Multicast routing heuristic algorithms in non-splitting WDM networks
Abstract: Multicast at core WDM layer is known as the efficient way of communications to
perform data transmission from a source to several destinations. However, due to costly and
complicated fabrication of multicast capable switches, multicasting still partly leverages nonsplitting devices like TaC cross-connects. This paper investigates multicasting in such context
with the objective of minimizing the cost of using wavelengths in network links. Without
splitters, a set of light-spiders starting from the multicast source covering all the destinations
is known as the traditional solution. This paper argues that the exact solution for the problem
is a set of non-elementary spiders called light-spider hierarchies. Two efficient heuristic
algorithms are proposed to compute the light-spider hierarchies to illustrate our findings.
Trang 1
Trang 2
Trang 3
Trang 4
Trang 5
Trang 6
Trang 7
Trang 8
Trang 9
Tóm tắt nội dung tài liệu: Multicast routing heuristic algorithms in non-splitting WDM networks
very node (except the multicast source1) used in any light-structure should have a degree bounded by two. It is called the degree constraint. 3. Exact solutions Conventionally, the minimum cost multicast route corresponds to tree structure, since there is no redundant edge (arc) created. In non-splitting case, to guarantee this degree constraint, the solution should become a spider-like structure (a spider is a tree with at most one branch vertex [7]). Thus the solution for multicasting without splitters is conventionally a set of light-spiders. However, optical cross-connects allow light signals to be switched using input/output port pairs using a same wavelength as long as no collision occurs. In other words, nodes can be traversed more than once by a route using a wavelength. This makes it possible to realize non-elementary routes, as illustrated in Figure 2. Accordingly, three solutions for the request r=(s,{d1,d2}) on the same network condition are possible. Assume that every link is undirected and has unity cost (cost=1). Among possible solutions, light-spider (Fig. 2a) is an elementary route; whereas a set of light-paths (Fig. 2b) and a light-trail (Fig. 2c) which are examples of non-elementary routes. Obviously, in this context, non-elementary routes are preferred for the cost optimal solution than that of elementary one (light-spider). In the remainder of the paper, we call the mentioned non- elementary routes light-spider hierarchy, to distinguish them from elementary light-spider. With this in mind, Theorem 1 gives exact solutions for MCM problem. Figure 2. Different solutions for the multicast request r=(s,{d1,d2}) Theorem 1. The exact solutions for MCM problem is a set of light-spider-hierarchies. In the next two sections, two heuristic algorithms to compute the approximate solutions for the MCM problem are presented and evaluated. 1 Because optical networking allows nodes to be equipped with multiple transmitters, so the multicast source can inject the same wavelength to arbitrary number of successors. Hong Duc University Journal of Science, E.3, Vol.8, P (50 - 58), 2017 53 4. Heuristic algorithms In this section, we propose two efficient heuristic algorithms for MCM problem. 4.1. Notations The two proposed heuristic algorithms work on layered graph model [8] instead of topology graph. To support the description of the two heuristic algorithms, we define some used notations as follows. G'=(V',A'): the layered graph constructed from the topology graph G=(V,A). r'=(s',D'): the corresponding request of the original request r=(s,D) created in the layered graph. We call s' the source, and d' D’s ink in short. MC_SET: the set of copies of the original source s in all the layers. CONN_SET: the set of connectors, which can be used to grow the current hierarchy H. For the aforementioned degree constraint, not all the vertices in H but a subset of them can be used to grow the hierarchy. They include the s', copies of the original source s, MC_SET and leaf-nodes in H. SPT(c,D'): the shortest path tree from source c to set D'. P(u,v): the shortest path from u to v. pred(d'): the predecessor of sink d' D' in the shortest path from s' to a sink d'. 4.2. Nearest Destination First Algorithm Nearest Destination First (NDF) algorithm employs the basic idea of the Minimum Path Heuristic [6], which constructs an approximate Steiner tree from an initial vertex by iteratively adding a destination together with the shortest path (one at a time) until all the destinations reached. However, to satisfy the aforementioned degree constraint, MPH is modified in NDF heuristic to compute a valid route. Given a WDM network modeled by a topology graph G=(V,A), and a multicast request r=(s,D), NDF computes a minimum cost route for the corresponding request r'=(s',D') on layered graph G'=(V',A'). The algorithm returns a multicast route (hierarchy) H rooted at the source s' and spans the sinks D' = {d'1,d'2,.., d'D}. After pruning pseudo vertices and arcs from H, the resulting hierarchy H consists of a set of light-spider-hierarchies (LSHs). Each of these LSHs is located in a different layer, using a distinct wavelength. The description of NDF is given in the Algorithm 1. Initially, H consists of only the source s'. At each iteration, the algorithm searches for the nearest sink d' (line 11) from CONN_SET in the current hierarchy H to all the unreached sinks d' D'. This is done by gathering set CONN_SET as a virtual source c, and then creating a shortest path tree from c to the sinks in D' (line 7). Then the algorithm adds all vertices and arcs in the path P(c, pred(d')) to H, then removes the arcs in the path P(c,d') from the layered graph G', and update CONN_SET (lines 15-18). The algorithm terminates when there is no reachable destination remaining, or equivalently, H cannot be extended. To obtain the final multicast route, the final step prunes all the pseudo vertices (source and sinks) and the relevant pseudo arcs. The result is a set of LSHs routed at the source duplicates. Obviously, the Hong Duc University Journal of Science, E.3, Vol.8, P (50 - 58), 2017 54 resulting hierarchy respects all the aforementioned constraint. One example to illustrate the algorithm is shown in Figure 4. 4.3. Critical Destination First Algorithm NDF algorithm always chooses the nearest sink to extend the current hierarchy. However, there are cases in which this policy is not effective. Let us see Fig.4 for an example. The network is shown in Figure 4a, with the request r=(s, {d1, d2, d3}. The corresponding layered graph with attached link costs are shown in Figure 4b. According to NDF, the first sink should be d'3 with the shortest path computed in layer 1: (s',s1,21,41,51,d13,d'3) with length (cost) of 4. For the next iteration, only d'1 can be reached (through layer 2) with the corresponding shortest path (s',s2,12,42,62,d21,d'1) with length of 8. The algorithm terminates and d'2 is not routed (Fig.4c)!. Now we see that d'2 has a least number of incoming arcs (1 in this case). Naturally, it should be chosen first since it has the least probability to be routed. Suppose that we choose d'2 first, the corresponding shortest path is (s', s1, 21, 41, 51, d12, d'2) with the length of 5 is added to the hierarchy. To choose the next sink between d'1 and d'3, since they have the same number of incoming links, the nearest one from the current hierarchy should be chosen. So the next sink should be d'3, and the corresponding shortest path (d12,51,d13,d'3) with the length of 3. Finally, the last sink d'1and the shortest path (s', s2, 12, 42, 62, d21, d'1) with the length of 8 is added to the hierarchy, resulting in the solution that reaches all the sinks with total cost of 16 as shown in Figure 4d. Hong Duc University Journal of Science, E.3, Vol.8, P (50 - 58), 2017 55 From the above observation, it is more beneficial to give higher priority to the sinks with lower incoming degree when extending the current hierarchy. We call these sinks critical destinations, and the incoming degree critical degree, since the incoming degree of a sink indicates the reachability of it from the source s' (Fig.4b). The least critical degree sink is thus the most critical destination. This gives rise to the new policy, i.e., choosing the most critical destination first, and hence the name: Critical Destination First (CDF) heuristic. When there are multiple sinks having the same critical degree, the nearest one from the current hierarchy will be chosen first as in NDF. Basically, CDF has the same framework as NDF, except that instead of finding a nearest sink of D', CDF finds the most critical sink from D'. This difference leads to two other different points in the description of CDF algorithm. The first point comes from the possibility that the shortest path P(c,pred(d')) may contain destination duplicates which are associated with some sinks. If so, the corresponding sinks must be removed from D'. The second different point is that the algorithm should update the reachability of all the affected sinks whenever P(c,pred(d')) has been added. These points are dealt using efficient technique in implementation in such a way that the complexity of CDF is the same order as NDF. For space limit, however, the description of CDF and all technical details are omitted in this paper. (a) A network and request r = (s,{d1,d2,d3}) (b) Layered graph (c) NDF solution: is blocked! (d) CDF solution: all destinations are routed! Figure 4. Illustration of the two heuristics Hong Duc University Journal of Science, E.3, Vol.8, P (50 - 58), 2017 56 5. Performance evaluation 5.1. Performance metrics This work considers the case with arbitrary distribution of the wavelengths in the links. Hence, in the cases with limited available wavelengths, it is possible that not all the destinations routed for a given multicast request. Two blocking models are taken into account: full destination blocking and partial destination blocking [9]. Accordingly, under full destination blocking model, a multicast request is established if the source can reach to all the destinations. In this case, the appropriate metric to evaluate the solutions is the request blocking probability (RBP), i.e., the ratio of the number of requests blocked to the total number of requests arrived. For full destination blocking model, the destination blocking probability (DBP), i.e., the ratio between the destinations blocked and the total number of destinations of the request is calculated. 5.2. Simulation settings The simulations are run on random network topologies G= (V,A), with random distribution of wavelengths in each arc. |V| is chosen in (50,100,150), W = 10, and |D| varies in (10%, 20%; , 90%) of |V|. For each |D|, we run 1000 instances, then calculate the 95% confident intervals for all the mean values of the above-defined blocking probability metrics (DBP and RBP). 5.3. Results and discussion For space limit, only result for the case with |V|=100 is displayed in Figure 5, but the tendency is the same for the other cases. Among the algorithms, CDF-LSH outperforms the others when always achieving lowest DBP as well as RBP. NDF-LSH appears close to CDF- LSH on DBP but it is by far higher on RBP. Comparing LSH with LS solutions over all the conducted simulations, LSHs are always better than LSs whatever heuristics are employed. In particular, with NDF algorithm, NDF-LSH profits 4.5% (on average) lower on DBP, and 18% on RBP compared with NDF-LS. Similarly, the corresponding gains of 6.5% and 21.5% obtained when comparing CDF-LSH with CDF-LS. Especially, based on the same LSH solutions, CDF- LSH works better than NDF-LSH when achieving 18% lower RBP, 1% lower DBP. Figure 5. Performances of algorithms on 100-node random graphs with W= 10 Hong Duc University Journal of Science, E.3, Vol.8, P (50 - 58), 2017 57 In short, the LSH solutions are always better than LS counterparts; and the CDF algorithm outperforms NDF. The results are expected and explainable. On one hand, by permitting vertices to be visited more than once, LSH allows to make full use of all the available wavelengths in the links while respecting the three aforementioned constraints. Consequently, more destinations can be reached with a limited available links and wavelengths, it in turn results in better blocking probability. On the other hand, CDF gives high priority to the most critical destinations to extend the hierarchy. Naturally, the most critical destinations will not be abandoned whenever there is a chance. Meanwhile NDF always chooses the nearest one, which may leave some destinations unreached even if there are many other choices. 6. Conclusion The paper proposed two cost-effective heuristics for the MCM problem: Nearest Destination First and Critical Destination First. These algorithms aim at minimizing the total cost for a given multicast request under the arbitrary availability of wavelengths in non- splitting networks. The two algorithms are designed to compute minimum-cost light-spider hierarchies based on the auxiliary layered graph model. They are different in the way of choosing the candidate destinations. NDF always chooses the nearest destinations at each iteration, while CDF selects the critical destinations first. The performances of the two heuristics are compared with each other. They show that, taking the critical degree of the destinations into account, particularly choosing the most critical destination to route first, results in a better solution under arbitrary wavelength configuration. Once again, the simulation results confirm that light-spider-hierarchies outperform light-spiders counterpart in supporting multicast in non-splitting networks. References [1] M. Ali and J. S. Deogun (2000), Power-efficient design of multicast wavelength-routed networks, Selected Areas in Communications, IEEE Journal on, vol. 18, no. 10, pp. 1852 -1862. [2] M. Ali and J. S. Deogun (2000), Cost-effective implementation of multicasting in wavelength-routed networks, EEE/OSA Journal of Lightwave Technology, vol. 18, pp. 1628 -1638. [3] R. Libeskind-Hadas (2000), Efficient collective communication in WDM networks with a power budget, in Computer Communications and Networks, 2000. Proceedings. 9th International Conference on, pp. 612 -616. [4] S. Yan and J. Deogun (2003), Multi-drop path model for multicast routing and wavelength assignment, Information Sciences, vol. 149, no. 1, pp. 113 -134. [5] D.-R. Din (2009), Heuristic Algorithms for Finding Light-Forest of Multicast Routing on WDM Network, Information Science and Engineering, vol. 25, pp. 83 -103. Hong Duc University Journal of Science, E.3, Vol.8, P (50 - 58), 2017 58 [6] H. Takahashi and A. Matsuyama (1980), An approximate solution for the Steiner problem in graphs, Mathematica Japonica, vol. 24, pp. 573 -577. [7] L. Gargano, P. Hell, L. Stacho, and U. Vaccaro (2002), Spanning trees with bounded number of branch vertices, in Automata, Languages and Programming, pp. 355 -365, Springer. [8] C. Chen and S. Banerjee (1996), A new model for optimal routing and wavelength assignment in wavelength division multiplexed optical networks, in INFOCOM ’96. Fifteenth Annual Joint Conference of the IEEE Computer Societies. Networking the Next Generation. Proceedings IEEE, vol. 1, pp. 164 -171, March 1996. [9] Dinh Danh Le, Fen Zhou, and Miklos Molnar (2015), Minimizing Blocking Probability for MCRWA problem in WDM Networks: Exact Solutions and Heuristic Algorithms, Journal of Optical Communications and Networking (JOCN). Vol. 7, Iss. 1, pp. 36-48.
File đính kèm:
- multicast_routing_heuristic_algorithms_in_non_splitting_wdm.pdf