Academia.eduAcademia.edu

Multicast Flow Aggregation in IP over Optical Networks

2007, IEEE Journal on Selected Areas in Communications

It is widely believed that IP over optical networks will be a major component of the next generation Internet. However, it is not efficient to map a single multicast IP flow into one light-tree, since the bandwidth of an IP flow required is usually much less than that of a light-tree.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 5, JUNE 2007 1011 Multicast Flow Aggregation in IP over Optical Networks Yi Zhu, Student Member, IEEE, Yaohui Jin, Member, IEEE, Weiqiang Sun, Member, IEEE, Wei Guo, Weisheng Hu, Member, IEEE, Wen-De Zhong, Senior Member, IEEE, and Min-You Wu, Senior Member, IEEE Abstract— It is widely believed that IP over optical networks will be a major component of the next generation Internet. However, it is not efficient to map a single multicast IP flow into one light-tree, since the bandwidth of an IP flow required is usually much less than that of a light-tree. In this paper, we study the problem of multicast flow aggregation (MFA) in the IP over optical two-layered networks under the overlay model, which can be defined as follows: given a set of head ends (i.e. optical multicasting sources), each of which can provide a set of contents (i.e. multicast IP flows) with different required transmission bandwidth, and a set of requested content at the access routers (i.e. optical multicasting destinations), find a set of light-trees as well as the optimal aggregation of multicast IP flows in each light-tree. We model MFA by a tri-partite graph with multiple criteria and show that the problem is NP-complete. Optimal solutions are designed by exploiting MFA to formulate an integer linear programming (ILP), with two parameters: the multicast receiving index α and the redundant transmitting index β. We also propose a heuristic algorithm. Finally, we compare the performance of MFA for different combination of α and β via experiments and show our heuristic algorithm is effective for large-scale network in numerical results. Index Terms— Multicast flow aggregation, IP over optical network, overlay model, tri-partite graph, integer linear programming (ILP), heuristics I. I NTRODUCTION M ULTICASTING technology [1] has become increasingly important since many new applications such as content delivery, IP-TV, video conferences, and multipleplayer gaming require the transmission of real-time multimedia from one source to many destinations. However, multicasting in IP layer [2] is not widely deployed in today’s Internet, partially because there are still many technical issues such as scalability, reliability, security, and QoS control in Manuscript received April 15, 2006; revised December 3, 2006. This work was supported by Natural Science Foundation of China under Contract 60502004, 60602010, 60632010, and in part by Chinese 863 Program. Portions of this paper have appeared in IEEE GLOBECOM’05, St. Louis, MO, Nov. 2005 Yi Zhu was with Shanghai Jiao Tong University. He is now with the University of Texas at Dalls, Richardson, TX 75083 USA (e-mail: yxz053100@utdalls.edu). Yaohui Jin, Weiqiang Sun, Wei Guo, and Weisheng Hu are with State Key Lab of Advanced Optical Communication System and Network, Shanghai Jiao Tong University, China (e-mail: {jinyh, wguo,sunwq, wshu}@sjtu.edu.cn). Wen-De Zhong is with Network Technology Research Centre, School of EEE, Nanyang Technological University, Singapore (e-mail: ewdzhong@ntu.edu.sg). Min-You Wu is with Computer Science Department, Shanghai Jiao Tong University, China (e-mail: mwu@sjtu.edu.cn). Digital Object Identifier 10.1109/JSAC.2007.070613. current IP multicasting [3]–[5]. Recently, optical layer multicasting by using light-trees has been proposed to support point-to-multipoint communication in wide area networks [6]. The use of light-tree can better support bandwidth-intensive applications with guaranteed QoS, but there are also many challenging issues in optical layer multicasting [7]. In the data plane, work has focused on the design of multicast-capable optical crossconnects (MC-OXC) [8], [9]. In the network area, a lot of efficient algorithms have been developed for multicast routing and wavelength assignment [10], [11]. The extension to generalized multi-protocol label switching (GMPLS) has been presented for dynamic control of point-to-multipoint connections in optical networks [12]–[14]. Another critical and important issue is how to interwork the optical multicasting and the existing IP multicasting. In our previous efforts, we have proposed and demonstrated a new multicast-IP over light-tree network model [14]–[16]. The key idea is that a new optical network, with the capability of providing dynamic point-to-multipoint connections, replaces the conventional IP multicasting network in the core, while the edge remains an IP multicasting network. This hierarchical multicast architecture offers several attractive features. Firstly, it is compatible with the existing IP multicasting architecture since it is still IP based at the network edge. Therefore it is not necessary to change or upgrade existing client-side equipment. Secondly, it can support large-scale multicasting because the aggregation of IP sessions significantly reduces the burden of group management and multicast routing protocols. Thirdly, light-trees can provide better survivability for their inside aggregated IP flows [17], [18]. Finally, it can provide multicasting with improved QoS due to the fact that optical point-to-multipoint connections in the core network are circuit-switched with negligible delay and jitter. Generally, the bandwidth of a light-tree is much higher than that required by many typical applications. It is not efficient to map a single multicast IP flow into one lighttree. In this paper, we study the problem of IP multicast flow aggregation (MFA) in the multicast capable optical networks, which can be defined as follows: given a set of head ends (i.e. optical multicasting sources), each of which can provide a set of contents (i.e. multicast IP flows) with different required transmission bandwidth, and a set of requested contents at the access routers (i.e. optical multicasting destinations), find a set of light-trees to accommodate the optimally aggregated multicast IP flows. We would like to point out that it is more consistent with the practical scenarios that the same content can be redundantly distributed in several head ends. Therefore, c 2007 IEEE 0733-8716/07/$25.00  1012 Fig. 1. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 5, JUNE 2007 Multicast flow aggregation in IP over optical two-layered network the source of IP multicast flow is not given before optimal aggregation in the MFA problem, which is different from other work on aggregated multicasting and multicast grooming in the literatures. We model the problem with a tri-partite graph, and prove the NP-Completeness. We then develop an integer linear programming (ILP) for the MFA problem. We also propose a heuristic named least trees first (LTF) algorithm to solve the problem for large-scale networks with hundreds of contents. Numerical and simulation experiments are carried out to verify the effectiveness of our proposed model. The rest of the paper is organized as follows. In section II, we introduce the concept of MFA and discuss its implementation in IP over optical networks. Then we present a tri-partite graph for the MFA problem and provide an overview of the related work. In section III, we develop the ILP for the MFA problem. In section IV, we propose a heuristic algorithm for the MFA problem. In section V, we present a few experimental results. Finally, section VI concludes the paper. II. M ULTICAST F LOW AGGREGATION A. Network model Fig. 1 shows the network model considered in this paper. The head ends are multicasting sources which encode multimedia contents with multicast IP flows and then send such flows to the core network. The required bandwidth of a single multicast IP flow may vary, depending on its image quality and compression standard. For example, by using MPEG-2 technology, standard definition TV (SDTV) and high definition TV (HDTV) require nearly 6 Mb/s and 25 Mb/s transmission bandwidth respectively [19]. Note that the same content may be redundantly provided by several head ends in the network considered in this study, similar to the scenario of today’s TV delivery networks where one channel may be distributed by several stations. At the edges of the core optical network, there are two kinds of aggregation routers. At the head end side, the routers aggregate several multicast IP flows into one light-tree. At the access network side, the routers aggregate a large number of end users’ requests originated at one residential area. After receiving the multicast contents via a light tree, each access network delivers the multicast contents through IP multicasting to the end users. The thin dashed lines in each access network indicate IP multicast flows, where the numbers on each dashed line denote the contents being delivered to a particular end user. In the rest of this paper, for simplicity, we refer to the aggregation routers in the head ends and in the access networks as the heads and the tails respectively. There may be more than one transponders attached to the core optical network at one aggregation router. The transponders in the heads and the tails are the roots and the leaves of the light trees. The bit rate of one transponder is usually much higher than the required bandwidth of a single multicast IP flow. For example, the typical bit rates of Ethernet based interfaces are 100 Mb/s, 1 Gb/s and 10 Gb/s, while that of SONET/SDH based interfaces are 155 Mb/s, 622 Mb/s, 2.5 Gb/s and 10 Gb/s. Therefore, several multicast IP flows can be aggregated into one light-tree. In the network of figure 1, the bit rate of one transponder is assumed to be 3 units of bandwidth. The value in the parentheses following the content number denotes the required bandwidth for that content. If we employ the IP multicasting scheme only, each content corresponds to at least one IP multicast flow. However, if we use the IP over optical two-layer network model described above, only 3 light-trees are needed for 5 multicast IP flows in optical core network, which significantly reduces the number of multicasting trees. B. Implementation In our network model, we require that: 1) the light-tree is constructed by using the shortest path tree, which means that every content is transmitted from head to one tail in the lighttree along the shortest path. 2) Both multicast IP flows and light-trees are one-to-many unidirectional connections. 3) A multicast IP flow cannot be split into two or more light-trees originated at a single head. 4) The transmitting and receiving transponders of a light-tree must be the same type with the same bit rate. 5) The intermediate OXC do not have grooming capability so that the maximum bandwidth of a light-tree is the bit rate of transponders at the aggregation routers. Fig. 2 shows the implementation of multicasting flow aggregation in the “3TNet” project funded by Chinese “863” program, which employs IP over automatically switched optical networks (ASON) over dense wavelength division multiplexing (DWDM) 3-layer architecture. A field-trial has been carried out in Yangtze River Delta [20]. The interconnection of control plane between IP and ASON is based on the overlay model [21]. In the core optical networks, the OXC’s in the data plane and GMPLS as well as user network interface (UNI) in the control plane have been extended to support pointto-multipoint (P2MP) connections [14], [15]. In the access networks, a tail control unit (TCU) collects the user requests information from each router via simple network management protocol (SNMP) and reports to a central scheduler. The scheduler calculates the optimal aggregation based on the content distribution and the user requests, and then sends the aggregation schemes to the corresponding head control units (HCU). The HCU is responsible for creating light- ZHU et al.: MULTICAST FLOW AGGREGATION IN IP OVER OPTICAL NETWORKS 1013 TABLE II T HE RESOURCE UTILIZATION OF LIGHT- TREES IN F IG . 1 Light-tree Bandwidth source destinations 1 2 3 Sum 3 3 3 x1 x2 x2 z1 , z2 , z3 z2 , z3 z3 Resource utilization 12 9 3 24 Fig. 2. Implementation of Multicast Flow Aggregation in IP over Optical networks TABLE I T HE RESOURCE UTILIZATION OF MULTICAST IP FLOWS IN F IG . 1 Multicast IP flow y1 y2 y3 y4 y5 Sum Bandwidth Source Destinations 1 1 2 2 2 x1 x2 x2 x1 x2 z1 , z3 z2 z3 z1 , z2 , z3 z3 Resource utilization 3 2 2 8 2 17 tree in optical networks via UNI signaling and configuring aggregation in the routers of head ends via SNMP. C. Resource overhead Although the MFA strategy provides many benefits for large-scale streaming media delivery, it may lead to extra resource overhead. We define the resource utilization of a tree is equal to the product of its bandwidth and all the links along the tree. For the case without MFA strategy, we consider that the core network is based on IP routers with the same topology as the optical network and the IP flows are transmitted along the same shortest path as the light-tree. For example, Tables I and II show the resource utilization of multicast IP flows and light-trees respectively in network of figure 1. 