Next Article in Journal
A Set-Theoretic Approach to Modeling Network Structure
Previous Article in Journal
Special Issue on “Graph Algorithms and Applications”
Previous Article in Special Issue
Optimal Clustering in Stable Instances Using Combinations of Exact and Noisy Ordinal Queries
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Traffic Grooming Problem in Optical Networks with Respect to ADMs and OADMs: Complexity and Approximation †

1
GSSI Institute, Viale Francesco Crispi 7, 67100 L’Aquila, Italy
2
Department of Information Engineering Computer Science and Mathematics, University of L’Aquila, 67100 L’Aquila, Italy
3
Dipartimento di Economia, University of Chieti-Pescara, Viale Pindaro 42, 65125 Pescara, Italy
4
Department of Computer Science, Tel-Hai Academic College, Upper Galilee 1220800, Israel
5
Department of Computer Science, Technion, Haifa 3200003, Israel
6
Member of the Academic Council, Ort Braude College, Karmiel 2161002, Israel
*
Author to whom correspondence should be addressed.
A preliminary version of this paper appeared in the Proceedings of the 14th International European Conference on Parallel and Distributed Computing (Euro-Par), 2008. This paper has been significantly extended since then. Some of the major additions, besides the inclusion of all the proofs (that were only sketched or omitted in the conference version) of the technical contribution, are: an extension of the results holding for the path topology to the more interesting setting of ring topology and an improved presentations of the results also including pseudo-code for algorithms, more figures and a more in-depth comparison with the related literature. This research was supported by the Israel Science Foundation, grant NO. 1249/08 and by the Italian MIUR PRIN 2017 Project ALGADIMAR “Algorithms, Games, and Digital Markets” (2017R9FHSR_002).
Submission received: 16 December 2020 / Revised: 27 April 2021 / Accepted: 10 May 2021 / Published: 11 May 2021
(This article belongs to the Special Issue Graph Algorithms and Network Dynamics)

Abstract

:
All-optical networks transmit messages along lightpaths in which the signal is transmitted using the same wavelength in all the relevant links. We consider the problem of switching cost minimization in these networks. Specifically, the input to the problem under consideration is an optical network modeled by a graph G, a set of lightpaths modeled by paths on G, and an integer g termed the grooming factor. One has to assign a wavelength (modeled by a color) to every lightpath, so that every edge of the graph is used by at most g paths of the same color. A lightpath operating at some wavelength λ uses one Add/Drop multiplexer (ADM) at both endpoints and one Optical Add/Drop multiplexer (OADM) at every intermediate node, all operating at a wavelength of λ . Two lightpaths, both operating at the same wavelength λ , share the ADMs and OADMs in their common nodes. Therefore, the total switching cost due to the usage of ADMs and OADMs depends on the wavelength assignment. We consider networks of ring and path topology and a cost function that is a convex combination α · | O A D M s | + ( 1 α ) | A D M s | of the number of ADMs and the number of OADMs deployed in the network. We showed that the problem of minimizing this cost function is NP-complete for every convex combination, even in a path topology network with g = 2 . On the positive side, we present a polynomial-time approximation algorithm for the problem.

1. Introduction

1.1. Background

All-optical networks are used in scientific visualization, real-time medical imaging, video conferencing, high-speed supercomputing, distributed computing, in data centers and between them [1,2]. This is due to the data rates offered by these networks which are several orders of magnitudes higher than those offered by other networks [2,3,4].
Wavelength division multiplexing: To achieve these high data rates, all-optical networks maintain the signal in optical form. In other words, they avoid the optical–electronic–optical conversion overhead at the intermediate nodes which would otherwise have an adverse effect on the transmission rate. One of the main underlying technologies is wavelength-division multiplexing, which allows for the simultaneous transmission of signals over the same link, as long as they are transmitted on different wavelengths.
Switching cost: The focus of early research on all-optical networks was to obtain efficient topologies and wavelength allocation schemes/algorithms to minimize the total number of used wavelengths. The work in [5] is an excellent survey of the main results in this direction. More recent research on these networks considers switching cost minimization as a major design goal. These works consider the capital expenses (CAPEX) and/or operational expenses (OPEX) (expenses that are independent of usage and depend on usage, respectively) incurred in all-optical networks by the basic electronic switching units, the most prominent of them being Add-Drop multiplexers (ADMs) and optical Add-Drop multiplexers (OADMs). Every lightpath is terminated by two ADMs. If two lightpaths with a common endpoint are assigned the same wavelength, they can share the ADM operating at this wavelength at the common endpoint. Similarly, two lightpaths sharing a common intermediate node that are assigned the same wavelength can share the OADM operating at that wavelength at the common node.
Grooming: Typically, the transmission rates supported by a lightpath in an all-optical network is higher than the low-capacity demands. Consequently, a network operator puts together several low-capacity demands into one lightpath. This action of putting together is termed grooming, and the number g of communication requests that can be put together in a lightpath is termed the grooming factor. The grooming problem is the problem of assigning colors (wavelengths) to a given set of paths (communication requests) so that at every edge there are at most g of them assigned the same color. If a set of (at most g) lightpaths of the same wavelength have the same terminal node and terminal edge, they can share the ADM operating at that wavelength at that node (thus saving g 1 ADMs). In addition, in a way similar to the non-grooming case ( g = 1 ), a second set of paths with the same terminal node but a different terminal edge can share the same ADM. As for OADMs, at most g lightpaths that are assigned the same wavelength share an OADM in a common intermediate node (thus saving g 1 OADMs). The goal is to minimize the convex combination α · | O A D M s | + ( 1 α ) · | A D M s | of the number of ADMs and OADMs, for a fixed value α [ 0 , 1 ] . Clearly, our setting generalizes the well-studied ADM minimization problem (corresponding to the case of α = 0 ), as well as the OADM minimization one (corresponding to the case of α = 1 ).

1.2. Related Work

The ADM minimization problem is defined in [6] for ring topology and g = 1 . It is proven to be NP-complete in [7], and an 3 / 2 -approximation algorithm was presented in the study [8]. This result is improved in [9,10] to 10 / 7 + ϵ and 10 / 7 , respectively. The current best result is a 47 34 + ϵ -approximation [11] which states that for every ϵ > 0 there exists a 47 34 + ϵ -approximation algorithm whose running time is a polynomial the degree of which depends on ϵ .
The studies [7,12] consider the ADM minimization problem for general topology, and present the approximation algorithms with an approximation ratio of 8 / 5 and 3 / 2 + ϵ , respectively. The study [13] considers non-cooperative games in which users are selfish agents sharing the cost of the ADMs they use. This study presents games that converge in a polynomial number of steps to solutions with an approximation ratio between 3 2 and 3 2 + 1 k where k is the maximum size of a coalition formed by the agents.
The traffic grooming problem is introduced in [14] and studied in the context of ring topologies. The study in [15] shows that the ADM minimization problem is NP-complete for this topology when g is part of the input instance. In [16], it is shown that the same hardness result also holds for path and star networks, thus generalizing the result in [15]. In [17], the authors prove the NP-completeness of the problem in the strong sense, which implies the NP-completeness for bounded degree trees and directed trees.
For ring topology, a 2 ln g -approximation algorithm for the ADM minimization problem is presented in [18]. The running time of this algorithm, being exponential in g, yields a polynomial-time algorithm when g is fixed, i.e., not part of the input. In [19], this algorithm is extended to directed trees, and undirected trees with the bounded degree. The problem has also been studied in [20], where it is shown to be APX-complete for fixed values of g. Namely, for each of these values of g, there exists a constant c g > 1 such that there is no c g -approximation algorithm for the problem unless P = NP. The same study also presents an O ( n 1 / 3 log 2 n ) -approximation algorithm, where n is the number of nodes of the network. The paper [15] studies the special case of all-to-all traffic, in which there is a demand between every pair of nodes.
The minimization of hardware components in optical networks using grooming has been studied in [21] for ring networks and in [22] for star networks, in a different scenario.

1.3. Our Contribution

In this paper, we show that for every fixed α [ 0 , 1 ] , the problem of minimizing the convex combination f ( α ) = α | O A D M s | + ( 1 α ) | A D M s | of the total number of ADMs and OADMs is NP-complete. This hardness result holds even for chains and g = 2 . Note that for g = 1 , i.e., when there is no grooming, and the network is a chain, the problem can be easily solved in polynomial time. We then present an (polynomial-time) approximation algorithm for ring and chain topologies, with an approximation ratio of 2 g log n . Our algorithm is the first one achieving such an approximation ratio in the time polynomial in g, even for the special case of minimizing the number of ADMs. Our model allows for multisets of requests (i.e., multiple requests using the same path between the same couple of nodes).
Finally, it is worth remarking that the optimization of the network cost due to expensive hardware components (e.g., ADMs) has been widely investigated in the context of optical networks, also in papers published after the preliminary version of this one (see for instance [11,23,24,25]). Furthermore, special cases of this problem have been investigated in the context of busy time scheduling [26,27,28,29,30].
In Section 2, we formally describe the problem and introduce definitions that will be used through the paper. In Section 3, the proof of the aforementioned NP-completeness result is presented. We present and analyze the algorithms in Section 4. Section 5 is devoted to concluding comments and the discussion of some further research directions.

2. Problem Definition

Let G = ( V , E ) be an undirected graph with n = | V | nodes, modeling the optical network.
A coloring (or wavelength assignment) w of a set P of simple paths in a graph is a function w : P N + = { 1 , 2 , } . A coloring w of P is g-proper if for every edge e E and every color λ N + , the number of paths p P such that w ( p ) = λ and e is an edge of p is at most g.
A path p of length l ( p ) between two nodes u and v uses an ADM operating at wavelength w ( p ) at each of its endpoints, namely at u and v. Moreover, such a path uses an OADM operating at wavelength w ( p ) at each of its intermediate nodes. Overall, such a path uses two ADMs and l ( p ) 1 OADMs.
Given a g-proper coloring w of a set of paths P, an ADM operating at a wavelength λ at some node v may serve all the paths terminating at v and colored λ , provided that they enter v via at most two edges. Therefore, an A D M may serve at most 2 g paths.
Similarly, an OADM operating at a wavelength λ at some node v with two incident edges serves all the paths having v as an internal node and colored λ . In general, i.e., when the degree of such a node v is at least three, such an OADM may serve a set of paths having v as an internal node and colored λ , provided that they enter and leave v via the same pair of edges. Therefore, an O A D M may serve at most g paths.
Summarizing, in a path or ring topology, the number A D M v , λ w of ADMs operating at wavelength λ at node v is one if there is a path colored λ terminating at v, and zero otherwise. The number O A D M v , λ w of OADMs operating at wavelength λ at node v is one if there is a path colored λ having v as an internal node, and zero otherwise. See Figure 1 for an example.
In a general network, if the number of edges incident to v that are used by paths ending at v and colored λ is d, then the number A D M v , λ w of ADMs operating at wavelength λ at node v is d 2 . Similarly, the number O A D M v , λ w of OADMs operating at wavelength λ at node v is equal to the number of edge pairs incident to v that are used by paths crossing v and colored λ . A D M s w (resp. O A D M s w ) is the number of A D M s (resp. O A D M s ) needed by a g-proper coloring w, i.e., the sum of A D M v , λ w (resp. O A D M v , λ w ) over all nodes v and all colors λ .
We are now ready to formally define the problem under consideration.
CombinedTrafficGrooming
Input: ( G , P , g , α ) where G is a graph, P is a multiset of paths on G, g is a positive
integer and α [ 0 , 1 ] .
Output: A g-proper coloring of P.
Objective: Minimize C O S T ( w ) = α × O A D M s w + ( 1 α ) × A D M s w .

