Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Bounds for Energy-Efficient Survivable IP Over WDM Networks With Network Coding

Open Access Open Access

Abstract

In this work, we establish analytic bounds for the energy efficiency of 1+1 survivable IP over WDM networks using network coding. The analytic bounds are shown to be in close agreement with our previously reported results. They provide verification of the MILP and heuristics proposed previously, in addition to an efficient, compact means to evaluate network results and allow the performance of large networks to be determined easily.

Published by The Optical Society under the terms of the Creative Commons Attribution 4.0 License. Further distribution of this work must maintain attribution to the author(s) and the published article's title, journal citation, and DOI.

I. Introduction

After the introduction of network coding (NC) for the first time in [1], the contributions of NC to various networking domains have accelerated, demonstrating the potential it has to improve networking throughput. The work in optical networks, however, has been incomparable to its wireless counterpart due to the multicast nature of the wireless medium that is not inherent in the optical medium. The ability of NC to reduce overall network traffic, and therefore improve network throughput, provides a motivation to use NC to achieve energy efficiency by requiring less operating resources than the conventional approach. The benefits of introducing NC in optical networks to improve robustness and efficiency has been reported in [24]. In our previous work [5,6], we studied the energy efficiency gained by implementing NC in non-bypass and bypass core networks by performing an exclusive OR (XOR) operation on the bidirectional flows of unicast connections. Network coding elevates the traditional functionality of network nodes to incorporate coding operations on traffic flows and hence, by mixing signals at specific nodes rather than duplicating the signals end to end, more efficient network resource usage can be achieved.

In [7] the authors provided a 1+N NC protection scheme, and through integer linear programs and simulation they showed that a significant cost savings over the 1+1 approach can be achieved. NC was proposed in [8,9] as a technique to improve protection in 1+N protection schemes that employ p-cycles. The p-cycles are used to protect multiple bidirectional link-disjoint connections, which are also link disjoint from the p-cycle links. In [10], NC is used to provide protection against node failures by reducing the problem to a problem of multiple link failures as a consequence of the node failure. In [11], it is shown that for networks with multiple subdomains, NC can be used to enable the network to survive any node or link failure in each subdomain. The study of 1+1 protection schemes with NC was reported in [12], through an integer nonlinear program. This study, however, is limited to equal traffic demands between different sources, provides results that are considerably lower than those achievable through network coding, and constrains NC only to nodes with a nodal degree greater than or equal to three. Our work is different in that it focuses on the widely implemented 1+1 protection scheme where it provides optimal and thorough solutions to protection with NC, focusing on improving the network’s energy efficiency. As far as we know, no practical implementation has yet been found in the industry, but we are optimistic that, because of the considerable resource savings that NC can achieve, implementation will follow.

Energy efficiency in an IP over WDM network has attracted considerable attention from the research community driven by the economic and environmental impact. The exponential growth of data-intensive applications and the increasing number of internet-connected devices necessitates a shift in the way the network is designed and operated. As a global effort to tackle the energy consumption challenge in ICT, the GreenTouch Consortium of leading experts in industry and academia was formed in 2010 with a goal to achieve a 1000× energy efficiency improvement in 2020 compared to 2010 levels. The GreenTouch results for the core network are reported in [13]. A good survey of some of the techniques for energy efficiency in core networks can be found in [14,15]. We used MILP models and heuristics in our previous work to improve energy efficiency in IP over WDM networks, considering renewable energy sources [16], studying core networks with data centers [17], optimizing the physical topology [18], reducing traffic through distributed clouds [19], and considering optimum design for future high definition TV [20], optimal P2P content distribution, [21] and virtual network embedding [22]. We introduced NC for energy-efficient IP over WDM networks in [5,6], by encoding bidirectional flows using an XOR operation, and presented a thorough study of the use of NC to improve energy efficiency in core networks in unicast settings [23].

In our previous work [24], we proposed and designed a 1+1 protection scheme for core networks with NC and optimized the NC allocation and network operation using a mixed integer linear program and heuristics, providing encouraging results for energy-efficiency improvement of up to 37% compared to the conventional 1+1 protection scheme. In this work, we complement our study and analysis by deriving, for the first time, analytical bounds and close-form expressions for the NC as well as the conventional 1+1 protection scheme, which verify the MILP and heuristic results in [24] and enable the performance of large networks to be easily determined. We also study large network sizes that are highly complex using the MILP approach, as well as provide a detailed study on special full mesh and ring topologies.

The remainder of this paper is organized in three other sections. Section II provides the analytical bounds for the conventional and network-coded core networks with 1+1 protection. In Section III, we derive the bounds for regular topologies. Finally, the paper is concluded in Section IV.

II. 1+1 Protection With Network Coding

Consider the NC scheme where an example is shown in Fig. 1, representing a comparison between the conventional [Fig. 1(a)] and the network-coded [Fig. 1(b)] 1+1 protection scheme in an arbitrary topology. Consider the two demands (3, 11) and (2, 11) originating from node 3 and 2, respectively, and sharing the same destination. With the conventional 1+1 protection scheme [Fig. 1(a)], both demands use a single wavelength (λ1) for the working path and each working path traverses three links. Since they share the four links of their protection paths, they are forced to use different wavelengths, (λ1) for the demand (2, 11) and (λ2) for the demand (3, 11), using a total of 16 wavelengths in the network, considering all links and paths.

 figure: Fig. 1.

Fig. 1. Example of using network coding for protection.

Download Full Size | PDF

Our proposed network coding scheme is shown in [Fig. 1(b)], where the protection paths use the same wavelength (λ1) after being encoded at node 1, and later decoded at the destination node (i.e., 11). The benefits of using such a scheme are in reducing the total number of distinct wavelength used in the network, where in this case only the wavelength (λ1) is used, as well as reducing the total number of wavelengths in the network; in this example, from 16 to 12. A reduction of 25% in total resources, and 40% in protection resources (six wavelengths instead of 10).

