US20040109407A1 - Path segment protecting p-cycles - Google Patents

Path segment protecting p-cycles Download PDF

Info

Publication number
US20040109407A1
US20040109407A1 US10/620,302 US62030203A US2004109407A1 US 20040109407 A1 US20040109407 A1 US 20040109407A1 US 62030203 A US62030203 A US 62030203A US 2004109407 A1 US2004109407 A1 US 2004109407A1
Authority
US
United States
Prior art keywords
path
cycle
flow
cycles
configured cycle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/620,302
Inventor
Wayne Grover
Ganxiang Shen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telecommunications Res Labs
Original Assignee
Telecommunications Res Labs
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telecommunications Res Labs filed Critical Telecommunications Res Labs
Priority to US10/620,302 priority Critical patent/US20040109407A1/en
Assigned to TELECOMMUNICATIONS RESEARCH LABORATORIES reassignment TELECOMMUNICATIONS RESEARCH LABORATORIES ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GROVER, WAYNE D., SHEN, GANXIANG
Publication of US20040109407A1 publication Critical patent/US20040109407A1/en
Priority to US13/663,426 priority patent/US9191270B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0668Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0227Operation, administration, maintenance or provisioning [OAMP] of WDM networks, e.g. media access, routing or wavelength allocation
    • H04J14/0254Optical medium access
    • H04J14/0267Optical signaling or routing
    • H04J14/0268Restoration of optical paths, e.g. p-cycles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0278WDM optical network architectures
    • H04J14/0284WDM mesh architectures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/24Multipath
    • H04L45/247Multipath using M:N active or standby paths

