WO2003007557A1 - Method for routing in telecommunications networks - Google Patents

Method for routing in telecommunications networks Download PDF

Info

Publication number
WO2003007557A1
WO2003007557A1 PCT/IB2002/003365 IB0203365W WO03007557A1 WO 2003007557 A1 WO2003007557 A1 WO 2003007557A1 IB 0203365 W IB0203365 W IB 0203365W WO 03007557 A1 WO03007557 A1 WO 03007557A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
graph
fictitious
original
arch
Prior art date
Application number
PCT/IB2002/003365
Other languages
French (fr)
Inventor
Barbara Ghiglino
Marcello Orizi
Original Assignee
Marconi Communications Spa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Marconi Communications Spa filed Critical Marconi Communications Spa
Priority to DE60237612T priority Critical patent/DE60237612D1/en
Priority to EP02755539A priority patent/EP1410583B1/en
Priority to US10/483,691 priority patent/US7003300B2/en
Priority to AT02755539T priority patent/ATE480931T1/en
Priority to CA002453238A priority patent/CA2453238A1/en
Priority to JP2003513196A priority patent/JP2004535140A/en
Publication of WO2003007557A1 publication Critical patent/WO2003007557A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/123Evaluation of link metrics

Definitions

  • the present invention relates to methods for finding optimal paths (routing) quickly and efficiently within telecommunications networks and in particular with SDH or WDM traffic.
  • the general purpose of the present invention is to remedy the above mentioned shortcomings by making available a method enabling routing in telecommunications networks with greater efficiency, scalable so as not to be affected in an unacceptable manner by the increase in apparatuses and links in the network, and which would allow tracing the optimal path while respecting any connection restrictions of the apparatuses making up the network.
  • a method for routing in telecommunications networks comprising the steps of partitioning the graph G of the network and creating a reduced graph G R on the partitions Pi in a preprocessing step in which a dual graph of the network is constructed and the graph is reduced using connections restricted by the characteristics of the apparatuses and performing the routing on the graph thus converted.
  • FIG 1 shows a graph of an example of a network
  • FIG 2 shows a possible partitioning of the network of FIG 1 in three subnetworks A, B and C
  • FIG 3 shows the addition of fictitious nodes for partition A of FIG 1,
  • FIG 4 shows the reduced graph of the original partition A and created by following the method of the present invention
  • FIG 5 shows an example of dynamic completion of the reduced graph
  • FIG 6 shows an example of the shortest path found on the reduced graph
  • FIG 7 shows the shortest path of FIG 6 transferred onto the original graph
  • FIG 8 shows an example of a network graph with an optimal path passing through the same partition several times
  • FIG 9 shows a schematic subdivision of apparatuses on the basis of connection restrictions.
  • FIG 10 shows an outline of an original network example to which is applied a 'clever dual network' method in accordance with the present invention
  • FIGS 11a to lie show graphically successive steps of the method applied to the network of FIG 10 ⁇
  • FIGS 12 to 14 show an example of an application of steps of the method in accordance with the present invention
  • FIGS 15 to 17 show another example of an extended application of steps of the method in accordance with the present invention.
  • FIGS 18 to 24 show an extended example of an application of the method in accordance with the present invention.
  • FIG 1 shows a generic example of a network.
  • This network can be first of all partitioned so as to secure a certain number of partitions or subnetworks easier to manage. It is agreed that: 1.
  • Each apparatus of the network belongs to a single partition.
  • One partition contains multiple apparatuses . This implies that the intersection between the set of apparatuses belonging to one partition and the set of those belonging to another partition chosen at random is the empty set. 2.
  • One partition does not contain other partitions . Partitioning of the network thus takes place at a single level of abstraction.
  • the original links of the network are classified as: - Interlink; these links connect two apparatuses belonging to two separate partitions.
  • An interlink is characterized by the pair ⁇ source node, source partition> and ⁇ destination node, destination partition>.
  • Intralink these links connect two apparatuses belonging to the same partition; an intralink is characterized by the triplet of values ⁇ source node, destination node, partition>.
  • each interlink constitutes a port through which traffic can flow.
  • FIG 1 shows an example of a possible network which we shall call original network and FIG 2 shows a possible partitioning of this network in three subnetworks A, B and C.
  • partitioning of the network has a limit in the need to avoid excessive fragmentation of the network with resulting excessive number of partitions .
  • the purpose it is desired to pursue is to memorize an assemblage of basic data which summarize the present status of the network so as to avoid having to memorize a complete copy of the original graph, whether subnetwork or network, and thus avoid having to load all the data describing the network.
  • a reduced graph G is therefore extracted from the graph G R of the original network. To construct this reduced graph the following steps are taken:
  • At partition level Pi associate with each of the fictitious nodes n f created under paragraph lrepresenting a port (interlink) of partition Pi a fictitious node which will be a fictitious input node nfi or output node n fu depending on the direction of the associated port.
  • each path is characterized by a set of arches of the original graph which connect the ⁇ input port, output port> node pair.
  • Arch set calculated in paragraph 2 an arch in the reduced graph m r connecting the nodes n f representing the two ports. If the path between the two fictitious nodes does not exist and thus the set of arches associated with said path is the empty set, do not insert the arch in the reduced graph.
  • G R (Pi) is defined as the set of arches of G R whose list of arches L was calculated within the partition Pi. In equivalent manner, (G R (Pi)) represents the set of arches of
  • FIG 3 shows the addition of fictitious nodes for partition
  • FIG 4 shows the reduced graph representing the original partition A created by following the above mentioned steps .
  • FIG 5 shows an example of dynamic completion of the reduced graph applied to the G R of FIG 4 necessary for calculation of the path from node 1 of partition A ( ⁇ 1,A>) to node 8 of partition C ( ⁇ 8,C>).
  • the last step, necessary for supplying the required solution consists of linearizing the list by following the order of the arches of the reduced graph making up the solution and of course avoiding repetition of the interlink arches.
  • this shortest path is made up of the sequence of three arches of the reduced graph, to wit the arch ⁇ 1,A; 5,14> and the arch ⁇ 12,11; 8,C> which were added during dynamic completion of the reduced graph and the arch ⁇ 5,14; 12,11> which was introduced during construction of the reduced graph.
  • the following data are associated with the three arches:
  • the routing method proposed ensures that the optimal path is calculated even in the special case where the optimal path passes through the same partition several times as shown by way of example in
  • FIG 8. This is very important where the source and destination nodes belong to the same partition. In this case it may be advantageous to load all the data associated with the partition containing the two nodes and attempt first to calculate the shortest path between the two nodes inside the partition without using the reduced graph.
  • the path thus calculated is not necessarily the optimal one which could pass through other partitions and then return within the partition containing the two nodes but it is a valid solution to the problem of creating a connection because in general the number of links making up the path can be limited.
  • connection restriction implies that it is not always possible, given an established input port, to connect it with just any output port.
  • the ports of an apparatus can be arranged for example in three possible sets depending on the connection restrictions they have. The following can be distinguished:
  • the MUX has the function of multiplexing these different signals in a single WDM signal and transporting them with different wavelengths within the same fiber.
  • the wavelength at which the signal is sent from the card to the MUX is set through hardware.
  • All these limitations entail solving the shortest path problem with penalties and prohibitions; with each pair of arches (i,j)(j,k) is associated a penalty indicating the cost of switching an input signal at node j from the arch (i,j) to the arch (j,k). If the switching is not allowed the penalty is infinite.
  • the cost of the arches is established on the basis of a linear combination of the cost assigned by the client to that link and the availability of traffic on that link.
  • the same reasoning applied for SDH traffic is valid for WDM traffic where the optical apparatus is able to make a complete wavelength conversion. Even in this case, indeed, it is possible to choose any one of the channels available on the optical link instead of exploding the link into the number of channels available and assign a cost in accordance with the criterion proposed for SDH traffic.
  • other wavelength assignment policies can be applied.
  • the apparatus input and output links to and from the apparatus can be exploded so as to assign costs which favor cross connections which do not make wavelength conversion if this operation takes place without conversion of the optical domain signal into the electronic one and vice versa (OEO conversion) .
  • any input port can be connected to any output port, - B apparatuses with partial connection restrictions; there is at least one set made up of input and output ports within which it is possible to connect any input port with any output port, and
  • each input port has restrictions to be respected.
  • FIG 10 shows by way of example an original network to which the steps of the above described method are applied.
  • the figures from 11a to lie show steps 2, 3, 4, 5 and 6 of the conversion respectively.
  • each partition has a smaller number of nodes and links than the whole network.
  • the clever dual network of the source and destination partitions involved in dynamic completion of the reduced graph must also be constructed when a connection request arrives. In addition, it must be possible to identify the nodes of the request in the converted network. Starting from the above observations the following further steps can be formulated for dynamic completion of the reduced graph. 1 .
  • the construction operations of the clever dual network for the source or destination partition if the source or destination node is type C a fictitious node is added; if the source node is type A or B the node of the converted network is created directly during the normal operations necessary for construction of the clever dual network .
  • the method proposed therefore consists of three steps , to wit : - preprocessing,
  • the preprocessing consists of two steps, to wit: - construction of the dual network, and
  • the reduced graph developed by applying the partitioning of the graph described above is kept in memory. Routing on the converted graph is done in such a way that for each request from node s in partition A to node d in partition B, type of traffic tr, the part of the graph associated with traffic tr and partitions A and B is relplaced by two subgraphs giving least cost from node s to the nodes on the edge of partition A and least cost from the nodes on the edge of partition B to node d. To this final graph is applied a shortest path search algorithm and, the path being found, the associated resources are reserved. Updating of the graph is necessary before the next routing but is applied only to the partitions used by the routing. In particular it is necessary to update only the paths of the converted graph which in the original graph share at least one arch with the calculated routing. This updating is necessary even when a node is inserted, changed or canceled.
  • FIG 12 shows an example of a network.
  • the corresponding reduced graph is shown in FIG 14. It is seen that if Min(p) and Mout(p) designate the number of I/O arches from and to a partition, in the converted graph there are no more that Min(p)xMout(p) arches for each partition p.
  • FIG 15 shows an example of some apparatuses making up the network and having connection limitations.
  • the limitations are as follows :
  • the member of network B has partial restrictions on the connection
  • the member of network C has no connection restriction.
  • three different rules are applied depending on the characteristics of the network members. The first two rules are as follows:
  • the third rule concerns the case of partial connection restrictions; a set' of completely connectable ports are represented by a single node; ports with connection restrictions are treated in accordance with the rules of full connection restrictions.
  • the final network is the one shown in outline in FIG 17.
  • the first step consists of partitioning the original network at one level and classifying the various apparatuses inside the partitions according to the connection restrictions they display. This first step is shown in FIG 18. Subsequently, for each partition, it is necessary to insert the fictitious nodes representing the interlinks of the original graph and perform the clever dual network conversion following the operations described above. This step is shown in FIG 19.
  • no node S belonging to the type A node category no node was added because the fictitious node Sf is created automatically during construction of the clever dual network of Pa.
  • node D belonging to the type C node category it is necessary to insert a fictitious node Df which, being a destination node, represents the head node of all the arches connecting it to the nodes representing the links appearing on the input ports of D.
  • the dual conversion allows subsequent and simpler development of the protection techniques of the network which are basic because of the enormous band supplied by optical fiber communications .
  • shortest path algorithms used in the normal circuit switching networks among which, for example is the algorithm of Dijkstra, can still be used.
  • the size of the converted network decreases with the increase in the number of connection restrictions in the apparatuses.
  • the fixed cross connection for example considerably reduces the number of arches in the dual network.
  • the work of conversion of the original network in the dual network is considerably limited due to the use of network partitioning. Once the reduced graph G R is constructed, indeed, this work is done only on the source and destination partitions to supply the response to the connection request and on the partitions traversed by the path in the subsequent updating phase which does not burden the client.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

To perform routing in telecommunications networks it is proposed to partition the network, create a reduced graph on the partitions in a preprocessing step in which a dual graph of the network is constructed and the graph is reduced using connections determined by the characteristics of the apparatuses. The routing is then performed on the converted graph. Graph updating techniques to keep it coherent are also described. Each time a routing is requested for a type of traffic not yet considered, a reduced graph for that traffic is constructed while canceling the arch of the original graph which does not support that traffic. For each type of traffic only the reduced graph developed by graph partitioning as described above is kept in memory with considerable resource savings.

Description

"METHOD FOR ROUTING IN TELECOMMUNICATIONS NETWORKS"
The present invention relates to methods for finding optimal paths (routing) quickly and efficiently within telecommunications networks and in particular with SDH or WDM traffic.
The ever wider spreading of telecommunications services and the complexity of the apparatuses making up telecommunications networks bring considerable problems of design and implementation of routing algorithms which would be efficient and give satisfactory performance. In the architecture of networks all the SDH or WDM apparatuses of the current generation do not play an active role in shortest path calculation and all the data concerning the network is memorized in a single database containing a complete view of the network. In this centralized architecture the data describing the present status of the network must therefore be loaded from the database when the routing algorithm is to be applied for calculation of the shortest path and data routing. This generates not a few problems, especially if the present size of telecommunications networks is considered and especially their tendency to grow. Indeed, present-day networks are made up of several thousand apparatuses connected by a number of links proportionate to the number of apparatuses and the present rate of growth promises reaching tens of thousands in a short time to then proceed to hundreds of thousands in the not distant future. It is clear that recovering such a large amount of data every time calculation of a shortest path is required involves a considerable effort and therefore too long response times. Accesses to the data base indeed constitute a set of very costly operations from the time viewpoint. The time employed in accesses proves to be much longer than the time actually spent on calculation. The large memory requirement for loading all the data contained in the database must also be remembered. In addition, restrictions on routing of the network members imply a posteriori verification of results with possible failures and the need to repeat the search algorithm. One proposed solution was to partition the network to secure the advantages of needing less memory (having a smaller graph) and securing a faster routing algorithm. But partitioning alone makes it possible to attack only part of the problems .
The general purpose of the present invention is to remedy the above mentioned shortcomings by making available a method enabling routing in telecommunications networks with greater efficiency, scalable so as not to be affected in an unacceptable manner by the increase in apparatuses and links in the network, and which would allow tracing the optimal path while respecting any connection restrictions of the apparatuses making up the network.
In view of this purpose it was sought to provide in accordance with the present invention a method for routing in telecommunications networks comprising the steps of partitioning the graph G of the network and creating a reduced graph GR on the partitions Pi in a preprocessing step in which a dual graph of the network is constructed and the graph is reduced using connections restricted by the characteristics of the apparatuses and performing the routing on the graph thus converted.
To clarify the explanation of the innovative principles of the present invention and its advantages compared with the prior art there is described below with the aid of the annexed drawings a possible embodiment thereof by way of non-limiting example applying said principles. In the drawings :
- FIG 1 shows a graph of an example of a network,
- FIG 2 shows a possible partitioning of the network of FIG 1 in three subnetworks A, B and C, - FIG 3 shows the addition of fictitious nodes for partition A of FIG 1,
- FIG 4 shows the reduced graph of the original partition A and created by following the method of the present invention, - FIG 5 shows an example of dynamic completion of the reduced graph,
- FIG 6 shows an example of the shortest path found on the reduced graph,
- FIG 7 shows the shortest path of FIG 6 transferred onto the original graph,
- FIG 8 shows an example of a network graph with an optimal path passing through the same partition several times,
- FIG 9 shows a schematic subdivision of apparatuses on the basis of connection restrictions. - FIG 10 shows an outline of an original network example to which is applied a 'clever dual network' method in accordance with the present invention,
- FIGS 11a to lie show graphically successive steps of the method applied to the network of FIG 10^
- FIGS 12 to 14 show an example of an application of steps of the method in accordance with the present invention,
- FIGS 15 to 17 show another example of an extended application of steps of the method in accordance with the present invention, and
- FIGS 18 to 24 show an extended example of an application of the method in accordance with the present invention. With reference to the figures, FIG 1 shows a generic example of a network. This network can be first of all partitioned so as to secure a certain number of partitions or subnetworks easier to manage. It is agreed that: 1. Each apparatus of the network belongs to a single partition. One partition contains multiple apparatuses . This implies that the intersection between the set of apparatuses belonging to one partition and the set of those belonging to another partition chosen at random is the empty set. 2. One partition does not contain other partitions . Partitioning of the network thus takes place at a single level of abstraction.
3. The original links of the network are classified as: - Interlink; these links connect two apparatuses belonging to two separate partitions. An interlink is characterized by the pair <source node, source partition> and <destination node, destination partition>.
- Intralink; these links connect two apparatuses belonging to the same partition; an intralink is characterized by the triplet of values <source node, destination node, partition>.
4. No link can be classified at the same time interlink and intralink.
5. For both the partitions it connects, each interlink constitutes a port through which traffic can flow.
The traffic actually flowing within the port will have a concordant direction with the <source partition, destination partition> arrangement. For this reason the same link fulfills the role of output port for the source partition and input port for the destination port. To secure partitioning of a network represented by a graph with N nodes (apparatuses), M arches (links) and a cost function C(M), define a set of partitions P and assign to each partition Pi, ni nodes and mi arches belonging to the original graph in such a manner that for each of these arches the tail and head nodes belong to Pi (intralinks) . The remaining m^ arches (i,j) with nodes i and j belonging to two different partitions are the interlinks. The partitions P are connected through mk arches (interlinks) of the original graph. Application of rules (1) and (2) gives:
Figure imgf000007_0001
FIG 1 shows an example of a possible network which we shall call original network and FIG 2 shows a possible partitioning of this network in three subnetworks A, B and C. Of course with the increase in the size of the networks partitioning also generates subnetworks of excessive size as concerns database management. On the other hand partitioning of the network has a limit in the need to avoid excessive fragmentation of the network with resulting excessive number of partitions . The purpose it is desired to pursue is to memorize an assemblage of basic data which summarize the present status of the network so as to avoid having to memorize a complete copy of the original graph, whether subnetwork or network, and thus avoid having to load all the data describing the network.
In accordance with the present invention, a reduced graph G is therefore extracted from the graph GR of the original network. To construct this reduced graph the following steps are taken:
1. Assign to each interlink of the original graph a node nf in the reduced graph GR.
2. For each partition P± :
- Divide the set of ports in the two input and output port sets.
- At partition level Pi associate with each of the fictitious nodes nf created under paragraph lrepresenting a port (interlink) of partition Pi a fictitious node which will be a fictitious input node nfi or output node nfu depending on the direction of the associated port.
- Connect the fictitious node nfi or nfu with the node which in the original graph is connected to the port in question. To avoid counting the same cost twice, assign cost 0 to the arch which has the node nfU as its head. The cost of the arch having as its tail the node nfi remains unchanged at cιn.
- Calculate the shortest path from each fictitious input node nfi to each fictitious output node nfu; each path is characterized by a set of arches of the original graph which connect the <input port, output port> node pair.
3. Arch set calculated in paragraph 2 an arch in the reduced graph mr connecting the nodes nf representing the two ports. If the path between the two fictitious nodes does not exist and thus the set of arches associated with said path is the empty set, do not insert the arch in the reduced graph.
4. The following data are associated with each arch mr of the reduced graph:
- the list L of arches of the original graph traversed by the path which in the original graph connects the ports for the fictitious nodes nfi and nfu,
- the cost, which is the sum of the costs of the arches traversed by the path in the original graph, and
- the name of the partition in which the path was calculated.
(GR(Pi)) is defined as the set of arches of GR whose list of arches L was calculated within the partition Pi. In equivalent manner, (GR(Pi)) represents the set of arches of
GR whose partition field is Pi.
FIG 3 shows the addition of fictitious nodes for partition
A of FIG 1. FIG 4 shows the reduced graph representing the original partition A created by following the above mentioned steps .
To clarify understanding of the reduced graph construction, the costs of the arches were not inserted in the figures, so as to not complicate the illustration. It is conjectured for example that the shortest path within partition A from port 7,6 to port 5,14 is {7,6; 6; 3; 4; 5;
5,14}. The data associated with the arch of reduced GR
<7,6; 5,14> will thus be: l.List L: L = {<7,6 ; 6>, <6;3>, <3;4>, <4;5>, <5 ; 5,14>}.
2. Total cost of this path.
3. The partition name, A.
Again for the sake of clarity the path is designated as a succession of arches in which to each arch has been assigned as the identifier the pair of names of the associated tail and head nodes . Of course this wording does not apply if there is more than one arch connecting the same pair of nodes in the same direction. Another simplification, again with the purpose of understanding this example, is to designate by different names the nodes belonging to different partitions; in reality an apparatus is distinguished by the 'name, partition' pair of values and it is therefore possible that two apparatuses belonging to two different partitions share the same name.
When a connection request R arrives for a pair of nodes identified by the coordinates <source node ns, source partition Ps>, <destination node nd, destination partition Pd> it is necessary to complete the reduced graph by taking the following steps:
1. Add to the reduced graph the source and destination nodes of the original graph. 2. For the pair <ns, Ps>;
- Take from the database all and only the data for the source partition,
- calculate the shortest paths from the source node to all the output ports of the source partition, - associate with each path calculated under the above paragraph an arch containing the same data contained by the other arches of the reduced graph (list of arches traversed on the source partition, total cost, name of the source partition) . 3. For the pair < nd, Pd>;
- take from the database all and only the data for the destination partition,
- calculate the shortest paths from all the input ports of the destination partition to the destination node,
- associate with each path calculated under the preceding paragraph an arch containing the same data contained by the other arches of the reduced graph (list of arches traversed in the destination partition, total cost, name of the destination partition) . FIG 5 shows an example of dynamic completion of the reduced graph applied to the GR of FIG 4 necessary for calculation of the path from node 1 of partition A (<1,A>) to node 8 of partition C (<8,C>).
When the reduced graph is complete it is possible to calculate the shortest required path by operating directly on the reduced graph. So an ordered list of arches <nfi,nfu> of the reduced graph GR is found. With each member of the list, that is with each arch mr of the reduced graph, is associated the list of arches of the original graph which are traversed by the shortest path between the two ports associated with the fictitious nodes nfi and nfu.
The last step, necessary for supplying the required solution, consists of linearizing the list by following the order of the arches of the reduced graph making up the solution and of course avoiding repetition of the interlink arches.
Assume for example that the shortest path from node 1 of partition A <1,A> to node 8 of partition C <8,C> calculated on the reduced graph of FIG 5 is the one shown in FIG 6. As may be seen in FIG 6, this shortest path is made up of the sequence of three arches of the reduced graph, to wit the arch <1,A; 5,14> and the arch <12,11; 8,C> which were added during dynamic completion of the reduced graph and the arch <5,14; 12,11> which was introduced during construction of the reduced graph. Assume that the following data are associated with the three arches:
1. Arch <1,A; 5,14>:
• L = {<1;2>, <2;5>, <5;5,14>}.
Figure imgf000013_0001
• Partition name: A.
2. Arch <5,14; 12,11>
• L = {<5,14;14>, <14;15>, <15;16>, <16;12>, <12;12,11>} • Cost c2 = 5
• Partition name: B.
3. Arch <12,11; 8,C>:
• L = {<12,11; 11>, <11;10>, <10;7>, <7;8>}
• Cost c3 = 6 • Partition name: C.
The shortest path from node 1 to node 8 in the original graph thus has a cost equal to the sum of the costs of these three arches, ctot = Ci + c2 + c3 = 23 , and is made up of the following sequence of arches: path = {<1;2>, <2;5>, <5;14>, <14;15>, <15;16>, <16;12>,
<12;11>, <11;10>, <10;7>, <7,8>}.
The path found from node 1 to node 8 on the original graph is thus the one shown in FIG 7.
It should be noted that the routing method proposed ensures that the optimal path is calculated even in the special case where the optimal path passes through the same partition several times as shown by way of example in
FIG 8. This is very important where the source and destination nodes belong to the same partition. In this case it may be advantageous to load all the data associated with the partition containing the two nodes and attempt first to calculate the shortest path between the two nodes inside the partition without using the reduced graph. The path thus calculated is not necessarily the optimal one which could pass through other partitions and then return within the partition containing the two nodes but it is a valid solution to the problem of creating a connection because in general the number of links making up the path can be limited. If this first attempt fails because the path within the partition does not exist, it does not mean that it does not exist in the original network; for this reason, if the path was not found, it suffices to extend the calculation to the entire reduced graph, proceeding by the method in accordance with the present invention as in the general case. Again with reference to calculation of the shortest path on the reduced graph, cancellation on the reduced graph of the source and destination nodes and associated incident arches can be performed at any time before calculation of the following connection. On this point it may be advantageous to cancel this data only when a new connection request arrives. This way, if the new source or destination node- coincides with the previous source or destination node the previous data can be reused. It will of course be necessary to update the links which may have become inconsistent after calculation of the previous connection.
This is a general requirement; a solution being supplied, it is necessary to ensure consistency of the reduced graph with the original graph. The reduced graph must at all times summarize the present state of the network. There are different situations which could generate consistency problems. The main ones can be summarized as the use of resources already allocated, release of a connection, insertion of a new node or link in a partition, cancellation of a node or link in a partition, insertion of an interlink, and cancellation of an interlink. These main case are examined below. For example, to avoid a subsequent connection being able to use the resources of the one just calculated, the resources used by the solution found should be assigned; in this manner a subsequent connection request cannot use these resources until they are released. The problem of consistency, which in this case we can define as the
'resource occupation problem', occurs for all the mr links of the reduced graph GR belonging to the path found and for all the links of the reduced graph GR containing in their list L a link G belonging to the solution found. On the contrary, the consistency problem in this case does not occur for all the links of GR calculated in G partitions not traversed by the connection set up and for all those links of GR not containing in their lists one of the links belonging to the solution found; the shortest path remains unchanged as regards the case in which the resources had not yet been assigned.
An identical consistency problem with an identical solution is had when a node or link of a partition is cancelled. On the other hand, upon release of a connection there is the situation, dual of the preceding one, which can generate consistency problems because of the resources previously occupied by a connection become available for calculation of new connections. In the presence of such an event therefore it is necessary to update all the paths calculated in the partitions of G which are traversed by the released connection.
Identical consistency problems are had with the insertion of a new node or link in a partition and it is again necessary to update all the paths calculated in the partition where the new node or link is installed. But when an interlink is inserted, a new node belonging to GR is associated with the new arch of G. Insertion of this new node involves calculation of the paths of all the input ports up to the interlink in question within the partition containing the tail node and calculation from the interlink to all the output ports within the partition containing the head node. On the contrary, upon cancellation of an interlink the node of GR which represented this port must be cancelled together with all the input and output arches affecting it. As may be seen, some diligence is necessary to keep the reduced graph always consistent. The doubt may arise that the diligence expended to keep the reduced graph consistent annuls the advantage of using it and that better response times are not had than when all data are extracted from the database each time a new connection request arrives . In reality it has been proven that the time necessary to update the reduced graph can be tranquilly spent after exposure of the path found and therefore in the dead time between two requests. On the client's part, if the routing algorithm uses the reduced graph there is thus the undoubted advantage of receiving an immediate response because the updating time of the reduced graph does not weigh on the client.
The only accesses to the database made in the lapse of time between arrival of the connection request and viewing of the response concern only the two source and destination partitions; it is recalled that these data are necessary for dynamic completion of the reduced graph. It is clear that in this manner the purpose of acceding as little as possible to the database is achieved. In addition, it was observed experimentally that the number of links making up a connection is very small as compared to network size.
The small number of arches making up a connection allows it to be stated that the probability that the connection will traverse few partitions is very high and this means that having to load a considerable amount of date from the database is unlikely. Only in the reduced graph construction step is access had to the database to take all the data of the network and this preprocessing step once ended no longer affects response time. At the same time, given a partition Pi traversed by the connection just set up, it is unlikely that all the arches of (GR(Pi)) will have to be calculated again because as the number of arches of the connection belonging to the partition Pi is not high it is unlikely that an arch of GR(Pi) will contain in its list L one of the arches of the connection. In reality, this last aspect depends strongly on the topology and distribution of costs of the various partitions and in the construction of the reduced graph it may happen that several arches of GR(P1) will contain the same link if there are obligatory paths or arches in the Pi especially advantageous in terms of cost.
The possibility of 'paralellizing' the algorithm should not be undervalued. Since the apparatuses managed do not fulfill an active role in calculation of the shortest path and hence it is impossible at the moment to realize a distributed algorithm, the only way to achieve this purpose is to make the best use of the calculators designed for network management. These calculators are multiprocessor machines with shared memory and very powerful.
Use of the reduced graph added to partitioning of the network allows distribution of the workload over various processors on the basis of a geographical distribution of resources and it may be sought to associate a thread with each partition so as to perform the operations of construction and updating of the reduced graph in parallel. In telecommunications networks some SDH or WDM apparatuses distributed in the network introduce connection restrictions which considerably complicate the routing algorithm. A connection restriction implies that it is not always possible, given an established input port, to connect it with just any output port.
The ports of an apparatus can be arranged for example in three possible sets depending on the connection restrictions they have. The following can be distinguished:
- ports without restrictions for which a signal reaching the input to the apparatus through one of the ports belonging to this set can leave the apparatus through any output port belonging to this set,
- ports with total restriction or 'fixed cross connection' ports; a signal reaching the apparatus input through one of the ports belonging to this set is forced to leave the apparatus through a predetermined output port belonging to this set, and
- ports with partial restriction or protection; these ports are used to protect the connections which were set up using the ports of other sets. The restrictions of this set of ports depend on which connections are to be protected. To these connection restrictions which limit switching operations are added for example those due to the impossibility of connecting an optical signal from a certain channel characterized by a certain wavelength to another channel also characterized by its own wavelength. This problem appears for example in the multiplexing of several signals from the SDH domain to the WDM domain which takes place through the use of appropriate cards and a multiplexer (MUX). Each of these cards must of course transmit its signal to the multiplexer using a wavelength different from all those with which the other signals input to the MUX coming from other cards are sent. The MUX has the function of multiplexing these different signals in a single WDM signal and transporting them with different wavelengths within the same fiber. The wavelength at which the signal is sent from the card to the MUX is set through hardware. In truth there are different studies aimed at allowing setting of the appropriate e by software, which would introduce higher degrees of freedom in the routing process. All these limitations entail solving the shortest path problem with penalties and prohibitions; with each pair of arches (i,j)(j,k) is associated a penalty indicating the cost of switching an input signal at node j from the arch (i,j) to the arch (j,k). If the switching is not allowed the penalty is infinite.
With a dual network at each arch of the original graph is associated a node in a 'converted graph'. An arch is associated with each penalty. A disallowed switching is simply shown as absence of the arch in the converted graph. It was surprisingly found that among the various possible conversions a dual graph conversion or dual graph appears to be the most satisfactory. Just for the dual conversion characteristic, in a telecommunications network where the nodes are much smaller in number than the connections, the conversion into a dual graph should generate an unacceptable increase in complexity. In the dual graph the number of nodes is equal to the number of arches in the original graph and the arches of the converted network represent the admissible cross connections in the network apparatuses . The most obvious problem of the dual graph applied to the world of SDH or WDM telecommunications is that to represent some restrictions introduced by some apparatuses the same conversion must be performed for all the apparatuses. This implies that the conversion must also be performed for all those apparatuses which do not introduce connection restrictions and for which the preparatory physical expansion work of the nodes is therefore too costly; an apparatus which has no connection restrictions is exploded through the dual graph into a number of nodes 0 = (Oin + 6out) where 6in represents the number of input links to the apparatus in the original graph and Oout represents the number of output links from the apparatus of the original graph and into a number of arches equal to Mr = (Oin x 6out).
It is seen below that the use of dual conversion and reduced graph and partitions of the present invention gives rise to what can be called 'clever dual graph' conversion which cancels the disadvantages of the dual graph and, on the contrary, allows achievement of high routing efficiency. This method uses dual conversion to construct graphs associated with the various partitions; once the paths necessary for construction or updating the reduced graph are calculated, said graphs are cancelled. It is thus achieved once again that the the only data structure kept permanently and updated regularly is the reduced graph. Calculation of the paths from the input ports to the output ports of each partition ensures that the connection restrictions of the apparatuses are respected. The connection established by operating directly on the reduced graph GR thus respects the restrictions because it is the linking together of various paths which are all admissible.
On the reduced graph therefore it is not necessary to perform any conversion but the above described is used directly for seeking the shortest path in the unrestricted case.
By using partitioning of the network, growth of the number of nodes and arches is limited to the partitions involved each time in updating of the network. To underscore this fact, suffice it to think what it means to load from the database all the data concerning the network and operate the conversion on such a large amount of data each time a connection request arrives . Assume a network G(V,A) where |v|=N and |A|=M and designate by W the average number of input links to each apparatus. Since an input link to an apparatus is an output link from another apparatus, W also represents the average number of output links from each apparatus . To avoid possible misunderstandings it is observed that W was defined herefrom as the average number of input or output links to or from each apparatus which are actually installed in the network. It is wrong to confuse this number with that of the links which the apparatus can manage at input or output; these two values coincide only in the worst case, from the viewpoint of size of the converted network, in which each apparatus has at input or output the maximum number of installable links. In the worst case, in which all possible cross-connections are admitted, the dual graph conversion generates a network consisting of M nodes and NxW2 arches since each arch becomes a node and for each apparatus there are W2 arches . Each input link can be connected to each output link and the average number of input and output links is W. From the foregoing it is clear that to construct and update the reduced graph it is necessary to perform the shortest path search algorithm several times. The choice of which shortest path algorithm to use is therefore one of the critical points. A choice based on efficiency can advise the use of the Dijkstra algorithm implemented with the particular data structure of the Fibonacci Heap. In this implementation of the Dijkstra algorithm the computational complexity on a network with N nodes and M arches is equal to 0(M + Nxlog(N)), substituting for M the value NxW2 and for N the value M it is found that the complexity of the converted network is :
O(NxW2 + Mxlog(M) )
It is observed that the value W is limited above by the maximum number of links manageable by the apparatus and accordingly the previous complexity becomes :
0(N + Mxlog(M) ) In practice however the value of W is important especially in networks made up of few nodes and arches . At this point the following consideration becomes necessary. SDH traffic is structured traffic and consequently each connection request must specify the type of traffic desired in addition to the pair of source and destination nodes; this implies that a reduced GR for each type of traffic is kept in the memory. In theory, at the level of creation of the graph representing the network (regardless of the use of the reduced graph) this situation would involve an expansion of each link into a number of arches equal to the number of containers available on that link in relation to the type of traffic requested. The basic observation is that the connection restriction concerns the pair of input or output links and not a particular container chosen within the two links. In this manner, in the data taking step, it is possible to choose any one of the containers available for support of the type of traffic requested. To ensure correct traffic distribution the cost of the arches is established on the basis of a linear combination of the cost assigned by the client to that link and the availability of traffic on that link. The same reasoning applied for SDH traffic is valid for WDM traffic where the optical apparatus is able to make a complete wavelength conversion. Even in this case, indeed, it is possible to choose any one of the channels available on the optical link instead of exploding the link into the number of channels available and assign a cost in accordance with the criterion proposed for SDH traffic. Besides, other wavelength assignment policies can be applied. Clearly the apparatus input and output links to and from the apparatus can be exploded so as to assign costs which favor cross connections which do not make wavelength conversion if this operation takes place without conversion of the optical domain signal into the electronic one and vice versa (OEO conversion) .
For WDM single-hop networks on the other hand it is necessary to explode each link into a number of links equal to the number of channels available. Single-hop networks, indeed, introduce the 'wavelength continuous restriction' in which the connection which is to be established will use the same wavelength in each of its links. To obtain an admissible solution it is necessary to insert into the converted network only the arches representing a cross connection between two identical wavelengths. From the viewpoint of the restriction introduced we can compare the wavelength continuous restriction with the fixed cross-connections. We wrote above about the apparent increase in complexity which the use of a dual graph should introduce. In reality, with partitioning in accordance with the present invention it is possible to divide the apparatus into sets which have as a characteristic the fact that they possess connection restrictions and sets which do not have connection restrictions. In this manner there are apparatuses without connection restrictions in the partitions and the dual graph is not used but the preferred 'single shortest path algorithm' is applied directly. If in the same partition there are both types of apparatus, with and without restrictions, the following procedure termed 'clever dual network' may be applied. In other words the dual network is not efficient for network members without restrictions. In this case a variation is possible on the method or algorithm (clever dual network) which uses the fact that these nodes are characterized by each input being able to reach an output without any penalty. Each arch is therefore with zero penalty. In this manner the arch from pΛ2 to 2p is possible. It consists of the following steps. 1. Divide the apparatuses in the following three classes (an example of apparatuses in the three classes is given in FIG 9):
- A apparatuses without connection restrictions; any input port can be connected to any output port, - B apparatuses with partial connection restrictions; there is at least one set made up of input and output ports within which it is possible to connect any input port with any output port, and
- C apparatuses with total connection restrictions; each input port has restrictions to be respected.
2. Associate with each type A and B apparatus a fictitious node Nf in the converted graph.
3. Associate with each link having as tail or head a port with connection restrictions a fictitious node Lf in the converted graph; this takes place if one of the two nodes of the original graph is type C or B and the port used has restrictions.
4. For each fictitious node Nf of the converted graph associated with an original type A node;
- for each fictitious node Lf created under paragraph 3 and concerning it insert a link connecting Lf to Nf if the original arch for Lf was input to the original node for Nf; the cost of this arch must be that of the original arch represented by Lf;
- for each fictitious Lf node created under paragraph 3 and concerning it insert a costless link connecting Nf to Lf if the original arch for Lf was output for the original node associated with Nf; and - consider the arches of the original graph not having undergone the conversion described in paragraph 3 and which have in the original graph the node for Nf as head or tail; for each arch connect Nf to the other fictitious node associated with the tail or head node of the original graph while keeping the same cost of the arch of the original graph.
5. For each fictitious node Nf of the converted graph associated with an original type B node;
- consider all the fictitious Lfin or Lfout nodes created under paragraph 3 for input or output arches of the original graph in a port with restrictions to or from the node for the fictitious node Nf and for each of these fictitious nodes Lfin insert a link connecting Lfin to the other fictitious Lfout nodes; this connection must be made only for the pairs of fictitious nodes Lfinf Lfout corresponding to pairs of arches of the original graph which are connectable; the cost of the arch must be equal to the sum of the cost of the original arch represented by Lfin and the cost of the penalty to be paid for connecting the two arches in the original graph;
- consider all the fictitious nodes Lfin, Lfout created under paragraph 3 for input or output arches of the original graph in a port without restrictions to or from the node for the fictitious node Nf and insert for each of these fictitious nodes Lfin a link connecting the fictitious node Lfi„ to the fictitious node Nf while keeping the cost of the original arch represented by Lfin, and for each of these fictitious nodes Lfout insert a link connecting the fictitious node Nf to the fictitious node Lfout at zero cost;
- consider the arches of the original graph which have not undergone the conversion described under paragraph 3 and which in the original graph have the node represented by Nf as head or tail; for each arch connect Nf to the other fictitious node associated with the tail or head node of the original graph while keeping the same cost of the original graph arch.
6. For each fictitious node Nf of the converted graph associated with an original type C node;
- all the fictitious nodes Lfin or Lfout created under paragraph 3 are associated with input or output arches of the original graph in a port with restrictions to or from the node represented by Nf; insert an arch for all the Lfin or Lfout pairs which represent two arches connectable in the original graph .
FIG 10 shows by way of example an original network to which the steps of the above described method are applied. In particular the figures, from 11a to lie show steps 2, 3, 4, 5 and 6 of the conversion respectively. We described above how partitioning of the network in accordance with the present invention allows limiting the size of the dual graph; network conversion is applied individually to each partition to allow construction operations, dynamic completion and updating of the reduced graph.
By so doing, each partition has a smaller number of nodes and links than the whole network. After each of these operations the data structures representing the dual graph of the partitions involved are cancelled. These remarks do not change if clever dual network is considered in place of the dual graph.
But the clever dual network of the source and destination partitions involved in dynamic completion of the reduced graph must also be constructed when a connection request arrives. In addition, it must be possible to identify the nodes of the request in the converted network. Starting from the above observations the following further steps can be formulated for dynamic completion of the reduced graph. 1 . During the construction operations of the clever dual network for the source or destination partition, if the source or destination node is type C a fictitious node is added; if the source node is type A or B the node of the converted network is created directly during the normal operations necessary for construction of the clever dual network .
2 . Consider the source node ns and if ns is type A no action is taken; if ns is type B add for each output port with connection restrictions an arch between the fictitious node representing ns in the converted graph and the fictitious node representing the link on that port; if ns is type C add for each output port an arch between the fictitious node representing ns in the converted graph and the fictitious node representing the link on that port .
3 . Consider the destination node nd and if nd is type A no action is taken; if nd is type B add for each input port with connection restrictions an arch between the fictitious node representing the link on that port and the fictitious node representing the nd in the converted graph ; if nd is type C add for each output port an arch between the fictitious node representing the link on that port and the fictitious node representing nd in the converted graph .
In other words , to sum up , the method proposed therefore consists of three steps , to wit : - preprocessing,
- routing on the converted graph, and
- updating the graph .
The preprocessing consists of two steps, to wit: - construction of the dual network, and
- reduction of the graph using the fixed connections; realizing this operation may be an option.
Each time a routing for a type of traffic not yet considered is requested, a reduced graph for that traffic is constructed, canceling the arch of the original graph which does not support that traffic.
For each type of traffic the reduced graph developed by applying the partitioning of the graph described above is kept in memory. Routing on the converted graph is done in such a way that for each request from node s in partition A to node d in partition B, type of traffic tr, the part of the graph associated with traffic tr and partitions A and B is relplaced by two subgraphs giving least cost from node s to the nodes on the edge of partition A and least cost from the nodes on the edge of partition B to node d. To this final graph is applied a shortest path search algorithm and, the path being found, the associated resources are reserved. Updating of the graph is necessary before the next routing but is applied only to the partitions used by the routing. In particular it is necessary to update only the paths of the converted graph which in the original graph share at least one arch with the calculated routing. This updating is necessary even when a node is inserted, changed or canceled.
FIG 12 shows an example of a network. FIG 13 shows the dual network for subnetwork 2 of FIG 12. In this example all the penalties are equal to 1: όij,jk =1 for each ij,jk. The corresponding reduced graph is shown in FIG 14. It is seen that if Min(p) and Mout(p) designate the number of I/O arches from and to a partition, in the converted graph there are no more that Min(p)xMout(p) arches for each partition p.
FIG 15 shows an example of some apparatuses making up the network and having connection limitations. For example, the limitations are as follows :
- The members of networks A and D have complete connection restrictions,
- the member of network B has partial restrictions on the connection, and
- the member of network C has no connection restriction. To convert the network, three different rules are applied depending on the characteristics of the network members. The first two rules are as follows:
- full restriction on connection; all I/O connections become nodes ; - no restriction on connection; all connections connecting the network member with the network members with connection restriction become nodes; all connections connecting the network member with network members without connection restrictions become a single connection connecting the node without restrictions to a new fictitious node related to the network member without connection restrictions .
Applying these first two rules to the original network of FIG 15 we obtain the graph of FIG 16.
The third rule concerns the case of partial connection restrictions; a set' of completely connectable ports are represented by a single node; ports with connection restrictions are treated in accordance with the rules of full connection restrictions.
Applying this rule also, the final network is the one shown in outline in FIG 17.
To summarize what is written above, a summarizing example setting forth the operations necessary for identification of a shortest path in a network with apparatuses which introduce connection restrictions is shown below. In accordance with the method of the present invention the first step consists of partitioning the original network at one level and classifying the various apparatuses inside the partitions according to the connection restrictions they display. This first step is shown in FIG 18. Subsequently, for each partition, it is necessary to insert the fictitious nodes representing the interlinks of the original graph and perform the clever dual network conversion following the operations described above. This step is shown in FIG 19.
For each partition the shortest paths connecting the <input port & output port> pairs are calculated. If for a pair of such ports there is no path, no arch is inserted in the reduced graph. Proceeding as explained above, the reduced graph GR is constructed. The reduced graph associated with the network of FIG 18 is shown in FIG. 20. When a connection request (<S,Pa>, <D,Pc>) arrives it is necessary to complete dynamically the reduced graph as explained above while allowing for the clever dual network conversion. This step is shown in FIG 21 where the clever dual network of the partitions involved in the dynamic completion of the reduced graph is seen while the final result of the completed reduced graph for calculation of the (<S,Pa>, <D,Pc>) connection is shown in FIG 22. It is emphasized that as concerns node S belonging to the type A node category no node was added because the fictitious node Sf is created automatically during construction of the clever dual network of Pa. For node D belonging to the type C node category it is necessary to insert a fictitious node Df which, being a destination node, represents the head node of all the arches connecting it to the nodes representing the links appearing on the input ports of D.
Lastly, the required path is calculated on the reduced graph of FIG 22 to find the result shown in FIG -23 to which corresponds the path represented in FIG 24 in the original graph. It is now clear that the predetermined purposes have been achieved.
Among the various advantages of the method of the present invention the dual conversion allows subsequent and simpler development of the protection techniques of the network which are basic because of the enormous band supplied by optical fiber communications . On the converted network generated by the dual conversion, shortest path algorithms used in the normal circuit switching networks among which, for example is the algorithm of Dijkstra, can still be used. In addition, the size of the converted network decreases with the increase in the number of connection restrictions in the apparatuses. The fixed cross connection for example considerably reduces the number of arches in the dual network. Lastly, the work of conversion of the original network in the dual network is considerably limited due to the use of network partitioning. Once the reduced graph GR is constructed, indeed, this work is done only on the source and destination partitions to supply the response to the connection request and on the partitions traversed by the path in the subsequent updating phase which does not burden the client.
Naturally the above description of an embodiment applying the innovative principles of the present invention is given by way of non-limiting example of said principles within the scope of the exclusive right claimed here.

Claims

CLAIMS 1. Method for routing in telecommunications networks comprising the steps of partitioning the graph G of the network and creating a reduced graph GR on the partitions Pi in a preprocessing step in which a dual graph of the network is constructed and the graph is reduced using connections restricted by the characteristics of the apparatuses and performing the routing on the graph thus converted.
2. Method in accordance with claim 1 in which only the reduced graph is kept in memory.
3. Method in accordance with claim 1 in which to construct the reduced graph GR the following steps are applied:
- assign to each interlink of the original graph a node nf in the reduced graph GR;
- for each partition Pi divide the set of ports in the two sets of input and output ports , at the partition Pi level, associate with each of the fictitious nodes nf created under paragraph 1 , representing a port (interlink) of the partition Pi, a fictitious node which will be a fictitious input node nfi or output node nfu depending on the direction of the associated port;
- connect the fictitious nfi or nfu node to the node which in the original graph is connected to the port in question; to avoid counting the same cost twice, assign cost 0 to the arch which has the node nfu as its head; the cost of the arch having as its tail the node nfi remains unvaried at value Cin. - calculate the shortest path from each fictitious node nfi to each fictitious output node nfu; each path is characterized by a set of arches of the original graph which connect the <input port, output port> node pair; - associate with each path consisting of a set of not empty arches as calculated under the preceding point an arch in the reduced graph mr connecting the nodes nf representing the two ports; if the path between the two fictitious nodes does not exist and thus the set of arches associated with this path is the empty set, the arch is not to be inserted in the reduced graph.
4. Method in accordance with claim 3 in which the below listed data are associated with each arch mr of the reduced graph; - the list L of arches of the original graph traversed by the path which in the original graph connects the ports associated with the fictitious nodes nfi and nfu,
- the cost equal to the sum of the costs of the arches traversed by the path in the original graph, and - the name of the partition in which the path was calculated.
5. Method in accordance with claim 1 in which upon arrival of a connection request R for a pair of nodes identified by the coordinates <source node ns, source partition Ps>,<destination node nd, destination partition Pd>, the reduced graph is completed by the following steps;
- Add to the reduced graph the source and destination nodes of the original graph.
- For the pair < ns, Ps> take from the database all and only the data for the source partition; calculate the shortest paths from the source node to all the output ports of the source partition; associate with each path calculated under the above paragraph an arch containing the same data contained in the other arches of the reduced graph (list of arches traversed in the source partition, total cost, and name of the source partition) .
- For the pair < nd, Pd> take the data for the destination partition from the database; calculate the shortest paths from all the input ports of the destination partition to the destination node; associate with each of the paths calculated under the above paragraph an arch containing the same data contained by the other arches of the reduced graph.
6. Method in accordance with claim 1 in which for creation of the dual graph the apparatuses of the network or subnetwork are divided in at least three classes, to wit:
- A apparatuses without connection restrictions; any input port can be connected to any output port;
- B apparatuses with partial connection restriction; there is at least one set made up of input and output ports within which it is possible to connect any input port with any output port; - C apparatuses with total connection restrictions; each input port has restrictions to be respected.
7. Method in accordance with claim 6 in which with each type A and B apparatus a fictitious node Nf in the converted graph is associated and with each link having as tail or head a port with connection restrictions is associated a fictitious node Lf in the converted graph.
8. Method in accordance with claim 7 in which with each fictitious node Nf of the converted graph for an original type A node;
- For each fictitious node Lf created under paragraph 3 concerning it insert a link connecting Nf with Lf if the original arch for Lf was input to the original node for Nf ; the cost of this arch must be that of the original arch represented by Lf.
- For each fictitious node Lf created under paragraph 3 which concerns it insert a costless link connecting Nf to Lf if the original arch for Lf was output for the original node for Nf . - Consider the original graph arches which have not undergone the conversion described and which in the original graph have the node for Nf as head or tail and for each arch connect Nf to the other fictitious node associated with the tail or head node of the original graph while keeping the same cost as for the arch of the original graph.
9. Method in accordance with claim 7 in which for each fictitious node Nf of the converted graph for a type B original node; - Consider the fictitious nodes Lfin or Lfout created for arches of the original graph at input or output in a port with restrictions, to or from the node for the fictitious node Nf and for each of these fictitious Lfin nodes insert a link connecting Lfin to the other fictitious Lfou nodes; this connection must be made only for the pairs of fictitious nodes Lfin, Lfout corresponding to pairs of arches of the original graph which are connectable. - Consider all the fictitious nodes Lfin or Lfout created for the arches of the original graph at input or output in a port without restrictions, to or from the node for the fictitious node Nf and for each of these fictitious nodes Lfin insert a link connecting the fictitious node Lfin to the fictitious node Nf while keeping the cost of the original arch represented by Lfin and for each of these fictitious nodes Lfout insert a link connecting at zero cost the fictitious node Nf to the fictitious node LfOUf - Consider the arches of the original graph which have not undergone the conversion described under paragraph 3 and which in the original graph have the node represented by Nf as head or tail. For each arch connect Nf to the other fictitious node associated with the tail or head node of the original graph while keeping the same cost as the arch of the original graph .
10. Method in accordance with claim 7 in which for each fictitious node Nf of the converted graph associated with an original type C node;
- consider all the fictitious nodes Lfin or Lfout created are associated with arches of the original graph at input or output in a port with restrictions, to or from the node represented by Nf and insert an arch for all the pairs Lfin, Lfout representing two arches which are connectable in the original graph.
11. Method in accordance with claim 6 in which steps are taken for dynamic completion of the reduced graph and include during creation of the graph for the source or destination partition;
- if the source or destination node is type C add a fictitious node, and
- if the source node is type A or B the node of the converted network is created directly.
12. Method in accordance with claim 6 in which are performed the following dynamic completion steps for the reduced graph including considering the source node ns and
- if ns is type A, no action is taken, - if ns is type B, add for each output port with connection restrictions an arch between the fictitious node representing ns in the converted graph and the fictitious node representing the link on that port, and
- if ns is type C add for each output port an arch between the fictitious node representing ns in the converted graph and the fictitious node representing the link located on that port.
13. Method in accordance with claim 6 in which are performed the steps for dynamic completion of the reduced graph including considering the destination node nd and,
- if nd is type A, no action is taken,
- if nd is type B, add for each input port with connection restrictions an arch between the fictitious node representing the link located on that port and the fictitious node representing nd in the converted graph, and
- if nd is type C, add for each output port an arch between the fictitious node representing the link located on that port and the fictitious node representing nd in the converted graph.
PCT/IB2002/003365 2001-07-13 2002-07-09 Method for routing in telecommunications networks WO2003007557A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
DE60237612T DE60237612D1 (en) 2001-07-13 2002-07-09 METHOD FOR MOVING IN TELECOMMUNICATIONS NETWORKS
EP02755539A EP1410583B1 (en) 2001-07-13 2002-07-09 Method for routing in telecommunications networks
US10/483,691 US7003300B2 (en) 2001-07-13 2002-07-09 Method for routing in telecommunications networks
AT02755539T ATE480931T1 (en) 2001-07-13 2002-07-09 METHOD FOR ROUTING IN TELECOMMUNICATIONS NETWORKS
CA002453238A CA2453238A1 (en) 2001-07-13 2002-07-09 Method for routing in telecommunications networks
JP2003513196A JP2004535140A (en) 2001-07-13 2002-07-09 Routing method in telecommunications network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IT2001MI001508A ITMI20011508A1 (en) 2001-07-13 2001-07-13 METHOD FOR ROUTING IN TELECOMMUNICATIONS NETWORKS
ITMI01A001508 2001-07-13

Publications (1)

Publication Number Publication Date
WO2003007557A1 true WO2003007557A1 (en) 2003-01-23

Family

ID=11448062

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2002/003365 WO2003007557A1 (en) 2001-07-13 2002-07-09 Method for routing in telecommunications networks

Country Status (9)

Country Link
US (1) US7003300B2 (en)
EP (1) EP1410583B1 (en)
JP (1) JP2004535140A (en)
CN (1) CN1554171A (en)
AT (1) ATE480931T1 (en)
CA (1) CA2453238A1 (en)
DE (1) DE60237612D1 (en)
IT (1) ITMI20011508A1 (en)
WO (1) WO2003007557A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100346608C (en) * 2003-11-06 2007-10-31 华为技术有限公司 Path searching method

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8413155B2 (en) 2004-03-13 2013-04-02 Adaptive Computing Enterprises, Inc. System and method for a self-optimizing reservation in time of compute resources
US20070266388A1 (en) 2004-06-18 2007-11-15 Cluster Resources, Inc. System and method for providing advanced reservations in a compute environment
WO2006053093A2 (en) 2004-11-08 2006-05-18 Cluster Resources, Inc. System and method of providing system jobs within a compute environment
US9497109B2 (en) * 2005-02-11 2016-11-15 Hewlett Packard Enterprise Development Lp Switching mesh with user-configurable paths
WO2006107531A2 (en) 2005-03-16 2006-10-12 Cluster Resources, Inc. Simple integration of an on-demand compute environment
CN100417115C (en) * 2005-06-21 2008-09-03 中兴通讯股份有限公司 Automatic configuration method for realizing Ethernet service
US8908674B2 (en) * 2005-08-08 2014-12-09 Telecom Italia S.P.A. Method for configuring an optical network
WO2007020144A2 (en) * 2005-08-19 2007-02-22 Siemens Aktiengesellschaft Method for allocating resources to tasks by means of network flow algorithms
US8041773B2 (en) * 2007-09-24 2011-10-18 The Research Foundation Of State University Of New York Automatic clustering for self-organizing grids
US20090274157A1 (en) * 2008-05-01 2009-11-05 Vaidya Aniruddha S Method and apparatus for hierarchical routing in multiprocessor mesh-based systems
US8280835B2 (en) * 2009-01-29 2012-10-02 Telcordia Technologies, Inc. Method for automated distributed diagnostics for networks
US8738559B2 (en) 2011-01-24 2014-05-27 Microsoft Corporation Graph partitioning with natural cuts
WO2014158063A1 (en) * 2013-03-27 2014-10-02 Telefonaktiebolaget L M Ericsson (Publ) Aggregation-node selection using virtual hub
US9397917B2 (en) * 2014-01-10 2016-07-19 Huawei Technologies Co., Ltd. System and method for zoning in software defined networks
US9998392B1 (en) * 2014-02-13 2018-06-12 Amazon Technologies, Inc. Iterative network graph placement
US10320698B1 (en) 2014-02-13 2019-06-11 Amazon Technologies, Inc. Determining network connectivity for placement decisions
US20170277728A1 (en) * 2016-03-28 2017-09-28 International Business Machines Corporation Hiding nodes in a tree containing shared subtrees
US20170337293A1 (en) * 2016-05-18 2017-11-23 Sisense Ltd. System and method of rendering multi-variant graphs
US20180144279A1 (en) * 2016-11-22 2018-05-24 Sap Se Network separator for transportation resource planning
US10990735B2 (en) * 2019-05-25 2021-04-27 Synopsys, Inc. System and method for generating a cluster-based power architecture user interface

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6151327A (en) * 1997-06-30 2000-11-21 Mci Communications Corporation Method of routing and bundling demands with low utilization in a telecommunications network
US6437804B1 (en) * 1997-10-23 2002-08-20 Aprisma Management Technologies, Inc Method for automatic partitioning of node-weighted, edge-constrained graphs
US6141552A (en) * 1997-11-17 2000-10-31 Nortel Networks Corporation Estimation of mobility for network planning based on highway maps and traffic data

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
BOLLA R ET AL: "A distributed routing and access control scheme for ATM networks", COMMUNICATIONS, 1994. ICC '94, SUPERCOMM/ICC '94, CONFERENCE RECORD, 'SERVING HUMANITY THROUGH COMMUNICATIONS.' IEEE INTERNATIONAL CONFERENCE ON NEW ORLEANS, LA, USA 1-5 MAY 1994, NEW YORK, NY, USA,IEEE, 1 May 1994 (1994-05-01), pages 44 - 50, XP010126812, ISBN: 0-7803-1825-0 *
LAUCK A G ET AL: "SUBMARINE: an architecture for IP routing over large NBMA networks", INFOCOM '99. EIGHTEENTH ANNUAL JOINT CONFERENCE OF THE IEEE COMPUTER AND COMMUNICATIONS SOCIETIES. PROCEEDINGS. IEEE NEW YORK, NY, USA 21-25 MARCH 1999, PISCATAWAY, NJ, USA,IEEE, US, 21 March 1999 (1999-03-21), pages 98 - 106, XP010323753, ISBN: 0-7803-5417-6 *
LEE K J ET AL: "Distributed routing using topology database in large computer networks", NETWORKS: EVOLUTION OR REVOLUTION? NEW ORLEANS, MAR. 27 - 31, 1988, PROCEEDINGS OF THE ANNUAL JOINT CONFERENCE OF THE COMPUTER AND COMMUNICATIONS SOCIETIES. (INFOCOM), NEW YORK, IEEE, US, vol. CONF. 7, 27 March 1988 (1988-03-27), pages 593 - 602, XP010011722, ISBN: 0-8186-0833-1 *
SUNG-WOO PARK ET AL: "Distributed hierarchical optimal routing using aggregation/disaggregation and decomposition/composition techniques", PARALLEL PROCESSING SYMPOSIUM, 1991. PROCEEDINGS., FIFTH INTERNATIONAL ANAHEIM, CA, USA 30 APRIL-2 MAY 1991, LOS ALAMITOS, CA, USA,IEEE COMPUT. SOC, US, 30 April 1991 (1991-04-30), pages 424 - 431, XP010034133, ISBN: 0-8186-9167-0 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100346608C (en) * 2003-11-06 2007-10-31 华为技术有限公司 Path searching method

Also Published As

Publication number Publication date
JP2004535140A (en) 2004-11-18
US20040248576A1 (en) 2004-12-09
EP1410583B1 (en) 2010-09-08
CA2453238A1 (en) 2003-01-23
ITMI20011508A0 (en) 2001-07-13
DE60237612D1 (en) 2010-10-21
CN1554171A (en) 2004-12-08
US7003300B2 (en) 2006-02-21
ATE480931T1 (en) 2010-09-15
ITMI20011508A1 (en) 2003-01-13
EP1410583A1 (en) 2004-04-21

Similar Documents

Publication Publication Date Title
US7003300B2 (en) Method for routing in telecommunications networks
Li et al. On the wavelength assignment problem in multifiber WDM star and ring networks
Labourdette et al. Branch-exchange sequences for reconfiguration of lightwave networks
Zang et al. A review of routing and wavelength assignment approaches for wavelength-routed optical WDM networks
US5459716A (en) Facility restoration for telecommunications networks
US8327021B2 (en) Technique of determining connectivity solutions for network elements
EP2371094A1 (en) Generating network topology parameters and monitoring a communications network domain
Jaumard et al. Efficient spectrum utilization in large scale RWA problems
CN113225254B (en) Under-chain payment channel route balancing method
US20050025058A1 (en) Method for stochastic selection of improved cost metric backup paths in shared-mesh protection networks
Brightwell et al. Reserving resilient capacity in a network
CN117176638A (en) Routing path determining method and related components
Cheng Backtrack routing and priority-based wavelength assignment in WDM networks
Kennington et al. Wavelength translation in WDM networks: Optimization models and solution procedures
JPH07143062A (en) Optical path storage method and optical communication network
Williams et al. Efficient embedding of a hypercube in an irregular WDM network
WO2004056051A1 (en) Return path derivation in packet-switched networks
US6917596B1 (en) Method of addressing physical problems of a topological network using a topology engine
JPS63312750A (en) Data processing system
Allen et al. An incremental procedure for improving path assignment in a telecommunications network
Shi et al. Interconnection of self-healing rings
JPH04157944A (en) Method and device for managing controlling communication network
US7289450B2 (en) Flood signaling architecture and process for provisioning communication paths
CN100559742C (en) The method of grouped data stream in transporting the transmission net of circuit traffic
Beshir et al. On-line survivable routing in WDM networks

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2453238

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 2003513196

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 2002755539

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 20028175824

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2002755539

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWE Wipo information: entry into national phase

Ref document number: 10483691

Country of ref document: US