Adapted and Constrained Dijkstra for Elastic Optical Networks - - PowerPoint PPT Presentation

adapted and constrained dijkstra for elastic optical
SMART_READER_LITE
LIVE PREVIEW

Adapted and Constrained Dijkstra for Elastic Optical Networks - - PowerPoint PPT Presentation

Adapted and Constrained Dijkstra for Elastic Optical Networks Ireneusz Szczeniak Department of Communications AGH University of Science and Technology Poland Boena Wona-Szczeniak Institute of Mathematics and Computer Science Jan


slide-1
SLIDE 1

Adapted and Constrained Dijkstra for Elastic Optical Networks

Ireneusz Szcześniak

Department of Communications AGH University of Science and Technology Poland

Bożena Woźna-Szcześniak

Institute of Mathematics and Computer Science Jan Długosz University Poland

ONDM 2016

Grant number DEC-2013/08/S/ST7/00576 from the Polish National Science Centre

slide-2
SLIDE 2

Introduction Contribution Algorithm Evaluation Conclusions Appendix

Introduction

  • WDM networks evolving into elastic optical networks (EONs).
  • Fundamental problem: routing of a single demand.
  • Routing and wavelength assignment (RWA) is NP-complete.
  • RWA has the spectrum continuity constraint.
  • Routing and spectrum assignment (RSA) is NP-complete.
  • RSA has the spectrum continuity and contiguity constraints.
  • Existing solutions:
  • heuristic algorithms: practical but suboptimal,
  • ILP formulations: optimal but impractical.

slide 1

slide-3
SLIDE 3

Introduction Contribution Algorithm Evaluation Conclusions Appendix

Contribution

Novel algorithm: adapted and constrained Dijkstra. Our algorithm solves optimally and practically:

  • the constrained RSA problem in the EONs,
  • the constrained RWA problem in WDM networks.

Performance comparison with two heuristics:

  • routing with the edge-disjoint shortest paths,
  • routing with the Yen K-shortest paths.

The high-quality code using the Boost Graph Library (BGL) is freely-available under the General Public License (GPL).

slide 2

slide-4
SLIDE 4

Introduction Contribution Algorithm Evaluation Conclusions Appendix

Optimally and practically? Really?

  • Yes, but we are constraining the RSA and RWA problems.
  • Constriction: the limit on the path length.
  • Our algorithm solves the constrained RSA and RWA problems:
  • OPTIMALLY: based on the optimal Dijkstra algorithm,
  • PRACTICALLY: returns results for large problems.
  • However, we offer no proof.

slide 3

slide-5
SLIDE 5

Introduction Contribution Algorithm Evaluation Conclusions Appendix

Problem statement

Given:

  • directed multigraph G,
  • the cost e.c of edge e,
  • slices available e.SSC on edge e,
  • maximal path cost (length) m,
  • demand d with n slices.

Sought:

  • shortest path p for demand d,
  • largest set of slices for demand d.

slide 4

slide-6
SLIDE 6

Introduction Contribution Algorithm Evaluation Conclusions Appendix

Algorithm adaptation and constriction

Adaptation was shaped by the need to:

  • revisit nodes, but avoid loops,
  • purge worse labels.

Constriction limits the path length. It’s a typical Dijkstra constriction, during edge relaxation.

slide 5

slide-7
SLIDE 7

Introduction Contribution Algorithm Evaluation Conclusions Appendix

Revisit nodes, but avoid loops

Find a shortest path from node s to node t with 2 slices. Edge label: (cost, {set of available slices}) s i t e1 (1, {1, 2}) e2 (2, {2, 3}) e3 (10, {2, 3})

slide 6

slide-8
SLIDE 8

Introduction Contribution Algorithm Evaluation Conclusions Appendix

Purge worse labels

Find a shortest path from node s to node t with 2 slices. Edge label: (cost, {set of available slices}) s i t e1 (1, {1, 2}) e2 (1, {1, 2, 3}) e3 (1, {1, 2, 3})

slide 7

slide-9
SLIDE 9

Introduction Contribution Algorithm Evaluation Conclusions Appendix

What specifically we adapted

Dijkstra

  • ur algorithm

label cost, preceding node cost, preceding edge, maximal set of slices node has a single label a set of labels label comparison cost only cost and slices Label l1 is better than or equal to label l2, denoted by l1 ≤ l2, if cost(l1) ≤ cost(l2) and SSC(l1) ⊇ SSC(l2). A node has a set of labels, where no label is better or equal to some other label.