Definitions

  • p-cycles One of the most interesting recent developments in survivable network architecture is the method of p-cycles.
  • p-Cycles, or pre-configured cycles, introduced in 1998 are in a sense like BLSR rings, but with support for the protection of straddling span failures as well as the usual protection of spans on the ring itself.
  • the most striking property of p-cycles is that they retain ring-like switching characteristics (only two nodes do any real time switching and are fully pre-planned for each failure) but can be designed with essentially the same capacity-efficiency as a span-restorable mesh network.
  • span-protecting p-cycles protects only spans that are part of itself or that directly straddle the respective p-cycle.
  • This disclosure extends span-protecting p-cycles to path-segment protecting p-cycles and addresses the issue of mutual capacity (which is intrinsic to any path oriented or multi-commodity flow type of recovery scheme) as well as the corresponding operational complexity in coordinating which paths can access which p-cycles.
  • a telecommunications network comprising plural nodes connected by plural spans and arranged to form a mesh network, at least one pre-configured cycle of spare capacity being established in the mesh network, the pre-configured cycle including plural nodes of the mesh network, and the plural nodes of the pre-configured cycle being configured to protect at least one path segment, where the path segment includes at least two intersecting nodes within the pre-configured cycle and at least one intermediate node in a path that includes the two intersecting nodes and straddles the pre-configured cycle.
  • the path segments may be segments of a working path with a start node not connected to the pre-configured cycle.
  • the path segments may be segments of a working path with an end node not connected to the pre-configured cycle.
  • Establishing the pre-configured cycle may include a) pre-selecting a set of candidate cycles for forming into pre-configured cycles, allocating working paths and spare capacity in the mesh telecommunications network based on the set of candidate cycles; and c) providing the mesh telecommunications network with spare capacity arranged in pre-configured cycles according to the allocation determined in the preceding step.
  • the allocation of working paths and spare capacity may be jointly optimized.
  • Pre-selecting candidate cycles may include ranking a set of closed paths in the mesh telecommunications network according to the degree to which each closed path protects spans on and off the closed path, and selecting candidate cycles from the set of closed paths.
  • Pre-selecting candidate cycles may comprise:
  • Determining the scoring credit may be calculated by increasing said scoring credit by a value for each flow within said closed path that is protected by said closed path, increasing said scoring credit by a larger value for each flow not on said closed path that is protected by said closed path, weighting the value provided by each flow according to the traffic along said each flow and the length of each flow, and taking the ratio of said scoring credit with the cost of said closed path.
  • a mixed selection strategy may be used for pre-selecting candidate cycles.
  • Establishing the pre-configured cycle may also comprise:
  • Protecting a path segment may comprise, upon failure of a span in the path segment, the nodes with the identification of the path segments corresponding to the failed span recorded route the telecommunications traffic along the pre-configured cycle.
  • the pre-configured cycle of spare capacity may be provided by:
  • the path segment may be part of a path of an express flow through a network region.
  • the pre-configured cycle may be an area boundary flow protecting p-cycle.
  • FIG. 1( a ) shows a span protecting p-cycle in a network according to the prior art
  • FIG. 1( b ) shows the p-cycle viewed as a flow-protecting p-cycle according a preferred embodiment of the invention
  • FIGS. 2 ( a ), ( b ), ( c ), ( d ), and ( e ) show various flow-to-cycle relationships
  • FIGS. 3 ( a ), ( b ), ( c ), and ( d ) are four test networks used as examples of the invention.
  • FIG. 4 depicts a simple application of the general concept
  • FIG. 5 shows the use of a mixture of flow-protecting and span-protecting p-cycles for optical bypass on express flow
  • FIG. 6( a ) depicts a network with a p-cycle that protects a working path which is following its shortest route over the graph;
  • FIG. 6( b ) depicts a network with a p-cycle the choice of which is also coordinated with a changed working path routing so that the total of working and spare capacity required is minimized;
  • FIG. 7( a ) is a flow chart representing the steps in a non-joint approach to network design
  • FIG. 7( b ) is a flow chart representing the steps in a joint approach to network design
  • a mesh telecommunications network (also often called a “transport” network or “optical network”) is a telecommunications network formed from plural nodes connected by plural spans.
  • the word “comprising” is used in its non-limiting sense to mean that items following the word in the sentence are included and that items not specifically mentioned are not excluded.
  • the use of the indefinite article “a” in the claims before an element means that one of the elements is specified, but does not specifically exclude others of the elements being present, unless the context clearly requires that there be one and only one of the elements.
  • FIG. 1( a ) shows a conventional span-protecting p-cycle according to the prior art, with nodes numbered 0, 1, 2, . . . , 10, in which the connecting spans of the network T are referred to as (i, k), where i is the beginning node and k is the terminating node, and paths are referred to as (i, j, k), where i is the beginning node, j is the intermediate section and may refer to more than one node, and k is the terminating node. Paths may also be referred to in abbreviated form by (i-k).
  • the spans ( 0 , 2 ), ( 2 , 3 ), ( 3 , 5 ), ( 5 , 6 ), ( 6 , 8 ), and ( 8 , 0 ) are on-cycle spans of the p-cycle R shown.
  • the span ( 0 , 5 ) is not on the cycle, but its two end nodes are, making it a straddling span.
  • a p-cycle can offer one protection path for the failure of any on-cycle span and two protection paths for the failure of any (of possibly several) disjoint straddling spans (one failure at a time).
  • span ( 5 , 6 ) fails, the route ( 5 , 3 , 2 , 0 , 8 , 6 ) on cycle R offers one protection path to restore the failed span, in exactly the way a BLSR operates. But if span ( 0 , 5 ) fails, paths ( 0 , 2 , 3 , 5 ) and ( 0 , 8 , 6 , 5 ) are both (simultaneously) available to provide protection paths. In either type of failure only two nodes do any switching in real time, and it is effectively identical to a preplanned BLSR switching reaction. In contrast a ring (or any form of cycle cover) only protects on-cycle spans.
  • a failure of intermediate node 7 can break the flows between node pairs ( 1 , 10 ) and ( 4 , 9 ). While a span-protecting p-cycle cannot restore these affected transit flows, under the flow p-cycle in FIG. 1( b ), the flows that transit node 7 can be recovered by the cycle. Note, however that any demands being added or dropped at node 7 cannot be handled by the same flow p-cycle. The flow must be unchanged in its composition between the nodes where it intersects the flow p-cycle.
  • FIG. 1( b ) can be considered in isolation (when taking a path-level view) to straddle the cycle as if it was on its own virtual direct span that is a chord to the p-cycle. More specifically the path segment ( 6 , 7 , 2 ) can be considered to straddle cycle R, between the nodes 6 and 7 , and is labeled as a straddling flow, as well as the path segment ( 6 , 7 , 0 ).
  • This simple observation is the starting point for the fully general concept. To develop this we must now take an explicit view of the service paths S 1 , S 2 , and S 3 crossing the network and how they relate to the p-cycles we may use for protection.
  • Contiguous means that the multiplexed demand composition of the respective lightpath, OC-n, or MPLS path is not altered by add/drop of constituent lower-rate payloads at any node of the segment. This situation is commonly referred to by saying that with respect to any intermediate nodes in the segment, the flow is an express flow.
  • any flow segment that intersects a flow p-cycle can be protected, not simply spans directly on or straddling the cycle. For example, if spans ( 2 , 7 ) and ( 6 , 7 ) in FIG. 1( a ) incur failures, they cannot be restored by the span-protecting p-cycle Rs. But, under the flow p-cycle shown in FIG. 1( b ), the contiguous flows that traverse spans ( 2 , 7 ) and ( 6 , 7 ) can be restored by the cycle Rf.
  • any demands being added or dropped at node 7 cannot be handled by the same flow p-cycle.
  • the flow must be unchanged in its composition, or contiguous, between the nodes where it intersects the flow p-cycle.
  • a similar situation is encountered if node 7 were to fail, where the span protecting p-cycle Rs cannot restore flows, while the flow protecting p-cycle can, except for demands being added or dropped at node 7 .
  • a segment that is protected implies that the segment is protected against failure of any of its spans or nodes.
  • any reference to a span failure within a segment can equally be considered a node failure within the segment, unless, it is obvious from the context that the failure must be a span.
  • Flow p-cycles can be categorized as the p-cycle equivalent to path restoration with failure-specific stub-reuse. This is an intermediate between completely general stub release and the complete prohibition against re-use of stub capacity that is built into the recent shared backup path protection scheme.
  • stub re-use the surviving path up to the protected segment is always part of the end to end path in the restored state. In other words the surviving stub path segments are always re-used in a failure specific way by the same path that used that capacity before the failure.
  • the stub re-use that is implicit in flow p-cycles requires no explicit real time actions to effect it.
  • any given path to the cycle can be either intersecting or non-intersecting. Only intersecting paths are relevant to the consideration of each candidate cycle.
  • intersection nodes For example, the paths between nodes ( 4 , 9 ) and ( 1 , 10 ) in FIG. 1( b ) both intersect the cycle shown and are relevant to the consideration of that cycle as a possible flow p-cycle.
  • That cycle would provide straddling-type protection to the two segments ( 6 , 7 , 2 ) and ( 0 , 7 , 6 ) and on-cycle protection to an example flow such as ( 6 , 5 , 3 ) should it exist. More generally, a path can intersect a cycle in a variety of more complex ways, involving more than two intersecting nodes.
  • FIGS. 2 ( a )-( e ) depicts a variety of flow relationships, where s represents the start node, and d represents the end node, and in which numbers 1-20 represent nodes on or in the p-cycle.
  • FIG. 2( a ) displays the simplest scenario, where the cycle and the relevant flow segment intersect at two nodes 1 and 2 , and the flow through nodes 3 and 4 does not share any other spans or nodes with the cycle. Analogous to the concept of a straddling span in conventional p-cycles, it is natural to call this a straddling flow relationship.
  • FIG. 2( b ) depicts a flow segment ( 1 , 5 , 6 , 2 ) in an on-cycle relationship, which is called an on-cycle flow. From here, more complex relationships of flows to cycles need to be recognized that do not arise with span-protecting p-cycles.
  • FIG. 2( c ) shows a three-node intersection relationship of what is otherwise a plain straddling flow labeled ( 1 , 7 , 8 , 2 ).
  • FIG. 2( d ) shows an even more general intersecting flow relationship that produces two straddling portions ( 1 , 9 , 10 ) and ( 11 , 2 ) and an on-cycle segment ( 10 , 11 ).
  • FIG. 2( c ) is in this regard equivalent to FIG. 2( a ).
  • FIG. 2( d ) two paths are available if the failure span is in either of the straddling segments, but only one if a span fails in the on-cycle segment.
  • a preprocessing program can identify all the protection relationships between candidate cycles and the corresponding flow segments that it could protect. More formally this defines the topological parameters ⁇ i,j r ⁇ ( 0 , 1 , 2 ), which give the number of protection relationship that a unit capacity on cycle j can (potentially) provide to the intersecting flow segment of the working path for end-node pair r, in the event of span failure i.
  • span i is not contained in a flow that intersects cycle j. It is one if span i is in an intersecting flow and is also a span of cycle j itself (i.e., an on-cycle relationship), and two otherwise (i.e., a straddling relationship). For a node, the notation would replace i with n such that ⁇ i,j r ⁇ ( 0 , 1 , 2 ).
  • S is the set of spans in the network.
  • Index i denotes spans specifically in a failure context, and k is used to index S in other general contexts.
  • D i is the set of end-node pairs of paths affected by failure of span i, index r.
  • P is set of all simple cycles of the graph that are candidates to become p-cycles, indexed by j. In practice P may be a limited set of candidate cycles that are eligible for use by virtue of limited circumference, hop count, or other engineering considerations.
  • c k is the cost of adding a unit capacity (for instance an additional lightwave channel) to span k.
  • c k values are pre-computed constants which may include considerations such as the type of facility involved, distance-related costs for using amplifiers, the cost of any o/e interfaces at the span terminating OXCs, and an amortized allocation of the OXC core costs and wavelength converter pool cost.
  • d r is the number of demand units (for instance, lightpath requirements) on node pair r.
  • n j is the number of unit-capacity copies of cycle j to build
  • s k is the number of spare capacity units required on span k to support the set of flow p-cycles used
  • n i,j r is a family of intermediate variables that consider the number of copies of cycle j that are needed specifically for protection of path r against failure i. All variables are non-negative integers, although it can be seen from the problem structure that spare capacity can be relaxed without loss of integrality.
  • the model is:
  • the first constraint system asserts that affected working flows must be fully restored.
  • the second says that the number of copies of cycle j to build is set by the largest failure-specific simultaneous use of unit copies of cycle j. This is like setting the spare capacity of a conventional span or path restorable mesh network to satisfy the largest simultaneously imposed set of restoration flows over the set of all non-simultaneous failure scenarios.
  • the final constraint system says that the spare capacity on span k must be enough to support the number of copies of each p-cycle that overlies the span.
  • 139.
  • 18.
  • 833.
  • 976, where N is its number of nodes, S its number of spans and
  • Each network has span distances assigned in proportion to the Euclidean distances of the span in the networks as drawn above. Except for Bellcore, demands were generated for all node pairs from a uniform random distribution on [1 . . . 20] and the design problems were solved to optimality in under 2 hours with AMPL/CPLEX 7.1 on an Ultrasparc Sun Server at 450 MHz with 4 GB of RAM.
  • the same demand generating procedure was used to create the Bellcore test case but only 50% of node pairs exchange non-zero demand quantities.
  • the Bellcore solution required about a day and was solved to within 1.34% gap to optimality.
  • the run times can be improved by applying pre-selection strategies or other heuristics in general if warranted.
  • SP span-protection
  • SR span-restorable mesh network designs
  • path-restoration designs with and without stub release
  • SP p-cycle reference designs were actually produced with the flow p-cycles model by simply defining and equivalent demand matrix having non-zero values only between directly connected node pairs.
  • the span- and path-restorable mesh reference designs were produced by known methods. The reference problems all solved in seconds or minutes at most.
  • Table 1 summarizes aspects of the results. For each test network, column 1 describes the span-protecting (SP) p-cycle designs, column 2 details the SR mesh designs and column 3 is for the flow p-cycle designs. Columns 4 and 5 are results for path restorable designs (PR) without, and with, stub release, respectively. (The sequence reflects the theoretically expected ranking in terms of increasing efficiency). All designs for each network have the identical working capacity and demand routing. The first row records the total spare capacity relative to the SP p-cycle design needed for 100% restorability against all single span failures. The next row shows the total design capacity cost relative to the SP p-cycle design. The third row shows the corresponding redundancy ratio of the overall network designs.
  • SP span-protecting
  • PR path restorable designs
  • LoS loss of signal
  • AIS alarm indication signal
  • a logical matching rule can be applied at any node seeing an AIS indication to quickly determine if it has a custodial responsibility to do protection switching for the failed signal.
  • the Signal_ID is again matched, and the signal is switched off the p-cycle.
  • a particular economic advantage of this selective use of a few flow p-cycles is that the express flows they protect may take advantage of long-reach optical technology for optical bypass of all intermediate nodes on the protected flow segment. This allows the express flow signals to remain in the optical domain through the entire region, but remaining protected, saving considerably over the alternative of terminating on each OXC en route.
  • the “diameter” of the express flow-protecting p-cycles may match the transparent optical reach limit of the path segments involved so wavelength conversion and regeneration can be provided at the flow p-cycle nodes only, with all-optical transmission on the protected path segments.
  • the design of the flow-protecting p-cycles can be improved by using a pre-selection strategy, which also makes solving the joint optimization problem feasible.
  • FIGS. 6 ( a ) and ( b ) An example of the effect of solving the joint problem is shown in FIGS. 6 ( a ) and ( b ).
  • Network 60 is shown with flow 62 representing 2 units of capacity 2 ⁇ , and p-cycle 64 consisting of spans 101 - 106 .
  • flow 62 passes through spans 101 and 102 , while in FIG.
  • FIG. 6( b ) flow 66 passes through spans 107 and 108 .
  • p-cycle 64 requires 2 units of spare capacity on spans 101 - 106
  • FIG. 6( b ) reduces the units of space capacity required for p-cycle 64 to one unit on spans 101 - 106 by increasing the length of the path of the working flow from 2 to 2+ ⁇ .
  • FIG. 7( a ) A flow chart showing an example of how the non-joint problem is solved is shown in FIG. 7( a ), where the first step in 202 is to route all lightpath requirements via the shortest path. Step 204 follows from this in defining all working paths and working capacities. To solve for the required p-cycles and spare capacity in 212 , one can either enumerate all graph cycles as possible p-cycles in 206 and then use an ILP solution for p-cycle formation in 208 , or one can use another heuristic algorithm(s) for p-cycle formation in 210 . This process can be contrasted with the flow chart in FIG.
  • a scoring credit can be used, which considers not only topology information, but also the traffic demands of the flows that are potentially protected by the cycle.
  • D is set of nonzero demand pairs (i.e., flows) on the traffic matrix, indexed by r.
  • S r is set of spans traversed by the working path between demand pair r.
  • P(j) denotes cycle j in cycle set P.
  • k enumerates spans on cycle P(j) and
  • c k represents the unit cost of span k.
  • the Euclidean distance of spans between the nodes they connect can be used to represent the span cost, c k .
  • ⁇ i,j r is as already defined, now applied to flows rather than spans, and g r denotes number of traffic demand units of the working flow between demand pair r. l r is the length of the working flow of demand pair r. Note that the purpose of weighting the above two terms is to assign a larger scoring credit to a cycle that can potentially protect “thicker” and “longer” flows (i.e., the larger the product of g r and l r is the more important the corresponding flow is to overall design efficiency.)
  • the set of cycles are ranked according to their score, and highest ranked cycles can be pre-selected as candidate cycles for the rest of the problem. While the pre-selection criteria is effective in predicting the success of a particular cycle, it is possible have “too elite” a population of candidate cycles and it may be desirable to dilute the population with a few other types of candidates.
  • the basic framework is one within which many specific heuristic ideas can be tried, all having to do with defining the reduced set of elite cycles to consider. First, some experience with memory and run times may show, for example, that a budget of 10,000 cycles is realistic to work with. The budget can be used up representing any number of mixed strategies for populating the elite P set.
  • ILP integer linear programming

Abstract

This disclosure introduces a significant extension to the method of p-cycles for network protection. The main advance is the generalization of the p-cycle concept to protect multi-span segments of contiguous working flow, not only spans that lie on the cycle or directly straddle the p-cycle. This effectively extends the p-cycle technique to include path protection, or protection of any flow segment along a path, as well as the original span protecting use of p-cycles. It also gives an inherent means of transit flow protection against node loss. We present a capacity optimization model for the new scheme and compare it to prior p-cycle designs and other types of efficient mesh-survivable networks. Results show that path-segment-protecting p-cycles (“flow p-cycles” for short) have capacity efficiency near that of a path-restorable network without stub release. An immediate practical impact of the work is to suggest the of use flow p-cycles to protect transparent optical express flows through a regional network.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit of U.S. Provisional Application No. 60/430,931, filed Dec. 5, 2002.[0001]
  • BACKGROUND OF THE INVENTION
  • One of the most interesting recent developments in survivable network architecture is the method of p-cycles. p-Cycles, or pre-configured cycles, introduced in 1998, are in a sense like BLSR rings, but with support for the protection of straddling span failures as well as the usual protection of spans on the ring itself. The most striking property of p-cycles is that they retain ring-like switching characteristics (only two nodes do any real time switching and are fully pre-planned for each failure) but can be designed with essentially the same capacity-efficiency as a span-restorable mesh network. Recent work has even found that with joint optimization of working path routing along with p-cycle placement, overall designs can approach the ultimate theoretical efficiency levels for any known class of restorable network and having the benefit of dynamic, failure-specific, path restoration. This means p-cycle based networks can be 3 to 6 times more capacity-efficient than ring-based networks while still providing BLSR ring switching speeds. In fact for straddling span failures, the average protection path has half the number of hops of the corresponding ring, so it may even be faster on average. Since 1998, the basic theory of p-cycles as pre-configured structures in the spare capacity of a mesh network has been developed, and there have been studies on self-organization of the p-cycle sets, application of p-cycles to the MPLS/IP layer, application to DWDM networking and studies on joint optimization of working paths and spare capacity. Notably, in one study it was found that full survivability against any span cut could be achieved with as little as 39% total redundancy. This greatly motivates continuing work and practical applications of the p-cycle concept. [0002]
  • Concurrent work on cycle covers under the coincidentally similar name of protection cycles should not be confused with p-cycles. The fundamentally important difference is the aspect of straddling spans in p-cycles. Straddling spans on a p-cycle can each bear two units of working capacity per unit of p-cycle capacity and they require no associated protection capacity on the same spans. All forms of ring or cycle covers fundamentally involve equal (or greater) amounts of protection and working capacity on every span and at best (which is what oriented cycle double covers in accomplishes) reach a 1-to-1 ratio between these, for 100% redundancy. In contrast p-cycles, due ultimately to the effectiveness of straddling span protection aspects, yield fully restorable architectures at well under 100% redundancy. [0003]
  • However, all work so far on p-cycles has been done on what can be called “span-protecting” p-cycles. Each such p-cycle protects only spans that are part of itself or that directly straddle the respective p-cycle. This disclosure extends span-protecting p-cycles to path-segment protecting p-cycles and addresses the issue of mutual capacity (which is intrinsic to any path oriented or multi-commodity flow type of recovery scheme) as well as the corresponding operational complexity in coordinating which paths can access which p-cycles. By extending the concept to path-segment protecting p-cycles, protection against node loss for transient flows by the span-protecting p-cycles is also provided, while flows originating or terminating at the failed nodes cannot be restored by any network rerouting technique. A method for simplifying the task of optimizing the network is also disclosed, the method also making it easier to solve the joint optimization problem. [0004]
  • SUMMARY OF THE INVENTION
  • In this invention, the difficulties with devising a path protection version of the p-cycle concept have been largely overcome with the concept, not specifically of end-to-end path p-cycles per se, but of path-segment protecting p-cycles, which provide enhanced protection of telecommunication networks. This approach is also referred to as “flow-protecting p-cycles” or “flow p-cycles”. [0005]
  • Despite the complexity of whole networks based on flow p-cycles, more practical specific tactics are presented involving selective use of a few flow p-cycles in conjunction with other protection schemes. Two such concepts set forward in this disclosure are (i) to support transparent optical transport of express flows through a regional network and (ii) to use flow p-cycles around the perimeter of an autonomous system domain to provide a single unified and out-of-mind scheme for protecting all transit flows through the domain. Another important observation is that flow p-cycles inherently also can protect transit flows against node loss. [0006]
  • There is therefore provided a telecommunications network comprising plural nodes connected by plural spans and arranged to form a mesh network, at least one pre-configured cycle of spare capacity being established in the mesh network, the pre-configured cycle including plural nodes of the mesh network, and the plural nodes of the pre-configured cycle being configured to protect at least one path segment, where the path segment includes at least two intersecting nodes within the pre-configured cycle and at least one intermediate node in a path that includes the two intersecting nodes and straddles the pre-configured cycle. The path segments may be segments of a working path with a start node not connected to the pre-configured cycle. The path segments may be segments of a working path with an end node not connected to the pre-configured cycle. Establishing the pre-configured cycle may include a) pre-selecting a set of candidate cycles for forming into pre-configured cycles, allocating working paths and spare capacity in the mesh telecommunications network based on the set of candidate cycles; and c) providing the mesh telecommunications network with spare capacity arranged in pre-configured cycles according to the allocation determined in the preceding step. The allocation of working paths and spare capacity may be jointly optimized. [0007]
  • Pre-selecting candidate cycles may include ranking a set of closed paths in the mesh telecommunications network according to the degree to which each closed path protects spans on and off the closed path, and selecting candidate cycles from the set of closed paths. [0008]
  • Pre-selecting candidate cycles may comprise: [0009]
  • a) determining a scoring credit for each closed path in the set of closed paths, where the scoring credit of said closed path is calculated to predict the success of the closed path as a pre-configured cycle; and [0010]
  • b) choosing a select number of closed paths based on the scoring credit to be the pre-selected candidate cycles. [0011]
  • Determining the scoring credit may be calculated by increasing said scoring credit by a value for each flow within said closed path that is protected by said closed path, increasing said scoring credit by a larger value for each flow not on said closed path that is protected by said closed path, weighting the value provided by each flow according to the traffic along said each flow and the length of each flow, and taking the ratio of said scoring credit with the cost of said closed path. A mixed selection strategy may be used for pre-selecting candidate cycles. [0012]
  • Establishing the pre-configured cycle may also comprise: [0013]
  • a) recording a list of corresponding path segments that intersect the pre-configured cycle at a node on the pre-configured cycle; [0014]
  • b) recording an identification of the path segments at the node on the pre-configured cycle that is intersected by the path segment. [0015]
  • Protecting a path segment may comprise, upon failure of a span in the path segment, the nodes with the identification of the path segments corresponding to the failed span recorded route the telecommunications traffic along the pre-configured cycle. [0016]
  • In a further aspect of the invention, the pre-configured cycle of spare capacity may be provided by: [0017]
  • a) identifying all working flows to be restored; [0018]
  • b) identifying the spare capacity of the pre-configured cycle to restore all working flows for all spans subject to failure in all path segments; [0019]
  • c) providing spare capacity along the pre-configured cycle sufficient to restore all working flows. [0020]
  • The path segment may be part of a path of an express flow through a network region. The pre-configured cycle may be an area boundary flow protecting p-cycle. [0021]
  • In a further aspect of the invention, there is provided a method of operating the claimed telecommunications network.[0022]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • There will now be given a brief description of the preferred embodiments of the invention, with reference to the drawings, by way of illustration only and not limiting the scope of the invention, in which like numerals refer to like elements, and in which: [0023]
  • FIG. 1([0024] a) shows a span protecting p-cycle in a network according to the prior art,
  • FIG. 1([0025] b) shows the p-cycle viewed as a flow-protecting p-cycle according a preferred embodiment of the invention,
  • FIGS. [0026] 2(a), (b), (c), (d), and (e) show various flow-to-cycle relationships,
  • FIGS. [0027] 3(a), (b), (c), and (d) are four test networks used as examples of the invention,
  • FIG. 4 depicts a simple application of the general concept, [0028]
  • FIG. 5 shows the use of a mixture of flow-protecting and span-protecting p-cycles for optical bypass on express flow; [0029]
  • FIG. 6([0030] a) depicts a network with a p-cycle that protects a working path which is following its shortest route over the graph;
  • FIG. 6([0031] b) depicts a network with a p-cycle the choice of which is also coordinated with a changed working path routing so that the total of working and spare capacity required is minimized;
  • FIG. 7([0032] a) is a flow chart representing the steps in a non-joint approach to network design;
  • FIG. 7([0033] b) is a flow chart representing the steps in a joint approach to network design;
  • This disclosure ends with table 1, which compares the results from simulations performed by the inventors of various restoration techniques on four different test networks. [0034]
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • In this patent document, a mesh telecommunications network (also often called a “transport” network or “optical network”) is a telecommunications network formed from plural nodes connected by plural spans. In this patent document, the word “comprising” is used in its non-limiting sense to mean that items following the word in the sentence are included and that items not specifically mentioned are not excluded. The use of the indefinite article “a” in the claims before an element means that one of the elements is specified, but does not specifically exclude others of the elements being present, unless the context clearly requires that there be one and only one of the elements. [0035]
  • FIG. 1([0036] a) shows a conventional span-protecting p-cycle according to the prior art, with nodes numbered 0, 1, 2, . . . , 10, in which the connecting spans of the network T are referred to as (i, k), where i is the beginning node and k is the terminating node, and paths are referred to as (i, j, k), where i is the beginning node, j is the intermediate section and may refer to more than one node, and k is the terminating node. Paths may also be referred to in abbreviated form by (i-k). The spans (0, 2), (2, 3), (3, 5), (5, 6), (6, 8), and (8, 0) are on-cycle spans of the p-cycle R shown. The span (0, 5) is not on the cycle, but its two end nodes are, making it a straddling span. A p-cycle can offer one protection path for the failure of any on-cycle span and two protection paths for the failure of any (of possibly several) disjoint straddling spans (one failure at a time). For example, if span (5, 6) fails, the route (5, 3, 2, 0, 8, 6) on cycle R offers one protection path to restore the failed span, in exactly the way a BLSR operates. But if span (0, 5) fails, paths (0, 2, 3, 5) and (0, 8, 6, 5) are both (simultaneously) available to provide protection paths. In either type of failure only two nodes do any switching in real time, and it is effectively identical to a preplanned BLSR switching reaction. In contrast a ring (or any form of cycle cover) only protects on-cycle spans. An example of protection against node failure can also be seen in this example. A failure of intermediate node 7 can break the flows between node pairs (1, 10) and (4, 9). While a span-protecting p-cycle cannot restore these affected transit flows, under the flow p-cycle in FIG. 1(b), the flows that transit node 7 can be recovered by the cycle. Note, however that any demands being added or dropped at node 7 cannot be handled by the same flow p-cycle. The flow must be unchanged in its composition between the nodes where it intersects the flow p-cycle.
  • As is known in the art, it is the admission of straddling span protection relationships that dramatically reduces the total design redundancy relative to ring-based networks, to the point of near-equivalence with a span-restorable mesh network. Note, however, in FIG. 1 ([0037] a) that spans (6, 7) and (7, 2), and several others, of the basic p-cycle are close to being straddling spans but cannot actually be span-protected by the cycle shown. However, a path segment that crosses both spans (6, 7) and (7, 2), as shown in FIG. 1(b), can be considered in isolation (when taking a path-level view) to straddle the cycle as if it was on its own virtual direct span that is a chord to the p-cycle. More specifically the path segment (6, 7, 2) can be considered to straddle cycle R, between the nodes 6 and 7, and is labeled as a straddling flow, as well as the path segment (6, 7, 0). This simple observation is the starting point for the fully general concept. To develop this we must now take an explicit view of the service paths S1, S2, and S3 crossing the network and how they relate to the p-cycles we may use for protection. FIG. 1(b), which has flows along paths (9, 6, 7, 2, 4) labeled S1, (10, 6, 7, 0, 1) labeled S2, and (9, 6, 5, 3, 4) labeled S3, shows this more highly resolved viewpoint in which we can design a flow p-cycle protected network. For convenience let us define a flow as any single contiguous segment of a working end-to-end path. Thus, the entire path, each span on the path, and any sequence of several spans along the path are flow segments that could be protected by flow-protecting p-cycles. Note that this can refer to a segment of a lightpath, an OC-n path, or an MPLS path. Contiguous means that the multiplexed demand composition of the respective lightpath, OC-n, or MPLS path is not altered by add/drop of constituent lower-rate payloads at any node of the segment. This situation is commonly referred to by saying that with respect to any intermediate nodes in the segment, the flow is an express flow.
  • Clearly flow p-cycle designs can access more opportunities for spare-capacity-sharing than the span p-cycle method. Any flow segment that intersects a flow p-cycle can be protected, not simply spans directly on or straddling the cycle. For example, if spans ([0038] 2, 7) and (6, 7) in FIG. 1(a) incur failures, they cannot be restored by the span-protecting p-cycle Rs. But, under the flow p-cycle shown in FIG. 1(b), the contiguous flows that traverse spans (2, 7) and (6, 7) can be restored by the cycle Rf. Note, however that any demands being added or dropped at node 7 cannot be handled by the same flow p-cycle. The flow must be unchanged in its composition, or contiguous, between the nodes where it intersects the flow p-cycle. A similar situation is encountered if node 7 were to fail, where the span protecting p-cycle Rs cannot restore flows, while the flow protecting p-cycle can, except for demands being added or dropped at node 7. In this disclosure, it will be understood that a segment that is protected implies that the segment is protected against failure of any of its spans or nodes. Similarly, any reference to a span failure within a segment can equally be considered a node failure within the segment, unless, it is obvious from the context that the failure must be a span.
  • Flow p-cycles can be categorized as the p-cycle equivalent to path restoration with failure-specific stub-reuse. This is an intermediate between completely general stub release and the complete prohibition against re-use of stub capacity that is built into the recent shared backup path protection scheme. In stub re-use the surviving path up to the protected segment is always part of the end to end path in the restored state. In other words the surviving stub path segments are always re-used in a failure specific way by the same path that used that capacity before the failure. Unlike stub release, which can permit the same or any other simultaneously failed path to exploit released stub capacity of failed paths, the stub re-use that is implicit in flow p-cycles requires no explicit real time actions to effect it. [0039]
  • Determining Flow-Protection Relationships [0040]
  • Given a cycle that is a candidate to be a flow p-cycle in a network design, the relation of any given path to the cycle can be either intersecting or non-intersecting. Only intersecting paths are relevant to the consideration of each candidate cycle. A path intersects a cycle if the two have at least two common nodes (which may include the source and destination nodes of the path). These are called intersection nodes. For example, the paths between nodes ([0041] 4, 9) and (1, 10) in FIG. 1(b) both intersect the cycle shown and are relevant to the consideration of that cycle as a possible flow p-cycle. By inspection, that cycle would provide straddling-type protection to the two segments (6, 7, 2) and (0, 7, 6) and on-cycle protection to an example flow such as (6, 5, 3) should it exist. More generally, a path can intersect a cycle in a variety of more complex ways, involving more than two intersecting nodes.
  • FIGS. [0042] 2(a)-(e) depicts a variety of flow relationships, where s represents the start node, and d represents the end node, and in which numbers 1-20 represent nodes on or in the p-cycle. FIG. 2(a) displays the simplest scenario, where the cycle and the relevant flow segment intersect at two nodes 1 and 2, and the flow through nodes 3 and 4 does not share any other spans or nodes with the cycle. Analogous to the concept of a straddling span in conventional p-cycles, it is natural to call this a straddling flow relationship. Similarly, FIG. 2(b) depicts a flow segment (1, 5, 6, 2) in an on-cycle relationship, which is called an on-cycle flow. From here, more complex relationships of flows to cycles need to be recognized that do not arise with span-protecting p-cycles. FIG. 2(c) shows a three-node intersection relationship of what is otherwise a plain straddling flow labeled (1, 7, 8, 2). FIG. 2(d) shows an even more general intersecting flow relationship that produces two straddling portions (1, 9, 10) and (11, 2) and an on-cycle segment (10, 11). Conceptually the flow-to-cycle intersection relationship can be arbitrarily complex, such as in FIG. 2(e) where it passes through nodes (1, 12, 13, 14, 15, 16, 17, 18, 19, 20, 2). But the following important observation can be made about any of these intersection relationships, no matter how apparently complex: With respect to a cycle j, and any span failure i on the intersecting flow segment, it is always possible to determine by simple inspection whether a unit copy of protection capacity on cycle j can provide either one or two protection paths for the affected flow. For example, in FIGS. 2(b) and 2(a) there are respectively one and two protection paths available from the cycle for any span failure on the corresponding intersecting flow segments. FIG. 2(c) is in this regard equivalent to FIG. 2(a). In FIG. 2(d) two paths are available if the failure span is in either of the straddling segments, but only one if a span fails in the on-cycle segment. Thus, a preprocessing program can identify all the protection relationships between candidate cycles and the corresponding flow segments that it could protect. More formally this defines the topological parameters γi,j rε(0, 1, 2), which give the number of protection relationship that a unit capacity on cycle j can (potentially) provide to the intersecting flow segment of the working path for end-node pair r, in the event of span failure i. It is zero if span i is not contained in a flow that intersects cycle j. It is one if span i is in an intersecting flow and is also a span of cycle j itself (i.e., an on-cycle relationship), and two otherwise (i.e., a straddling relationship). For a node, the notation would replace i with n such that γi,j rε(0, 1, 2).
  • Mutual Capacity Considerations [0043]
  • Now comes the most complicating aspect of the concept of path-oriented p-cycles. The reason we said “potentially provide” above is that, as can be noted in FIG. 1([0044] b), the ability of the cycle to provide the assessed number of protection paths can depend on which other path failures occur at the same time. Unlike span-protecting p-cycles, when a span fails in the flow-oriented context, path segments with more than one set of end nodes are affected simultaneously. Because the affected paths (more specifically here, the affected path segments) all have different intersecting nodes on the flow p-cycle, we get into the problem of “mutual capacity.” This is the fundamentally complicating aspect of efficient multi node-pair re-routing problems. Here we can see the issue manifest itself in FIG. 1(b). If span (7,2) fails, then only the flow segment for path (4-9) needs protection and it can obtain two protection paths from the cycle shown. But if span (6,7) fails, then access to the same flow p-cycle must be coordinated between the segments for paths (9-4) and (10-1), which fail simultaneously. This failure-specific way in which a given p-cycle can be used in different ways requires a new family of intermediate variables, which is not needed in the design of networks using basic span p-cycles. These are the variables ni,j r which denote number of unit-capacity copies of cycle j required to specifically restore the working flow for node pair r upon span failure i.
  • Flow-Protecting Design Model [0045]
  • We can now put together an integer linear programming (ILP) model for design of flow-protecting p-cycle networks. Because we are presently only introducing the concept we will consider the “non-joint” design case where working demands are first routed via their shortest paths, followed by optimization of the spare capacity for flow p-cycle placement. Similarly, the present model assumes “oeo” OXC nodes, or transparent optical cross-connects with a suitable pool of wavelength converters, so that regeneration and/or wavelength conversion needs can be assumed to be met as required at any node. The cost of this is assumed to be reflected in c[0046] k below. (The significance of these considerations is that the design model does not need to be burdened with simultaneously solving for explicit wavelength assignments and need consider only capacity-related costs). The parameters of the model are as follows. S is the set of spans in the network. Index i denotes spans specifically in a failure context, and k is used to index S in other general contexts. Di is the set of end-node pairs of paths affected by failure of span i, index r. P is set of all simple cycles of the graph that are candidates to become p-cycles, indexed by j. In practice P may be a limited set of candidate cycles that are eligible for use by virtue of limited circumference, hop count, or other engineering considerations. When needed to reduce computational difficulty, P may also be limited to containing only elite or highly promising candidate cycles. ck is the cost of adding a unit capacity (for instance an additional lightwave channel) to span k. ck values are pre-computed constants which may include considerations such as the type of facility involved, distance-related costs for using amplifiers, the cost of any o/e interfaces at the span terminating OXCs, and an amortized allocation of the OXC core costs and wavelength converter pool cost. dr is the number of demand units (for instance, lightpath requirements) on node pair r. As discussed above γi,j rε(0, 1, 2) encodes the basic topological relationships between each span failure i with respect to the protection relationship cycle j provides for paths on demand pair r. Finally δj,k=1 if cycle j includes span k, otherwise, 0.
  • The variables to be solved for are as follows: n[0047] j is the number of unit-capacity copies of cycle j to build, sk is the number of spare capacity units required on span k to support the set of flow p-cycles used and, as explained, ni,j r is a family of intermediate variables that consider the number of copies of cycle j that are needed specifically for protection of path r against failure i. All variables are non-negative integers, although it can be seen from the problem structure that spare capacity can be relaxed without loss of integrality. The model is:
  • Flow P-Cycles: [0048] Minimize k S c k s k ( 1 )
    Figure US20040109407A1-20040610-M00001
  • Subject To: [0049] j P γ i , j r · n i , j r d r i S ; r D i ( 2 ) n j r D i n i , j r i S ; j P ( 3 ) s k j P n j · δ j , k k S ( 4 )
    Figure US20040109407A1-20040610-M00002
  • The first constraint system asserts that affected working flows must be fully restored. The second says that the number of copies of cycle j to build is set by the largest failure-specific simultaneous use of unit copies of cycle j. This is like setting the spare capacity of a conventional span or path restorable mesh network to satisfy the largest simultaneously imposed set of restoration flows over the set of all non-simultaneous failure scenarios. The final constraint system says that the spare capacity on span k must be enough to support the number of copies of each p-cycle that overlies the span. [0050]
  • An important simplifying aspect to note about this model (relative to prior attempts at strictly path protecting p-cycles) is that it avoids explicit enumeration of the specific paths or path segments to be protected. Rather, the decisions about which protected path segments are defined come out implicitly from the choice of p-cycles that the solution employs. But since every span failure scenario is considered in the model, all spans (and hence all paths) wind up being implicitly protected end to end, but over one or more protected flow segments on each end-to-end path. This is the key sense in which the more general nature of the flow p-cycle paradigm overcomes the previous problems we mentioned in attempts to directly formulate end-to-end p-cycle path protection. [0051]
  • As an example, we present four test networks that have been used to obtain samples of flow p-cycle-based networks for analysis and evaluation. FIG. 3([0052] a) is a network referred to as NSFNET, and has N=14, S=22, and |P|=139. FIG. 3(b) is a network referred to as ARPA2, and has N=21, S=25, and |P|=18. FIG. 3(c) is a network referred to as SmallNet, and has N=10, S=22, and |P|=833. FIG. 3(d) is a network referred to as Bellcore, and has N=15, S=28, and |P|=976, where N is its number of nodes, S its number of spans and |P| is the complete number of distinct simple cycles on the graph. Each network has span distances assigned in proportion to the Euclidean distances of the span in the networks as drawn above. Except for Bellcore, demands were generated for all node pairs from a uniform random distribution on [1 . . . 20] and the design problems were solved to optimality in under 2 hours with AMPL/CPLEX 7.1 on an Ultrasparc Sun Server at 450 MHz with 4 GB of RAM. The same demand generating procedure was used to create the Bellcore test case but only 50% of node pairs exchange non-zero demand quantities. The Bellcore solution required about a day and was solved to within 1.34% gap to optimality. The run times, however, can be improved by applying pre-selection strategies or other heuristics in general if warranted.
  • For comparative reference on each test network, optimal span-protection (SP) p-cycle designs, span-restorable (SR) mesh network designs as well as path-restoration designs with and without stub release were also produced for comparison. Notably the SP p-cycle reference designs here were actually produced with the flow p-cycles model by simply defining and equivalent demand matrix having non-zero values only between directly connected node pairs. The span- and path-restorable mesh reference designs were produced by known methods. The reference problems all solved in seconds or minutes at most. [0053]
  • Table 1 summarizes aspects of the results. For each test network, [0054] column 1 describes the span-protecting (SP) p-cycle designs, column 2 details the SR mesh designs and column 3 is for the flow p-cycle designs. Columns 4 and 5 are results for path restorable designs (PR) without, and with, stub release, respectively. (The sequence reflects the theoretically expected ranking in terms of increasing efficiency). All designs for each network have the identical working capacity and demand routing. The first row records the total spare capacity relative to the SP p-cycle design needed for 100% restorability against all single span failures. The next row shows the total design capacity cost relative to the SP p-cycle design. The third row shows the corresponding redundancy ratio of the overall network designs. This is followed by indication of the 1/(d−1) lower bound for SR mesh, for interpretive reference. The next row records, for the p-cycle designs, the number of distinct cycles on which p-cycles were formed. Below this is a characteristic measure for each scheme of the average number of reconfiguration actions involved for each span failure. For SR and PR mesh designs it is the average number of restoration paths per failure. For SP p-cycles, it is the average number of p-cycles switching per failure, and for flow p-cycles it is the average number of flow segments deviated onto p-cycles to protect against each span failure.
  • Interpretation of Results and Significance [0055]
  • The results show that the flow p-cycle method can yield significant reductions in spare capacity requirement relative to the SP p-cycle architectures, ranging from 12 to 25% on the first three networks. The performance differences over the test networks are related to the different network average nodal degrees, d. 1/(d−1) is a practical lower bound on redundancy for any span restoration scheme, and hence also for SP p-cycles, but notably here, we see the flow p-cycle designs edging very close or even below that bound, justifying their classification as a kind of path-restoration scheme. [0056]
  • Other diagnostic results indicate that a design based solely on flow p-cycles may have more distinct p-cycle structures than in SP p-cycle designs, although the differences are not more than twice and one test case (ARPA2) required only eight flow p-cycles whereas nine SP p-cycles were otherwise required. [0057]
  • Operational Aspects [0058]
  • Here we explain at least one scheme by which the flow p-cycle protection is put into effect in real time in reaction to a span failure, and shown pictorially in FIG. 4. We assume that p-cycles would be formed and sustained by OXC nodes under central control to connect the required spare wavelength channels together to create the desired set of p-cycles. At the time a p-cycle j is established through a node x, a list of the corresponding protected flow segments that intersect the cycle at that node is recorded in association with the p-cycle. The Signal_ID of the working path of which the p-cycle protects a segment is also recorded at the node for each span (as a possible failure) on the flow segment. In effect this data sets up matching conditions for node x to know locally which working signals (if any) it should switch into p-cycle j, depending on which span fails on any of the flow segments passing through it. [0059]
  • Upon failure, node x is either adjacent to the failure, in which case it sees LoS (loss of signal), or AIS (alarm indication signal) inserted downstream by the two nodes adjacent to the failure. All working signals bear a unique Signal_ID in their overheads and any time a node inserts AIS, it appends the ID of the incident span that has failed. Thus, at propagation speeds, the failure indication data {AIS, Signal_ID=Z, Span_ID=k} passes through all nodes on the failed path. But only node x will have been “pre-wired” with the matching conditions to associate Signal_ID=Z with locally accessible p-cycle j if an indication of its failure arrives, arising from span k. Thus a logical matching rule can be applied at any node seeing an AIS indication to quickly determine if it has a custodial responsibility to do protection switching for the failed signal. At node y, the Signal_ID is again matched, and the signal is switched off the p-cycle. [0060]
  • Simplified Applications of the General Concept [0061]
  • While it is a useful advance to understand the fully general model of flow-protecting p-cycles, the complexity may be judged higher than desired from a near-term operational standpoint. But an appreciation of the concept actually suggests some simpler specific adaptations of flow p-cycles that may be more practically manageable and useful. One of these is to only consider the use of flow p-cycles only for the important express flows through a network region. Conceptually one can picture an overall network design comprised in part of a set of simple fast-acting “local” span-protecting p-cycles. Logically overlaid on this is a select set of “express flow” protecting flow p-cycles. A particular economic advantage of this selective use of a few flow p-cycles is that the express flows they protect may take advantage of long-reach optical technology for optical bypass of all intermediate nodes on the protected flow segment. This allows the express flow signals to remain in the optical domain through the entire region, but remaining protected, saving considerably over the alternative of terminating on each OXC en route. [0062]
  • Closely related to this idea is the even more specific proposal of an area-boundary flow-protecting p-cycle. This is in the context of multi-domain optical networking. The idea is that within a domain, any local protection schemes could be used, but flows traveling entirely through the domain are protected by a domain perimeter flow p-cycle. The primary advantages of this would again be optical bypass savings and the simplicity of separating all transit flow considerations from the protection of intra-domain flows. The concept is summarized in FIG. 5, where closed loop E represents the flow-protecting p-cycle, or a regional flow protecting p-cycle and L represents the span-protecting p-cycles or local span protecting p-cycles for the network N consisting of OXC nodes. In a long-haul network the “diameter” of the express flow-protecting p-cycles may match the transparent optical reach limit of the path segments involved so wavelength conversion and regeneration can be provided at the flow p-cycle nodes only, with all-optical transmission on the protected path segments. [0063]
  • Pre-Selection and Joint Optimization Considerations [0064]
  • The design of the flow-protecting p-cycles can be improved by using a pre-selection strategy, which also makes solving the joint optimization problem feasible. [0065]
  • The aspect of jointness in a p-cycle design problem will now be discussed. The issue is that one can either first route the working demands via shortest paths (or any other means) and then solve a corresponding minimum spare capacity allocation problem (the non-joint problem), or, attempt to optimize the choice of working routes in conjunction with the placement of spare capacity together (i.e., jointly) to minimize total capacity (the joint problem). An example of the effect of solving the joint problem is shown in FIGS. [0066] 6(a) and (b). Network 60 is shown with flow 62 representing 2 units of capacity 2λ, and p-cycle 64 consisting of spans 101-106. In FIG. 6(a), flow 62 passes through spans 101 and 102, while in FIG. 6(b), flow 66 passes through spans 107 and 108. In FIG. 6(a), p-cycle 64 requires 2 units of spare capacity on spans 101-106, while FIG. 6(b) reduces the units of space capacity required for p-cycle 64 to one unit on spans 101-106 by increasing the length of the path of the working flow from 2 to 2+ε. Together these figures show how potentially advantageous it can be in terms of total capacity reduction, if the right choices of working path routing can be made, in conjunction with p-cycle placement choices, so as to realize the kind of savings evident in the example of FIGS. 6(a) and (b).
  • A flow chart showing an example of how the non-joint problem is solved is shown in FIG. 7([0067] a), where the first step in 202 is to route all lightpath requirements via the shortest path. Step 204 follows from this in defining all working paths and working capacities. To solve for the required p-cycles and spare capacity in 212, one can either enumerate all graph cycles as possible p-cycles in 206 and then use an ILP solution for p-cycle formation in 208, or one can use another heuristic algorithm(s) for p-cycle formation in 210. This process can be contrasted with the flow chart in FIG. 7(b), where the first steps 220 and 222 are to enumerate eligible working routes and enumerate graph cycles as potential p-cycles, respectively. These two sets are combined and solved in a single ILP solution in 224, from which the p-cycles and spare capacity are defined in 226, and the working routes and capacity are defined in 228.
  • To reduce the complexity of solving optimal p-cycle design problems, a scoring credit can be used, which considers not only topology information, but also the traffic demands of the flows that are potentially protected by the cycle. The definition is given as follows: [0068] r D , i S r l r · g r · γ i , j r k P ( j ) c k = credit of cycle j P ( 5 )
    Figure US20040109407A1-20040610-M00003
  • where D is set of nonzero demand pairs (i.e., flows) on the traffic matrix, indexed by r. S[0069] r is set of spans traversed by the working path between demand pair r. Here we assume there is only a single shortest working path existing between each demand pair. P(j) denotes cycle j in cycle set P. k enumerates spans on cycle P(j) and ck represents the unit cost of span k. As an example, the Euclidean distance of spans between the nodes they connect can be used to represent the span cost, ck. γi,j r is as already defined, now applied to flows rather than spans, and gr denotes number of traffic demand units of the working flow between demand pair r. lr is the length of the working flow of demand pair r. Note that the purpose of weighting the above two terms is to assign a larger scoring credit to a cycle that can potentially protect “thicker” and “longer” flows (i.e., the larger the product of gr and lr is the more important the corresponding flow is to overall design efficiency.)
  • Other methods of ranking the candidate cycles may also be used, such as methods that focus strictly on topology of the network and do not consider traffic flows. For example, by removing g[0070] r and lr from equation 5, we leave γi,j r as the only term being summed in the numerator, and obtain a topological score that can rank the cycles. The equation then becomes: r D , i S r γ i , j r k P ( j ) c k = credit of cycle j P ( 6 )
    Figure US20040109407A1-20040610-M00004
  • The preceding example is to show that other combinations of variables that describe a network may be combined by those skilled in the art to obtain a ranked list of cycles in a network. The equation may be modified according to the situation that the invention is to be applied, where some factors may have more of an effect on the overall cost or efficiency. [0071]
  • The set of cycles are ranked according to their score, and highest ranked cycles can be pre-selected as candidate cycles for the rest of the problem. While the pre-selection criteria is effective in predicting the success of a particular cycle, it is possible have “too elite” a population of candidate cycles and it may be desirable to dilute the population with a few other types of candidates. The basic framework is one within which many specific heuristic ideas can be tried, all having to do with defining the reduced set of elite cycles to consider. First, some experience with memory and run times may show, for example, that a budget of 10,000 cycles is realistic to work with. The budget can be used up representing any number of mixed strategies for populating the elite P set. [0072]
  • An example could be: [0073]
  • Admit the 5,000 cycles found by the score-based selection above. [0074]
  • Add the 2,000 cycles with most absolute number of straddling path segments. [0075]
  • Add the 2,000 of the longest cycles. [0076]
  • Add 1,000 random cycles. [0077]
  • By itself the first set of cycles may not necessarily ensure feasibility. When choosing only individually elite cycles, there is no strict guarantee that a cycle will be represented that would cover, for example, a very long degree-2 chain connected to an otherwise highly connected mesh. However, cycles in batch three above definitely cover that eventuality. [0078]
  • Once the set of candidate cycles of the network graph have been characterized in this way, the problem can be solved using, for example, an integer linear programming (ILP) formulation, where the objective function minimizes the total cost of spare capacity and (for the joint problem) working capacity. ILP formulations are well known in the art and need not be further described here. This function is subject to: [0079]
  • A. All lightpath requirements are routed. [0080]
  • B. Enough WDM channels (or working channels in general) are provided to accommodate the routing of lightpaths in A. [0081]
  • C. The selected set of p-cycles give 100% span protection. [0082]
  • D. Enough spare channels are provided to create the p-cycles needed in C. [0083]
  • E. Integer p-cycles decision variables and integer capacity. [0084]
  • Applying the pre-selection criteria can be particularly useful in the joint optimization problem, where the formulation generates large problem files that can be difficult to solve optimally if there is no pre-selection. [0085]
  • Two points concerning the impact and relevance of the invention can be noted. Firstly, we note that, in general, the joint p-cycle design is as efficient as previously studied dynamic path-restorable designs in other studies to date. Such high efficiency is a direct benefit in terms of reduced cost or greater revenue from the same facilities, but an efficient network is also inherently a more flexible network because less of its resources are tied up for protection. Secondly, the simple process of pre-selecting candidate p-cycles greatly reduces p-cycle solution times so much that it may be practical to continually re-compute the optimal p-cycle configuration on-line as the network demand pattern evolves. This helps greatly to remove some prior objections to the practicality of p-cycle based networks and enables the vision of a continually adapting background layer of p-cycles. [0086]
  • Immaterial modifications may be made to the embodiments described in this disclosure without departing from the invention. [0087]
    TABLE 1
    Summary of Results
    NSFNET ARPA2
    1 2 3 4 5 1 2 3 4 5
    Spare 1 96.7% 75.3% 72.5% 60.0% 1 94.1% 88.9% 71.4% 67.7%
    capacity
    Norm. total 1 98.7% 90.5% 89.5% 84.7% 1 96.8% 94.0% 84.6% 82.6%
    cost
    Redundancy 62.1% 60.0% 46.8% 45.0% 37.2% 117.0% 110.2% 104.1% 83.6% 79.3%
    1/(d-1) 0.500 0.724
    Num. of p-cycles 10 22 9 8
    chosen
    Ave. num. of 7 4 22 12 12 5 3 31 30 31
    paths/cycles/
    segs. per failure
    Constraints 42 441 2502 615 50 625 1202 1325
    Variables 160 1354 17590 11213 43 219 13129 7134
    SmallNet Bellcore
    1 2 3 4 5 1 2 3 4 5
    Spare 1 97.5% 78.6% 74.5% 68.8% 1 92.0% 91.7% 76.1% 73.6%
    capacity
    Norm. total 1 99.3% 93:6% 92.4% 90.7% 1 97.4% 97.3% 92.1% 91.3%
    cost
    Redundancy 42.3% 41.2% 33.2% 31.5% 29.1% 49.2% 45.3% 45.1% 37.5% 36.2%
    1/(d-1) 0.294 0.366
    Num. of p-cycles 9 14 14 25
    chosen
    Ave. num. of 7 7 9 8 7 8 5 17 7 10
    paths/cycles/
    segs. per failure
    Constraints 44 484 18419 533 53 781 16127 789
    Variables 855 6382 59998 20042 1004 9929 76383 46809

