Abstract
In this work, we establish analytic bounds for the energy efficiency of survivable IP over WDM networks using network coding. The analytic bounds are shown to be in close agreement with our previously reported results. They provide verification of the MILP and heuristics proposed previously, in addition to an efficient, compact means to evaluate network results and allow the performance of large networks to be determined easily.
Published by The Optical Society under the terms of the Creative Commons Attribution 4.0 License. Further distribution of this work must maintain attribution to the author(s) and the published article's title, journal citation, and DOI.
I. Introduction
After the introduction of network coding (NC) for the first time in [1], the contributions of NC to various networking domains have accelerated, demonstrating the potential it has to improve networking throughput. The work in optical networks, however, has been incomparable to its wireless counterpart due to the multicast nature of the wireless medium that is not inherent in the optical medium. The ability of NC to reduce overall network traffic, and therefore improve network throughput, provides a motivation to use NC to achieve energy efficiency by requiring less operating resources than the conventional approach. The benefits of introducing NC in optical networks to improve robustness and efficiency has been reported in [2–4]. In our previous work [5,6], we studied the energy efficiency gained by implementing NC in non-bypass and bypass core networks by performing an exclusive OR (XOR) operation on the bidirectional flows of unicast connections. Network coding elevates the traditional functionality of network nodes to incorporate coding operations on traffic flows and hence, by mixing signals at specific nodes rather than duplicating the signals end to end, more efficient network resource usage can be achieved.
In [7] the authors provided a NC protection scheme, and through integer linear programs and simulation they showed that a significant cost savings over the approach can be achieved. NC was proposed in [8,9] as a technique to improve protection in protection schemes that employ p-cycles. The p-cycles are used to protect multiple bidirectional link-disjoint connections, which are also link disjoint from the p-cycle links. In [10], NC is used to provide protection against node failures by reducing the problem to a problem of multiple link failures as a consequence of the node failure. In [11], it is shown that for networks with multiple subdomains, NC can be used to enable the network to survive any node or link failure in each subdomain. The study of protection schemes with NC was reported in [12], through an integer nonlinear program. This study, however, is limited to equal traffic demands between different sources, provides results that are considerably lower than those achievable through network coding, and constrains NC only to nodes with a nodal degree greater than or equal to three. Our work is different in that it focuses on the widely implemented protection scheme where it provides optimal and thorough solutions to protection with NC, focusing on improving the network’s energy efficiency. As far as we know, no practical implementation has yet been found in the industry, but we are optimistic that, because of the considerable resource savings that NC can achieve, implementation will follow.
Energy efficiency in an IP over WDM network has attracted considerable attention from the research community driven by the economic and environmental impact. The exponential growth of data-intensive applications and the increasing number of internet-connected devices necessitates a shift in the way the network is designed and operated. As a global effort to tackle the energy consumption challenge in ICT, the GreenTouch Consortium of leading experts in industry and academia was formed in 2010 with a goal to achieve a energy efficiency improvement in 2020 compared to 2010 levels. The GreenTouch results for the core network are reported in [13]. A good survey of some of the techniques for energy efficiency in core networks can be found in [14,15]. We used MILP models and heuristics in our previous work to improve energy efficiency in IP over WDM networks, considering renewable energy sources [16], studying core networks with data centers [17], optimizing the physical topology [18], reducing traffic through distributed clouds [19], and considering optimum design for future high definition TV [20], optimal P2P content distribution, [21] and virtual network embedding [22]. We introduced NC for energy-efficient IP over WDM networks in [5,6], by encoding bidirectional flows using an XOR operation, and presented a thorough study of the use of NC to improve energy efficiency in core networks in unicast settings [23].
In our previous work [24], we proposed and designed a protection scheme for core networks with NC and optimized the NC allocation and network operation using a mixed integer linear program and heuristics, providing encouraging results for energy-efficiency improvement of up to 37% compared to the conventional protection scheme. In this work, we complement our study and analysis by deriving, for the first time, analytical bounds and close-form expressions for the NC as well as the conventional protection scheme, which verify the MILP and heuristic results in [24] and enable the performance of large networks to be easily determined. We also study large network sizes that are highly complex using the MILP approach, as well as provide a detailed study on special full mesh and ring topologies.
The remainder of this paper is organized in three other sections. Section II provides the analytical bounds for the conventional and network-coded core networks with protection. In Section III, we derive the bounds for regular topologies. Finally, the paper is concluded in Section IV.