The resource savings and, therefore, the power consumption reduction in this scheme depends on the network topology, the location, and number of NC-enabled nodes as well as the nature of demands. In our previous paper [24], we studied the scheme and determined the optimum allocation using a MILP optimization model followed by five heuristics. The real time and most optimal version of the heuristics is called the optimal search heuristic (OSH). The heuristic reduces the size of the problem by dividing the set of encodable paths into clusters and searching for optimal coding operations on these clusters rather than the whole network. The working and protection paths are found using the Suurballe’s algorithm. Four other suboptimal, but faster, heuristics are found by limiting the search for a suitable encoding pair. For each pair of demands, there are four paths in total; a working path and protection path for each. This produces four combinations for encoding and, therefore, four possible specific heuristics, which we call w-w, p-p, w-p, and p-w, where the letters w and p designate the working and protection path, respectively. The heuristics assume a distributed approach to determine the encoding decision. The network state can be communicated using the conventional routing protocol mechanism to exchange network state. For higher-order codes and coding more than two paths, a centralized control may have more value. It would be interesting to consider the SDN and virtualization ideas presented in [25,26] for optical networks generally and for protection and failure recovery specifically as a future area of investigation.

In this work, we complement our work by developing closed-form expressions and analytic bounds for the power consumptions as a function of the hop count, the network size, and the demand volume. We also study regular topologies and study scenarios that proved too complex for the MILP approach, such as large network sizes.

III. Analytic Bounds

The power consumption of the network is calculated as the sum of the power consumption of individual components. This approach is used by the research community and adopted by the GreenTouch Consortium [13]. To simplify the analytical formulas, we consider the network devices components that have a linear power profile where the power consumption of a device is proportional to the traffic served. Other power profiles exist and have been investigated in our previous work [16], such as the on–off, cubic, and log10 profiles.

The total power consumption of the survivable optical networks with NC for this scheme is given by

P=(pp+ptB)dDm,nVd(xmnd+ymnd)(pp+ptB)d1,d2m,nmin(Vd1,Vd2)βmnd1d22,
where the first term is the total power consumption of the network operating without NC, and the second term is the power consumption reduction achieved by NC. pp, pt are the power consumption of a router port and a transponder in watts, B is the capacity of a wavelength in Gb/s, Vd is the volume of demand d in Gb/s, and D is the set of demands. The variable xm,nd is a binary variable, xmnd=1 if the working path of demand d is routed over link (m,n), and xmnd=0 otherwise. The variable ym,nd is the equivalent of xm,nd for protection paths. βmnd1d2 is a binary variable, βmnd1d2=1 if demand d1 is encoded with demand d2 on link (m,n), and βmnd1d2=0 otherwise. Note that the values of power consumption (pp and pt) count for the OEO conversion at all nodes. The routing from source to destination uses the optical non-bypass approach where all intermediate nodes have OEO conversion. The power consumption contributions of the XOR operations and the EDFAs have not been included as their associated power consumption is low, and also to simplify the expressions. According to the GreenTouch core network energy efficiency study [13], the EDFAs’ power consumption constitutes a small portion of the overall power consumption compared to the power consumption of the routers and transponders. For the 2010 values, the EDFAs consume 5% of the overall power consumption, while for the predicted business-as-usual values for 2020, they consume less than 2% at port speeds of 400 Gb/s.

Let the expression given in Eq. (1) be divided into its two summable components, which we refer to as P1 and P2 (i.e., P=P1P2), such that

P1=(pp+ptB)(dDm,nVd(xmnd+ymnd)),
P2=(pp+ptB)(d1,d2m,nmin(Vd1,Vd2)βmnd1d22).

The value P1 represents the power consumption of the baseline conventional 1+1 protection approach, while P2 is the reduction as a result of using NC.

Eq. (2) can be rewritten as

P1=(pp+ptB)(dDVdm,n(xmnd+ymnd)).

Given the fact that the sum of the hop count of the working and protection paths of a given demand is always greater than or equal to twice the minimum hop count hmind of the path serving it, that is,

m,n(xmnd+ymnd)2hmind.

Therefore, P1 can be written as

P1(pp+ptB)(dD2Vdhmind).

Assuming that all demands are routed through the minimum hop count path of the network (i.e., hmind=hmin,dD), we then have

P1(pp+ptB)hmin(dD2Vd),
which gives
P12(pp+ptB)N(N1)Vhmin.

Equation (8) represents a lower bound on the power consumption of the first component of the total power consumption of the network-coded case as a result of routing traffic flows in the working and the protection paths, without the NC component. It also represents the lower bound on the power consumption of the conventional case, which we refer to as P0, where

P02(pp+ptB)N(N1)Vhmin.

The upper bound of P2 is found by starting from the fact that the minimum volume of two demands is never greater than their average; that is,

min(Vd1,Vd2)Vd1+Vd22.

Then, Eq. (3) becomes

P2(pp+ptB)(d1,d2m,nVd1+Vd22βmnd1d22).

The expression min(Vd1,Vd2) has its highest value when the maximum traffic is equal to the minimum traffic; therefore, the equality in Eq. (10) is met when Vd1=Vd2=Vd1,d2. In this case, Eq. (12) becomes

P2pp+pt2B(d1,d2m,nVd1,d2βmnd1d2).

It can be rearranged as

P2pp+pt2B(d1,d2Vd1,d2m,nβmnd1d2).

The expression m,nβmnd1d2 represents the number of shared links between the demand pair (d1,d2). We refer to this value as hd2d1, where

hd2d1=m,nβmnd1d2.

Therefore, Eq. (13) becomes

P2pp+pt2B(d1,d2Vd1,d2hd2d1).

Considering the lower bound of the component P1 in Eq. (6) and the upper bound of the component P2 in Eq. (15), we can get a lower bound on the total power consumption by combining the two, since P=P1P2, minimizing P is achieved by minimizing P1 and maximizing P2. The total power is then lower-bounded by

P(pp+ptB)(2dDVdhmind12d1,d2Vd1,d2hd2d1).

The result in Eq. (16) analytically confirms our heuristic in [24], that can provide close to an optimal solution. The heuristic produces a good solution by employing the following principles:

  • • Select the minimum number of hops for the working and protection paths [minimizing the first term of Eq. (16)];
  • • Encode a demand with another demand that has the highest number of shared hops and closest demand volume [maximizing the second term of (16)];
  • • More weight is given to finding minimal hop paths than searching for a better encoding pair (from the equation, the weight ratio of the first to second terms is 41); and
  • • Three heuristics can be conceived. The first finds encodable pairs by searching only for the highest link sharing, the second searches for the demand with the closest traffic volume, and a better heuristic searches for the highest sharing and closest traffic volume, at the expense of increased complexity. As the first heuristic approaches the performance of the third, the smaller the traffic variation becomes.

The bound in Eq. (16) can be reduced by setting Vd=Vd,d2, which gives

P(pp+ptB)dDVd(2hmind12d2hd2d).

Since each demand is constrained to be encoded with a maximum of a single other demand only, expressed as

d2Dbd2d11.

Therefore, we let the value h^d=d2hd2d represent the amount of shared links (hops) between demand d and the demand it is encoded with. Equation (17) can then be reduced to

P(pp+ptB)(dDVd(2hmindh^d2)),
which is equal to
P2(pp+ptB)(dDVd(hmindh^d4)).

If we define the variable h˜d as the characteristic hop count for demand d, such that

h˜d=hmindh^d4,
then the lower bound of the total power becomes
P2(pp+ptB)(dDVdh˜d).

Using Chebyshev’s sum inequality, i.e.,

1nk=1nakbk(1nk=1nak)(1nk=1nbk),
then, Eq. (22) can be written as
P2(pp+ptB)(1N(N1)dDVddDh˜d),
which gives
P2(pp+ptB)VdDh˜d,
where V=dDVd is the average demand volume. Defining h˜=dDh˜d as the average characteristic hop count, then
P2(pp+ptB)N(N1)Vh˜.

The lower bound given in Eq. (26) bears resemblance to the lower bound of the conventional case in Eq. (9), where the minimum hop count of the conventional case hmin is replaced by the characteristic minimum hop count of the NC case h˜.

IV. Regular Topologies

In the previous work [24], we established that the star and the line topologies exhibit no NC benefits since the concept of protection does not apply. Here we develop formulas and bounds for the full mesh and ring topologies for the case where protection paths are encoded together, then study the impact of the network size on the NC performance.

A. Full Mesh Topology

The total power consumption under conventional protection is given by

P0=(pp+ptB)(dDm,nVd(xmnd+ymnd)).

For the full mesh topology, the optimal paths are the direct path (a single hop) for the working path, and a path with an intermediate node for the protection path (two hops). This means (m,nxmnd=1) and (m,nymnd=2), dD. Therefore,

P0=(pp+ptB)(dD3Vd),
which can be written as
P0=3(pp+ptB)VN(N1).

For the network-coded approach, the network power consumption is given by

P=P0(pp+ptB)d1,d2m,nmin(Vd1,Vd2)βmnd1d22,
which can be reduced to the following, given that equal traffic demands that produce the highest savings,
P=Po(pp+ptB)V2d1,d2m,nβmnd1d2,
P=Po(pp+ptB)V2d1,d2m,nβmnd1d2.

Since the number of encodable pairs in each cluster in the encodable graph depends on the total number of network nodes, the total number of encoded nodes depends on the network size. This is illustrated in Fig. 2 for full mesh topologies of size four (clusters of size three), five, and six nodes, respectively. If the network has an even number of nodes, then each cluster in the encodable graph will have an odd number of demands (i.e., each receiving node in the network will have demands from N1 nodes, N is even, and hence each cluster has an odd number of demands). With an odd number of demands, one demand cannot be paired (and hence cannot be network coded) and is therefore transmitted using conventional router ports and transponders. This leads to a higher power consumption compared to a network with an odd number of nodes. In the latter case (a network with an odd number of nodes), each cluster has an even number of demands; therefore, all demands can be encoded leading to higher power savings. As such, the odd and even cases must be treated separately. For a full mesh topology with an odd number of nodes (e.g., a five-node network, four cluster nodes), any two encodable demands have a single hop shared between them (recall the working path for the full mesh is a single hop, and the protection path is two hops); therefore,

d1,d2m,nβmnd1d2=N(N1).

 figure: Fig. 2.

Fig. 2. Weighted encodable graph for a full mesh of size 4, 5, and 6, respectively.

Download Full Size | PDF

Then, the total power consumption for the network-coded case is

P=(pp+ptB)N(N1)5V2.

As a result, the total savings is given by

ϕodd=1(pp+ptB)N(N1)5V23(pp+ptB)VN(N1)=0.166,
which means the savings are upper bounded by a value of 16.67%.

For a full mesh topology that has an even number of nodes, each cluster will have an odd number of encodable demands, which means that a single encodable node (demand) will not be encoded due to the pairing of all other demands, making the number of encodable demands N2, in each of the N clusters. This fact makes the power savings for the even case less than the power savings of the odd case in Eq. (35). With N clusters, and N2 encodable demands in each cluster, the total number of shared hops is given by

d1,d2m,nβmnd1d2=N(N2).

The total power consumption of the even case of the full mesh topology under NC becomes

P=3(pp+ptB)VN(N1)(pp+ptB)VN(N2)2,
which gives
P=(pp+ptB)VN(5N42).

Therefore, the power saving is given by

ϕeven=1(pp+ptB)VN(5N42)3(pp+ptB)VN(N1),
which leads to
ϕeven=N26(N1).

From Eqs. (35) and (40), we can see that the power consumption fluctuates between the upper value (i.e., 16.67%) when the number of nodes is odd, and the value given by Eq. (40) with an even number of nodes. These fluctuations, however, decrease as the number of nodes grows, making the network power consumption converge to 16.67% for any number of nodes. This decrease in fluctuations follows the inverse of the number of nodes and is given by

ε(N)=16N26(N1)=16(N1),
and, for a very large number of nodes,
limNε(N)=limN16(N1)=0.

