Design of Light-Tree Based Optical Inter-Datacenter Networks



Similar documents
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths

Performance advantages of resource sharing in polymorphic optical networks

Three Key Design Considerations of IP Video Surveillance Systems

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

PART III. OPS-based wide area networks

Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing

Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip

Performance Management and Fault Management. 1 Dept. of ECE, SRM University

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Course 12 Synchronous transmission multiplexing systems used in digital telephone networks

Scaling 10Gb/s Clustering at Wire-Speed

Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks*

SDH and WDM: a look at the physical layer

SDH and WDM A look at the physical layer

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

How To Provide Qos Based Routing In The Internet

Relationship between SMP, ASON, GMPLS and SDN

Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani

Leveraging Multipath Routing and Traffic Grooming for an Efficient Load Balancing in Optical Networks

SONET and DWDM: Competing Yet Complementary Technologies for The Metro Network

Airlift: Video Conferencing as a Cloud Service using Inter- Datacenter Networks

Performance of networks containing both MaxNet and SumNet links

Policy-Based Fault Management for Integrating IP over Optical Networks

Multi-protocol Label Switching

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks

Determine: route for each connection and protect them if necessary to minimize total network cost (say wavelength-links).

Capacity Allocation and Contention Resolution in a Photonic Slot Routing All-Optical WDM Mesh Network

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

Technical White Paper for Multi-Layer Network Planning

PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON

Facility Usage Scenarios

Maximizing Restorable Throughput in MPLS Networks Reuven Cohen, Senior Member, IEEE, and Gabi Nakibly, Member, IEEE

Communication Networks. MAP-TELE 2011/12 José Ruela

Interconnection Network Design

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

NEW applications of wireless multi-hop networks, such

All-optical fiber-optics networks

How To Understand The Concept Of Circuit Switching

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING

Data Center Network Structure using Hybrid Optoelectronic Routers

Leveraging Embedded Fiber Optic Infrastructures for Scalable Broadband Services

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Path Selection Analysis in MPLS Network Based on QoS

Optical Communication Networks. Transport networks

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA

Optical Layer Monitoring Schemes for Fast Link Failure Localization in All-Optical Networks

LOAD BALANCING IN WDM NETWORKS THROUGH DYNAMIC ROUTE CHANGES

Multiplexing. Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single physical medium.

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

Multiple Layer Traffic Engineering in NTT Network Service

Introduction to Optical Networks

Flexible SDN Transport Networks With Optical Circuit Switching

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

QoS issues in Voice over IP

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1

Network Simulation Traffic, Paths and Impairment

Optical interconnection networks with time slot routing

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

Dynamic Load Balancing in WDM Packet Networks With and Without Wavelength Constraints

Lightpath Planning and Monitoring

Asynchronous Bypass Channels

Choosing Tap or SPAN for Data Center Monitoring

Optical interconnection networks for data centers

Region 10 Videoconference Network (R10VN)

Network management and QoS provisioning - QoS in the Internet

David Tipper Graduate Telecommunications and Networking Program. Telcom 2110 Network Design, Slides 11. WAN Network Design

Index Terms Domain name, Firewall, Packet, Phishing, URL.

Sol: Optical range from λ 1 to λ 1 +Δλ contains bandwidth

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Computing Load Aware and Long-View Load Balancing for Cluster Storage Systems

Introduction to LAN/WAN. Network Layer

MAC Scheduling for High Throughput Underwater Acoustic Networks

Local-Area Network -LAN

What is this Course All About

What Applications Can be Deployed with Software Defined Elastic Optical Networks?

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks

IPv6 Broadband Access Network Systems

Circuit-Switched Router Connections Nathan J. Muller

PERFORMANCE AND EFFICIENCY EVALUATION OF CHANNEL ALLOCATION SCHEMES FOR HSCSD IN GSM

A Fast Path Recovery Mechanism for MPLS Networks

Latency on a Switched Ethernet Network

ASON for Optical Networks

Load Balancing and Switch Scheduling

Transcription:

Lin et al. VOL. 5, NO. 12/DECEMBER 2013/J. OPT. COMMUN. NETW. 1443 Design of Light-Tree Based Optical Inter-Datacenter Networks Rongping Lin, Moshe Zukerman, Gangxiang Shen, and Wen-De Zhong Abstract Nowadays, people s daily lives are increasingly dependent on Internet applications provided by cloud service providers that replicate their content among geographically distributed datacenters using interdatacenter wide area networks to meet performance and reliability requirements. This paper provides means for efficient design of inter-datacenter networks with static traffic scenarios, where unicast and multicast connection requests are known a priori along with their start and end times. Also, the optical channel setup/teardown time is given. Integer linear programming (ILP) formulations that consider light-tree and lightpath connections are developed to minimize the network resource consumption. Since solving ILP formulations is time consuming for large networks, we also propose efficient heuristic algorithms. We demonstrate by simulations an advantage in efficiency for a light-tree based heuristic algorithm over its lightpath counterpart. This is due to its ability to construct and extend light-trees to groom more connections. Both heuristic algorithms perform very close to the corresponding ILP optimal results in the case of a small network. Index Terms Integer linear programming (ILP); Interdatacenter network; Light-tree; Setup/teardown time. I. INTRODUCTION C isco s 2011 White Paper [1] predicts that cloud service providers (CSPs), such as Google, Facebook, Yahoo!, and IBM, will generate the most Internet traffic in the coming years. In particular, it is expected that during 2016 the total CSP traffic will be 6.6 zettabytes. By comparison, the total global IP traffic in 2016 (excluding CSP traffic) is around 1.3 zettabytes [1]. To meet the local performance and reliability requirement, CSPs replicate their contents among geographically distributed datacenters using wavelength division multiplexing (WDM) based inter-datacenter networks [2]. It is reported that a datacenter networking cost amounts to about 15% of the total cost Manuscript received July 12, 2013; revised September 6, 2013; accepted September 16, 2013; published November 27, 2013 (Doc. ID 193828). R. Lin (e-mail: linr0012@e.ntu.edu.sg) was with the EE Department, City University of Hong Kong, Hong Kong SAR, China, when this work was done, and he is now with the School of Communication and Information Engineering, University of Electronic Science and Technology of China (UESTC), Chengdu 611731, China. M. Zukerman is with the EE Department, City University of Hong Kong, Hong Kong SAR, China. G. Shen is with the School of Electronic and Information Engineering, Soochow University, Suzhou, Jiangsu 215006, China. W. D. Zhong is with the School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798. http://dx.doi.org/10.1364/jocn.5.001443 of the datacenter and that the cost of the wide area transport exceeds that of the internal network of a datacenter [3]. According to [4], global spending on datacenters will be $143 billion in 2013 and $149 billion in 2014. Therefore, the spending on inter-datacenter networks is likely to exceed $10 billion per year. Accordingly, an efficient design of inter-datacenter networks has the potential for significant cost savings. Efficient and cost-effective network design (and dimensioning) is dependent on accurate prediction of future traffic demand. However, due to the uncertainty of future traffic demand and growth trends, certain conservative estimations may be made, keeping in mind that they may lead to over-dimensioning, which implies excessive cost. If the actual traffic demand happens to be more than originally used in the design, traffic engineering and management techniques will be used to maximize throughput. However, the latter is beyond the scope of this paper. Currently, lightpaths are established to connect datacenters for end-to-end connections [2], where a lightpath is an all-optical channel from a source to a destination without any optical electronic optical (O-E-O) conversion at intermediate nodes [5]. The use of lightpaths is justified as they are far more efficient and energy conserving to transport the high bitrates required between datacenters in the optical domain than in the electronic domain [6,7]. In addition to one-to-one unicast connections, interdatacenter networks transport many one-to-many multicast connections due to growing multicast applications and content backup among datacenters. The light-tree is proposed to optimally support the multicast connections, where a light-tree is a generalization of a lightpath to be a tree topology, and traffic is sent from a root to all its associated leaves in the optical domain [8]. Light-trees can efficiently transmit multicast traffic without any O-E-O conversion process. However, to implement a light-tree in an optical network, network nodes with optical splitter deployments are needed. An optical splitter can split an optical signal into multiple copies in the optical domain, and power amplifiers are also needed to compensate for the power lost during the splitting. This implies that additional cost is incurred for a network to support light-trees. Fortunately, optical splitters and power amplifiers are relatively inexpensive, and it is believed that the benefit obtained from light-trees significantly offsets the additional cost of devices used by light-trees [8]. As inter-datacenter networks transport very large volumes of traffic associated with content replications among 1943-0620/13/121443-13$15.00/0 2013 Optical Society of America

1444 J. OPT. COMMUN. NETW./VOL. 5, NO. 12/DECEMBER 2013 Lin et al. geographically distributed datacenters, they require multicasting of very large bursts of data that distinguish them from traditional optical networks. This motivates the use of a light-tree to avoid excessive cost and energy consumption associated with O-E-O conversions. Also, inter-datacenter networks normally involve a smaller number of nodes than traditional networks, which makes inter-datacenter networks more amenable to design using mathematical programming algorithms. Moreover, a datacenter may have the ability to obtain information on the amount of data per connection it wishes to transport through the interdatacenter network. Having such information enables efficient utilization of inter-datacenter network resources. By comparison, in traditional networks, long-lived large bandwidth connections are set up to transport IP traffic generated by many sources between nodes/cities, and the amount of traffic is not known when the connection is set up. This may result in lower network resource utilization. This paper provides efficient algorithms for interdatacenter network design that is based on the configuration involving lightpaths and light-trees, and aims to minimize the required WDM transmission capacity. We consider only all-optical single-hop architectures, where only one lightpath (or light-tree) is used for any given connection. A. Related Work In [2], the bandwidth-on-demand (BOD) method was proposed to manage CSPs dynamic inter-datacenter connection requests, where end-to-end connections are set up dynamically according to demands in order to improve resource utilization. In this way, telecommunications carriers such as AT&T can provide efficient and low-cost connections to multiple CSPs. In [9,10], to improve resource utilization, multipath and multihop strategies were employed to transmit traffic in inter-datacenter networks. In the multipath or multihop strategies, traffic is accommodated by multiple concatenated lightpaths from source to destination. Then O-E-O conversions are used to forward the traffic from one lightpath to the next. Since a lightpath can be shared by more connections than in the single-hop case, multihop increases the sharing of network resources and improves efficiency and performance. In addition, a multihop architecture enables electronic wavelength conversion, which also improves efficiency and performance. However, multihop strategies introduce prohibitively expensive and energy consuming O-E-O conversion, especially in high-bandwidth optical networks, and the transport over multiple lightpaths/light-trees also increases delay. While the capacity of a terabit/second capable optical fiber is divided into multiple parallel wavelengths by the WDM technology, where each wavelength is expected to transmit up to a 100 gigabit second data rate, some connection requests among datacenters may require only subwavelength bandwidth. Thus, for a better network resource utilization, efficient traffic grooming techniques are required to address the disparity between the requested connection bandwidth and the wavelength channel bandwidth. We note that traffic grooming in this paper refers to traditional electronic traffic grooming where grooming is implemented in the electronic domain. Traffic grooming can be categorized into dynamic traffic grooming and static traffic grooming. In the former, connection requests arrive dynamically and the target is to maintain an acceptable blocking probability of connection requests [11 17]. In the static traffic case, the connection requests are known a priori, which is more like a network planning problem. An optimal solution for this type of problem is usually obtained [18 25] by using the integer linear programming (ILP) technique. In this paper, we focus on the static case and provide ILP formulations for the inter-datacenter network design. We find that all the existing research has not considered overheads associated with lightpath setup and teardown times. Such setup/teardown time includes signal propagation delay on the links of the lightpath, and processing time and configuration time associated with nodes on the lightpath [26]. For simplicity, in this paper, we assume that for a specific network, the lightpath/light-tree setup/teardown time is constant. However, it can be different for different networks. This setup/teardown time may compromise the network efficiency if the setup/teardown time is a significant portion of the entire lightpath/light-tree holding time (which includes setup/teardown time), due to wastage of resources during setup/teardown. In the experiments reported in [2], the establishment of a lightpath takes 60 70 s, and tearing down a lightpath takes around 10 s. However, it is also noted there that in practice the time is far longer. It is expected that this time will be shortened as new technologies are developed. However, it is likely that they will remain significant relative to flow or burst transmission times for the foreseeable future. We note that the duration time of a connection is between the start and end times of its data transmission. The setup/teardown time is associated with establishment and teardown of a lightpath or a light-tree and not directly, but indirectly, with an individual connection. A lightpath or light-tree may accommodate multiple subwavelength connections, and in this way they share the setup/teardown overhead. A technology that aims to overcome the inefficiency introduced by lightpath setup/teardown time overhead is optical burst switching (OBS) [27], which is considered as the compromise of optical circuit switching and optical packet switching. An OBS network will not set up a lightpath (optical circuit switching) before traffic transmission. Instead, a header is sent out ahead of a data burst, to reserve resources and to reconfigure optical cross-connects (OCs) along the path of the burst. OBS has the advantage of avoiding end-to-end connection setup delay. However, there is no guarantee that resources will be available for the burst along its path and the burst may be dumped. This may lead to loss of effective bandwidth and even to congestion collapse under very heavy traffic conditions [28]. The challenge of improving OBS performance is still a topic of ongoing research, and the jury on whether or not OBS becomes a leading technology is still out. The authors of [29] reduced lightpath setup time by reusing the OC existing configuration status, which

Lin et al. VOL. 5, NO. 12/DECEMBER 2013/J. OPT. COMMUN. NETW. 1445 significantly improves network resource utilization. In [26], a signaling protocol was developed to select a wavelength for a lightpath connection with minimal setup time. Given the ever-increasing wavelength capacity, the durations of some connections in inter-datacenter networks may be short. Therefore, to maintain a high level of network efficiency, it is important to reduce the connection overhead (related by lightpath/light-tree setup and teardown) to minimum. In this paper, we propose to use light-trees to accommodate connections, which not only optimally carry multicast connections, but also mitigate the overheads of optical connections. This benefit is gained from the capability of a light-tree to carry a multiplicity of unicast and multicast connections. For example, in Fig. 1, a light-tree rooted at node 1 and terminated at nodes 3, 4, and 6 is established for traffic transmission from datacenter DC a to any of the other datacenters DC b, DCc, and DC d. It can groom all unicast and multicast traffic from its root to its leaves, where the traffic destination set is a subset of fdc b; DC c; DC dg. While these connections share the light-tree and the light-tree setup/teardown overhead accounted for each individual connection is reduced, it also incurs the cost of transmitting traffic to unwanted leaves. We will propose methods in which the benefit from lighttree sharing significantly outweighs the cost to unwanted leaves. In this paper, we will consider static traffic scenarios where connection requests are known with start and end times. The scenario of unicast connection was investigated as a scheduled lightpath demand problem in [30]. Then, [31] extended the work in [30], considering the case in which connection requests arrive dynamically (arrive before start times), leading to the associated dynamic scheduling lightpath demand problem. This problem is how to schedule the routings and resource allocations for connections. These routings and resource allocations may be modified before the connection start times in order to achieve a lower blocking probability of the future connection requests. All these publications used the information of start and end times to increase resource sharing based on the fact that time-disjoint (that are scheduled at different time durations) connections can share network resources. A recent survey paper [32] covers most of the related work in this field. Fig. 1. Resource sharing of a light-tree. B. Contribution The first contribution of this paper is a light-tree based inter-datacenter network design that involves traditional traffic grooming as well as traffic grooming with timedisjoint connections. Next, we provide new ILP formulations and heuristic algorithms aiming to optimize the efficiency of wavelength transmission resources for both light-tree based and pure lightpath based designs. Finally, we compare the light-tree based network design with the traditional lightpath based design and demonstrate a benefit of more than 15% transmission resource saving. C. Organization The remainder of this paper is organized as follows. In Section II, we illustrate the design concept and motivations using an example. In Section III, the problem statement is presented. In Section IV, the ILP formulations for light-tree based and lightpath based designs are provided, and an example for these optimizations methods applied to a small network is presented. In Section V, the detailed steps of two heuristic algorithms, namely, light-tree based and lightpath based, are described. Section VI presents numerical results for applying optimal and heuristic methods to test networks and compares their performance in terms of resource consumption. Finally, Section VII concludes this paper. II. ILLUSTRATION OF THE DESIGN CONCEPT As discussed above, in this paper, we consider the design problem of inter-datacenter networks with static traffic scenarios, where both light-trees and lightpaths are used to support connection requests that include connection start and end times. We also consider lightpath and lighttree setup/teardown times. The duration of the connection can be longer or shorter than the connection setup/ teardown time. For example, the light-tree in Fig. 1 can be shared in the time domain. It can be shared by time-disjoint connections, which increases the resource sharing and further reduces the setup/teardown time per connection and improves performance. In Fig. 2, an example is given to illustrate this sharing of a light-tree in the time domain, and to indicate the advantage over the purely lightpath based method. In Fig. 2, five connection requests are given with their respective start and end times, and the network topology is the same as in Fig. 1. The network time is slotted with a unit slot size, and the duration time of a connection is measured in the number of slots. A connection request i, i 1; 2; ; 5, is denoted by a 5-tuple of the elements s i ; D i ; f i ; a i ; b i, where the five elements represent the source, destination set, bandwidth required, start time, and end time, respectively. For example, R 1 1; 3; 4; 6; 3; 3; 9, represents the light-tree in Fig. 1 to transmit traffic from DC a to DC b, DCc, and DC d, where 1 is the source node and 3, 4, and 6 are the destinations, and the last three numbers are their required bandwidth, start time, and end time,

1446 J. OPT. COMMUN. NETW./VOL. 5, NO. 12/DECEMBER 2013 Lin et al. (1) Node 1 to node 3 (two wavelinks) from slot 1 to slot 12, used by R 1 and R 4. (2) Node 1 to node 4 (one wavelink) from slot 1 to slot 9, used by R 1, R 2, and R 3. (3) Node 1 to node 6 (three wavelinks) from slot 1 to slot 13, used by R 1, R 2, and R 5. Fig. 2. Resource sharing of a light-tree in the bandwidth and time domain. respectively. (The start and end times are bolded.) In the example, the capacity of a wavelength C is assumed to be equal to OC-12, and the required bandwidth of connections is OC-x, where only the value x is given, omitting the OC for brevity. In Fig. 2, R 1 starts from slot 3, and needs two slots to set up a light-tree, which are marked with crosses in the figure (we suppose that the setup of an optical connection takes two slots in this example), so the first and second slots are also occupied without traffic transmission. R 2 and R 3 can share the light-tree with R 1 during R 1 s transmission time from slot 3 to slot 9. This sharing must satisfy the condition that in each slot, the total required bandwidth is no larger than C. However, R 4 and R 5 are outside the transmission time of R 1, and are time-disjoint connections of R 1. Thus, to carry R 4 and R 5, we can either establish new optical channels, or extend the end time of the light-tree. If new optical channels are established, setup/teardown time will be incurred. Finally, the solution with the least resource consumption among all methods is selected. In this example, the best solution is to extend the lighttree to slot 13 to carry R 4 and R 5 as shown in Fig. 2 with light gray slots. As network time is divided into slots, a lightpath or light-tree of k-time-slot holding time will require k time slots in every wavelink (a wavelink is a wavelength channel in a particular link) on its route. The basic resource unit used in this paper is a single time slot on a single wavelink. This resource unit will henceforth be called a wavelink slot. In this way, a lightpath or light-tree of k-time-slot holding time that traverses n wavelinks will use kn wavelink slots. We here provide the detailed calculation of the example in Fig. 2. The light-tree occupies four wavelinks, as shown in Fig. 1. If it is extended to time slot 13 from time slot 9, the resource consumption is 4 13 9 16 wavelink slots. However, if a new light-tree from node 1 to nodes 3 and 6 is established for R 4 and R 5, the new light-tree occupies three wavelinks in Fig. 1, and the resource consumption is 3 2 4 18 wavelink slots, where two time slots are the setup/teardown time of the new light-tree and four time slots are the transmission time of R 4 and R 5 (from time slot 10 to time slot 13). It is two wavelink slots more than that obtained by extending the light-tree of R 1 (which equals 16 wavelink slots). In another case where only lightpaths are used to support all five connections, three lightpaths are required: Each lightpath contains two slots for setup/teardown time, so the total resource consumption is 2 12 1 9 3 13 72, which is significantly larger than that of the light-tree based approach (i.e., 4 13 52). Based on the above comparison, the benefit of using light-trees is clear because a light-tree can accommodate a multiplicity of unicast and multicast connections in the time domain. Specifically, the light-tree in the example is shared by five connections, and the average setup/teardown time of each connection is 0.4 slots. In this paper, for a given topology and traffic demands (unicast and multicast), we optimize link dimensioning and routing and wavelength assignment (RWA) involving lightpaths and light-trees. In the dimensioning phase, we aim to design the network so that all the connections can be transported based on optimal paths. In this phase, we begin with an unlimited number of wavelengths, and the objective is to use the least network resources. (Actually, we preset our algorithms with very large link capacity values, and we end up with much smaller values.) After the network is dimensioned, designed, built, and in actual operation, the traffic demands may change relative to the original prediction. Then the traffic is managed and the objective is to optimize traffic engineering and management. In this phase, the number of wavelengths is fixed and cannot be changed. As mentioned in Section I, this is beyond the scope of this paper. III. PROBLEM STATEMENT The problem of inter-datacenter network design for subwavelength connections (unicast and multicast) with start and end times can be stated as follows. Given: (1) A physical topology G V;E is a directed graph denoting an inter-datacenter network, where V is the set of nodes to which datacenters are attached, and E is the set of directed edges. An edge is called a link, and it represents an optical cable that includes one optical fiber connecting a pair of nodes. (The assumption of one optical fiber per link is made for simplicity of notation, but the model can be generalized to the case of multiple fibers per link.) (2) All the fibers in the network are identical, and each fiber carries W wavelengths; each wavelength has a capacity of C b s. (3) We assume that if two nodes are connected by a link on one direction, then they are also connected by an identical link on the opposite direction.

Lin et al. VOL. 5, NO. 12/DECEMBER 2013/J. OPT. COMMUN. NETW. 1447 (4) There are no wavelength converters in the network, which means a lightpath or light-tree traversing multiple links must use the same wavelength. (5) All nodes are capable of splitting an incoming optical signal into multiple ones to be transmitted through the outgoing ports to form a light-tree. (6) A set of connection requests with start and end times of subwavelength or wavelength capacity demands. Our goal is to design the network with minimal wavelink resource consumption. In particular, we provide the following: (1) A set of light-trees and lightpaths. In a light-tree or a lightpath, the transmission from the source to the destination(s) is all-optical, which provides a transmission channel for connection requests. (2) Traffic routing. For each connection, we assign one lighttree or lightpath, which provides single-hop routing for its traffic. This can be extended to the case in which connections traverse multiple lightpaths or light-trees as in our earlier work [22]. Meanwhile, the connection duration time (from start to end) where the traffic is conveyed in the light-tree or lightpath is also allocated. (3) Physical RWA. We find routes and assign wavelengths for all the light-trees and lightpaths. The RWAs have time constraints, where the start and end times of the light-trees and lightpaths are determined (the start time begins from the time of setting up the light-tree or lightpath). IV. ILP FORMULATIONS In our formulations, a light-tree (or a lightpath) is denoted by i; w; k; p; q, where i is the source node, w is the particular wavelength used, k is the index of the combination of adjacent links (the outgoing branches of a lighttree from a node can extend to any set of its adjacent links), p is the start time, which begins from the setup time of the light-tree or lightpath, and q is the end time, which terminates at the teardown time of the light-tree or lightpath. The variable k has different ranges for the light-tree and the lightpath: for the light-tree 1 k 2 Deg i 1, as there are 2 Deg i 1 combinations of adjacent links of node i, where Deg i is the nodal degree of node i. Recall that node i is the source node of the light-tree (or lightpath). In the case of a lightpath, we have Deg i combinations. As in any combination, the lightpath can traverse only one branch of the tree (one adjacent link), 1 k Deg i. For any node x in light-tree i; w; k; p; q, let a Boolean parameter T x iwk;p;q take the value of 1 if node x is a destination of light-tree i; w; k; p; q, and 0 otherwise. For a lightpath, there is only one P destination for light-tree i; w; k; p; q, which requires xt x iwk;p;q 1, and the outgoing branch from a node is no larger than 1. Both light-tree and lightpath based ILP formulations are provided in this section. They share the same input parameters, variables, and ILP objective function. Thus, we present them first. Next, we provide separate constraints for each of the formulations. Given: V: set of nodes in the network. E: set of edges in the network. W: number of wavelengths per fiber, which is preset for optimization. Usually, the optimal value is lower than this value. C: capacity of a wavelength. P mn : indicator of interconnecting nodes m and n. As we assume that there are two fibers in the opposite directions, if m and n are connected, then P mn P nm 1. e: setup/teardown time of a lightpath or a light-tree. T: total number of slots. The network time is slotted from 1 to T with a unit slot size. R: maximal index of connection request. s r ; D r ; f r ; a r ; b r : r 1; 2; ;R, a 5-tuple of the elements denoting connection request r, where five elements represent the source, destination set, bandwidth required, start time, and end time, respectively. Accordingly, the total duration time of the connection is b r a r 1 slots. Variables: T x iwk;p;q : a Boolean variable. It takes the value of 1 if node x is a destination of the light-tree i; w; k; p; q ; otherwise 0. F mn iwk;p;q : an integer commodity-flow variable [33], denoting the number of units of commodity flowing on link m; n for light-tree i; w; k; p; q. Each destination of a light-tree needs one unit of commodity. Thus, a total of P xt x iwk;p;q units of commodity flow out of the source i for light-tree i; w; k; p; q. The variable F mn iwk;p;q is equal to the number of destinations in the downstream of link m; n. M mn iwk;p;q : a Boolean variable. It takes the value of 1 when light-tree i; w; k; p; q traverses link m; n ; otherwise 0. λ r iwk;p;q : a Boolean variable. It takes the value of 1 if connection request r traverses light-tree i; w; k; p; q ; otherwise 0. Q r;x iwk;p;q : a Boolean variable. It takes the value of 1 if node x is a destination of light-tree i; w; k; p; q that is occupied by connection request r; otherwise 0. This variable should be set to λ r iwk;p;q Tx iwk;p;q. Objective: Minimize m;n;i;w;k;p;q q p 1 M mn iwk;p;q : (1) The objective is to minimize the total number of wavelink slots used. This minimization is achieved by sharing the setup/teardown overheads among multiple connections. In this way, the overhead per connection is reduced and a more efficient operation is achieved, because

1448 J. OPT. COMMUN. NETW./VOL. 5, NO. 12/DECEMBER 2013 Lin et al. this implies using fewer wavelinks for the same traffic demands or accommodating more traffic in a given network. A. Light-Tree Based Formulation As discussed before, a light-tree can not only optimally support multicast connections, but also support unicast connections with improved resource sharing. As the setup/ teardown time of a light-tree or a lightpath is assumed to be e slots, a light-tree or a lightpath would consume at least e 1 slots. Constraints: Physical RWA of light-tree F in n adj i iwk;p;q x T x iwk;p;q i; w; k; p T e; q p e; (2) F mx iwk;p;q F xn iwk;p;q Tx iwk;p;q m adj x n adj x F mn iwk;p;q Mmn iwk;p;q i; w; k; x i; p T e; q p e; (3) i; w; k; p T e; q p e; mn E; (4) F mn iwk;p;q jvj Mmn iwk;p;q i; w; k; p T e; q p e; mn E; (5) i;k;p t q M mn iwk;p;q P mn w; t T; mn E: (6) Equations (2) (6) are the commodity-flow conservation constraints for creating physical routing of light-tree i; w; k; p; q. According to the definitions at the beginning of this section, the ranges of i, w, and k are i V, w W, and 1 k 2 Deg i 1. These ranges are also applied to the equations below if no specific ranges for i, w, and k are given. Equation (2) ensures that, for the source node i, the number of units of the outgoing commodity is equal to the number of destinations. Equation (3) ensures that for light-tree i; w; k; p; q, if node x is a destination, the number of units of incoming commodity is larger than that of outgoing commodity by 1; otherwise, they are equal. Equations (4) and (5) ensure that if link m; n carries the commodity of light-tree i; w; k; p; q, then this link is traversed by the light-tree; otherwise, it is not traversed. Equation (6) ensures that at any slot, the wavelength w of a fiber link m; n can be occupied by at most one light-tree. Traffic routing of connection request λ r s r wk;p;q Tx s r wk;p;q 2Qr;x s r wk;p;q w; k; r; x s r ; p T e; q p e; (7) λ r s r wk;p;q Tx s r wk;p;q Qr;x s r wk;p;q 1 w; k; r; x s r ; p T e; q p e: (8) As Q r;x iwk;p;q is set to be λr iwk;p;q times Tx iwk;p;q, we use Eqs. (7) and (8) to assign value to Q r;x iwk;p;q. These equations ensure that if a connection request r traverses light-tree i; w; k; p; q, and node x is a destination of the light-tree, then Q r;x iwk;p;q will be set to 1; otherwise 0. 1 r; (9) λ r s r wk;p;q w;k;a r p e&b r q w;k;p;q Q r;x s r wk;p;q 1 r; x D r: (10) Equation (9) ensures that a connection request has one light-tree to transmit its traffic, where the start time of the connection is no earlier than the start time of the light-tree plus the setup/teardown time, and the end time of the connection is no later than the end time of the light-tree. This is because during the setup/teardown time, even resources are reserved, but cannot transmit traffic, so traffic can only start after it. Equation (10) ensures that each destination of a connection request must be reached. f r λ r s r wk;p;q C r a r t b r w; k; t p; q ; p T e; q p e: (11) Equation (11) ensures that at any time slot, the total bandwidth required by the connection requests in a light-tree i; w; k; p; q must be no larger than the wavelength capacity. B. Lightpath Based Formulation If lightpaths are established to support connection requests, only one destination can be reached for each lightpath. For a multicast request, multiple lightpaths are established from the source to each of the destinations. These lightpaths can also groom traffic of other connections with the same source and destination. Constraints: Physical RWA of lightpath M in n adj i iwk;p;q x T x iwk;p;q i; w; k; p T e; q p e; (12) M mx iwk;p;q M xn iwk;p;q Tx iwk;p;q m adj x n adj x x i; w; k; x i; p T e; q p e; (13) T x iwk;p;q 1 i; w; k; p T e; q p e; (14)

Lin et al. VOL. 5, NO. 12/DECEMBER 2013/J. OPT. COMMUN. NETW. 1449 i;k;p t q M mn iwk;p;q P mn w; t T; mn E: (15) Equations (12) (15) are the constraints for creating physical routing of lightpath i; w; k; p; q. Accordingly, the ranges of i, w, and k are i V, w W, and 1 k Deg i, where only the last one is different from the light-tree case (1 k 2 Deg i 1). The explanations of these equations are similar to their light-tree counterparts, except that they consider only one destination, while their counterparts consider multiple destinations. Traffic routing of connection request λ r s r wk;p;q jd rj r: (16) w;k;a r p e&b r q Equation (16) ensures that the number of lightpaths used to transmit traffic for a connection request is the same as the number of destinations of the connection request. The other constraints are similar to those provided in the light-tree case, which are given by Eqs. (7), (8), (10), and (11). The only difference is in the lightpath case the range of k is 1 k Deg i. C. Numbers of Variables and Constraints We check the numbers of variables and constraints of the two formulations to gain insight into the complexities of the ILP problems. For the light-tree based formulation, the number of variables is O jvjjejw2 g T 2 RjVj 2 W2 g T 2, where g is the maximal nodal degree in the network. The number of constraints is O jvj 2 W2 g T 2 jvjjejw2 g T 2 RjVjW2 g T 2. Both grow quadratically with the number of nodes. For the lightpath based formulation, they are O gjvjjejwt 2 grjvj 2 WT 2 and O gjvj 2 WT 2 gjvjjejwt 2 grjvjwt 2. They also grow quadratically with the number of nodes, but they are lower than their counterparts in the light-tree based case. As network size grows, solving the ILP problem becomes prohibitively time consuming. Thus, heuristic algorithms are needed for scalability. D. Example for the ILP Formulations An example of a small network that uses the ILP formulations to find an optimal solution is given below. The test network has six nodes as shown in Fig. 1. We assume that the network time is divided into six slots with a unit slot size for simplicity and the setup/teardown time is two slots for a light-tree or a lightpath. Accordingly, the maximal lightpath/light-tree holding time is six slots (including two slots overhead associated with the establishment/ teardown of lightpath or light-tree) in this network. We note that the unit of network time slot is a normalized unit. In other words, the slot time is arbitrary. Ten randomly generated connection requests, including two multicast requests as shown in Table I, are given as the input to the formulations. The source and the destination(s) of a connection request are randomly selected from the network nodes. We assume that the capacity C of a wavelength is OC-12, and the required bandwidth of a connection request is a random integer with uniform distribution from 1 to 12 (an integer i denotes a bandwidth of OC-i). We used a commercial ILP solver, CPLE [34], to solve the ILP formulations. The traffic routing of 10 connection requests is obtained from the ILP solution, where Table I is for the light-tree based solution and Table II is for the lightpath based solution. In Table I, we see that two light-trees are established for two multicast connections with different source nodes. These two light-trees are also shared by other connection requests, grooming traffic of other connection requests. For example, light-tree 4 1; 2; 3; 5 <1,6> (where 4 is the source; 1, 2, 3, and 5 are the destinations; and <1,6> denotes the start and end times) is used to carry the first connection request (multicast request), and this light-tree also grooms connection requests 3 and 4 during its holding time. This on average decreases the resource consumption and setup/teardown time of each connection request. There is another light-tree 6 1; 4 <2,6>, which is established for multicast connection request 2, but with only one more slot extension, it can also support connection request 7. This demonstrates the ability of the light-tree to carry additional connections at relatively low marginal cost. Such savings are also achievable by the lightpath based solution, as illustrated in Table II, where two lightpaths are established for connection request 2 with different holding times in order to also carry connection 7. The end time of lightpath 6 4 <2,6> is one slot later than the end time of request 2. This extension enables the transmission of the traffic of connection request 7. We can see that this extension of the light-tree or lightpath consumes fewer resources than establishing a new light-tree or lightpath, and a light-tree is more likely to be shared compared to a lightpath as there are multiple destinations in a light-tree. With the information of light-tree routings and their respective holding times, we can calculate the total network resource usage by Eq. (1). The physical routings of light-tree and lightpath are not given here as they can be easily derived from Fig. 1 with minimal physical links. TABLE I LIGHT-TREE BASED TRAFFIC ROUTING Index Request Traffic Routing 1 (4; 1, 2, 3, 5; 3; 3, 6) 4 1; 2; 3; 5 <1,6> 2 (6; 1, 4; 7; 4, 5) 6 1; 4 <2,6> 3 (4; 1; 2; 4, 6) 4 1; 2; 3; 5 <1,6> 4 (4; 2; 1; 5, 6) 4 1; 2; 3; 5 <1,6> 5 (5; 1; 12; 3, 3) 5 1 <1,3> 6 (2; 4; 3; 4, 5) 2 4 <2,5> 7 (6; 4; 10; 6, 6) 6 1; 4 <2,6> 8 (1; 3; 5; 3, 5) 1 3 <1,6> 9 (2; 4; 4; 5, 5) 2 4 <2,5> 10 (1; 3; 6; 4, 6) 1 3 <1,6>

1450 J. OPT. COMMUN. NETW./VOL. 5, NO. 12/DECEMBER 2013 Lin et al. TABLE II LIGHTPATH BASED TRAFFIC ROUTING Index Request Traffic Routing 1 (4; 1, 2, 3, 5; 3; 3, 6) 4 1 <1,6> 4 2 <1,6> 4 3 <1,6> 4 5 <1,6> 2 (6; 1, 4; 7; 4, 5) 6 1 <2,5> 6 4 <2,6> 3 (4; 1; 2; 4, 6) 4 1 <1,6> 4 (4; 2; 1; 5, 6) 4 2 <1,6> 5 (5; 1; 12; 3, 3) 5 1 <1,3> 6 (2; 4; 3; 4, 5) 2 4 <2,5> 7 (6; 4; 10; 6, 6) 6 4 <2,6> 8 (1; 3; 5; 3, 5) 1 3 <1,6> 9 (2; 4; 4; 5, 5) 2 4 <2,5> 10 (1; 3; 6; 4, 6) 1 3 <1,6> Thus, the total resource consumption of the light-tree based case and the lightpath based case is 61 and 74, respectively, where the light-tree based approach shows a significant smaller resource consumption value. This is because in the lightpath based formulation, a lightpath can only reach one destination, which limits resource sharing and further leads the setup/teardown time to be less efficient than in the light-tree case. We can see that there are nine optical connections (correspondingly, nine setup/ teardown times) in Table II, while there are only five optical connections (correspondingly, five setup/teardown times) in Table I. In the above example, it took several hours to solve the ILP formulation running on a PC with a 2.8 GHz CPU and 1024 MB RAM. The ILP approach cannot scale to large networks, so heuristic algorithms are needed. In the development of heuristic algorithms, we incorporate the following observations from the optimal solution obtained by the ILP method. (1) A light-tree can be used to groom many connections to reduce the average setup/teardown time of a connection request. (2) A light-tree should be extended in the time domain to accommodate time-disjoint connections if the resource incurred by extension is less than that used by establishing a new light-tree. V. HEURISTIC ALGORITHMS Motivated by the above observations, we propose a lighttree based heuristic algorithm for inter-datacenter network design with static connection requests. In the algorithm, a light-tree may be selected to groom traffic of other connection requests. When this grooming happens between time-disjoint requests, i.e., the start and/or end times of light-tree need to be extended to include the duration of the connection, additional resources are consumed. We define the resource used by the extension of the light-tree as an extension resource (the unit is wavelink slot), which is defined as extension resource no: of light-tree wavelinks no: of slots extended: (17) There are six scenarios for grooming a connection request onto an existing light-tree in the time domain, which are illustrated in Fig. 3. Suppose that the existing lighttree has its start time at a slot and its end time at b slot, and the setup/teardown time is e, so traffic can be transmitted from slot a e. If the start time of the connection is before slot a e, then additional resources are needed, as the establishment of the light-tree will be earlier than the start time of the connection. Similarly, if the end time of the connection is larger than b, then additional resources are required as the end time of the lighttree is delayed. The total numbers of extended slots in the six scenarios of Fig. 3 are (a) a e x, (b) a e x, (c) 0, (d) y b, (e) y b, and (f) a e x y b, respectively. According to Eq. (17), the product of the number of slots extended and the number of wavelinks of the light-tree gives the value of the extension resource. The proposed heuristic algorithm, Algorithm 1, would select a lighttree to groom traffic according to the extension resource value. In Algorithm 1, the connection requests are first sorted in descending order of destination set size. The algorithm gives preference to larger connection requests because larger light-trees can be shared by more connection requests with traditional traffic grooming and in the time domain with time-disjoint connections, so as to increase the resource sharing and reduce the setup/teardown time of each connection request. The complexity of sorting is O R 2. The loop from command 2 to command 4 in the algorithm is to select an existing light-tree to groom the connection request. Except the requirements (1) D i D j and (2) f i u k,wherek is in the overlap time, there are two other requirements (3) and (4), which incorporate the observations from the optimal solution of the ILP. Requirement (3) says that the selected light-tree should have the minimal extension resource among all other light-trees. This requirement is to groom traffic in the time domain while keeping low resource consumption. Requirement (4) says that under requirement (3), the minimal waste light-tree will be selected, where the waste is defined as the number of destinations of the light-tree that are not the destinations of the connection (equal to jd j j jd i j). Requirements (3) and (4) aim to achieve high light-tree sharing and reduce the resource wasted to unwanted leaves. At command 4, if the extension resource of the selected light-tree is smaller than the resource of establishing a new light-tree (the number of wavelinks of the new light-tree times the holding time), this request is groomed onto the selected light-tree with (or without) extending the light-tree. Accordingly, in the time slots where the new traffic is groomed with the existing traffic, the available bandwidth of the light-tree is updated to u k f i, where k is in the overlap time, and in the time slots that are extended only for new traffic, the available bandwidth of light-tree is set to C f i. Otherwise, a new lighttree will be established. The complexity of this loop is O R 2 RjVj 2 log jvj as the upper bound of the number

Lin et al. VOL. 5, NO. 12/DECEMBER 2013/J. OPT. COMMUN. NETW. 1451 Fig. 3. Time relationship for six traffic grooming scenarios where the lower part of each graph shows the start and end times of the light-tree, and the upper part shows the start and end times of the connection. of existing light-trees is R, and for establishing a light-tree, it is O jvj 2 log jvj. The minimum-cost path heuristic (MPH) algorithm [35] is applied to derive the minimum-cost lighttree, which is known to be an NP-complete problem. After grooming traffic and establishing light-trees, the algorithm tries to merge multiple light-trees or lightpaths to one light-tree if the merging operation can further reduce the resources used. This merging process has the complexity of O R 2 jvj. Thus, the overall complexity of the whole heuristic algorithm is O R 2 jvj RjVj 2 log jvj. We also consider the heuristic algorithm based on the lightpath, which is quite similar to the light-tree based algorithm, except that in the lightpath based algorithm, there is no light-tree-merging operation from command 5 to command 9, and instead of establishing a light-tree, multiple lightpaths from the source to each destination are established. The overall complexity of the lightpath based algorithm is O R 2 jvj RjVj log jvj. VI. NUMERICAL RESULTS In this section, the performance of the four methods, including (1) the light-tree based ILP formulation, (2) the lightpath based ILP formulation, (3) the light-tree based heuristic algorithm, and (4) the lightpath based heuristic algorithm, is compared in terms of resource consumption in the six-node network of Fig. 1. Here resource consumption is calculated as the total number of wavelink slots used by all the established light-trees as defined by the objective function of Eq. (1). We then study the performance of lighttree based and lightpath based heuristic algorithms in a larger network, namely, NSFNET, in Fig. 4. has its limitation as it is not scalable, it can provide optimal solutions for problems of small dimensionality that can serve as a benchmark to test the performance of the heuristic algorithm. Then we use the validated heuristics for problems of large dimensionality that are computationally prohibitive for the ILP. The source and the destination nodes of connection requests are randomly selected from the network nodes. The size of a multicast destination set is randomly chosen between 1 and 5. We still assume that the capacity C is OC-12, and the required bandwidth is randomly chosen between 1 and 12. The start time of a connection is randomly selected from 3 (two slots for setup) to 6, and the end time is larger than the start time by 0, 1, 2, and 3 for the results in Figs. 5 8, respectively. If the end time exceeds the last slot (i.e., the sixth slot), the last slot will be used. Accordingly, each scenario has the maximal duration time (with traffic transmission), 1, 2, 3, and 4 slots, respectively. Figures 5 8 compare the resource consumption of different methods under different multicast ratios (a ratio 0 implies that all connection requests are unicast). Each of the result points in Figs. 5 9 is the average over 20 simulation runs. In Fig. 5, when the multicast ratio is increased from 0 to 0.4, the numbers of wavelink slots of all methods grow since a multicast connection request usually occupies more wavelinks than a unicast request. Thus, an increase in the multicast ratio consumes more resources. It is clear that in the example considered, the light-tree based methods outperform the lightpath based methods, and A. Six-Node Network Ten requests are generated in each simulation experiment. As before, the network time is divided into six slots, and the setup/teardown time is two slots, where the maximal lightpath/light-tree holding time is six slots (including two slots overhead associated with the establishment/ teardown of a lightpath or light-tree). Although the ILP Fig. 4. 14-node 21-link NSFNET topology.

1452 J. OPT. COMMUN. NETW./VOL. 5, NO. 12/DECEMBER 2013 Lin et al. the light-tree based heuristic algorithm performs almost the same as the light-tree based optimal method, and so does the lightpath based heuristic algorithm as compared to the lightpath based optimal method. We observe from the figure that the light-tree based methods consume on average 14% fewer resources than the lightpath based methods. As the multicast ratio increases, the difference between the light-tree based and lightpath based methods increases. This is because when the multicast ratio increases, more unicast connections can be groomed onto light-trees, which increases the grooming gain of the light-tree. Similar results are observed in other scenarios with different maximal duration times as in Figs. 6 8, and the average resource savings of the light-tree based methods over the lightpath based methods are 16%, 15%, and 17%, respectively. Algorithm 1 Light-tree based heuristic algorithm Input: A network G V;E with capacity C of each wavelength, optical connection setup/teardown time, and a set of connection requests. Output: (a) RWA of light-trees with start and end times, (b) traffic routings and time allocations of the connection requests in the light-trees, and (c) resource consumption (the number of wavelink slots). Algorithm BEGIN: 1. Sort connection requests in descending order of destination set size and label them from 1 to R; the ith request is denoted as s i ; D i ; f i ; a i ; b i. 2. for i 1 to R do //select existing light-trees to groom request i, Ex contains all existing light-trees, each is denoted as fs j ; D j ; u; a j ; b j g, where u fu k ;a j k b j g is the set of available bandwidths of light-tree j at its holding time 3. Select the light-tree j from Ex with the satisfaction of all four conditions: (1) D i D j, (2) f i u k, where k is in the overlap time, (3) can carry request i with the minimal extension resource, and (4) if multiple light-trees have the same minimal extension resource, select the one with minimal waste. If such a light-tree is not feasible, establish a new light-tree for request i, then Continue to next i. 4. If the minimal extension resource of the selected light-tree is smaller than the resource of establishing a new light-tree, extend the holding time of the light-tree accordingly, and then groom request i onto the selected light-tree; otherwise, establish a new light-tree for request i. end //Merge light-trees to save resources 5. for t 1 to jvj do 6. Sort light-trees rooted at t in a descending order of size of light-tree destinations and label them from 1 to n. 7. for i 1 to n do 8. for j i 1 to n do 9. Merge two light-trees i and j to be a larger one if resource can be saved. If the merging is successful, go back to command 6 to start over again until no more merging can happen. end end end END Fig. 5. Comparison of resource consumption when maximal duration time is one slot. We also extract the data that have the multicast ratio 0 in the four scenarios of Figs. 5 8, and show them in Fig. 9. The multicast ratio 0 indicates that all connection requests are unicast. These data illustrate the performance advantage of light-tree based methods over lightpath based methods with only unicast connection requests. From Fig. 9, we see that even without multicast connection requests, the light-tree based methods can still outperform the lightpath based methods. This savings is due to the fact that a light-tree can support more unicast connections with different destinations, which increases the resource sharing and reduces the setup/teardown time per connection. On average, the overall resource consumption is reduced by 5% over lightpath based methods. B. NSFNET Network Because ILP is not scalable, in this section, we compare the light-tree based heuristic algorithm with the lightpath Fig. 6. Comparison of resource consumption when maximal duration time is two slots.

Lin et al. VOL. 5, NO. 12/DECEMBER 2013/J. OPT. COMMUN. NETW. 1453 Fig. 7. Comparison of resource consumption when maximal duration time is three slots. based heuristic algorithm in a larger network, i.e., the NSFNET network as shown in Fig. 4. We assume that the bandwidth required by a connection request is still randomly chosen between 1 and C, where C equals OC-48. The setup/teardown time is four slots, and the network time is divided into 100 slots, where the maximal lightpath/light-tree holding time is 100 slots (including four slots overhead associated with the setup/teardown of the lightpath or light-tree). In the six-node network, the shortest connection duration time is one slot, and it cannot be less than 50% of the lightpath/light-tree setup/teardown overhead, which is equal to two slots. As this overhead is on the order of minutes, we want to consider a shorter connection duration time relative to the lightpath/light-tree overhead, so we considered a four-slot setup/teardown time in the NSFNET case. We need to emphasize that the unit of network time slot is a normalized unit and the slot time is arbitrary. An interesting measure is the ratio of the connection duration to the lightpath/light-tree setup/ teardown overhead. In the NSFNET network, where the Fig. 9. Comparison of resource consumption when multicast ratio is 0 (unicast case). lightpath/light-tree setup/teardown time is four slots, the subwavelength connection duration times are between 1 and 96 slots, allowing for a wide range of scenarios of ratio values. In many cases, the setup/teardown time is negligible, but in others it is nonnegligible. The number of connection requests generated in each experiment is 1000, and 20 experiments are simulated to obtain the average value as shown in Fig. 10 and Table III. In Fig. 10, three multicast ratios are considered, including 0%, 10%, and 30%. It is clear that the light-tree based heuristic algorithm, which implements the light-tree based network design, achieves better performance than its lightpath counterpart, which implements the lightpath based design for all of the three multicast ratios. It is noted that when the connection duration time is smaller than the setup/teardown time (four slots), the light-tree based algorithm also shows better performance than the lightpath based one, and this better performance remains when the duration time increases. This is relevant to Fig. 8. Comparison of resource consumption when maximal duration time is four slots. Fig. 10. Comparison of resource consumptions for three different multicast ratios (NSFNET).

1454 J. OPT. COMMUN. NETW./VOL. 5, NO. 12/DECEMBER 2013 Lin et al. TABLE III RESOURCE CONSUMPTION (WAVELINK SLOTS) Traffic proportion 10 5 1 20 5 1 40 5 1 (short:medium:long) Lightpath based algorithm 75779.9 62131.9 53069.9 Light-tree based algorithm 61998.4 50547.8 43120.6 inter-datacenter networks that need multicast for data replications and backup, and where some high bitrate connections require duration shorter than the optical channel setup/teardown time. Next, we simulate three scenarios in which the duration times of connections are short, medium, and long, which are from 1 to 20, from 21 to 60, and from 61 to 96 slots, respectively. The short, medium, and long connections are of different proportions as 10 5 1, 20 5 1, and 40 5 1 in each scenario, and the duration times in each category are randomly distributed. The multicast ratio is 0.1 in all three scenarios. We can see that connections with short durations are dominant. In Table III, the light-tree based heuristic algorithm performs significantly better than the lightpath based case, consuming about 18.2%, 18.6%, and 18.7% less resources in the three scenarios of 10 5 1, 20 5 1, and 40 5 1, respectively. Also, as expected, we can see that when the portion of the connection with short duration time increases, the resource consumption of the two algorithms is reduced. We have tested other experiments with even larger network sizes, and with hundreds of time slots, similar results are observed. For the sake of brevity, they are not shown in this paper. VII. CONCLUSION In this paper, we have considered the inter-datacenter network design problem with static traffic scenarios where the connection requests are known a priori with additional information of start and end times. The optical channel setup/teardown time is also taken into consideration, which may be comparable to the holding time of lightpath or light-tree in inter-datacenter networks. We have proposed light-tree and lightpath based network design methods that rely on ILP formulations and heuristic algorithms. The results reveal that the light-tree based design achieves lower resource consumption than its lightpath counterpart. This is because the light-tree can optimally support multicast connection requests, and using the light-tree to support unicast connections increases resource sharing by traditional traffic grooming and traffic grooming among time-disjoint connections. This will largely decrease the average setup/teardown time per connection. Our heuristics that have been developed based on insights from the ILP formulations can achieve near optimal results compared to the ILP benchmark for small networks. The benefit of more than 15% resource efficiency improvement by the light-tree based design over its lightpath counterpart has been demonstrated for the network example studied. ACKNOWLEDGMENT This work was supported by a grant from the Research Grants Council of the Hong Kong Special Administrative Region, China [CityU 123012], by a grant from City University of Hong Kong (Project No. 7004063), and by grants from the National Natural Science Foundation of China (NSFC) (61322109) and the Natural Science Foundation of Jiangsu Province (BK20130003). REFERENCES [1] Cisco Inc., Cisco global cloud index: Forecast and methodology, 2011 2016, 2011. [2] A. Mahimkar, A. Chiu, R. Doverspike, M. D. Feuer, P. Magill, E. Mavrogiorgis, J. Pastor, S. L. Woodward, and J. Yates, Bandwidth on demand for inter-data center communication, in Proc. 10th ACM HotNets, Cambridge, MA, Nov. 2011, paper 24. [3] A. Greenberg, J. Hamilton, D. A. Maltz, and P. Patel, The cost of a cloud: Research problems in data center networks, ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 68 73, Jan. 2009. [4] C. Arthur, Technology firms to spend $150bn on building new data centres, 2013 [Online]. Available: http://www.theguardian.com/business/2013/aug/23/spending on datacentres reaches 150 billion dollars. [5] I. Chlamtac, A. Ganz, and G. Karmi, Lightpath communications: An approach to high bandwidth optical WAN s, IEEE Trans. Commun., vol. 40, no. 7, pp. 1171 1182, July 1992. [6] G. Shen and R. S. Tucker, Energy-minimized design for IP over WDM networks, J. Opt. Commun. Netw., vol. 1, no. 1, pp. 176 186, 2009. [7] R. Tucker, Green optical communications Part II: Energy limitations in networks, IEEE J. Sel. Top. Quantum Electron., vol. 17, no. 2, pp. 261 274, 2011. [8] L. Sahasrabuddhe and B. Mukherjee, Light trees: Optical multicasting for improved performance in wavelength routed networks, IEEE Commun. Mag., vol. 37, no. 2, pp. 67 73, Feb. 1999. [9] N. Laoutaris, M. Sirivianos,. Yang, and P. Rodriguez, Inter-datacenter bulk transfers with netstitcher, in Proc. SIGCOMM, Toronto, Ontario, Canada, Aug. 2011, pp. 74 85. [10] Y. Feng, B. Li, and B. Li, Postcard: Minimizing costs on interdatacenter traffic with store-and-forward, in Proc. ICDCSW, Macau, China, June 2012, pp. 43 50. [11] H. Zhu, H. Zang, K. Zhu, and B. Mukherjee, A novel generic graph model for traffic grooming in heterogeneous WDM mesh networks, IEEE/ACM Trans. Netw., vol. 11, no. 2, pp. 285 299, 2003. [12] R. Berry and E. Modiano, Reducing electronic multiplexing costs in SONET/WDM rings with dynamically changing traffic, IEEE J. Sel. Areas Commun., vol. 18, no. 10, pp. 1961 1971, 2000. [13] B. Chen, G. Rouskas, and R. Dutta, On hierarchical traffic grooming in WDM networks, IEEE/ACM Trans. Netw., vol. 16, no. 5, pp. 1226 1238, 2008. [14] C. in, C. Qiao, and S. Dixit, Traffic grooming in mesh WDM optical networks - performance analysis, IEEE J. Sel. Areas Commun., vol. 22, no. 9, pp. 1658 1669, 2004. [15] R. Lin, W.-D. Zhong, S. K. Bose, and M. Zukerman, Lighttree configuration for multicast traffic grooming in WDM

Lin et al. VOL. 5, NO. 12/DECEMBER 2013/J. OPT. COMMUN. NETW. 1455 mesh networks, Photonic Network Commun., vol. 20, no. 2, pp. 151 164, 2010. [16] L. Guo,. Wang, J. Cao, W. Hou, and L. Pang, Multicast grooming algorithm in waveband switching optical networks, J. Lightwave Technol., vol. 28, no. 19, pp. 2856 2864, 2010. [17] R. Lin, W.-D. Zhong, S. K. Bose, and M. Zukerman, Leaking strategy for multicast traffic grooming in WDM mesh networks, J. Lightwave Technol., vol. 30, no. 23, pp. 3709 3719, 2012. [18] R. Dutta and G. Rouskas, Traffic grooming in WDM networks: Past and future, IEEE Network, vol. 16, no. 6, pp. 46 56, 2002. [19]. Zhang and C. Qiao, On scheduling all-to-all personalized connection and cost-effective designs in WDM rings, IEEE/ ACM Trans. Netw., vol. 7, no. 3, pp. 435 445, 1999. [20] A. Chiu and E. Modiano, Traffic grooming algorithms for reducing electronic multiplexing costs in WDM ring networks, J. Lightwave Technol., vol. 18, no. 1, pp. 2 12, 2000. [21] K. Zhu and B. Mukherjee, Traffic grooming in an optical WDM mesh network, IEEE J. Sel. Areas Commun., vol. 20, no. 1, pp. 122 133, 2002. [22] R. Lin, W.-D. Zhong, S. K. Bose, and M. Zukerman, Design of WDM networks with multicast traffic grooming, J. Lightwave Technol., vol. 29, no. 16, pp. 2337 2349, Aug. 2011. [23] J. Wang, W. Cho, V. Vemuri, and B. Mukherjee, Improved approaches for cost-effective traffic grooming in WDM ring networks: ILP formulations and single-hop and multihop connections, J. Lightwave Technol., vol. 19, no. 11, pp. 1645 1653, 2001. [24] R. Ul-Mustafa and A. E. Kamal, Design and provisioning of WDM networks with multicast traffic grooming, IEEE J. Sel. Areas Commun., vol. 24, no. 4, pp. 37 53, 2006. [25] R. Lin, W.-D. Zhong, S. K. Bose, and M. Zukerman, Multicast traffic grooming in tap-and-continue WDM mesh networks, J. Opt. Commun. Netw., vol. 4, no. 11, pp. 918 935, Nov. 2012. [26] L. Lu, Q. Zeng, and J. Liu, A novel distributed signaling scheme for lightpath setup time optimization in dynamic wavelength-routed optical networks, Proc. SPIE, vol. 5626, pp. 35 44, 2005. [27] C. Qiao and M. Yoo, Optical burst switching (OBS) a new paradigm for an optical Internet, J. High Speed Netw., vol. 8, no. 1, pp. 69 84, 1999. [28] M. Wang, S. Li, E. W. M. Wong, and M. Zukerman, Evaluating OBS by effective utilization, IEEE Commun. Lett., vol. 17, no. 3, pp. 576 579, Mar. 2013. [29] M. Kumar and P. Kumar, Lightpath setup time optimization in wavelength routed all-optical networks, Comput. Commun., vol. 24, no. 10, pp. 984 995, 2001. [30] J. Kuri, N. Puech, M. Gagnaire, E. Dotaro, and R. Douville, Routing and wavelength assignment of scheduled lightpath demands, IEEE J. Sel. Areas Commun., vol. 21, no. 8, pp. 1231 1240, 2003. [31] L. Shen, A. Todimala, B. Ramamurthy, and. Yang, Dynamic lightpath scheduling in next-generation WDM optical networks, in Proc. INFOCOM, 2006, pp. 1 5. [32] N. Charbonneau and V. Vokkarane, A survey of advance reservation routing and wavelength assignment in wavelength-routed WDM networks, IEEE Commun. Surv. Tutorials, vol. 14, no. 4, pp. 1037 1064, 2012. [33] N. K. Singhal, L. H. Sahasrabuddhe, and B. Mukherjee, Optimal multicasting of multiple light-trees of different bandwidth granularities in a WDM mesh network with sparse splitting capabilities, IEEE/ACM Trans. Netw., vol. 14, no. 5, pp. 1104 1117, 2006. [34] ILOG CPLE, ILOG, Inc., Mountain View, CA [Online]. Available: http://www.ilog.com/products/cplex/. [35] H. Takahashi and A. Matsuyama, An approximate solution for the Steiner problem in graphs, Math. Japonica, vol. 24, no. 6, pp. 573 577, 1980.