Traffic-partitioning approaches to grooming ring access networks

13
Traffic-partitioning approaches to grooming ring access networks Koundinya Srinivasarao and Rudra Dutta LVL7 Systems, Inc., Morrisville, North Carolina, and Computer Science Department, North Carolina State University, Raleigh, North Carolina [email protected]; [email protected] RECEIVED 15 J UNE 2005; REVISED 7J ULY 2005; ACCEPTED 14 J ULY 2005; PUBLISHED 29 AUGUST 2005 As networks have evolved in sophistication, the twin concerns of quality-of- service (QoS) and efficiency have propagated down the hierarchical levels of networking and are now considered important in access networks as well. Motivated by these two concerns, researchers have recognized traffic grooming as an increasingly important area in optical networking in recent years. Very recently, a min–max approach to network cost optimization has emerged as a new focus area. In this approach, the maximum electronic-switching capability at any network node is sought to be minimized. In this paper, we propose heuristics for traffic grooming with this objective in ring networks, which are of practical importance, especially in access network architectures. We advance two approaches, both based on the concept of partitioning the traffic matrix, but in different ways. The approaches are of complementary strength, being useful for different traffic patterns. We present numerical results validating the performance of the algorithms. © 2005 Optical Society of America OCIS codes: 060.4250, 060.4510. 1. Introduction 1.A. General Context Optical networks are widely expected to form a complete networking infrastructure in the future, providing the technology of choice at all levels of network hierarchy, from the back- bone level down to the access network level. Though earliest deployments of optical net- works were in backbone networks, subsequently they have also pervaded metro and local area networks. Fiber-to-the-curb/building/home (FTTx) deployments have already intro- duced optical fiber communication at the lowest level of the planetary network hierarchy. The current planetary networking architecture is based on slotted (reserved) time- division multiplexing (TDM) at higher levels of the hierarchy, where QoS concerns have been generally seen to reside. As networks and networking applications evolve in sophisti- cation, the twin concerns of QoS and efficiency are considered important in access networks as well, and slotted TDM architecture provides a possible alternative architecture at the ac- cess levels also. In such an architecture, the network designer is faced with a matrix of estimated or projected traffic demand components. Further, optical networking techniques such as wavelength-division multiplexing (WDM) and wavelength switching will be soon deployed in access networks. Switching wavelength channels by optical cross connects (OXCs) creates lightpaths that span multiple fiber links. The set of such lightpaths formed is called a virtual topology. The field of virtual topology research is a quite mature one; for a survey of research and comprehensive overview of the topic, see our previous work [1]. The goal of virtual topology design is usually to optimize some network performance metric such as aggregate delay or wavelength capacity utilization. © 2005 Optical Society of America JON 7832 September 2005 / Vol. 4, No. 9 / JOURNAL OF OPTICAL NETWORKING 602

Transcript of Traffic-partitioning approaches to grooming ring access networks

Page 1: Traffic-partitioning approaches to grooming ring access networks

Traffic-partitioning approaches to groomingring access networks

Koundinya Srinivasarao and Rudra Dutta

LVL7 Systems, Inc., Morrisville, North Carolina,and Computer Science Department, North Carolina State University, Raleigh, North Carolina

[email protected]; [email protected]

RECEIVED 15 JUNE 2005; REVISED 7 JULY 2005;ACCEPTED 14 JULY 2005; PUBLISHED 29 AUGUST 2005

As networks have evolved in sophistication, the twin concerns of quality-of-service (QoS) and efficiency have propagated down the hierarchical levelsof networking and are now considered important in access networks as well.Motivated by these two concerns, researchers have recognized traffic groomingas an increasingly important area in optical networking in recent years. Veryrecently, a min–max approach to network cost optimization has emerged as anew focus area. In this approach, the maximum electronic-switching capabilityat any network node is sought to be minimized. In this paper, we proposeheuristics for traffic grooming with this objective in ring networks, which areof practical importance, especially in access network architectures. We advancetwo approaches, both based on the concept of partitioning the traffic matrix,but in different ways. The approaches are of complementary strength, beinguseful for different traffic patterns. We present numerical results validating theperformance of the algorithms. © 2005 Optical Society of America

OCIS codes: 060.4250, 060.4510.

1. Introduction

1.A. General Context

Optical networks are widely expected to form a complete networking infrastructure in thefuture, providing the technology of choice at all levels of network hierarchy, from the back-bone level down to the access network level. Though earliest deployments of optical net-works were in backbone networks, subsequently they have also pervaded metro and localarea networks. Fiber-to-the-curb/building/home (FTTx) deployments have already intro-duced optical fiber communication at the lowest level of the planetary network hierarchy.

The current planetary networking architecture is based on slotted (reserved) time-division multiplexing (TDM) at higher levels of the hierarchy, where QoS concerns havebeen generally seen to reside. As networks and networking applications evolve in sophisti-cation, the twin concerns of QoS and efficiency are considered important in access networksas well, and slotted TDM architecture provides a possible alternative architecture at the ac-cess levels also. In such an architecture, the network designer is faced with a matrix ofestimated or projected traffic demand components. Further, optical networking techniquessuch as wavelength-division multiplexing (WDM) and wavelength switching will be soondeployed in access networks. Switching wavelength channels by optical cross connects(OXCs) creates lightpaths that span multiple fiber links. The set of such lightpaths formedis called a virtual topology. The field of virtual topology research is a quite mature one;for a survey of research and comprehensive overview of the topic, see our previous work[1]. The goal of virtual topology design is usually to optimize some network performancemetric such as aggregate delay or wavelength capacity utilization.

© 2005 Optical Society of AmericaJON 7832 September 2005 / Vol. 4, No. 9 / JOURNAL OF OPTICAL NETWORKING 602

Page 2: Traffic-partitioning approaches to grooming ring access networks

Recently the problem of topology design under subwavelength traffic has received in-creasing attention. When traffic-demand components between individual source and des-tination nodes are only a fraction of the bandwidth of a lightpath, as is likely in accessnetworks, at intermediate nodes the optical signals have to be terminated into the all-electronic digital cross connects (DXCs) for electronic switching/routing, which are expen-sive. The design of strategies to carry subwavelength traffic components, integrated withvirtual topology design, to minimize the requirement for such opto–electro–optic (OEO)conversion in the network has become known as traffic grooming. Current literature hasbeen reviewed in surveys such as in Refs. [2, 3]. Both aggregate (total for all nodes) andmin–max (maximum at any node) metrics for the OEO cost have been considered in theliterature. The latter is appealing from the point of view of operation and management(OAM), because it is likely that all nodes will be equipped with similar OEO equipment;this is especially likely to be true in access networks. Thus some recent studies [4] havefocused on the minimization of the maximum amount of OEO capability any node in thenetwork needs.

In this paper, we address this design problem in networks with the physical topology ofa ring. The ring topology has been one of outstanding importance in optical networks for along time, because of its simplicity, manageability, good fault tolerance characteristics, etc.Recent trends in the industry such as Lucent’s “Ring of rings” and Nortel’s “Tree of rings”show that the ring topology retains its importance both in itself and as a building block oflarger networks. This is especially important in access networks, where simple topologiessuch as stars, tress, or rings continue to be useful in themselves.

1.B. Our Contribution

We advance the concept of “traffic partitioning” as a means for designing heuristic algo-rithms for the min–max grooming problem in this paper. This is basically a decompositionapproach. Instead of viewing the problem as a single large problem and incurring combina-torial explosion, we decompose the traffic matrix into several matrices. The decompositionapproaches are designed such that good solutions to the individual parts are easy to obtain,which can then be put together to obtain a solution to the complete problem.

We propose two different methods of traffic partitioning, which we call “node grouping”and “traffic slicing.” In the first approach, we partition the nodes of the ring into differentgroups, and use this grouping to partition the traffic into intergroup and intragroup trafficmatrices. In the second approach, we form k traffic matrices by dividing each traffic com-ponent into k equal or nearly equal parts; thus the resulting matrices are very similar andare like k “slices” of the original traffic matrix. Of our two approaches, the latter is compu-tationally costlier, and in general performs better. However, we show that for an importantfamily of traffic matrices, the former approach can obtain very good results. We comparethe performance of both approaches by comparison with optimal results.

Our work bears similarity with some others in the literature [5–9] but is novel in thatit can be viewed as a generalization of these decomposition approaches, and it is beingpresented in a different context with an objective very different from those addressed bythese works. In Ref. [7], each wavelength is dropped by a given set of nodes, which reducesthe problem to one of determining how the nodes should be grouped and what wavelengthsthey should be assigned. In Ref. [10] only a uniform traffic matrix is considered. In Ref.[9], the concept of ”super-node” is introduced, which is a collection of several nodes chosensuch that traffic between super-nodes is as close as possible to the bandwidth of a singlelightpath, but only contiguous nodes may be grouped, which is not always optimal. Theseprevious works may be viewed as special cases of the first decomposition approach wehave proposed, node grouping. None of these studies examine the min–max objective.

The grooming problem studied in Refs. [6, 8] is to reduce the total network cost by

© 2005 Optical Society of AmericaJON 7832 September 2005 / Vol. 4, No. 9 / JOURNAL OF OPTICAL NETWORKING 603

Page 3: Traffic-partitioning approaches to grooming ring access networks

reducing the number of line-terminating equipment (LTE) used. Both works use the conceptof circles, which are nonoverlapping connections that are grouped together, and then groomseveral of these circles together onto a given set of nodes while attempting to reduce thenumber of synchronous optical network ADD–DROP multiplexers (SONET ADMs) used.These approaches can be viewed as special cases of our second decomposition approach,traffic slicing. However, our work is different from those previous works in the objectivewe consider as well as the actual technique used. Further, those studies address wavelengthassignment independently of grooming, whereas our approach is to trivialize wavelengthassignment by transforming the ring into a path instance.

The rest of the paper is organized as follows. In Section 2 we precisely define theproblem. Sections 3, 4 present the two approaches in detail. Section 5 presents numericalresults.

2. Problem Definition

2.A. Network Model

An instance of the traffic-grooming problem is given by the number of nodes N in the phys-ical topology ring R, a traffic matrix T =

[t(sd)

], the wavelengths limit W on each fiber

link, and the bandwidth C of each wavelength channel. t(sd) represents the traffic demandfrom node s to node d. C and t(sd) are expressed as integer multiples of some base rate.We assume working traffic flows in only one direction around the ring, a common situa-tion because of protection requirements; however, our methods can be easily extended tobidirectional rings. The nodes and links of the nodes are numbered from 0 to N −1 in thedirection of traffic flow; the link from node i to node i + 1 modulo N is numbered i. Eachnode in the ring is equipped with a wavelength ADD–DROP multiplexer (WADM) (the ringanalog of the OXC), which can pass each wavelength through optically to form a lightpathpassing through the node, or ADD–DROP it from/to a DXC. Conceptually, a feasible so-lution to the grooming problem is composed of the following components: (i) the virtualtopology to be implemented, with wavelength assignment for each lightpath in the virtualtopology (routing of lightpaths is trivial in the ring), and (ii) routing of traffic componentst(sd) on the lightpaths. The “nodal degree” of a node is the larger of the number of light-paths either originating at or terminating at that node, and is a measure of the “opacity”of the node (how much traffic it transfers from the optic to the electronic domain). Theobjective is to obtain a feasible solution that minimizes the maximum nodal degree in thevirtual topology. This problem (and the simpler unidirectional path network problem) canbe formulated as an integer linear program (ILP). We provided such a formulation in Ref.[4], which also shows that both the ring and the path problems are NP-complete problems.

2.B. Traffic Model

Since our approaches are based on partitioning the traffic matrix, we must be especiallycareful to understand the different possible patterns of traffic and articulate the applicabilityof our approaches to these. For the purpose of this study we categorize traffic matrices asfollows:

Completely Decomposable/Nearly Completely Decomposable. The concept of com-pletely decomposable/nearly completely decomposable traffic matrices is adapted from asimilar definition of nearly completely decomposable Markov Chains [12, pp. 285 ff.]. Atraffic matrix T is considered to be completely decomposable (CD) if the nodes can be par-titioned such that the partition of T can be expressed in the block form where the elementsof the off-diagonal blocks are all zero and not all the elements in each of the diagonal blockare zero. In other words, nodes of one part have no traffic to nodes in any other part. Nearly

© 2005 Optical Society of AmericaJON 7832 September 2005 / Vol. 4, No. 9 / JOURNAL OF OPTICAL NETWORKING 604

Page 4: Traffic-partitioning approaches to grooming ring access networks

completely decomposable (NCD) traffic matrices are similar to CD matrices with the dif-ference being that the off-diagonal blocks are nearly zero but may contain a little traffic. Inpractice NCD traffic matrices are much more likely than the ideal CD case, and we shallonly speak of NCD matrices from now on. This reflects the situation, common in realisticnetworks, that some groups of nodes are logically related due to circumstances such asapplication logic, geographical positioning, routing policies, etc., and have a large amountof traffic within such groups. It should be noted that such a group is not constrained toconsist of nodes that are close to each other in the ring. For example, consider a metro ringin which there are three nodes, which represent the network access of three hospitals, andtwo other nodes for two satellite medical facilities. These nodes are not next to each otheron the ring; their position is determined by geographical locations. It is very likely thatthese five nodes will have a high volume of traffic among them to exchange patient records,medical imagery, video conferencing, and so on. However, there may be many other nodessuch as public libraries or schools on the ring with which these nodes will interchange verylittle traffic. Nevertheless, there is still likely to be a small volume of traffic; for example, ahospital might host a public website to allow patients to make appointments.

Strictly/Statistically Source-wise Uniform. A traffic matrix T is considered to bestrictly source-wise uniform if all the pattern of traffic originating at a source node anddestined to all other nodes is the same for each source. We can distinguish between con-stant, falling, and rising source-wise uniform traffic patterns. In the first type, the trafficfrom a given source is the same to all other nodes, whereas they decrease (respectively,increase) for destination nodes proportionally with increasing distance along the ring fromthe source node for the falling (respectively, rising) types. All three types result in uniformloading of the links in a unidirectional ring network (because the traffic pattern locallyobserved by any link is the same). Realistically, we allow some statistical variation in thedifferent matrix rows, rather than requiring them to be exactly equal.

Random Traffic. We represent traffic that cannot be considered either localized orsource-wise uniform as being random. We characterize such matrices using two param-eters: the mean of all the traffic components and the standard deviation of the traffic com-ponents from the mean. Including this family in our studies gives us the confidence that ourapproaches will have wide applicability in practice.

3. Node Grouping

This approach is based on a simple idea motivated by the CD/NCD traffic patterns: ifgroups of nodes exist that have a high amount of traffic to each other, but there is compara-tively less traffic between nodes belonging to different such groups, then the nodal degreescan be reduced considerably simply by dedicating distinct wavelengths to groups and hav-ing nodes of a group optically pass through wavelengths that “belong” to other groups. Thisapproach has a very attractive simplicity from the OAM viewpoint, and in practice we findthat it has a large beneficial effect on grooming.

The solution proposed involves partitioning the set of nodes 0,1 . . . N−1 into n subsets(groups) G1,G2 . . . Gn. For a given partition, we define the following types of traffic:

Group-local traffic of Gi: All the traffic originating from and destined to nodes in Gi.Group-external traffic of Gi: All traffic that either originates from but does not termi-

nate in Gi, or terminates but does not originate in Gi.Intergroup traffic: All traffic between nodes belonging to different groups. This is the

entire traffic other than group-local traffic of each group.Every node terminates two sets of wavelengths: (i) the set of wavelengths required to

carry the group’s group-local traffic, and (ii) the set of wavelengths required to carry all theintergroup traffic. The node passes all other wavelengths optically. Note that the lightpaths

© 2005 Optical Society of AmericaJON 7832 September 2005 / Vol. 4, No. 9 / JOURNAL OF OPTICAL NETWORKING 605

Page 5: Traffic-partitioning approaches to grooming ring access networks

formed by this approach will always have a valid coloring, as long as the total number oflightpaths traversing each link is within the wavelength limit.

Given a partition P = {G1,G2 . . . Gn} and the traffic matrix T , we define a set of matri-ces {H1,H2 . . . Hn} where each Hi represents the group-local traffic of group i. The rowsand columns representing nodes of Hi are ordered such that they appear in the same orderas in the original ring. Hi is a square submatrix constructed by the setting of element H(pq)

iequal to t(sd) from the original traffic matrix T such that the nodes s and d in the ring arethe pth and the qth node in Gi, respectively.

In looking at the group-local traffic of Gi, we can consider successive nodes of the groupto be connected in a ring by logical links, because intervening nodes (of some other group)will pass the group-local traffic through optically. A logical link comprises a sequence ofone or more consecutive physical links. Logical link l of group i is assumed to connectthe lth node of the group to the [(l +1) mod | Gi |] th node of the group. The amount ofgroup-local traffic of Gi flowing through Gi’s logical link j is denoted by l( j)

i , given by

l( j)i =

|Gi|

∑k=2

k−1

∑l=1

H(( j+k) mod |Gi|,( j+l) mod |Gi|)i . (1)

The amount of group-local traffic determines the number of group-local wavelengths Wirequired for supporting the traffic:

Wi =|Gi|−1maxj=0

⌈l( j)iC

⌉. (2)

C is the capacity of a single wavelength as defined earlier.The amount of intergroup traffic flowing through the physical link j is denoted by l( j)

0 :

l( j)0 =

N

∑k=2

k−1

∑l=1

f [( j + k) mod N,( j + l) mod N] , (3)

where f (p,q) is 0 if p,q are in the same group, t(pq) otherwise. The intergroup trafficdetermines the number of intergroup wavelengths W0, given by

W0 =N−1maxj=0

⌈l( j)0C

⌉. (4)

Finally, the maximum nodal degree obtained by P:

∆P = W0 +n

maxi=1

(Wi) . (5)

The solution is feasible if W0 + ∑ni=1 (Wi) ≤ W . Figures 1(a)–1(d) show the solution ob-

tained for an example in which N = 10, n = 2, C = 16, group-local traffic is 80 for eachgroup, and the intergroup traffic is 170.

We define the “critical group” of a partition P as that group which has the highest Wi.Similarly, the “group-local critical link” of a group Gi is defined as the link which hasthe highest l( j)

i and the “intergroup critical link” of P is defined as the link which has thehighest l( j)

0 .

© 2005 Optical Society of AmericaJON 7832 September 2005 / Vol. 4, No. 9 / JOURNAL OF OPTICAL NETWORKING 606

Page 6: Traffic-partitioning approaches to grooming ring access networks

90

1

2

3

4

5

7

8

6

5 lightpaths= 8016

(a) Group-local topology of G1

6

90

1

2

3

4

5

7

8

5 lightpaths= 8016

(b) Group-local topology of G2

6

90

1

2

3

4

5

7

8

11 lightpaths= 17016

(c) Topology for Inter-group Traffic

90

1

2

3

4

5

7

8

66

90

1

2

3

4

5

7

8

6

90

1

2

3

4

5

7

8

(d) Complete Virtual Topol-ogy

Fig. 1. Node grouping example.

3.A. NCD Traffic Matrices

The concept of node grouping has been tailored to the NCD traffic matrices, and we expectthis approach to perform well here. Surprisingly, this cannot be shown as a strong theoret-ical result. Consider the intuitively “best” decomposition P0 of a CD traffic matrix, whichis the one that results in no intergroup traffic. Call another partition P a k-elemental mi-gration of P0 if P can be obtained by making k moves starting from P0, where every movecorresponds to changing the group membership of a single ring node. We have shown thatno 1-elemental migration of P0 can yield a better (lower) maximum nodal degree than P0.However, the importance of this result is reduced by the fact that we have been able tofind counterexamples for such a claim for higher values of k. Accordingly, the theoreticalimportance of this result is reduced, and we do not present the proof for the 1-elementalcase here.

Practically, we have found that the grouping based on NCD decomposition always pro-vides very good solutions, and the counterexamples have to be constructed using highlyunequal number of nodes in different groups and are not realistic. Our numerical resultsshow that the node grouping approach performs well in general for NCD traffic. We presentsome such results in Section 5.

In order to practically employ such an algorithm, we must have some method of deter-mining whether a given traffic matrix can be reasonably thought of as NCD, and if so, whatis a good partition to use. In our work, we have adapted the TPABLO algorithm [12], thatprovides both answers. It is based on transforming the traffic matrix into a weighted graphand finding strongly connected subgraphs in it. Interested readers can refer to Ref. [13] fora detailed description and pseudocode.

3.B. Uniform Traffic Matrices

The uniform traffic pattern can be thought of as the other extreme from the NCD trafficpattern. Surprisingly, the node grouping approach performs well for this class of traffic

© 2005 Optical Society of AmericaJON 7832 September 2005 / Vol. 4, No. 9 / JOURNAL OF OPTICAL NETWORKING 607

Page 7: Traffic-partitioning approaches to grooming ring access networks

also, although the NCD approach can no longer be used to obtain the groups. Our approachnow is to partition the nodes into n nearly equal-size groups, with the groups interleavedas far as possible. Consider the amount of traffic flowing over each link, and call it lopaque.What the decomposition does is distribute some of this traffic as group-local traffic acrossseveral groups, as evenly as possible. As a result no node terminates all of the traffic flowinginto it.

We show below that the interleaved grouping is better than contiguous group-ings and is best when exactly two groups are chosen. Consider the two partitionsPint = [(0,n . . . N−n) ,(1,n+1 . . . N−n+1) . . . (n−1,2n−1 . . . N−1)] and Pcont =[(0,1 . . . n−1) ,(n,n+1 . . . 2n−1) . . . (N−n,N−n+1 . . . N−1)].

Theorem 1. Sum of load on the intergroup critical link and load on the group-local criticallink of the critical group is lower forPint compared withPcont for a falling strictly source-wise uniform traffic matrix.

Proof. For both the partitions, the group-local traffic matrix for each group is identical to thegroup-local traffic matrices of other groups of the partition. Hence for both the partitions,each of the groups qualifies to be the critical group. We assume group 1 to be the criticalgroup. Hence let lint

1 , lint0 , lcont

1 , and lcont0 represent the load on the group-local and intergroup

critical link for Pint and Pcont, respectively. Pint results in the same amount of traffic flowingin all the links (logical as well as physical) for both group-local and intergroup traffic;therefore, any and all the links are critical. Let the traffic from any node i to the node(i+ j) mod N (the node j links away) be b + (N− j−2)d, in keeping with the fallingpattern. The amount of group-local and intergroup traffic flowing through any link is givenby

lint1 =

12

(Nn

)(Nn−1

){[b+(n−1)d]+

nd3

(Nn−2

)}, (6)

lint0 = lopaque −nlint

1 . (7)

Pcont results in the logical link(s) at the center becoming the group-local critical link i.e.,for group 1 this would be logical link bN/2nc (and equivalently also the physical link). Theamount of group-local traffic on this link is given by

lcont1 =

12

(N2n

)(N2n

−1)[

2b−d +d3

(Nn−1

)]+

(N2n

)2 [b+d

(5N4n

− 32

)]. (8)

A comparison of Refs. (6), (8) shows lcont1 is greater than lint

1 . Pcont also results in linksn− 1,2n− 1 . . . N − 1 experiencing the least group-local traffic for every group. Theselinks therefore are the intergroup critical link and the intergroup traffic flowing throughthese links is given by

lcont0 = lopaque −nlcont

min , (9)

where lcontmin is the amount of group-local traffic of group 1 flowing through the logical link

n−1 and is given by

lcontmin =

12

Nn

(Nn−1

)[b− d

2+

d6

(2Nn−1

)]. (10)

lcontmin is less than lint

1 , hence lcont0 is greater than lint

0 . Since lcont1 and lcont

0 are greater than lint1

and lint0 , their sum is also greater.

The above also holds trivially for the constant traffic pattern, because it is a special caseof the falling pattern. In fact, for the constant pattern any equal partition of n parts is equallygood; thus Pint and Pcont have the same benefit.

© 2005 Optical Society of AmericaJON 7832 September 2005 / Vol. 4, No. 9 / JOURNAL OF OPTICAL NETWORKING 608

Page 8: Traffic-partitioning approaches to grooming ring access networks

2 3 10 100−1

−0.5

0

0.5

1

1.5

2x 10

5

n, Number of groups

Group−local traffic difference (Contiguous − Interleaved)Inter−group traffic difference (Interleaved − Contiguous)∆

int − ∆

cont

Fig. 2. Group-local and intergroup traffic for Pcont and Pint.

We have observed by numerical substitution that n = 2 is the best case. This can beseen theoretically by an asymptotic argument as follows: We discard the ceiling functionin the computation of the maximum nodal degree; doing so puts ∆P off only by 1 and isinsignificant, asymptotically speaking. Then ∆ ≈ lint

1 + lint0 /C. Letting n vary continuously

we determine d/dn(∆). Setting it to zero, the solution obtained for n converges to 2 frombelow as N becomes larger. Practically, there must be either one or two groups; choosingone group results in the worst case of every node terminating every wavelength. Thereforen = 2is the optimal case.

For strictly source-wise uniform rising traffic, the expressions for lint1 and lint

0 can bederived in a manner identical to that used in finding expressions for these in the fallingtraffic case, but we find that the equivalent of Theorem 1 does not hold. Pint is better thanPcont only when the number of groups in the partitions is equal to 2. For number of groupsgreater than 2, Pcont is better than Pint. However, from a practical point of view, Pint withn = 2 is likely to remain a good choice. Figure 2 shows a plot of the quantities

(lcont1 − lint

1),(

lint0 − lcont

0), and ∆int −∆cont for a varying number of groups. The first curve in the figure

demonstrates that for a given number of groups, the group-local traffic is always greater forPcont than it is for Pint. Similarly, the second curve shows that intergroup traffic is greaterfor Pint than it is for Pcont. The third curve represents the difference in the maximum nodaldegrees of Pint and Pcont for various values of n. This curve is obtained by subtracting thefirst curve from the second curve. The first two curves cross each other between n = 2 andn = 3. Thus for n > 2 the amount of intergroup traffic that Pcont results in is far less thanthe increase in group-local traffic that is due to the partitioning. However, the nature of thecurves shows that it is likely that Pcont will be better than the best case of Pint only for asmall range of n, and possibly not by much.

© 2005 Optical Society of AmericaJON 7832 September 2005 / Vol. 4, No. 9 / JOURNAL OF OPTICAL NETWORKING 609

Page 9: Traffic-partitioning approaches to grooming ring access networks

�����

��

�� ��

� �� �

����

����

�� ����

�� !

"# $%

&'

( () )

***+++,,,---

...//

000111 222333

444555666777

88899

: :: :: :; ;; ;

<<<==+ =

01

2

3

56

7

8

9

4

1

2

3

46

7

8

9

5

001

2

45

6

7

8

9

3

varying degrees of opcaity

Translucent Node with

Opaque nodew.r.t. sliced traffic matrix

Fig. 3. Illustration of traffic matrix slicing

The third curve represents the difference in the maximum nodal degrees of Pint andPcont for various values of n. This curve is obtained by subtracting the first curvefrom the second curve. The first two curves cross each other between n = 2 andn = 3. Thus, for n > 2 the amount of inter-group traffic that Pcont results in is farless than the increase in group-local traffic due to the partitioning. However, thenature of the curves shows that it is likely that Pcont will be better than the bestcase of Pint only for a small range of n, and possibly not by much.

4. Traffic Slicing

For traffic that does not conform to either the NCD or the uniform patterns, amore general method is needed. We advance the idea of slicing the traffic matrixinto nearly equal but lower magnitude multiple matrices. Unlike the node groupingmethod, in this case the problem size does not reduce after decomposition, nor doesan obvious solution to the subproblems exist. We are motivated instead by the factthat path network grooming is considerably easier than ring network grooming,and good heuristics already exist for that problem. We can convert a ring probleminto a path problem by arbitrarily choosing a node and requiring it to OEO routeall traffic (in other words, it is a completely opaque node). Now all traffic thatpasses through that node can be viewed as originating and terminating at thatnode instead, in addition to that node’s actual traffic. This is equivalent to a pathin which the chosen node acts as both the first and the last node. We have advancedsuch a heuristic in [2], and do not repeat the details here. The disadvantage of thatmethod is that once such a solution is converted back to a ring solution, the chosennode will still terminate every wavelength to DXC. Thus from the point of view ofa min-max objective, the very worst solution has been obtained.

This is where the traffic slicing approach comes in. Instead of converting theoriginal ring problem into a path problem, we first obtain several traffic slicedsubproblems, still on the original ring topology. Then we obtain the path-basedsolution to each of these subproblems, choosing a different node as the opaque nodeeach time. Then the solutions can be superimposed to obtain a solution to theoriginal ring. An opaque node in one subsolution will not be an opaque node inanother subsolution. Such a node is referred to as quasi-opaque. Thus the min-maxobjective will be reduced in the final solution.

As the number of slices is increased from 1 (no slicing) to 2 and further, we

9

Fig. 3. Illustration of traffic matrix slicing.

4. Traffic Slicing

For traffic that does not conform to either the NCD or the uniform patterns, a more gen-eral method is needed. We advance the idea of slicing the traffic matrix into nearly equalbut lower-magnitude multiple matrices. Unlike the node grouping method, in this case theproblem size does not reduce after decomposition, nor does an obvious solution to thesubproblems exist. We are motivated instead by the fact that path network grooming isconsiderably easier than ring network grooming, and good heuristics already exist for thatproblem. We can convert a ring problem into a path problem by arbitrarily choosing a nodeand requiring it to OEO route all traffic (in other words, it is a completely opaque node).Now all traffic that passes through that node can be viewed as originating and terminatingat that node instead, in addition to that node’s actual traffic. This is equivalent to a path inwhich the chosen node acts as both the first and the last node. We have advanced such aheuristic in Ref. [4] and do not repeat the details here. The disadvantage of that methodis that once such a solution is converted back to a ring solution, the chosen node will stillterminate every wavelength to DXC. Thus from the point of view of a min–max objective,the very worst solution has been obtained.

This is where the traffic slicing approach comes in. Instead of converting the originalring problem into a path problem, we first obtain several traffic-sliced subproblems, still onthe original ring topology. Then we obtain the path-based solution to each of these subprob-lems, choosing a different node as the opaque node each time. Then the solutions can besuperimposed to obtain a solution to the original ring. Figure 3 illustrates this concept. Anopaque node in one subsolution will not be an opaque node in another subsolution. Sucha node is referred to as quasi-opaque. Thus the min–max objective will be reduced in thefinal solution.

As the number of slices is increased from 1 (no slicing) to 2 and further, we expectthe min–max opacity obtained to go down, according to the above argument. However,beyond a certain number of slices an opposite effect will dominate, and the advantage willbe lost. This is because the nodes that are not quasi-opaque in any of the individual sliceswill show an increase in degree because of the restriction of having an integer degree ineach subsolution; in other words, a node that has a degree d in a no-slicing solution will ingeneral have degrees greater than d/s in an s-slice subsolution, and degree greater than d inthe combined solution. The result is that the maximum nodal degree drops as the number

© 2005 Optical Society of AmericaJON 7832 September 2005 / Vol. 4, No. 9 / JOURNAL OF OPTICAL NETWORKING 610

Page 10: Traffic-partitioning approaches to grooming ring access networks

Algorithm 1 Traffic Grooming to Minimize Opacity by Traffic Slicing1: for num_o f _slices = 2 to 10 do2: Determine num_o f _slices quasi-opaque nodes3: Slice the traffic matrix4: for slice_num = 1 to num_o f _slices do5: Transform the slice (a ring problem instance) into a path instance6: Groom traffic on the transformed path instance using path grooming heuristic7: Combine the path solution with those of other already solved ones and check for feasibility8: end for9: end for

10: Choose grooming solution that results in least opacity

of slices is increased from 2 and then at some point starts increasing again. Numericalexperiments we have carried out clearly indicate such a trend. A practical approach wouldbe to run the algorithm for a small number of slices (our experiments indicate that between2 and 10 is enough) and choosing the best solution. Algorithm 1 gives a description ofthe traffic-slicing algorithm. We also investigated various strategies of placement of quasi-opaque nodes, but our observation was that this did not have much net impact on the results.Accordingly, we do not present such results here.

5. Numerical Results

Traffic matrices conforming to the various classes described were generated randomly forvarious sizes of ring networks, and the performance of the various approaches on theseproblem instances were observed. For smaller networks, optimal solutions were possibleto obtain using the CPLEX software from ILOG, and these results are also compared. Weobtained a large set of results; here we present some representative samples. In some in-stances, three slightly different variants of the path grooming heuristic were used; becausethe performance was not different we do not discuss details. In some cases, a simply obtain-able lower bound was used when the problem instance was too large to obtain the optimalsolution.

To show the benefit of optical switching, we should also consider the performance of thealgorithm with respect to the completely “opaque” strategy of forming only single physical-hop lightpaths (that is, no wavelength routing). It might appear that in this approach, themaximum degree will always be W ; however, this is not true when traffic is light. Saythe traffic is no more than 10% of the capacity of the fiber over any link; then all thetraffic can be accommodated in only 10% of the wavelengths and the rest can simply gounutilized. Then the maximum degree will be only around 0.1W . Thus for fair comparison,we conceive of the “maximally packed” solution as representative of the opaque case asfollows: “Form as many single-hop lightpaths over each physical link of the ring as arerequired to carry the aggregate traffic over that link.”

The numerical results confirm our expectations and show that the heuristics performwell. Figures 4(a)–4(d) show the maximum nodal degree obtained by different approachesas a fraction of the number of available wavelengths. Figure 4(a) shows that for NCD traffic,the TPABLO algorithm in general does as well as the intuitive “best” partition, and some-times does better. As expected, the more computationally expensive traffic-slicing methoddoes well in all cases; however, the simpler node-grouping method sometimes performsbetter for the NCD traffic type, as expected. Figure 4(e) shows the performance of thedifferent approaches as the traffic load increases. As expected, the traffic-slicing methodscales better than the other approaches. Finally, in Fig. 4(f) we show the results of applyingthe node-grouping technique recursively. For source-wise uniform traffic, node groupingyields groups whose traffic submatrices themselves are source-wise uniform. Therefore,

© 2005 Optical Society of AmericaJON 7832 September 2005 / Vol. 4, No. 9 / JOURNAL OF OPTICAL NETWORKING 611

Page 11: Traffic-partitioning approaches to grooming ring access networks

each of the groups can themselves be grouped to further reduce the maximum nodal de-gree. We observe that some benefit is obtained by this approach, but not beyond the firstfew recursions, and the difference between the grouped and sliced solutions predominates.

6. Conclusion

We have proposed a new approach of partitioning traffic matrices to perform min–maxtraffic grooming. Our results with ring networks show that this approach is promising.Our technique of traffic slicing is seen to be quite powerful and works well in all cases.However, it is computationally costlier. When traffic is NCD, the node-grouping approachwith TPABLO decomposition works very well. An additional useful observation is thatnode grouping works well even for traffic matrices that are nearly uniform, and the simpleinterleaved grouping works well in all cases. Our techniques scale well with traffic load.

We are continuing to extend this work in several directions. We are currently investigat-ing the scalability of our approach with ring size. We also intend to extend this approach toother topologies. As a start, we shall investigate topologies in which clearly characterizabledecompositions exist, such as trees. We hope to report more results soon.

Acknowledgments

This research was supported in part by NSF grant ANI-0322107.

© 2005 Optical Society of AmericaJON 7832 September 2005 / Vol. 4, No. 9 / JOURNAL OF OPTICAL NETWORKING 612

Page 12: Traffic-partitioning approaches to grooming ring access networks

5 10 15 20 25 30 35 40 45 500

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Instances

Max

imum

Nod

al D

egre

e (N

orm

aliz

ed to

W)

NCD PartitionTPABLOTraffic Slicing

(a) NCD traffic, N = 16, C = 64, W = 64

5 10 15 20 25 30 35 40 45 500

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Instances

Max

imum

Nod

al D

egre

e (n

orm

aliz

ed to

W)

Lower bound2−groupVariant AVariant BVariant CMaximally Packed

(b) Falling traffic, N = 16, C = 16, W = 64

5 10 15 20 25 30 35 40 45 500

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Instances

Max

imum

Nod

al D

egre

e (n

orm

aliz

ed to

W)

Lower bound2−groupVariant AVariant BVariant CMaximally Packed

(c) Random traffic, N = 16, C = 64, W = 64

5 10 15 20 25 30 35 40 45 500

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Instances

Max

imum

Nod

al D

egre

e (n

orm

aliz

ed to

W)

N=8, C=12, W=64, L=40%, Random TrafficLower BoundSlicing − var ASlicing − var BSlicing − var COptimalPacked

(d) Random traffic, N = 8, C = 12, W = 64

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Maximum Link Load

Mea

n M

axim

um N

odal

Deg

ree

(nor

mal

ized

to W

)

Node GroupingTraffic SlicingMaximally Packed

N=32, C=64, W=128, Uniform Constant Traffic

(e) Constant Traffic, Scalability

5 10 15 20 25 30 35 40 45 500

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Instances

Max

imum

nod

al d

egre

e (n

orm

ailiz

ed to

W)

Random traffic,N=16,C=16,

W=64,L=40%,σ=150%

r=0, Packedr=0, Slicingr=1, Packedr=1, Slicingr=2, Packedr=2, Slicing

(f) Rising traffic, recursive, N = 16, C = 16, W = 64

Fig. 4. Results from randomly generated instances.

© 2005 Optical Society of AmericaJON 7832 September 2005 / Vol. 4, No. 9 / JOURNAL OF OPTICAL NETWORKING 613

Page 13: Traffic-partitioning approaches to grooming ring access networks

References and Links[1] R. Dutta and G. N. Rouskas, “A survey of virtual topology design algorithms for wavelength

routed optical networks,” Opt. Netw. Mag. 1(1), pp. 73–89, (2000).[2] R. Dutta and G. N. Rouskas, “Traffic grooming in WDM networks: Past and future,” IEEE

Netw. 16, 46–56 (2002).[3] E. Modiano and P. J. Lin, “Traffic grooming in WDM networks,” IEEE Commun. Mag. 39(7),

pp. 124–129 (2001).[4] B. Chen, G. N. Rouskas, and R. Dutta, “Traffic grooming in WDM ring networks to minimize

the maximum electronic port cost,” Opt. Switch. Netw. 2, 1–18 (2005).[5] R. Dutta and G. N. Rouskas, “On optimal traffic grooming in WDM rings,” IEEE J. Sel. Areas

Commun. 20, 110–121 (2002).[6] H. Ghafouri-Shiraz, G. Zhu, and Y. Fei, “Effective wavelength assignment algorithms for opti-

mizing design costs in SONET/WDM rings,” J. Lightwave Technol. 19, 1427–1439 (2001).[7] R. Berry and E. Modiano, “Reducing electronic multiplexing costs in SONET/WDM rings with

dynamically changing traffic,” IEEE J. Sel. Areas Commun. 18, 1961–1971 (2000).[8] X. Zhang and C. Qiao, “An effective and comprehensive approach for traffic grooming and

wavelength assignment in SONET/WDM rings,” IEEE/ACM Trans. Netw. 8, 608–617 (2000).[9] J. Simmons, E. Goldstein, and A. Saleh, “Quantifying the benefit of wavelength add–drop in

WDM rings with distance-independent and dependent traffic,” J. Lightwave Technol.17, 48–57(1999).

[10] A. L. Chiu and E. H. Modiano, ”Traffic grooming algorithms for reducing electronic multiplex-ing costs in WDM ring networks,” J. Lightwave Technol. 18, 2–12 (2000).

[11] W. J. Stewart, Introduction to the Numerical Solution of Markov Chains (Princeton UniversityPress, Princeton, N.J., 1994).

[12] H. Choi and D. B. Szyld, “Application of threshold partitioning of sparse matrices to Markovchains,” in Proceedings of the IEEE International Computer Performance and DependabilitySymposium (IPDS ’96) (IEEE, New York, 1996).

[13] K. B. Srinivasarao, “Traffic grooming in translucent optical ring networks,” Master’s thesis(North Carolina State University, Raleigh, North Carolina, 2003). Publicly available via WWW,http://www.lib.ncsu.edu/ETD-db/.

© 2005 Optical Society of AmericaJON 7832 September 2005 / Vol. 4, No. 9 / JOURNAL OF OPTICAL NETWORKING 614