II. Protection With Network Coding
Consider the NC scheme where an example is shown in Fig. 1, representing a comparison between the conventional [Fig. 1(a)] and the network-coded [Fig. 1(b)] protection scheme in an arbitrary topology. Consider the two demands (3, 11) and (2, 11) originating from node 3 and 2, respectively, and sharing the same destination. With the conventional protection scheme [Fig. 1(a)], both demands use a single wavelength () for the working path and each working path traverses three links. Since they share the four links of their protection paths, they are forced to use different wavelengths, () for the demand (2, 11) and () for the demand (3, 11), using a total of 16 wavelengths in the network, considering all links and paths.
Our proposed network coding scheme is shown in [Fig. 1(b)], where the protection paths use the same wavelength () after being encoded at node 1, and later decoded at the destination node (i.e., 11). The benefits of using such a scheme are in reducing the total number of distinct wavelength used in the network, where in this case only the wavelength () is used, as well as reducing the total number of wavelengths in the network; in this example, from 16 to 12. A reduction of 25% in total resources, and 40% in protection resources (six wavelengths instead of 10).
The resource savings and, therefore, the power consumption reduction in this scheme depends on the network topology, the location, and number of NC-enabled nodes as well as the nature of demands. In our previous paper [24], we studied the scheme and determined the optimum allocation using a MILP optimization model followed by five heuristics. The real time and most optimal version of the heuristics is called the optimal search heuristic (OSH). The heuristic reduces the size of the problem by dividing the set of encodable paths into clusters and searching for optimal coding operations on these clusters rather than the whole network. The working and protection paths are found using the Suurballe’s algorithm. Four other suboptimal, but faster, heuristics are found by limiting the search for a suitable encoding pair. For each pair of demands, there are four paths in total; a working path and protection path for each. This produces four combinations for encoding and, therefore, four possible specific heuristics, which we call w-w, p-p, w-p, and p-w, where the letters w and p designate the working and protection path, respectively. The heuristics assume a distributed approach to determine the encoding decision. The network state can be communicated using the conventional routing protocol mechanism to exchange network state. For higher-order codes and coding more than two paths, a centralized control may have more value. It would be interesting to consider the SDN and virtualization ideas presented in [25,26] for optical networks generally and for protection and failure recovery specifically as a future area of investigation.
In this work, we complement our work by developing closed-form expressions and analytic bounds for the power consumptions as a function of the hop count, the network size, and the demand volume. We also study regular topologies and study scenarios that proved too complex for the MILP approach, such as large network sizes.
III. Analytic Bounds
The power consumption of the network is calculated as the sum of the power consumption of individual components. This approach is used by the research community and adopted by the GreenTouch Consortium [13]. To simplify the analytical formulas, we consider the network devices components that have a linear power profile where the power consumption of a device is proportional to the traffic served. Other power profiles exist and have been investigated in our previous work [16], such as the on–off, cubic, and log10 profiles.
The total power consumption of the survivable optical networks with NC for this scheme is given by
where the first term is the total power consumption of the network operating without NC, and the second term is the power consumption reduction achieved by NC. , are the power consumption of a router port and a transponder in watts, is the capacity of a wavelength in Gb/s, is the volume of demand in Gb/s, and is the set of demands. The variable is a binary variable, if the working path of demand is routed over link , and otherwise. The variable is the equivalent of for protection paths. is a binary variable, if demand is encoded with demand on link , and otherwise. Note that the values of power consumption ( and ) count for the OEO conversion at all nodes. The routing from source to destination uses the optical non-bypass approach where all intermediate nodes have OEO conversion. The power consumption contributions of the XOR operations and the EDFAs have not been included as their associated power consumption is low, and also to simplify the expressions. According to the GreenTouch core network energy efficiency study [13], the EDFAs’ power consumption constitutes a small portion of the overall power consumption compared to the power consumption of the routers and transponders. For the 2010 values, the EDFAs consume 5% of the overall power consumption, while for the predicted business-as-usual values for 2020, they consume less than 2% at port speeds of 400 Gb/s.Let the expression given in Eq. (1) be divided into its two summable components, which we refer to as and (i.e., ), such that
The value represents the power consumption of the baseline conventional protection approach, while is the reduction as a result of using NC.
Eq. (2) can be rewritten as
Given the fact that the sum of the hop count of the working and protection paths of a given demand is always greater than or equal to twice the minimum hop count of the path serving it, that is,
Therefore, can be written as
Assuming that all demands are routed through the minimum hop count path of the network (i.e., ), we then have
which givesEquation (8) represents a lower bound on the power consumption of the first component of the total power consumption of the network-coded case as a result of routing traffic flows in the working and the protection paths, without the NC component. It also represents the lower bound on the power consumption of the conventional case, which we refer to as , where
The upper bound of is found by starting from the fact that the minimum volume of two demands is never greater than their average; that is,
Then, Eq. (3) becomes
The expression has its highest value when the maximum traffic is equal to the minimum traffic; therefore, the equality in Eq. (10) is met when . In this case, Eq. (12) becomes
It can be rearranged as
The expression represents the number of shared links between the demand pair . We refer to this value as , where
Therefore, Eq. (13) becomes
Considering the lower bound of the component in Eq. (6) and the upper bound of the component in Eq. (15), we can get a lower bound on the total power consumption by combining the two, since , minimizing is achieved by minimizing and maximizing . The total power is then lower-bounded by
The result in Eq. (16) analytically confirms our heuristic in [24], that can provide close to an optimal solution. The heuristic produces a good solution by employing the following principles:
- • Select the minimum number of hops for the working and protection paths [minimizing the first term of Eq. (16)];
- • Encode a demand with another demand that has the highest number of shared hops and closest demand volume [maximizing the second term of (16)];
- • More weight is given to finding minimal hop paths than searching for a better encoding pair (from the equation, the weight ratio of the first to second terms is ); and
- • Three heuristics can be conceived. The first finds encodable pairs by searching only for the highest link sharing, the second searches for the demand with the closest traffic volume, and a better heuristic searches for the highest sharing and closest traffic volume, at the expense of increased complexity. As the first heuristic approaches the performance of the third, the smaller the traffic variation becomes.
The bound in Eq. (16) can be reduced by setting , which gives
Since each demand is constrained to be encoded with a maximum of a single other demand only, expressed as
Therefore, we let the value represent the amount of shared links (hops) between demand and the demand it is encoded with. Equation (17) can then be reduced to
which is equal toIf we define the variable as the characteristic hop count for demand , such that
then the lower bound of the total power becomesUsing Chebyshev’s sum inequality, i.e.,
then, Eq. (22) can be written as which gives where is the average demand volume. Defining as the average characteristic hop count, thenThe lower bound given in Eq. (26) bears resemblance to the lower bound of the conventional case in Eq. (9), where the minimum hop count of the conventional case is replaced by the characteristic minimum hop count of the NC case .
IV. Regular Topologies
In the previous work [24], we established that the star and the line topologies exhibit no NC benefits since the concept of protection does not apply. Here we develop formulas and bounds for the full mesh and ring topologies for the case where protection paths are encoded together, then study the impact of the network size on the NC performance.
A. Full Mesh Topology
The total power consumption under conventional protection is given by
For the full mesh topology, the optimal paths are the direct path (a single hop) for the working path, and a path with an intermediate node for the protection path (two hops). This means () and (), . Therefore,
which can be written asFor the network-coded approach, the network power consumption is given by
which can be reduced to the following, given that equal traffic demands that produce the highest savings,Since the number of encodable pairs in each cluster in the encodable graph depends on the total number of network nodes, the total number of encoded nodes depends on the network size. This is illustrated in Fig. 2 for full mesh topologies of size four (clusters of size three), five, and six nodes, respectively. If the network has an even number of nodes, then each cluster in the encodable graph will have an odd number of demands (i.e., each receiving node in the network will have demands from nodes, is even, and hence each cluster has an odd number of demands). With an odd number of demands, one demand cannot be paired (and hence cannot be network coded) and is therefore transmitted using conventional router ports and transponders. This leads to a higher power consumption compared to a network with an odd number of nodes. In the latter case (a network with an odd number of nodes), each cluster has an even number of demands; therefore, all demands can be encoded leading to higher power savings. As such, the odd and even cases must be treated separately. For a full mesh topology with an odd number of nodes (e.g., a five-node network, four cluster nodes), any two encodable demands have a single hop shared between them (recall the working path for the full mesh is a single hop, and the protection path is two hops); therefore,
Then, the total power consumption for the network-coded case is
As a result, the total savings is given by
which means the savings are upper bounded by a value of 16.67%.For a full mesh topology that has an even number of nodes, each cluster will have an odd number of encodable demands, which means that a single encodable node (demand) will not be encoded due to the pairing of all other demands, making the number of encodable demands , in each of the clusters. This fact makes the power savings for the even case less than the power savings of the odd case in Eq. (35). With clusters, and encodable demands in each cluster, the total number of shared hops is given by
The total power consumption of the even case of the full mesh topology under NC becomes
which givesTherefore, the power saving is given by
which leads toFrom Eqs. (35) and (40), we can see that the power consumption fluctuates between the upper value (i.e., 16.67%) when the number of nodes is odd, and the value given by Eq. (40) with an even number of nodes. These fluctuations, however, decrease as the number of nodes grows, making the network power consumption converge to 16.67% for any number of nodes. This decrease in fluctuations follows the inverse of the number of nodes and is given by
and, for a very large number of nodes,Figure 3 shows a comparison between the power consumption between the MILP, analytical, and the OSH heuristic for the five nodes full mesh topology and compares them to the conventional MILP scenario. It clearly shows that the analytical results match the MILP results. It also shows a linear dependency between the power consumption and the average demand volume, as can be seen from Eq. (34), when the number of nodes is fixed for a given network. This slope of the curve is given as .