Claims (28)

What is claimed is:
1. A telecommunications network, comprising:
plural nodes connected by plural spans and arranged to form a mesh network;
at least one pre-configured cycle of spare capacity being established in the mesh network, the pre-configured cycle including plural nodes of the mesh network; and
the plural nodes of the pre-configured cycle being configured to protect at least one path segment, where the path segment includes at least two intersecting nodes within the pre-configured cycle and at least one intermediate node in a path that includes the two intersecting nodes and straddles the pre-configured cycle.
2. The telecommunications network of claim 1 in which the path segments are segments of a working path with a start node not connected to the pre-configured cycle.
3. The telecommunications network of claim 1 in which the path segments are segments of a working path with an end node not connected to the pre-configured cycle.
4. The telecommunications network of claim 1 in which the pre-configured cycle of spare capacity is provided by:
a) identifying all working flows in the mesh network to be restored;
b) identifying the spare capacity of the pre-configured cycle to restore all working flows for all spans subject to failure in all path segments;
c) providing spare capacity along the pre-configured cycle sufficient to restore all working flows.
5. The telecommunications network of claim 1 in which establishing a pre-configured cycle comprises the steps of:
pre-selecting a set of candidate cycles for forming into pre-configured cycles;
allocating working paths and spare capacity in the mesh network based on the set of candidate cycles; and
providing the mesh network with spare capacity arranged in pre-configured cycles according to the allocation determined in the preceding step.
6. The telecommunications network of claim 5 in which the allocation of working paths and spare capacity is jointly optimized.
7. The telecommunications network of claim 5 in which pre-selecting candidate cycles includes ranking a set of closed paths in the mesh network according to the degree to which each closed path protects spans on and off the closed path, and selecting candidate cycles from the set of closed paths.
8. The telecommunications network of claim 7 in which pre-selecting candidate cycles comprises:
a) determining a scoring credit for each closed path in the set of closed paths, where the scoring credit of said closed path is calculated to predict the success of the closed path as a pre-configured cycle; and
b) choosing a select number of closed paths based on the scoring credit to be the pre-selected candidate cycles.
9. The telecommunications network of claim 8 in which the scoring credit is calculated by increasing said scoring credit by a value for each flow within said closed path that is protected by said closed path, increasing said scoring credit by a larger value for each flow not on said closed path that is protected by said closed path, weighting the value provided by each flow according to the traffic along said each flow and the length of each flow, and taking the ratio of said scoring credit with the cost of said closed path.
10. The telecommunications network of claim 5 in which a mixed selection strategy is used for pre-selecting candidate cycles.
11. The telecommunications network of claim 1 in which establishing the pre-configured cycle comprises recording at a node on a pre-configured cycle an identification of protected flow paths that pass through the node and are protected by the pre-configured cycle.
12. The telecommunications network of claim 11 in which protecting a path segment comprises, upon failure of a span in a protected flow path, the node, at which the identification of the protected flow paths is recorded, routing the telecommunications traffic along the pre-configured cycle.
13. The telecommunications network of claim 4 where the path segment is part of a path of an express flow through a network region.
14. The telecommunications network of claim 4 where the pre-configured cycle is an area boundary flow protecting p-cycle.
15. A method of operating a telecommunications network, the telecommunications network comprising plural nodes connected by plural spans and arranged to form a mesh network, the method comprising the steps of:
establishing at least one pre-configured cycle of spare capacity in the mesh network, the pre-configured cycle including plural nodes of the mesh network; and
configuring the plural nodes of the pre-configured cycle to protect at least one path segment, where the path segment includes at least two intersecting nodes within the pre-configured cycle and at least one intermediate node in a path that includes the two intersecting nodes and straddles the pre-configured cycle.
16. The method of claim 15 in which the path segments are segments of a working path with a start node not connected to the pre-configured cycle.
17. The method of claim 15 in which the path segments are segments of a working path with an end node not connected to the pre-configured cycle.
18. The method of claim 15 in which the pre-configured cycle of spare capacity is provided by:
a) identifying all working flows in the mesh network to be restored;
b) identifying the spare capacity of the pre-configured cycle to restore all working flows for all spans subject to failure in all path segments;
c) providing spare capacity along the pre-configured cycle sufficient to restore all working flows.
19. The method of claim 15 in which establishing a pre-configured cycle comprises the steps of:
pre-selecting a set of candidate cycles for forming into pre-configured cycles;
allocating working paths and spare capacity in the mesh network based on the set of candidate cycles; and
providing the mesh network with spare capacity arranged in pre-configured cycles according to the allocation determined in the preceding step.
20. The method of claim 19 in which the allocation of working paths and spare capacity is jointly optimized.
21. The method of claim 19 in which pre-selecting candidate cycles includes ranking a set of closed paths in the mesh telecommunications network according to the degree to which each closed path protects spans on and off the closed path, and selecting candidate cycles from the set of closed paths.
22. The method of claim 21 in which pre-selecting candidate cycles comprises:
a) determining a scoring credit for each closed path in the set of closed paths, where the scoring credit of said closed path is calculated to predict the success of the closed path as a pre-configured cycle; and
b) choosing a select number of closed paths based on the scoring credit to be the pre-selected candidate cycles.
23. The method of claim 22 in which the scoring credit is calculated by increasing said scoring credit by a value for each flow within said closed path that is protected by said closed path, increasing said scoring credit by a larger value for each flow not on said closed path that is protected by said closed path, weighting the value provided by each flow according to the traffic along said each flow and the length of each flow, and taking the ratio of said scoring credit with the cost of said closed path.
24. The method of claim 19 in which a mixed selection strategy is used for pre-selecting candidate cycles.
25. The method of claim 15 in which establishing the pre-configured cycle comprises recording at a node on a pre-configured cycle an identification of protected flow paths that pass through the node and are protected by the pre-configured cycle.
26. The method of claim 25 in which protecting a path segment comprises, upon failure of a span in a protected flow path, the node, at which the identification of the protected flow paths is recorded, routing the telecommunications traffic along the pre-configured cycle.
27. The method of claim 18 where the path segment is part of a path of an express flow through a network region.
28. The method of claim 18 where the pre-configured cycle is an area boundary flow protecting p-cycle.
US10/620,302 2002-12-05 2003-07-14 Path segment protecting p-cycles Abandoned US20040109407A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/620,302 US20040109407A1 (en) 2002-12-05 2003-07-14 Path segment protecting p-cycles
US13/663,426 US9191270B2 (en) 2002-12-05 2012-10-29 Path segment protecting p-cycles

