Next Article in Journal
Lensed Fiber-Optic Two-Photon Endomicroscopy for Field-of-View Enhancement
Previous Article in Journal
Second-Order Statistics of Self-Splitting Structured Beams in Oceanic Turbulence
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Crosstalk Classification Based on Synthetically Consider Crosstalk and Fragmentation RMCSA in Multi-Core Fiber-Based EONs

1
School of Information and Electrical Engineering, Hebei University of Engineering, Handan 056038, China
2
Hebei Key Laboratory of Security and Protection Information Sensing and Processing, Handan 056038, China
3
Hebei Key Laboratory of Photonic Information Technology and Application, the 54th Research Institute of CETC, Shijiazhuang 050081, China
*
Author to whom correspondence should be addressed.
Photonics 2023, 10(3), 340; https://doi.org/10.3390/photonics10030340
Submission received: 14 February 2023 / Revised: 11 March 2023 / Accepted: 20 March 2023 / Published: 22 March 2023

Abstract

:
Space division multiplexing elastic optical networks (SDM-EONs) based on multi-core fiber (MCF) technologies have attracted widespread attention as a potential means of enhancing large capacity and high flexibility. However, inter-core crosstalk (XT) degrades the quality of transmission. The algorithm for minimizing XT leads to an increase in spectrum fragmentation in the lightpath, which influences the spectrum utilization. Therefore, the question of how to comprehensively consider the two factors and improve the network performance is an issue worthy of study. This paper focuses on maximizing spectrum resource utilization while satisfying the XT constraints. Firstly, we optimize a three-dimensional metric model to evaluate XT and fragmentation more exactly in SDM-EONs. Furthermore, a crosstalk classification (CC) algorithm, which can adjust the XT constraints according to the actual situation of the network, is proposed. Moreover, to match the CC algorithm, we describe the crosstalk and fragmentation in the network and propose a synthetically consider crosstalk and fragmentation (SCCF) algorithm. Finally, simulation results show that the proposed CC-SCCF routing, modulation, core, and spectrum allocation algorithm reduces the XT on existing lightpaths, and also provides a lower probability of blocking and greater spectrum utilization.

1. Introduction

In recent years, with the rapid development of network applications and the increase in bandwidth-hungry requests, internet traffic has shown exponential growth, which has led to a huge challenge for the capacity and efficiency of optical networks [1]. The networks which are based on wavelength division multiplexing cannot meet the current network demand. Elastic optical networks (EONs) have become an effective technology to solve the network capacity problem due to their flexible and efficient characteristics [2]. By dividing the spectrum into multiple frequency slots (FSs), EONs can flexibly select paths, modulation formats, and spectrum resources for lightpaths. At the same time, the current capacity of single-core fiber technology is close to the Shannon capacity limit [3]. Space division multiplexing (SDM), based on multi-core fiber (MCF) applications, can effectively expand optical fiber capacity by utilizing spatial dimensions [4]. Thus, SDM-EONs, which combine MCF-based SDM and EONs, have become one of the effective solutions with which to overcome the capacity crisis [5].
In EONs, since the arrival and departure of requests are random, dynamic routing, modulation, and spectrum allocation (RMSA) algorithms are usually adopted when allocating resources to requests. In this process, the algorithm needs to meet three constraints, namely spectrum continuity, contiguity, and non-overlap [6]. However, with the dynamic establishment and release of services in the network, some idle spectrum resources become unavailable because they do not meet the requirements of spectrum continuity and spectrum adjacency. The idle but unavailable spectrum resources are called spectrum fragments. With the increasing frequency spectrum fragments, frequency utilization decreases, blocking probability increases and network performance decreases [5]. Therefore, in order to improve network performance, the impact of fragmentation on the network should be taken into account when allocating resources.
In SDM-EONs based on MCF, the introduction of a spatial dimension expands RMSA into routing, modulation, core, and spectrum allocation (RMCSA), posing more severe challenges in terms of resource allocation [5,6]. At the same time, services on the same frequency gap between adjacent fibers affect each other, resulting in inter-core crosstalk (XT), affecting the quality of transmission (QoT) and degrading network performance [7]. Therefore, crosstalk is also a factor to be taken into account during resource allocation.
Based on the above content, both the crosstalk problem and the fragmentation problem will affect the overall performance of the network. Meanwhile, considering the XT-fragmentation problem can comprehensively improve the transmission quality and spectrum utilization [8]. Note that reducing the impact of XTS on the network leads to service fragmentation, which increases the number of free spectrum blocks, increases resource fragmentation and decreases resource utilization [9,10]. On the contrary, when the number of fragments decreases, the service distribution becomes compact and the XT of adjacent cores increases, affecting QoT [11]. The over-optimization of one leads to the degradation of the other. Therefore, we believe that, in the process of resource allocation, we should fully consider how to improve the spectrum utilization rate under the conditions of meeting the XT constraint.
In order to reduce XT and fragmentation in networks, several resource management algorithms have been proposed. The first consideration is the development of typical resource management algorithms, which reroute all or part of the requested lightpath in the network to reduce XT and fragmentation. However, this will lead to traffic interruption. On this basis, the interruption-free algorithm is proposed, but this has the disadvantages of a lack of complex optical elements and high extra equipment cost [12]. To avoid the above problems, a fragmentation awareness algorithm and an XT awareness algorithm have been proposed and have demonstrated the capacity to improve spectrum utilization and reduce XT without creating any traffic disruption in EONs.
Therefore, we propose a sensing algorithm that considers both XT and fragmentation. Lightpaths can be established and transmitted on the network only when requests meet the crosstalk constraint. Therefore, our algorithm will first consider meeting the XT threshold to ensure the quality of transmission, and then further consider the comprehensive impact of the XT issue and fragmentation issue on the request. First, we extend the existing three-dimensional crosstalk model, and obtain the crosstalk-fragmentation metric model with three domains. Secondly, in order to better satisfy the XT constraint, according to the actual situation of the network, a crosstalk classification (CC) algorithm is proposed to relax the XT constraint. Then, to match the CC algorithm, we describe the crosstalk and fragmentation in the network and propose a comprehensive algorithm considering crosstalk and fragmentation (SCCF), which effectively improves the spectrum utilization rate. The proposed algorithm takes into account the influence of crosstalk problem and fragmentation problem on the network and the relationship between them. The simulation results show that the proposed CC-SCCF RMCSA algorithm reduces the XT of the lightpath and optimizes the blocking probability and spectral utilization.
The rest of this article is organized as follows. Work on the fragmentation problem and the XT problem is described in Section 2. Section 3 describes in detail the 3D XT fragmentation metric model. In Section 4, we propose the RMCSA algorithm based on CC-SCCF. We then evaluate the performance of the proposed algorithm in Section 5. Finally, the sixth part summarizes the full text.