slide 8

slide-10
SLIDE 10

Introduction Contribution Algorithm Evaluation Conclusions Appendix

Evaluation setting

  • We compared the performance of our algorithm to two

heuristics:

  • routing along the edge-disjoint paths,
  • routing along the Yen K = 10 shortest paths.
  • 50 Gabriel graphs model simulation topologies.
  • Each graph has 100 nodes and 400 slices per edge.
  • Spectrum selection: first or fittest.
  • Connection arrivals: Poisson with mean 10 ≤ λ ≤ 1000/day.
  • Connection holding time: Poisson with mean 10 days.
  • The requested number of slices: Poisson with mean 10.
  • A simulation run lasts 100 simulated days.
  • 8100 simulation runs, 1% relative standard error.

slide 9

slide-11
SLIDE 11

Introduction Contribution Algorithm Evaluation Conclusions Appendix

The probability of establishing a connection

0.1 0.2 0.3 0.4 0.5 0.6 0.2 0.4 0.6 0.8 1 network utilization probability

proposed, fittest edksp, fittest yenksp, fittest proposed, first edksp, first yenksp, first

slide 10

slide-12
SLIDE 12

Introduction Contribution Algorithm Evaluation Conclusions Appendix

The time of shortest path search

0.1 0.2 0.3 0.4 0.5 0.6 0.2 0.4 network utilization time [s]

proposed, fittest edksp, fittest yenksp, fittest proposed, first edksp, first yenksp, first

slide 11

slide-13
SLIDE 13

Introduction Contribution Algorithm Evaluation Conclusions Appendix

The length of an established connection

0.1 0.2 0.3 0.4 0.5 0.6 400 600 network utilization length [km]

proposed, fittest edksp, fittest yenksp, fittest proposed, first edksp, first yenksp, first

slide 12

slide-14
SLIDE 14

Introduction Contribution Algorithm Evaluation Conclusions Appendix

Conclusions

  • The RSA and RWA problems tamed: constrained and solved.
  • We reckon the constrained RSA and RWA problems tractable.
  • The simulations show the algorithm is doing quite well.
  • But we offer no proof.

slide 13

slide-15
SLIDE 15

Introduction Contribution Algorithm Evaluation Conclusions Appendix

The algorithm

In: G = (V = {vi }, E = {ei }), W (ei ), S(ei ), m, d = (s, t, n) Out: p = (e1, ..., ei , ..., el ), Σ = {σi } Ls = {(0, e∅, Ω)} push (0, e∅) to Q while Q is not empty do q = (c, e) = pop(Q) v = e.target if v == t then break the while loop end if SSSC = {l.SSC : l ∈ Lv and l.c == c and l.e == e} for all S ∈ SSSC do for all e′ ∈ outgoing edges of v do S′ = S ∩ S(e′) c′ = c + W (e′) if c′ ≤ m and S′ can support d then v′ = e′.target l′ = (c′, e′, S′) if ∄l ∈ Lv′ : l ≤ l′ then Lv′ = Lv′ \ {l : l ∈ Lv′ and l′ ≤ l} Lv′ = Lv′ ∪ {l′} push (c′, e′) to Q end if end if end for end for end while return (p, Σ) = trace(L, s, t) slide 14

slide-16
SLIDE 16

Introduction Contribution Algorithm Evaluation Conclusions Appendix

The number of slices of an established connection

0.1 0.2 0.3 0.4 0.5 0.6 8.5 9 9.5 10 network utilization number of slices

proposed, fittest edksp, fittest yenksp, fittest proposed, first edksp, first yenksp, first

slide 15