Network coding for improving throughput in WDM optical networks with dedicated protection

被引:16
作者
Dao Thanh Hai [1 ,2 ]
机构
[1] Phenikaa Univ, Fac Comp Sci, Hanoi, Vietnam
[2] Phenikaa Univ, Phenikaa Inst Adv Study, Hanoi, Vietnam
关键词
Fiber-optic networks; Wavelength division multiplexing (WDM); Dedicated protection; Network coding; Routing; Mixed integer linear programming; ASSIGNMENT PROBLEM; SPECTRUM; GATES;
D O I
10.1007/s11082-019-2104-5
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network coding (NC) has been recently emerging as an excellent technique for leveraging network efficiency. In optical networks,NC and protection appear to be a good match and indeed, NC could be effectively exploited for greater protection efficiency thanks to the opportunity of combining signals rather than duplication in the traditional approach. Motivated by this observation, we investigate the application of a simple and practical NC technique based on XOR operation to improve the network throughput in survivable optical networks.To this end, we propose the NC-based protection whose speed recovery is on a par with the conventional 1+1 dedicated protection while the capacity usage could be more efficient, paving the way for improving throughput in constrained capacity conditions. A novel mixed integer linear programming model is developed for survivable optical networks design employing the proposed NC-based protection. The model attempts to optimally determine the demands to serve, the routing for served demands and NC assignment among demands aiming at maximizing the network throughput in the constraint of bandwidth limitation. Extensive numerical evaluations on realistic topologies are provided to highlight the advantages of our NC-based protection proposal compared with the conventional dedicated protection in improving the network throughput. Encouraging results are observed when the new protection proposal based on NC could accommodate up to 30% more traffic than the conventional case.
引用
收藏
页数:15
相关论文
共 40 条
  • [1] Agarwal A, 2004, 2004 IEEE INFORMATION THEORY WORKSHOP, PROCEEDINGS, P247
  • [2] Network information flow
    Ahlswede, R
    Cai, N
    Li, SYR
    Yeung, RW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1204 - 1216
  • [3] Al Muktadir A, 2014, IEEE INT CONF HIGH, P84, DOI 10.1109/HPSR.2014.6900886
  • [4] A mathematical model for routing in 1+1 protection with network coding for instantaneous recovery
    Al Muktadir, Abu Hena
    Oki, Eiji
    [J]. IEICE COMMUNICATIONS EXPRESS, 2012, 1 (06): : 228 - 233
  • [5] Network Protection Codes Against Link Failures Using Network Coding
    Aly, Salah A.
    Kamal, Ahmed E.
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [6] [Anonymous], 2017, The Zettabyte Era: Trends and Analysis
  • [7] [Anonymous], 2009 IEEE INT C COMM
  • [8] [Anonymous], 2009 ITG S PHOT NETW
  • [9] [Anonymous], 2014, ADV PHOTONICS COMMUN
  • [10] Realization strategies of dedicated path protection: A bandwidth cost perspective
    Babarczi, Peter
    Biczok, Gergely
    Overby, Harald
    Tapolcai, Janos
    Soproni, Peter
    [J]. COMPUTER NETWORKS, 2013, 57 (09) : 1974 - 1990