2. Related Works

Firstly, some defragmentation algorithms have been proposed for the fragmentation problem in EONs. Thangaraj in [13] proposed an optimal spectrum defragmentation algorithm with a split spectrum approach. By effectively utilizing the minimum number of spectrum paths, the algorithm solved the limitation of multipath provisioning and reduced the extra spectrum consumption. Yadav et al. in [14] proposed a reactive defragmentation rerouting and spectrum assignment algorithm for when existing connection requests are terminated and network resources are released. Pan et al. in [15] proposed a multiple leaf-ringing-based protection algorithm with a spectrum defragmentation algorithm. When there are not enough available spectrum resources in the protection paths, the proposed algorithm triggers spectrum defragmentation and re-optimized resource utilization to improve efficiency in the network. However, these defragmentation algorithms may disrupt traffic, which adversely affects network operation and maintenance. Li et al. in [16] proposed a hitless deep reinforcement learning-based solution to achieve self-adaptive spectrum optimization. Selva et al. in [17] proposed a multiconstrained defragmentation algorithm to reconfigure the existing connections in a hitless manner. However, the hitless defragmentation algorithms struggle to build finer systems, meaning more complex optical components hardware costs are required.
The fragmentation-aware algorithms consider the impact of resource allocation on network fragmentation before allocating spectrum resources for requests, which effectively reduces fragmentation without disrupting traffic. Liu et al. in [18] proposed a fragmentation-aware routing and spectrum allocation based on a spectrum-slicing algorithm. A path weight formula and a spectrum slicing algorithm are proposed in the route selection stage and spectrum allocation stage, respectively to improve spectrum utilization. Bao et al. in [19] proposed a service-driven fragmentation-aware resource allocation scheme to enhance resource utilization by avoiding fragmentation with the joint consideration of the used path and neighboring links. Klinkowski et al. in [20] proposed a joint load-balanced and fragmentation-aware algorithm called LBFA to reduce fragmentation and improve spectrum utilization. Pourkarimi et al. in [21] proposed a core classification fragmentation-aware algorithm which could split resources according to the request demand and determine the appropriate spectral space using a cost function.
However, only considering the fragmentation will lead to a serious impact for the inter-core XT on the optical network, so the research on the inter-core XT is deepening. Similar to in the case of the fragmentation issue, in order to solve the XT issue, the XT-aware approach reduces the XT and prevents traffic disruption.
In addition, Ahmed et al. in [22] compared XT-aware and XT-avoided algorithms. The simulation result shows that, compared with the XT-avoided variety, XT-aware algorithms improve resource utilization better. Klinkowski et al. in [23] analyzed and compared schemes based on both the static/worst-case XT algorithms and the dynamic/exact XT estimation algorithms to ensure acceptable XT levels in the network. In [24], Zhang et al. proposed the Low-netwXT algorithm in SDM-EONs, which solved the RMCSA problem by the realization of crosstalk effect minimization and balance in MCF-based EONs.
Xiong et al. in [25] proposed a deep learning and hierarchical graph-assisted crosstalk-aware fragmentation avoidance algorithm. In this algorithm, a 3D measurement model is used to achieve more accurate results. Meanwhile, according to deep learning traffic predictions and the different characteristics of hierarchical graphs, an adaptive resource allocation algorithm is proposed, which considers eliminating core adjacency and reducing modulation format. However, machine learning algorithms cannot deal with emergencies well, and heuristic algorithms have certain advantages in this respect.
Lira et al. in [26] proposed a system design framework for the heuristic SA algorithm based on the MSCL principle and applied the proposed framework to design two new SA heuristics, namely MPAO-Wj and MPAO-WLj. Liu et al. in [27] proposed a routing spectral core assignment method (TMD-XT-RSCA) which takes into account hold time, lightpath neighborhood matching, and inner kernel crosstalk. The crosstalk issue is optimized by balancing the load of the lightpath, balancing the load of the fiber core, and considering the time domain fragmentation. Chatterjee et al. in [28] introduced core, mode and spectrum (CMS) algorithm, which allocates resources in turn in terms of core, mode, and spectrum. However, the above studies on XT and fragmentation issues are not accurate enough and ignore the relation between XT and fragmentation needed to achieve better-integrated network performance.
Therefore, the main contribution of this paper is to optimize the existing 3D metric model in order to to accurately evaluate the current state of the network from the spatial domain, frequency domain, and time domain. In addition, the proposed CC-SCCF algorithm clarifies the relationship between XT and fragmentation in order to improve resource utilization and reduce the impact of XT in the network.

3. System Model and the Enabling Technologies

3.1. Network Model

Generally, the network topology describes the MCF-based EONs, which need to start from three aspects: the network nodes, the links, and the fiber cores. Therefore, the network model is set to G(V, E, C), which means there are V nodes, and that there are E links in the network, and that each link contains C cores. In our model, each core can carry |F| frequency slots, whose bandwidth is 12.5 GHz. Additionally, a connection request (Ri) is modeled as Ri(si, di, bi, t s i , t e i ), which means the connection request from the source node si to the destination node di starts at t s i , ends at t e i and requires bi (Gbps) bandwidth.
When Ri reaches the network dynamically, the number of FSs Ri needed is first calculated. The number of FSs is then used to determine whether Ri is established or blocked by the lightpath (Pi) from node si to di. The number of FSs required by Ri is determined by the size of the bandwidth demand and the selected modulation level, which can be calculated by Equation (1) [29]
F i = b i C s l o t M + G B ,
where Fi and bi represent the number of FSs and bandwidth required by Ri. M denotes modulation level (i.e., 1, 2, 3, 4). Cslot is the bandwidth granularity of each FS. GB is the number of FS of the guard band required to ensure non-overlapping constraint. The FSs assigned to Ri is expressed as [ f s i , f e i ], where f s i and f e i are the indexes of start FS and end FS for Ri, respectively.
In addition to non-overlapping, when these resources are assigned to a lightpath, they should the satisfy constraints of spectrum continuity and contiguity. Indeed, switching between different cores is not allowed in the network nodes. That is, the selected core for the same lightpaths in all routing links is fixed to satisfy the constraint of spatial continuity constraints. As discussed in [29], these constraints must be followed during resource allocation in the MCF-based EONs.