In Fig. 4, we show the power savings of full mesh topologies with a number of nodes ranging from three nodes up to 15 nodes. The concept of multipath protection and, therefore, the concept of network-coded protection, doesn’t apply to networks less than three nodes. It is obvious that encoding both working flows together produces no savings, as both working flows use the direct link between each network node that is not shared with the direct link of a working path of another demand. It also shows that the optimal search heuristic (OSH) [24] is superior, while the form of the heuristic that encodes protection paths together produces optimal savings at even network sizes. The savings of the optimal heuristic jumps, increasing and decreasing as the network size changes between an odd and even number of nodes, agreeing with the analytical formulas. Overall, however, it converges to the maximum possible savings value (i.e., 16.67%).
B. Ring Topology
The power consumption of the conventional protection of the ring is given as
The total count of working hops for the odd number of nodes is given as
Since each working path of length has a protection path of length in the other direction, this makes the total number of protection hops for the case of an odd number of nodes,
and the total number of hops of both working and protection paths for the odd number of nodes is given asFor an even number of nodes, the number of working hops is
The number of protection hops is given by
and the total number of hops of both working and protection paths for the even number of nodes is given asThis expression is for a conventional case and is the same for rings that have odd and even numbers of nodes [i.e., Eq. (46) is the same as Eq. (50)].
1) Rings with an odd size:
We start with the case of a ring with an odd number of nodes, as shown in Fig. 5. The figure shows a ring with 11 and 13 nodes, where all nodes send to node 11 and 13, respectively. To maximize the number of shared links, protection paths are encoded together so the longest protection path is encoded with the second longest protection path and so on, leading to a number of shared hops equal to the number of hops of the shorter protection path. This scenario is shown in Fig. 5, where we pair the source nodes of demands that can be encoded. Figure 5 shows that the demands (1, 11) and (2, 11) are encoded together, where demand (1, 11) has a protection path with a length of 10 hops and demand (2, 11) has a protection path of nine hops, leading to nine shared hops. The same principle applies between demands (3, 11) and (4, 11) leading to seven shared hops, which is equal to the length of the protection path of demand (4, 11). The same rule applies to demands [(10, 11),(9, 11)] and [(8, 11),(7, 11)]. Because node 5, and node 6 do not share a protection path because they send their protection signals in opposite directions, they are not encoded together.
The second example, using a 13-node ring, shows that all nodes can find another node to be paired with. Therefore, compared to the 11-node ring, better savings are achieved. As a result, the power savings obtained under NC goes up and down as the number of nodes in the odd ring changes between the odd numbers, where , is classified as odd-1, and the odd number where , is classified as odd-2. For example, when , we have , meaning 11 nodes belong to group 1 (i.e., odd-1), and when , we have , meaning a ring with 13 nodes belongs to group 2 (i.e., odd-2).
We start with the first odd group (i.e., odd-1), of which Fig. 5(a) is an example, with 11 nodes. To calculate the total number of shared hops between all encoded demands (i.e., the hop count of green nodes as explained earlier), we first determine the total number of shared hops between encoded demands destined to one destination [i.e., to destination node 11 in the example in Fig. 5(a)], then multiply it by the total number of destinations (i.e., ). For demands going to the same destination, it can be seen that for each demand on one side of the destination node there exists another demand with the same length of the protection path on the other side of the ring. Therefore, we derive an expression for one side of the ring and then multiply the result by two. To determine the number of shared hops on one side of the ring, we calculate the number of pairs on that side, which is given as , deduced by removing three nodes [i.e., the destination node (node 11), and the other two non-encodable nodes (5) and (6)]. Then we divide two to account for one side, and divide again by two to count the pairs on that side.
Therefore, the total number of shared hops for the odd-1 ring group is
Equation (51) can be described with the aid of Fig. 5(a), where on one side, the encoded pair (node 1 and node 2) have a shared hop count of , which is added to , which represents the shared hop count between the encoded pair (node 3 and node 4). For larger rings, the number of shared hops continues to decrease by two, and the final term is given by . After adding similar terms, we have
and that givesThe total power saving for this case is represented by
For the second odd group, represented by Fig. 5(b), the total number of encodable demands in each half is given by , since only the destination node is not selected. This gives
which gives and can be written asThis makes the total power savings,
2) Rings with an even size:
Here we also face the same distinction between two sets of even ring sizes, where rings of size (4, 8, 12,…) will be in a different group (i.e., even-1) and have a different expression compared to the group (i.e., even-2) containing the other ring sizes (6, 10, 14,…). This is illustrated in Fig. 6. In both cases, the destination node and another demand source node [i.e., node 5 in Fig. 6(a) and node 7 in Fig. 6(b)] are not paired. A ring with an even size is classified into its appropriate group, and hence its bound, by checking; if , it belongs to the even-1 group, and it belongs to even-2 when . For example, when , , it means 12 nodes, and it belongs to group 1. When , , it indicates a ring with 14 nodes belong to group 2.
We start by the even-1 group represented by Fig. 6(a). The total number of encoded pairs in the ring is given by , where the number of encoded pairs on one side is , which is deduced by removing four nodes (i.e., 12, 5, 6, and 7) to maintain the symmetry needed for the whole expression, while the accounts for the shared hop count of the encoded pair (node 6 and node 7). Therefore, the total number of shared hops is given by
The additional term inside the brackets is the shared hop count that results from encoding (between node 6 and node 7) in Fig. 6(a), which equals
which givesThe savings for the even-1 ring is
Therefore,For the even-2 ring, the same approach applies. Just by removing two nodes (destination node and central node), it becomes completely symmetrical, having a number of encodable demands on each side of the destination node given by . Therefore, giving the following total number of shared hops,
which gives and then can be written asTherefore, the savings of the even-2 ring is
andFigure 7 shows a comparison between the power consumption between the MILP, analytical, and the OSH heuristic for the five nodes ring topology and compares them with the conventional MILP scenario, demonstrating an exact match between the analytic and MILP results.
We evaluate the impact of the ring size by showing the power savings of ring topologies ranging from three nodes up to 15 nodes, as shown in Fig. 8. The figure shows that the analytical formulas developed for the two cases of the even number of nodes and the other two cases of the odd number of nodes matches exactly the results of the heuristic, all together converging to the highest possible savings of 37.5% as the number of nodes grows. The figure also shows that the other heuristics (i.e., w-w, w-p, and p-w), have comparable savings around 15% that are far inferior to the OSH heuristic and the p-p heuristic.
The figure also shows that the difference between the values of the analytical formulas for the odd-1 and odd-2 case are higher than the difference between the analytical value between the even-1 and even-2 cases. This can be explained with the aid of Figs. 5 and 6, where in the case of an even number of nodes, two nodes get left out each time for both even cases, while for the odd case, one node gets left out in one case and three in the other. This also explains why the first odd group has the highest savings, where only one node gets left out (all nodes are encoded). It also shows that the power savings of the OSH heuristic are higher than the heuristic p-p in the odd-2 case (e.g., size 7, 11, and 15), because in this case not all nodes are encodable, and the heuristic tries all possible combinations while the heuristic p-p chooses only protection paths.
V. Conclusion
In this work we developed analytical bounds and closed-form expressions for energy-efficient survivable IP over WDM networks that use NC, encoding the protection paths of demands using simple XOR operations. The analytical bounds also were developed for the conventional protection scheme without NC as a function of the average demand volume, the network size, and the minimum hop count. We introduced what we believe is a new concept, the characteristic hop count, and showed that the power consumption of the network-coded case is a function of this characteristic hop count alongside the average traffic volume and the network size. We also studied regular topologies with an emphasis on the full mesh and the ring topologies, providing a study on large network sizes that proved that the mesh and ring topologies exhibit savings that approach asymptotically 16.7% and 37.5%, respectively. We also provided a closed-form expression of the total number of hops as a function of network size for the full mesh and ring topologies. The implementation of NC in this work uses the same algorithms of routing and path allocation algorithms used in the conventional approach, making the application for an existing network a matter of a small incremental addition, because using a simple XOR operation is much easier compared to highly complex existing techniques such as forward error correction. An interesting direction of further study, however, would be to analyze the additional efficiency gained against the higher complexity incurred by using much higher-order network coding techniques. The impact of centralized control and management using SDN, as opposed to the distributed control, and the contrast between them regarding the power consumption at different types of codes is also a future direction with significant value.
Acknowledgment
The authors would like to acknowledge funding from the Engineering and Physical Sciences Research Council (EPSRC), INTERNET (EP/H040536/1), and STAR (EP/K016873/1). All data is provided in full in the results section of this paper.
References
1. R. Ahlswede, C. Ning, S. Y. R. Li, and R. W. Yeung, “Network information flow,” IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204–1216, 2000. [CrossRef]
2. A. E. Kamal and M. Mohandespour, “Network coding-based protection,” Opt. Switching Netw., vol. 11, pp. 189–201, 2014. [CrossRef]
3. P. Babarczi, G. Biczok, H. Øverby, J. Tapolcai, and P. Soproni, “Realization strategies of dedicated path protection: a bandwidth cost perspective,” Comput. Netw., vol. 57, no. 9, pp. 1974–1990, 2013. [CrossRef]
4. H. Overby, G. Biczok, P. Babarczi, and J. Tapolcai, “Cost comparison of 1 + 1 path protection schemes: a case for coding,” in IEEE Int. Conf. on Communications (ICC), IEEE, 2012.
5. M. Musa, T. E. El-Gorashi, and J. M. Elmirghani, “Energy efficient core networks using network coding,” in 17th Int. Conf. on Transparent Optical Networks (ICTON), IEEE, 2015, p. 14.
6. M. Musa, T. E. El-Gorashi, and J. M. Elmirghani, “Network coding for energy efficiency in bypass IP/WDM networks,” in 18th Int. Conf. on Transparent Optical Networks (ICTON), IEEE, 2016.
7. A. E. Kamal and O. Al-Kofahi, “Efficient and agile 1 + n protection,” IEEE Trans. Commun., vol. 59, no. 1, pp. 169–180, 2011. [CrossRef]
8. A. E. Kamal, “Network protection for mesh networks: network coding based protection using p-cycles,” IEEE/ACM Trans. Netw., vol. 18, no. 1, pp. 67–80, 2010. [CrossRef]
9. S. A. Aly and A. E. Kamal, “Network protection codes against link failures using network coding,” in IEEE Global Telecommunications Conf., IEEE, 2008, pp. 1–6.
10. S. A. Aly and A. E. Kamal, “Network coding-based protection strategy against node failures,” in IEEE Int. Conf. on Communications (ICC), IEEE, 2009, pp. 1–5.
11. I. B. Barla, F. Rambach, D. A. Schupke, and M. Thakur, “Network coding for protection against multiple link failures in multi-domain networks,” in IEEE Int. Conf. on Communications (ICC), IEEE, 2010, pp. 1–6
12. A. Muktadir, A. A. Jose, and E. Oki, “An optimum mathematical programming model for network-coding based routing with 1 + 1 path protection,” in World Telecommunications Congress (WTC), IEEE, 2012, pp. 1–5.
13. GreenTouch, “Reducing the Net Energy Consumption in Communications Networks by up to 98% by 2020,” [Online]. Available: https://s3-us-west-2.amazonaws.com/belllabs-microsite-greentouch/uploads/documents/GreenTouch_Green_Meter_Final_Results_18_June_2015.pdf.
14. F. Idzikowski, L. Chiaraviglio, A. Cianfrani, J. L. Vizcano, M. Polverini, and Y. Ye, “A survey on energy-aware design and operation of core networks,” Commun. Surveys Tuts., vol. 18, no. 2, pp. 1453–1499, 2016. [CrossRef]
15. M. N. Dharmaweera, R. Parthiban, and Y. A. Sekercioglu, “Toward a power-efficient backbone network: the state of research,” Commun. Surv. Tutorials, vol. 17, no. 1, pp. 198–227, 2015. [CrossRef]
16. X. Dong, T. El-Gorashi, and J. M. Elmirghani, “IP over WDM networks employing renewable energy sources,” J. Lightwave Technol., vol. 29, no. 1, pp. 3–14, 2011. [CrossRef]
17. X. Dong, T. El-Gorashi, and J. M. H. Elmirghani, “Green IP over WDM networks with data centers,” J. Lightwave Technol., vol. 29, no. 12, pp. 1861–1880, June 2011. [CrossRef]
18. X. Dong, T. E. H. El-Gorashi, and J. M. H. Elmirghani, “On the energy efficiency of physical topology design for IP over WDM networks,” J. Lightwave Technol., vol. 30, no. 12, pp. 1931–1936, 2012. [CrossRef]
19. A. Lawey, T. El-Gorashi, and J. Elmirghani, “Distributed energy efficient clouds over core networks,” J. Lightwave Technol., vol. 32, no. 7, pp. 1261–1281, Apr. 2014. [CrossRef]
20. N. Osman, T. El-Gorashi, L. Krug, and J. Elmirghani, “Energy-efficient future high-definition TV,” J. Lightwave Technol., vol. 32, no. 13, pp. 2364–2381, July 2014. [CrossRef]
21. A. Lawey, T. El-Gorashi, and J. Elmirghani, “BitTorrent content distribution in optical networks,” J. Lightwave Technol., vol. 32, no. 21, pp. 4209–4225, Nov. 2014. [CrossRef]
22. L. Nonde, T. El-Gorashi, and J. Elmirghani, “Energy efficient virtual network embedding for cloud networks,” J. Lightwave Technol., vol. 33, no. 9, pp. 1828–1849, May 2015. [CrossRef]
23. M. Musa, T. El-Gorashi, and J. Elmirghani, “Energy efficient routing and network coding assignment in core networks,” J. Lightwave Technol. (to be published).
24. M. Musa, T. Elgorashi, and J. Elmirghani, “Energy efficient survivable IP-over-WDM networks with network coding,” J. Opt. Commun. Netw., vol. 9, no. 3, pp. 207–217, 2017. [CrossRef]
25. A. S. Thyagaturu, A. Mercian, M. P. McGarry, M. Reisslein, and W. Kellerer, “Software defined optical networks (SDONs): a comprehensive survey,” Commun. Surv. Tutorials, vol. 18, no. 4, pp. 2738–2786, 2016. [CrossRef]
26. A. Capone, C. Cascone, A. Q. T. Nguyen, and B. Sanso, “Detour planning for fast and reliable failure recovery in SDN with OpenState,” in 11th Int. Conf. on the Design of Reliable Communication Networks (DRCN), IEEE, 2015.
Mohamed Musa received a B.Sc. degree (first-class honors) in electrical and electronic engineering from the University of Khartoum, Sudan, in 2009, and a M.Sc. degree (with distinction) in broadband wireless and optical communication from University of Leeds, U.K., in 2011. He received a Ph.D. from the University of Leeds in 2016 in energy-efficient network coding in optical networks. His current research interests include energy optimization of ICT networks, network coding, and energy efficient routing protocols in optical networks.
Dr. Taisir Elgorashi received a B.S. degree (first-class honors) in electrical and electronic engineering from the University of Khartoum, Sudan, in 2004, an M.Sc. degree (with distinction) in photonic and communication systems from the University of Wales, Swansea, UK, in 2005, and a Ph.D. degree in optical networking from the University of Leeds, Leeds, U.K., in 2010. She is currently a lecturer of optical networks in the School of Electrical and Electronic Engineering, University of Leeds. Previously, she held a postdoctoral research post at the University of Leeds (2010–2014), where she focused on the energy efficiency of optical networks, investigating the use of renewable energy in core networks, green IP over WDM networks with data centers, energy-efficient physical topology design, energy efficiency of content distribution networks, distributed cloud computing, network virtualization, and big data. In 2012, she was a BT Research Fellow, where she developed an energy efficient hybrid wireless–optical broadband access network and explored the dynamics of TV viewing behavior and program popularity. The energy efficiency techniques developed during her postdoctoral research contributed three out of the eight carefully chosen core network energy efficiency improvement measures recommended by the GreenTouch Consortium for every network operator worldwide. Her work led to several invited talks at GreenTouch, Bell Labs, the Optical Network Design and Modeling conference, the Optical Fiber Communications Conference, the International Conference on Computer Communications, and the EU Future Internet Assembly in 2013, in addition to collaboration with Alcatel Lucent and Huawei.
Prof. Jaafar Elmirghani is the director of the Institute of Integrated Information Systems within the School of Electronic and Electrical Engineering, University of Leeds, U.K. He joined Leeds in 2007 and prior to that (2000–2007) was chair in Optical Communications at the University of Wales, Swansea. He founded, developed, and directed the Institute of Advanced Telecommunications and the Technium Digital (TD), a technology incubator/spin-off hub. He has provided leadership in a number of large research projects at the IAT and TD. He received a B.Sc. in Electrical Engineering (first-class honors) from the University of Khartoum, Sudan, in 1989 and was awarded all four prizes in the department for academic distinction. He received a Ph.D. in the synchronization of optical systems and optical receiver design from the University of Huddersfield, U.K., in 1994 and a DSc in communication systems and networks from the University of Leeds, U.K., in 2014. He has co-authored, “Photonic Switching Technology: Systems and Networks,” (Wiley) and has published more than 450 papers. He has research interests in optical systems and networks. He is a fellow of the IET, a chartered engineer, a fellow of the Institute of Physics, and a senior member of IEEE. He was chairman of IEEE’s Comsoc Transmission Access and Optical Systems technical committee and was chairman of IEEE Comsoc Signal Processing and Communications Electronics technical committee, and an editor of IEEE Communications Magazine. He was founding chair of the Advanced Signal Processing for Communication Symposium, which started at IEEE GLOBECOM99, and has continued since at every ICC and GLOBECOM. He was also founding chair of the first IEEE ICC/GLOBECOM optical symposium at GLOBECOM00, the Future Photonic Network Technologies, Architectures, and Protocols Symposium. He chaired this symposium, which continues to date under different names. He was the founding chair of the first Green Track at ICC/GLOBECOM at GLOBECOM 2011, and also is chair of the IEEE Green ICT initiative within the IEEE Technical Activities Board (TAB) Future Directions Committee (FDC), a pan-IEEE Societies initiative responsible for Green ICT activities across IEEE (2012–present). He has been, and continues to be, on the technical program committee of 34 IEEE ICC/GLOBECOM conferences between 1995 and 2016, including 15 times as symposium chair. He has given more than 55 invited and keynote talks in the past eight years. He has received many awards in the past few years, including the IEEE Communications Society Hal Sobol award; the IEEE Comsoc Chapter Achievement award for excellence in chapter activities (both in international competition in 2005); the University of Wales, Swansea, Outstanding Research Achievement Award, 2006. In international competition, he has also received several awards, including the IEEE Communications Society Signal Processing and Communication Electronics Outstanding Service Award (2009) and a best paper award at IEEE ICC2013. Related to green communications, he received: (i) the IEEE Comsoc Transmission Access and Optical Systems outstanding Service award 2015 in recognition of “Leadership and Contributions to the Area of Green Communications”; (ii) the GreenTouch 1000x award in 2015 for “pioneering research contributions to the field of energy efficiency in telecommunications”; (iii) the IET 2016 Premium Award for best paper in IET Optoelectronics; and (iv) shared the 2016 Edison Award in the collective disruption category with a six-member team from GreenTouch for their joint work on the GreenMeter. He is currently an editor for IET Optoelectronics and the Journal of Optical Communications and was an editor for IEEE Communications Surveys and Tutorials, and the IEEE Journal on Selected Areas in Communications series on Green Communications and Networking. He was co-chair of the GreenTouch Wired, Core, and Access Networks Working Group; an adviser to the Commonwealth Scholarship Commission; a member of the Royal Society International Joint Projects Panel; and a member of the Engineering and Physical Sciences Research Council (EPSRC) College. He has been awarded more than £22 million in grants to date from the EPSRC, the European Union, and industry organizations, and has held prestigious fellowships funded by the Royal Society and by BT. He is an IEEE Comsoc Distinguished Lecturer (2013–2016).