5 multicast IP flows would consume 17 units of bandwidth while 3 light-trees will do 24 units. The resource overhead of MFA is 7 units of bandwidth. This overhead comes from mismatch both in the heads and in the tails. In the heads, if the total bandwidth of aggregated IP flows is less than the transponder bandwidth, it will lead to head wastage, e.g. light-tree 3 wastes 1 unit in head x2 . In the tails, if one access router receives unwanted contents, it will lead to tail wastage, e.g. tails z2 and z3 received unwanted contents y3 and y2 respectively in light-tree 2. The tail wastage is also called leaky match in other literatures [22] because the multicast IP flow cannot be perfectly matched into the aggregated tree. The objective of optimal MFA problem is to minimize the overall resource overhead. D. Tri-partite graph formulation The MFA problem can be abstracted as a tri-partite graph G(X ∪ Y ∪ Z, EH ∪ ET ∪ ER ), which is composed of three bipartite sub-graphs GH (X ∪ Y, EH ), GT (Y ∪ Z, ET ), and GR (X ∪ Z, ER ), where the vertices X, Y and Z are the sets of heads, contents and tails, respectively, and the edges EH , Fig. 3. Tri-partite graph for multicasting flow aggregation ET and ER are the relationship among them. As an example, figure 3 shows the tri-partite graph representation of figure 1. In order to illustrate the graph on the plane more clearly, we repeat the set X with dashed line on the right side of Z to show the subgragh GR . For simplicity, we consider homogenous transponders whose bandwidth is t. The weight bm on the vertex y is its required bandwidth. The weight cx,z on ER represents the length of the shortest path from head x to tail z. Note that here we just use the length of the shortest path instead of network topology for the core optical network because our implementation is the overlay IPover-Optical model, in which the detailed network topology information of optical layer should not be exposed to upper IP layer [21]. Such linear approximation partially reflects to the network routing due to the following reasons: 1) we do not know which head will be the root and which tails are the leaves before aggregating IP flows to light-tree; 2) given a light-tree, the sum of the shortest-path length from its root to all the leaves is the upper bound of its total links since the shortest-path light-tree may share some of links of the shortest paths. For example in figure 1, light-tree 1 consumes 4 links in the optical networks, while the sum of the shortest-path length is 5 links because link A-D is shared by z1 and z2 . Let P ={P1 , P2 , . . . , Pk , . . .}, where Pk is a bipartite graph with {xk ∈ X, Zk ⊆ Z}, representing a root-leaves set of one light-tree, and Q = {Q1 , Q2 , . . . , Qk , . . .}, where Qk ⊆ Y represents an aggregation group of contents in a light-tree Pk . Three complete bipartite graphs GHk with {xk , Qk }, GT k with {Qk , Zk } and GRk with {xk , Zk } are induced from Pk and Qk as shown in figure 4. We define the edge difference for the combination Pk and Qk . d(Qk ) = |Qk | · |Zk | − |E(GT ∩ GT k )| (1) 1014 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 5, JUNE 2007 b) c) (a) GH1 , GT 1 and GR1 induced from P1 , Q1 means all elements in Qk must connect to the same node xk in GH ; the neighbor set of Qk must be equal to Zk in GT , which means that the contents in Qk are the aggregated multicast flows that tails Zk intend to receive;  ym ∈Qk bm ≤ t, which means the total bandwidth of aggregated IP flows in one light-tree must be not greater than the effective bandwidth of a transponder. Definition 1: The multicast flow aggregation (MFA) problem can be stated as follows: Given a tri-partite graph G(X ∪ Y ∪ Z, EH ∪ ET ∪ ER ) and t Find an optimal combination of P and Q satisfies with the above constrains such that:     d) The total head wastages k t − ym ∈Qk bm must be as small as possible;  e) The total edge difference k d(Qk )must be as small as possible; f) The  total length of light-trees  c ) must be as small as ( x∈Pk ,z∈Zk x,z k possible. In appendix, we prove that the MFA problem is NP-complete. E. Related work (b) GH2 , GT 2 and GR2 induced from P2 , Q2 (c) GH2 , GT 2 and GR2 induced from P2 , Q2 Fig. 4. Induced graph from P and Q If d(Qk ) = 0, it is called perfect match; otherwise it is leaky match indicated by dashed lines in figure 4, which corresponds to the unwanted contents in the tails. P and Q satisfy the following constraints: a) in GH , ∃xk ∈ X, ∀y ∈ Qk , (x, y) ∈ EH , which In IP networking research area, the MFA problem is related to aggregated multicast (AM) model [22]–[24]. The motivation of AM is to solve scalability and reliability issues in traditional IP multicast. The key idea is that, multiple IP multicast sessions is “forced” to share a single distribution tree in the core network so as to reduce the number of multicast states. Compared to the AM problem, the MFA problem considers the bandwidth constraint of a light-tree as well as the redundant distribution of contents in different head ends. Furthermore, instead of a dynamic scenario in the AM problem, the MFA problem is a static optimization problem that can help us to find a theoretical lower bound. Recently, the multicast grooming (MG) problem has begun to attract attention in WDM networks, which is defined as follows: given a set of multicast sessions with various capacity requirements, satisfy all of the multicast sessions, and minimize the network cost at the same time [25]. To support grooming of multicast traffic in an optical network, the switch architecture must be enhanced with a grooming fabric [6]. The related research works of the MG problem can be categorized into: static optimization [26]–[29] and dynamic scenario [30], [31]. We note that the MG problem is different from the MFA problem in the following aspects: 1) the MG problem may have multi-hops in the optical network while the light-tree is transparent in the MFA network model; 2) the MG problem does not have tail wastage issue since multicast IP flows can be groomed at the intermediate nodes in the core network; 3) the roots of multicast sessions are given in the MG problem while they are not given before aggregation in the MFA problem since the contents are redundantly distributed in the different head ends. ZHU et al.: MULTICAST FLOW AGGREGATION IN IP OVER OPTICAL NETWORKS N = |X| M = |Y | I = |Z| S := [sn,m ]N×M R := [ri,m ]I×M C := [cn,i ]N×I B := [bm ]M t K W V the total number of heads the total number of contents the total number of tails the adjacency matrix represent GH (X ∪Y, EH ) the adjacency matrix represent GT (Y ∪Z, ET ) the shortest path matrix, whose element cn,i represents the length of the shortest path from head n to tail i the bandwidth vector whose element bm is the required bandwidth of content m the bandwidth of a transponder the maximum possible number of light-trees to be set up P the upper bound for k d(Qk ) A very large integer number, is greater than max (N , M , I) H := [hn,k ]N,K F := [fk,m ]K,M L := [ln,i,k,m ]N,I,K,M A := [an,i,k ]N,I,K the matrix represents the relationship between the head and the light-trees, whose element hn,k is 1 if head n is the root of light-tree k, otherwise 0; the matrix denotes the relationship between the multicasting contents and the light-trees, whose element fk,m is 1 if content m is aggregated in light-tree k, otherwise 0; the matrix represents the relationship between the set P, Q and the light-trees, whose element ln,i,k,m is 1 if content m is aggregated in light-tree k which originates at head n and terminates at tail i, otherwise 0; the matrix indicates the relationship between the set P and the light-trees, whose element an,i,k is 1 if the light-tree k originates at head n and terminates at tail i, otherwise 0. III. ILP F ORMULATION In this section, we present the ILP formulation for the MFA problem. First, we define some notations and variables. • Input parameters: The multicast receiving index α is defined in equation (2), which measures the multicasting degree of the receiving matrix:  RB/B−1 I > 1, I−1 (2) α= 1 I = 1. I M M where RB = i=1 m=1 ri,m bm and B = m=1 bm . α varies from 0 to 1. If α is 0, the light-tree is a unicast one, while if it equals to 1, the light-tree is a broadcast one. The redundant transmitting index β is defined in equation (3), which measures the redundancy of transmitting matrix:  SB/B−1 N > 1, N −1 (3) β= 1 N = 1. M  where SB = N n=1 m=1 sn,m bm . β varies from 0 to 1. • Variables of the ILP: A. Constraints We now discuss constrains for the MFA problem. • Head constraints   k i ln,i,k,m ≤ sn,m (4) V It guarantees the constraint a) in the tri-partite graph model. • Tail constraints 1015  ln,i,k,m ≥ ri.m (5) n k   i ln,i,k,m ≤ fk,m V  ln,i,k,m ≥ fk,m n n (6) (7) i fk,m1 − fk,m2 + 1 (8) V Equation (5) ensures that the results will not contradict to the constraints b) given in tri-partite graph modeling. Equations (6)-(8) states how to generate GT k . Equation (6) ensures that fk,m = 1 if at least one tail receives content m through the light-tree k. If there is no tail receiving content m through such light-tree, Equation ( 7) ensures that such content is not aggregated in light-tree k. We now explain equaiton (8) in detail with the following three cases: 1) fk,m1 = fk,m2 = 0: in this case, neither m1 nor m2 is aggregated into light-tree k. We will find the left hand side of Equation (8) is 1, and the right hand side is 1/V , so the constraints are always satisfied. 2) fk,m1 = fk,m2 = 1: in this case, both m1 and m2 are aggregated into the light-tree k. The constraint given by Equation (8) guarantee that if tail i receives one content, it should receives the other; otherwise tail i receives neither of them. 3) fk,m1 = 1, fk,m2 = 0 or fk,m1 = 0, fk,m2 = 1: in this case, only one content is aggregated into the lighttree. m1 and m2 can be chosen from 1 to M arbitrarily. Consider that m1 is aggregated into the tree and then exchange the position of m1 and m2 that is just the second situation in this case. If we change the position of m1 and m2 , i.e., only m2 is aggregated, now ln,i,k,m2 can take either 0 or 1 while ln,i,k,m1 = 0. In order to keep the unequal relationship, we add 1 and 1/V to the left hand side and the right hand side, respectively. • Bandwidth constraints  ln,i,k,m bm ≤ t (9) ln,i,k,m1 − ln,i,k,m2 + 1 ≥ m It guarantees the constraint c) in the tri-partroot-leaves setite graph model. • Tree constraints m ln,i,k,m ≤ an,i,k (10) V  ln,i,k,m ≥ an,i,k (11) m  i an,i,k ≤ hn,k (12) an,i,k ≥ hn,k (13) V  i  hn,k ≤ 1 (14) n As a tree, we have to consider some constraints to guarantee the content-tree relationship, leaf-tree relationship and roottree relationship, respectively. 1016 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 5, JUNE 2007 1) Content-tree relationship: The contents must be aggregated into the corresponding existing trees. Equation (10) ensures that an,i,k should be 1 if there exists one content to deliver. If no content will be delivered from the heads to the tails through the tree, Equation (11) ensures that the tree will not be set up. 2) Leaf-tree relationship: The tail must be a leaf of the corresponding existing tree. Equation (12) guarantees that when there exists a leaf of the tree that is an,i,k > 1, the head should set up such tree hn,k = 1. On the other hand, if hn,k = 0, no tail should add to the light-tree k since head n will not set up the tree. This is guaranteed by Equation (13). 3) Root-tree relationship: One tree must only have a single root since we consider a point-to-multipoint unidirectional connection. Equation (14) meets such condition by searching all the possible heads. B. Objective of ILP formulation We can use the unified criteria of bandwidth to formulate objectives (d), (e) and (f) The head wastage is   hn,k − fk,m bm (15) Wh = t n k k m The tail wastage is        Wt = ln,i,k,m − ri,m × bm i m k The total path bandwidth for all the light-trees is  cn,i × an,i,k Wr = t n (16) n i (17) k There are many approaches [32] to solving multi-criteria problem and here we use an easy one - weighted sum model. The overall objective of the MFA problem is to minimize α1 × Wh + α2 × Wt + α3 × Wr (18) As we discussed before, the overall objective of the MFA problem has to reflect minimization of the resource overhead. However, the topology information of optical network is not known by upper layer under the overlay model. So the objective function 18 should be a linear approximation of the resource overhead. We consider the tri-partite graph. When GH and GR are dense, many choices for Pk should be considered for Qk . In this case, Wr will affect the objective more than the other two. When GT is sparse, Wt will affect the objective more than the other two. As for Wh , it is just related to Qk . when α is larger and βis smaller, Wh will dominate the objective. The following assignments capture such ideas: α3 α2 α1 =β =1−α =1+α−β IV. A H EURISTIC A PPROACH While the ILP formulation is useful in providing insights into the nature of the problem, it may be hard to solve for large networks with hundreds of contents because of the NPcompleteness of the original problem. In this section, we propose a heuristic algorithm, named least trees first (LTF), for large-scale problem. The heuristic has three phases. Phase 1 chooses the first content for the empty new lighttree, and we use three rules for preferable content selection: • Rule 1. Least number of heads contained first, which means that we choose the content that can be sent from the least head ends. • Rule 2. Least number of tails received first, which means that we choose the content that minimum tails required to receive. • Rule 3. Shortest path first, which means that we calculate the shortest path for all possible content sending from one head to all requested tails and then choose the shortest one. Algorithm 1 shows how we use these three rules. It ensures that we choose the content most likely to aggregate with other contents, that is to say, phase 1 meets the demand of first criterion (d). Phase 2 finds the candidate content to be aggregated into the tree. Note that phase 2 will do recursively. Algorithm 2 shows how we find such candidate. In every step, algorithm 2 chooses the content that minimizes the edge difference, so phase 2 guarantees the second criterion (e). Phase 3 optimally aggregates candidate content into the light-tree. There are two cases for this aggregation: • Case 1 (total aggregation): if d(Qk ) is smaller than |Qk |· |Zk |, then we just aggregate this contents. Otherwise, • Case 2 (partial aggregation): in this case, we will recursively remove the tail z in Zy which does not receive Qk . Algorithm 3 will give more details about aggregation with these two cases. We consider the routing has the effect on our problem, so when we decrease the number of tails which only receive content yn , we should also know that those tails will receive yn from some other trees. Therefore, Phase 3 guarantees the third criterion (f). A. LTF algorithm Based on the three phases discussed above, we can get our LTF algorithm. Before giving the algorithm, it is worth to pointing out why we name this algorithm least trees first (LTF). Note that this algorithm tries to combine more contents into one tree. By doing so, the head wastage will be least. That is to say, the total number of light-trees finally set up in the network will be least. Now we propose the whole LTF algorithm as follows. B. Complexity of the heuristic For step one, we need O(|Y ||X|) time to check Rule 1, O(|Y ||Z|) time to check Rule 2 and O(|X||Y ||Z|) time to check Rule 3, so at the worst case, we need O(|X||Y ||Z|) time for step 1. As for the second step, we need O(|Y ||Z|) ZHU et al.: MULTICAST FLOW AGGREGATION IN IP OVER OPTICAL NETWORKS Algorithm 1 Find the first content for the light-tree k Input: a tri-partite graph G(X ∪ Y ∪ Z, EH ∪ ET ∪ ER ) that are represent by S, R and C. All reminder content set A, Pk = ∅, Qk = ∅. Output: the combination of Pk and Qk where there is one element in Qk . Begin for each content is in set A do Calculate the number of heads contains such content in S end for Choose the content with minimum number of heads to join the set Qk if (|Qk | = 1) then Call this content ym , Qk = {ym }, Zk contains all tails which receive Qk , xk is the head which contains Qk and have total shortest paths form xk to Zk else for (contents in Qk ) do Calculate the number of tails receive such content end for end if Drop all contents from Qk and choose the content with minimum number of tails to join the set Qk if (|Qk | = 1) then Call this content ym , Qk = {ym }, Zk contains all tails which receive Qk , xk is the head which contains Qk and have total shortest paths form xk to Zk else for (contents in Qk ) do Calculate shortest path for transmitting such content from one head to all tails request it end for Choose one content with minimal value from the set Qk and drop the others, call this content ym . Zk contains all tails which receive Qk , xk is the head which contains Qk and have total shortest paths form xk to Zk end if A = A − Qk End time. It will take O(|Z|) time when we consider step three. When we consider the complexity of the total algorithm, there are two circles in this algorithm. So the total complexity is O(|Y |(|X||Y ||Z| + |Y |(|Y ||Z| + |Z|))) that is equal to O(|X||Z||Y |2 + |Z||Y |3 ). V. N UMERICAL R ESULTS AND D ISCUSSION In this section, we present some numerical examples to show that our ILP model can solve the small-scale problem very well while our heuristic algorithm can achieve good performance dealing with large-scale network with hundreds of contents. The ILP model was solved using CPLEX 7.0 [33]. A. Effects of the transponder bandwidth We first examine the effects of the different transponder bandwidth t. Let N = 3, M = 16 and I = 5, and matrices 1017 Algorithm 2 Find the Candidate Content for the Light-tree k Input: a tri-partite graph G(X ∪ Y ∪ Z, EH ∪ ET ∪ ER ) that are represent by S, R and C, bandwidth vector B and effective bandwidth of the transponder t. The reminder content set A, Qk and Pk Output: candidate content yn , Zy , and d(Qk ∪ yn ) Begin Yc = ∅ for all y is in set A do if ym ∈Qk bm + by ≤ t and y ∈ Xk then Yc = Yc ∪ {y} end if end for for all y is in set Yc do Calculate d(Qk ∪ y) = (|Qc | + 1) × |Zk ∪ Zy | − |E(GT ∩ (GTk ) ∪ Gy )|, Gy is the subgraph of GT with all edges from y to Zy end for Choose one content with the minimal d(Qk ∪ y), called as yn , as the candidate content. End TABLE III E FFECTS OF THE TRANSPONDER BANDWIDTH t(Mb/s) 100 155 622 1000 KO 7 5 5 5 RH 0.69 0.78 0.93 0.95 Wt (Mb/s) 100 180 180 180 S, R, B and C are given as follows: ⎡ 0 1 0 0 0 1 1 1 1 0 0 S=⎣ 0 1 1 0 1 1 1 1 1 1 0 1 1 1 1 0 1 1 0 0 1 1 ⎡ 0 1 0 0 0 1 1 1 1 1 1 ⎢ 1 0 0 0 1 0 1 0 1 0 0 ⎢ R=⎢ ⎢ 0 1 1 1 1 0 0 0 1 0 0 ⎣ 1 0 1 1 1 1 0 1 1 1 1 0 1 1 1 1 1 1 1 0 0 1  B = 6 25 6 6 6 25 25 6 25 25 6 ⎡ ⎤ 2 2 4 4 4 C=⎣ 5 3 3 3 2 ⎦ 1 4 2 3 2 PB 5.75 8.0 8.0 8.0 ⎤ 1 0 1 1 0 0 1 0 0 0⎦ 0 0 0 0 1 ⎤ 1 1 1 1 1 1 1 0 0 0⎥ ⎥ 0 1 0 0 0⎥ ⎥ 1 0 1 1 1⎦ 1 1 1 0 0  6 6 25 6 6 Table III shows the results of the optimal number of lighttrees KO , the average head wastage ratio RH , the tail wastage Wt and the average sum of path bandwidth PB for all the light-trees against the transponder bandwidth t = 100Mb/s, 155Mb/s, 622Mb/s and 1000Mb/s, respectively. The average head wastage ratio is defined as the total head wastage over the product of KO and t. The average sum of path bandwidth ratio PB is defined as the total sum of path bandwidth for all light-trees over the product of KO and t. Obviously, the comparison of the average head wastage ratio and the average sum of path bandwidth ratio is more valid than that of the head wastage and the sum of path bandwidth. The results of KO are straight-forward since more multicast IP 1018 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 5, JUNE 2007 Algorithm 3 Optimally Aggregate Candidate Content into the Light-tree k Input: a tri-partite graph G(X ∪ Y ∪ Z, EH ∪ ET ∪ ER ) that are represent by S, R and C, Qk , Pk , yn , Zy and d(Qk ∪ yn ) which comes from Algorithm 2. Output: the combination of Pk and Qk Begin j=0 if (d(Qk ) < |Qk | × |Zk |) then Qk = Qk ∪ yn , Zk = Zk ∪ Zy and Pk = {xk , Zk }; A = A − yn else for every z in Zy which only receives yn do Drop z from Zy Calculate if (d(Qk )∪yn ) < |Qk ||Zk | and |Qk |+2 > cxk ,Z then Qk = Qk ∪ yn , Zk = Zk ∪ Zy and Pk = {xk , Zk } Break; else if Zy ⊆ Zk then Break; end if end if end for end if End Algorithm 4 LTF Input: a tri-partite graph G(X ∪ Y ∪ Z, EH ∪ ET ∪ ER ) that are represent by S, R and C, bandwidth vector B and effective bandwidth of the transponder t. Output: the combination of P and Q Begin A = Y, k = 1; repeat Qk = ∅; Call Algorithm 1 to find the first content for the light-tree k repeat Call Algorithm 2 to find the candidate content Call Algorithm 3 to aggregate candidate content until Yc = ∅; until A = ∅; End flows can be aggregated in one light-tree as the transponder bandwidth increases. Thus the total number of trees decreases. The head wastage ratio partially reflects that the network load decreases as the transponder bandwidth increases because the total bandwidth of the aggregated multicast IP flows increases much slower than that of the transponder. The tail wastage and the average sum of path bandwidth ratio remain unchanged when the transponder bandwidth t is greater than 155Mb/s, which shows that the aggregation of multicast IP flows for each light-tree are the same. This is because the bandwidth of the transponder is greater than the total bandwidth needed by the multicast IP flows in every head. Consequently the Fig. 5. Two specific multicasting trees from different two heads to all tails aggregation of multicast IP flows and the trees to deliver such aggregated multicast IP flows are the same. The head wastage increases with the bandwidth of the transponder. B. Verification of the heuristic In this subsection, we will check the different combination of the parameter α and β on the performance. By comparing the results obtained by the ILP model and the heuristic algorithm with the same inputs, we can verify the effectiveness of the heuristic. Let N = 2, M = 6, and I = 6. The bit rate of transponder is 155Mb/s. We consider 3 typical types of contents whose encoded bandwidth are 2, 6, 25 Mb/s respectively. The content bandwidth vector B is given as follows:   B = 2 25 6 25 25 25 Fig. 5 shows the broadcast shortest path trees from two heads to all the tails, respectively. For simplicity, the length between any two neighboring nodes is assumed to be unity. Then we can set up the shortest path matrix C as follows:   2 2 3 3 3 3 C= 5 3 3 3 2 2 We randomly generate the transmission matrix S and the receiving matrix R for different values of the parameter α and β . Table IV shows the number of light trees, the head wastage, the tail wastage obtained by the ILP model and the heuristic with the same inputs. The last columns of Table III give the objective function 18. In the table, we also compare the sum of path bandwidth for all the light-trees Wr and the actual used link bandwidth Bt of light-trees along with the given broadcast shortest path trees. From the results in Table IV gained by ILP model, we can find that as α increases from 0 to 1, the average of head wastage Wh decreases from 720 Mb/s to 150 Mb/s, the difference is nearly equal to the total bandwidth of 4 lighttrees. At the same time, the optimal number of trees in the network also decreases as the same pace as the head wastage when α increases from 0 to 1. Secondly, the average tail wastage Wt varies from 0 Mb/s at α = 1 to 184 Mb/s at α = 0.5. When α= 0, the tails receive IP multicast flows quite different from each other, so the heads should deliver contents individually to the tails, resulting in the reduction in the tail wastage. When α= 1, the tails receive almost all the multicast IP flows, so the heads should first guarantee that all required ZHU et al.: MULTICAST FLOW AGGREGATION IN IP OVER OPTICAL NETWORKS 1019 TABLE IV R ESULTS OBTAINED BY THE ILP MODEL (I) AND THE HEURISTIC ALGORITHM (H) α 0 0 0 0.5 0.5 0.5 1 1 1 Fig. 6. β 0 0.5 1 0 0.5 1 0 0.5 1 I 4 6 6 3 3 4 2 2 1 KO H 4 4 4 3 3 2 2 2 1 Wh(Mb/s) I H 512 512 822 512 822 512 357 357 357 357 512 202 202 202 202 202 47 47 Wt(Mb/s)/d(Q) I H 100/4 154/8 0/0 139/8 0/0 81/4 141/9 222/13 175/7 241/13 175/7 254/12 0/0 0/0 0/0 0/0 0/0 0/0 24-node mesh network contents are delivered to the tails by aggregating and then sending them to the tails. When α= 0.5, there is counterbalance between aggregating the contents and sending one content per tree, and consequently the average tail wastage is the largest at α= 0.5. Thirdly, we can find that, for a given α, the average Wr decreases as β increases, which partially reflects the actual resource consumed by the light-trees in optical network. As for the results obtained by the heuristic algorithm in Table III, we can find they have the similar trends on Wt and Wr comparing with that done by the ILP model. The major difference between them is the number of trees and Wh that is just because we try to combine as many contents into one tree as possible in LFT algorithm. When α is equal to 1, the ILP model will aggregate the contents as the same manner. That is why we obtain the same results at that point. C. Large-scale design using the heuristic We adopt a 24-node mesh network, shown in Fig. 6, for the network-level simulation in which the maximum hop-distance is 6. We randomly choose 5 nodes and 10 nodes as the heads and tails respectively. 500 contents will be delivered from heads to tails. Among these contents, 60% require 25Mb/s, 30% require 6Mb/s and 2Mb/s for the others. We randomly generate the transmission matrix S and the receiving matrix R for α = 0.5 and β = 0.5. For simplicity, we just assign length 1 to each link in the graph, that is to say, the shortest path is just based on the hop counts. We use two common bandwidth values 1Gb/s and 2.5Gb/s as t for the light-tree and do each experiment three times. Table V shows the results obtained by the heuristic algorithm. In the network without the MFA strategy, it requires at least 500 multicast IP sessions for 500 contents. By introducing the MFA strategy, we can find that the number Wr(Mb/s)/Bt(Mb/s) I H 2480/2170 2480/2170 2170/2170 2325/2325 2170/2170 2790/2170 6510/3565 5115/3565 4650/2945 5115/3565 2170/1860 2790/2170 5890/3100 5890/3100 5890/3100 5890/3100 2170/1550 2170/1550 Objective I 100 1446 2170 601 2769.5 2436 404 3248 2217 (Mb/s) H 154 1457.5 2871 646.5 2880 3118 404 3248 2217 of light-trees is significantly reduced. It is consistent with the conclusion drawn by ILP that the number of light-trees decreases as transponder bandwidth increases. In addition, we find that content distribution and user requests have a strong impact on the results even for the same αand β . For example, when t = 2.5Gb/s, the maximum number of tree is 17 that is almost twice of the minimum number of trees. We also compare the resource utilization of multicast IP flow without the MFA strategy and light-tree the MFA strategy. The overhead ratio is defined as the difference of resource utilization over the resource utilization of light-tree. It does not change greatly over the experiments with the same α and β . Note that, the transponder bandwidth does not affect the resource utilization of multicast IP flow. However, the resource utilization of light-tree increases as the transponder bandwidth increases. Consequently, the overhead ratio also increases. In the practical scenario, we have to choose proper transponder bandwidth to balance the number of light-trees and the average overhead ratio. VI. C ONCLUSIONS We proposed and investigated the multicast traffic aggregation (MFA) problem in IP over optical networks which is NP-complete and can be modeled by a tri-partite graph with multiple criteria. We have also developed an integer linear programming (ILP) model and a simple approach to dealing with multiple criteria. Although ILP model can do solve the smallscale problem perfectly, we propose the heuristic algorithm for the large-scale network with hundreds of contents. We have carried out numerical studies to verify the effectiveness of our model and heuristic algorithm. The experimental results show that 1) as the objective ruled, the model meets the main criteria very well at the extreme cases; 2) as the bandwidth of a transponder increases, the heads intend to aggregate more multicast IP flows into one light-tree while the tails still want to receive fewer unwanted flows, and there is a tradeoff between them; 3) heuristic algorithm gets the close results to the ILP model and can solve the large scale problem delivering 500 contents in the 24-node mesh network. In our research, we use a linear approximation to deal with multicast routing issue in optical network and a simple weighted-sum model for multiple criteria optimization since we consider our IP over Optical networks is based on the overlay model. However, more work needs to be done such as taking the network topology into consideration under the 1020 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 5, JUNE 2007 TABLE V L ARGE -S CALE NETWORK RESULTS WITH α = 0.5 AND β = 0.5 Transponder Bandwidth (Mb/s) Experiment Number of light-trees IP LT Overhead Ratio = (LT-IP) / LT Average Overhead Ratio Resource Utilization (Mb/s) 1000 1 23 199550 501700 60.2% peer model, and other approaches to solving multiple criteria optimization. ACKNOWLEDGEMENT We thank anonymous reviewers for their valuable comments and all the colleagues in the 3TNet project. Yi Zhu thanks Guobiao Zhou, Xiaodong Huang, and Jason Jue for their helpful discussion. We are grateful to Guowu Xie for help in the preparation of this manuscript. A PPENDIX The MFA problem can be divided into three sub-problems based on the distribution of the multicasting contents. • Partition distribution sub-problem (MFA-P, β = 0): In this case, one multicast content is only provided by a single head, thus the node degree of Y in GH is equal to 1; • Mirroring distribution sub-problem (MFA-M, β = 1): In this case, any multicast content are provided by all the head end, thus GH is a complete bipartite sub-graph; • Partially redundant distribution sub-problem (MFA-R, 0 < β < 1): In this case, the node degree of Y in GH is not less than 1 while GH is a proper graph of the complete bipartite graph. In order to prove the total MFA problem is NP-complete, we first prove the MFA-1, which refers to MFA problem with a single head, is NP-complete. Lemma 1: MFA-1 is NP-Completeness. Proof: Given one partition for the MFA-1 problem, we first check whether this  partition satisfies with the contraints ∀k = {1, 2, . . . , K}, ym ∈Qk bm ≤ t and d(Qk ) ≤ W . It is easily to find that the check can be done in polynomial time. We now show that the well-known BIN-PACKING problem is the special case of the MFA-1 problem. For simplicity, we set B as the all-1 vector. The decision problem for bin-packing can be stated as follows [34]: Given a set E = e1 , e2 , . . . , eM and an positive integer K and value  t, find the partition of the set E ′ = E1 , E2 , . . . , EK , such that ej ∈Ek ej ≤ t, ∀j = 1, 2, . . . , M.∀k = 1, 2, . . . , K Obviously, if we let E = Y and GT is a complete bipartite graph, bin-packing problem is the special case for MFA-1. It is worth to point that the MFA-P, the MFA-M, and the MFAR problems are degenerated into the MFA-1 problem for the single head. However, when we consider multiple heads, it is more complicated than MFA-1. Theorem 1: The MFA problem is NP-complete. 2 20 178500 463525 61.5% 58.6% 2500 3 26 212500 463700 54.2% 1 17 195500 880250 77.8% 2 9 173500 573250 69.7% 73.9% 3 14 184500 719075 74.3% Proof: In the case of the MFA-P problem, note that the content sets provided by any two heads are disjoint since β = 0, so the MFA-P problem with N heads is equivalent to N MFA-1 problems. In the case of the MFA-M problem, all contents can be provided by all heads since β = 1, MFAM with N heads is equivalent to N ! MFA-1 problems. The complexity of MFA-R is between MFA-P and MFA-M that depends on β. Because the MFA-1 problem is NP-complete, the MFA problem is also NP-complete. R EFERENCES [1] P. Van Mieghem, G. Hooghiemstra, and R. van der Hofstad, “On the efficiency of multicast,” IEEE/ACM Trans. Networking (TON), vol. 9, no. 6, pp. 719–732, 2001. [2] C. Diot, W. Dabbous, and J. Crowcroft, “Multipoint Communication: A Survey of Protocols, Functions, and Mechanisms,” IEEE J. Select. Areas Commun., vol. 15, no. 3, p. 277, 1997. [3] C. Diot, B. Levine, B. Lyles, H. Kassem, and D. Balensiefen, “Deployment issues for the IP multicast service and architecture,” IEEE Network, vol. 14, no. 1, pp. 78–88, 2000. [4] B. Wang and J. Hou, “Multicast routing and its QoS extension: Problems, algorithms, and protocols,” IEEE Network, vol. 14, no. 1, pp. 22–36, 2000. [5] A. Striegel and G. Manimaran, “A survey of QoS multicasting issues,” IEEE Commun. Mag., vol. 40, no. 6, pp. 82–87, 2002. [6] L. Sahasrabuddhe and B. Mukherjee, “Light trees: optical multicasting for improved performance inwavelength routed networks,” IEEE Commun., vol. 37, no. 2, pp. 67–73, 1999. [7] G. Rouskas, “Optical layer multicast: rationale, building blocks, and challenges,” IEEE Network, vol. 17, no. 1, pp. 60–65, 2003. [8] W. Hu and Q. Zeng, “Multicasting Optical Cross Connects Employing Splitter-and-Delivery Switch,” IEEE Photon. Technol. Lett., vol. 10, no. 7, 1998. [9] S. Yu, S. Lee, O. Ansell, and R. Varrazza, “Lossless Optical Packet Multicast Using Active Vertical Coupler Based Optical Crosspoint Switch Matrix,” J. Lightwave Technol., vol. 23, no. 10, pp. 2984–2992, 2005. [10] M. Ali and J. Deogun, “Power-efficient design of multicast wavelengthrouted networks,” IEEE J. Select. Areas Commun., vol. 18, no. 10, pp. 1852–1862, 2000. [11] B. Chen and J. Wang, “Efficient routing and wavelength assignment for multicast in WDMnetworks,” IEEE J. Select. Areas Commun., vol. 20, no. 1, pp. 97–109, 2002. [12] A. Banerjee, J. Drake, J. Lang, B. Turner, K. Kompella, and Y. Rekhter, “Generalized multiprotocol label switching: an overview of routingand management enhancements,” IEEE Commun. Mag., vol. 39, no. 1, pp. 144–150, 2001. [13] S. Yasukawa, K. Sugisono, I. Inoue, and S. Urushidani, “Scalable multicast MPLS protocol for next generation broadband service convergence network,” 2004 IEEE International Conference on Communications, vol. 2, 2004. [14] X. Wei, Y. Jin, G. Zhang, W. Sun, J. Sun, W. Guo, and W. Hu, “Demonstration of GMPLS-controlled dynamic point-to-multipoint trees in optical networks,” Optical Communication, 2005. ECOC 2005. 31st European Conference on, pp. 29–30, 2005. [15] W. Sun, Y. Jin, W. Hu, H. He, H. Luo, X., W. P., Guo, Y. Su, and L. Leng, “Prototype of demonstration of IP multicasting over optical network with dynamic point-to-multipoint configuration,” IEEE/OSA OFC 2005, OWG3, 2005. ZHU et al.: MULTICAST FLOW AGGREGATION IN IP OVER OPTICAL NETWORKS [16] Y. Zhu, Y. Jin, W. Sun, W. Guo, and W. Hu, “On topology-independent IP group aggregation in multicast capable optical networks,” Globecom’05, 2005. [17] N. Singhal and B. Mukherjee, “Protecting multicast sessions in WDM optical mesh networks,” J. Lightwave Technol., vol. 21, no. 4, pp. 884– 892, 2003. [18] N. Singhal, L. Sahasrabuddhe, and B. Mukherjee, “Provisioning of survivable multicast sessions against single link failures in optical WDM mesh networks,” J. Lightwave Technol., vol. 21, no. 11, pp. 2587–2594, 2003. [19] B. Haskell, A. Netravali, and A. Puri, Digital Video: An Introduction to Mpeg-2. Springer, 1996. [20] J. Wu and Y. Jin, “China High Performance Broadband Information Network (3TNET),” APOC05, Shanghai, China, 2005. [21] G. Bernstein, J. Yates, and D. Saha, “IP-centric control and management of optical transport networks,” IEEE Commun., vol. 38, no. 10, pp. 161– 167, 2000. [22] J. Cui, M. Faloutsos, and M. Gerla, “An architecture for scalable, efficient, and fast fault-tolerant multicast provisioning,” IEEE Network, vol. 18, no. 2, pp. 26–34, 2004. [23] J. Cui, J. Kim, D. Maggiorini, K. Boussetta, and M. Gerla, “Aggregated Multicast–A Comparative Study,” Cluster Computing, vol. 8, no. 1, pp. 15–26, 2005. [24] A. Fei, Z. Duan, and M. Gerla, “Constructing shared-tree for group multicast with QoS constraints,” Global Telecommunications Conference, 2001. GLOBECOM’01. IEEE, vol. 4, 2001. [25] K. Zhu and B. Mukherjee, “A review of traffic grooming in WDM optical networks: Architectures and challenges,” Optical Networks Magazine, vol. 4, no. 2, pp. 55–64, 2003. [26] N. Singhal, L. Sahasrabuddhe, and B. Mukherjee, “Optimal Multicasting of Multiple Light-Trees of Different Bandwidth Granularities in a WDM Mesh Network With Sparse Splitting Capabilities,” IEEE/ACM Trans. Networking, vol. 14, no. 5, pp. 1104–1117, 2006. [27] A. Billah, B. Wang, and A. Awwal, “Multicast traffic grooming in WDM optical mesh networks,” Global Telecommunications Conference, 2003. GLOBECOM’03. IEEE, vol. 5, 2003. [28] H. Madhyastha, G. Chowdhary, N. Srinivas, and C. Siva Ram Murthy, “Grooming of multicast sessions in metropolitan WDM ring networks,” Computer Networks, vol. 49, no. 4, pp. 561–579, 2005. [29] R. Ul-Mustafa and A. Kamal, “Design and provisioning of wdm networks with multicast traffic grooming,” IEEE J. Select. Areas Commun., vol. 24, no. 4, pp. 37–53, 2006. [30] X. Huang, F. Farahmand, and J. Jue, “Multicast Traffic Grooming in Wavelength-Routed WDM Mesh Networks Using Dynamically Changing Light-Trees,” J. Lightwave Technol., vol. 23, no. 10, pp. 3178–3187, 2005. [31] A. Khalil, A. Hadjiantonis, G. Ellinas, and M. Ali, “Sequential and hybrid grooming approaches for multicast traffic in WDM networks,” Global Telecommunications Conference, 2004. GLOBECOM’04. IEEE, vol. 3. [32] R. Steuer, “Multiple Criteria Optimization: Theory, Computation and Application,” 1985. [33] [Online]. Available: http://www.ilog.com/products/cplex/ [34] [Online]. Available: http://www.nist.gov/dads/html/binpacking.html Yi Zhu received the B.S and M.S degree in electricity engineering from Shanghai Jiaotong University, China, in 2003 and 2006, respectively. He is currently working toward the Ph.D. degree in computer science at the University of Texas, Dallas. His research is on multicast aggregation, traffic grooming, and complexity of optical network. 1021 Yaohui Jin is a professor in the State Key Laboratory of Advanced Optical Communication Systems and Network, Shanghai Jiao Tong University, China. Prior to joining SJTU, he was a member of technical staff at Bell Labs Research China from 2000 to 2002. He served as the TPC member in many international conferences. He published more than 50 paper in technical journals and conferences. His research interests include optical networking, optical grid and switch scheduling. Weiqiang Sun is currently a Lecturer at the State Key Laboratory on Fiber-Optic Local Area Networks and Advanced Optical Communication Systems, Shanghai Jiao Tong University. His research interests include Automatically Switched Optical Networks (ASON), optical multicast and TV distribution in overlay networks. Guo Wei is an associate professor of state key lab of advanced optical communication system and network in Shanghai Jiao Tong University since 2003. Before she entered in SJTU, she was a senior engineer and a project manager of the Fiberhome Telecommunication Technologies CO., LTD from 2001-2003. She has over 50 publications published in technical journals and conferences. Her research interests include optical grid, network planning, and optimization algorithm. Weisheng Hu is the Professor and Director of the State Key Laboratory on Fiber-Optic Local Area Networks and Advanced Optical Communication Systems, Shanghai Jiao Tong University. His interests are on generalized automatic switched optical network, and optical packet switching. He is the author or co-author of over 100 journal and conference papers. Wen-De Zhong is an associate professor with School of Electrical and Electronic Engineering, Nanyang Technological University (NTU), Singapore. He received his Ph.D degree from the University of Electro-Communications, Tokyo in 1993. He has published more than 100 refereed journal and conference papers and has given several invited presentations at international conferences. He has served on organizing and/or TPC for numerous international conferences. His research interests include optical WDM systems and networks. Min-You Wu is an IBM Chair Professor in the Department of Computer Science and Engineering at Shanghai Jiao Tong University. He serves as the Chief Scientist at Grid Center of Shanghai JiaoTong University. He is a research professor of the University of New Mexico, USA. His research interests include grid computing, wireless networks, sensor networks, overlay networks, multimedia networking, parallel and distributed systems, and compilers for parallel computers. He has published over 140 journal and conference papers in the above areas.