Figure 3 shows a comparison between the power consumption between the MILP, analytical, and the OSH heuristic for the five nodes full mesh topology and compares them to the conventional MILP scenario. It clearly shows that the analytical results match the MILP results. It also shows a linear dependency between the power consumption and the average demand volume, as can be seen from Eq. (34), when the number of nodes N is fixed for a given network. This slope of the curve is given as (pp+ptB52N(N1)).

 figure: Fig. 3.

Fig. 3. Power consumption of the five-node full mesh topology with equal demands using the MILP, heuristic, and analytical bound.

Download Full Size | PDF

In Fig. 4, we show the power savings of full mesh topologies with a number of nodes ranging from three nodes up to 15 nodes. The concept of multipath protection and, therefore, the concept of network-coded protection, doesn’t apply to networks less than three nodes. It is obvious that encoding both working flows together produces no savings, as both working flows use the direct link between each network node that is not shared with the direct link of a working path of another demand. It also shows that the optimal search heuristic (OSH) [24] is superior, while the form of the heuristic that encodes protection paths together produces optimal savings at even network sizes. The savings of the optimal heuristic jumps, increasing and decreasing as the network size changes between an odd and even number of nodes, agreeing with the analytical formulas. Overall, however, it converges to the maximum possible savings value (i.e., 16.67%).

 figure: Fig. 4.

Fig. 4. Power savings of the full mesh topology under different network sizes.

Download Full Size | PDF

B. Ring Topology

The power consumption of the conventional 1+1 protection of the ring is given as

P0=(pp+ptB)(dDm,nVd(xmnd+ymnd)).

The total count of working hops for the odd number of nodes is given as

hw=dDm,nxmnd=2N(1+2++(N12))=(N1)N(N+1)4.

Since each working path of length k has a protection path of length Nk in the other direction, this makes the total number of protection hops for the case of an odd number of nodes,

hp=dDm,nymnd=2N(N1+N2++NN12)=N(N1)(3N14),
and the total number of hops of both working and protection paths for the odd number of nodes is given as
dDm,n(xmnd+ymnd)=(N1)N(N+1)4+N(N1)(3N14)=N3N2.

For an even number of nodes, the number of working hops is

hw=dDm,nxmnd=2N(1+2++(N22))+NN2=N34.

The number of protection hops is given by

hp=dDm,nymnd=2N(N1+N2++NN22)+NN2,
hp=2N(N(N22)12N22)+N22=N2(3N4)4,
and the total number of hops of both working and protection paths for the even number of nodes is given as
dDm,n(xmnd+ymnd)=N34+N2(3N4)4=N3N2.

This expression is for a conventional case and is the same for rings that have odd and even numbers of nodes [i.e., Eq. (46) is the same as Eq. (50)].

1) Rings with an odd size:

We start with the case of a ring with an odd number of nodes, as shown in Fig. 5. The figure shows a ring with 11 and 13 nodes, where all nodes send to node 11 and 13, respectively. To maximize the number of shared links, protection paths are encoded together so the longest protection path is encoded with the second longest protection path and so on, leading to a number of shared hops equal to the number of hops of the shorter protection path. This scenario is shown in Fig. 5, where we pair the source nodes of demands that can be encoded. Figure 5 shows that the demands (1, 11) and (2, 11) are encoded together, where demand (1, 11) has a protection path with a length of 10 hops and demand (2, 11) has a protection path of nine hops, leading to nine shared hops. The same principle applies between demands (3, 11) and (4, 11) leading to seven shared hops, which is equal to the length of the protection path of demand (4, 11). The same rule applies to demands [(10, 11),(9, 11)] and [(8, 11),(7, 11)]. Because node 5, and node 6 do not share a protection path because they send their protection signals in opposite directions, they are not encoded together.

 figure: Fig. 5.

Fig. 5. Encoding pairs for two rings with different odd numbers of nodes.

Download Full Size | PDF

The second example, using a 13-node ring, shows that all nodes can find another node to be paired with. Therefore, compared to the 11-node ring, better savings are achieved. As a result, the power savings obtained under NC goes up and down as the number of nodes in the odd ring changes between the odd numbers, where N12mod2=1, is classified as odd-1, and the odd number where N12mod2=0, is classified as odd-2. For example, when N=11, we have 1112mod2=1, meaning 11 nodes belong to group 1 (i.e., odd-1), and when N=13, we have 1312mod2=0, meaning a ring with 13 nodes belongs to group 2 (i.e., odd-2).

We start with the first odd group (i.e., odd-1), of which Fig. 5(a) is an example, with 11 nodes. To calculate the total number of shared hops between all encoded demands (i.e., the hop count of green nodes as explained earlier), we first determine the total number of shared hops between encoded demands destined to one destination [i.e., to destination node 11 in the example in Fig. 5(a)], then multiply it by the total number of destinations (i.e., N). For demands going to the same destination, it can be seen that for each demand on one side of the destination node there exists another demand with the same length of the protection path on the other side of the ring. Therefore, we derive an expression for one side of the ring and then multiply the result by two. To determine the number of shared hops on one side of the ring, we calculate the number of pairs on that side, which is given as N34, deduced by removing three nodes [i.e., the destination node (node 11), and the other two non-encodable nodes (5) and (6)]. Then we divide two to account for one side, and divide again by two to count the pairs on that side.

Therefore, the total number of shared hops for the odd-1 ring group is

ht(odd1)=2N[(N2)+(N4)++(NN32)].

Equation (51) can be described with the aid of Fig. 5(a), where on one side, the encoded pair (node 1 and node 2) have a shared hop count of (N2), which is added to (N4), which represents the shared hop count between the encoded pair (node 3 and node 4). For larger rings, the number of shared hops continues to decrease by two, and the final term is given by (NN32). After adding similar terms, we have

ht(odd1)=2N[N(N34)24N32],
and that gives
ht(odd1)=2N[N(N34)2k=1N34k]=N(N3)(3N1)8.

The total power saving for this case is represented by

ϕodd1=N(N3)(3N1)8(N3N2),
limNϕodd1=limNN(N3)(3N1)8(N3N2)=38=37.5%.

For the second odd group, represented by Fig. 5(b), the total number of encodable demands in each half is given by N14, since only the destination node is not selected. This gives

ht(odd2)=2N[(N2)+(N4)++(NN12)],
which gives
ht(odd2)=2N[NN1424N12],
and can be written as
ht(odd2)=2N[NN142k=1N14k]=38N(N1)2.

This makes the total power savings,

ϕodd2=38N(N1)2N3N2,
limnϕodd2=limn38N(N1)2N3N2=38=37.5%.

2) Rings with an even size:

Here we also face the same distinction between two sets of even ring sizes, where rings of size (4, 8, 12,…) will be in a different group (i.e., even-1) and have a different expression compared to the group (i.e., even-2) containing the other ring sizes (6, 10, 14,…). This is illustrated in Fig. 6. In both cases, the destination node and another demand source node [i.e., node 5 in Fig. 6(a) and node 7 in Fig. 6(b)] are not paired. A ring with an even size N is classified into its appropriate group, and hence its bound, by checking; if N22mod2=1, it belongs to the even-1 group, and it belongs to even-2 when N22mod2=0. For example, when N=12, 1222mod2=1, it means 12 nodes, and it belongs to group 1. When N=14, 1422mod2=0, it indicates a ring with 14 nodes belong to group 2.

 figure: Fig. 6.

Fig. 6. Encoding pairs for two rings with different even numbers of nodes.

Download Full Size | PDF

We start by the even-1 group represented by Fig. 6(a). The total number of encoded pairs in the ring is given by N(2N44+N2), where the number of encoded pairs on one side is N44, which is deduced by removing four nodes (i.e., 12, 5, 6, and 7) to maintain the symmetry needed for the whole expression, while the N2 accounts for the shared hop count of the encoded pair (node 6 and node 7). Therefore, the total number of shared hops is given by

ht(even1)=N(2[NN4424N42]+N2).

The additional N2 term inside the brackets is the shared hop count that results from encoding (between node 6 and node 7) in Fig. 6(a), which equals

ht(even1)=N(2[NN442k=1N44k]+N2),
which gives
ht(even1)=N22[1+3(N4)4].

The savings for the even-1 ring is

ϕeven1=12N2(3N42)N3N2;
Therefore,
limNϕeven1=limN12N2(3N42)N3N2=38=37.5%.

For the even-2 ring, the same approach applies. Just by removing two nodes (destination node and central node), it becomes completely symmetrical, having a number of encodable demands on each side of the destination node given by N24. Therefore, giving the following total number of shared hops,

ht(even2)=N(2[NN2424N22]),
which gives
ht(even2)=N(2[NN242k=1N24k]),
and then can be written as
ht(even2)=N(N2)(3N2)8.

Therefore, the savings of the even-2 ring is

ϕeven2=18N(N2)(3N2)N3N2,
and
limNϕeven2=limN18N(N2)(3N2)N3N2=38=37.5%.

Figure 7 shows a comparison between the power consumption between the MILP, analytical, and the OSH heuristic for the five nodes ring topology and compares them with the conventional MILP scenario, demonstrating an exact match between the analytic and MILP results.

 figure: Fig. 7.

Fig. 7. Power consumption of the five-node ring topology with equal demands using the MILP, heuristic, and analytical bound.

Download Full Size | PDF

We evaluate the impact of the ring size by showing the power savings of ring topologies ranging from three nodes up to 15 nodes, as shown in Fig. 8. The figure shows that the analytical formulas developed for the two cases of the even number of nodes and the other two cases of the odd number of nodes matches exactly the results of the heuristic, all together converging to the highest possible savings of 37.5% as the number of nodes grows. The figure also shows that the other heuristics (i.e., w-w, w-p, and p-w), have comparable savings around 15% that are far inferior to the OSH heuristic and the p-p heuristic.

 figure: Fig. 8.

Fig. 8. Power savings of the ring topology under different network sizes.

Download Full Size | PDF

The figure also shows that the difference between the values of the analytical formulas for the odd-1 and odd-2 case are higher than the difference between the analytical value between the even-1 and even-2 cases. This can be explained with the aid of Figs. 5 and 6, where in the case of an even number of nodes, two nodes get left out each time for both even cases, while for the odd case, one node gets left out in one case and three in the other. This also explains why the first odd group has the highest savings, where only one node gets left out (all nodes are encoded). It also shows that the power savings of the OSH heuristic are higher than the heuristic p-p in the odd-2 case (e.g., size 7, 11, and 15), because in this case not all nodes are encodable, and the heuristic tries all possible combinations while the heuristic p-p chooses only protection paths.

V. Conclusion

In this work we developed analytical bounds and closed-form expressions for energy-efficient survivable IP over WDM networks that use NC, encoding the protection paths of demands using simple XOR operations. The analytical bounds also were developed for the conventional 1+1 protection scheme without NC as a function of the average demand volume, the network size, and the minimum hop count. We introduced what we believe is a new concept, the characteristic hop count, and showed that the power consumption of the network-coded case is a function of this characteristic hop count alongside the average traffic volume and the network size. We also studied regular topologies with an emphasis on the full mesh and the ring topologies, providing a study on large network sizes that proved that the mesh and ring topologies exhibit savings that approach asymptotically 16.7% and 37.5%, respectively. We also provided a closed-form expression of the total number of hops as a function of network size for the full mesh and ring topologies. The implementation of NC in this work uses the same algorithms of routing and path allocation algorithms used in the conventional approach, making the application for an existing network a matter of a small incremental addition, because using a simple XOR operation is much easier compared to highly complex existing techniques such as forward error correction. An interesting direction of further study, however, would be to analyze the additional efficiency gained against the higher complexity incurred by using much higher-order network coding techniques. The impact of centralized control and management using SDN, as opposed to the distributed control, and the contrast between them regarding the power consumption at different types of codes is also a future direction with significant value.

Acknowledgment

The authors would like to acknowledge funding from the Engineering and Physical Sciences Research Council (EPSRC), INTERNET (EP/H040536/1), and STAR (EP/K016873/1). All data is provided in full in the results section of this paper.

References

1. R. Ahlswede, C. Ning, S. Y. R. Li, and R. W. Yeung, “Network information flow,” IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204–1216, 2000. [CrossRef]  

2. A. E. Kamal and M. Mohandespour, “Network coding-based protection,” Opt. Switching Netw., vol. 11, pp. 189–201, 2014. [CrossRef]  

3. P. Babarczi, G. Biczok, H. Øverby, J. Tapolcai, and P. Soproni, “Realization strategies of dedicated path protection: a bandwidth cost perspective,” Comput. Netw., vol. 57, no. 9, pp. 1974–1990, 2013. [CrossRef]  

4. H. Overby, G. Biczok, P. Babarczi, and J. Tapolcai, “Cost comparison of 1 + 1 path protection schemes: a case for coding,” in IEEE Int. Conf. on Communications (ICC), IEEE, 2012.

5. M. Musa, T. E. El-Gorashi, and J. M. Elmirghani, “Energy efficient core networks using network coding,” in 17th Int. Conf. on Transparent Optical Networks (ICTON), IEEE, 2015, p. 14.

6. M. Musa, T. E. El-Gorashi, and J. M. Elmirghani, “Network coding for energy efficiency in bypass IP/WDM networks,” in 18th Int. Conf. on Transparent Optical Networks (ICTON), IEEE, 2016.

7. A. E. Kamal and O. Al-Kofahi, “Efficient and agile 1 + n protection,” IEEE Trans. Commun., vol. 59, no. 1, pp. 169–180, 2011. [CrossRef]  

8. A. E. Kamal, “Network protection for mesh networks: network coding based protection using p-cycles,” IEEE/ACM Trans. Netw., vol. 18, no. 1, pp. 67–80, 2010. [CrossRef]  

9. S. A. Aly and A. E. Kamal, “Network protection codes against link failures using network coding,” in IEEE Global Telecommunications Conf., IEEE, 2008, pp. 1–6.

10. S. A. Aly and A. E. Kamal, “Network coding-based protection strategy against node failures,” in IEEE Int. Conf. on Communications (ICC), IEEE, 2009, pp. 1–5.

11. I. B. Barla, F. Rambach, D. A. Schupke, and M. Thakur, “Network coding for protection against multiple link failures in multi-domain networks,” in IEEE Int. Conf. on Communications (ICC), IEEE, 2010, pp. 1–6

12. A. Muktadir, A. A. Jose, and E. Oki, “An optimum mathematical programming model for network-coding based routing with 1 + 1 path protection,” in World Telecommunications Congress (WTC), IEEE, 2012, pp. 1–5.

13. GreenTouch, “Reducing the Net Energy Consumption in Communications Networks by up to 98% by 2020,” [Online]. Available: https://s3-us-west-2.amazonaws.com/belllabs-microsite-greentouch/uploads/documents/GreenTouch_Green_Meter_Final_Results_18_June_2015.pdf.

14. F. Idzikowski, L. Chiaraviglio, A. Cianfrani, J. L. Vizcano, M. Polverini, and Y. Ye, “A survey on energy-aware design and operation of core networks,” Commun. Surveys Tuts., vol. 18, no. 2, pp. 1453–1499, 2016. [CrossRef]  

15. M. N. Dharmaweera, R. Parthiban, and Y. A. Sekercioglu, “Toward a power-efficient backbone network: the state of research,” Commun. Surv. Tutorials, vol. 17, no. 1, pp. 198–227, 2015. [CrossRef]  

16. X. Dong, T. El-Gorashi, and J. M. Elmirghani, “IP over WDM networks employing renewable energy sources,” J. Lightwave Technol., vol. 29, no. 1, pp. 3–14, 2011. [CrossRef]  

17. X. Dong, T. El-Gorashi, and J. M. H. Elmirghani, “Green IP over WDM networks with data centers,” J. Lightwave Technol., vol. 29, no. 12, pp. 1861–1880, June 2011. [CrossRef]  

18. X. Dong, T. E. H. El-Gorashi, and J. M. H. Elmirghani, “On the energy efficiency of physical topology design for IP over WDM networks,” J. Lightwave Technol., vol. 30, no. 12, pp. 1931–1936, 2012. [CrossRef]  

19. A. Lawey, T. El-Gorashi, and J. Elmirghani, “Distributed energy efficient clouds over core networks,” J. Lightwave Technol., vol. 32, no. 7, pp. 1261–1281, Apr. 2014. [CrossRef]  

20. N. Osman, T. El-Gorashi, L. Krug, and J. Elmirghani, “Energy-efficient future high-definition TV,” J. Lightwave Technol., vol. 32, no. 13, pp. 2364–2381, July 2014. [CrossRef]  

21. A. Lawey, T. El-Gorashi, and J. Elmirghani, “BitTorrent content distribution in optical networks,” J. Lightwave Technol., vol. 32, no. 21, pp. 4209–4225, Nov. 2014. [CrossRef]  

22. L. Nonde, T. El-Gorashi, and J. Elmirghani, “Energy efficient virtual network embedding for cloud networks,” J. Lightwave Technol., vol. 33, no. 9, pp. 1828–1849, May 2015. [CrossRef]  

23. M. Musa, T. El-Gorashi, and J. Elmirghani, “Energy efficient routing and network coding assignment in core networks,” J. Lightwave Technol. (to be published).

24. M. Musa, T. Elgorashi, and J. Elmirghani, “Energy efficient survivable IP-over-WDM networks with network coding,” J. Opt. Commun. Netw., vol. 9, no. 3, pp. 207–217, 2017. [CrossRef]  

25. A. S. Thyagaturu, A. Mercian, M. P. McGarry, M. Reisslein, and W. Kellerer, “Software defined optical networks (SDONs): a comprehensive survey,” Commun. Surv. Tutorials, vol. 18, no. 4, pp. 2738–2786, 2016. [CrossRef]  

26. A. Capone, C. Cascone, A. Q. T. Nguyen, and B. Sanso, “Detour planning for fast and reliable failure recovery in SDN with OpenState,” in 11th Int. Conf. on the Design of Reliable Communication Networks (DRCN), IEEE, 2015.

Mohamed Musa received a B.Sc. degree (first-class honors) in electrical and electronic engineering from the University of Khartoum, Sudan, in 2009, and a M.Sc. degree (with distinction) in broadband wireless and optical communication from University of Leeds, U.K., in 2011. He received a Ph.D. from the University of Leeds in 2016 in energy-efficient network coding in optical networks. His current research interests include energy optimization of ICT networks, network coding, and energy efficient routing protocols in optical networks.

Dr. Taisir Elgorashi received a B.S. degree (first-class honors) in electrical and electronic engineering from the University of Khartoum, Sudan, in 2004, an M.Sc. degree (with distinction) in photonic and communication systems from the University of Wales, Swansea, UK, in 2005, and a Ph.D. degree in optical networking from the University of Leeds, Leeds, U.K., in 2010. She is currently a lecturer of optical networks in the School of Electrical and Electronic Engineering, University of Leeds. Previously, she held a postdoctoral research post at the University of Leeds (2010–2014), where she focused on the energy efficiency of optical networks, investigating the use of renewable energy in core networks, green IP over WDM networks with data centers, energy-efficient physical topology design, energy efficiency of content distribution networks, distributed cloud computing, network virtualization, and big data. In 2012, she was a BT Research Fellow, where she developed an energy efficient hybrid wireless–optical broadband access network and explored the dynamics of TV viewing behavior and program popularity. The energy efficiency techniques developed during her postdoctoral research contributed three out of the eight carefully chosen core network energy efficiency improvement measures recommended by the GreenTouch Consortium for every network operator worldwide. Her work led to several invited talks at GreenTouch, Bell Labs, the Optical Network Design and Modeling conference, the Optical Fiber Communications Conference, the International Conference on Computer Communications, and the EU Future Internet Assembly in 2013, in addition to collaboration with Alcatel Lucent and Huawei.

Prof. Jaafar Elmirghani is the director of the Institute of Integrated Information Systems within the School of Electronic and Electrical Engineering, University of Leeds, U.K. He joined Leeds in 2007 and prior to that (2000–2007) was chair in Optical Communications at the University of Wales, Swansea. He founded, developed, and directed the Institute of Advanced Telecommunications and the Technium Digital (TD), a technology incubator/spin-off hub. He has provided leadership in a number of large research projects at the IAT and TD. He received a B.Sc. in Electrical Engineering (first-class honors) from the University of Khartoum, Sudan, in 1989 and was awarded all four prizes in the department for academic distinction. He received a Ph.D. in the synchronization of optical systems and optical receiver design from the University of Huddersfield, U.K., in 1994 and a DSc in communication systems and networks from the University of Leeds, U.K., in 2014. He has co-authored, “Photonic Switching Technology: Systems and Networks,” (Wiley) and has published more than 450 papers. He has research interests in optical systems and networks. He is a fellow of the IET, a chartered engineer, a fellow of the Institute of Physics, and a senior member of IEEE. He was chairman of IEEE’s Comsoc Transmission Access and Optical Systems technical committee and was chairman of IEEE Comsoc Signal Processing and Communications Electronics technical committee, and an editor of IEEE Communications Magazine. He was founding chair of the Advanced Signal Processing for Communication Symposium, which started at IEEE GLOBECOM99, and has continued since at every ICC and GLOBECOM. He was also founding chair of the first IEEE ICC/GLOBECOM optical symposium at GLOBECOM00, the Future Photonic Network Technologies, Architectures, and Protocols Symposium. He chaired this symposium, which continues to date under different names. He was the founding chair of the first Green Track at ICC/GLOBECOM at GLOBECOM 2011, and also is chair of the IEEE Green ICT initiative within the IEEE Technical Activities Board (TAB) Future Directions Committee (FDC), a pan-IEEE Societies initiative responsible for Green ICT activities across IEEE (2012–present). He has been, and continues to be, on the technical program committee of 34 IEEE ICC/GLOBECOM conferences between 1995 and 2016, including 15 times as symposium chair. He has given more than 55 invited and keynote talks in the past eight years. He has received many awards in the past few years, including the IEEE Communications Society Hal Sobol award; the IEEE Comsoc Chapter Achievement award for excellence in chapter activities (both in international competition in 2005); the University of Wales, Swansea, Outstanding Research Achievement Award, 2006. In international competition, he has also received several awards, including the IEEE Communications Society Signal Processing and Communication Electronics Outstanding Service Award (2009) and a best paper award at IEEE ICC2013. Related to green communications, he received: (i) the IEEE Comsoc Transmission Access and Optical Systems outstanding Service award 2015 in recognition of “Leadership and Contributions to the Area of Green Communications”; (ii) the GreenTouch 1000x award in 2015 for “pioneering research contributions to the field of energy efficiency in telecommunications”; (iii) the IET 2016 Premium Award for best paper in IET Optoelectronics; and (iv) shared the 2016 Edison Award in the collective disruption category with a six-member team from GreenTouch for their joint work on the GreenMeter. He is currently an editor for IET Optoelectronics and the Journal of Optical Communications and was an editor for IEEE Communications Surveys and Tutorials, and the IEEE Journal on Selected Areas in Communications series on Green Communications and Networking. He was co-chair of the GreenTouch Wired, Core, and Access Networks Working Group; an adviser to the Commonwealth Scholarship Commission; a member of the Royal Society International Joint Projects Panel; and a member of the Engineering and Physical Sciences Research Council (EPSRC) College. He has been awarded more than £22 million in grants to date from the EPSRC, the European Union, and industry organizations, and has held prestigious fellowships funded by the Royal Society and by BT. He is an IEEE Comsoc Distinguished Lecturer (2013–2016).

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (8)

Fig. 1.
Fig. 1. Example of using network coding for protection.
Fig. 2.
Fig. 2. Weighted encodable graph for a full mesh of size 4, 5, and 6, respectively.
Fig. 3.
Fig. 3. Power consumption of the five-node full mesh topology with equal demands using the MILP, heuristic, and analytical bound.
Fig. 4.
Fig. 4. Power savings of the full mesh topology under different network sizes.
Fig. 5.
Fig. 5. Encoding pairs for two rings with different odd numbers of nodes.
Fig. 6.
Fig. 6. Encoding pairs for two rings with different even numbers of nodes.
Fig. 7.
Fig. 7. Power consumption of the five-node ring topology with equal demands using the MILP, heuristic, and analytical bound.
Fig. 8.
Fig. 8. Power savings of the ring topology under different network sizes.

Equations (70)

Equations on this page are rendered with MathJax. Learn more.

P=(pp+ptB)dDm,nVd(xmnd+ymnd)(pp+ptB)d1,d2m,nmin(Vd1,Vd2)βmnd1d22,
P1=(pp+ptB)(dDm,nVd(xmnd+ymnd)),
P2=(pp+ptB)(d1,d2m,nmin(Vd1,Vd2)βmnd1d22).
P1=(pp+ptB)(dDVdm,n(xmnd+ymnd)).
m,n(xmnd+ymnd)2hmind.
P1(pp+ptB)(dD2Vdhmind).
P1(pp+ptB)hmin(dD2Vd),
P12(pp+ptB)N(N1)Vhmin.
P02(pp+ptB)N(N1)Vhmin.
min(Vd1,Vd2)Vd1+Vd22.
P2(pp+ptB)(d1,d2m,nVd1+Vd22βmnd1d22).
P2pp+pt2B(d1,d2m,nVd1,d2βmnd1d2).
P2pp+pt2B(d1,d2Vd1,d2m,nβmnd1d2).
hd2d1=m,nβmnd1d2.
P2pp+pt2B(d1,d2Vd1,d2hd2d1).
P(pp+ptB)(2dDVdhmind12d1,d2Vd1,d2hd2d1).
P(pp+ptB)dDVd(2hmind12d2hd2d).
d2Dbd2d11.
P(pp+ptB)(dDVd(2hmindh^d2)),
P2(pp+ptB)(dDVd(hmindh^d4)).
h˜d=hmindh^d4,
P2(pp+ptB)(dDVdh˜d).
1nk=1nakbk(1nk=1nak)(1nk=1nbk),
P2(pp+ptB)(1N(N1)dDVddDh˜d),
P2(pp+ptB)VdDh˜d,
P2(pp+ptB)N(N1)Vh˜.
P0=(pp+ptB)(dDm,nVd(xmnd+ymnd)).
P0=(pp+ptB)(dD3Vd),
P0=3(pp+ptB)VN(N1).
P=P0(pp+ptB)d1,d2m,nmin(Vd1,Vd2)βmnd1d22,
P=Po(pp+ptB)V2d1,d2m,nβmnd1d2,
P=Po(pp+ptB)V2d1,d2m,nβmnd1d2.
d1,d2m,nβmnd1d2=N(N1).
P=(pp+ptB)N(N1)5V2.
ϕodd=1(pp+ptB)N(N1)5V23(pp+ptB)VN(N1)=0.166,
d1,d2m,nβmnd1d2=N(N2).
P=3(pp+ptB)VN(N1)(pp+ptB)VN(N2)2,
P=(pp+ptB)VN(5N42).
ϕeven=1(pp+ptB)VN(5N42)3(pp+ptB)VN(N1),
ϕeven=N26(N1).
ε(N)=16N26(N1)=16(N1),
limNε(N)=limN16(N1)=0.
P0=(pp+ptB)(dDm,nVd(xmnd+ymnd)).
hw=dDm,nxmnd=2N(1+2++(N12))=(N1)N(N+1)4.
hp=dDm,nymnd=2N(N1+N2++NN12)=N(N1)(3N14),
dDm,n(xmnd+ymnd)=(N1)N(N+1)4+N(N1)(3N14)=N3N2.
hw=dDm,nxmnd=2N(1+2++(N22))+NN2=N34.
hp=dDm,nymnd=2N(N1+N2++NN22)+NN2,
hp=2N(N(N22)12N22)+N22=N2(3N4)4,
dDm,n(xmnd+ymnd)=N34+N2(3N4)4=N3N2.
ht(odd1)=2N[(N2)+(N4)++(NN32)].
ht(odd1)=2N[N(N34)24N32],
ht(odd1)=2N[N(N34)2k=1N34k]=N(N3)(3N1)8.
ϕodd1=N(N3)(3N1)8(N3N2),
limNϕodd1=limNN(N3)(3N1)8(N3N2)=38=37.5%.
ht(odd2)=2N[(N2)+(N4)++(NN12)],
ht(odd2)=2N[NN1424N12],
ht(odd2)=2N[NN142k=1N14k]=38N(N1)2.
ϕodd2=38N(N1)2N3N2,
limnϕodd2=limn38N(N1)2N3N2=38=37.5%.
ht(even1)=N(2[NN4424N42]+N2).
ht(even1)=N(2[NN442k=1N44k]+N2),
ht(even1)=N22[1+3(N4)4].
ϕeven1=12N2(3N42)N3N2;
limNϕeven1=limN12N2(3N42)N3N2=38=37.5%.
ht(even2)=N(2[NN2424N22]),
ht(even2)=N(2[NN242k=1N24k]),
ht(even2)=N(N2)(3N2)8.
ϕeven2=18N(N2)(3N2)N3N2,
limNϕeven2=limN18N(N2)(3N2)N3N2=38=37.5%.
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.