Abstract

Ethernet’s success in local-area networks (LANs) is fueling the efforts to extend its reach to cover metro and long-haul networks. A key enabler for using Ethernet in the carrier’s network is its ability to efficiently support multipoint-to-multipoint (MP2MP) services. MP2MP service is the core underlying structure to enable standard Ethernet services such as Ethernet virtual private networks (E-VPNs). Since most of the research, standardization, and development have focused on designing protection architectures for point-to-point (P2P) Ethernet connections, protecting E-VPN services is an important research problem. Among the various transport methods for realizing carrier Ethernet, the wavelength-division multiplexing (WDM) optical network is a strong candidate. Wavelength channel rates are increasing from 10 to 40Gbitss and even 100Gbitss, and they can also coexist in the same fiber. We study the problem of cost-efficient provisioning of multi-bit-rate (11040100Gbitss) self-protected E-VPN demands over a carrier-grade Ethernet network employing WDM optical network (Ethernet over WDM) with mixed line rates (MLRs). We study two algorithms for self-protected E-VPN provisioning. The first algorithm reforms the original E-VPN topology and increases the provisioning rates (1040100Gbitss) of the E-VPN edge demands to create excess capacity that can be used for protection (E-VPN reformation). The second algorithm routes the E-VPN edge demands using the lowest available rate (1040100Gbitss) and establishes backup capacity for protecting the E-VPN (no E-VPN reformation). Our algorithms are tested on a 17-node German national network topology. The results show that using E-VPN reformation achieves significant cost reduction and significant improvement in the network’s performance by reducing the traffic-blocking ratio.

© 2010 Optical Society of America

Full Article  |  PDF Article

References

  • View by:
  • |
  • |
  • |

  1. B. Mukherjee, Optical WDM Networks. Springer, 2006.
  2. M. Batayneh, D. A. Schupke, M. Hoffmann, A. Kirstaedter, B. Mukherjee, “Optical network design for a multiline-rate carrier-grade Ethernet under transmission-range constraints,” J. Lightwave Technol., vol. 26, no. 1, pp. 121–130, Jan. 2008.
    [CrossRef]
  3. A. Kirstaedter, C. Gruber, J. Riedl, T. Bauschert, “Carrier-grade Ethernet for packet core networks,” Proc. SPIE, vol. 6354, paper 635414, 2006.
    [CrossRef]
  4. M. Batayneh, D. A. Schupke, M. Hoffmann, A. Kirstaedter, B. Mukherjee, “Lightpath-level protection versus connection-level protection for carrier-grade Ethernet in a mixed-line-rate telecom network,” in Proc. IEEE GLOBECOM, 2007, pp. 2178–2182.
  5. http://www.metroethernetforum.org/.
  6. P. Knight, C. Lewis, “Layer 2 and 3 virtual private networks: taxonomy, technology, and standardization efforts,” IEEE Commun. Mag., vol. 42, no. 6, pp. 124–131, June 2004.
    [CrossRef]
  7. C. Cavdar, A. Gencata, B. Mukherjee, “CATZ: time-zone-aware bandwidth allocation in layer 1 VPNs,” IEEE Commun. Mag., vol. 45, no. 4, pp. 60–66, Apr. 2007.
    [CrossRef]
  8. T. Takeda, I. Inoue, R. Aubin, M. Carugi, “Layer 1 virtual private networks: service concepts, architecture requirements, and related advances in standardization,” IEEE Commun. Mag., vol. 42, no. 6, pp. 132–138, June 2004.
    [CrossRef]
  9. IETF, “L2 virtual private networks (l2vpn) working group,” http://www.ietf.org/html.charters/l2vpn-charter.html, Sept. 2004.
  10. M. Lasserre, V. Kompella, “Virtual private LAN service (VPLS) using label distribution protocol (LDP) signaling,” IETF RFC 4762, Jan. 2007.
  11. E. Rosen, W. Luo, B. Davie, V. Radoaca, “Provisioning, autodiscovery, and signaling in L2VPNs,” IETF RFC ED queue, May 2006.
  12. L. Andersson, E. Rosen, “Framework for layer 2 virtual private networks (L2VPNs),” IETF RFC 4664, Sept. 2006.
  13. E. Rosen, Y. Rekhter, “BGP/MPLS IP virtual private networks (VPN),” IETF RFC 4364, 2006.
  14. J. De Clercq, D. Ooms, M. Carugi, F. Le Faucheur, “BGP-MPLS IP VPN extension for IPv6 VPN,” IETF RFC 4659, 2006.
  15. K. Kompella, Y. Rekhter, “Virtual private LAN service (VPLS) using BGP for auto-discovery and signaling,” IETF RFC 4761, Jan. 2007.
  16. J. De Clercq, O. Paridaens, “Scalability implications of virtual private networks,” IEEE Commun. Mag., vol. 40, no. 5, pp. 151–157, May 2002.
    [CrossRef]
  17. A. Schmid-Egger, A. Kirstaedter, “Ethernet in core networks: a technical and economical analysis,” in Proc., HPSR’06, Poznan, Poland, 2006.
  18. H. Zang, J. P. Jue, B. Mukherjee, “A review of routing and wavelength assignment approaches for wavelength-routed optical WDM networks,” Opt. Networks Mag., vol. 1, no. 1, pp. 47–60, Jan. 2000.
  19. K. Zhu, B. Mukherjee, “Traffic grooming in an optical WDM mesh network,” IEEE J. Sel. Areas Commun., vol. 20, no. 1, pp. 122–133, Jan. 2002.
    [CrossRef]
  20. C. Ou, K. Zhu, H. Zang, L. H. Sahasrabuddhe, B. Mukherjee, “Traffic grooming for survivable WDM networks-shared protection,” IEEE J. Sel. Areas Commun., vol. 21, no. 9, pp. 1367–1383, Nov. 2003.
    [CrossRef]
  21. D. Banerjee, B. Mukherjee, “Wavelength-routed optical networks: linear formulation, resource budgeting tradeoffs, and a reconfiguration study,” IEEE/ACM Trans. Netw., vol. 8, no. 5, pp. 598–607, Oct. 2000.
    [CrossRef]
  22. J. Yen, “Finding the K shortest loopless paths in a network,” Manage. Sci., vol. 17, no. 11, pp. 712–716, July 1971.
    [CrossRef]

2008

2007

C. Cavdar, A. Gencata, B. Mukherjee, “CATZ: time-zone-aware bandwidth allocation in layer 1 VPNs,” IEEE Commun. Mag., vol. 45, no. 4, pp. 60–66, Apr. 2007.
[CrossRef]

2006

A. Kirstaedter, C. Gruber, J. Riedl, T. Bauschert, “Carrier-grade Ethernet for packet core networks,” Proc. SPIE, vol. 6354, paper 635414, 2006.
[CrossRef]

2004

P. Knight, C. Lewis, “Layer 2 and 3 virtual private networks: taxonomy, technology, and standardization efforts,” IEEE Commun. Mag., vol. 42, no. 6, pp. 124–131, June 2004.
[CrossRef]

T. Takeda, I. Inoue, R. Aubin, M. Carugi, “Layer 1 virtual private networks: service concepts, architecture requirements, and related advances in standardization,” IEEE Commun. Mag., vol. 42, no. 6, pp. 132–138, June 2004.
[CrossRef]

2003

C. Ou, K. Zhu, H. Zang, L. H. Sahasrabuddhe, B. Mukherjee, “Traffic grooming for survivable WDM networks-shared protection,” IEEE J. Sel. Areas Commun., vol. 21, no. 9, pp. 1367–1383, Nov. 2003.
[CrossRef]

2002

J. De Clercq, O. Paridaens, “Scalability implications of virtual private networks,” IEEE Commun. Mag., vol. 40, no. 5, pp. 151–157, May 2002.
[CrossRef]

K. Zhu, B. Mukherjee, “Traffic grooming in an optical WDM mesh network,” IEEE J. Sel. Areas Commun., vol. 20, no. 1, pp. 122–133, Jan. 2002.
[CrossRef]

2000

H. Zang, J. P. Jue, B. Mukherjee, “A review of routing and wavelength assignment approaches for wavelength-routed optical WDM networks,” Opt. Networks Mag., vol. 1, no. 1, pp. 47–60, Jan. 2000.

D. Banerjee, B. Mukherjee, “Wavelength-routed optical networks: linear formulation, resource budgeting tradeoffs, and a reconfiguration study,” IEEE/ACM Trans. Netw., vol. 8, no. 5, pp. 598–607, Oct. 2000.
[CrossRef]

1971

J. Yen, “Finding the K shortest loopless paths in a network,” Manage. Sci., vol. 17, no. 11, pp. 712–716, July 1971.
[CrossRef]

Andersson, L.

L. Andersson, E. Rosen, “Framework for layer 2 virtual private networks (L2VPNs),” IETF RFC 4664, Sept. 2006.

Aubin, R.

T. Takeda, I. Inoue, R. Aubin, M. Carugi, “Layer 1 virtual private networks: service concepts, architecture requirements, and related advances in standardization,” IEEE Commun. Mag., vol. 42, no. 6, pp. 132–138, June 2004.
[CrossRef]

Banerjee, D.

D. Banerjee, B. Mukherjee, “Wavelength-routed optical networks: linear formulation, resource budgeting tradeoffs, and a reconfiguration study,” IEEE/ACM Trans. Netw., vol. 8, no. 5, pp. 598–607, Oct. 2000.
[CrossRef]

Batayneh, M.

M. Batayneh, D. A. Schupke, M. Hoffmann, A. Kirstaedter, B. Mukherjee, “Optical network design for a multiline-rate carrier-grade Ethernet under transmission-range constraints,” J. Lightwave Technol., vol. 26, no. 1, pp. 121–130, Jan. 2008.
[CrossRef]

M. Batayneh, D. A. Schupke, M. Hoffmann, A. Kirstaedter, B. Mukherjee, “Lightpath-level protection versus connection-level protection for carrier-grade Ethernet in a mixed-line-rate telecom network,” in Proc. IEEE GLOBECOM, 2007, pp. 2178–2182.

Bauschert, T.

A. Kirstaedter, C. Gruber, J. Riedl, T. Bauschert, “Carrier-grade Ethernet for packet core networks,” Proc. SPIE, vol. 6354, paper 635414, 2006.
[CrossRef]

Carugi, M.

T. Takeda, I. Inoue, R. Aubin, M. Carugi, “Layer 1 virtual private networks: service concepts, architecture requirements, and related advances in standardization,” IEEE Commun. Mag., vol. 42, no. 6, pp. 132–138, June 2004.
[CrossRef]

J. De Clercq, D. Ooms, M. Carugi, F. Le Faucheur, “BGP-MPLS IP VPN extension for IPv6 VPN,” IETF RFC 4659, 2006.

Cavdar, C.

C. Cavdar, A. Gencata, B. Mukherjee, “CATZ: time-zone-aware bandwidth allocation in layer 1 VPNs,” IEEE Commun. Mag., vol. 45, no. 4, pp. 60–66, Apr. 2007.
[CrossRef]

Davie, B.

E. Rosen, W. Luo, B. Davie, V. Radoaca, “Provisioning, autodiscovery, and signaling in L2VPNs,” IETF RFC ED queue, May 2006.

De Clercq, J.

J. De Clercq, O. Paridaens, “Scalability implications of virtual private networks,” IEEE Commun. Mag., vol. 40, no. 5, pp. 151–157, May 2002.
[CrossRef]

J. De Clercq, D. Ooms, M. Carugi, F. Le Faucheur, “BGP-MPLS IP VPN extension for IPv6 VPN,” IETF RFC 4659, 2006.

Gencata, A.

C. Cavdar, A. Gencata, B. Mukherjee, “CATZ: time-zone-aware bandwidth allocation in layer 1 VPNs,” IEEE Commun. Mag., vol. 45, no. 4, pp. 60–66, Apr. 2007.
[CrossRef]

Gruber, C.

A. Kirstaedter, C. Gruber, J. Riedl, T. Bauschert, “Carrier-grade Ethernet for packet core networks,” Proc. SPIE, vol. 6354, paper 635414, 2006.
[CrossRef]

Hoffmann, M.

M. Batayneh, D. A. Schupke, M. Hoffmann, A. Kirstaedter, B. Mukherjee, “Optical network design for a multiline-rate carrier-grade Ethernet under transmission-range constraints,” J. Lightwave Technol., vol. 26, no. 1, pp. 121–130, Jan. 2008.
[CrossRef]

M. Batayneh, D. A. Schupke, M. Hoffmann, A. Kirstaedter, B. Mukherjee, “Lightpath-level protection versus connection-level protection for carrier-grade Ethernet in a mixed-line-rate telecom network,” in Proc. IEEE GLOBECOM, 2007, pp. 2178–2182.

Inoue, I.

T. Takeda, I. Inoue, R. Aubin, M. Carugi, “Layer 1 virtual private networks: service concepts, architecture requirements, and related advances in standardization,” IEEE Commun. Mag., vol. 42, no. 6, pp. 132–138, June 2004.
[CrossRef]

Jue, J. P.

H. Zang, J. P. Jue, B. Mukherjee, “A review of routing and wavelength assignment approaches for wavelength-routed optical WDM networks,” Opt. Networks Mag., vol. 1, no. 1, pp. 47–60, Jan. 2000.

Kirstaedter, A.

M. Batayneh, D. A. Schupke, M. Hoffmann, A. Kirstaedter, B. Mukherjee, “Optical network design for a multiline-rate carrier-grade Ethernet under transmission-range constraints,” J. Lightwave Technol., vol. 26, no. 1, pp. 121–130, Jan. 2008.
[CrossRef]

A. Kirstaedter, C. Gruber, J. Riedl, T. Bauschert, “Carrier-grade Ethernet for packet core networks,” Proc. SPIE, vol. 6354, paper 635414, 2006.
[CrossRef]

M. Batayneh, D. A. Schupke, M. Hoffmann, A. Kirstaedter, B. Mukherjee, “Lightpath-level protection versus connection-level protection for carrier-grade Ethernet in a mixed-line-rate telecom network,” in Proc. IEEE GLOBECOM, 2007, pp. 2178–2182.

A. Schmid-Egger, A. Kirstaedter, “Ethernet in core networks: a technical and economical analysis,” in Proc., HPSR’06, Poznan, Poland, 2006.

Knight, P.

P. Knight, C. Lewis, “Layer 2 and 3 virtual private networks: taxonomy, technology, and standardization efforts,” IEEE Commun. Mag., vol. 42, no. 6, pp. 124–131, June 2004.
[CrossRef]

Kompella, K.

K. Kompella, Y. Rekhter, “Virtual private LAN service (VPLS) using BGP for auto-discovery and signaling,” IETF RFC 4761, Jan. 2007.

Kompella, V.

M. Lasserre, V. Kompella, “Virtual private LAN service (VPLS) using label distribution protocol (LDP) signaling,” IETF RFC 4762, Jan. 2007.

Lasserre, M.

M. Lasserre, V. Kompella, “Virtual private LAN service (VPLS) using label distribution protocol (LDP) signaling,” IETF RFC 4762, Jan. 2007.

Le Faucheur, F.

J. De Clercq, D. Ooms, M. Carugi, F. Le Faucheur, “BGP-MPLS IP VPN extension for IPv6 VPN,” IETF RFC 4659, 2006.

Lewis, C.

P. Knight, C. Lewis, “Layer 2 and 3 virtual private networks: taxonomy, technology, and standardization efforts,” IEEE Commun. Mag., vol. 42, no. 6, pp. 124–131, June 2004.
[CrossRef]

Luo, W.

E. Rosen, W. Luo, B. Davie, V. Radoaca, “Provisioning, autodiscovery, and signaling in L2VPNs,” IETF RFC ED queue, May 2006.

Mukherjee, B.

M. Batayneh, D. A. Schupke, M. Hoffmann, A. Kirstaedter, B. Mukherjee, “Optical network design for a multiline-rate carrier-grade Ethernet under transmission-range constraints,” J. Lightwave Technol., vol. 26, no. 1, pp. 121–130, Jan. 2008.
[CrossRef]

C. Cavdar, A. Gencata, B. Mukherjee, “CATZ: time-zone-aware bandwidth allocation in layer 1 VPNs,” IEEE Commun. Mag., vol. 45, no. 4, pp. 60–66, Apr. 2007.
[CrossRef]

C. Ou, K. Zhu, H. Zang, L. H. Sahasrabuddhe, B. Mukherjee, “Traffic grooming for survivable WDM networks-shared protection,” IEEE J. Sel. Areas Commun., vol. 21, no. 9, pp. 1367–1383, Nov. 2003.
[CrossRef]

K. Zhu, B. Mukherjee, “Traffic grooming in an optical WDM mesh network,” IEEE J. Sel. Areas Commun., vol. 20, no. 1, pp. 122–133, Jan. 2002.
[CrossRef]

H. Zang, J. P. Jue, B. Mukherjee, “A review of routing and wavelength assignment approaches for wavelength-routed optical WDM networks,” Opt. Networks Mag., vol. 1, no. 1, pp. 47–60, Jan. 2000.

D. Banerjee, B. Mukherjee, “Wavelength-routed optical networks: linear formulation, resource budgeting tradeoffs, and a reconfiguration study,” IEEE/ACM Trans. Netw., vol. 8, no. 5, pp. 598–607, Oct. 2000.
[CrossRef]

M. Batayneh, D. A. Schupke, M. Hoffmann, A. Kirstaedter, B. Mukherjee, “Lightpath-level protection versus connection-level protection for carrier-grade Ethernet in a mixed-line-rate telecom network,” in Proc. IEEE GLOBECOM, 2007, pp. 2178–2182.

B. Mukherjee, Optical WDM Networks. Springer, 2006.

Ooms, D.

J. De Clercq, D. Ooms, M. Carugi, F. Le Faucheur, “BGP-MPLS IP VPN extension for IPv6 VPN,” IETF RFC 4659, 2006.

Ou, C.

C. Ou, K. Zhu, H. Zang, L. H. Sahasrabuddhe, B. Mukherjee, “Traffic grooming for survivable WDM networks-shared protection,” IEEE J. Sel. Areas Commun., vol. 21, no. 9, pp. 1367–1383, Nov. 2003.
[CrossRef]

Paridaens, O.

J. De Clercq, O. Paridaens, “Scalability implications of virtual private networks,” IEEE Commun. Mag., vol. 40, no. 5, pp. 151–157, May 2002.
[CrossRef]

Radoaca, V.

E. Rosen, W. Luo, B. Davie, V. Radoaca, “Provisioning, autodiscovery, and signaling in L2VPNs,” IETF RFC ED queue, May 2006.

Rekhter, Y.

E. Rosen, Y. Rekhter, “BGP/MPLS IP virtual private networks (VPN),” IETF RFC 4364, 2006.

K. Kompella, Y. Rekhter, “Virtual private LAN service (VPLS) using BGP for auto-discovery and signaling,” IETF RFC 4761, Jan. 2007.

Riedl, J.

A. Kirstaedter, C. Gruber, J. Riedl, T. Bauschert, “Carrier-grade Ethernet for packet core networks,” Proc. SPIE, vol. 6354, paper 635414, 2006.
[CrossRef]

Rosen, E.

L. Andersson, E. Rosen, “Framework for layer 2 virtual private networks (L2VPNs),” IETF RFC 4664, Sept. 2006.

E. Rosen, Y. Rekhter, “BGP/MPLS IP virtual private networks (VPN),” IETF RFC 4364, 2006.

E. Rosen, W. Luo, B. Davie, V. Radoaca, “Provisioning, autodiscovery, and signaling in L2VPNs,” IETF RFC ED queue, May 2006.

Sahasrabuddhe, L. H.

C. Ou, K. Zhu, H. Zang, L. H. Sahasrabuddhe, B. Mukherjee, “Traffic grooming for survivable WDM networks-shared protection,” IEEE J. Sel. Areas Commun., vol. 21, no. 9, pp. 1367–1383, Nov. 2003.
[CrossRef]

Schmid-Egger, A.

A. Schmid-Egger, A. Kirstaedter, “Ethernet in core networks: a technical and economical analysis,” in Proc., HPSR’06, Poznan, Poland, 2006.

Schupke, D. A.

M. Batayneh, D. A. Schupke, M. Hoffmann, A. Kirstaedter, B. Mukherjee, “Optical network design for a multiline-rate carrier-grade Ethernet under transmission-range constraints,” J. Lightwave Technol., vol. 26, no. 1, pp. 121–130, Jan. 2008.
[CrossRef]

M. Batayneh, D. A. Schupke, M. Hoffmann, A. Kirstaedter, B. Mukherjee, “Lightpath-level protection versus connection-level protection for carrier-grade Ethernet in a mixed-line-rate telecom network,” in Proc. IEEE GLOBECOM, 2007, pp. 2178–2182.

Takeda, T.

T. Takeda, I. Inoue, R. Aubin, M. Carugi, “Layer 1 virtual private networks: service concepts, architecture requirements, and related advances in standardization,” IEEE Commun. Mag., vol. 42, no. 6, pp. 132–138, June 2004.
[CrossRef]

Yen, J.

J. Yen, “Finding the K shortest loopless paths in a network,” Manage. Sci., vol. 17, no. 11, pp. 712–716, July 1971.
[CrossRef]

Zang, H.

C. Ou, K. Zhu, H. Zang, L. H. Sahasrabuddhe, B. Mukherjee, “Traffic grooming for survivable WDM networks-shared protection,” IEEE J. Sel. Areas Commun., vol. 21, no. 9, pp. 1367–1383, Nov. 2003.
[CrossRef]

H. Zang, J. P. Jue, B. Mukherjee, “A review of routing and wavelength assignment approaches for wavelength-routed optical WDM networks,” Opt. Networks Mag., vol. 1, no. 1, pp. 47–60, Jan. 2000.

Zhu, K.

C. Ou, K. Zhu, H. Zang, L. H. Sahasrabuddhe, B. Mukherjee, “Traffic grooming for survivable WDM networks-shared protection,” IEEE J. Sel. Areas Commun., vol. 21, no. 9, pp. 1367–1383, Nov. 2003.
[CrossRef]

K. Zhu, B. Mukherjee, “Traffic grooming in an optical WDM mesh network,” IEEE J. Sel. Areas Commun., vol. 20, no. 1, pp. 122–133, Jan. 2002.
[CrossRef]

IEEE Commun. Mag.

P. Knight, C. Lewis, “Layer 2 and 3 virtual private networks: taxonomy, technology, and standardization efforts,” IEEE Commun. Mag., vol. 42, no. 6, pp. 124–131, June 2004.
[CrossRef]

C. Cavdar, A. Gencata, B. Mukherjee, “CATZ: time-zone-aware bandwidth allocation in layer 1 VPNs,” IEEE Commun. Mag., vol. 45, no. 4, pp. 60–66, Apr. 2007.
[CrossRef]

T. Takeda, I. Inoue, R. Aubin, M. Carugi, “Layer 1 virtual private networks: service concepts, architecture requirements, and related advances in standardization,” IEEE Commun. Mag., vol. 42, no. 6, pp. 132–138, June 2004.
[CrossRef]

J. De Clercq, O. Paridaens, “Scalability implications of virtual private networks,” IEEE Commun. Mag., vol. 40, no. 5, pp. 151–157, May 2002.
[CrossRef]

IEEE J. Sel. Areas Commun.

K. Zhu, B. Mukherjee, “Traffic grooming in an optical WDM mesh network,” IEEE J. Sel. Areas Commun., vol. 20, no. 1, pp. 122–133, Jan. 2002.
[CrossRef]

C. Ou, K. Zhu, H. Zang, L. H. Sahasrabuddhe, B. Mukherjee, “Traffic grooming for survivable WDM networks-shared protection,” IEEE J. Sel. Areas Commun., vol. 21, no. 9, pp. 1367–1383, Nov. 2003.
[CrossRef]

IEEE/ACM Trans. Netw.

D. Banerjee, B. Mukherjee, “Wavelength-routed optical networks: linear formulation, resource budgeting tradeoffs, and a reconfiguration study,” IEEE/ACM Trans. Netw., vol. 8, no. 5, pp. 598–607, Oct. 2000.
[CrossRef]

J. Lightwave Technol.

Manage. Sci.

J. Yen, “Finding the K shortest loopless paths in a network,” Manage. Sci., vol. 17, no. 11, pp. 712–716, July 1971.
[CrossRef]

Opt. Networks Mag.

H. Zang, J. P. Jue, B. Mukherjee, “A review of routing and wavelength assignment approaches for wavelength-routed optical WDM networks,” Opt. Networks Mag., vol. 1, no. 1, pp. 47–60, Jan. 2000.

Proc. SPIE

A. Kirstaedter, C. Gruber, J. Riedl, T. Bauschert, “Carrier-grade Ethernet for packet core networks,” Proc. SPIE, vol. 6354, paper 635414, 2006.
[CrossRef]

Other

M. Batayneh, D. A. Schupke, M. Hoffmann, A. Kirstaedter, B. Mukherjee, “Lightpath-level protection versus connection-level protection for carrier-grade Ethernet in a mixed-line-rate telecom network,” in Proc. IEEE GLOBECOM, 2007, pp. 2178–2182.

http://www.metroethernetforum.org/.

B. Mukherjee, Optical WDM Networks. Springer, 2006.

A. Schmid-Egger, A. Kirstaedter, “Ethernet in core networks: a technical and economical analysis,” in Proc., HPSR’06, Poznan, Poland, 2006.

IETF, “L2 virtual private networks (l2vpn) working group,” http://www.ietf.org/html.charters/l2vpn-charter.html, Sept. 2004.

M. Lasserre, V. Kompella, “Virtual private LAN service (VPLS) using label distribution protocol (LDP) signaling,” IETF RFC 4762, Jan. 2007.

E. Rosen, W. Luo, B. Davie, V. Radoaca, “Provisioning, autodiscovery, and signaling in L2VPNs,” IETF RFC ED queue, May 2006.

L. Andersson, E. Rosen, “Framework for layer 2 virtual private networks (L2VPNs),” IETF RFC 4664, Sept. 2006.

E. Rosen, Y. Rekhter, “BGP/MPLS IP virtual private networks (VPN),” IETF RFC 4364, 2006.

J. De Clercq, D. Ooms, M. Carugi, F. Le Faucheur, “BGP-MPLS IP VPN extension for IPv6 VPN,” IETF RFC 4659, 2006.

K. Kompella, Y. Rekhter, “Virtual private LAN service (VPLS) using BGP for auto-discovery and signaling,” IETF RFC 4761, Jan. 2007.

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (18)

Fig. 1
Fig. 1

MP2MP E-VPN example.

Fig. 2
Fig. 2

Node architecture.

Fig. 3
Fig. 3

Case 1: protection by adding backup Ethertunnels (dotted lines) at a 10 - Gbit s rate.

Fig. 4
Fig. 4

Case 1: routing over the physical topology.

Fig. 5
Fig. 5

Case 2: protection by increasing rates from 10 to 40 Gbits s .

Fig. 6
Fig. 6

Case 2: routing over the physical topology.

Fig. 7
Fig. 7

Original E-VPN request.

Fig. 8
Fig. 8

Modified E-VPN: (a) E-VPN with rate-raised edges (thick line = 40 Gbits s , thin line = 10 Gbits s ) and (b) edges with available capacity (Gbits/s).

Fig. 9
Fig. 9

Modified E-VPN: (a) E-VPN after raising the rates of edges (a, d) and (e, f), (b) E-VPN with adding new edge (b, e).

Fig. 10
Fig. 10

Auxiliary graph for the node in Fig. 2.

Fig. 11
Fig. 11

Three-node sample network.

Fig. 12
Fig. 12

Auxiliary graph for the three-node sample network.

Fig. 13
Fig. 13

Network cost.

Fig. 14
Fig. 14

Normalized network cost.

Fig. 15
Fig. 15

E-VPN-blocking ratio (VBR).

Fig. 16
Fig. 16

P2P Ethertunnel-blocking ratio (EBR).

Fig. 17
Fig. 17

Average Ethernet interface utilization per node.

Fig. 18
Fig. 18

Interface utilization at load = 120 E-VPNs.

Tables (2)

Tables Icon

Table 1 Algorithm 1 E-VPN Reformation

Tables Icon

Table 2 Algorithm 2 MLR Routing