--- tags: EON, HSNL, NCKU --- # Routing, Spectrum and Modulation Level Assignment, and Scheduling in Survivable Elastic Optical Networks Supporting Multi-Class Traffic contributed by <`RusselCK` > ###### tags: `RusselCK` - [ ] [Routing, Spectrum and Modulation Level Assignment, and Scheduling in Survivable Elastic Optical Networks Supporting Multi-Class Traffic](https://ieeexplore.ieee.org/document/8485690) 環境假設 * survivability of an EON with multiclass traffic * each traffic type needs specific **protection mechanism** and **scheduling strategy** * a connection request may demand for dedicated path protection 解法 * **Formulating an integer linear programming (ILP)** to serve multi-class traffic in EONs by considering various **survivability** and **scheduling** requirements. * a number of **heuristic algorithms** to reduce the complexity of the ILP formulation in large scale networks * two and three methods are considered for path selection and resource allocation, respectively. * by comparing their performance with the ILP formulation 結論 * Our results reveal that by using load-aware path selection and first-fit frequency-slice and time-slot assignment strategies the best compromise between blocking probability and initial delay is obtained. ## I. Intoduction #### The routing, modulation and spectrum assignment (RMSA) problem * the routing and wavelength assignment (RWA) problem #### Resource reservation schemes (the time domain behavior of traffic) 1. **immediate reservation (IR)** * incoming requests must be served immediately upon their arrival time 2. **advance reservation (AR)** * requests can tolerate a pre-determined delay and reserve resources in advance * Considering the type of traffic (IR or AR) in the RMSA problem, increases its complexity #### Alternative route (survivability policies) 1. provisioned or **reserved** before a failure occurs **(protection schemes)** * [優] reduces the recovery time and improves the reliability of network * [缺] degrades the spectrum efficiency and increases capital expenditure (CAPEX) * backup resources may be assigned dedicatedly to a single connection or shared by multiple connections * **Dedicated Path Protection (DPP)** * **Shared Backup Paths Protection (SBPP)** 2. dynamically computed after the failure **(restoration schemes)** * [優] higher spectrum efficiency and lower CAPEX * [缺] lower reliability ## II. Problem Statement ### A. Network Model * $G(V,~E)$: the network topology * $V$: the set of nodes * $E$: the set of links * $\left| T\times F \right|$ resource elements (REs) * $F$ frequency slices (FSs): the segmented spectrum of each fiber * $T$ time slots (TSs): the divided time usage of FSs * resource blocks (RBs): consisting of several adjacent REs ![](https://i.imgur.com/FBL9PgB.png) > $F=$ 4 ; $T=$ 8 ![](https://i.imgur.com/afNI598.png) > Rate and Supported Transmission Distance for Each Modulation Format in a FS With Bandwidth of 12.5 GHz ### B. Traffic Model Static * Assume that all the connection requests are **fixed and known** Dynamic * Assume that all the connection requests **arrive randomly** and allocated resources to each request are released after the holding time of the request * Two request arrival models: 1. Single * at most one request arrives at each time slot 2. Batch * a few number of requests arrive at each time slot each request may be an IR or AR request * IR request * AR request 1. a specified starting time, and a specified duration (STSD) * STSD-fixed: STSD with fixed starting time > which means the request must start at a particular time in the future or it may be a flexible window, meaning that instead of a single starting time, a range of starting times are considered 2. a specified starting time but an unspecified duration (STUD) 3. an unspecified starting time but a specified duration (UTSD) > the **time behavior of traffic**, i.e., its starting and holding times, must be included in resources allocation algorithms by considering time usages of spectrum slices. Each **connection request** $$ R(s, d, n, \delta, \zeta,\tau,\eta,\sigma) $$ * $s$: source * $d$: destination * $n$: the number of required FSs in BPSK (the lowest modulation format) * $\delta$: the holding time * $\zeta$: the minimum starting time * $\zeta=$ 1 for IR request * $\tau$: the maximum ending time * $\tau = \zeta + \delta -1$ for IR and STSD-fixed AR requests * $\eta$: the survivability approach (protection or restoration) $$ \eta = \begin{cases} 1&\text{ if }~it~is~protection\\ 0&\text{ if }~it~is~restoration \end{cases} $$ * $\sigma$ : the protection scheme (dedicated or shared) $$ \sigma = \begin{cases} 1&\text{ if }~it~is~dedicated\\ 0&\text{ if }~it~is~shared \end{cases} $$ ![](https://i.imgur.com/dqimLow.png) ... :::warning TODO : example ::: ## III. The Proposed RMSA and Scheduling Algorithms to Support Multi-Class Traffic ### A. ILP Formulation The optimization problem is formulated to minimize Bandwidth Block Probability (BBP) **Objcetive**: maximize provisioned bandwidth demands **Subjective**: continuity, contiguity and non-overlapping constraints #### Notations * $r=1,2,\ldots,R$ : Requests * $t=1,2,\ldots,T$ : Time Slots * $f=1,2,\ldots,F$ : Frequency Slices * $p=1,2,\ldots,K$ : Candidate pairs of link-disjoint paths * $t_{0}=\zeta,\zeta +1,\ldots,\tau -\delta$ : Candidate start time slots * $f_{0}=1,2,\ldots,F-n_{p}$ : Candidate start frequency slices ### ILP problem **Objective:** $$ \begin{equation} \begin{aligned} \max\quad \left\lbrace \sum \limits _{r}{{{S}_{r}}}\cdot n_{r}-\varepsilon \cdot \sum \limits _{r}{t_{r}^{0}} \right\rbrace \end{aligned} \tag{1} \end{equation} $$ **Subject to:** $$ \begin{align} &\sum \limits _{p\in {{P}_{r}}}{\sum \limits _{t_{0},f_{0}}{x_{r,p}^{t_{0},f_{0}}=S_r}},\qquad \forall r; \tag{2}\\ &\sum \limits _{p\in {{P}_{r}}}{\sum \limits _{t_{0},f_{0}}{y_{r,p}^{t_{0},f_{0}}={\eta _r}\times {S_r}}},\qquad \forall r; \tag{3}\\ &{\eta _r}\times \sum \limits _{t_{0},f_{0}}{x_{r,p}^{t_{0},f_{0}}}= \sum \limits _{t_{0},f_{0}}{y_{r,p}^{t_{0},f_{0}}},\qquad \forall r,p\in {{P}_{r}}; \tag{4}\\ &{{\eta }_{r}}\times \sum \limits _{p\in {{P}_{r}}}{\sum \limits _{{{f}_{0}}}{x_{r,p}^{{{t}_{0}},{{f}_{0}}}}}=\sum \limits _{p\in {{P}_{r}}}{\sum \limits _{{{f}_{0}}}{y_{r,p}^{{{t}_{0}},{{f}_{0}}}}},\qquad \forall r,t_{0}; \tag{5}\\ &\sum \limits _{r}{\sum \limits _{p\in {{P}_{r}}}{\sum \limits _{t_{0},f_{0}}{\alpha _{r,p,t_{0},f_{0}}^{t,f}\,\delta _{r,p}^{e}\,x_{r,p}^{t_{0},f_{0}}}}}=a_{e}^{t,f},\qquad \forall e,t,f; \tag{6}\\ &\sum \limits _{r}{\sum \limits _{p\in {{P}_{r}}}{\sum \limits _{{{t}_{0}},{{f}_{0}}}{\beta _{r,p,{{t}_{0}},{{f}_{0}}}^{t,f}\gamma _{r,p}^{e}((1-{{\sigma }_{r}})\cdot \delta _{r,p}^{g}+{{\sigma }_{r}})y_{r,p}^{{{t}_{0}},{{f}_{0}}}}}} \nonumber =b_{e,g}^{t,f},\qquad \forall e,g,t,f;\qquad \tag{7}\\ &\sum \limits _{g}{b_{e,g}^{t,f}}\leq \theta \times c_{e}^{t,f},\quad \forall e,t,f; \tag{8}\\ &c_{e}^{t,f} \leq \sum \limits _{g}{b_{e,g}^{t,f}},\quad \forall e,t,f; \tag{9}\\ &a_{e}^{t,f}+c_{e}^{t,f}= v_{e}^{t,f},\qquad \forall e,t,f; \tag{10}\\ &{{t}_{0}}\times \sum \limits _{p\in {{P}_{r}}}{\sum \limits _{{{f}_{0}}}{x_{r,p}^{{{t}_{0}},{{f}_{0}}}}}=t_{r}^{0}. \tag{11} \end{align} $$ * (1): *minimize the BBP* by **maximizing the provisioned bandwidth demands** * $S_r=1$, if $r$ is *provisioned* * $n_r$ : the number of *FSs* of $r$ > The first term is *the provisioned bandwidth demands* * $t_r^0$ : *the index of starting time slot* of $r$ > $\varepsilon$ : in order to be considered in selecting among solutions that have the same value for the first term. > the second term is the summation of the starting times of the provisioned requests :::warning TODO : 理解 the second term * (11) : assigns value to $t_r^0$ as the starting time slot index of $r$ ::: * (2): ensures that every *provisioned request* occupies a **unique RB** * $x_{r,p}^{t_{0},f_{0}}=1$, if *the candidate RB* on primary $p$ (starts at $t_0$ and $f_0$ ) *be asigned to $r$* * (3): same as (2) for *backup* paths * (4): guarantees that allocated *primary and backup* **paths be chosen from the same candidate pair** of link-disjoint paths * (5): assures that allocated **starting time slot** to *primary and backup* paths **be the same** * (6): restricts link-joint *primary paths* **not to overlap** on a resource element on a particular link * $\alpha _{r,p,t_{0},f_{0}}^{t,f}=1$ if *the candidate RB* of $r$ on primary $p$ (starts at $t_0$ and $f_0$ ) *uses $t$ and $f$* * $\delta _{r,p}^{e}=1$, if *link $e$ belongs to primary $p$* of $r$ * $a_{e}^{t,f}=1$, if *RE $(t,f)$ is occupied on $e$* by a primary path * (7): same as (6) for *backup* paths * $b_{e,g}^{t,f}=1$, if RE $(t,f)$ is reserved on $e$ be used in the case of failure in link $g$ * (8)、(9): * $c_{e}^{t,f}=1$, if RE $(t,f)$ is reserved on link $e$ to be used as backup > It assures that if link $e$ be reserved as backup at RE $(t,f)$ in the case of failure in at least one of the network links, then $c^{t,f}_e=1$, otherwise as indicated in (9), $c^{t,f}_e=0$. * (10): a RE on a particular link can not be allocated as a primary and backup, simultaneously. * $v_{e}^{t,f}=1$, if RE $(t,f)$ is occupied or reserved as backup on link $e$ ### Complexity Analysis ![](https://i.imgur.com/wo6jpJr.png) * Variables: ==$x_{r,p}^{t_{0},f_{0}}$==、$y_{r,p}^{t_{0},f_{0}}$、$a_{e}^{t,f}$、==$b_{e,g}^{t,f}$==、$c_{e}^{t,f}$、$v_{e}^{t,f}$、$S_r$、$t_r^0$ * Equality constraints: (2)、(3)、==(4)==、==(5)==、(6)、==(7)==、(10) * Imequality constraints: ==(8)==、(9) ### B. Heuristic Algorithm 1. two methods for **selecting** candidate pairs of disjoint **paths** 2. three strategies for **spectrum allocation and scheduling** ### 1) Candidate Pairs of Disjoint Paths Selection Methods ### (SP) K Shortest Pairs of disjoint paths > Sorting benchmark : the **distance** of the routing paths 1. **sorted** all pairs of disjoint paths in an ascending order of the summation of the distances of their primary and backup paths. 2. **selects** first K pairs ### (LLP) K Least Loaded Pairs of disjoint path > Sorting benchmark : parameter $B$ > select the routing paths which **balance the link bandwidth usage** while **utilizing smaller number of FSs** $$ \begin{equation} B(p)= \frac{ {{{MLBU}}_{p}^{w}}}{{m_{p}^{w}}}{\times} {{{HopCount}}_{p}^{w}} +\frac{{{{MLBU}}_{p}^{b}}}{{{m}_{p}^{b}}}\times {{ {HopCount}}_{p}^{b}}, \tag{13} \end{equation} $$ > $b$ for backup * $m_p^w$ : the *modulation formats* of the primary paths * $HopCount_{p}^{w}$ : *the number of links* in the primary paths * $MLBU_{p}$ : the link *bandwidth usage of the most loaded link* of path $p$ $$ \begin{align} {{MLBU}_{p}^{w}}=&\underset{e}{\mathop {\max }}\,{{LBU}_{e}}\quad \forall e\in \text{working path }p, \tag{14}\\ {{MLBU}_{p}^{b}}=&\underset{e}{\mathop {\max }}\,{{LBU}_{e}}\quad \forall e\in \text{backup path }p, \tag{15} \end{align} $$ * $LBU_{e}$ : the *link bandwidth usage* of link $e$ > $e$ is adaptively updated when a request is provisioned :::info * $\frac{ {{{MLBU}}_{p}}}{{m_{p}}}$ try to **balance the link bandwidth usage** * $HopCount_{p}$ try to **reduce resource utilization** ::: --- * $LBU_{e}^{s}$ : the number of FSs of link $e$ * FSs are occupied by the primary paths or reserved for the backup paths of the provisioned requests at step $s$ as request $r$ is provisioned in step $s$, $LBU_{e}^{s}$ of all links in the primary path of request $r$ is updated $$ \begin{equation} LBU_{e}^{s+1}=LBU_{e}^{s}+{{n}_{r,p}^{w}}\quad \forall e\in \text{working path }p, \tag{16} \end{equation} $$ * ${{n}_{r,p}^{w}}$ : the number of required FSs for $r$ on primary path $p$ $$ \begin{equation} n_{r,p}^{w}=\left\lceil {{n}_{r}}/{{m}_{p}^{w}} \right\rceil. \tag{17} \end{equation} $$ > For DPP scheme: >$$ \begin{equation} LBU_{e}^{s+1}=LBU_{e}^{s}+{{n}_{r,p}^{b}}\quad \forall e\in \text{backup path }p, \tag{18} \end{equation} >$$ > > * ${{n}_{r,p}^{b}}$ : the number of required FSs for $r$ on backup path $p$ $$ \begin{equation} n_{r,p}^{b}=\left\lceil {{n}_{r}}/{{m}_{p}^{b}} \right\rceil. \tag{19} \end{equation} $$ > For SBPP scheme: > $$ > \begin{equation} > {LBU}_{e}^{s{+}1}={LBU}_{e}^{s}{+}{{n}_{r,p}^{b}}{-}\sum \limits_{f=f_{0}^{b}}^{f_{0}^{b}{+}{{n}_{b}}-1}{O_{e,f}^{s}}\;\;\; \forall e\in\text{backup path }p, > \tag{20} > \end{equation} > $$ > > * $O_{e,f}^{s}=1$, if FS $f$ is occupied or reserved on link $e$ > * $f_0^b$ : the starting FS index of the backup RB. >When the protection scheme is SBPP, one RE may be reserved as backup resource for several requests with link-disjoint primary paths, but this RE must be considered once to calculate the link bandwidth usage. ### 2) Spectrum Allocation and Scheduling Strategies 1. **search** among available RBs in candidate pairs of disjoint paths computed for each request. 2. **select** the optimum primary and backup (if requested) RBs according to their objective. * If there is no available RB, the request is removed. ### (LTW) Least Time to Wait find **the least starting time slot** for request $r$ to be served as soon as possible. * if among the available RBs with the same starting time slot, selects the one with **least starting frequency** index. ### (LSF) Least Starting Frequency slice index find available RBs with **minimum starting frequency slice** * if among those with the same starting frequency slice index, selects the one with **the least starting time slot**. ### (LTF) Least TF parameter try to **minimize the starting frequency slice and time slot indices** at the same time $$ \begin{equation} TF= t_{0}+f_{0}^{w}+f_{0}^{b} \tag{21} \end{equation} $$ * $f_0$ : the starting frequency slice indices * $t_0$ : the index of starting time slot ### 3) Alogrithm ![](https://i.imgur.com/bL1aJDX.png) `#1~24` : **finds available RBs** as primary and also backup (if requested) for each request, along each candidate pair of link-disjoint paths. * `#3` : **selects K candidate pairs of disjoint paths** among all pairs of link-disjoint paths for the source-destination pair of request r according to the **paths selection method** * `#5` : selects the appropriate **modulation** level * `#6` : calculates $n^w_{r,p}$ and $n^b_{r,p}$ using (17) and (19) * `#9` : If no primary RB is found, it continues with next $t_0$ * `#10~15` : If a request **requires backup** resources, try to **find available backup RBs** * `#16、17` : If at least one backup RB is found, sets **`flag = 1`** * `#20` : Also if a request requires no backup resource, sets **`flag = 1`** `#26` : If the **flag is set**, **selects the optimum primary** and backup (if requested) **RBs** and the associated path * `#29` : otherwise the request is marked as blocked ## IV. Numerical Results ### A. Simulation Parameters * $K=3$ : candidate pairs of disjoint paths ### 1) Static Scenario :::success * a number of requests are given * algorithms are run one time to solve the RMSA and scheduling problems by considering all requests. ::: * $a\%$ of all the given requests are **IR** * $(1-a)\%$ of all the given requests are **AR** - $b\%$ of each group ask for **protection mechanisms** (DPP or SBPP) - $c\%$ request for **DPP** - $(1-c)\%$ request for **SBPP** - $(1-b)\%$ of each group ask for **restoration mechanisms** w.l.o.g, we set $a=b=c=50\%$ #### small scale ![](https://i.imgur.com/22fZQgW.png) * for each fiber link: * 32 **FSs** * **bandwidth** of 12.5 GHz * **the look-ahead time** is set to 10 TSs * for each request: * **the source-destination pair** is selected randomly * **the duration** follows a [negative exponential distribution](https://variation.com/wp-content/distribution_analyzer_help/hs122.htm) with average of 3 TSs * **the transmission rate** is uniformly selected from the set $\lbrace \text{25}\,\text{Gbps}, \text{50}\,\text{Gbps}, \text{100} \,\text{Gbps}\rbrace$ #### large scale ![](https://i.imgur.com/tvBqzrH.png) > **NSFNet topology** >- [ ] [Algorithms for the design of WDM translucent optical networks](https://) * the network operates in the **C-band** * **the bandwidth** of each fiber (4.475 THz) is divided into 358 FSs with 12.5 GHz granularity * **the look-ahead time** is assumed to be 100 TSs * for each request: * **the source-destination pair** is selected randomly * **the duration** follows a negative exponential distribution with average of 10 TSs * **the transmission rate** is uniformly selected from the set $\lbrace \text{100}\,\text{Gbps}, \text{200}\,\text{Gbps}, \text{400}\, \text{Gbps}\rbrace$ ### 2) Dynamic Scenario > requests arrive dynamically two arrival models: #### 1. single arrival * **the request arrival** at each TS follows a **Bernoulli distribution** with mean $α$ * if TSs are small and look-ahead time is large, the request arrival process can be approximated as a **Poisson process** with mean value of the look ahead time (in TSs) multiplied by α * **the duration of each request** follows a negative exponential distribution with average of 20 TSs #### 2. batch arrival * **the number of arrived requests** follows a **Poisson distribution** with mean $β$ * **the duration of each request**follows a negative exponential distribution with average of 6 TSs #### NSFNet topology * a look-ahead time of 100 TSs * a simulation duration of 300 TSs > which is large enough to lead to small variance values for the results * Transmission rate of each request is uniformly selected from the set $\lbrace \text{100}\,\text{Gbps}, \text{200}\,\text{Gbps}, \text{400}\, \text{Gbps}\rbrace$ ### B. Evaluation Benchmark ### (BBP) Bandwidth Blocking Probability BBP is defined as the aggregated bandwidth of all blocked requests over the total bandwidth of all incoming requests $$ \begin{equation} BBP=\frac{\sum \nolimits _{r\in \lbrace R-{{R}_{s}}\rbrace }{{{n}_{r}}}}{\sum \nolimits _{r\in R}{{{n}_{r}}}}, \tag{22} \end{equation} $$ * $R$ : the set of all arrived requests * $R_s$ : the set of served requests. ### (AID) Average Initial Delay Initial delay is defined as the difference between *the provisioned starting time* and *the minimum allowed starting time* of an AR request $$ \begin{equation} AID=\frac{\sum \nolimits _{r\in R_{s}^{a}}{(t_{r}^{0}-{{\zeta }_{r}})}}{\left| R_{s}^{a} \right|}, \tag{23} \end{equation} $$ * ${\zeta }_{r}$ : the minimum allowed starting time * $t_{r}^{0}$ : the start time of request $r$ * $|R_{s}^{a}|$ : the number of served AR requests ### (ASE) Average Spectrum Efficiency Average spectrum efficiency := *the total number of required FSs* in the case of lowest modulation format / the total number of assigned FSs + *the total number of required FSs for backup path* in the case of lowest modulation format / the total reserved FSs $$ \begin{equation} ASE=\frac{1}{2}\left(\frac{\sum \nolimits _{r\in {{R}_{s}}}{{{n}_{r}}}}{\sum \nolimits _{r\in {{R}_{s}}}{n_{r,p}^{w}}}+\frac{\sum \nolimits _{r\in {{R}_{s}}}{\eta \cdot {{n}_{r}}}}{\sum \nolimits _{r\in {{R}_{s}}}{\eta \cdot u_{r,p}^{b}}}\right) \tag{24} \end{equation} $$ * $u^{b}_{r,p}$ : the number of idle FSs assigned to request $r$ on backup path $p$ $$ \begin{equation} u_{r,p}^{b}={{\sigma }_{r}}\cdot n_{r,p}^{b}+(1-{{\sigma }_{r}})\cdot \left(n_{r,p}^{b}-\sum \limits _{f=f_{0}^{b}}^{f_{0}^{b}+{{n}_{b}}-1}{O_{e,f}^{s}}\right). \tag{25} \end{equation} $$ ### C. Simulation Results :::warning TODO: 1. 跑幾次?電腦設備? 1. why? ::: ### In static and small scale simulation. ![](https://i.imgur.com/MLEnSm4.png) > (a) the total provisioned bandwidth vs. the number of requests > Note that results are obtained for the **SP** path selection method for small request set size, * all three heuristic algorithms serve the same amount of bandwidth while with the growth of the number of requests * the performance gap of the ILP formulation and the LTW algorithm is increased * the LSF and LTF methods perform approximately the same as the ILP formulation. --- ![](https://i.imgur.com/wlwd5SM.png) > (b) the normalized AID vs. the request set size :::warning - [x] Why normalized AID ? > the normalized AID = AID divided by the average of the permitted initial delay of the provisioned AR requests * in the small scale simulations, as the request set size is not large enough to show accurate expectation values, the average permitted delay may differ in different cases ::: * the LSF and LTF algorithms have a higher normalized AID with respect to the ILP formulation and LTW algorithm * ILP formulation and LTW alternative have approximately the same normalized AID :::info This is due to the fact that ==the LSF and LTF algorithms **exploit the flexibility in the starting time of the AR requests** to increase the amount of served bandwidth==, which leads to lower BBP and higher AID ::: --- ![](https://i.imgur.com/P7MLPuV.png) > (c) The computational run times vs. the request set size * the run time of the proposed ILP grows rapidly by increasing the request set size * the three heuristic algorithms have the same run time ### In static and large scale simulations. --- :::danger In what follows, the results of large scale simulations are reported only for heuristic algorithms, because obtaining **the results of the ILP formulation is too time consuming in large scale simulations**, as well as the performance gap of the formulated ILP and the proposed heuristics is negligible. ::: --- ![](https://i.imgur.com/o92EBGa.png) > (a) BBP vs the number of requests * employing either LTF or LSF as the spectrum assignment and scheduling strategy mitigates the BBP * by employing LLP as the path selection method, both the BBP and the AID are improved :::success the **LTF-LLP** method outperforms all the other alternatives ::: --- ![](https://i.imgur.com/0JQNh2X.png) > (b) AID vs the number of requests * as LTF delays the AR requests less than LSF, LTF is preferred * LTW delays the AR requests less than LTF and LSF :::success LTF > LSF > LTW ::: * AID is not strictly increasing against the request set size :::info This is mainly because of the fact that ==when request set size grows, BBP increases and the number of provisioned AR requests decreases==, which may lead to less AID despite larger total number of AR requests ::: --- ![](https://i.imgur.com/NbP1OP5.png) > (c) ASE vs the number of requests * by using LTF-LLP or LSF-LLP, spectrum efficiency is improved * LTW-LLP has a higher spectrum efficiency than LTF-SP and LSF-SP :::success using **LLP** instead of SP increases the spectrum efficiency more than using LTF or LSF instead of LTW. ::: * there is a **reverse relation between BBP and ASE** performances of all algorithms, unless the LTW-LLP algorithm. :::info This is because ==the LTW method tries to allocate preliminary time slots==, and as a result it increases the BBP of IR requests, so LTW-LLP shows worse performance in terms of BBP than LSF-SP and LSF-LLP ::: * the algorithm which has more spectrum efficiency does not necessarily have less BBP :::info because besides trying to utilize FSs efficiently, it is also important to select TSs in an appropriate way which means ==using the flexibility of the starting times of the AR requests properly==. ::: * ASE increases slightly with the growth of request set size :::info This is because in higher traffic load, more requests with disjoint-link primary paths may share the same resource elements on their common links, as a result, ==the sharing degree increases and this leads to a larger spectrum efficiency.== ::: --- ### In Dynamic with single arrival model. ![](https://i.imgur.com/Sjz9GAf.png) > (a) BBP (b) AID (c) ASE vs $\alpha$ (the mean value of the Bernoulli distribution of arrival process) > the same trend as the one observed in static and large scale * ==**LTF-LLP** outperforms other algorithms== * by using LTF-LLP or LSF-LLP, the BBP is reduced. * as the LTF method delays the AR requests less than LSF, LTF-LLP is preferred * the algorithms with larger ASE have less BBP, unless LTW-LLP * LTW-LLP has higher ASE and BPP than LTF-LLP and LSP-LLP. --- ### In Dynamic with batch arrival model ![](https://i.imgur.com/F6L4FDw.png) > (a) BBP, (b) AID (c) ASE, vs. traffic load in dynamic with batch arrival model. > * [Erlang](https://zh.wikipedia.org/wiki/%E5%9F%83%E6%9C%97%E5%96%AE%E4%BD%8D) > - [ ] [What is an Erlang](https://www.electronics-notes.com/articles/connectivity/erlang/what-is-an-erlang-formula.php) > - [ ] [What are Erlangs?](https://www.callcentrehelper.com/what-are-erlangs-154459.htm) > the same trend as the one observed in static and large scale and in dynamic with single arrival model ## V. Conclusion * the proposed algorithms have the same behavior in different simulation scenarios * ==**LTF-LPP**== is the best algorithm in terms of BPP and ASE * **LTW-SP** is the worst algorithm in terms of BPP and ASE * **LTW-LLP** is the best in terms of AID > we select the LTF-LPP algorithm as the most promising solution, which offers the best possible compromise between delay (AID) and blocking (BBP).