Protection Schemes For Two Link Failures in Optical Networks
Protection Schemes For Two Link Failures in Optical Networks
in Optical Networks
Salah A. Aly and Ahmed E. Kamal
Department of Electrical and Computer Engineering
Iowa State University, Ames, IA 50011, USA
Email: {salah,kamal}@iastate.edu
November 12, 2008
arXiv:0811.1693v1 [cs.IT] 11 Nov 2008
Abstract—In this paper we develop network protection to maximize the throughput [1], [10]. Also, it is robust against
schemes against two link failures in optical networks. The packet losses and network failures [5], [11], [6].
motivation behind this work is the fact that the majority of Network protection against single and multiple link failures
all available links in an optical network suffer from single and
double link failures. In the proposed network protection schemes, using adding extra protection paths has been introduced in [7],
NPS2-I and NPS2-II, we deploy network coding and reduced [8]. The source nodes are able to combine their data into
capacity on the working paths to provide backup protection extra paths (backup protection paths) that are used to protect
paths. In addition, we demonstrate the encoding and decoding all signals on the working paths plain carrying data from all
aspects of the proposed schemes. sources. In both cases, p-cycles has been used for protection
Index Terms—Network Protection, Optical Networks.
against single and multiple link failures.
In this paper we design two schemes for network protection
I. I NTRODUCTION
against one and two failed links in a network with n disjoint
One of the main services of operation networks that must be working paths: NPS2-I and NPS2-II. The approach is based
deployed efficiently is reliability. In order to deploy a reliable on network coding data originated by the sources. We assume
networking strategy, one needs to protect the transmitted sig- that network capacity will be reduced by a partial factor in
nals over unreliable links. Link failures are common problems order to achieve the required protection. Several advantages
that might occur frequently in single and multiple operating of NPS2-I and NPS2-II can be stated as:
communication circuits. In network survivability and network • The data sent from the sources are protected without
resilience, one needs to design efficient strategies to overcome adding extra paths. Two paths out of the n disjoint
this dilemma. Optical network survivability techniques are working paths will carry encoded data, and hence they
classified as pre-designed protection and dynamic restora- are protection paths.
tion [13], [8]. The approach of using pre-designed protection • The encoding and decoding operations are achieved with
aims to reserve enough bandwidth such that when a failure less computational cost at both the sources and receivers.
occurs, backup paths are used to reroute the transmission The recovery from failures is achieved immediately with-
and be able to recover the data. Examples of this type are out asking the senders to retransmit the lost data.
1-1 and 1-N protections [2], [9]. In dynamic restoration • The normalized network capacity is (n − 2)/n, which
reactive strategies, capacity is not reserved. However, when is near-optimal in case of using a large number of
the failure occurs, dynamic recovery is used to recover the connections.
data transmitted in the links that are suffered from failures.
This technique does not need preserved resources or provision II. N ETWORK M ODEL
of extra paths that work in case of failure. In this work we In this section we present the network model and basic
will provide several strategies of dynamic restoration based on terminology.
coding and reduced distributed fairness capacities. i) Let N be a network represented by an abstract graph
Network coding is a powerful tool that has been recently G = (V, E), where V is a set of nodes and E be a set
used to increase the throughput, capacity, and performance of undirected edges. Let S and R be sets of independent
of communication networks. Information theoretic aspects of sources and destinations, respectively. The set V = V ∪
network coding have been investigated in [12], [1]. Network S ∪ R contains the relay, source, and destination nodes.
coding allows the intermediate nodes not only to forward Assume for simplicity that |S| = |R| = n, hence the set
packets using network scheduling algorithms, but also en- of sources is equal to the set of receivers.
code/decode them using algebraic primitive operations, see [1], ii) A path (connection) is a set of edges connected together
[4], [12] and references therein. As an application of network with a starting node (sender) and an ending node (re-
coding, data loss because of failures in communication links ceiver).
can be detected and recovered if the sources are allowed to
perform network coding operations. Network coding is used Li = {(si , e1i ), (e1i , e2i ), . . . , (e(m)i , ri )},
2
working path Li . The node rk with failed connection Lk will In the case of two failures, the receivers will be able to solve
be able to recover the data xk . Assuming all operations are two linearly independent equations in two unknown variables.
achieved over the binary finite field F2 . Hence we have For instance, assume the two failures occur in paths number
n
X two and four. Then the receivers will be able to construct two
xk = yi − xj . (5) equations with cofficients
j=1,i6=j
1 1
(10)
III. P ROTECTIONS U SING D EDICATED PATHS (NPS2-I) α α3
In this section we develop a network protection scheme Therefore, we have
(NPS2-I) for two link failures in optical networks. The protec-
xℓ2 + xℓ4 (11)
tion scheme is achieved using network coding and dedicated
paths. Assume we have n connections carrying data from a set αxℓ2 + α3 xℓ4 (12)
of n sources to a set of n receivers. All connections represent One can multiply the first equation by α and subtract the two
disjoint paths, and the sources are independent of each other. equations to obtain value of xℓ4 .
The authors in [7], [3] introduced a model for optical network We notice that the encoded data symbols yjℓ and ykℓ are fixed
protection against a single link failure using an extra and per one session transmission but it is varied for other sessions.
dedicated paths provisioning. In this model NPS2-I we extend This means that the path Lj is dedicated to send all encoded
this approach to two link failures. data yj1 , yj2 , . . . , yjn .
We will provide two backup paths to protect against any Lemma 3: The normalized capacity of NPS2-I of the net-
two disjoint links, which might experience failures. These two work model N described in (6) is given by
protection paths can be chosen using network provisioning.
The protection paths are fixed for all rounds per session, C = (n − 2)/n. (13)
but they may vary among sessions. For example, sender si Proof: There are n rounds in every session. Also, we have
transmits a message xℓi to a receiver ri at time tℓδ in round n connections per a round time. There exist two connections
time ℓ in session δ. This process is explained in Scheme (6) which carry backup data for protection, hence there are n − 2
as: connections that carry working data. Therefore, the normalized
capacity is given as:
round time session 1 ...
C = (n − 2)n/n2 ,
1 2 3 ... n ...
s1 → r1 x11 x1 2
x13
... xn1 ... which gives the result.
s2 → r2 x12 x22 x32 ... xn2 ... In NPS2-I there are three different scenarios for two link
s3 → r3 x13 x23 x33 ... xn3 ... failures, which can be described as follows:
.. .. .. .. .. i) If the two link failures occur in the backup protection
. . . . . ... paths Lj and Lk , then no recovery operations are required
(6)
si → ri x1i x2i x3i . . . xni ... at the receivers side. The reason is that these two paths
sj → rj yj1 yj2 yj3 . . . yjn ... are used for protections, and all other working paths will
sk → rk yk1 yk2 yk3 . . . ykn ... convey the data from the senders to receivers.
si+1 → ri+1 x1i+1 x2i+1 x3i+1 . . . xni+1 ... ii) If the two link failures occur in one backup protection
.. .. .. .. .. .. path say Lj and one working path Li , then recovery
. . . . . . ...
sn → rn x1n x2n x3n . . . xnn ... operations are required. The receiver ri must recover its
data using one of the protection paths.
All yjℓ ’s are defined as: iii) If the two link failures occur in two working paths, then
n n
in this case the two protection paths are used to recover
yjℓ =
X
aℓi xℓi and ykℓ =
X
bℓi xℓi . (7) the lost data. The idea of recovery in this case is to build
i=1,i6=j6=k i=1,i6=k6=j
a system of two equations with two unknown variables.
The coefficients aℓi and bℓi are chosen over a finite field Fq IV. P ROTECTION AGAINST T WO L INK FAILURES
with q > n − 2, see [3] for more details. One way to choose (NPS2-II)
these coefficients is by using the follow two vectors. In this section we will provide an approach for network pro-
tection against two link failures in optical networks. We deploy
1 1 1 ... 1
(8) network coding and distribute capacity over the working paths.
1 α α2 . . . αn−3 We will compute the network capacity in this approach. In [3]
Therefore, the coded data is we will illustrate the tradeoff and implementation aspects of
n
X n
X this approach, where there is enough space for details.
mod n−2 ℓ We assume that there is a set of n connections that need
yjℓ = xℓi and ykℓ = αi xi . (9)
i=1,i6=j6=k i=1,i6=k6=j to be protected with %100 guarantee against single and two
4
packets due to link failures, see [2], [3], [8]. However, we [6] S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Medard.
provide strategies that utilize network coding and reduced Resilient network coding in the presence of byzantine adversaries. In
Proc. IEEE INFOCOM, 2007.
capacity at the source nodes. We assume that the receiver [7] A. E. Kamal. 1+N protection in optical mesh networks using network
nodes are able to perform decoding operations using a data coding on p-cycles. In Proc. of the IEEE Globecom, 2006.
collector R. [8] A. E. Kamal. 1+N network protection for mesh networks: network
coding-based protection using p-cycles. submitted to IEEE Journal of
We assume there is a data distributor R that will collect Communication, 2008.
data from all working and protection paths and is able to [9] A. E. Kamal. A generalized strategy for 1+N protection. In Proc. of
perform the decoding operations. In this case we assume that the IEEE International Conference on Communications (ICC), 2008.
[10] R. Koetter and M. Medard. An algebraic approach to network coding.
all receivers R have available shared paths with the data IEEE/ACM transactions on networking, 2003.
collector R. At the receivers side, if there are two failures [11] D. S. Lun, N. Ranakar, R. Koetter, M. Medard, E. Ahmed, and H. Lee.
in paths Lj and Lk , then there are several situations. Achieving minimum-cost multicast: A decentralized approach based on
network coding. In In Proc. the 24th IEEE INFOCOM, volume 3, pages
• If the paths Lj and Lk carry unencoded data (working 1607– 1617, March 2005.
paths), then the data distributor R must query all other [12] E. Soljanin and C. Fragouli. Network codinginformation flow perspec-
tive. 2007.
nodes in order to recover the failed data. In this case rk [13] D. Zhou and S. Subramaniam. Survivability in optical networks. IEEE
and rj must query R to retrieve their lost data. network, 14:16–23, Nov./Dec. 2000.
• If the path Lk carries encoded data yk (protection path)
and Lj carries unencoded data (working path), then data
collector R must query all other receivers in order to
perform decoding, and rj receives the lost data xℓj .
• If the paths Lj and Lk carry encoded data (they are both
protection paths), then no action is required.
V. C ONCLUSION
In this paper we presented network protection schemes
NPS2-I and NPS2-II against single and double link failures in
optical networks. We showed that protecting two failures can
be achieved using network coding and reduced capacity. The
normalized capacity of the proposed schemes is (n − 2)/n,
which is near optimal for a large number of connections.
Extended version of this paper will appear in [3], where
protection against t multiple failures is investigated.
VI. ACKNOWLEDGMENTS
This research was supported in part by grants CNS-0626741
and CNS-0721453 from the National Science Foundation, and
a gift from Cisco Systems. S A. A would like to thank Prof.
A E. K for his support and guidance. He is also grateful to
Prof. E. Soljanin and Prof. A. Klappenecker for their kindness
and for training him how to inscribe high quality research
papers.
R EFERENCES
[1] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. Network information
flow. IEEE Trans. Inform. Theory, 46:1204–1216, 2000.
[2] S. A. Aly and A. E. Kamal. Network protection codes against link
failures using network coding. In Proc. IEEE GlobelComm ’08, New
Orleans, LA, December 2008.
[3] S. A. Aly and A. E. Kamal. On the construction of network protection
codes against network failures. IEEE Journal on Selected Areas in
Communciation (JSAC) , on submission, 2008.
[4] C. Fragouli, J. Le Boudec, and J. Widmer. Network coding: An instant
primer. ACM SIGCOMM Computer Communication Review, 36(1):63–
68, 2006.
[5] T. Ho, R. Koetter, M. Medard, D. Karger, and M. Effros. The benefits
of coding over routing in a randomized setting. In Proc. of the IEEE
International Symposium on Information Theory (ISIT03), page 442,
Yokohama, Japan, June 2003.