3.2. Three Domains XT-Fragmentation Metric Model

In this section, we describe a synthetic metric model in detail. To measure the network state more precisely, both the effects of XT and fragmentation on the network should be simultaneously described when describing the network with a model. Based on this, by further extending the existing 3D fragmentation metric model [30] a 3D XT-fragmentation metric model is proposed. We introduce the model from the spatial, frequency, and time domains.

3.2.1. Spatial Domain

In this paper, the typical seven-core fiber with simple structures and clear characteristics in Figure 1a is selected [29]. In an MCF, in addition to the middle core, which is marked green, six other outer layer cores adjacent to the central core are marked in two colors, and the same color is not adjacent. Additionally, adjacent cores with different colors may be affected by XT. This is because the closer the distance between the cores is, the more seriously affected the core is by the XT. Therefore, the XT between the non-adjacent cores is ignored.
Specifically, when lightpath resources in each core of this link are occupied by requests, as shown in Figure 1b, the horizontal direction represents the FSs, the vertical direction represents cores, the colored parts represent the lightpath resources already occupied by requests, and the uncolored parts represent the idle resources. Since the same FS on core 2 and core 1 is occupied, these two cores are affected by the XT, which also affects core 3.
Therefore, for the XT issue in the spatial domain, Equation (2) is usually used to calculate the XT between the cores i and j:
X T = n n exp [ ( n + 1 ) 2 h i , j L ] 1 + n exp [ ( n + 1 ) 2 h i , j L ] ,
where hi,j and L represent the power coupling coefficient and the fiber length, respectively. hi,j is related to multiple parameters in MCF, which is mathematically expressed as Equation (3):
h i , j = 2 k i , j 2 b r β Λ i , j ,
where br and β are the bending radius and the propagation constant, respectively, whereas Λi,j and ki,j are the core pitch and the mode coupling coefficient between cores i and j, respectively. According to optical waveguide theory, ki,j is calculated by Equation (4):
k i , j = Δ c r U 2 V 3 K 0 ( Λ i , j c r W ) K 1 2 ( W ) ,
where Δ, cr, W, V, and U represent the relative refractive index difference, the core radius, the cladding, the normalized frequency, and the normalized transverse wave numbers in the core, respectively.
For the fragmentation issue in the spatial domain, since the fragmentation between the cores does not affect the other cores, it is only necessary to consider the number of cores with fragmentation. In Figure 1b, when the request needs to occupy 3FSs, neither core 1 not 3 can allocate sufficient resources for the request, while core 2 can provide spectrum resources. However, if the request needs to occupy 4FSs, core 1,2,3 are affected by the fragmentation issue.

3.2.2. Frequency Domain

As mentioned above, when the adjacent different cores use the same FSs, they are affected by more serious XT. Therefore, in the spectrum domain, the overlap of the occupied resources in the adjacent cores needs to be considered and the results are obtained by summing up, as shown in Equation (5):
X T i , j F = f F X T i , j y i , j f ,
where F is the set of FSs considered and y i j f is a binary value: 1 when this FS on the core i and j is overlapped, and 0 when not overlapped.
Taking the time slot (TS) 1 of Figure 2 as an example, the resource distribution of core 1,2,3 is visible, and only the first 18 FSs are shown. With Equation (5), the inter-core XT between any two adjacent cores can be obtained. For example, for core 1 and 2, the XT X T F   1 , 2 between cores 1 and 2 is X T F   1 , 2 = 2 ∙ XT1,2 since the two lightpaths in these cores have two FSs in common. Similarly, the overall inter-core XT suffered by a specific core may be expressed as Equation (6):
X T i F = f F , j C : j i X T i , j y i , j f ,
where C denotes all the cores in MCF. In Figure 2 TS1, the total inter-core XT of core 2 is X T 2 F = 2 ∙ XT1,2 + 4 ∙ XT2,3. because for core 2, 2 FSs are affected by XT with core 1 and 2 FSs with core 3.
In terms of fragmentation, the intra-core fragmentation issue only affects the current core. The effect of the fragmentation F r a i F on the frequency domain can also be obtained using a similar formula to Equation (6), as shown in Equation (7):
F r a i F = f F F r a i y i f ,
For core 2 in Figure 2 TS1, the red-colored FSs represent the idle but unavailable spectrum resources, which owe their condition to fragmentation. It can be seen that there are only two discrete free frequency gaps. Thus, for requests occupying FSs more than 1, the amount of fragmentation in the fiber core 2 is F r a F   2 = 2 ∙ F2.

3.2.3. Time Domain

When modeling Ri, both the t s i and t e i are considered, because the XT and fragmentation are only generated when the request occupies the resources in the network. Therefore, the time domain is also considered when computing the XT and fragmentation issues. In general, a longer lightpath request duration leads to more serious inter-core XT. Considering the time domain, we can further define the time-weighted inter-core XT as Equation (8):
X T i , j T , F = t T X T i , j F z i , j t , f ,
where T represents the set of TSs considered in the algorithm and z i , j t , f is a binary value that denotes the lightpath occupation state of FS f in cores i and j within TS t.
An example is shown in Figure 2, which denotes the FS usage in a 7-core fiber from TS1 to TS3. We compute the time-weighted XT using Equation (8). For example, the total XT between cores 1 and 2 is X T F   1 , 2 = 2 ∙ X T F   1 , 2 + 2 ∙ X T F   1 , 2 + 3 ∙ X T F   1 , 2 , because, for the core 2, 2 FSs are affected by XT in TS1, 2 FSs in TS2, and 3 FSs in TS3. At the same time, we can also calculate the XT effect of any core by using the three domains of spatial, frequency, and time with Equation (9):
X T i T , F = t T , j C : j i X T i F z i , j t , f ,
In Figure 2, the inter-core XT of core 2 is X T T , F   2 = (2 ∙ X T F   1 , 2 + 4 ∙ X T F   2 , 3 ) + (2 ∙ X T F   1 , 2 + 4 ∙ X T F   2 , 3 ) + (3 ∙ X T F   1 , 2 ). As can be seen, the XT affects core 2 on the three TSs. In TS1 and TS2, two adjacent cores overlap requests on core 2, respectively: 2 FSs are affected in core 1 and 2 FSs are impactd in core 3. In TS3, 3 FSs are affected between cores 1 and 2.
Similarly, we can also obtain the amount of fragmentation within the fiber core by weighting using Equation (10):
F r a i T , F = t T F r a i F z i t ,
By using Equation (10), the amount of fragmentation of core 2 can be easily obtained, F r a 2 T , F (2 ∙ F r a F   2 ) + (2 ∙ F r a F   2 ) + (2 ∙ F r a F   2 )
After defining the inter-core XT jointly in the spatial, frequency, and time domains, we can calculate the total XT and fragmentation for each established lightpath by using Equations (11)–(13).
X T i , j F , T = f F t T n n exp [ ( n + 1 ) 2 h i , j L ] 1 + n exp [ ( n + 1 ) 2 h i , j L ] y i , j f z i , j t ,
X T i F , T = f F , j C , j i t T , j C , j i n n exp [ ( n + 1 ) 2 h i , j L ] 1 + n exp [ ( n + 1 ) 2 h i , j L ] y i , j f z i , j t ,
F r a i F , T = f F t T F r a i y i f z i t ,
To ensure the lightpaths have better signal transmission qualities, we need to ensure that the total inter-core XT per FS per TS suffered on each of the links along the lightpath is no greater than a pre-defined threshold. If any link cannot guarantee this condition, then we should not allow this lightpath to be established on that path.

3.3. Routing and Modulation Format Selection

In routing, the choice of the modulation format is related to the transmission range, which in turn follows the XT threshold, as shown in Table 1 [24]. Therefore, we choose to use the classical k-shortest path (KSP) algorithm. Using a high-level modulation format can also reduce the consumption of spectrum resources and alleviate the fragmentation issue. However, the disadvantage of doing this is that the XT threshold is lowered, and our proposed CC algorithm can effectively alleviate this disadvantage. This paper considers four modulation formats, binary phase-shift keying (BPSK), quadrature phase-shift keying (QPSK), 8-quadrature amplitude modulation (QAM), and 16-QAM. Meanwhile, we consider all the available modulation formats for each lightpath, as shown in Equation (14), where the highest available modulation format M max i is determined by the transmission reach. Then, a collaborative path for each modulation format is selected.
M i = { M 1 i , M 2 i , , M j i , M max i } ,
where i represents the K path obtained in the KSP algorithm and j is the modulation format that can be adopted in each path.

4. Crosstalk Classification Based on Synthetically Consider Crosstalk and Fragmentation Algorithm

In this section, we present a CC-SCCF RMCSA, which contains two components: the CC algorithm and the SCCF algorithm.

4.1. Crosstalk Classification Algorithm

In the traditional RSA algorithm, to improve the spectrum utilization radio and reduce the blocking radio, the requests occupy the spectrum resources as tightly as possible by different allocation strategies. However, this RSA algorithm will inevitably lead to the increased influence of XT in the network. When the traffic load is low, the spectrum resources in the network are relatively abundant, and the influence of the XT can be reduced by discrete resources in the network under the premise of satisfying the request transmission. Based on this, the CC algorithm is proposed to divide the XT threshold XT into three stages based on the traffic load situation 0XT. The second stage allows the production of partial XT, namely αXT, where α is a weight which is used to test the extent to which relaxing the XT threshold affects the network. The third stage involves the transmission of the request while satisfying the XT threshold XT. When the volume of requests is small, the first stage should be adopted. As the volume increases, the available resources in the network decreases, leading to requests becoming blocked. When this occurs, XT stage upgrades to the second stage, until the upgrade to the third stage can be made.
Algorithm 1 shows the process of allocating resources for each lightpath request that reaches the network in the CC algorithm. When a new connection request Ri(si, di, bi, t s i , t e i ) arrives, we first judge whether there is any lightpath to be released in the connection Rel. If so, we update Rel and release the occupied spectrum resources (steps 1–5). Then, according to the KSP algorithm, the k-shortest paths are selected for Ri and stored in the Pi (steps 6). Next, the available modulation level ( M j i ) is selected for each path in Pi, where the highest modulation level ( M m a x i ) is determined by transmission distance. For each M j i , the number of Ri-occupied FSs (Fi) is calculated according to Equation (1) (steps 7–12). By combining Pi and M j i , the collaboration path (CPi) is obtained and is numbered in ascending order of Fi (step 13). After that, we set the XT stage in CPi as CSi (steps 14–15). Next, we determine whether the core (c) in CPi contains appropriate idle spectrum blocks (SBs) under the CSi and store the SBs as Bi (steps 16–18). Then, Algorithm 2 is used to determine whether Bi meets the crosstalk constraint. If Bi meets the crosstalk constraint, Bi is stored as an alternative spectrum block (ABi) (steps 19–28), and ABi with the minimum degree (di) of XT effect is allocated for Ri (steps 29–30). Otherwise, Ri will be blocked after the total paths are searched (steps 31–34).
Algorithm 1: CC algorithm
Input: Arriving connection request Ri(si, d i, bi, t s i , t e i ).
Output: Spectrum allocation.
1:for each existing connection Rel(sel, del, bel, t s e l , t e e l ) do
2:    if t s e l < t e e l then
3:      Update Rel and release the occupied spectrum resources.
4:    end if
5:end for
6: Select the k-shortest paths for Ri according to the KSP algorithm and store in the Pi
7:for each Pi do
8:    Determine the highest modulation format level M m a x i .
9:      for each modulation level M j i in [ M 1 i , M m a x i ] do
10:        Compute the number of FSs Fi requested by Equation (1).
11:      end for
12:    end for
13:CPi is numbered in ascending order of Fi
14:for each collaboration path CPi do
15:    Set the XT stage as CSi.
16:    for each CSi do
17:      for each c of CPi do
18:        According to the size of SBs and the crosstalk threshold, search the available SBs as Bi.
19:        if Bi ≠ None then
20:          for each Bi do
21:          Compute XT based on Algorithm 2.
22:            if Algorithm 2 returns 1 then
23:              Store the Bi in ABi
24:              Break.
25:            end if
26:          end for
27:        end if
28:      end for
29:      if ABi ≠ None then
30:        Select the SB with the first minimum of di and allocate the di for Ri.
31:      end if
32:      Reject connection request Ri
33:    end for
34:end for

4.2. Synthetically Consider Crosstalk and Fragmentation Algorithm

Since the CC algorithm displays better XT optimization performance at a low load, the growth of XT cannot be suppressed while in the third stage. To fit with the CC algorithm better, the SCCF algorithm measures the 3D model and simultaneously measures the effects of XT and fragmentation on the network. First, we simplify Equation (11) so that both XT and fragmentation are represented by frequency gap numbers
X T i , j F , T = f F t T X T i , j y i , j f z i , j t ,
where XTi,j denotes the number of FSs in which affected by XT.
Then, combined with Equation (13), the current combined impact ( C I i F , T ) of the core on the network is:
C I i F , T = X T i , j F , T + F r a i F , T = f F t T X T i , j y i , j f z i , j t + f F t T F r a i y i f z i t ,
Based on Equations (15) and (16), the effects of the core and the adjacent core can be found, respectively. During resource allocation, the most appropriate spectrum resources can be allocated to requests by measuring the network state multiple times, as in Algorithm 2.
Algorithm 2: SCCF algorithm
Input: Pi, ci, f s i , f e i .
Output: 1 or 0.
1:  XT = 0.
2:  for FS fi in [ f s i , f e i ] do
3:     for (link ei, core ci) in Pi do
4:        for each adjacent c a i of ci do
5:          if  Rel ≠ None then
6:               for each eel do
7:                  Calculate X T i , j F , T , X T i F , T , and C I i F , T .
8:               end for
9:               if  X T i F , T > XTthreshold then
10:                  return 0
11:               end if
12:           end if
13:        end for
14:     end for
15:     Select the spectrum resource with minimal C I i F , T
16:     if X T i , j F , T > XTthreshold then
17:       return 0
18:     end if
19:   end for
20:  return 1
To calculate the size of crosstalk and fragmentation, the inputs to Algorithm 2 are the network state on the path, including the pre-assigned routing path Pi on the path, core ci, the start FS f s i , and the end FS f e i . The output of the algorithm is a Boolean number: 1 indicates that the new lightpath can be successfully transmitted over these pre-allocated FS, and 0 indicates that the lightpath cannot be transmitted.
As a new Pi arrives, we determine the location of the SBs according to [ f s i , f e i ], Pi, and ci (steps 1–4). Then, we determine the occupation status of adjacent cores at the fi of Rel transmission (steps 5–7). If the spectrum resources are being occupied by lightpaths, we calculate the XT X T i , j F , T by Equation (16) and check if it meets the XTthreshold to ensure transmission successfully (steps 8–14). Finally, we compute and judge whether the XT on each FS assigned for Pi is less than the XTthreshold, and select the SB with the lowest total crosstalk effect (steps 15–20).
Finally, the XT on each assigned FS of Pi itself is calculated and checked to determine if it is less than XTthreshold and choose the spectrum resources with minimal combined impact (steps 15–20).

4.3. Complexity

The time complexity of the algorithm is determined by the number of loops in the algorithm. The time complexity in the CC-SCCF algorithm derives from the CC algorithm and the SCCF algorithm. The CC algorithm traverses spectrum resources in different crosstalk stages of all collaboration paths. The time complexity of planning collaboration paths for each request is O(k|M||E|log|V|), the complexity of the XT stages is O(|N|), the complexity of traversing the spectrums is O(|C||S|). Among them, k indicates the number of the shortest paths, whereas |M|, |V|, |E|, |N|, |C| and |S|, respectively, indicate the number of modulation levels being considered, nodes, links, XT stages being set, cores in an MCF link and FSs in each core in the network. The SCCF algorithm calculates and determines the crosstalk of each FSs, whose time complexity can be rendered as O(|E||C||S|). As a result, the CC-SCCF algorithm’s time complexity is O(k|C|2|E|2|M||N||S|2log|V|).

5. Simulation Results and Analysis

In this section, we evaluated the performance of the CC-SCCF RMCSA algorithm in two different network environments: the COST239 network with 11 nodes and 26 links [29] and the NSFNET network with 14 nodes and 21 links [30,31], as shown in Figure 3. The colored circles in Figure 3 represent nodes, and the numbers beside the links represent the distance [km] between nodes. Additionally, each core in the links contains 358 FSs of 12.5 GHz [32,33]. As shown in Figure 1, each link is an MCF consisting of 7 cores. The bandwidth of each lightpath follows an even distribution between 50 GHz and 400 GHz [34], and dynamically arriving optical path requests are subject to a negative exponential distribution, with an average of 100 ms [35]. The parameters of transmission reach, capacity pFS and inter-core XT threshold for the four common modulation formats are shown in Table 1 [24]. The protection bandwidth is set to two FSs to prevent interference effects between adjacent lightpaths [36,37]. Since only one kind of physical layer impact, inter-core XT, is considered in the algorithm, we assume that, when the XT threshold is met, services can be transmitted successfully. The CC-SCCF algorithm is compared with the algorithm using only the CC algorithm and the SCCF algorithm, which highlights the fit of the CC-SCCF algorithm, which is compared with the CMS RMCSA algorithm to reflect the algorithm performance [38]. The CMS algorithm is a traditional algorithm in SDM-EONs which allocates resources sequentially from core, mode and spectrum. Considering that MCF does not require mode allocation, we simplify the CMS algorithm into a resource allocation algorithm that only considers the core and spectrum. We also use the results of the first hits as a contrast, being those of a standard performance.
We introduce the weight α when introducing the CC algorithm in 4.1 to determine the XT threshold in the second stage, which directly affects the performance of the CC-SCCF algorithm. Since the RSA problem is an NP-hard problem, the RMCSA problem extended by RSA is also an NP-hard problem, and so it is difficult to obtain accurate weights by using mathematical theoretical model. Therefore, we obtain a relatively optimal weight through simulation. Therefore, we first determine the changes of network performance caused by the value of α in different network environments, through simulation, as shown in Figure 4. It can be observed that the combined impact ratio has the worst performance when α values of 0 and 1 are both present in NSFNET and COST239 networks. When α = 0 and 1, the second phase of the CC algorithm fails. This in turn affects the SCCF algorithm, so the overall optimization of the network is poor.
Meanwhile, we observed that the lowest combined impact ratio can be obtained by adopting different α values under different traffic loads. Specifically, as the network traffic load increases, the blocking probability is optimal. It is suitable for NSFNET and COST239, i.e., for NSFNET 400, 420 and 440 [Erlang], 0.4, 0.5 and 0.5 are the best. In the COST239 network, 0.3, 0.4, and 0.5 are the best for 1200, 1250 and 1300 [Erlang]. This is because the number of incoming requests increases per unit of time as the traffic load increases. To ensure the fairness of the performance comparison between the CC-SCCF algorithm and the benchmark, a fixed weight value (α = 0.5 in the NSFNET network and α = 0.4 in the COST239 network) is selected for all the SDFA algorithms.

5.1. Performance Comparison of Blocking Probability

In this subsection, we first compare the blocking probability (BP) of five algorithms. BP represents the ratio of the number of blocked connection requests to the total number of connection requests that arrive in the network. As shown in Figure 5a,b, the BP increases with increasing traffic load in the two networks. This is because the number of incoming connection requests per unit time increases as the traffic load increases. By comparing the CC, SCCF and CC-SCCF algorithms, it can be found that the CC-SCCF algorithm, combined with the CC algorithm and SCCF algorithm, shows better performance. In comparison with the first-fit (FF) algorithm, with the increase in traffic load, the performance of the CC algorithm is significantly improved. This is because, when the traffic load is small, the CC algorithm adopts 0XT, which leads to a more serious fragmentation issue. Conversely, in αXT and XT algorithms, the fragments are reduced and the blocking rate is reduced.
In comparison with the CMS and CC-SCCF algorithms, it can be seen that the performance of the CC-SCCF algorithm improves by about 12% to 14% in high-traffic loads. This is because the CC-SCCF algorithm using the 3D metric model can describe the network state more accurately and utilize the idle spectrum more efficiently. At the same time, the algorithm calculates F r a i T , F , senses the impact of fragmentation on the network in advance, and reduces BP.

5.2. Network-Wide XT Effect Ratio

Due to the dynamic establishment and release of lightpaths, the XT of requests in the network are constantly changed. Therefore, compared with calculating the impact of a single request XT, calculating the network-wide XT can more clearly and stably reflect the influence of crosstalk.
We define the network-wide XT effect ratio as the ratio of the current XT effect degree to the maximum occupied degree of all spectrum resources. Figure 6a,b compare the network-wide XT effect ratio using five algorithms in COST239 and NSFNET networks, respectively. Compared with other algorithms, the CC-SCCF algorithm has the lowest XT effect, which is mainly caused by the CC algorithm. The comparison with the FF algorithm shows that the XT effect of the CC algorithm decreases with the increase in traffic load. After the connection request arrives, the 0XT stage is judged preferentially to minimize the XT effect generated by each request. Therefore, the XT effect in the network is limited to a relatively low state.
In comparison with the CMS algorithms, the CC-SCCF algorithm optimizes the XT rate by 8% and 11%, respectively. This is because the CC-SCCF algorithm reduces XT in the network at the two stages of 0XT and αXT. Conversely, in the XT stage, because the XT effect is calculated in advance by Equation (15), there is no serious XT in the distribution of requests.

6. Conclusions

In this paper, a CC-SCCF resource allocation algorithm is proposed, which satisfies the XT constraint and improves the overall performance of the network. To achieve this goal, a 3D XT-fragmentation metric model is used to describe the more accurate current network state. Then, the CC algorithm is proposed to adjust the XT constraint on the request according to the current network state. By adjusting the XT constraint when the load is low, XT can be effectively reduced. When the load is high, the QoT of requests can be satisfied. Meanwhile, SCCF RMSA is proposed based on the CC algorithm, and the influence of XT and fragmentation on the network is considered. The effectiveness of the proposed algorithm is verified by the performance evaluation in COST239 and NSFNET networks. The simulation results show that the CC-SCCF RMCSA algorithm can effectively reduce the blocking probability and improve the spectrum utilization rate under the two network topologies.

Author Contributions

Conceptualization, Y.C. and J.Z.; methodology, Y.C.; software, Y.C.; validation, Y.C.; formal analysis, Y.C. and N.F.; investigation, Y.C. and Y.Z.; resources, Y.C.; data curation, Y.C.; writing—original draft preparation, Y.C. and N.F.; writing—review and editing, Y.C. and N.F.; visualization, Y.C. and Y.Z.; supervision, N.F.; project administration, D.R.; funding acquisition, J.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data in this paper is not publicly available at this time.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cisco. Annual Internet Report (2018–2023) White Paper. Available online: http://www.cisco.com (accessed on 20 January 2023).
  2. Gerstel, O.; Jinno, M.; Lord, A.; Yoo, S.B. Elastic optical networking: A new dawn for the optical layer? IEEE Commun. Mag. 2012, 50, s12–s20. [Google Scholar] [CrossRef]
  3. Chatterjee, B.C.; Sarma, N.; Oki, E. Routing and spectrum allocation in elastic optical networks: A tutorial. IEEE Commun. Surv. Tutor. 2015, 17, 1776–1800. [Google Scholar] [CrossRef]
  4. Saridis, G.M.; Alexandropoulos, D.; Zervas, G.; Simeonidou, D. Survey and evaluation of space division multiplexing: From technologies to optical networks. IEEE Commun. Surv. Tutor. 2015, 17, 2136–2156. [Google Scholar] [CrossRef] [Green Version]
  5. Cvijetic, M.; Djordjevic, I.B.; Cvijetic, N. Dynamic multidimensional optical networking based on spatial and spectral processing. Opt. Express 2012, 20, 9144–9150. [Google Scholar] [CrossRef]
  6. Richardson, D.J.; Fini, J.M.; Nelson, L.E. Space-division multiplexing in optical fibres. Nat. Photonics 2013, 7, 354–362. [Google Scholar] [CrossRef] [Green Version]
  7. Muhammad, A.; Zervas, G.; Forchheimer, R. Resource allocation for space-division multiplexing: Optical white box versus optical black box networking. J. Light. Technol. 2015, 33, 4928–4941. [Google Scholar] [CrossRef] [Green Version]
  8. Yang, M.; Zhang, Y.; Wu, Q. Routing, spectrum, and core assignment in SDM-EONS with MCF: Node-arc ILP/MILP methods and an efficient XT-aware heuristic algorithm. J. Opt. Commun. Netw. 2018, 10, 195–208. [Google Scholar] [CrossRef]
  9. Klinkowski, M.; Lechowicz, P.; Walkowiak, K. Survey of resource allocation schemes and algorithms in spectrally-spatially flexible optical networking. Opt. Switch. Netw. 2018, 27, 58–78. [Google Scholar] [CrossRef]
  10. Trindade, S.; da Fonseca, N.L.S. Machine learning for spectrum defragmentation in space-division multiplexing elastic optical networks. IEEE Netw. 2020, 35, 326–332. [Google Scholar] [CrossRef]
  11. Takeda, K.; Sato, T.; Chatterjee, B.C.; Oki, E. Joint Inter-Core Crosstalk-and Intra-Core Impairment-Aware Lightpath Provisioning Model in Space-Division Multiplexing Elastic Optical Networks. IEEE Trans. Netw. Serv. Manag. 2022, 19, 4323–4337. [Google Scholar] [CrossRef]
  12. Ahmed, I.; Oki, E.; Chatterjee, B.C. Crosstalk-Avoided Resource Allocation in Spectrally-Spatially Elastic Optical Networks: An Overview. Adv. Mod. Appl. Sci. 2022, 188, 188. [Google Scholar]
  13. Thangaraj, J. Multi-path provisioning in elastic optical network with dynamic on-request optimal defragmentation strategy. Opt. Switch. Netw. 2021, 41, 100607. [Google Scholar]
  14. Yadav, D.S. RDRSA: A reactive defragmentation based on rerouting and spectrum assignment (RDRSA) for spectrum convertible elastic optical network. Opt. Commun. 2021, 496, 127144. [Google Scholar] [CrossRef]
  15. Pan, M.; Qiu, Y.; Zhang, C. Multiple leaf-ringing based protection algorithm with spectrum defragmentation for multicast traffic in elastic optical network. Opt. Fiber Technol. 2021, 61, 102418. [Google Scholar] [CrossRef]
  16. Li, R.; Gu, R.; Jin, W.; Ji, Y. Learning-based cognitive hitless spectrum defragmentation for dynamic provisioning in elastic optical networks. IEEE Commun. Lett. 2021, 25, 1600–1604. [Google Scholar] [CrossRef]
  17. Selva Kumar, S.; Kamalakannan, J.; Seetha, R.; Asha, N.; Raja, K.T.; Sree Dharinya, S.; Sucharitha, M.; Kalaivani, S. The Effectual Spectrum Defragmentation Algorithm with Holding Time Sensitivity in Elastic Optical Network (EON). Int. J. Opt. 2022, 2022, 1–16. [Google Scholar] [CrossRef]
  18. Liu, H.; Ren, J.; Chen, Y.; Hu, J.; Tang, C.; Tang, M. Spectrum slicing-based fragmentation aware routing and spectrum allocation in elastic optical networks. Opt. Switch. Netw. 2022, 45, 100673. [Google Scholar] [CrossRef]
  19. Bao, B.; Yang, H.; Yao, Q.; Yu, A.; Chatterjee, B.C.; Oki, E.; Zhang, J. SDFA: A service-driven fragmentation-aware resource allocation in elastic optical networks. IEEE Trans. Netw. Serv. Manag. 2021, 19, 353–365. [Google Scholar] [CrossRef]
  20. Zhang, S.; Yeung, K.L.; Jin, A. LBFA: A Load-Balanced and Fragmentation-Aware Resource Allocation Algorithm in Space-Division Multiplexing Elastic Optical Networks. Photonics 2021, 8, 456. [Google Scholar] [CrossRef]
  21. Pourkarimi, E.; Rahbar, A.G. Novel fragmentation-aware algorithms in space division multiplexing elastic optical networks. Opt. Fiber Technol. 2021, 66, 102655. [Google Scholar] [CrossRef]
  22. Ahmed, I.; Oki, E.; Chatterjee, B.C. Crosstalk-aware vs. crosstalk-avoided approaches in spectrally-spatially elastic optical networks: Which is the better choice? In Proceedings of the 2022 Workshop on Recent Advances in Photonics (WRAP), Mumbai, India, 4–6 March 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–2. [Google Scholar]
  23. Klinkowski, M.; Zalewski, G. Dynamic crosstalk-aware lightpath provisioning in spectrally-spatially flexible optical networks. J. Opt. Commun. Netw. 2019, 11, 213–225. [Google Scholar] [CrossRef]
  24. Zhang, J.; Yao, Q.; Bao, B.; Ren, D.; Hu, J.; Yang, H.; Zhao, J. Resource-oriented RMCSA scheme with low crosstalk effect in multi-core fiber-based elastic optical networks. Opt. Fiber Technol. 2022, 68, 102796. [Google Scholar] [CrossRef]
  25. Xiong, Y.; Ye, Y.; Zhang, H.; He, J.; Wang, B.; Yang, K. Deep learning and hierarchical graph-assisted crosstalk-aware fragmentation avoidance strategy in space division multiplexing elastic optical networks. Opt. Express 2020, 28, 2758–2777. [Google Scholar] [CrossRef]
  26. Lira, C.J.N.; Almeida, J.R.C.; Chaves, D.A.R. Spectrum allocation using multiparameter optimization in elastic optical networks. Comput. Netw. 2023, 220, 109478. [Google Scholar] [CrossRef]
  27. Liu, H.L.; Hu, J.L.; Ren, J.; Hu, H.X.; Tang, C.; Chen, H.N. Crosstalk Aware Resource Allocation Method Based on Lightpath Load Balancing and Neighborhood Matching. Acta Electonica Sin. 2022, 50, 2746. [Google Scholar]
  28. Chatterjee, B.C.; Wadud, A.; Oki, E. Proactive fragmentation management scheme based on crosstalk-avoided batch processing for spectrally-spatially elastic optical networks. IEEE J. Sel. Areas Commun. 2021, 39, 2719–2733. [Google Scholar] [CrossRef]
  29. Su, J.; Zhang, J.; Wang, J.; Ren, D.; Hu, J.; Zhao, J. Dynamic impairment-aware RMCSA in multi-core fiber-based elastic optical networks. Opt. Commun. 2022, 518, 128361. [Google Scholar] [CrossRef]
  30. Tang, F.; Li, Y.; Shen, G.; Rouskas, G.N. Minimizing inter-core crosstalk jointly in spatial, frequency, and time domains for scheduled lightpath demands in multi-core fiber-based elastic optical network. J. Light. Technol. 2020, 38, 5595–5607. [Google Scholar] [CrossRef]
  31. Zhao, J.; Bao, B.; Chatterjee, B.C.; Oki, E.; Hu, J.; Ren, D. Dispersion based highest-modulation-first last-fit spectrum allocation scheme for elastic optical networks. IEEE Access 2018, 6, 59907–59916. [Google Scholar] [CrossRef]
  32. Yao, Q.; Yang, H.; Bao, B.; Yu, A.; Zhang, J.; Cheriet, M. Core and spectrum allocation based on association rules mining in spectrally and spatially elastic optical networks. IEEE Trans. Commun. 2021, 69, 5299–5311. [Google Scholar] [CrossRef]
  33. Yao, Q.; Yang, H.; Yu, A.; Zhang, J.; Ji, Y. Service provisioning based on association rules mining between crosstalk and fragmentization in multi-core elastic optical networks. In Proceedings of the 2019 24th OptoElectronics and Communications Conference (OECC) and 2019 International Conference on Photonics in Switching and Computing (PSC), Fukuoka, Japan, 1–11 July 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–3. [Google Scholar]
  34. Zhao, J.; Bao, B.; Yang, H.; Oki, E.; Chatterjee, B.C. Holding-time-and impairment-aware shared spectrum allocation in mixed-line-rate elastic optical networks. J. Opt. Commun. Netw. 2019, 11, 322–332. [Google Scholar] [CrossRef]
  35. Trindade, S.; da Fonseca, N.L.S. Proactive fragmentation-aware routing, modulation format, core, and spectrum allocation in EON-SDM. In Proceedings of the ICC 2019-2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–6. [Google Scholar]
  36. Zhao, J.; Yao, Q.; Liu, X.; Li, W.; Maier, M. Distance-adaptive routing and spectrum assignment in OFDM-based flexible transparent optical networks. Photonic Netw. Commun. 2014, 27, 119–127. [Google Scholar] [CrossRef]
  37. Zhang, J.; Bao, B.; Yao, Q.; Ren, D.; Hu, J.; Zhao, J. 3D fragmentation metric and RCSA scheme for space division multiplexing elastic optical networks. IEEE Access 2020, 8, 201595–201605. [Google Scholar] [CrossRef]
  38. Chatterjee, B.C.; Wadud, A.; Ahmed, I.; Oki, E. Priority-based inter-core and inter-mode crosstalk-avoided resource allocation for spectrally-spatially elastic optical networks. IEEE/ACM Trans. Netw. 2021, 29, 1634–1647. [Google Scholar] [CrossRef]
Figure 1. (a) a seven-core fiber and (b) effects of inter-core XT.
Figure 1. (a) a seven-core fiber and (b) effects of inter-core XT.
Photonics 10 00340 g001
Figure 2. 3D inter-core XT model.
Figure 2. 3D inter-core XT model.
Photonics 10 00340 g002
Figure 3. Test networks of (a) 11-node, 26-link COST239 and (b) 14-node, 21-link NSFNET.
Figure 3. Test networks of (a) 11-node, 26-link COST239 and (b) 14-node, 21-link NSFNET.
Photonics 10 00340 g003
Figure 4. Comparison of Combined Impact Ratio for different weights (α) in (a) COST239 and (b) NSFNET.
Figure 4. Comparison of Combined Impact Ratio for different weights (α) in (a) COST239 and (b) NSFNET.
Photonics 10 00340 g004
Figure 5. Comparison of blocking probability in (a) COST239 and (b) NSFNET.
Figure 5. Comparison of blocking probability in (a) COST239 and (b) NSFNET.
Photonics 10 00340 g005
Figure 6. Comparison of XT effect in (a) COST239 and (b) NSFNET.
Figure 6. Comparison of XT effect in (a) COST239 and (b) NSFNET.
Photonics 10 00340 g006
Table 1. The parameters are used to determine the transmission reach, capacity per frequency slot, and XT thresholds for each modulation format.
Table 1. The parameters are used to determine the transmission reach, capacity per frequency slot, and XT thresholds for each modulation format.
Modulation FormatsTransmission Reach [km]Capacity pFS [GHz]XT Thresholds [dB]
BPSK400012.5−14
QPSK200025−18.5
8-QAM100037.5−21
16-QAM50050−25
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, Y.; Feng, N.; Zhou, Y.; Ren, D.; Zhao, J. Crosstalk Classification Based on Synthetically Consider Crosstalk and Fragmentation RMCSA in Multi-Core Fiber-Based EONs. Photonics 2023, 10, 340. https://doi.org/10.3390/photonics10030340

AMA Style

Chen Y, Feng N, Zhou Y, Ren D, Zhao J. Crosstalk Classification Based on Synthetically Consider Crosstalk and Fragmentation RMCSA in Multi-Core Fiber-Based EONs. Photonics. 2023; 10(3):340. https://doi.org/10.3390/photonics10030340

Chicago/Turabian Style

Chen, Yanbo, Nan Feng, Yue Zhou, Danping Ren, and Jijun Zhao. 2023. "Crosstalk Classification Based on Synthetically Consider Crosstalk and Fragmentation RMCSA in Multi-Core Fiber-Based EONs" Photonics 10, no. 3: 340. https://doi.org/10.3390/photonics10030340

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop