Abstract
With the widespread use of real-time applications (VoIP, IPTV, Video conference, etc.) in Internet, protection and resource optimization become increasingly desired. Network protection aims to decrease the interruption time of communications by precomputing backup paths capable to receive and route traffics of affected primary paths upon failures. Resource optimization is achieved by improving data routing and resource sharing: data routing is often optimized by following the shortest paths whereas resource sharing is applied between the backup paths protecting against different failure risks. Two strategies of resource sharing are defined in literature: (1) backup sharing which limits the resource sharing to the backup paths and (2) global sharing which extends the resource sharing to the primary and backup paths.
In this paper, we compared the effects of resource sharing strategies on the resource utilization when the primary paths correspond to the shortest ones according to a static metric. With the single failure assumption, we show formally that the resource sharing between primary and backup paths is limited to some few links which cannot form a backup path. Thus, independently of the amount of resources (for instance: bandwidth) that can be shared between the primary and backup paths, the maximum number of backup paths is bounded. In our simulation, we comfort our formal result by showing that the two strategies have close acceptance rates of backup paths and protection bandwidth utilizations.
Introduction
Most of today’s applications (IPTV, videoconferences, VoIP, etc.) are very sensitive to the disruption of communications and consume more and more resources (such as bandwidth). Hence, protection against failures is becoming very desirable to prevent or reduce the disruption time of communications. In addition, since path protection consumes network resources if backup paths are pre-configured and their resource reserved, resource optimization is required to improve the network resource utilization.
Network protection [1,15,23,27,30] maintains the communication service continuity by precomputing and generally pre-configuring backup paths capable to reroute traffics of affected primary paths upon a failure. To ensure resource availability1
In the rest of this document, resource refers to bandwidth.
With the arrival of MultiProtocol Label Switching (MPLS) [25] in the few past years, protection [29] and resource optimization [30] are provided efficiently.
Firstly, fast recovery and availability of resources are guaranteed with the pre-configuration of local backup paths capable to bypass any failure risk (a failure risk could be a link, a node or a SRLG2
A SRLG [16,28] corresponds to a set of logical links that share a common physical component (optical fiber, crossconnect, etc.) whose single failure may impact all links in the set.
A LSP is a path through an MPLS network.
Secondly, much resources can be saved thanks to the flexibility in path selection offered by MPLS. Indeed, an appropriate selection of primary and backup paths can increase the bandwidth sharing and thus decrease the bandwidth allocations.
In the last recent years, more attention was given to the virtual networks. For a better use of resources, virtual networks are computed so that they consume less resources. Due to the NP-hardness of the problem of mapping a virtual network to a substrate network (Virtual Network Embedding or VNE), most of the proposed solutions use pre-computed (k-)shortest paths. Like in classical networks, two types of protection could be applied to ensure survivability : global and local. With the global protection, a primary virtual link (which corresponds to a substrate path) is protected by a disjoint backup virtual link connecting the same extremities [24,33]. Two virtual links are said disjoint if they don’t share any link or internal node in the substrat network. With the local protection [9], each link or node belonging to a substrat primary path (i.e. primary virtual link) is protected locally by a backup path which bypasses it.
Two main resources sharing strategies are defined in literature: (1) backup resource sharing [15] and (2) global resource sharing [1]. With the first strategy, the resource sharing is limited and applied to the backup paths protecting against different failure risks. As these backup paths cannot be active at the same time (due to the single failure assumption), they cannot ask for their resources simultaneously and thus they can share them. With the second strategy, the resource sharing is extended and applied to primary and backup paths. Concretely, since a backup path can bypass several links and/or nodes of a primary path, some resources can be freed on the primary affected paths. Such resources can be reallocated to the backup paths.
In this paper, we study the impact of resources sharing strategies on the resource utilization when the primary paths are the shortest ones. After reviewing works related to the resource sharing in Section 2, we introduce and explain in more details the principles of the backup and global resource sharing strategies. Then, we determine in Section 3 the formulas computing the amount of sharable and allocated resources with application to the two sharing strategies. In Section 4, we study formally the impact of resource sharing strategies on the resource utilization when the primary paths are the shortest ones. We show that the impact of the primary path resources freed upon a failure is very low and negligible on the protection capability. In Section 5, we compare and measure by simulations the gain obtained by global resource sharing instead of backup resource sharing. Finally, Section 6 is dedicated to the conclusions.
In the last two decades, a great deal of work is addressing network protection to find efficient algorithms and mechanisms providing survivability and optimizing network resource utilization.
In [12,13], several network coding-based strategies are described to provide protection in optical and also higher layers. In [22], re-optimization heuristic is proposed in order to decrease the risk of link congestion and thus avoid service disruption. With such heuristic, resource allocations are balanced over the network, mainly by rearranging and rerouting the paths. In [5], an extensive survey of the recovery methods is given. These methods are classified according to different criteria such as the layer in which recovery methods are applied (Physical Layer, Link Layer, Network Layer, etc.), computation and/or establishment moment of the backup paths (before failure for protection and after failure occurrence for the restoration), resource usage (without resource sharing or with resource sharing), scope (global or local protection) and domain (intra-domain or inter-domain protection). In MPLS networks, and under different network parameters and constraints, [3,10] propose various comparison metrics, such as the packet loss, rejection probability and restoration time, to evaluate the level of protection. Unfortunately, nether [3,10] nor [5] consider global sharing in their studies.
For MPLS networks, global and local protection with/without resource sharing can be applied in both intra-domain and inter-domain. With the global protection [2,15], two disjoint paths connecting the source and target nodes are computed: one primary path used to transmit traffic before any failure occurrence and one backup path that should be activated and used for routing upon any failure affecting the primary path. With the local protection [1,20,31], for every link and/or node of the primary path, one local backup path (NHOP LSP or NNHOP LSP) bypassing the protected link and/or node is computed. When a failure occurs, the traffic is switched locally at the PLR to the backup paths bypassing the failed risk. In [17], Li et al. proves that joint resource optimization of primary and local backup path is an NP-hard problem.
Recently, several methods were proposed for virtual network survivability [11,19]. Due to the complexity of the survivable virtual network embedding (SVNE) problem, this later is generally subdivided into two sub-problems (VNE and protection) which can be solved separately. Whereas on-line protection is applied to protect one path in classical networks, many substrat paths should be protected together to provide protection. In [33], the authors proposed to protect each primary substrat path by a disjoint shortest substrat path. To save resources, the backup paths minimize the additional bandwidth. In [9], the authors propose to protect locally the substrat links which are used to form the virtual links. In their approach, Guo et al. firstly chose a subset of primary and backup paths before calling a linear procedure that optimizes bandwidth allocation while balancing the load. In [11,19], various approaches providing survivability for virtual networks are described. These approaches are grouped in various categories according to the type of recovery (proactive or reactive), the protected network component (node or link), the recovery procedure (replication or flow rerouting), the scope (centralized or distributed), etc. [8] proposes to combine the failure dependent protection (FDP) with the failure independent protection (FIP) to improve the resource utilization. FDP provides node protection by duplicating nodes (i.e. associating backup nodes to the primary nodes) whereas FIP corresponds to the classical protection which configures a set of backup paths. In [32], disaster failures which involve multiple simultaneous failures located in the same geographic region are treated. After modeling disaster failures, the paper proposed mixed integer linear programming and prediction-based heuristics to deal with such type of failures.
To increase the acceptance rate of protection requests (i.e., to improve the resource utilization), [20] proposes a global resource sharing strategy for on-line protection. Contrarily to the backup resource sharing strategy which limits the resource sharing to the backup paths, Mélon et al. [20] suggest to pre-allocate the resources freed by the deactivated (or bypassed) primary path segments upon a failure to the backup paths which will be activated to recover from that failure (see Section 3). In order to minimize the resource allocation, [1] proposes a resource sharing-based cost function that measures the amount of extra spare resources required to cross a given link. Obviously, larger are the primary resources freed on a link upon a failure, smaller is the cost of this link for that failure. As this link cost function depends only on the capacities of resource sharing, the backup path and thus the recovery time may be arbitrary long. Indeed, the backup paths optimizing the cost function may include very long paths which induce high transmission delays. In addition, optimizing the resource allocation does not systematically improve the acceptance rate because of resource sharing capabilities of backup path computations.
Although the primary paths often correspond to the shortest ones, none of the described works studies the impact of such primary routing decision on the protection rate and bandwidth sharing capabilities. In this paper, we try to fill the gap by extending the work in [26] to empirically measure the impact of an optimal primary routing on the quality of resource allocation. In addition, we provide the theoretical results proving that the improvements due to the freed resource reallocation are insignificant compared to those obtained with the utilization of resource sharing between the backup paths.
Bandwidth allocation model
Before the presentation of the link admission control that takes into account bandwidth sharing (Section 3.1) for path computation, we first give some notations and definitions useful to the understanding of our control admission models (Section 3.2). Furthermore, these definitions enable the description of the context of our study.
Notations
Let us consider a directed graph the weight two bandwidth allocation methods on links: bidirectional and unidirectional. With the first method, any two unidirectional links ( For the ease of understanding and without loss of generality, we will focus in this paper on the case of unidirectional bandwidth allocations. As the case of bidirectional bandwidth allocations can be treated in the same way, only the results of simulations are given and discussed.
Bandwidth constraints and allocations for the backup paths
Using local protection mode, regardless of resource sharing strategies,

MPLS protection and bandwidth sharing.
To improve the acceptance rate of path establishment requests, resources like the bandwidth should be saved by sharing them. Indeed, under the practical hypothesis of simple failure that we adopt in this paper (as in many articles [1,7,14]), some paths cannot carry traffic at the same time: they can therefore share their bandwidth allocations. For this purpose, two main bandwidth sharing strategies were defined: (1) backup bandwidth sharing and (2) global bandwidth sharing.
With the first bandwidth sharing strategy, the bandwidth sharing is applied and limited to the backup paths that protect against different failure risks. In Fig. 1(a), the backup path
Protection bandwidth corresponds to the minimum amount of bandwidth that should be reserved for backup paths, to ensure the availability of enough bandwidth after any single failure.
The total bandwidth
In addition of the bandwidth sharing between the backup paths, more bandwidth could be saved by reallocating the bandwidth freed by the bypassed part of the primary path affected by the failure [1]. For instance, to recover from failure of node C in Fig. 1(a), the traffics of the primary paths
Only the primary links located between the extremity nodes of the activated backup path frees up bandwidth.
We deduce the total amount of bandwidth
Note that all the parameters (
Furthermore, to control and specify the amount of resources that should be used for protection and to separate the computation task of primary paths from that of backup paths, the bandwidth capacity of each link λ can be divided in two separate pools: primary bandwidth pool
When the backup resource sharing strategy is applied:
Although it seems that the global resource sharing strategy is more efficient than the backup resource sharing strategy, the blocking probabilities6
The blocking probability corresponds to the probability that a request of path establishment will be rejected due to the lack of network resources (bandwidth).
We recall that a metric is said to be static if its values on links do not change.
The majority of the well known IGP protocols computes the primary paths as the shortest ones in terms of a static metric (i.e., traffic independent costs). For instance, RIP minimizes the hop number (number of intermediate routers in a path) while OSPF applies the SPF (shortest path first) algorithm to optimize a static metric that depends generally on bandwidth capacities of links. With the advent of MPLS, the IP routing protocols (OSPF-TE and ISIS-TE) are extended to take into account the traffic characteristics in route computations. This leads to the definition of new (semi-)dynamic metric-based routing algorithms which often applies the Dijkstra’s shortest path algorithm. For instance, CSPF (constrained shortest path first) prunes links that do not meet the configured constraints from the topology network before applying the SPF algorithm that derives the best available path based on the information in the traffic engineering database. In other words, CSPF always returns a shortest path while the pruned links don’t cut all the possible shortest paths between two nodes.
In addition of the IGP protocols, we note that for VNE the k-shortest paths are often selected to map the virtual links to the primary substrat paths (i.e. primary virtual links).

Links that are able to free up bandwidth upon a failure of link
In this section, we show that when the primary paths follow the shortest paths according to any static metric, the maximum number of backup paths is bounded even if the primary bandwidth freed upon failure is infinite (i.e., the freed bandwidth is very larger than the protection bandwidth). This means that any backup path must cross at least one link which cannot free up bandwidth upon failure of the protected risk (i.e. we cannot build a backup path with only links freeing bandwidth upon the failure of the protected risk). Hence, the maximum number of backup paths which can be built is bounded at least by the capacities of links which cannot free up bandwidth (upon the considered failure).
Before detailing the proof of our assertion, let us consider an example. In Fig. 2, a network topology of equal-cost links is depicted. Assume that any primary path follows a shortest path and requires a minimum of 1 bandwidth unit. To protect a primary path traversing node D, link
From the precedent remarks, we conclude that any backup path protecting link
Even if we consider that the freed bandwidth upon failure r is infinite on all the links that are capable to free up bandwidth (example: when the primary capacities are infinite whereas the protection capacities are finite), we show formally in the next paragraphs that the maximum number of backup paths is bounded. Without loss of generality, we assume that any backup path requires a minimum of 1 bandwidth unit and the protection bandwidth is bounded.
Any backup path protecting a primary shortest path (according to a static metric) against a link failure risk must include a link which doesn’t free up any bandwidth. Formally:
To free up bandwidth on a link λ upon failure of link
Even if we consider that the PLR
Let us define
Assume that there is a node
Actually, assume that
From formulas (7) and (8), we conclude that
Links forming primary and backup paths.
As the PLR node belongs to
Any backup path protecting a primary shortest path (according to a static metric) against a node failure risk must include a link which doesn’t free up any bandwidth. Formally:
We prove the validity of lemma 4.2 by contradiction. In other words, if such a backup path exists, it must be shorter than the primary path it protects.
Assume that there is one backup path
To free up bandwidth upon failure of node
Assume that formula (9) is valid for
Thus, path
To prove the correctness of Lemma 4.2, we show now that formula (9) contradicts the shortness of the primary path
We recall that the primary path
On the other hand, formula (9) implies for
Every backup path (NNHOP LSP or NHOP LSP) should traverse a link that cannot free up bandwidth after the failure of a protected risk.
As both the NHOP and NNHOP paths should protect against link failures,9
This is due to the difficulty to distinguish link and node failures.
The number of NHOP and NNHOP backup paths that can be build in a network
For the proof, we first show that for any link, the number of backup paths protecting against its failure is bounded. From Lemma 4.1, we know that any backup path protecting against any link failure risk
As the protection cost
Similarly, we deduce that the maximum number of backup paths that can be built in the network is bounded by
With both the global and backup bandwidth sharing strategies, the number of backup paths is bounded when the protection capacities (or the link capacities) are bounded and lower than given constants. As any backup path should traverse at least one link that don’t free up bandwidth, the use of the global bandwidth sharing strategy instead of the backup bandwidth sharing strategy could not avoid network redimensioning over the long term.
When a great amount of traffic is not protected (for instance, best-effort traffic does not require protection), the freed bandwidth on some links upon failure could be high. Even in this case, the maximum number of backup paths is bounded specifically by the capacity of links that cannot free up bandwidth.
Whereas the maximum number of backup paths depends on all the network links with the backup bandwidth sharing strategy, this number depends more on the links that cannot free up bandwidth with the global bandwidth sharing strategy. In the next section, we compare by simulations these two bandwidth sharing strategies to quantify the gain in performances due to the exploitation of the freed bandwidth.
Simulation model
To compare and measure the performances of global and backup bandwidth sharing strategies, we used two well known topologies of network: Long Haul and Cost 239. The first network topology, depicted in Fig. 4(a), is composed of 28 nodes and 45 bidirectional links. The protection capacities are equal to 600 units in each direction for the bold links and 200 units for the light links. This network topology is relatively wide and presents a mean connectivity degree of 3.21. The second network topology, depicted in Fig. 4(b), is composed of 11 nodes and 26 bidirectional links. It is small and strongly connected since its mean connectivity degree is equal to 4.73. All the links of this network have the same protection capacity that is equal to 200 units in each direction.
To take into account the two possible models of bandwidth allocation (unidirectional bandwidth allocation and bidirectional bandwidth allocation), we considered two test scenarios: unidirectional allocation-based scenario (UAS) and bidirectional allocation-based scenario (BAS). In the first test scenario, the unidirectional bandwidth allocation method is applied for bandwidth allocation. It means that two protection pools are associated to each bidirectional link in Fig. 4. In the second test scenario, the bidirectional bandwidth allocation method is applied for bandwidth allocation. It means that only one protection pool is associated to each bidirectional link in Fig. 4. Thus, the protection capacities of bold links are equal to 1200 units (

Network topologies.
In our simulations, we generated sequentially 1000 demands of primary path protection asking for bandwidth quantities uniformly distributed between 1 and 10 units. Each demand corresponds to one primary path establishment request that is always satisfied (i.e., we assumed that the primary pool capacities of links are sufficient to satisfy all the requests of primary path establishment) and several requests of backup path establishment allowing the protection of the built primary path. The source and target nodes of each primary path are selected uniformly among the set of network nodes. For the computation of primary paths, we applied the shortest path first (SPF) algorithm that optimizes the number of hops whereas we used the constrained shortest path first (CSPF) algorithm for the computation of backup paths. With the backup resource sharing strategy, a request of backup path establishment is satisfied iff equation (5) is verified. With the global resource sharing strategy, equation (6) must be verified to establish the requested backup path.
Two criteria are selected to compare the global and backup resource sharing strategies: acceptance rate of backup paths (BPA) and rate of protection bandwidth utilization (PBwU). The first criterion BPA is computed for different network loads. It corresponds to the instantaneous ratio between the number of backup path requests that are accepted and the total number of backup paths required to protect entirely the last 50 primary paths. Formally, it is determined as follows:
The second criterion PBwU determines and measures the efficiency of bandwidth sharing. It corresponds to the ratio between the sum of all the protection costs and the amount of the bandwidth allocated in the network for the protection. Formally, it is computed as follows:
For each test scenario (UAS and BAS) and at each establishment of 50 primary paths, the two metrics BPR and PBwU are computed for the two compared strategies. We note that our results correspond to mean values over 1000 experiments.
Figure 5 depicts the evolution of the instantaneous acceptance rate of backup paths (BPA) as a function of the number of primary paths setup in the network for the unidirectional and bidirectional bandwidth allocations. We recall that an instantaneous acceptance rate concerns the 50 last primary paths only. Figure 5 shows that the bidirectional bandwidth allocation method is slightly better that the unidirectional bandwidth allocation method.

Evolution of the mean rate of backup path acceptance.

Evolution of the difference in acceptance rates of backup paths.
In addition, Fig. 5 clearly shows that the global and backup bandwidth sharing strategies using the bidirectional bandwidth allocation method have respectively larger acceptance rates than the global and backup bandwidth sharing strategies using the unidirectional bandwidth allocation method. These observations can be explained by the distribution of the protection costs on links (especially on opposite links) which is heterogeneous [27].
Figure 6 depicts the difference in cumulated acceptance rates of backup paths for the unidirectional and bidirectional bandwidth allocations. It shows that the difference is small and even imperceptible sometimes. For instance, in Longhaul network topology, the difference in instantaneous acceptance rates does not exceed 8%, even for high loads of traffic (a large number of primary paths) where the instantaneous acceptance rate of backup paths is small and inefficient (see Fig. 5(a)). For usual instantaneous acceptance rates that should be larger than 90%, the difference between the compared strategies is often imperceptible. With regards to the cumulated acceptance rate, Fig. 6(a) shows that the difference is very low and smaller than 3% in Longhaul network topology. In Cost 239 network topology, the differences in instantaneous acceptance rates reaches 30% (see Fig. 5(b)) for high loads whereas it does not exceed 9% for the cumulated rates (see Fig. 5(b)).
Obviously, the difference in the acceptance rates of backup paths is directly related to the amount and distribution of the freed bandwidth on links. Since the freed bandwidth is statically high on the links close to PLRs and generally low on the links located far from PLRs, the difference in acceptance rates of the compared strategies is slightly higher in COST 239 network topology than in Longhaul network topology. Indeed, the links are closer to the PLRs in COST 239 since it is more homogeneous and it has a larger connectivity degree than Longhaul.
In addition of the previous observations, we note that even for high freed bandwidth values, the acceptance rates of backup paths decrease with the augmentation of the traffic load and they converge to the saturation state where almost all the new protection requests are rejected. This corroborates our theoretical results which announces the existence of an upper bound for the number of backup paths that can be established in the network even with unlimited resources.
With regards to the second metric (bandwidth sharing utilization), Fig. 7 shows that both the global and backup bandwidth sharing strategies have similar bandwidth utilization rates for small and usual acceptance rates of backup paths. For instance, the difference in bandwidth sharing utilization for the compared strategies is very small in Longhaul network (see Fig. 7(a)) when the number of primary paths is lower than 1000 (all the acceptance rates are larger than 0.7) whereas the difference is imperceptible in COST 239 network (see Fig. 7(b)) when the number of primary paths is lower than 3000 (all the acceptance rates are larger than the usual value 0.85). For high traffic loads, Fig. 7 shows that the global bandwidth sharing strategy is better than the backup bandwidth sharing strategy. This is essentially due to the amount of freed bandwidth which increases with the decrease of the acceptance rate of backup paths. Indeed, whereas the protection bandwidth is completely independent of the freed bandwidth variation when the backup bandwidth sharing strategy is applied, it decreases with the augmentation of the freed bandwidth when we apply the global bandwidth sharing strategy.

Evolution of the mean rate of protection bandwidth utilization.
To summarize, these simulations show that the difference in performances between the global and backup bandwidth sharing strategies is almost imperceptible for low traffic loads where the acceptance rate of backup paths is high and usual. For high traffic loads where the acceptance rate of backup paths is low, the global bandwidth sharing strategy is slightly better than the backup bandwidth sharing strategy. In addition to the precedent remarks, our simulations comfort our theoretical results (see Therem 4.4) and show clearly that the freed primary bandwidth has very slight effect on the acceptance rate of backup paths compared to the backup bandwidth sharing.
Two known strategies of resource (bandwidth) sharing are described in this paper: backup bandwidth sharing and global bandwidth sharing. The first strategy restricts the bandwidth sharing to the backup paths whereas the second strategy extends the bandwidth sharing to the primary and backup paths.
To quantify the gain due to the extension of the bandwidth sharing to the primary and backup paths, we firstly proved theoretically that the bandwidth sharing between the primary and backup paths can never be applied on some backup links when the primary paths correspond to the shortest ones according to a static metric. Thus, the acceptance rate of backup paths is always limited and bounded by the protection capacities of links. Secondly, to measure the enhancement due to the bandwidth sharing between the primary and backup paths, we showed by simulations that the gain in performances (acceptance rate of backup paths and bandwidth utilization) is often imperceptible, particularly for low traffic loads where the acceptance rate of backup paths is large and usual. For high traffic loads where the acceptance rates are small, the global bandwidth sharing strategy outperforms slightly the backup bandwidth sharing strategy, especially in strongly connected networks.
As a result, the global bandwidth sharing strategy cannot be a long term solution for supporting bandwidth-intensive applications especially since the global bandwidth sharing strategy induces an overcost. Indeed, in return of the slight performance improvements the global bandwidth sharing allows, we note the complication of path computation and the necessity to maintain larger information. For instance, additional computations should be done with the global bandwidth sharing strategy to determine the amount of freed bandwidth after each establishment or liberation of a primary path.
