Wavelength Division Multiplexing
Wavelength Division Multiplexing
IJESRT
INTERNATIONAL JOURNA
JOURNAL OF ENGINEERING SCIENCES
ENCES & RESEARCH
TECHNOLOGY
Wavelength Division Multiplexing
Neeraj Jindal*1, Shweta Lakhara 2
*1
Department of Electronics
lectronics &
&Communication Engineering, Chartered Institute of Technology,
Abu Road , India
2
Department of Computer Science Engineering
Engineering, Chartered Institute of Technology,
Abu Road , India
[email protected]
Abstract
In Wavelength Division Multiplexing (WDM) networks, there is huge amount of available bandwidth
so each light path can carry a huge amount of traffic and if somehow any failure occurs. It may seriously damage the
end-user applications. Hence fault-tolerance
tolerance becomes an important issue on these types of networks. The light
path which carries traffic during normal operation is called as primary path. In case any failure occurs, the same
traffic is rerouted on an alternative path that may be called as backup pat path.
h. This paper mainly presents the
routing approach for establishing primary and backup paths. In order to establish the primary path, this
approach uses load balancing in which link cost metrics are estimated based on the current load of the links.
l In
backup path setup, the source calculates the blocking probability through the received feedback from the destination
by sending a small fraction of probe packets along the existing paths. It then selects the optimal light path with
the lowestest blocking probability. This approach reduces the blocking probability and latency at the same time
increases the throughput and channel utilization.
Introduction
Wavelength Division Multiplexing (WDM)
Network
The term wavelength-division
division multiplexing
is commonly applied to an optical carrier (which is
typically described by its wavelength), whereas
frequency-division
division multiplexing (FDM) typically
applies to a radio carrier (which is more often
described by frequency). Since wavelength and
frequency are tied together through a simple
relationship, the two terms actually describe the same
Fig1: Basic point to point
concept. WDM system uses a multiplexer at the
communication configuration using mux-
mux
transmitter to joinoin the signals together and a demux
demultiplexer at the receiver to split them apart [1]. WDM multiplexer (MUX) combines N independent
With the right type of fiber it is possible to have a data streams, each on a unique wavelength, and sends
device that that does both simultaneously, and can them on a fibre.. Demultiplexer (DEMUX) at the
function as an optical add-drop
drop multiplexer (OADM). fibre’s receiving end separates out these data streams.
Fig 2 shows use of star couplers thereby obviating the
need of multiplexer and Demultiplexer [2].
http: // www.ijesrt.com (C) International Journal of Engineering Sciences & Research Technology[466-470]
Technology
[Jindal, 1(8): Oct., 2012] ISSN: 2277-9655
http: // www.ijesrt.com (C) International Journal of Engineering Sciences & Research Technology[466-470]
[Jindal, 1(8): Oct., 2012] ISSN: 2277-9655
possible causes of blocking into account. The scheme that searches for disjoint paths, their methods
behavior of their algorithm was tested in well have considerably higher routing success rates which
known case study of mesh networks, with and are shown through the simulation results.
without wavelength conversion. Yufeng Xin, Jing Teng, Gigi Karmous-Edwards,
A.Rajkumar and N.S.Murthy Sharma [6] have George N.Rouskas and Daniel [11] have studied the
proposed a distributed priority important fault management issue which concentrates
based routing algorithm. In order to establish on the fast restoration mechanisms for Optical Burst
the primary and backup light paths they have Switched (OBS) networks. The OBS network
proposed a variety of traffic classes which uses operates under the JIT signaling protocol. The basic
the concept of load balancing. Based on the load routing mechanism is similar to the IP networks,
on the links, their algorithm estimates the cost metric. where every OBS node maintains a local forwarding
The routing of high priority traffic was performed table. The entries in the forwarding table consist of
over the lightly loaded links. Therefore while routing the next hop information for the bursts per
the primary and backup paths, the lightly loaded destination and per FEC (Forward Equivalent Class).
links are chosen instead of choosing the links with Based on looking up the next-hop information in
heavier loads. The load balancing will not reflect their forwarding tables, OBS nodes forwards the
the dynamic load changes because it is used in the coming burst control packets and set up the
routing metric. Michael T. Frederick and Arun K. connections. The connection set up process is
Somani [7] have presented an L+1 fault tolerance signified by the burst forwarding or burst routing.
which is used for the recovery of optical networks Jian Wang, Laxman Sahasrabuddhe and Biswanath
from single link failures without the allocation of Mukherjee [12] have considered the fault-monitoring
valuable system resources. While the approach in functions which are usually provided by the optical-
its simplest form performs well against the existing transmission systems. In order to measure the bit
schemes, the flexibility of L+1 leave many options to error rate in the wavelength channels using SONET
examine possible ways to further increase framing, the B1 bit in the SONET overhead can be
performance. used. Moreover, to detect certain failures like fiber
Muriel M’edard [8] has described that the protection cut in other formatted optical channels, the optical
routes are pre-computed at a single location and thus power loss can be used. Optical-Electrical-Optical
it is centralized. Before the restoration of the traffic, (OEO) conversion is used before each OXC port
some distributed reconfiguration of optical switches because most of the OXCs use electronic switching
is essential. On the other hand, restoration techniques fabric. Therefore, faults can be detected on link-by-
depend upon distributed signaling between nodes or link basis. Both the end nodes of the failed link can
on the allocation of a new path by a central manager. detect the fibre cut for all-optical switches. S
Hongsik Choi, Suresh Subramaniam and Hyeong-Ah
Choi [9] have considered the network survivability Routing Approach
which is a critical requirement in the high-speed In order to establish the primary path, this approach
optical networks. A failure model is considered so uses the concept of load balancing. Given a physical
that any two links in the network may fail in an network with the link costs and the traffic
random order. They have presented three loop back requirements between every source-destination pair,
methods of recovering from double-link failures. then finding a route of the light paths for the network
Only the first two methods require the identification with least congestion, is called as .load balancing. In
of the failed links. But pre-computing the backup this approach, based on the load of the links the cost
paths for the third method is more complex than the metric is estimated. The traffic is routed over the
first two methods. The double link failures are lightly loaded links. Therefore when routing the
tolerated by the heuristic algorithm which primary path, the links with the lighter loads are
pre- computes the backup paths for links. selected instead of links with the heavier loads. Using
Dong–won shin, Edwin K.P.Chong and Howard Jay path restoration backup paths are established. In
Siegel [10] have developed two heuristic multipath backup path setup, the source sends a small fraction
routing schemes for survivable multipath problem of probe packets along the existing paths. For a
called CPMR (Conditional Penalization Multipath higher burst arrival rate, the fraction of
Routing) and SPMR (Successive Penalization traffic probing will be lower. For a slow changing
Multipath Routing). traffic, the period of update will be higher resulting in
Their schemes use “link penalization” an even smaller fraction. The source edge can
methods to control (but not prohibit) link-sharing monitor and identify the requests that are rejected
to deal with the difficulties caused by the link at the network based on receiving the
sharing. When compared with the routing PACKS/NACKS from the destinations [13]. Thus the
http: // www.ijesrt.com (C) International Journal of Engineering Sciences & Research Technology[466-470]
[Jindal, 1(8): Oct., 2012] ISSN: 2277-9655
http: // www.ijesrt.com (C) International Journal of Engineering Sciences & Research Technology[466-470]
[Jindal, 1(8): Oct., 2012] ISSN: 2277-9655
http: // www.ijesrt.com (C) International Journal of Engineering Sciences & Research Technology[466-470]