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US43093102P 2002-12-05 2002-12-05
US10/620,302 US20040109407A1 (en) 2002-12-05 2003-07-14 Path segment protecting p-cycles

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/663,426 Continuation US9191270B2 (en) 2002-12-05 2012-10-29 Path segment protecting p-cycles

Publications (1)

Publication Number Publication Date
US20040109407A1 true US20040109407A1 (en) 2004-06-10

Family

ID=32507658

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/613,531 Expired - Fee Related US9025464B2 (en) 2002-12-05 2003-07-02 Method for design of networks based on p-cycles
US10/620,302 Abandoned US20040109407A1 (en) 2002-12-05 2003-07-14 Path segment protecting p-cycles
US13/663,426 Expired - Fee Related US9191270B2 (en) 2002-12-05 2012-10-29 Path segment protecting p-cycles

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/613,531 Expired - Fee Related US9025464B2 (en) 2002-12-05 2003-07-02 Method for design of networks based on p-cycles

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/663,426 Expired - Fee Related US9191270B2 (en) 2002-12-05 2012-10-29 Path segment protecting p-cycles

Country Status (2)

Country Link
US (3) US9025464B2 (en)
CA (2) CA2434115A1 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040098503A1 (en) * 2002-11-20 2004-05-20 Zheng Zhang Method and apparatus for generating a routing table
US20050169196A1 (en) * 2004-01-30 2005-08-04 Tamra Carpenter Method and system for design and routing in transparent optical networks
US20050195739A1 (en) * 2004-02-23 2005-09-08 Grover Wayne D. Protecting a network using protected working capacity envelopes
US20060164976A1 (en) * 2004-12-22 2006-07-27 Grover Wayne D Failure independent path protection with p-cycles
US20070052705A1 (en) * 2004-10-08 2007-03-08 Oliveira Joseph S Combinatorial evaluation of systems including decomposition of a system representation into fundamental cycles
US7224897B1 (en) * 2003-04-28 2007-05-29 Lucent Technologies Inc. Method of preconfiguring optical protection trails in a mesh-connected agile photonic network
CN1330129C (en) * 2004-09-23 2007-08-01 上海交通大学 Network protective method based on multiple volume preset protective ring
US20090161536A1 (en) * 2007-09-04 2009-06-25 Telecommunications Research Laboratories SELF-FAULT ISOLATION IN TRANSPARENT p-CYCLE NETWORKS
US20090201804A1 (en) * 2008-02-12 2009-08-13 Pravin Kumar Johri Restoring aggregated circuits with circuit integrity checks in a hierarchical network
US20100039934A1 (en) * 2006-10-31 2010-02-18 Mcguire Alan In-layer ethernet p-cycle protection scheme
US7969862B1 (en) * 2003-03-04 2011-06-28 Ciena Corporation Cycle-based restoration in mesh networks utilizing bandwidth and flow considerations
US20130083652A1 (en) * 2011-09-29 2013-04-04 Electronics And Telecommunications Research Institute Apparatus and method of shared mesh protection switching
CN103490810A (en) * 2013-10-14 2014-01-01 重庆邮电大学 Wavelength conversion range limited 2-hop-segment-based dynamic optical multicast P-ring segment protection method
US20140365664A1 (en) * 2009-07-31 2014-12-11 Wai-Leong Yeow Resource allocation protocol for a virtualized infrastructure with reliability guarantees
CN109831380A (en) * 2019-02-25 2019-05-31 国网江苏省电力有限公司苏州供电分公司 A kind of path protecting method of energy communication service
US10680877B2 (en) * 2016-03-08 2020-06-09 Beijing Jingdong Shangke Information Technology Co., Ltd. Information transmission, sending, and acquisition method and device

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2434115A1 (en) 2002-12-05 2004-06-05 Telecommunications Research Laboratories Method for design of networks based on p-cycles
US7853671B2 (en) * 2006-07-31 2010-12-14 At&T Intellectual Property I, L.P. System and method for performing a comprehensive comparison of system designs
US8811212B2 (en) * 2012-02-22 2014-08-19 Telefonaktiebolaget L M Ericsson (Publ) Controller placement for fast failover in the split architecture
US9007892B2 (en) * 2012-10-26 2015-04-14 Futurewei Technologies, Inc. Apparatus and method to find partially disjoint routes for dual fiber-cuts
US9736558B2 (en) * 2014-01-17 2017-08-15 Cisco Technology, Inc. Optical path fault recovery

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4956835A (en) * 1987-11-06 1990-09-11 Alberta Telecommunications Research Centre Method and apparatus for self-restoring and self-provisioning communication networks
US5093824A (en) * 1990-03-27 1992-03-03 Bell Communications Research, Inc. Distributed protocol for improving the survivability of telecommunications trunk networks
US5146452A (en) * 1990-10-26 1992-09-08 Alcatel Network Systems, Inc. Method and apparatus for rapidly restoring a communication network
US5239537A (en) * 1990-10-17 1993-08-24 Nec Corporation Packet-switched network having alternate virtual paths
US5436615A (en) * 1993-12-02 1995-07-25 The Babcock & Wilcox Company Overflow detection system
US5513345A (en) * 1994-03-18 1996-04-30 Fujitsu Limited Searching system for determining alternative routes during failure in a network of links and nodes
US5537532A (en) * 1993-10-07 1996-07-16 British Telecommunications Public Limited Company Restoration in communications networks
US5850505A (en) * 1995-10-31 1998-12-15 Telecommunications Research Laboratories Method for preconfiguring a network to withstand anticipated failures
US5999286A (en) * 1997-01-09 1999-12-07 Alcatel Method and system for restoring a distributed telecommunications network
US6052796A (en) * 1997-06-30 2000-04-18 Mci Communications Corporation Method and system for augmenting communications network with spare capacity
US6324162B1 (en) * 1998-06-03 2001-11-27 At&T Corp. Path-based restoration mesh networks
US6331905B1 (en) * 1999-04-01 2001-12-18 The Trustees Of Columbia University In The City Of New York Network switch failure restoration
US6377543B1 (en) * 1997-08-13 2002-04-23 Telecommunications Research Laboratories Path restoration of networks
US6404734B1 (en) * 1998-10-06 2002-06-11 Telecommuncations Research Laboratories Scalable network restoration device
US20020071392A1 (en) * 2000-10-25 2002-06-13 Telecommunications Research Laboratories, An Alberta Corporation Design of a meta-mesh of chain sub-networks
US6421349B1 (en) * 1997-07-11 2002-07-16 Telecommunications Research Laboratories Distributed preconfiguration of spare capacity in closed paths for network restoration
US20020181393A1 (en) * 2001-03-15 2002-12-05 Grover Wayne D. Method of providing restoration routes in a mesh network
US6760302B1 (en) * 1996-12-20 2004-07-06 The Trustees Of Columbia University In The City Of New York Automatic protection switching system in a network
US6982951B2 (en) * 2000-12-21 2006-01-03 At&T Corp. Method for selecting a restoration path in a mesh network

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5463615A (en) 1994-07-07 1995-10-31 At&T Corp. Node failure restoration tool
CA2228294C (en) 1995-08-07 2001-10-09 British Telecommunications Public Limited Company Route finding in communications networks
DE69613128T2 (en) 1995-08-07 2001-11-29 British Telecomm SEARCHING IN COMMUNICATION NETWORKS
US5590119A (en) * 1995-08-28 1996-12-31 Mci Communications Corporation Deterministic selection of an optimal restoration route in a telecommunications network
JPH1168750A (en) * 1997-08-22 1999-03-09 Nec Corp Network management system
US6038044A (en) * 1998-02-20 2000-03-14 Mci Communications Corporation Ring/mesh optical network
CA2285101A1 (en) 1998-10-08 2000-04-08 Wayne D. Grover Integrated ring-mesh network
US6549815B1 (en) * 1999-03-02 2003-04-15 Yamaha Hatsudoki Kabushiki Kaisha Method and apparatus for optimizing overall characteristics of device, using heuristic method
CA2269649A1 (en) 1999-04-22 2000-10-22 Telecommunications Research Laboratories Protection of routers in a telecommunications network
US6819662B1 (en) * 1999-04-29 2004-11-16 Telecommunications Research Laboratories Method for protecting a telecommunications network
CA2307520A1 (en) 1999-04-29 2000-10-29 Telecommunications Research Laboratories Method for protecting a telecommunications network
CA2339716A1 (en) 2000-03-29 2001-09-29 Nortel Networks Limited Two stage, hybrid logical ring protection with rapid path restoration over mesh networks
US6795394B1 (en) 2000-04-26 2004-09-21 Nortel Networks Limited Data network having enhanced availability of extra traffic
US20020004843A1 (en) * 2000-07-05 2002-01-10 Loa Andersson System, device, and method for bypassing network changes in a routed communication network
US7075892B2 (en) * 2000-11-03 2006-07-11 Telecommunications Research Laboratories Topological design of survivable mesh-based transport networks
US7133410B2 (en) * 2001-02-12 2006-11-07 Tellabs Operations, Inc. Method and system for designing ring-based telecommunications networks
CA2371432A1 (en) * 2001-02-13 2002-08-13 Telecommunications Research Laboratory Restoration of ip networks using precalculated restoration routing tables
US6850705B2 (en) * 2001-03-17 2005-02-01 Fujitsu Limited Online distributed path routing method and system
US20030067648A1 (en) * 2001-04-06 2003-04-10 Roman Antosik Optical maintenance signaling in optical data networks
CA2392123A1 (en) 2001-06-28 2002-12-28 Telecommunications Research Laboratories Evolution of a telecommunications network from ring to mesh structure
US20030055918A1 (en) * 2001-07-14 2003-03-20 Zimmel Sheri L. Apparatus and method for optimizing telecommunication network design using weighted span classification for high degree of separation demands
US7362974B2 (en) * 2001-11-30 2008-04-22 Pirelli & C. S.P.A. Method for planning or provisioning data transport networks
CA2434115A1 (en) 2002-12-05 2004-06-05 Telecommunications Research Laboratories Method for design of networks based on p-cycles

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4956835A (en) * 1987-11-06 1990-09-11 Alberta Telecommunications Research Centre Method and apparatus for self-restoring and self-provisioning communication networks
US5093824A (en) * 1990-03-27 1992-03-03 Bell Communications Research, Inc. Distributed protocol for improving the survivability of telecommunications trunk networks
US5239537A (en) * 1990-10-17 1993-08-24 Nec Corporation Packet-switched network having alternate virtual paths
US5146452A (en) * 1990-10-26 1992-09-08 Alcatel Network Systems, Inc. Method and apparatus for rapidly restoring a communication network
US5537532A (en) * 1993-10-07 1996-07-16 British Telecommunications Public Limited Company Restoration in communications networks
US5436615A (en) * 1993-12-02 1995-07-25 The Babcock & Wilcox Company Overflow detection system
US5513345A (en) * 1994-03-18 1996-04-30 Fujitsu Limited Searching system for determining alternative routes during failure in a network of links and nodes
US5850505A (en) * 1995-10-31 1998-12-15 Telecommunications Research Laboratories Method for preconfiguring a network to withstand anticipated failures
US6760302B1 (en) * 1996-12-20 2004-07-06 The Trustees Of Columbia University In The City Of New York Automatic protection switching system in a network
US5999286A (en) * 1997-01-09 1999-12-07 Alcatel Method and system for restoring a distributed telecommunications network
US6052796A (en) * 1997-06-30 2000-04-18 Mci Communications Corporation Method and system for augmenting communications network with spare capacity
US6421349B1 (en) * 1997-07-11 2002-07-16 Telecommunications Research Laboratories Distributed preconfiguration of spare capacity in closed paths for network restoration
US6377543B1 (en) * 1997-08-13 2002-04-23 Telecommunications Research Laboratories Path restoration of networks
US6324162B1 (en) * 1998-06-03 2001-11-27 At&T Corp. Path-based restoration mesh networks
US6404734B1 (en) * 1998-10-06 2002-06-11 Telecommuncations Research Laboratories Scalable network restoration device
US6331905B1 (en) * 1999-04-01 2001-12-18 The Trustees Of Columbia University In The City Of New York Network switch failure restoration
US20020071392A1 (en) * 2000-10-25 2002-06-13 Telecommunications Research Laboratories, An Alberta Corporation Design of a meta-mesh of chain sub-networks
US6982951B2 (en) * 2000-12-21 2006-01-03 At&T Corp. Method for selecting a restoration path in a mesh network
US20020181393A1 (en) * 2001-03-15 2002-12-05 Grover Wayne D. Method of providing restoration routes in a mesh network

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040098503A1 (en) * 2002-11-20 2004-05-20 Zheng Zhang Method and apparatus for generating a routing table
US7454520B2 (en) * 2002-11-20 2008-11-18 Hewlett-Packard Development Company, L.P. Method and apparatus for generating a routing table
US7969862B1 (en) * 2003-03-04 2011-06-28 Ciena Corporation Cycle-based restoration in mesh networks utilizing bandwidth and flow considerations
US7224897B1 (en) * 2003-04-28 2007-05-29 Lucent Technologies Inc. Method of preconfiguring optical protection trails in a mesh-connected agile photonic network
WO2005074498A3 (en) * 2004-01-30 2007-11-22 Telcordia Tech Inc Method and system for design and routing in transparent optical networks
US7286480B2 (en) * 2004-01-30 2007-10-23 Telcordia Technologies, Inc. Method and system for design and routing in transparent optical networks
WO2005074498A2 (en) * 2004-01-30 2005-08-18 Telcordia Technologies, Inc. Method and system for design and routing in transparent optical networks
US20050169196A1 (en) * 2004-01-30 2005-08-04 Tamra Carpenter Method and system for design and routing in transparent optical networks
US20050195739A1 (en) * 2004-02-23 2005-09-08 Grover Wayne D. Protecting a network using protected working capacity envelopes
CN1330129C (en) * 2004-09-23 2007-08-01 上海交通大学 Network protective method based on multiple volume preset protective ring
US20070052705A1 (en) * 2004-10-08 2007-03-08 Oliveira Joseph S Combinatorial evaluation of systems including decomposition of a system representation into fundamental cycles
US7394472B2 (en) * 2004-10-08 2008-07-01 Battelle Memorial Institute Combinatorial evaluation of systems including decomposition of a system representation into fundamental cycles
US20060164976A1 (en) * 2004-12-22 2006-07-27 Grover Wayne D Failure independent path protection with p-cycles
US9300526B2 (en) * 2004-12-22 2016-03-29 Telecommunications Research Laboratories Failure independent path protection with p-cycles
US8446815B2 (en) * 2004-12-22 2013-05-21 Telecommunications Research Laboratories Failure independent path protection with p-cycles
US20100039934A1 (en) * 2006-10-31 2010-02-18 Mcguire Alan In-layer ethernet p-cycle protection scheme
US8111613B2 (en) * 2006-10-31 2012-02-07 British Telecommunications Public Limited Company In-layer ethernet p-cycle protection scheme
US7852750B2 (en) 2007-09-04 2010-12-14 Grover Wayne D Self-fault isolation in transparent P-cycle networks
US20090161536A1 (en) * 2007-09-04 2009-06-25 Telecommunications Research Laboratories SELF-FAULT ISOLATION IN TRANSPARENT p-CYCLE NETWORKS
US7801024B2 (en) * 2008-02-12 2010-09-21 At&T Intellectual Property Ii, L.P. Restoring aggregated circuits with circuit integrity checks in a hierarchical network
US20090201804A1 (en) * 2008-02-12 2009-08-13 Pravin Kumar Johri Restoring aggregated circuits with circuit integrity checks in a hierarchical network
US9007890B2 (en) 2008-02-12 2015-04-14 At&T Intellectual Property Ii, L.P. Restoring aggregated circuits with circuit integrity checks in a hierarchical network
US20140365664A1 (en) * 2009-07-31 2014-12-11 Wai-Leong Yeow Resource allocation protocol for a virtualized infrastructure with reliability guarantees
US10057339B2 (en) * 2009-07-31 2018-08-21 Ntt Docomo, Inc. Resource allocation protocol for a virtualized infrastructure with reliability guarantees
US20130083652A1 (en) * 2011-09-29 2013-04-04 Electronics And Telecommunications Research Institute Apparatus and method of shared mesh protection switching
CN103490810A (en) * 2013-10-14 2014-01-01 重庆邮电大学 Wavelength conversion range limited 2-hop-segment-based dynamic optical multicast P-ring segment protection method
US10680877B2 (en) * 2016-03-08 2020-06-09 Beijing Jingdong Shangke Information Technology Co., Ltd. Information transmission, sending, and acquisition method and device
CN109831380A (en) * 2019-02-25 2019-05-31 国网江苏省电力有限公司苏州供电分公司 A kind of path protecting method of energy communication service

Also Published As

Publication number Publication date
US9025464B2 (en) 2015-05-05
CA2435193A1 (en) 2004-06-05
US9191270B2 (en) 2015-11-17
US20130114403A1 (en) 2013-05-09
US20040133663A1 (en) 2004-07-08
CA2434115A1 (en) 2004-06-05

Similar Documents

Publication Publication Date Title
US9191270B2 (en) Path segment protecting p-cycles
Shen et al. Extending the p-cycle concept to path segment protection for span and node failure recovery
US9300526B2 (en) Failure independent path protection with p-cycles
Grover et al. Advances in optical network design with p-cycles: Joint optimization and pre-selection of candidate p-cycles
US7719962B2 (en) Design of a meta-mesh of chain sub-networks
US6654379B1 (en) Integrated ring-mesh network
Huang et al. Pre-configured polyhedron based protection against multi-link failures in optical mesh networks
US7260059B2 (en) Evolution of a telecommunications network from ring to mesh structure
Li et al. Fiber span failure protection in mesh optical networks
Grover et al. Extending the p-cycle concept to path-segment protection
Datta et al. Diverse routing for shared risk resource groups (SRRG) failures in WDM optical networks
Grover et al. Span-restorable mesh networks with multiple quality of protection (QoP) service classes
Su et al. Protection path routing on WDM networks
Karasan et al. Design of translucent optical networks: Partitioning and restoration
Schupke et al. An efficient strategy for wavelength conversion in WDM p-cycle networks
Doucette et al. Shared-risk logical span groups in span-restorable optical networks: Analysis and capacity planning model
Ma et al. Pre-configured prism (p-Prism) method against simultaneous dual-link failure in optical networks
Wang et al. A new algorithm of design protection for wavelength-routed networks and efficient wavelength converter placement
Doucette et al. Failure-specific p-cycle network dual-failure restorability design
Akpuh et al. Enhanced failure-specific p-cycle network dual-failure restorability design and optimization
Mezhoudi et al. Integrating optical transport quality, availability, and cost through reliability-based optical network design
German et al. On the challenges of finding two link-disjoint lightpaths of minimum total weight across an optical network
Xue et al. On the partial path protection scheme for WDM optical networks and polynomial time computability of primary and secondary paths
Kumaran et al. Shared recovery in transparent optical networks
Boworntummarat et al. Using mesh and multi‐ring methods in the design of survivable wavelength‐routed all‐optical networks

Legal Events

Date Code Title Description
AS Assignment

Owner name: TELECOMMUNICATIONS RESEARCH LABORATORIES, CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GROVER, WAYNE D.;SHEN, GANXIANG;REEL/FRAME:014635/0861

Effective date: 20031001

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION