Photon Netw Commun (2009) 18:363–377 DOI 10.1007/s11107-009-0199-5

A path-disjoint approach for blocking probability analysis in hybrid dynamic wavelength routed WDM grooming networks Kuntal Roy · Mrinal K. Naskar

Received: 31 July 2008 / Accepted: 26 February 2009 / Published online: 20 March 2009 © Springer Science+Business Media, LLC 2009

Abstract The present article addresses a novel approach to enhance the overall performance of a WDM optical network. Centralized and distributed approaches for dynamic lightpath establishment are well studied in the literature. Both the approaches have some drawbacks. In this article a hybrid approach is proposed to accept the advantages and discard the disadvantages of both the approaches. With the proposed hybrid approach, a WDM optical network is divided into clusters of nodes. Within a cluster centralized mechanism is applicable whereas connection requests between the node pairs from different clusters follow the distributed mechanism. Also, in this article an analytical model is proposed to compute the expected blocking probability of the proposed hybrid network. First, blocking probabilities for the centralized and distributed approaches are computed and then it is extended for the hybrid approach. The distinguished feature of the proposed analytical model is that it efficiently utilizes the path information of the calls to determine the overall blocking probability of a WDM optical network. It extracts the necessary parameters of a network by simulation and utilize the information to analytically calculate the blocking probability of the network. The NSFNET T1 backbone network is used for the simulation study. To justify the analytical model, the simulation results are compared with that of the analytical model. The simulation results establish the effectiveness of the proposed hybrid approach over the distributed approach in merits of both the call setup time and blocking probability. K. Roy (B) · M. K. Naskar Department of Electronics and Tele-Communication Engineering, Jadavpur University, Kolkata 700 032, India e-mail: [email protected] M. K. Naskar e-mail: [email protected]

Keywords WDM optical networks · Dynamic lightpath assignment · Traffic grooming · Hybrid approach · Cluster selection · Path-disjoint approach · Blocking probability · Setup time

1 Introduction Wavelength division multiplexing (WDM) is a promising technology in the development of optical networks. Multiple signals distinguished by their wavelengths can be carried through a fiber using WDM technology [1,2]. A route through which a specific wavelength is assigned to each hop is called a lightpath. If there is no wavelength converter at the nodes, the wavelength assigned to a lightpath should be continuous throughout the route. The objective of the Routing and Wavelength Assignment (RWA) problem is to setup the lightpaths between the source–destination node pairs of a WDM optical network. The challenge is to reduce the blocking-probability while keeping the setup time at a sufficiently moderate value.

1.1 Static and dynamic traffic With static traffic the connection requests between the node pairs in a WDM optical network are fixed beforehand. It is advantageous as RWA algorithms can be formed depending on the given traffic matrix. The practical need is to allow traffic that is dynamic in nature. With dynamic traffic the lightpath needs to be setup as the connection requests arrive and it is released after some finite amount of time. In this article the proposed approach deals with the dynamic lightpath establishment.

123

364

1.2 Centralized and distributed approach Centralized approach assumes a central agent for routing and wavelength assignment. The central agent has all the up-to-date information of the network. When a request arrives, the central agent determines the route between the source–destination node pair and also assigns a wavelength channel throughout the route. The advantage of the centralized scheme is that a lightpath is always possible to be established at sometime if the network can accommodate it. However, always keeping an up-to-date information centrally for a wide-area WDM optical network is a bottleneck and may not be reliable. The problem of centralized scheme can be solved by distributed approach. With distributed approach, each node retains the information of its neighborhood. There is no central concept in distributed approach as the name suggests. The path selection mechanism under distributed approach may be taken dynamically, i.e., each node forwards the request to another node depending on some criteria. But the wavelength selection mechanism under distributed approach has to be taken always by request forwarding and receiving response messages. The disadvantage of such approach is that some call may get blocked even if some wavelength channel can be assigned throughout the route. Also the setup time is increased due to the request forwarding and receiving response messages.

1.3 Traffic grooming The reason behind the bandwidth-division of a fiber is that its bandwidth is more than enough to carry a single signal. As the technology progresses, transmission speed of a fiber also increases from OC-48 (2.5 Gbps) to OC-192 (10 Gbps). As there are some constraints (e.g., power consumption) in increasing the number of wavelength channels without limit, the recent trend is to employ TDM slots within the wavelength channel itself. The resulting network configuration is known as WDM-TDM network or WDM grooming network. At each node in the network there are SONET add-drop multiplexers (SADMs) for each wavelength to add or drop signal streams. With traffic grooming the number of SADMs required is decreased by a ratio equal to the grooming capability of the network. Fortunately, it is not necessary for every node to be equipped with SADMs for all wavelengths. The SADM corresponding to a wavelength is required only to transmit or receive the signals at that wavelength. Therefore, cost-effective traffic grooming with SADM minimization is considered as an important issue. In this article it is assumed that every wavelength channel has a fixed number of TDM slots. But, allocation of SADMs is not considered.

123

Photon Netw Commun (2009) 18:363–377

1.4 Performance criteria: blocking probability and setup time The performance of WDM optical networks is evaluated by the following two criteria: blocking probability and setup time. Blocking probability is calculated by the total number of blocked calls divided by the total number of attempted communications. The total number of attempted communications should be large enough following the theory of probability. The setup time is the waiting time before a communication can be started, i.e., it is a measure of the time required for the selection of a route and the assignment of a wavelength. Obviously, the challenge is to keep the blocking probability as low as possible while limiting the setup time at a moderate value.

1.5 Previous works A lot of researches were carried out to enhance the blocking performance of WDM optical networks. In this respect there exist different approaches in the literature. Several approaches using centralized mechanism are proposed in [3–23]. Some of the approaches are valid only for static traffic. Also, some schemes utilize wavelength-converters (e.g., [23]) to enhance the blocking performance of WDM optical networks. In [3], the proposed model is based on the assumption that the wavelength utilization of each link is characterized by a fixed probability. Thus, the model is not applicable for dynamic traffic. An improved model for dynamic traffic is proposed in [4]. A link load correlation model is proposed in [5] by which the blocking probability of a two-hop path can be calculated and the idea can be inductively extended for a multi-hop path. A Markov chain with state-dependent arrival rates to model the blocking in arbitrary network topology is presented in [6]. In [11], fixedalternate routing is proposed. In [12,13], heuristic algorithms for routing and wavelength assignment with static traffic are proposed. A graph coloring algorithm is proposed in [14]. Routing under dynamically changing traffic is studied in [16–19]. A dynamic routing method using neighborhood information is proposed in [17]. Least-congested path for routing is suggested in [20,21] to enhance the blocking performance of WDM optical networks. A new analytical technique based on inclusion–exclusion principle is proposed in [22]. In [24], a graph transformation approach is proposed to efficiently select the route and the consequent wavelength channel. Since the centralized approach is a bottleneck for a widearea network, a lot of researches are performed to solve the problem of having only one central agent. Accordingly, distributed approaches have gained a lot of attention [25– 29]. In [27], three distributed algorithms are proposed and

Photon Netw Commun (2009) 18:363–377

compared. In [29], two basic methods for distributed lightpath establishment source- and destination-initiated routing are studied. In [30], a general routing and wavelength assignment algorithm is developed for multi-segment optical networks using the concept of blocking islands (BI). In [31], a method based on BI paradigm is proposed that maximizes the number of lightpaths between the nodes. However, the proposed distributed node-clustering method (as in [31]) for hierarchical routing has almost the same blocking probability as without clustering. Since traffic grooming in WDM networks are evolving for practical reasons, extensive researches [32–45] are performed considering the grooming capability of wavelength channels in WDM optical networks. Distributed approaches for traffic grooming in WDM optical networks are studied in [38,39]. In [40], a genetic algorithm for traffic grooming is proposed. Since every node does not require SADMs for all wavelengths, tremendous efforts are exploited to minimize the number of required SADMs with WDM grooming networks. In this respect linear programming solutions are proposed in [41,42]. In a very recent progress, a genetic evolutionary approach [43] and a heuristic approach [44] are proposed. Since the practical need is to employ dynamic traffic in WDM optical networks, the corresponding analysis signifying the quantitative trade-off between the ADMs and blocking probability is done in [45].

1.6 Proposed approach: a hybrid approach Since both the centralized and distributed approaches have their corresponding merits and demerits, a new approach (named as hybrid approach) taking only the merits of the both approaches is presented in this article to enhance the overall performance of WDM optical networks. With Hybrid approach a WDM network is clustered into nodes. A cluster should be formed in such a way that inside it centralized mechanism can be well-applicable. For intercluster calls (i.e., the calls to be established for node pairs in different clusters), distributed mechanism is suited. Every cluster has one cluster-head to establish the calls inside it and a cluster-heads keeps an up-to-date information of a cluster. However, all the nodes in the network have neighborhood information for inter-cluster calls to be established by distributed mechanism. Whenever a node has to establish a connection with another node in the network, it has the information to determine if the destination node is inside the same cluster or not. If the destination node is inside the same cluster, the respective cluster-head acts as the centralized agent for the cluster and tries to establish the call. Otherwise, if the

365

Fig. 1 Illustration of path-disjoint approach

destination node is not inside the same cluster, the node tries to establish the call using distributed mechanism.

1.7 Path-Disjoint approach for blocking probability analysis To illustrate the path-disjoint approach let us consider an example as in Fig. 1. In Fig. 1 there exist four routes: route 1, route 2, route 3, and a new route (shown with a dotted line). It can be observed that the new route overlaps with the other three routes whereas the route 1, route 2, and route 3 are disjoint with respect to each other. The routes: route 1, route 2, and route 3 can use a same wavelength channel (say wavelength channel 1) and the new route can use another wavelength channel (say wavelength channel 2) to establish the lightpath. So, to accommodate four routes we need only two wavelength channels. Thus, the number of disjoint paths existing in a network at some time instant has a greater impact on the wavelength allocation and hence on the blocking performance of the network. It depends on the network configuration and the calls characterized by the source–destination node pairs. Accordingly, the ratio determined by the number of involved wavelength channels to the number of existing routes in a network is the criterion that controls the blocking performance of a WDM optical network. Lowering this ratio means that the number of necessary wavelength channels required to establish the same number of routes is less and hence a better blocking performance can be achieved.

1.8 Outline of the remaining sections The remaining sections are organized as follows. Section 2 states the network architecture and assumptions. The proposed analytical model is presented in Sect. 3. Section 4 does an analysis on time complexity of the proposed analytical model. The simulation algorithm is described in Sect. 5. Section 6 performs a time-complexity analysis of the simulation algorithm. Simulation results showing the effectiveness of the proposed approach are presented in Sect. 7. Finally, Sect. 8 concludes the article.

123

366

Photon Netw Commun (2009) 18:363–377

2 Network architecture and assumptions The network configuration and assumptions are stated below. 1.

2. 3.

4. 5. 6. 7.

8.

9. 10.

11.

The WDM network is a connected graph. Accordingly, each node is reachable from any other node in the network. There are N nodes in the network labeled as 1, 2, 3, . . . , N . The links between the nodes are bi-directional. Each link between the nodes contains W different wavelength channels. Each channel contains T TDM slots. Accordingly, each link can accommodate W × T number of communications simultaneously. The calls (connection requests) from a node to the other nodes are generated with equal probability. Request arrivals follow the Poisson process with mean rate λ . The service rate µ is assumed to be exponentially distributed with mean of 1 time unit. Shortest path routing is assumed. In case more than one shortest path exists for a source–destination node pair, one of them is chosen arbitrarily depending on the flow of algorithm. A lightpath is characterized by a source–destination node pair (sn, dn). Since there may be N × (N − 1) different source–destination node pairs and only shortest path routing is assumed, there exist N × (N − 1) different possible lightpaths. No wavelength conversion is assumed. For the connection requests under distributed approach, a node may be permitted to initiate more than one try to select another wavelength channel if the previously selected channel is already locked by some other on-going communications. NSFNET T1 backbone network is used for simulation purpose.

3 Analytical model The proposed analytical model defines a state of the network at which some connection requests (depending on the traffic arrival rate λ) arrive to the network and persist for some finite amount of time depending on the service time µ. Since the blocking probability depends on different network parameters, the proposed analytical model extracts those by simulation and then exploits them to calculate the overall blocking probability of the network analytically. The corresponding steps are given in the following subsequent sub-sections. Since the experiments are performed over the well-known NSFNET network, the corresponding diagram is drawn in Fig. 2. It has 14 nodes and 21 bi-directional links.

123

Fig. 2 NSFNET T1 backbone network (not drawn to scale)

Fig. 3 Link overhead for the links in NSFNET Network

3.1 Capacity calculation We define a capacity C of a network by the number of calls that can be accommodated within the network without blocking. Obviously, the capacity depends on the specific calls that persist at some instant of time (defined as state in this article) in the network and accordingly, it is a function of time. But, on average, we can assume that the network can contain C number of calls at some state without blocking. Since there are N × (N − 1) distinguishable source–destination pairs in a network with N nodes, we have performed simulation for the aforesaid N × (N − 1) calls and extracted the capacity information of the network. We assume that each node has equal probability to be considered as source or destination. If the probability of each node to be source or destination is not same, the calls to be established should be determined accordingly. The corresponding simulation algorithm is given in Appendix 1. This algorithm should accord with the RWA algorithm to be used in practical scenario. Also, different probability for the nodes to be source and destination can be assigned. Simulation with NSFNET network (N = 14) results 34 channels for the 182 different calls to be established in the network. This denotes that many of the calls are path-disjoint (as described in Sect. 1.7). We define the overhead of a link between two nodes as the number of busy channels (identified by different wavelengths and consequent slots) along that link. Fig. 3 shows the number of busy channels along the links between the nodes of the NSFNET network.

Photon Netw Commun (2009) 18:363–377

367

Accordingly, the defined capacity   182 . C =W ×T × 34

tion per call and hence this parameter is used to analytically determine the overall blocking probability of a WDM optical network.

(1)

C should be rounded to the nearest integer if in case it is not purely integer. The ratio 182/34 denotes the measure of path-disjointness in the network as described in Sect. 1.7. It needs emphasis that the 183th call will increase the number 34 only if the call passes through the link 8 ↔ 9. But, if we go on simulating the next 182 calls, it is obvious that the overhead of the link 8 ↔ 9 will be doubled (during simulation, we are not terminating any existing calls). However, in practice the number 34 will go up or down depending on the termination of some of the previous calls as well as the specific calls present at the current state. If the probability of the nodes being source and destination are not same, the number of calls for the simulation should be generated depending on the probabilities. In this way, this ratio depends not only on the network connectivity matrix but also the probability of the nodes being source and destination and hence both information are considered in calculating the capacity of a WDM optical network. 3.2 Average hop-length determination Average hop-length is an important parameter for a given network. It denotes the amount of connectivity of a network. For a strongly connected network (i.e., the nodes are connected to each other frequently), the average hop-length is less than that of a loosely connected network. For NSFNET network (Fig. 2), the hop-lengths of the source–destination node pairs (1, 2), (1, 4), and (1, 11) are 1, 2, and 4, respectively. The average hop-length of a network is calculated by averaging the hop-lengths corresponding to all the distinguishable source–destination node pairs. For the NSFNET network, the average hop-length is calculated as avghop = 2.1758.

(2)

3.3 Link overhead calculation In Sect. 3.1, the simulation performed for network capacity calculation results 34 channels to establish 182 different calls characterized by different source–destination node pairs. The link 8 ↔ 9 with 34 established connections is the maximum congested link in the network. Obviously, it is true only on average basis and depends on the calls distinguished by the source–destination node pairs present at some state in the network. From the results obtained through simulation, a parameter avgLinksOh that denotes the average overhead of the links for a network is determined. It is a measure of link conges-

avgLinks Oh = mean(20, 10, 14, 20, 28, 26, 30, 26, 22, 28, 24, 20, 16, 34, 10, 6, 10, 20, 14, 1, 2, 6)/182 = 0.1306.

(3)

3.4 Cluster selection Cluster selection for the proposed hybrid approach is of immense importance as it determines the degree of improvement over distributed approach. At the time of selecting clusters, we have taken the fact into account that having more calls within a cluster eventually improves the overall blocking probability and setup time of a network with respect to the fully distributed approach. Accordingly, an algorithm is formulated to select the clusters so that more number of nodes can be accommodated in a cluster. To implement this concept, we selected the node having the maximum neighbors. In case more than one choice are available, a node is selected arbitrarily according to the flow of algorithm. Next, we form a cluster with that node and its available neighbors. In this way, we go on selecting the clusters as long as there are nodes remaining. A simplified algorithm for the same is given in Appendix 2. According to the proposed algorithm, three different sets of clusters for NSFNET network are selected. They are as follows: • • •

Cluster Set 1: {(9,8,10,12,13); (5,4,6,7,11); (3,1,2); 14} Cluster Set 2: {(6,3,5,10,14); (9,8,12,13); (2,1,4); 11; 7} Cluster Set 3: {(6,3,5,10,14); (8,1,7,9); (11,12,13); (4,2)}.

Now, we calculate the probability of having calls within the clusters for a general case. Let us consider that the number of nodes in the network is N , the number of clusters formed is n and the ith cluster contains Cli number of nodes. Then it is obvious that n 

Cli = N .

(4)

i=1

Let the probability of having calls within the ith cluster is cenci . If a source node is selected to be inside the cluster i, the destination node may be any one of the remaining Cli −1 nodes in that cluster. Since a source node can be any of the nodes inside the cluster,   Cli − 1 . (5) cenci = Cli × N × (N − 1)

123

368

Photon Netw Commun (2009) 18:363–377

So, the probability of having calls within the clusters cenc =

n 

cenci =

i=1

n  i=1

 Cli ×

 Cli − 1 . N × (N − 1)

pcs respectively, centralized blocking probability cencs = P(ncs + pcs > C)

For cluster set 1, there are four clusters: two clusters having five nodes each, one cluster having three nodes, and the remaining cluster containing only one node. Accordingly, the array Cl for cluster set 1, Cl(c1) = {5, 5, 3, 1}. Similarly, Cl(c2) = {5, 4, 3, 1, 1} and Cl(c3) = {5, 4, 3, 2}. Thus, from Eq. 6, the probability of having calls within the clusters corresponding to cluster set 1 cencc1 = 0.2528.

(7)

Similarly, cencc1 = 0.2089

(8)

and cencc1 = 0.2198.

= P(ncs > C − pcs )

(6)

(9)

During simulation the probabilities get slightly perturbed by the constraint that for a source–destination node pair, both the source and destination nodes cannot be the same node. Even if we have assumed only one-hop neighbors for cluster selection, two or more hop neighbors can be selected depending on the geographical position of the nodes in the network. Selecting multiple-hop neighbors for cluster selection will enhance the number of inter-cluster calls and hence will improve both the call setup time and blocking performance of the network under consideration.

= 1−

C− pcs  i=1

λi e−λ . i!

(10)

Now, the value of pcs is to be determined. We define the average service time of the calls at state s as delays . It is obvious that there are no non-terminated calls at the first state (state 1) as no calls arrived beforehand. So, pc1 = 0.

(11)

But at state 2, the number of previous calls pc2 is equal to the number of calls at state 1 having service time more than one time unit according to our consideration. Similarly, at state 3 the number of previous calls pc3 is the sum of the number of calls at state 1 having service times more than two time units and the number of calls at state 2 having service times more than one time unit. In this way, the number of previous calls at state s (s > 1) pcs = =

s−1  x=1 s−1  x=1

=

s−1  x=1

=

s−1 

ncx × P(delayx > s − x) ncx × (1 − P(delayx ≤ s − x))    1 s−x − p/µ ncx × 1 − e dp µ p=0 ncx × (1 − (1 − e−(s−x)/µ ))

x=1

=

s−1 

ncx × e−(s−x)/µ .

(12)

x=1

3.5 Blocking probability for centralized approach Centralized mechanism assumes one central agent that has all the up-to-date information about the channel utilization. Accordingly, if and only if the calls present at some state exceed the capacity of the network, blocking occurs. As discussed in Sect. 3.1, the capacity varies from state to state and it is true only on average basis. Anyway, we have used this parameter to determine the blocking probability analytically. We have assumed that the connection requests arrive at the states with an interval of one time unit according to the Poisson process with a mean rate λ. So, if there are R requests, the number of such states S is the integer value of R/λ. At a state there may be calls present in the network that arrived beforehand at some previous state but not terminated yet. If the number of new calls and the previous non-terminated calls present in the network at some state s are ncs and

123

Accordingly, we can determine the blocking probability at some state s under centralized approach from Eq. 10. Hence, the average blocking probability for centralized approach can be calculated as bpcen =

S 1 cen s S

(13)

s=1

where, S (depends on λ) is the number of states in the model. 3.6 Additional blocking probability on a link for distributed approach With distributed mechanism a call may be blocked even if some free wavelength channel can be allocated throughout the route. For this reason the overall blocking probability under distributed approach is expected to be greater than that

Photon Netw Commun (2009) 18:363–377

369

of under centralized approach. In this section we determine the additional blocking probability that has to be considered due to distributed approach. If there are W different wavelength channels along the links and each wavelength channel has T TDM slots, the number of possible simultaneous communications is W × T . According to our consideration, at some state s there may be some previous ongoing communication and thus the number of possible simultaneous communications at a current state might be less than W × T . Let us assume that at some state s, x calls among the new calls are using a link and the number of possible simultaneous communications for the link is Cn. In this context we are only considering the blocking for distributed approach for the case when the traffic demand is less than the number of possible simultaneous communications, i.e., x ≤ Cn. If the number of the new calls and the previous non-terminated calls in the network at some state s are pcs and ncs , respectively, Cn and x can be assumed as, Cn = W × T − pcs × avgLinks Oh

(14)

and x = ncs × avgLinks Oh.

(15)

Now, among the x calls, one call will first lock a free channel and its blocking probability is (x − 1)/Cn (since for the other x − 1 calls, each call has a 1/Cn probability of selecting the same channel. We denote this call to be the 1st call and next calls as 2nd, 3rd, . . . subsequently to present the remaining part conveniently. So, the blocking probability of the 1st call along the link is bph 1 =

x −1 . Cn

(16)

Now, the blocking-probability of the 2nd call along that link will be dependent on the blocking of the 1st call. If the 1st call is blocked, the number of free channels will be one more than that of the case if the call is not blocked. So, the blocking-probability of the 2nd call         x −1 x −1 x −1 x −1 × + × bph 2 = 1 − Cn Cn Cn Cn x −2 x −1 = + Cn Cn 2 x −2 . (17) ≈ Cn In this way if we go on calculating the blocking probability of the remaining calls, the blocking probability of the mth call is x −m (18) bph m = Cn where x ≥ m.

Hence, the blocking probability of the last call bph x = 0.

(19)

It is obvious that if there exists a free channel for a call to be established and there is no competition with the other calls, the blocking probability of the call will be zero. Accordingly, the approximate blocking-probability of all the x calls along a link bph = =

x  i=1 x  i=1

=

bph i x −1 Cn

x × (x − 1) . 2 × Cn

(20)

In practice this blocking probability will vary depending on the number of calls using the link. But, on average, this blocking probability can be used to determine the additional blocking probability analytically for distributed approach. 3.7 Additional blocking probability on a link involving number of tries for distributed approach The blocking probability calculated in the previous section corresponds to the case when for each call, a source node is trying to establish a lightpath (that ends at a destination node) only once. The blocking probability should get reduced when the number of tries is increased more than once. In this section we determine the blocking probability involving a number of tries. Let xn be the number of calls that are trying to establish their corresponding lightpaths and Cn n is the possible simultaneous communication along a link on nth try. Clearly, Cn 1 = Cn and x1 = x (Cn and x are defined and determined in the previous section). Accordingly, the additional blocking probability under distributed approach with nth try can be determined as bphtn =

xn × (xn − 1) 2 × Cn n

(21)

where xn−1 × (xn−1 − 1) 2 × Cn n−1

(22)

Cn n = Cn n−1 − (xn−1 − xn ).

(23)

xn = and

Here, (xn−1 −xn ) is the number of calls that are established already with (n − 1)th try. As the number of tries increases, the numerator decreases by square whereas denominator decreases linearly. Accordingly, the blocking probability decreases as the number of tries increases.

123

370

Photon Netw Commun (2009) 18:363–377

3.8 Blocking probability for distributed approach

can be calculated as follows

In this section, we determine the overall blocking probability for distributed approach. Under distributed approach, even if when the total number of calls in the network at some state is not greater than the capacity C of the network, there exists a probability of blocking. First, that additional blocking probability is calculated and then it is added to the centralized blocking probability to get the overall blocking probability of the network under distributed mechanism. The probability that the number of calls in the network is not greater than the network capacity C at some state s is (1−cen s ). Accordingly, we can determine the overall blocking probability under distributed approach at some state s as

bphybrid =

diss = cen s − (1 − cen s ) × avghop × bphtn

(24)

where avghop is the average hop length as determined in the Sect. 3.2 and bphtn is the additional blocking probability on a link with nth try as determined in the Sect. 3.7. So, the average blocking probability under distributed approach can be calculated as bpdis =

S 1 diss S

s=1

S 1 [diss − cenc × (1 − cen s ) = S s=1

×avghop × bphtn ] = bpdis − cenc × avghop × bphtn S 1 × (1 − cen s ) S s=1

= bpdis −cenc × avghop × bphtn × (1 − bpcen ). (28) The above equation presents the reduction of blocking probability for the proposed hybrid approach over the distributed approach. It can be noticed that as the probability of having the calls inside the clusters (i.e., cenc) increases, the blocking probability for the hybrid approach decreases that is obvious. Also, we can write the previous equation as follows (with the help of Eq. 25). bphybrid = bpcen + (1 − cenc) × avghop × bphtn

s=1

×(1 − bpcen ).

S 1 = [cen s + (1 − cen s ) S s=1

×avghop × bphtn ]

S 1 [diss − cenc × (diss − cen s )] S

(25)

(29)

This equation presents the increase of blocking probability with that of the centralized approach. Also, we can observe from the equation that as cenc increases, bphybrid decreases.

where, S (depends on λ) is the number of states in the model. 3.9 Blocking probability for hybrid approach

4 Time complexity of the analytical model

According to the proposed hybrid approach, some calls use the centralized approach and the rest of the calls use the distributed approach to establish the lightpaths between the node pairs in the network. In Sect. 3.4, we have calculated the probability of having calls within the clusters as cenc. Accordingly, we can determine the blocking probability of the calls using hybrid approach at some state s as

The following notations are used to calculate the time complexity of the proposed analytical model.

hybrids = cenc × cen s + (1 − cenc) × diss .

S 1 hybrids S s=1

S 1 = [cenc × cen s + (1 − cenc) × diss ] (27) S s=1

where, S (depends on λ) is the number of states in the model. Consequently, the blocking probability for hybrid approach

123



Capacity of the network = C. Number of states according to the proposed consideration = S. Number of tries under distributed consideration = tr yn.

(26)

So, the average blocking probability can be calculated as bphybrid =

• •

Time complexity to calculate the number of previous calls at all the states = O(1 + 2 + · · · + (S − 1)) = O(S × (S − 1)/2) = O(S 2 ). 4.1 Time complexity for centralized approach • •

Time complexity to calculate the blocking probability for all the states = O(C × S). Time complexity to calculate the average blocking probability = O(S).

Photon Netw Commun (2009) 18:363–377

So, time complexity to calculate the overall blocking probability = O(S 2 + C × S + S) = O(S × (S + C)). 4.2 Time complexity for distributed approach • •

Time complexity to calculate the blocking probability for all the states = O((C + tr yn) × S). Time complexity to calculate the average blocking probability = O(S).

So, time complexity to calculate the overall blocking probability = O(S 2 + C × S + tr yn × S + S) = O(S × (S + C + tr yn)). 4.3 Time complexity for hybrid approach

371

5.3 Algorithm for hybrid approach When a connection request is to be established, the source node has the information to decide if it can be established by centralized mechanism or not and accordingly, centralized or distributed algorithm comes into play.

6 Simulation complexity analysis To calculate the time complexity of the proposed algorithm, we have used the following notation. • •

Time complexity to calculate the overall blocking probability = O(S 2 + C × S + tr yn × S + S) = O(S × (S + C + tr yn)).

• • •

5 Algorithms for simulation

• •

In this section the simulation algorithm employed in this article is described. Connections between the nodes of the network are assumed to be bi-directional. An 1 in the connection matrix denotes a connection between the two nodes and a 0 denotes no connection. The entry at the (i, i)th positions (1 ≤ i ≤ N ) in the connectivity matrix is assumed as 1. 5.1 Algorithm for centralized approach To establish the calls inside the clusters using centralized mechanism, the shortest path routing and first-fit or random wavelength assignment are considered as RWA algorithm. The corresponding algorithm is given in Appendix 3. 5.2 Algorithm for distributed approach With distributed mechanism, the shortest path algorithm is selected as routing strategy. For wavelength assignments, first, the source node determines the wavelength channels and consequent slots that can be used for a communication by request-response messaging. Then the source node selects a wavelength channel and a consequent slot on first-fit or random selection basis. The same goes on by putting locks on the links for the selected wavelength channels and consequent slots. If conflicts occur due to some other ongoing communication, the call is blocked and it is communicated back to the source node. The corresponding algorithm is given in Appendix 4.

Number of nodes in the network = N . Number of wavelength channels in each link of the network = W . Number of TDM slots in each wavelength channel = T . Number of tries under distributed approach = tr yn. Average number of hops for a source–destination node pair = P. Number of clusters under hybrid approach = nc. Number of nodes in the largest cluster = mn.

Accordingly, • • • • •

Time required to determine the shortest path = O(P). Time required for selection of clusters = O(N 2 ). // Ref. Appendix 1 // Time required to check if a call corresponds to inside some cluster = O(nc × mn). Time required for wavelength assignment = O(P ×W × T ). Time required to establish a lightpath with distributed mechanism = O(P × tr yn). // Ref. Appendix 3 //

7 Simulation results In this section we present the simulation results. The experiments are done on well-known NSFNET network. The network architecture and assumptions are described in Sect. 2. All the simulation results are averaged 30 times to get a fairly accurate picture. The Figs. 4, 5, and 6 show the variation of blocking probability with respect to the overall capacity (i.e., the number of wavelength channels multiplied by the number of TDM slots in each channel) for variation of different parameters and different approaches considered. The results are also compared with the corresponding analytical results. Hybrid1 denotes the hybrid approach corresponding to the cluster set 1 (described in Sect. 3.4) and it is similarly for Hybrid-2 and Hybrid-3.

123

372

Photon Netw Commun (2009) 18:363–377

Fig. 4 Capacity of links versus blocking probability for both simulation and analytical model under centralized approach using first-fit mechanism with λ = 15 and µ = 1

Fig. 6 Capacity of links versus blocking probability for simulation under distributed and hybrid approaches using both the firstfit and random wavelength selection mechanisms with λ = 15, µ = 1, and tr yn = 5

Fig. 5 Capacity of links versus blocking probability for both simulation and analytical model under distributed and hybrid approaches using random wavelength selection mechanism with λ = 15, µ = 1, and tr yn = 5

Fig. 7 Traffic arrival rate versus blocking probability for both simulation and analytical model under centralized approach using first-fit mechanism with W = 8, T = 1, and µ = 1

In Fig. 4, it can be noticed that as the capacity of the links is increased, the analytical and simulation results accord more closely. The difference varies from simulation to simulation and it is dependent on the random generation of the calls as well as on their service times. The reason is described in the Sect. 3.1. However, the trend of the curves is quite similar. In Fig. 5, it can be verified that the hybrid mechanism performs better than the distributed approach with respect to blocking probability. The hybrid mechanism with cluster set 1 (Hybrid-1) performs better than the two other hybrid mechanisms as expected. In Fig. 6, it can be observed that the random wavelength selection mechanism performs better than the first-fit mechanism.

123

Figure 7 shows that as traffic arrival rate increases, the blocking probability also increases that is quite obvious. Also, the trend of the curves (simulation and analytical model) is quite similar. Figure 8 shows that as the traffic arrival rate is increased the blocking performance deteriorates. The Hybrid-1 approach performs better than the other approaches as expected. In Fig. 9, the comparison between the first-fit and random wavelength selection mechanisms is performed with respect to the traffic arrival rate. It is found that the random selection mechanism for wavelength assignment performs better. Also, it can be noticed that the Hybrid-1 mechanism performs better than the other approaches. Figure 10 shows that as the number of tries for lightpath establishment under distributed approach is increased, the blocking probability decreases. But, after sufficient increase of the number of tries, the blocking probability is going to be

Photon Netw Commun (2009) 18:363–377

Fig. 8 Traffic arrival rate versus blocking probability for both simulation and analytical model under distributed and hybrid approaches using random wavelength selection mechanism with W = 8, T = 1, µ = 1, and tr yn = 1

Fig. 9 Traffic arrival rate versus blocking probability for simulation under distributed and hybrid approaches using both the first-fit and random selection mechanism with W = 8, T = 3, µ = 1, and tr yn = 1

saturated since no free channel exists to accommodate a call. For distributed approach as the number of tries increases, the difference between the analytical and simulation results is getting prominent since it is becoming more dependent on the presence of different specific calls and their service times. From the simulation result as in Fig. 11 it is found that as the capacity of links is increased, setup time also increases. Hybrid-1 mechanism has the lowest setup time among the curves shown in the figure. Figure 12 shows the variation of setup time with traffic arrival rate. It can be observed that the Hybrid-1 mechanism performs better than the other approaches as expected. In Fig. 13 it is shown by simulation that as the number of tries is increased, the setup time also increases that is quite expected. Here, also the Hybrid 1 mechanism performs better than the others.

373

Fig. 10 Number of tries versus blocking probability for both simulation and analytical model under distributed and hybrid approach using random wavelength selection mechanism with W = 8, T = 1, λ = 15, and µ = 1

Fig. 11 Capacity of links versus setup time for simulation under distributed and hybrid approaches using random wavelength selection mechanism with λ = 15, µ = 1, and tr yn = 5

8 Conclusions In this article a hybrid approach is proposed to improve both the call setup time and blocking performance of WDM optical networks over the distributed approach. Also, a new analytical model is proposed to determine the blocking probability of the corresponding hybrid network. The analytical model is widely applicable in the sense that it extracts the necessary parameters of a network by simulation and in this way all the information, e.g., network topology, effect of employing different RWA algorithms, traffic pattern are encoded in the extracted parameters that are used to analytically determine the blocking probability of a WDM optical network. For experimental purpose shortest path routing algorithm, firstfit or random wavelength assignment, and equal probability

123

374

Photon Netw Commun (2009) 18:363–377

Step1: For each call corresponding to different source–destination node pairs Repeat Step 2 to Step 5 Step2: Find the shortest path between the source–destination node pair. Step3: Assign a continuous wavelength channel throughout the path for the communication to be established. Step4: If a new wavelength channel is needed to establish the call then introduce it. Step5: Update the number of wavelength channels along the links between the nodes. Fig. 12 Traffic arrival rate versus setup time for simulation under distributed and hybrid approaches using random wavelength selection mechanism with W = 8, T = 1, µ = 1, and tr yn = 5

Appendix 2: Algorithm of selecting clusters The procedure of selecting clusters is given below in a simple stepwise manner. Step1: Until all the nodes are in clusters Repeat Step2 to Step4. Step2: Select a node n for which it has the maximum number of connections to its neighborhood. // If duplicates found, select one of them arbitrarily. // Step3: Make a cluster taking the node n and its neighbors. Step4: Exclude the nodes that are already considered to be inside the cluster for the next iteration.

Fig. 13 Number of tries versus setup time for simulation under distributed and hybrid approaches using random wavelength selection mechanism with W = 8, T = 1, λ = 15, and µ = 1

for a node to be source or destination are assumed. However, any existing RWA algorithm along with different probability of a node being source or destination can be used. For the cluster selection algorithm, we have selected only the immediate neighbors. However, the clusters can be selected depending on the geographical positions of the nodes in the network. Both the analytical and simulation results justify the effectiveness of the proposed hybrid approach over distributed approach in merit of both the call setup time and blocking probability.

Appendix 1: Algorithm for network capacity calculation For the calls characterized by the set of different source–destination node pairs, simulation is performed to determine the number of necessary wavelength channels along each link between the nodes.

123

Appendix 3: Algorithm for centralized approach The algorithm used in this article to establish the calls using centralized approach is given below. Step1: For each call in the simulation Repeat Step2 to Step5. Step2: Select a source–destination node pair for a lightpath to be established. // Selection of a source–destination node pair is generated with uniform distribution as we have assumed that each node has equal probability to be source or destination. // Step3: Find the shortest path between the source–destination node-pair. Step4: Try to assign a continuous wavelength channel and consequent slot for the communication to be established. // In this article first-fit and random assignment of a wavelength channel and a consequent slot is considered when there exist multiple choices. // Step5: If the lightpath cannot be established, block the call.

Photon Netw Commun (2009) 18:363–377

Appendix 4: Algorithm for distributed approach The algorithm to establish calls using distributed approach is described below. Step1: For each call in the simulation Repeat Step2 to Step5. Step2: Select a source–destination node pair for a lightpath to be established. // Selection of source–destination node pair is generated with uniform distribution as we have assumed that each node has equal probability to be source or destination. // Step3: path ← Find the shortest path between the source and destination node-pair. Let the path consists of k + 1 number of hops with the nodes p0 → p1 → · · · → pk+1 where p0 is the source node and pk+1 is the destination node. Step4: Determine the wavelength channel and slot information (W T ) that can be used for the communication. Assign W T as empty. For i = 0 to k Forward request message from node pi to pi+1 . W Ti ← the wavelength channels and consequent free slots along the link pi → pi+1 . W T ← W Ti ∩ W T . I f WS is empty then Send response message back to the source node p0 that the call is blocked. End End If call is not already blocked then Send response message containing the wavelength channel and slot information (W T ) from the destination node to the source node that the corresponding channels can be used for the communication. End Step5: Try to establish the call. noFr eeChannels ← number of entries in WT. actualT r y ← minimum of the values noFr eeChannels and tr yn. // tr yn is the maximum number of attempts that is permitted // For try = 1 to actualT r y wt ← Select an entry from the available set W T . // In this article we have selected an entry depending on first-fit or random selection basis. // For i = 1 to k + 1 Try to put a lock on the link pi−1 → pi corresponding to the entry wt. If some ongoing communication has already locked the channel pi−1 → pi then

375

Send response message toward source node that the communication is blocked. Release locks from the previous links (if exists) of the path. Else Put a lock on the link pi−1 → pi . Release the lock from the previous link (if exists) of the path. (This is unlike in [27] where locks exist on the path throughout the communication until the communication is blocked or completed. This approach is intended to avail of the free resources if required by some other communication and hence to improve blocking performance of the network.) End End End

References [1] Mukherjee, B.: Optical communication networks. McGrawHill, New York (1997) [2] Ramaswami, R., Sivarajan, K.N.: Optical networks: a practical perspective. Morgan Kaufman Publishers, San Francisco (1998) [3] Barry, R.A., Humblet, P.A.: Models of blocking probability in alloptical networks with and without wavelength changers. IEEE J. Select. Areas. Commun. 14(5), 858–867 (1996) [4] Barry, R.A., Marquis, D.: An improved model of blocking probability in all-optical networks. In: 1995 Digest of the LEOS summer topical meetings, pp. 43–44, 7–1 Aug 1995 [5] Subramaniam, S., Azizoglu, M., Somani, A.K.: All-optical networks with sparse wavelength conversion. IEEE/ACM Trans. Network. 4(4), 544–557 (1996) [6] Birman, A.: Computing approximate blocking probabilities for a class of all-optical networks. IEEE J. Select. Areas. Commun. 14(5), 852–857 (1996) [7] Ramaswami, R., Sivarajan, K.N.: Routing and wavelength assignment in all-optical networks. IEEE/ACM Trans. Network. 3(5), 858–867 (1996) [8] Mokhtar, A., Azizoglu, M.: Adaptive wavelength routing in alloptical networks. IEEE/ACM Trans. Network. 6(2), 197–206 (1996) [9] Chung, S., Kashper, A., Ross, K.W.: Computing approximate blocking probabilities for large loss networks with state-dependent routing. IEEE/ACM Trans. Network. 1(1), 105–115 (1993) [10] Sridharan, A., Sivarajan, K.N.: Blocking in all-optical networks. IEEE/ACM Trans. Network. 12(2), 384–397 (2004) [11] Ramamurthy, R., Mukherjee, B.: Fixed-alternate routing and wavelength conversion in wavelength-routed optical networks. IEEE/ACM Trans. Network. 10(3), 351–367 (2002) [12] Biswas, U., Naskar, M.K., Mukhopadhyay, A., Maulik, U.: A heuristic algorithm for static wavelength assignment in WDM optical networks. IETE Tech. Rev. 22(3), 199–204 (2005) [13] Naskar, M.K., Sarkar, T., Biswas, U., Sarkar, S.K.: An efficient heuristic for static wavelength assignment in WDM optical networks. In: Conference of HOT 2003, p. 83. Calcutta, India, Feb 2003

123

376 [14] Jana, S., Chowdhury, S., Naskar, M.K., Saha, D., Mukherjee, A.: Assigning wavelengths in WDM optical networks using an efficient graph coloring algorithm. Int. J. Inform. Comput. Sci. 4(2), 1–7 (2001) [15] Saha, D., Naskar, M.K., Mukherjee, A.: Novel approach for assigning wavelengths in WDM all-optical networks (AON). In: International Conference of APOC 2001, China, Nov 2001. [16] Roy, K., Naskar, M.K., Biswas, U.: Adaptive dynamic wavelength routing for WDM optical networks. In: Third international conference on wireless and optical communications networks (WOCN)—2006, IEEE Communication Society, Bangalore, India, 11–13 April 2006 [17] Li, L., Somani, A.K.: Dynamic wavelength routing using congestion and neighborhood information. IEEE/ACM Trans. Network. 7(5), 779–786 (1999) [18] Subramaniam, S., Barry, R.A.: Dynamic wavelength assignment in fixed routing WDM networks. In: Proceedings of IEEE international conference on communications (ICC’97), pp. 406–410. Quebec, Canada, 11–13 April 1997 [19] Zhang, X., Qiao, C.: Wavelength assignment for dynamic traffic in multi-fiber WDM networks. In: IEEE ICCCN, pp. 479–485, Oct 1998 [20] Chan, K., Yum, T.P.: Analysis of least congested path routing in WDM lightwave networks. In: Proceedings of IEEE INFOCOM’94, pp. 962–969. Toronto, ON, Canada, June 1994 [21] Li, L., Somani, A.K.: Blocking performance analysis of fixedpaths least-congestion routing in multifiber WDM networks. In: Proceedings fo SPIE photonics East’99, pp. 56–67. Boston, MA, USA (1999) [22] Sridharan, A., Sivarajan, K.N.: Blocking in all-optical networks. In: Proceedings of IEEE INFOCOM, pp. 990–999, March 2000 [23] Roy, K.: A simple approach for optimal allocation of wavelength converters in WDM optical networks. In: Fourth international conference on wireless and optical communications networks (WOCN)—2007, IEEE Communication Society. Grand Hyatt, Singapore, 2–4 July 2007 [24] Zhang, Y., Taira, K., Takagi, H., Das, S.K.: An efficient heuristic for routing and wavelength assignment in optical WDM networks. In: ICOIN 2002, LNCS 2343, pp. 291–304 (2002) [25] Ramaswami, R., Segall, A.: Distributed network control for wavelength routed optical networks. In: Proceedings of IEEE INFOCOM’96, vol.1, pp. 138–147 (1996) [26] Yuan, X., Melhem, R., Gupta, R., Meim, Y., Qiao, C.: Distributed Control protocols for wavelength reservation and their performance evaluation. Photon. Network Commun. 1(3), 207–218 (1999) [27] Sengupta, A., Bandyopadhyay, S., Balla, A.R., Jackel, A.: Algorithms for dynamic routing in all-optical networks. Photon. Network Commun. 2(2), 163–184 (2000) [28] Mukhopadhyay, A., Biswas, U., Naskar, M.K.: Distributed routing and wavelength assignment algorithms for dynamic WDM all-optical networks. In: International conference on PHOTONICS—2004, page NET P.2. Cochin, India, Dec 2004 [29] Kejie, L., Xiao, G., Chlamtac, I.: Analysis of blocking probability for distributed lightpath establishment in WDM optical networks. IEEE/ACM Trans. Network. 13(1), 187–197 (2005) [30] Zhemin, D., Hamdi, M.: Routing and wavelength assignment in multi-segment WDM optical networks using clustering techniques. Photon. Network Commun. 8(1), 55–67 (2004) [31] Fukushima, Y., Harai, H., Arakawa, S., Murata, M.: A distributed clustering method for hierarchical routing in largescaled wavelength routed networks. IEICE Trans. Commun. E88B(10), 3904–3913 (2005) [32] Chiu, A.L., Modiano, E.H.: Traffic grooming algorithms for reducing electronic multiplexing costs in WDM ring networks. J. Lightwave Technol. 18(1), 2–12 (2000)

123

Photon Netw Commun (2009) 18:363–377 [33] Modiano, E., Lin, P.J.: Traffic grooming in WDM networks. IEEE Commun. Mag. 39(7), 124–129 (2001) [34] Berry, R. Modiano, E.: Reducing electronic multiplexing costs in SNET/WDM rings with dynamically changing traffic. IEEE J. Select. Areas Commun. 18(10), 1961–1971 (2000) [35] Srinivasan, R.,, Somani, A.K.: Dynamic routing in WDM grooming networks. Photon. Network Commun. 5(2), 123–135 (2003) [36] Srinivasan, R., Somani, A.K.: Request-specific routing in WDM grooming networks. In: Proceedings of IEEE ICC, pp. 2876–2880, April–May 2002 [37] Zhemin, D., Hamdi, M.: Traffic grooming in optical WDM mesh networks using the blocking island paradigm. Opt. Networks Mag. 4(6), 7–15 (2003) [38] Mukhopadhyay, A., Singh, J.K., Biswas, U., Naskar, M.K.: Distributed approaches for dynamic traffic grooming in WDM optical networks. In: International conference on CODEC-04, pp. P–55. Calcutta, India, Jan 2004 [39] Mukhopadhyay, A., Singh, J.K., Biswas, U., Naskar, M.K.: Improved distributed approaches for dynamic traffic grooming in WDM optical networks. In: DPN’04, pp. 92–96. IIT Kharagpur, India, 11–13 June 2004 [40] Mukhopadhyay, A., Biswas, U., Naskar, M.K.: A genetic algorithm for traffic grooming in unidirectional SONET/WDM rings. In: IEEE India annual conference 2004, INDICON, pp. 252–255. IIT Kharagpur, India, 20–22 Dec 2004 [41] Wang, J., Cho, W., Rao Vemuri, V., Mukherjee, B.: Improved approaches for cost-effective traffic grooming in WDM ring networks: ILP formulations and single-hop and multihop connections. J. Lightwave Technol. 19(11), 1645 (2001) [42] Hu, J.: Traffic grooming in wavelength-division-multiplexing ring networks: a linear programming solution. J. Opt. Network. 1(11), 397 (2002) [43] Roy, K., Naskar, M.K.: Genetic evolutionary algorithm for static traffc grooming to SONET over WDM optical networks. J. Comput. Commun. 30(17), 3392–3402 (2007) [44] Roy, K., Naskar, M.K.: A heuristic solution to SONET ADM minimization for static traffic grooming in WDM uni-directional ring networks. Photon. Network Commun. 12(2), 153–160 (2006) [45] Roy, K., Naskar, M.K.: Simulation-based SADM optimization approach for dynamic traffic grooming in WDM optical networks. Photon. Network Commun. 16(1), 11–21 (2008)

Author Biographies Kuntal Roy received his BE (Hons) from Electronics and Tele-Communication Engineering Department, Jadavpur University, Kolkata, India in the year 2003. He held several technical positions of application programmer in Interra IT, TCS (RFID center of excellence), and IBM during 2003– 2006. He received his Master of Science in Embedded Systems Design at Advanced Learning and Research Institute (ALaRI), University of Lugano, Switzerland in 2008. Currently, he is pursuing his PhD studies at Purdue University, Indiana, USA. His research interests include WDM optical networks, microelectronics, VLSI circuit design, nanotechnology, low power design, and embedded systems design.

Photon Netw Commun (2009) 18:363–377

377

Mrinal K. Naskar received his BTech (Hons) and MTech from ECE Department, IIT Kharagpur, India in 1987 and 1989, respectively, and PhD from Jadavpur University, India in 2006. He served as a faculty member in NIT, Jamshedpur and NIT, Durgapur during 1991–1996 and 1996– 1999 , respectively. Currently, he is with the Department of Electronics and Tele-Communication Engineering, Jadavpur University, Kolkata, India where he is in charge of the Advanced Digital and Embedded Systems Lab. His research interests include ad-hoc networks, wireless sensor networks, optical networks, and embedded systems.

123

A path-disjoint approach for blocking probability ... - Springer Link

Mar 20, 2009 - in hybrid dynamic wavelength routed WDM grooming networks ...... [44] Roy, K., Naskar, M.K.: A heuristic solution to SONET ADM min-.

735KB Sizes 3 Downloads 338 Views

Recommend Documents

A Path-Disjoint Approach for Blocking Probability ...
Department of Electronics and Tele-Communication Engineering. Jadavpur ... mation of the calls to determine the overall blocking probability of a WDM optical network. ..... With distributed mechanism a call may be blocked even if some free wavelength

A Velocity-Based Approach for Simulating Human ... - Springer Link
ing avoidance behaviour between interacting virtual characters. We first exploit ..... In: Proc. of IEEE Conference on Robotics and Automation, pp. 1928–1935 ...

A Fuzzy-Interval Based Approach for Explicit Graph ... - Springer Link
number of edges, node degrees, the attributes of nodes and the attributes of edges in ... The website [2] for the 20th International Conference on Pattern Recognition. (ICPR2010) ... Graph embedding, in this sense, is a real bridge joining the.

A Fuzzy-Interval Based Approach for Explicit Graph ... - Springer Link
Computer Vision Center, Universitat Autónoma de Barcelona, Spain. {mluqman ... number of edges, node degrees, the attributes of nodes and the attributes.

Endophenotype Approach to Developmental ... - Springer Link
research. Keywords Intermediate phenotype Æ Cognitive development Æ Autism Æ Asperger syndrome Æ. Theory of mind Æ Mentalising Æ Central coherence.

Conscience online learning: an efficient approach for ... - Springer Link
May 24, 2011 - as computer science, medical science, social science, and economics ...... ics in 2008 and M.Sc. degree in computer science in 2010 from Sun.

Topic-aware pivot language approach for statistical ... - Springer Link
Journal of Zhejiang University-SCIENCE C (Computers & Electronics). ISSN 1869-1951 (Print); ISSN 1869-196X (Online) www.zju.edu.cn/jzus; www.springerlink.com. E-mail: [email protected]. Topic-aware pivot language approach for statistical machine transl

A divide-and-conquer direct differentiation approach ... - Springer Link
Received: 29 October 2006 / Revised: 26 February 2007 / Accepted: 25 March 2007 / Published online: 18 July 2007 ... namics systems, sensitivity analysis is a critical tool for ...... Pre-multiplying (46) by (DJk )T and calling on the or-.

An Approach for the Local Exploration of Discrete ... - Springer Link
Optimization Problems. Oliver Cuate1(B), Bilel Derbel2,3, Arnaud Liefooghe2,3, El-Ghazali Talbi2,3, and Oliver Schütze1. 1. Computer Science Department ...

A Bayesian approach to object detection using ... - Springer Link
using receiver operating characteristic (ROC) analysis on several representative ... PCA Ж Bayesian approach Ж Non-Gaussian models Ж. M-estimators Ж ...

An experimental approach for investigating consumers ... - Springer Link
Feb 10, 2000 - service encounter satisfaction, overall service quality, ... and monitoring [5,7,8]. ...... Regimens," in Applications of Social Science to Clinical.

A divide-and-conquer direct differentiation approach ... - Springer Link
Jul 18, 2007 - sensitivity data in linear and logarithmic complexities for serial and parallel ... methods. These analytical methods have been used in ...

A Process Semantics for BPMN - Springer Link
Business Process Modelling Notation (BPMN), developed by the Business ..... In this paper we call both sequence flows and exception flows 'transitions'; states are linked ...... International Conference on Integrated Formal Methods, pp. 77–96 ...

A Process Semantics for BPMN - Springer Link
to formally analyse and compare BPMN diagrams. A simple example of a ... assist the development process of complex software systems has become increas-.

Evolutionary Approach to Quantum and Reversible ... - Springer Link
method of reversible circuits are closer to those of the classical digital CAD ...... of gates created by adding only Feynman gates to a seed composed of other ...... the signature correspond respectively to the following options: fitness type,.

On the “Matrix Approach” to ... - Springer Link
the same space, SW| is an element of the dual space. So SW| A |VT is ... We now look for a stationary solution of the master equation. |P(t)P. ·. =H |P(t)P .... 9. Unfortu- nately algebras of degree higher than two are very difficult to handle (see,

Wigner-Boltzmann Monte Carlo approach to ... - Springer Link
Aug 19, 2009 - Quantum and semiclassical approaches are compared for transistor simulation. ... The simplest way to model the statistics of a quantum ..... Heisenberg inequalities, such excitations, that we will call ..... pean Solid State Device Res

Exploiting Graphics Processing Units for ... - Springer Link
Then we call the CUDA function. cudaMemcpy to ..... Processing Studies (AFIPS) Conference 30, 483–485. ... download.nvidia.com/compute/cuda/1 1/Website/.

Evidence for Cyclic Spell-Out - Springer Link
Jul 23, 2001 - embedding C0 as argued in Section 2.1, this allows one to test whether object ... descriptively head-final languages but also dominantly head-initial lan- ..... The Phonology-Syntax Connection, University of Chicago Press,.

MAJORIZATION AND ADDITIVITY FOR MULTIMODE ... - Springer Link
where 〈z|ρ|z〉 is the Husimi function, |z〉 are the Glauber coherent vectors, .... Let Φ be a Gaussian gauge-covariant channel and f be a concave function on [0, 1].

Tinospora crispa - Springer Link
naturally free from side effects are still in use by diabetic patients, especially in Third .... For the perifusion studies, data from rat islets are presented as mean absolute .... treated animals showed signs of recovery in body weight gains, reach

Chloraea alpina - Springer Link
Many floral characters influence not only pollen receipt and seed set but also pollen export and the number of seeds sired in the .... inserted by natural agents were not included in the final data set. Data were analysed with a ..... Ashman, T.L. an