraint for all the flow variables (lightpath granularity)  Allows to solve the RFWA problems with unconstrained routing  A very large number of variables and constraint equations WDM Network Design 34

  14. ILP application to WDM network design Flow formulation fundamental constraints  Solenoidality constraint s d – Guarantees spatial continuity of the lightpaths (flow conservation) – For each connection request, the neat flow (tot. input flow – tot. output flow) must be: • zero in transit nodes • the total offered traffic (with appropriate sign) in s and d  Capacity constraint – On each link, the total flow must not exceed available resources 2 4 (# fibers x # wavelengths)  Wavelength continuity constraint 1 6 – Required for nodes without converters 5 3 WDM Network Design 35

  15. Notation  c : node pair (source s c and destination d c ) having requested one or more connections  x l,k,c : number of WDM channels carried by link ( l , k) assigned to a connection requested by the pair c  A l : set of all the nodes adjacent to node i  v c : number of connection requests having s c as source node and d c as destination node  W : number of wavelengths per fiber  λ : wavelength index ( λ = {1, 2 … W }) WDM Network Design 36

  16. Unprotected case VWP, FF   if v l d c c          Solenoidal ity if , x x v l s l c , , , , k l c l k c c c    k A k A  0 otherwise l l     Capacity ( , ) x W F l k , , , l k c l k c  integer x c,(l,k) , , l k c Integrity  integer F (l,k) , l k N.B. from now on, notation “  l,k” implies l  k WDM Network Design 37

  17. Note, the unsplittable case!   1 if l d c          Solenoidal ity 1 if , x x l s l c , , , , k l c l k c c    k A k A  0 otherwise l l     Capacity ( , ) v x W F l k , , , c l k c l k c  binary x c,(l,k) , , l k c Integrity  integer F (l,k) , l k WDM Network Design 38

  18. Homework  What happens in the bidirectional case? – i.e., Each transmission channel provides the same capacity λ in both directions. WDM Network Design 39

  19. Extension to WP case  In absence of wavelength converters, each lightpath has to preserve its wavelength along its path  This constraint is referred to as wavelength continuity constraint  In order to enforce it, let us introduce a new index in the flow variable to analyze each wavelength plane  x x  , , , , , l k c l k c  The structure of the formulation does not change. The problem is simply split on different planes (one for each wavelength)  The v c traffic is split on distinct wavelengths  v c, λ  The same approach will be applied for no-flow based formulations WDM Network Design 40

  20. Unprotected case WP, FF   if v l d  , c c           if , , x x v l s l c    , , , , , , , k l c l k c c c  Solenoidal ity   k A k A 0 otherwise  l l    v v c  , c c      Capacity ( , ), x F l k  , , , , l k c l k c   integer , x c,(l,k)  , , , l k c  Integrity integer F (l,k) , l k   integer , v c  c , WDM Network Design 41

  21. Flow (FF) vs Route (RF) Formulation ROUTE FLOW , , s d s d 1 x x , s d , 2 2 , 1 s , d x x r 1,s,d 1 2 1 , s 2 , d s , d s d x s , d x r 3,s,d s , 1 , , s d s d 1 2 d , 2 x x , 3 , 4 s d s , d s , d x x 3 , 1 4 , 2 , s d , x s d x , 3 s , 4 d 4 3 r 2,s,d s , d x s , d x s , d s , d 3 , s 3 x x 4 , d , 4 4 , 3  Variable x l,s,d: flow on link i  Variable r p,s,d : number of associated to source-destination connections s,d routed on the couple s-d admissible path p  Fixed number of variables  Constrained routing  Unconstrained routing -k-shortest path  Sub-optimality? WDM Network Design 42

  22. WDM mesh network design Route formulation  All the possible paths between each sd -pair are evaluated a priori  Variables represent which path is used for a given connection – r psd : path p is used by r psd connections between s and d  Path-related constraints – Routing can be easily constrained (e.g. using the K- shortest paths) • Yen’s algorithm – Useful to represent path-interference • Physical topology represented in terms of interference (crossing) between paths (e.g. i pr = 1 (0) if path p has a link in common with path r)  Number of variables and constraints – Very large in the unconstrained case, – Simpler than flow formulation when routing is constrained WDM Network Design 43

  23. Unprotected case VWP, RF  New symbols – r c,n : number of connections routed on the n-th admissible path between source destination nodes of the node-couple c – R (l,k) : set of all admissible paths passing through link (l,k)    Solenoidal ity r v c c , c n n     Capacity ( , ) r W F l k , , c n l k  r R c , n l , k  integer ( , r c n) , c n Integrity  integer F (l,k) , l k WDM Network Design 44

  24. Unprotected case WP, RF  Analogous extension to FF case – r c,n, λ = number of connection routed on the n-th admissible path between node pair c (source-destination) on wavelength λ     , r v c   , , , c n c Solenoidal ity n    v v c  , c c      Capacity ( , ), r F l k  , , , c n l k  r R , , c n l k   integer ( , , r c n)  , , c n  Integrity integer F (l,k) , l k   integer , v c  , c WDM Network Design 45

  25. ILP source formulation New formulation derived from flow formulation  Reduced number of variables and constraints compared to the flow formulation  Allows to evaluate the absolute optimal solution without any approximation and with unconstrained routing  Can not be employed in case path protection is adopted as WDM protection technique – Does not support link-disjoint routing WDM Network Design 46

  26. ILP source formulation Source Formulation (SF) fundamental constraints   , s d x x  New flow variable , , , l k s l k d – Flow carried by link l and having node s as source – Flow variables do not depend on destinations anymore  Solenodality – Source node • the sum of x l,k,s variables is equal to the total number of requests originating in the node – Transit node • the incoming traffic has to be equal to the outgoing traffic plus the nr. of lightpaths terminated in the node WDM Network Design 47

  27. ILP source formulation An example  2 connections requests Both routing solutions are compatible with the same SF solution – 1 to 4 – 1 to 3 2 3  Solution 1 – X 1,2,1 ,X 1,6,1, X 2,3,1 , 4 X 6,5,1 ,X ,5,3,1 ,X ,3,41 = 1 – Otherwise X ,l,k,1 = 0  1° admissible solution 6 5 – L A 1-2-3-4 – L B 1-6-5-3 3  2° admissible solution – L A 1-2-3 – L B 1-6-5-3-4 WDM Network Design 48

  28. Unprotected case VWP, SF  New symbols – x l,k,i : number of WDM channels carried by link l , k assigned connections originating at node i – C i, j : number of connection requests from node i to node j  See [ToMaPa02]      x C S i i , , , i k i i j  j k A Solenoidal ity i       , ( ) x x C i l i l , , , , , k l i l k i i l   k A k A l l     Capacity ( , ) x W F l k , , , l k i l k i  integer x i,(l,k) , , l k i Integrity  integer F (l,k) , l k WDM Network Design 49

  29. Unprotected case WP, SF  Analogous extension to FF case     , x s i   i , k , i , i ,  k A i      s S C i  , , i i i l  Solenoidal ity l        , , , ( ) x x c i l i l    , , , , , , , , k l i l k i i j   k A k A l l     , , ( ) c C i l i l  i , l , i , l      Capacity ( , , ) x F l k  , , , , l k i l k i   integer , , x l,k i  , , , l k i  integer F l,k l , k Integrity   integer , s i  , i    integer , , , ( ) c i j i l  , , i l WDM Network Design 50

  30. ILP source formulation Two-step solution of the optimization problem  The source formulation variables x l,k,s and F l,k – Do not give a detailed description of RWFA of each single lightpath – Describe each tree connecting a source to all the connected destination nodes (a subset of the other nodes) – Define the optimal capacity assignment (dimensioning of each link in terms of fibers per link) to support the given traffic matrix STEP 1: Optimal dimensioning computation by exploiting SF (identification problem, high computational complexity) STEP 2: RFWA computation after having assigned the number of fibers of each link evaluated in step 1 (multicommodity flow problem, negligible computational complexity) WDM Network Design 51

  31. ILP source formulation Complexity comparison between SF and FF Formulatio n # const. # variab.    VWP source 2 2 ( 1 ) L S N L S    VWP flow 2 2 ( 1 ) L C N L C    VWP route 2 2 L C C R L        WP source ( 2 ) ( 2 ) 2 W L NS C S W S L S C L – Symbols      WP flow 2 1 2 2 W( L N C) C W C( L) L • N nodes         WP route 1 2 2 C(W ) L W C R W C W L • L links Fully connected virtual topology • R average number of paths per node pair Case FF/SF # const. FF/SF # variab. • W wavelengths per fiber     VWP O O N N • C connection node-pairs     WP O O N N • S source nodes requiring connectivity  The second step has a negligible impact on the SF computational time – F l,k are no longer variables but known terms  Fully-connected virtual topology: C = N (N-1), S=N – Worst case (assuming L << N (N-1)) WDM Network Design 52

  32. Case-study networks Network topology and parameters NSFNET EON   N = 14 nodes N = 19 nodes   L = 22 (bidir)links L = 39 (bidir)links   C = 108 connected pairs C = 342 connected pairs   360 (unidir)conn. requests 1380 (unidir)conn. requests Seattle WA Ithaca Salt Palo Alto Ann Lake Princeton CA Arbor City UT Pittsburgh Lincoln College Boulder Pk. Champaign San Diego CO CA Atlanta Houston TX  Static traffic matrices derived from real traffic measurements  Hardware: 1 GHz processor, 460 Mbyte RAM  Software: CPLEX 6.5 WDM Network Design 53

  33. Case-study networks SF vs. FF: variables and constraints (VWP)  The number of constraints decreases by a factor – 9 for the NSFNet – 26 for the EON  The number of variables decreases by a factor – 8.5 for the NSFNet – 34 for the EON  These simplifications affect computation time and memory occupation, achieving relevant savings of computational resources Rete/Form vincoli variabili Network/Formulation # const. # variab. NsfNet/source 284 570 NsfNet/flow 2552 4840 EON/source 517 1560 EON/flow 13650 53430 WDM Network Design 54

  34. Case-study networks SF vs. FF: variables and constraints (WP)  In the WP case – The number of variables and constraints linearly increases with W – The gaps in the number of variables and constraints between FF and SF increase with W  The advantage of source formulation is even more relevant in the WP case E O N W P Number of variables and constraints 5 5 1 0 s o u r c e v a r i a b l e s f l o w v a r i a b l e s 5 4 1 0 s o u r c e c o n s t r a i n t s f l o w c o n s t r a i n t s 5 3 1 0 5 2 1 0 5 1 1 0 0 0 2 4 6 8 1 0 1 2 1 4 1 6 Number of wavelengths, W WDM Network Design 55

  35. Case-study networks SF vs. FF: time, memory and convergence  The values of the cost function M source obtained by SF are always equal or better (lower) than the corresponding FF results (M flow )  Coincident values are obtained if both the formulations converge to the optimal solution – Validation of SF by induction  Memory exhaustion (Out-Of-Memory, O.O.M) prevents the convergence to the optimal solution. This event happens more frequently with FF than with SF Memory occupation Computational time W SF FF W SF FF 2 0.39MB 1.3MB 2 27m 40m 4 O.O.M O.O.M 4 28m 105m 8 5MB 42MB 8 36s 50m 16 47MB O.O.M 16 6m 10h 32 180MB O.O.M 32 19m 5h WDM Network Design 56

  36. Outline  Introduction to WDM network design and optimization  Integer Linear Programming approach  Physical Topology Design – Unprotected case – Dedicated path protection case – Shared path & link protection cases  Heuristic approach WDM Network Design 57

  37. Protection in WDM Networks (1) Motivations (bit rate)  Today WDM transmission systems allow the multiplexing on a single fiber of up to 160 distinct optical channels – recent experimental systems support up to 256 channels:  A single WDM channel carries from 2.5 to 40 Gb/s (ITU-T G.709)  The loss of a high-speed connection operating at such bit rates, even for few seconds, means huge waste of data !!  The increase in WDM capacity associated with the tremendous bandwidth carried by each fiber and the evolution from ring to mesh architectures brought the need for suitable protection strategies into foreground.  Example: 1ms outage for a 100G x 100Waves fiber [10Tbit/s] means 10Gbit=1.25Gbyte of data lost (n.b.: 1 cd-rom is 0.9 GByte) WDM Network Design 58

  38. Protection in WDM Networks (2) Motivations (network dimension)  Even though fiber are very resilient, the geographical dimension of a backbone network lead to very high chances that the network is operating in a fault state.  Example: failure per 1000Km per year (2001 statistics) ≈ 2 (*) What happens on a continental network?! Hundreds of failures…. 1 11 1200 4800 12 2100 3900 1500 600 600 1500 4 8 1200 7 9 600 13 1500 5 1500 1200 2 3000 300 2700 1500 2400 14 1200 3600 3 3600 10 6 2100 (*) Source www.southern-telecom.com/AFL%20Reliability.pdf WDM Network Design 59

  39. Immediate Causes of Fiber Cable Failures Excavation Flood Fallen Trees 1.30% Other 1.30% 1.30% 9.70% Firearm 1.30% Fire 1.90% Sabotage 2.50% Rodent Dig-ups 3.80% 58.10% Power Line 4.40% Process Error Vehicle 6.90% 7.50% Source: D. E. Crawford, “Fiber Optic Cable Dig -ups – Causes and Cures,” A Report to The Nation – Compendium of Technical Papers, pp. 1-78, FCC NRC, June 1993 WDM Network Design 60

  40. SLA and Provisioning Customer’s concerns: Operator’s concerns: Bandwidth Resource Availability Protection Fee Penalty Network design decisions for protection are etc. very important WDM Network Design 61

  41. 3 performance metrics for protection  Resource occupation (resource overbuild)  Availability – Probability to find the service up  Protection Switching Time  Availability goes in tradeoff with the other two!! WDM Network Design 62

  42. Dedicated Path Protection (DPP)  1+1 or 1:1 dedicated protection (>50% capacity for protection) – Both solutions are possible – Each connection-request is satisfied by setting-up a lightpath pair of a working + a protection lightpaths – RFWA must be performed in such a way that working and protection lightpaths are link disjoint  Additional constraints must be considered in network planning and optimization  Transit OXCs must not be reconfigured in case of failure  The source model can not be applied to this scenario WDM Network Design 63

  43. “Max half” formulation (MH) Equation set (VWP case)  This formulation does not need an upgrade of unprotected flow variable  See [ToMaPa04]    2 if v i d c c           Solenoidal ity 2 if ( , ) x x v i d i c c c , , , , l k c l k c      ( , ) I ( , ) I l k l k  0 otherwise i i    Max Half , x x v l c c l , k , c k , l , c     Capacity ( , ) x W F l k , , , l k c l k c  integer , x c (l,k) , , l k c Integrity  integer F (l,k) , l k WDM Network Design 64

  44. “Max half” formulation (MH) Limitations  Same number of variables and constraints as the unprotected flow formulation  Allows to evaluate the absolute optimal solution without any approximation and with unconstrained routing in almost all cases  Requires an a posteriori control to verify the feasibility of obtained solution  Problem: In conclusion, each unity of flow must be modelled independently, such that it can be protected independently WDM Network Design 65

  45. Dedicated Path Protection (DPP) Flow formulation, VWP  New symbols – x l,k,c,t = number of WDM channels carried by link ( l,k) assigned to the t-th connection between source-destination couple c Rationale : for each connection request, route a link-disjoint connection   route two connections and enforce link-disjointness between them.   2 if l d c          Solenoidal ity 2 if , , x x l s l c t c , , , , , , k l c t l k c t    k A k A 0 otherwise  l l    Link - disjoint 1 , , , x x l k c t l , k , c , t k , l , c , t     Capacity , x W F l k , , , , l k c t l k ( , ) c t  binary ( ), x c,t (l,k) l , k , c , t Integrity  integer F (l,k) , l k WDM Network Design 66

  46. Dedicated Path Protection (DPP) Route formulation (RF), VWP  New symbols – r c,n,t = 1 if the t-th connection between source destination node couple c is routed on the n-th admissible path – R (l,k) = set of all admissible paths passing through link (l,k)    Solenoidal ity 2 , r c t , , c t n n    Link - disjoint 1 , , , r c t l k , , c t n   r R R , , , , c t n l k k l     Capacity , r W F l k , , , c t n l k  r R , , , c t n l k  binary , , r c t n , , c t n Integrity  integer F l,k , l k WDM Network Design 67

  47. Dedicated Path Protection (DPP) Route formulation (RF) II, VWP  Substitute the single path variable r c,n by a protected route variable r’ c,n (~ a cycle)  No need to explicitly enforce link disjointness  Identical formulation to unprotected case  How do we calculate the minimum-cost disjoint paths? Suurballe    Solenoidal ity ' r v c c , c n n     Capacity ' , r W F l k , , c n l k  ' ' r R c , n l , k  ' integer , r c n , c n Integrity  integer F l,k , l k WDM Network Design 68

  48. Dedicated Path Protection (DPP) Flow formulation, WP  New symbols – x l,k,c,t , λ = number of WDM channels carried by wavelength λ on link l,k assigned to the t-th connection between source-destination couple c – V c, λ = traffic of connection c along wavelength λ   if v l d   , , c t c          if , , , ; x x v l s l c t  , , c t c   , , , , , , , , k l c t l k c t  Solenoidal ity  0 otherwise   k A k A l l    2 v c  c , t ,      Link - disjoint 1 , , , x x l k c t    , , , , , , , , , l k c t k l c t     Capacity , , x F l k  , , , , , l k c t l k ( , ) c t   binary , , x c,t l,k  , , , , l k c t  Integrity integer F l,k l , k   bynary v c,  c , t , WDM Network Design 69

  49. Dedicated Path Protection (DPP) Route formulation (RF), WP     ( , ), r v c t  , , c t  , , , c t n Solenoidal ity n    2 , v c t  , , c t      Link - disjoint 1 ( , ), ( , ) r c t l k  , , , c t n    r  R R , , , , , c t n l k k l     Capacity ( , ), r F l k  , , , , c t n l k  r  R , , , , c t n l k   binary ( , ), , r c t n  , , , c t n  Integrity integer F l,k , l k   bynary ( ), v c,t  , , c t WDM Network Design 70

  50. Dedicated Path Protection (DPP) Route formulation (RF) II, WP  r c,n, λ = number of connections between source-destination couple c routed on the n-th admissible couple of disjoint paths having one path over wavelength λ 1 and the other over λ 2      ' , r v c   , 1 , 2 c   1 , 2 , , c n 1 , 2 n Solen.    v v c   , c c 1 , 2   , 1 2         Cap. ' ' , , r r F l k 1     , , , , , c n c n l k 1 , 2 2 , 1    '   '  '   ' r R r R 2 , , 1 , 2 , 2 , , 2 , 1 , c n l k c n l k    ' integer , , r c n 1 , 2   , , , c n 1 2 Int.  integer F l,k , l k WDM Network Design 71

  51. Complexity comparison between DPP RF-WP formulations  Nr of variables for r ctn λ -> R x C x T x W – R x C number of single route variables  Nr of variables for r cn λ’λ’’ - > R’ x C x W 2 – R’ x C number of protected route variables – For R=R’, this is preferable if T>W WDM Network Design 72

  52. Outline  Introduction to WDM network design and optimization  Integer Linear Programming approach  Physical Topology Design – Unprotected case – Dedicated path protection case – Shared path & link protection cases  References WDM Network Design 73

  53. Shared Path Protection (SPP)  Sharing is a way to decrease the capacity redundancy and the number of lightpaths that must be managed  Protection-resources sharing – Protection lightpaths of different channels share some wavelength channels – Based on the assumption of single point of failure – Working lightpaths must be link (node) disjoint  Very complex control issues – Also transit OXCs must be reconfigured in case of failure • Signaling involves also transit OXCs • Lightpath identification and tracing becomes fundamental WDM Network Design 74

  54. How to model SPP: the Link Vector (1)  Given : – Graph G(V,E) – Set of connections L i (already routed)          e' e' { | e' E, 0 (e' )} e e e  Link vector    * e' max e e  e '  Specified in IETF (see, e.g., RSVP-TE Extensions For Shared-Mesh Restoration in Transport Networks ) WDM Network Design 75

  55. How to model SPP: the Link Vector (2) A B e 2 (a) Sample e 1 e 3 network and e 8 e 7 C connections e 6 e 4 e 5  * e 2 e 3 e 4 e 5 e 6 e 7 e 8 e 1 e 5 ( 0, 0, 0, 0, 0, 0, 0, 0 ) 0 Initial state : e 5 ( 0, 1, 1, 0, 0, 0, 0, 0 ) 1 Connection A arrival: e 5 ( 1, 2, 1, 0, 0, 0, 0, 0 ) 2 Connection B arrival: e 5 ( 1, 2, 1, 0, 0, 0, 1, 0 ) 2 Connection C arrival: e 5 (a) Evolution of link vector for e 5 WDM Network Design 76

  56. Two ILP approaches for SPP  Explore Shared path protection by both classical approaches a x s,a,c,1,w x a,d,c,1,w  Flow Formulation x s,a,c,1,p x a,d,c,1,p s d – Binary variables x l,k,c,t,p associated to the flow on each link l,k for each b single connection request c,t (p=w X s,b,c,1,w X b,d,c,1,w working flow, p=s protection flow) x s,b,c,1,p x b,d,c,1,p Connection request c,1  Route Formulation – 1 ° approach: integer variables r c,n r 3,s,d associated to each simple path n s joining the node pair c (e.g. s,d ). d r 1,s,d – 2 ° approach: integer variables r’ c,n r 2,s,d associated to the n-th possible working-spare route pair that joins each s-d node pair c WDM Network Design 77

  57. How to calculate «max» in ILP   min (max ) min T Objective x (l, k) l,k,c c   v if l d c c          Solenoidal ity x x v if l s l,c k,l,c l,k,c c c    k A k A  0 otherwise l l    max T x (l,k) l,k,c c     Capacity x W F (l,k) l,k,c l,k c  integer x c,(l,k) l,k,c Integrity  integer F (l,k) l,k WDM Network Design 78

  58. Shared Path Protection (DPP) Flow formulation, VWP   1 if l d c          1 if , , ; x x l s l c t c , , , , , , k l c t l k c t    k A k A  0 otherwise l l Solenoidal ity   1 if l d c          1 if , , ; y y l s l c t c , , , , , , k l c t l k c t    k A k A 0 otherwise  l l      Link - disjoint 1 , , , x x y y l k c t , , , , , , , , , , , , l k c t k l c t k l c t k l c t      , P x W F l k lk , , , , l k c t l k ( , ) c t Capacity    ij , ( , ) P z (l,k) i j lk lk , ct ( , ) c t    ij 1 z x y lk , ct i , j , c , t l , k , c , t  Sharing ( ), , ( , ) c,t (l,k) i j   ij ij , z x z y , , , , , , , , lk ct i j c t lk c i j c t  binary ( ), x c,t (l,k) l , k , c , t  Integrity integer F (l,k) l , k  ij binary ( ), , ( , ) z c,t (l,k) i j lk , ct WDM Network Design 79

  59. Shared Path Protection case VWP, RF  New symbols – R l,k includes all the working-spare routes whose working path is routed on link l,k – R l’ (l,k) includes all the working-spare routes whose working path is routed on bidirectional link l′ and whose spare path is routed on link (l, k)    Solenoidal ity ' r v c c , c n n      ' ' r r W F , , , c n c n l k R R Capacity   ( , ) l k ( , ) ( , ) ( , ) c n l k c n ' l   ( , ), ' ( ) l k l l l  ' integer ( , r c n) , c n Integrity  integer F (l,k) , l k  Similar formulations can be found in [MiSa99], [RaMu99] , [BaBaGiKo99], WDM Network Design 80

  60. Shared Path Protection case WP, RF  New symbols – Variable r c,n, λ 1, λ 2 , where λ 1 indicates the wavelength of the working path and λ 2 indicates the wavelength of the spare path.  – ( , , 2 ) l k R includes all the working-spare routes, whose working path is routed on l ' bidirectional link l’ and whose spare path is routed on link (l, k).    Solenoidal ity ' r v c c   , , c n 1 , 2 n      ' ' r r W F     , , , , , c n c n l k 1 , 2 1 , 2 R R  Capacity     ( , , 2 ) l k ( , , ) ( , , ) ( , ) c n l k c n 2 2 ' l    ( , ), ' , ( ) l k l l l 1    ' integer ( , , , r c n ) 1 2   , , c n 1 , 2 Integrity  integer F (l,k) , l k  All the previous formulations and a additional one can be found in [CoToMaPaMa03]. WDM Network Design 81

  61. Link Protection O M S p r o t e c t i o n N o r m a l ( l i n k p r o t e c t i o n ) C o n n e c t i o n  Dedicated Link Protection (DLP) – Each link is protected by providing an alternative routing for all the WDM channels in all the fibers – Protection switching can be performed by fiber switches (fiber cross-connects) or wavelength switches – Signaling is local; transit OXCs of the protection route can be pre-configured – Fast reaction to faults – Some network fibers are reserved for protection  Shared Link Protection (SLP) – Protection fibers may be used for protection of more than one link (assuming single-point of failure) – The capacity reserved for protection is greatly reduced WDM Network Design 82

  62. Link Protection  Different protected objects are switched 1) Fiber level 2) Wavelength level FAULT EVENT (1) (2) WDM Network Design 83

  63. Link Protection VWP, FF (Fiber Protection Switch)  New symbols – Y (l,k),(L,q) expresses the number of backup fibers needed on link (l,k) to protect link (L,q) failure   if v i d c c  Solenoidal ity         if , x x v i s l c , , , , l k c k l c c c (working)    k A k A l l  0 otherwise   if F l L , L q  Solenoidal ity         if , ( , ) Y Y F l q l L q l , k , ( L , q ) k , l ( L , q ) L . q (spare)      ( , , ) ( , , ) k A l k L q k A l k L q l l  0 otherwise     Capacity ( , ) x W F l k , , , l k c l k c  Y , ( , ) (l,k) L q l , k , ( L , q )  Integrity integer x c,(l,k) l , k , c  integer F (l,k) , l k WDM Network Design 84

  64. Link Protection Cost functions and sharing constraints     Cost function (dedicated case)  min F Y , , , ( , ) l k l k L q , , , l k l k L q  Cost function (shared case)    min F T , , l k l k , , l k l k   s.t. , ), ( , ) T Y (l k L q , , , ( , ) l k l k L q  OSS. Wavelength channel level protection design – Relaxing the integer constraints on Y, each channel is independently protected protected (while not collecting all the channels owing to the same fiber)  See also [RaMu99] WDM Network Design 85

  65. Link Protection Summary results  Comparison between different protection technique on fiber needed to support the same amount of traffic  Switching protection objects at fiber or wavelength level does ot sensibly affects the amount of fibers. – This difference increase with the number of wavelength per fiber WDM Network Design 86

  66. Traffic Grooming Definition  Optical WDM network – multiprotocol transport platform – provides connectivity in the form of optical circuits (lightpaths) ... Electronic Electronic e.g., STM1 layers connection @ 155,52 Mbps SDH ATM IP ... request Lightpath WDM Layer Optical e.g., OTN G.709 connection layers @ 2.5, 10, 40 Gbps Optical transmission provisioning A Big Difference between Electronic Traffic Requests and Optical Lightpath Capacity ! WDM Network Design 87

  67. WDM Network Design 88

  68. Traffic Grooming Multi-layer routing Logical Topology 2 3 Lp2 Suppose Lightpath Capacity: 10 Lp4 Gbit/sec 7 4 1 EXAMPLE CONNECTIONS ROUTING Lp1 C1 (STM1 between 4 →2 ) on Lp1 Lp3 6 5 C2 (STM1 between 4 →7 ) on Lp1 ADM ADM ADM ADM and Lp2 2 3 C3 (STM1 between 1 →5 ) on Lp3 ADM ADM ADM ADM ADM ADM C4 (STM1 between 4 →6 ) on Lp1 and Lp2 and Lp4 7 1 4 ADM ADM ADM ADM Physical Topology 6 5 WDM Network Design 89

  69. WDM Network Design 90

  70. Formulation (Keyao Zhu JSAC03) WDM Network Design 91

  71. Logical Operators: AND, OR, XOR, XNOR  AND, OR, XOR etc can be expressed by using binary variables 1 0 1 0 AND OR XOR XNOR 1 0 1 0 1 0 1 1 1 1 0 1 1 0 1 1 0 0 0 0 1 0 1 0 0 1 0 0    z x z x r x y AND      z y z y 1 ( y ) t x y z x OR XOR      1   z x y z x y z t r Robert G. Jeroslow, “ Logic-based decision support: mixed integer model formulation ”, North-Holland, 1989 ISBN 0444871195 WDM Network Design 92

  72. Some other linear operations WDM Network Design 93

  73. Logical Operators: AND, OR, XOR, XNOR  AND, OR, XOR etc can be expressed by using binary variables 1 0 1 0 AND OR XOR 1 0 1 0 1 1 1 1 0 1 1   y x x 1 2 0 0 0 0 1 0 1 0 0   y x x 1 2   ,   y x x 1 , y x x y x x 1 2 2 2 1      1    y x x y x x 2 y x x 1 2 1 2 1 2  Negated operators (NAND, NOR, XNOR) are implemented with an additional variable z = 1 - y , where y is the “direct” operation WDM Network Design 94

  74. Logical Operators: AND, OR, XOR, XNOR  Also, they can be extended to a general N -variable case: AND OR XOR N  y       ( [ 1 , ] x x y x i N M y x XOR XOR 1 2 i i  1 i ( ...)) x N  XOR XOR    3 ( 1 ) N y x N   i y x  Probably no simpler option i 1 i  exists 1 i or    [ 1 , ] y x i N Arbitrarily large number (at i least equal to N ) N   y x i  1 i WDM Network Design 95

  75. References  Articles – [WaDe96] N. Wauters and P. M. Deemester, Design of the optical path layer in multiwavelength cross- connected networks , Journal on selected areas on communications,1996, Vol. 14, pages 881-891, June – [CaPaTuDe98] B. V. Caenegem, W. V. Parys, F. D. Turck, and P. M. Deemester, Dimensioning of survivable WDM networks , IEEE Journal on Selected Areas in Communications, pp. 1146 – 1157, sept 1998. – [ToMaPa02] M. Tornatore, G. Maier, and A. Pattavina, WDM Network Optimization by ILP Based on Source Formulation , Proceedings, IEEE INFOCOM ’02, June 2002. – [CoMaPaTo03] A.Concaro, G. Maier, M.Martinelli, A. Pattavina, and M.Tornatore, “QoS Provision in Optical Networks by Shared Protection: An Exact Approach,” in Quality of service in multiservice IP Networks , ser. Lectures Notes on Computer Sciences, 2601, 2003, pp. 419 – 432. – [ZhOuMu03] H. Zang, C. Ou, and B. Mukherjee, “ Path-protection routing and wavelength assignment (RWA) in WDM mesh networks under duct-layer constraints ,” IEEE/ACM Transactions on Networking, vol. 11, no. 2, pp.248 – 258, april 2003. – [BaBaGiKo99] S. Baroni, P. Bayvel, R. J. Gibbens, and S. K. Korotky, “ Analysis and design of resilient multifiber wavelength-routed optical transport networks ,” Journal of Lightwave Technology, vol. 17, pp. 743– 758, may 1999. – [ChGaKa92] I. Chamtlac, A. Ganz, and G. Karmi, “ Lightpath communications: an approach to high- bandwidth optical WAN’s ,” IEEE/ACM Transactionson Networking, vol. 40, no. 7, pp. 1172– 1182, july 1992. – [RaMu99] S. Ramamurthy and B. Mukherjee, “Survivable WDM mesh networks, part i - protection,” Proceedings, IEEE INFOCOM ’99 , vol. 2, pp. 744 – 751, March 1999. – [MiSa99] Y. Miyao and H. Saito, “Optimal design and evaluation of survivable WDM transport networks,” IEEE Journal on Selected Areas in Communications , vol. 16, pp. 1190 – 1198, sept 1999. WDM Network Design 96

  76. References – [BaMu00] D. Banerjee and B. Mukherjee, “Wavelength -routed optical networks: linear formulation, resource budgeting tradeoffs and a reconfiguration study,” IEEE/ACM Transactions on Networking , pp. 598 – 607, oct 2000. – [BiGu95] D. Bienstock and O. Gunluk, “Computational experience with a difficult mixed integer multicommodity flow problem,” Mathematical Programming , vol. 68, pp. 213 – 237, 1995. – [RaSi96] R. Ramaswami and K. N. Sivarajan, Design of logical topologies for wavelength-routed optical networks , IEEE Journal on Selected Areas in Communications, vol. 14, pp. 840{851, June 1996. – [BaMu96] D. Banerjee and B. Mukherjee, A practical approach for routing and wavelength assignment in large wavelength-routed optical networks , IEEE Journal on Selected Areas in Communications, pp. 903- 908,June 1996. – [OzBe03] A. E. Ozdaglar and D. P. Bertsekas, Routing and wavelength assignment in optical networks , IEEE/ACM Transactions on Networking, vol. 11, no. 2, pp. 259-272, Apr 2003. – [KrSi01] Rajesh M. Krishnaswamy and Kumar N. Sivarajan, Design of logical topologies: A linear formulation for wavelength-routed optical networks with no wavelength changers , IEEE/ACM Transactions on Networking, vol. 9, no. 2, pp. 186-198, Apr 2001. – [FuCeTaMaJa99] A. Fumagalli, I. Cerutti, M. Tacca, F. Masetti, R. Jagannathan, and S. Alagar, Survivable networks based on optimal routing and WDM self-heling rings , Proceedings, IEEE INFOCOM '99, vol. 2, pp. 726-733,1999. – [ToMaPa04] M. Tornatore and G. Maier and A. Pattavina, Variable Aggregation in the ILP Design of WDM Networks with dedicated Protection , TANGO project, Workshop di metà progetto , Jan, 2004, Madonna di Campiglio, Italy WDM Network Design 97

  77. Outline  Introduction to WDM network design and optimization  Integer Linear Programming approach to the problem  Physical Topology Design – Unprotected case – Dedicated path protection case – Shared path protection case – Link protection  Heuristic approach WDM Network Design 98

  78. WDM mesh network design Heuristic approaches  Heuristic: method based on reasonable choices in RFWA that lead to a sub-optimal solution – Connections are routed one-by-one – In this case we will refer to an example, based on the concept of auxiliary graph  Heuristic strategies can be: – Deterministic: greedy vs. local search • Generic definitions in the following, together with a large example – Stochastic: • E.g.:simulated annealing, tabu search, genetic algorithms • Not covered in this course WDM Network Design 99

  79. Greedy Heuristic (1) Framework  Greedy – Builds the solution step by step starting from scratch – Starts from an empty initial solution – At each iteration an element is added to the solution, such that • the partial solution is a partial feasible solution, namely it is possible to build a feasible solution starting from the partial one • the element added to the solution is the best choice, with respect to the current partial solution (the greedy is a myopic algorithm)  Features – Once a decision is taken it is not discussed anymore – The number of iterations is known in advance (polynomial) – Optimality is usually not guaranteed. WDM Network Design 100

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend