Advanced
Energy-saving Strategy Based on an Immunization Algorithm for Network Traffic
Energy-saving Strategy Based on an Immunization Algorithm for Network Traffic
KSII Transactions on Internet and Information Systems (TIIS). 2015. Apr, 9(4): 1392-1403
Copyright © 2015, Korean Society For Internet Information
  • Received : September 18, 2014
  • Accepted : March 15, 2015
  • Published : April 30, 2015
Download
PDF
e-PUB
PubReader
PPT
Export by style
Share
Article
Author
Metrics
Cited by
TagCloud
About the Authors
Dongyan Zhao
Institute of Advanced Network Technology and New Services, University of Science and Technology, Beijing (USTB), Beijing 100083, China
Keping Long
Institute of Advanced Network Technology and New Services, University of Science and Technology, Beijing (USTB), Beijing 100083, China
Dongxue Wang
The University-enterprise R & D Center of Measuring and Testing Technology & Instrument and Meter Engineering, College of Electronic Science, Northeast Petroleum University, Heilongjiang 163318, China
Yichuan Zheng
Institute of Advanced Network Technology and New Services, University of Science and Technology, Beijing (USTB), Beijing 100083, China
Jiajing Tu
Institute of Advanced Network Technology and New Services, University of Science and Technology, Beijing (USTB), Beijing 100083, China

Abstract
The rapid development of both communication traffic and increasing optical network sizes has increased energy consumption. Traditional algorithms and strategies don’t apply to controlling the expanded network. Immunization algorithms originated from the complex system theory are feasible for large-scale systems based on a scale-free network model. This paper proposes the immunization strategy for complex systems which includes random and targeted immunizations to solve energy consumption issues and uses traffic to judge the energy savings from the node immunization. The simulation results verify the effectiveness of the proposed strategy. Furthermore, this paper provides a possibility for saving energy with optical transmission networks.
Keywords
1. Introduction
T he rapid development of global information technology has caused optical transmission networks to be increasingly utilized. The accompanying energy issues are prominent and will consume significant resources. For instance, data centers account for 2% of the electricity consumed in the U.S., and this amount is growing at a rate of 12% [1] . Furthermore, optical networks contain numerous layers, sub-areas, and nodes that must be supported; therefore, their energy requirements become more prominent. Reducing this energy consumption to achieve green communication is being emphasized in research.
The green network concept was first proposed by Gupta et al. [2] and interests numerous researchers. Generally, energy consumption of data network equipment in the Internet is unknown although they use a substantial amount of energy. In this area, there is a lack of deeper related studies with a special focus on wired networking and it still remains to be many challenges to flexible and reliable technology, which has begun to be researched [3] . Chiaraviglio et al. proposed a novel approach for switch-off network nodes and links while still guaranteeing full connectivity and maximum link utilization [4] . Zhang et al. introduced the fundamentals and current progress for existing cognitive radio and self-organization techniques. They also survey critical cognitive radio issues (including common control channel management, cooperative spectrum sensing, bioinspired spectrum sharing, network scalability and adaptive routing)and their self-organization features while identifying new directions and open problems with cognitive radio networks [5] , such as the increased network architecture complexity, high configuration and management costs for large-scale networks, spectral fluctuations, diverse QoS requirements for various applications, and increasing difficulties for centralized control. Li et al. proposed a new power saving mechanism called the sleep-transmit mode (STM), which enabled optical network units (ONUs) on the customers’ premises to transmit upstream data during sleep periods without turning on the receiver, which conserved energy and improved the upstream transmission delay. These advantages were achieved by pre-allocating bandwidth for upstream transmission using the ONU before entering the sleep state [6] . Ji et al. researched energy consumption problem from the perspective of components and modules, node equipment, and network levels, different enabling technologies, but they didn’t consider the controlling algorithm into the control architecture for energy-efficient all optical switching networks [7] . However, we still need to deal with the problemof energy consumption based on the complex-giant-system theory to the complex and increasingly large networks rather than only sleep devices or a single mechanism. Especially, we hope that the strategy is feasible and could facilitate to judge data or control system performance on ASON/WSON (Automatically Switched Optical Network/ Wavelength Switched Optical Network).
Immunizing complex systems from the theory of complex giant system is actively researched. Liu et al. were concerned with designing a flexible immune algorithm suitable for most optical multicast networks and modified a fitness function to reflect the level of individual excellence and protect the links. Increasing the individual concentration function reflected the network coding link probability, increased the alternative coding link diversity and simplified the immunization process by adopting an elitist reservation strategy for the selected encoding links [8] . Shams et al. proposed a new immunization strategy based on a stochastic hill-climbing algorithm to create a subset of nodes whose immunization efficiently reduced the network vulnerability to worst-case epidemics [9] . Keramati et al. presented a risk factor to evaluate their framework. This factor multiplied the likelihood an attack path by its impact on the security factors (confidentiality, integrity, and availability). Their framework was previously applied to a well-known network example to determine its performance [10] . In recent years, immunization strategies have improved the information-processing capabilities and system intelligence. Therefore, the immunization strategy becomes a new direction for researching intelligent controllers [11 - 15] . In this paper, we propose an immunization algorithm to solve energy consumption in optical networks, which is easier and more convenient than the past iterative algorithm and strategies. The solution will facilitate to both energy saving and global information processing in the optical network.
2. Node immunization technology
The immunization algorithm is based on the immune system of human. Table 1 is the comparison to the immunization algorithm and immune system.
The comparison to the immunization algorithm and immune system
PPT Slide
Lager Image
The comparison to the immunization algorithm and immune system
The immunization algorithm is defined by simulating the recognition and combination between the antigen and antibody, and simulating the process of producing antibody. This kind of immunization algorithm is widely used. It can combine with the other algorithm just as the genetic algorithm. On the premise of reserving the original algorithm with good properties, we could restrain the degenerating phenomenon with some information or knowledge characteristics during the process of optimization.
Network devices can’t act like monitors and other equipment which can switch into a power-saving mode to reduce energy consumption when idle. Therefore, such networks consume significant energy. Internet-saving algorithms can be applied to ASON/WSON as follows:
  • (1) Set two states, active and immunized, for the network device. The device rests when idle to reduce energy consumption.
  • (2) Aggregate run routes to a few devices at the network level to reduce energy consumption when the network traffic load is low.
  • (3) Change the network protocol in the control plane for the optical links, which flexibly adjusts devices. Run devices when the load is high, and make the appropriate equipment sleep when the load is low to reduce energy consumption.
Both random and targeted immunization algorithms can reduce the power consumption, and this paper compares the different effects.
3. Immunization strategy
We can use an immunization strategy to solve the energy consumption problems in optical networks, on which we can immunize nodes with low traffic on the optical networks layer to save energy. This paper uses random and targeted immunizations to solve this problem. The nodes were divided into gateway and interior nodes. The gateway node energies are much larger than for the interior nodes; therefore, we use the gateway nodes for this strategy as shown in Fig. 1 .
PPT Slide
Lager Image
Gateway and interior nodes in the routing domain
- 3.1 Random immunization strategy
The random immunization strategy randomly selects immunized nodes in the network. Nodes with large or small degrees are treated equally. The immune node density, g , yields the following immune critical value for random immunization to gain the steady state infection, gc :
PPT Slide
Lager Image
The steady state infection (high energy consumption) density, ρg , is:
PPT Slide
Lager Image
We obtain the immune critical value, gc [16] , from λc , the epidemic threshold for a scale-free network:
PPT Slide
Lager Image
where k is the degree for some nodes related to traffic interlinkage, which is ascending with the increase of traffic. λ is the effective propagation rate. Thus, as < k >→∞, the critical value λc tends to zero with the unlimited network growth, and the immune critical value, gc , tends to 1.
- 3.2 Targeted immunization strategy
Using the uniform characteristics from a scale-free network, we can make the objective immune selective; therefore, we choose nodes with small degrees to immune. Once these nodes are immune, the side they are connected to can be wiped, which greatly reduces the possibility for spreading energy. We define this network as a BA scale-free network; therefore, the immune critical value for targeted immunization is:
PPT Slide
Lager Image
where λ is the effective propagation rate to yield the immune value and m is the number of connections at some node. The selectively targeted immunization in the scale-free network provides an accurate critical value, on which we can gain the steady state infection to judge and select the immunized node.
The traffic is chosen based on its degree, and we obtain the critical value and choose an operator based on the traffic size. The aim is to save energy without affecting the network transmission. The function to count the traffic probability of each node is
PPT Slide
Lager Image
, and Fi is a traffic function; however, for the immunization strategy, f means the degree.
PPT Slide
Lager Image
In this formula, fij is the traffic, Lij shows the link [17] between node i and node j , tsd is the average traffic intensity for node s ( s=1, 2,…,N ) to node d ( d=1, 2,…, N ), { tsd } refers to the traffic requirements,
PPT Slide
Lager Image
is the flow produced when the traffic tsd route goes through the link, and fLij is the traffic flow for link Lij .
We compare the steady state infection density and traffic probability to judge immunized nodes.
The network traffic changes through the daily status [2] as shown in Fig. 2 . Fig. 2 shows the daily network traffic overtime in the US, which begins to rise at 8 in the morning and peaks during 12:00 to 14:00. Afterwards, it begins to decrease to a minimum at 20:00. To ensure the algorithm accuracy, we test it at every time interval. We set up a time variable, t , between 8 am and 2 pm to detect the nodes for the remaining time. The test is divided into two sections, which could not only ensure the normal network operation but also maximize the saving effect for different network traffic.
PPT Slide
Lager Image
Daily traffic status
Selecting the individual is an important detail to this strategy. Using a traversal algorithm may increase the difficulty. We draw on experience to set the edge node selection strategy to the minimum degree nodes and use the priority selection strategy to reduce the difficulty and time.
- 3.3 Immunization strategy for saving energy
The energy-saving control based on immunization strategy includes the following steps:
  • (1) Initialize traffic, giving the values of the traffic probability, setting the value ofλ, etc.
  • (2) Computegc.
  • (3) Adjust the parameters of the immunization strategies according to the Eq. (2).
  • (4) Compare the output of the step (2-3).
  • (5) Compare the steady state infection density and traffic probability.
  • (6) Adjust immunized nodes according to the steady state infection density.
  • (7) Compute saving-energy results.
4. Simulation
- 4.1 Random immunization
This algorithm uses the traffic volume as a reference to set the parameters based on the traffic or traffic probability. Defining λ as the effect of a node on other nodes and λc as the highest traffic probability capable of disturbing the transfer yield a gc based on the formula gc =1− λc / λ , which is 0.164.
The data used are based on the paper by Lifang Zhang [18] and Peng Ren [19] , and the traffic load is shown in Table 2 . Immune algorithm of this paper is based on the traffic of the nodes, manages the nodes not to meet the sleep conditions and carries through energy saving. The data 1, data 2 and data 3 are the energy saving results. Because the core of the algorithm is traffic, we choose the node to sleep based on it. And we provide seven consecutive nodes for the simulation.
Original data
PPT Slide
Lager Image
Original data
We obtain the traffic probability Pi based on Table 2 in Fig. 3 . The immunized nodes exhibit a density on Fig. 3 according to Eq. (2) as shown in Fig. 4 :
PPT Slide
Lager Image
Traffic probability
PPT Slide
Lager Image
Steady state density for random immunization
We determine the sleep nodes on the steady state infection density. Fig. 5 shows the energy usage before and after the random immunization and compares the original data and random data. We can see that the random immunization is feasible and yield good results.
PPT Slide
Lager Image
The contrast of energy consumption
- 4.2 Targeted immunization
The immune critical value for the targeted immunization is different from the random immunization and is gc e −2/ , where m [19] is the minimum number of connections, and λ is set to 1. Therefore, gc is 0.141. According to Table 2 and Fig. 3 , the immunized nodes to the density are shown in Fig. 6 :
PPT Slide
Lager Image
Steady state density for targeted immunization
We determine the sleep nodes on the steady state infection density from Fig. 6 .We assume the original energy consumption is 1. Fig. 7 compares the energy data before and after the targeted immunization. Energy consumption of three sets of data are decreased through targeted immunization. Because of the difference of energy consumption of each node, energy saved is different through immunization algorithms based on differfent traffic. In general, energy consumption of the three sets have been reduced, which verifies the effectiveness of the proposed strategy. The targeted immunization is also feasible and could yield good results.
PPT Slide
Lager Image
Energy consumption contrast
From the Fig. 5 and Fig. 7 , we can know the two immunization strategies can all save the energy, but the results are different because the steady state infection density in Fig. 6 are more accurate than random immunization. Fig. 8 clearly exhibits the original energy data for the random, R , and targeted, T , immunizations. We can know that energy consumption of the nodes have declined after targeted immunization or random immunization. The targeted immunization can yield better results than random immunization.
PPT Slide
Lager Image
Energy consumption contrast
5. Conclusion
The immunization strategy can be used with optical networks to save energy and divided into random and targeted immunizations. These two strategies can save energy for an optical network. However, the targeted immunization exhibits better targeting and veracity than random immunization; the targeted immunization can yield better saving energy results for large-scale networks. In the future, we intend to consider more complex systems and algorithms, and plan to draw into game theory setting sleep nodes based on our research to increase the network performance for green communication.
BIO
Dongyan Zhao received her B.Sc. degree Yanshan University, Hebei, China in 2001, the M.Sc. degree in circuit and system from Yanshan University, Hebei, China in 2008, the Ph.D. degree in state key laboratory of information photonics and optical communications from University of Beijing University of Posts and Telecommunications (BUPT), Beijing, China in 2012. She is currently post doctorate in University of Science and Technology Beijing (USTB), Beijing, China. Her current research interests include optical transmission network, the next optical network, and network control. She is also a recipient of “Best Student Paper Award” at 12th International conference on Optical Internet, July 2014, Jeju, Korea. Dr. Zhao is a member of the Institute of Electrical and Electronics Engineers (IEEE) and the Optical Society of America (OSA).
Keping Long received his M.S. and Ph.D. Degrees at UESTC in 1995 and 1998, respectively. From Sep. 1998 to Aug. 2000, he worked as a postdoctoral research fellow at National Laboratory of Switching technology and telecommunication networks in Beijing University of Posts and Telecommunications (BUPT). From Sep. 2000 to Jun. 2001, he worked as an associate professor at Beijing University of Posts and Telecommunications (BUPT). From Jul. 2001 to Nov. 2002, he was a research fellow in ARC Special Research Centre for Ultra Broadband Information Networks (CUBIN) at the University of Melbourne, Australia. He is now a professor and dean at School of Computer & Communication Engineering (CCE), University of Science and Technology Beijing (USTB). He is the IEEE senior member, and the Member of Editorial Committee of Sciences in China Series F and China Communications. He is also the TPC and the ISC member for COIN2003/04/05/06/07/08/09/10, IEEE IWCN2010, ICON04/06, APOC2004/06/08, Co-chair of organization member for IWCMC2006, TPC chair of COIN2005/2008, TPC Co-chair of COIN2008/2010, He was awarded for the National Science Fund for Distinguished Young Scholars of China in 2007, selected as the Chang Jiang Scholars Program Professor of China in 2008. His research interests are Optical Internet Technology, New Generation Network Technology, Wireless Information Network, Value-added Service and Secure Technology of Network. He has published over 200 papers, 20 keynotes speaks and invited talks in the international conferences and local conferences.
Dongxue Wang received her B.Sc. degree of electronic and information engineering in Northeast Petroleum University in 2012. She is currently working toward the M.Sc. degree with instrumentation engineering at Northeast Petroleum University. Her research interests are focused on energy saving algorithm and communication technology.
Yichuan Zheng received his B.Sc. degree in communication engineering at University of Science and Technology Beijing in 2013. He is currently working toward the M.Sc. degree with the Beijing Engineering and Technology Research Center for optical fiber communication and channel estimation, University of Science and Technology Beijing (USTB), Beijing, China. His research interests are focused on estimation algorithm and communication technology.
Jiajing Tu was born in Jiangxi, China, on January 17, 1986. She received the B. Eng. degree from Nanchang University, Jiangxi, China, in 2007, received the M. Eng. degree from University of Science and Technology Beijing, Beijing, China, in 2011 and received Ph.D. degree in the Division of Media and Network Technologies, Hokkaido University, Japan, in 2014. She has been engaged in research on the design of the heterogeneous trench-assisted multi-core fiber. Dr. Tu is a member of the Institute of Electrical and Electronics Engineers (IEEE) and the Optical Society of America (OSA).
References
Restorick T. 2007 “An Inefficient Truth”Global Action Plan Report, vol. 1
Gupta M. , Singh S. “Greening of the Internet” in Proc. of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM) 2003 19 - 26
Suh Yuhwa “A study on energy savings potential of data network equipment for a green Internet” in Proc. of 2014 16th International Conference on Advanced Communication Technology (ICACT) 2014 1146 - 1151
Chiaraviglio L. , Mellia M. , Neri F. “Reducing Power Consumption in Backbone Networks” in Proc. of IEEE International Conference on Communications (ICC) 2009 1 - 6
Zhang Z. , Long K. , Wang J. 2013 “Self-Organization Paradigms and Optimization Approaches for Cognitive Radio Technologies: A Survey” IEEE Wireless Commun. 20 (2) 36 - 42    DOI : 10.1109/MWC.2013.6507392
Li J. , Chan C. A. , Lee K. L. , Dinh N. , Veter P. “Sleep mode mechanism with improved upstream performance for passive optical networks” in Proc. of IEEE International Conference on Communications (ICC) 2014 3871 - 3876
Ji Y. , Zhang J. , Zhao Y. , Li H. , Yang Q. , Ge C. , Xiong Q. , Xue D. , Yu J. , Qiu S. 2014 “All Optical Switching Networks With Energy-Efficient Technologies From Components Level to Network Level” IEEE Journal on Selected Areas in Communications 32 (8) 1600 - 1614    DOI : 10.1109/JSAC.2014.2335352
Huanlin L. , Yunhui X. , Zhen L. “A flexible network coding link optimization method based on immune algorithm for optical multicast” in Proc. of 2011 International Conference on Computational Problem-Solving (ICCP) 2011 1 - 6
Shams B. , Khansari M. “Immunization of complex networks using stochastic hill-climbing algorithm” in Proc. of 2013 3th International Conference on Computer and Knowledge Engineering (ICCKE) 2013 283 - 288
Keramati M. , Asgharian H. , Akbari A. “Cost-aware network immunization framework for intrusion prevention” in Proc. of 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE) 2011 639 - 644
Bing L. , Guo W. , Chen G. “Edges Immunization Strategy Based on Discrete PSO in Weighted Scale-Free Network” in Proc. of 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) 2012 384 - 389
TorresPadrosa V. , Manzano M. , Calle E. , Marzo J. L. “Traffic-level community protection in telecommunication networks under large-scale failures” in Proc. of 2012 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS) 2012 1 - 8
Han B. , Li J. , Srinivasan A. 2014 “Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random-Walk Sampling” IEEE/ACM Transactions on Networking 22 (5) 1389 - 1400    DOI : 10.1109/TNET.2013.2280436
Xu Z. , Zhang J. , Gu G. , Lin Z. “AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization” in Proc. of 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS) 2013 112 - 123
Satorras R. P. , Vespignani A. 2001 “Epidemic dynamics and endemic states in complex networks” Physical Review E 63 (6) 066117.1 - 066117.8
Zhang Z. , Tellambura C. 2009 “The Effect of Imperfect Carrier Frequency Offset Estimation on OFDMA Uplink Transmission” IEEE Transactions on Communications 57 (4) 1025 - 1030    DOI : 10.1109/TCOMM.2009.04.070246
Zhang L.F. 2012 “Research on Several Key Technologies of Gmpls-based Intelligent Multi-layer Multi-domain Optical Networks” Beijing University of Posts and Telecommunications
Ren P. 2007 “Research on robust planning algorithm in WDM optical network traffic grooming” University of Electronic Science and technology
Satorras R. P. , Vespignani A. 2002 “Immunization of complex networks” Physical Review E 65 (3) 036104.1 - 036104.8