3. NP-Completeness

We note that Theorem 1 of [25] implies that the problem is APX-hard for α = 1 . Furthermore, in this section, we prove that the decision version of CombinedTrafficGrooming is NP-complete even on a chain network with g = 2 and for every α > 0 . Moreover, for α = 0 , i.e., for the case of ADM minimization, the problem is already known to be NP-complete (see [31]). In the following theorem, we consider the case of α > 0 .
Theorem 1.
Given an instance ( G , P , 2 , α ) ofCombinedTrafficGroomingfor chain topology and a real number x, the problem of deciding whether there exists a solution with a cost of at most x isNP-complete for every α > 0 .
Proof. 
Since it can be trivially verified that the decision problem belongs to the complexity class NP, in order to prove the NP-completeness it is sufficient to provide a polynomial reduction from the TriPart problem, known to be NP-complete (see [32]).
TriPart
Input: An undirected graph G = ( V , E ) with V = { v 1 , v 2 , , v σ } and E
= { e 1 , e 2 , , e 3 β }
Output: “YES” if there exists a partition of E ( G ) into triangles, “NO” otherwise.
The TriPart problem is the problem of deciding whether for a given simple graph G, there exists a partition of its edge set into triangles. Let V = { v 1 , v 2 , , v σ } and E = { e 1 , e 2 , , e 3 β } be the vertex and edge sets of G . Note that we can assume that the number of edges of G is a multiple of 3, because otherwise a partition does not exist and the answer is trivially “NO”.
From the above instance G = ( V , E ) of TriPart, we build the following instance I = ( G = ( V , E ) , P , 2 , α ) of CombinedTrafficGrooming. For each v i V , we add 6 β + 2 Δ nodes to chain G, with Δ = 36 β 2 σ + 1 . More precisely, we consider a subchain of nodes C i = { l i 1 , , l i 3 β , a i 1 , , a i Δ , r i 1 , , r i 3 β , b i 1 , , b i Δ } (see Figure 2); it is worth emphasizing that Δ is chosen to be sufficiently big to force optimal solutions to prefer triangular sets over others, as it will be proven in the sequel. The chain G of our instance is obtained by concatenating all the subchains C i , 1 i σ (see Figure 3). Finally, we have to define the path set P. Let ( u , v ) V × V denote the path between u and v in G. For each e i = { v h i , v k i } E with h i < k i , we add the path p i = ( r h i i , l k i i ) to P.
Since each node of G is an endpoint of at most one request in P, it holds that each solution uses exactly 6 β ADMs. Therefore, in the following, we focus only on the minimization of OADMs. In fact, let x = α × K + ( 1 α ) × 6 β (the value of K will be chosen later). It can be noticed that there exists a solution of cost at most x if and only if there is a solution which uses a number of OADMs at most K.
Define a t-solution (where t is an integer value) as a solution using Δ × t OADMs located at blocks of Δ nodes, (i.e., the a and b nodes), in the following called Δ -blocks. Recall that Δ = 36 β 2 σ + 1 : notice that (i) it is polynomial in the size of the instance and (ii) it is sufficiently high so that the cost of a solution is mainly determined by the number of OADMs located at Δ -blocks, that is, every t-solution uses a total number of OADMs lower than the one used by any ( t + 1 ) -solution. We can conclude that a t-solution uses a total number of OADMs between Δ × t and Δ × t + Δ 1 .
For each p i = ( r h i i , l k i i ) P , h i < k i , the number of crossed Δ -blocks (i.e., those blocks that are completely contained in p i ) is b l o c k s ( i ) = 2 ( k i h i ) 1 . Let B = i = 1 3 β b l o c k s ( i ) 2 + β 2 and K = Δ B + Δ 1 .
We complete the proof by showing that a solution using at most K OADMs exists for I if and only if it is possible to partition the edge set of G into triangles.
We first show that, if it is possible to partition the edge set of G into triangles, then a solution using at most K OADMs exists for I. For every triangle in G composed of edges e i , e j , e k , we consider the set of paths { p i , p j , p k } . Assign these paths the same color and without loss of generality, assume that p k is the longest path among the three. Since g = 2 , it can be easily checked that such a set is 1-colorable. Moreover, the number of OADMs used at Δ -blocks is Δ · b l o c k s ( k ) = Δ 2 ( b l o c k s ( i ) + b l o c k s ( j ) + b l o c k s ( k ) + 1 ) . By summing over the sets induced by all the triangles, we obtain that the total number of OADMs used at Δ -blocks is Δ 2 i = 1 3 β b l o c k s ( i ) + β = Δ · B ; thus, we have a B-solution that can use at most K OADMs.
Conversely, we now show that, if there exists a solution for I using at most K OADMs, then it is possible to partition the edge set of G into triangles. Define a component as a set of paths colored with the same color. We now show that S is a B-solution and that in a B-solution, every component is of the form { ( r i γ 1 , l j γ 1 ) , ( r j γ 2 , l k γ 2 ) , ( r i γ 3 , l k γ 3 ) } with i < j < k . Let us assume without loss of generality that S is using the maximum possible number of colors, that is, no set of paths colored with the same color exists, such that it can be split in two sets using two different colors without increasing the number of used OADMs. Since g = 2 , each component is composed of at most two levels of requests, i.e., two sets of paths where in each set the paths are pairwise disjoint, and every OADM can be used by at most two requests. For each component C using s Δ -blocks of OADMs, we want to distribute s among the requests belonging to C such that each request γ C is charged with b l o c k s ( γ ) 2 + f ( C ) , with f ( C ) = s γ C b l o c k s ( γ ) 2 | C | being the surplus of component C. First of all, notice that a component C of the desired form { ( r i γ 1 , l j γ 1 ) , ( r j γ 2 , l k γ 2 ) , ( r i γ 3 , l k γ 3 ) } with i < j < k , uses b l o c k s ( γ 1 ) + b l o c k s ( γ 2 ) + b l o c k s ( γ 3 ) + 1 2 Δ -blocks, and thus f ( C ) = 1 6 . The proof now proceeds by cases, considering all the possible components C not being of the desired form, and for any of them, we show that f ( C ) > 1 6 .
  • Let us assume that three requests belong to a component, γ 1 on the first level and γ 2 and γ 3 on the second one. If the ones on the second level do not correspond to consecutive edges in G, or γ 1 corresponds to an edge of G that is not consecutive to both edges corresponding to the requests on the second level, C uses at least b l o c k s ( γ 1 ) 2 + b l o c k s ( γ 2 ) 2 + b l o c k s ( γ 3 ) 2 + 3 2 Δ -blocks. Therefore, f ( C ) 1 2 .
  • If a component uses only one level of requests (for our assumption about the maximality of colors, in this case it can contain only a request γ ), it is using b l o c k s ( γ ) 1 Δ -blocks. Therefore, f ( C ) 1 2 .
  • If two different requests γ 1 and γ 2 belong to a component C, one for each level, C uses at least b l o c k s ( γ 1 ) 2 + b l o c k s ( γ 2 ) 2 + 1 Δ -blocks. Thus, f ( C ) 1 2 .
  • If | C | 4 requests belong to a component, at least | C | 2 2 + γ C b l o c k s ( γ ) 2 Δ -blocks are needed. Therefore, we obtain that f ( C ) | C | 2 2 | C | 1 4 .
Given that S uses at most K OADMs, by recalling the definitions of B and K, S is a t-solution with t B . Moreover, if there exists a component C such that f ( C ) > 1 6 , it is trivial to verify that S would be an t-solution with t > B : we obtain a contradiction. Therefore, we have that every component is such that f ( C ) = 1 6 and thus is of the form { ( r i γ 1 , l j γ 1 ) , ( r j γ 2 , l k γ 2 ) , ( r i γ 3 , l k γ 3 ) } with i < j < k .  □

4. Approximation Algorithms

In this section, we present and analyze the approximation algorithms for chain and ring topologies. An algorithm ALG is a ρ -approximation algorithm for a minimization problem Π if, for every instance I of Π , its running time is polynomial in the size of I and A L G ( I ) ρ · O P T ( I ) . Here, A L G ( I ) denotes the value of the solution returned by ALG on input I and O P T ( I ) denotes the optimum of instance I. The approximation ratio of ALG is the smallest ρ such that ALG is a ρ -approximation algorithm.
We first present a meta algorithm that, given an r-approximation algorithm for edge instances in which all the requests share a common edge of the chain or the ring, builds an r log n -approximation algorithm for general instances. In what remains of the section, we present two edge algorithms: the first is a two-approximation algorithm for the O A D M minimization problem, and the second one works for any linear combination of A D M s and O A D M s , guaranteeing an approximation ratio of 2 g log n .

4.1. The Merge Meta Algorithm

Consider the following meta algorithm Merge whose pseudo-code is given in Algorithm 1. It receives an r-approximation algorithm EA for edge instances of CombinedTrafficGrooming and acts on an arbitrary instance ( G , P , g , α ) of CombinedTrafficGrooming. At the first step, the set P ¯ of all requests sharing the median edge of the chain are given as input to EA to obtain a coloring W ¯ of these requests. The algorithm then splits the chain G into two sub-chains G 1 and G 2 by removing the median edge and recursively proceeds on these sub-chains. The colorings returned from the recursive invocations are modified so that they do not use the colors of W ¯ .
Algorithm 1Merge.
Require: EA is an r-approximation algorithm for edge instances of CombinedTrafficGrooming.
Require: ( G , P , g , α ) an instance of CombinedTrafficGrooming.
Require:G is a chain with vertices i , i + 1 , , j .
Ensure: Return an r log n -approximate solution of ( G , P , g , α )
 1:
k i + j 2 .
 2:
P ¯ { p P | p contains the edge k , k + 1 .
 3:
W ¯ EA ( G , P ¯ , g , α ) .
 4:
G 1 the sub-chain of G with vertices i , , k .
 5:
G 2 the sub-chain of G with vertices k + 1 , , j .
 6:
for 1 , 2 do
 7:
   if  P  then
 8:
    P { p P | p is completely in G } .
 9:
    W M ERGE ( EA , G , P , g , α ) .
10:
   Add | W ¯ | to every color of W .
11:
   else
12:
    W .
13:
   end if
14:
end for
15:
return W ¯ W 1 W 2 .
In ring networks, we add an initial invocation of EA on all the requests sharing some arbitrary edge of the ring and then proceed on the remaining chain instance.
The following theorem shows the correctness and the approximation ratio guaranteed by Merge.
Theorem 2.
If EA is an r-approximation algorithm for edge instances, thenMergeand its modification for ring topologies guarantee approximation ratios r log n and r ( log n + 1 ) , respectively.
Proof. 
We prove by induction on the depth of the recursion. Correctness and running time: If there are no recursive invocations, the correctness of Merge directly follows from the one of EA . Otherwise, by the inductive hypothesis and by the correctness of EA , the colorings W 1 and W 2 are valid. The paths in P 1 and P 2 do not overlap and they are colored with colors different than those of W ¯ . Therefore, the returned coloring W ¯ W 1 W 2 is valid. We observe that algorithm EA is invoked at most n times, and thus Merge is a polynomial-time algorithm.
Approximation ratio: Since the depth of the recursion is at most log n , it is sufficient to prove by induction on the depth d of the recursion that is a d × r -approximation algorithm. If d = 1 , then the execution consists of one invocation of EA and the result follows. Otherwise, consider an execution where the depth of the recursion is d > 1 . Let m * be the cost of an optimal solution, and let m 1 * , m 2 * and m ¯ * be the cost of optimal solutions of P 1 , P 2 and P ¯ , respectively. Clearly, m * m ¯ * . Furthermore, m * m 1 * + m 2 * since the sets P 1 and P 2 do not overlap, thus no ADM sharing or OADM sharing is possible between the instances. As for the solution of the algorithm, let m be the cost of the solution returned by Merge, and let m 1 , m 2 and m ¯ be the costs of W 1 , W 2 and W ¯ , respectively. Since EA is an r-approximation, we have:
w ¯ r × w ¯ * r × w * .
By the inductive hypothesis, we have w * ( d 1 ) r w i * for 1 , 2 . Summing up the inequalities, we conclude:
w = w 1 + w 2 + w ¯ ( d 1 ) r w 1 * + ( d 1 ) r w 2 * + r × w * = ( d 1 ) r ( w 1 * + w 2 * ) + r × w * ( d 1 ) r w * + r × w * = d × r × w * .
For ring topologies, we add an additional term of r × w * due to the initial invocation of EA .  □

4.2. Groom-OADM: An Algorithm for the Minimization of OADMs in Edge Instances

Algorithm Groom-OADM, whose pseudo-code is given in Algorithm 2, processes the requests in the non-increasing order of their lengths and partitions the ordered requests into m g sets of g requests with the possible exception of the last set that may contain less than g requests. Each such set is colored with a unique color.
Lemma 1.
Groom-OADMis a two-approximation edge-algorithm for the minimization of OADMs.
Proof. 
Correctness and running time: The algorithm produces a valid output since every color λ is assigned to at most g requests. The running time of the algorithm is dominated by the the running time of the sorting phase and is thus polynomial in the size of the instance which, in our case, is dominated by the number | P | of requests in the instance.
Approximation ratio: Let k = m g be the number of colors used by the algorithm. Since all the requests share an edge of the chain, any one-colorable set contains at most g of them. Therefore, any solution, in particular an optimal one, uses at least k colors. Denote by p λ the longest path of the set P λ of the paths colored λ by Groom-OADM. Consider an optimal coloring, and rename its colors in the following way. The color assigned to the longest path is 0. The color assigned to the longest path that is not assigned the color 0 is 1, the color assigned to the longest path that is not assigned the colors 0 or 1 is 2, and so on. It it easy to show by induction on λ that for every λ , there is at least one path whose length is at least the length ( p λ ) of λ . Therefore, an optimal solution uses at least ( p λ ) 1 OADMs operating at color λ . On the other hand, Groom-OADM uses at most 2 ( ( p λ ) 1 ) OADMs since all the paths have an edge in common. Summing up, with all colors λ [ k ] , we conclude the proof.  □
In the following, we exploit the result of Lemma 1 in order to obtain an approximation algorithm for the CombinedTrafficGrooming problem. By combining Lemma 1 with Theorem 2, we are also able to derive the following theorem providing an approximation algorithm for the case α = 1 ; moreover, it is worth noticing that a better approximation ratio of 4 is given in [28] for this particular case.
Algorithm 2Groom-OADM.
Require: ( G , P , g , 1 ) is an edge instance of CombinedTrafficGrooming.
Ensure: Return an two-approximate solution of ( G , P , g , 1 ) :
1:
P the paths of P sorted in non-increasing order of their lengths.
2:
λ = 0 .
3:
while P do
4:
     P λ the first min { | P | , g } paths of P .
5:
     P P P λ .
6:
    Color the paths of P λ with color λ .
7:
     λ + + ;
8:
end while
Theorem 3.
Merge(Groom-OADM)is a 2 log n (and, respectively, 2 ( log n + 1 ) ) approximation algorithm forCombinedTrafficGroomingin a chain (and, respectively, ring) topology with α = 1 , (i.e., for the problem of minimizing the number of OADMs).

4.3. Groom: An Algorithm for Edge Instance of CombinedTrafficGrooming

Algorithm Groom is obtained from Groom-OADM with a slight modification. In the sort phase in which the paths are sorted by their lengths, Groom keeps sets of identical paths together.
Lemma 2.
Groomis a 2 g -approximation edge-algorithm forCombinedTrafficGrooming.
Proof. 
Clearly, every execution of Groom is an execution of Groom-OADM. Therefore, by Lemma 1, Groom is a two-approximation edge-algorithm for the OADM minimization problem. In the following, we show that Groom is a 2 g -approximation algorithm for the ADM minimization problem. As the combined cost is a convex combination of ADM and OADM costs, this implies the Lemma.
Let W * be the number of colors used by some optimal solution. For 1 λ W * , let P λ * be the set of paths colored λ by this solution. Notice that P = λ = 1 W * P λ * (where ⊎ is the union operation on multisets). Let P λ * ¯ P λ * be such that from every set of identical paths of P λ * , exactly one is in P λ * ¯ . Let also: P * ¯ = λ = 1 W * P λ * ¯ .
Recall that we consider edge instances, in which all the paths share a common edge e. Every path has one endpoint at each side of e. Then, any subset of paths can be considered as the edge set of a bipartite graph ( U , V , E ) . Specifically, U (resp. V) is the set of nodes on the left (resp. right) of e (including one endpoint of e). Every path of P with endpoints u U and v V corresponds to an edge u , v E . As P λ * ¯ does not contain identical paths, it induces a simple bipartite graph. A simple bipartite graph ( U , V , E ) satisfies | E | | U | | V | . For fixed | U V | this is maximized when | U | = | V | = | U V | 2 . Therefore, the number A D M λ * of ADMs colored λ used by this solution satisfies | P λ * ¯ | A D M λ * 2 2 . Then, A D M λ * 2 | P λ * ¯ | = 2 | P λ * ¯ | | P λ * ¯ | 2 | P λ * ¯ | g .
By summing up over all colors, we obtain A D M * 2 | P * ¯ | g .
Let W be the number of colors used by the solution returned by Groom. For 1 λ W , let P λ be the set of paths colored λ by this solution. Notice that, also in this case, it clearly holds that P = λ = 1 W P λ . Let P λ ¯ P λ be such that from each (maximal) set of identical paths, exactly one path is in P λ ¯ . Let also P ¯ = λ = 1 W P λ ¯ .
Consider a maximal nonempty set X of identical paths. Any solution must use at least | X | g different colors for these paths. In particular, this holds for our optimal solution. In other words, | X P * ¯ | | X | g . Groom divides X into subsets of size g, except possibly the first and last sets. Therefore, | X P ¯ | | X | g + 1 2 | X | g 2 | X P * ¯ | . Summing up for all such sets X, we obtain | P ¯ | 2 | P * ¯ | . On the other hand, a solution returned by Groom, uses at most 2 ADMs per each path in P ¯ . The remaining paths use these ADMs at no additional cost. Therefore, the number of ADMs used by Groom satisfy A D M 2 | P ¯ | 4 | P * ¯ | 2 g A D M * .  □
The following theorem is a direct consequence of the previous Lemma and Theorem 2.
Theorem 4.
Merge(Groom)is a 2 g log n (and, respectively 2 g ( log n + 1 ) ) approximation algorithm forCombinedTrafficGroomingin chain (and, respectively, ring) topology.

5. Summary

In this paper, we investigated the problem of minimizing hardware cost in optical networks in the scenario in which at most g (g is the grooming factor) lightpaths can share the same color on any network edge. It is worth noticing that, while most previous work takes into account only the cost due to electronic components (i.e., ADMs), we focused on the combined cost due to ADMs and optical components (OADMs). In particular, we considered the cost function of f ( α ) = α | O A D M s | + ( 1 α ) | A D M s | , where 0 α 1 , and we have studied the fundamental topologies of ring and chain networks.
We showed that finding an optimal coloring, i.e., a coloring minimizing the considered cost function, is NP-complete even on chains and when the grooming factor is g = 2 , for any value of α > 0 . We then presented a general technique that, given an r-approximation algorithm working on particular instances of our problem (i.e., instances in which all requests share a same edge of the network), builds a new algorithm for general instances having an approximation ratio O ( r log n ) . We exploited this technique in order to obtain an O ( g log n ) -approximation algorithms for our problem.
It is worth noticing that our approximation ratio of 2 g ( log n + 1 ) is better than the trivial one (which has a 2 g factor) in case g > ( log n + 1 ) 2 . Moreover, our algorithm has the following interesting property: the returned solution simultaneously achieves the claimed approximation ratio with respect to every fixed value of α .
There are several interesting left open problems:
  • Strengthening the N P -completeness result, either towards the direction of proving an A P X -hardness result or towards an impossibility of a sub-exponential algorithm under the exponential time hypothesis ( E T H , introduced in [33]). In this respect, it is worth noting that the current reduction cannot be exploited in order to obtain these extensions. In particular, with respect to the former direction, the considered TriPart problem is a decision problem and it is worth investigating whether a related optimization problem could be exploited in order to prove the A P X -hardness. On the other hand, with respect to the latter direction, even if TriPart were to be proven to admit no sub-exponential algorithm under the ETH, our reduction builds an instance of CombineTrafficGrooming of quadratic size with respect to the one of TriPart and therefore would not be able to provide a similar result for CombineTrafficGrooming.
  • Improving the achieved approximation ratio for the considered topologies of ring and chain networks.
  • Extending the algorithm and the analysis to other network topologies.
  • Considering the online version of the problem in which lightpath requests are not given in advance but arrive over time.

Author Contributions

Formal analysis, M.F., G.M., L.M., M.S. and S.Z.; Writing—original draft, G.M., L.M. and M.S.; Writing—review & editing, M.F., G.M., L.M., M.S. and S.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Du, D.H.C.; Vetter, R.J. Distributed computing with high-speed optical networks. Computer 1993, 26, 8–18. [Google Scholar]
  2. Green, P.E. Fiber-Optic Communication Networks; Prentice Hall: Hoboken, NJ, USA, 1992. [Google Scholar]
  3. Brackett, C.A. Dense Wavelength Division Multiplexing Networks: Principles and applications. IEEE J. Sel. Areas Commun. 1990, 8, 948–964. [Google Scholar] [CrossRef]
  4. Klasing, R. Methods and problems of wavelength-routing in all-optical networks. In Proceedings of the MFCS’98 Workshop on Communication, Brno, Czech Republic, 24–25 August 1998; pp. 1–9. [Google Scholar]
  5. Beauquier, B.; Bermond, J.C.; Gargano, L.; Hell, P.; Perennes, S.; Vaccaro, U. Graph problems arising from Wavelength–Routing in All–Optical Networks. In Proceedings of the 2nd Workshop on Optics and Computer Science, WOCS’97, Geneva, Switzerland, 1 April 1997. [Google Scholar]
  6. Gerstel, O.; Lin, P.; Sasaki, G. Wavelength Assignment in a WDM Ring to Minimize Cost of Embedded SONET Rings. In Proceedings of the INFOCOM’98, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, CA, USA, 29 March–2 April 1998. [Google Scholar]
  7. Eilam, T.; Moran, S.; Zaks, S. Lightpath Arrangement in Survivable Rings to Minimize the Switching Cost. IEEE J. Sel. Area Commun. 2002, 20, 172–182. [Google Scholar] [CrossRef]
  8. Călinescu, G.; Wan, P.J. Traffic Partition in WDM/SONET rings to minimize SONET ADMs. J. Comb. Optim. 2002, 6, 425–453. [Google Scholar] [CrossRef]
  9. Shalom, M.; Zaks, S. A 10/7 + epsilon approximation for minimizing the number of ADMs in SONET rings. IEEE/ACM Trans. Netw. 2007, 15, 1593–1602. [Google Scholar] [CrossRef]
  10. Epstein, L.; Levin, A. Better bounds for minimizing SONET ADMs. J. Comput. Syst. Sci. 2009, 75, 122–136. [Google Scholar] [CrossRef] [Green Version]
  11. Epstein, L.; Levin, A.; Menahem, B. Minimization of SONET ADMs in ring networks revisited. Computing 2010, 87, 3–19. [Google Scholar] [CrossRef]
  12. Călinescu, G.; Frieder, O.; Wan, P.J. Minimizing Electronic Line Terminals for Automatic Ring Protection in General WDM Optical Networks. IEEE J. Sel. Area Commun. 2002, 20, 183–189. [Google Scholar] [CrossRef]
  13. Flammini, M.; Monaco, G.; Moscardelli, L.; Shalom, M.; Zaks, S. Selfishness, collusion and power of local search for the ADMs minimization problem. Comput. Netw. 2008, 52, 1721–1731. [Google Scholar] [CrossRef]
  14. Gerstel, O.; Ramaswami, R.; Sasaki, G. Cost effective traffic grooming in WDM rings. In Proceedings of the INFOCOM’98, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, CA, USA, 29 March–2 April 1998. [Google Scholar]
  15. Chiu, A.L.; Modiano, E.H. Traffic Grooming Algorithms for Reducing Electronic Multiplexing Costs in WDM Ring Networks. J. Light. Technol. 2000, 18, 2–12. [Google Scholar] [CrossRef]
  16. Huang, S.; Dutta, R.; Rouskas, G.N. Traffic grooming in path, star, and tree networks: Complexity, bounds, and algorithms. IEEE J. Sel. Areas Commun. 2006, 24, 66–82. [Google Scholar] [CrossRef] [Green Version]
  17. Shalom, M.; Unger, W.; Zaks, S. On the Complexity of the Traffic Grooming Problem in Optical Networks. In Proceedings of the Fun with Algorithms, 4th International Conference, Castiglioncello, Italy, 3–5 June 2007; pp. 262–271. [Google Scholar]
  18. Flammini, M.; Moscardelli, L.; Shalom, M.; Zaks, S. Approximating the Traffic Grooming Problem. J. Discret. Algorithms 2008, 6, 472–479. [Google Scholar] [CrossRef] [Green Version]
  19. Flammini, M.; Monaco, G.; Moscardelli, L.; Shalom, M.; Zaks, S. Approximating the traffic grooming problem in tree and star networks. J. Parallel Distrib. Comput. 2008, 68, 939–948. [Google Scholar] [CrossRef]
  20. Amini, O.; Pérennes, S.; Sau, I. Hardness and approximation of traffic grooming. Theor. Comput. Sci. 2009, 410, 3751–3760. [Google Scholar] [CrossRef] [Green Version]
  21. Chen, B.; Rouskas, G.N.; Dutta, R. Traffic Grooming in WDM Ring Networks with the Min-Max Objective. In Networking 2004, Proceedings of the International Conference on Research in Networking, Athens, Greece, 9–14 May 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 174–185. [Google Scholar]
  22. Chen, B.; Rouskas, G.N.; Dutta, R. Traffic Grooming in Star Networks. In Proceedings of the BROADNETS, San Jose, CA, USA, 25–29 October 2004. [Google Scholar]
  23. Flammini, M.; Marchetti-Spaccamela, A.; Monaco, G.; Moscardelli, L.; Zaks, S. On the complexity of the regenerator placement problem in optical networks. IEEE/ACM Trans. Netw. 2011, 19, 498–511. [Google Scholar] [CrossRef]
  24. Flammini, M.; Monaco, G.; Moscardelli, L.; Shalom, M.; Zaks, S. Optimizing regenerator cost in traffic grooming. Theor. Comput. Sci. 2011, 412, 7109–7121. [Google Scholar] [CrossRef] [Green Version]
  25. Flammini, M.; Monaco, G.; Moscardelli, L.; Shalom, M.; Zaks, S. On the Complexity of the Regenerator Cost Problem in General Networks with Traffic Grooming. Algorithmica 2014, 68, 671–691. [Google Scholar] [CrossRef]
  26. Koehler, F.; Khuller, S. Busy Time Scheduling on a Bounded Number of Machines (Extended Abstract). In Algorithms and Data Structures; Ellen, F., Kolokolova, A., Sack, J.R., Eds.; Springer International Publishing: Berlin/Heidelberg, Germany, 2017; pp. 521–532. [Google Scholar]
  27. Chang, J.; Khuller, S.; Mukherjee, K. LP rounding and combinatorial algorithms for minimizing active and busy time. J. Sched. 2017, 20, 657–680. [Google Scholar] [CrossRef] [Green Version]
  28. Flammini, M.; Monaco, G.; Moscardelli, L.; Shachnai, H.; Shalom, M.; Tamir, T.; Zaks, S. Minimizing total busy time in parallel scheduling with application to optical networks. Theor. Comput. Sci. 2010, 411, 3553–3562. [Google Scholar] [CrossRef] [Green Version]
  29. Mertzios, G.B.; Shalom, M.; Voloshin, A.; Wong, P.W.; Zaks, S. Optimizing busy time on parallel machines. Theor. Comput. Sci. 2015, 562, 524–541. [Google Scholar] [CrossRef] [Green Version]
  30. Khandekar, R.; Schieber, B.; Shachnai, H.; Tamir, T. Real-time scheduling to minimize machine busy times. J. Sched. 2015, 18, 561–573. [Google Scholar] [CrossRef] [Green Version]
  31. Winkler, P.; Zhang, L. Wavelength assignment and generalized interval graph coloring. In Proceedings of the SODA, Baltimore, MD, USA, 12–14 January 2003; pp. 830–831. [Google Scholar]
  32. Dor, D.; Tarsi, M. Graph Decomposition Is NP-Complete: A Complete Proof Of Holyer’s Conjecture. SIAM J. Comput. 1997, 26, 1166–1187. [Google Scholar] [CrossRef] [Green Version]
  33. Impagliazzo, R.; Paturi, R. On the Complexity of k-SAT. J. Comput. Syst. Sci. 2001, 62, 367–375. [Google Scholar] [CrossRef] [Green Version]
Figure 1. An input example on a chain network with 13 nodes and g = 3 at the top. Below are two possible colorings of the input paths. Both colorings use two colors. In the first coloring, the paths colored with λ = 1 use 5 ADMs (at nodes 1, 5, 8, 9 and 11) and 9 OADMs (at nodes 2, 3, 4, 5, 6, 7, 8, 9 and 10). The paths colored λ = 2 use 6 ADMs and 11 OADMs. This coloring uses 11 ADMs and 20 OADMs in total. On the other hand, the second coloring uses 10 ADMs and 18 OADMs in total.
Figure 1. An input example on a chain network with 13 nodes and g = 3 at the top. Below are two possible colorings of the input paths. Both colorings use two colors. In the first coloring, the paths colored with λ = 1 use 5 ADMs (at nodes 1, 5, 8, 9 and 11) and 9 OADMs (at nodes 2, 3, 4, 5, 6, 7, 8, 9 and 10). The paths colored λ = 2 use 6 ADMs and 11 OADMs. This coloring uses 11 ADMs and 20 OADMs in total. On the other hand, the second coloring uses 10 ADMs and 18 OADMs in total.
Algorithms 14 00151 g001
Figure 2. The subchain C i associated to node v i in Theorem 1.
Figure 2. The subchain C i associated to node v i in Theorem 1.
Algorithms 14 00151 g002
Figure 3. The chain G with three paths corresponding to the edges of the triangle v 1 , v 2 , v 4 in the graph G being the instance of TriPart in Theorem 1.
Figure 3. The chain G with three paths corresponding to the edges of the triangle v 1 , v 2 , v 4 in the graph G being the instance of TriPart in Theorem 1.
Algorithms 14 00151 g003
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Flammini, M.; Monaco, G.; Moscardelli, L.; Shalom, M.; Zaks, S. The Traffic Grooming Problem in Optical Networks with Respect to ADMs and OADMs: Complexity and Approximation. Algorithms 2021, 14, 151. https://0-doi-org.brum.beds.ac.uk/10.3390/a14050151

AMA Style

Flammini M, Monaco G, Moscardelli L, Shalom M, Zaks S. The Traffic Grooming Problem in Optical Networks with Respect to ADMs and OADMs: Complexity and Approximation. Algorithms. 2021; 14(5):151. https://0-doi-org.brum.beds.ac.uk/10.3390/a14050151

Chicago/Turabian Style

Flammini, Michele, Gianpiero Monaco, Luca Moscardelli, Mordechai Shalom, and Shmuel Zaks. 2021. "The Traffic Grooming Problem in Optical Networks with Respect to ADMs and OADMs: Complexity and Approximation" Algorithms 14, no. 5: 151. https://0-doi-org.brum.beds.ac.uk/10.3390/a14050151

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop