Progress Report No. 13. P-Cycles and Quality of Recovery
|
|
- Heather Johnson
- 5 years ago
- Views:
Transcription
1 NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 13 P-Cycles and Quality of Recovery The University of Canterbury Team 12 April 2006
2 Abstract Since the p-cycle resilience technique was proposed for the first time in 1998 by Grover, many supportive papers concerning the topic have been published. However, some researchers argue against the efficiency and theoretical reliability properties of this recovery techniques.in this report, we intend to open a discussion on the applicability of p-cycles to this NGN project as well as to introduce a new concept of Quality of Recovery (QoR), which is an indicator helpful in planning of recovery schemes e.g., global path, link, p-cycles recovery. The QoR is a trade-off function, which can be used to balance the cost-effectiveness and reliability performance in network recovery design. 1. Brief Introduction to P-Cycles The technique of p-cycles is a relatively new approach to survivable network architectures, first introduced in [1]. The name has been coined out of preconfigured protection cycle. Basically, a p-cycle is a sequence of capacity units on links that make a cycle in the network topology. The objective of the p-cycle concept is to obtain the restoration speed of self-healing rings (which use 1+1 protection) while simultaneously retaining the total capacity reduction offered by the shared protection paradigm, which is called ring-like speed with mesh-like capacity resilience approach. Figure 1 Example of a p-cycle The idea behind a p-cycle is simple but it ensures potentially cost-effective resilience. A p-cycle consists only of spare resources in some spans forming a closed path in a network, Figure 1(a). There are two types of span whose failures are recovered by a p- cycle: on-cycle and straddling ones. In an on-cycle span, the protected (working) capacity is co-located with spare capacity which forms the p-cycle. This is not the case in a straddling span. If an on-cycle span fails, the working capacity is recovered due to the usage of the spare capacity in a p-cycle, Figure 1(b). In the case of a straddling span failure, the situation is similar, but then two possible recovery paths are present, Figure 1(c). Due to this fact, a p-cycle with the capacity of units in each of its spans, can recover up to 2 units of capacity in the straddling span. This C p is the greatest advantage of the method. Additionally, recovery by p-cycles is fast due to the local character of protection switching. The planning, operation and other C p
3 details related to p-cycles are exhaustively described in [2]. Networks characterized by a high average nodal degrees are the ones in which p-cycles are most effective. Therefore, p-cycles are best suited to mesh topologies. In addition, finding p-cycles is an NP-hard combinatorial problem for which heuristics may approach optimal solutions for small networks Grover obtained optimal solutions for networks in the order of 20 nodes and 30 links. 2 Arguments against p-cycles 2.1 The reliability of p-cycles is contested The advocates of p-cycles eagerly stress their merits over protection rings. For example, [2] enumerates the advantages from the standpoint of: modularity, protection yield, protection flexibility, routing and provisioning of working paths, network redundancy and average length of protection paths. However, some researchers have different opinions and they pay heed to the one feature that is not mentioned above, i.e., reliability. They agree that cost-effectiveness should be one of the objectives of the network design, but they emphasize the fact that in the case of recovery planning the first goal must be reliability because this is the main objective of such an activity. In [3], the authors derived theoretical formulas which describe the reliability functions for traditional rings such as UPSR, BLSR and p-cycles and also present numerical examples which prove that, from the reliability point of view, the superiority of p-cycles can be contested. They mention that this very promising new technique, p-cycles, often compared to traditional rings and considered as better, can be assessed as inferior when the most important factor, i.e., the reliability, is taken into account. It presents the derivation of the formulas describing the all-terminal reliability (which is defined as the probability that all network nodes are connected for a given period of time) and 2- terminal reliability (which is the probability calculated for the selected source node and termination node that are connected) and the numerical examples prove that the superiority of p-cycles over protection rings is doubtful. See Figure 2 below, which is Figure 5 in [3], where N is the number of Figure 2 All-terminal availability of protection rings and p-cycles
4 nodes in a ring/p-cycle, and L is the number of straddling spans in a p-cycle. It can be seen that BLSR yields large resilience, while UPSR and p-cycle are much worse. Additionally, p-cycle is far less reliable than USPR. Obviously, the availability decreases with an increasing number of nodes and straddling spans. Moreover, the simulation results presented in [3] also confirm the theoretical studies which say that it is more reasonable to use p-cycles in smaller networks. For example, a three 9 s level of link availability means that the fiber is approximately 100km long. Such a short length of a span is obviously possible, but in metropolitan rather than in wide-area networks. This suggests that p-cycles could be a good solution for MANs, but in long haul networks, the advantages of traditional shared protection related to availability performance exceed the advantages of p-cycles related to sharing of spare resources. In addition, consideration of node reliability would make the reliability functions for p-cycles far more inferior because this technique is not well suited for the treatment of node failures. The greatest advantage of p-cycles (the existence of straddling spans) appears to be also their greatest disadvantage: secondary failures are more likely to occur, since the more the number of spans, the greater the probability of faults. As p- cycles are designed to be resilient to single failures only, secondary failures incur faults which cannot be recovered. There is also a summary on the disadvantage of p-cycle recovery in [4], which includes: 1) It is hard for a cycle to protect a node failure and multiple link failures; 2) Usually the path length in a cycle increases with the network size and it is expensive to reroute the traffic with a long protection path; 3) It is not easy to implement the distributed algorithm of the cycle-based protection schemes. 2.2 The spare capacity allocation efficiency of p-cycle is doubtful Recently, the report [5] presented some interesting results on the aspect of spare capacity allocation design regarding different protection and restoration schemes, including the p-cycle. They mention that the distinction between path restoration and link restoration is that path restoration uses alternative routes from the origins to the destinations of the demand pairs affected by the failed link rather than simply taking a detour around it. Notice that p-cycles reroute all of the traffic affected by a link failure on one or two paths around the link whereas a path restoration scheme may distribute the rerouted traffic over a larger number of backup paths. Thus, path restoration will generally require less total spare capacity than either link or p-cycle restoration as shown in Table 1 (which is Table 2 in [5]).
5 Table 1: An example network with 6 node and 9 links We can see that when the path restoration version of the spare capacity allocation model is applied to the example problem, the total spare capacity needed was only 95 units compared to 140 and 110 units for p-cycle and link restoration, respectively. Table 2: Another example network with 18 node and 35 links
6 Another larger example network, for which the computational results are given in Table 2, also illustrates this point. The p-cycle model was the most difficult to solve taking approximately 10 seconds of CPU time. More details about this computation scenario can be found on page 18 of [5]. We assert that when dealing with network recovery, the assessment of the method should take into account not only cost-effectiveness but also reliability performance or vice visa. It is regrettable that among factors usually used for the purposes of assessment of the quality of recovery (recovery time, capacity sharing), indicators aiming to evaluate the influence of sharing on the reliability appear so rarely. Therefore, here we introduce a new concept, named Quality of Recovery (QoR), for possible use in this NGN project. 3 Quality of recovery A Trade-off function As an indicator helpful in planning of p-cycles, as well as others recovery schemes, the paper [6] proposes the use of a combined index comprising two subsequent factors. One is Redundancy R as an indicator of the extension of capacity sharing; carrier is interested in the lowest value possible value of R. The other is availability A as an indicator of the resilience to failure; a carrier is interested in the highest possible value of A. As the two factors have inverse desirabilities, a simple Quality of Recovery function can be defined as below: k A QoR = R Generally, the choice of k or QoR itself has many degrees of freedom which should be chosen by an operator, possibly on the basis of some technical and economical analysis. The detailed ideas related to a broader framework related to QoR can be found in [6]. Further study on QoR is needed if Telecom were to accept the applicability of this concept to the NGN project. Conclusions We have opened a discussion on the applicability of p-cycle at the stage of preparation of network recovery procedures for the NGN project. The speed of the method and cost-effectiveness related to the redundancy may be insufficient to make it a satisfactory choice. Although P- Cycles can be very attractive in certain respects, they appear to be sufficiently reliable only for quite large values of fiber availability. This would restrict their usage to metropolitan area networks. Also the efficiency with respect to spare capacity allocation is also doubtful in comparison with other recovery schemes. We also suggested an appropriate function, i.e., QoR, for making decisions on balancing the recovery factors e.g., capacity sharing, recovery time and reliability that could be applied in the planning stage of this NGN project.
7 References [1] W. D. Grover, D. Stamatelakis: Cycle-Oriented Distributed Pre-configuration: Ring-Like Speed with Mesh-Like Capacity for Self-Planning Network Restoration, in Proc. International Conference on Communications (ICC), Vol. 1, Atlanta, June 7-11, 1998, pp [2] W. Grover, Mesh-Based Survivable Networks. Options and Strategies for Optical, MPLS, SONET, and ATM Networks. Upper Saddle River, NJ: Prentice Hall PTR, [3] P. Chołda and A. Jajszczyk, Reliability Assessment of Rings and p-cycles in DWDM Networks, in Proc. NGI2005 1st Conference on Next Generation Internet Networks Traffic Engineering, Rome, Italy, Apr , 2005 [4] Yuna Zhang, Oliver W.W.Yang, Different Implementations of Token Tree Algorithm for DWDM Network Protection/Restoration, Computer Communications and Networks, Proceedings. Eleventh International Conference on Oct Page(s): [5] Basic Mathematical Programming Models for Capacity Allocation in Mesh-based Survivable Networks, Jeffery Kennington, Eli V. Olinick, and Georghe Spiride, Technical Report, July 2005 [6] P. Chołda, A. Jajszczyk, and K. Wajda, A Unified Framework for the Assessment of Recovery Procedures, in Proc. IEEE 2005Workshop on High Performance Switching and Routing (HPSR 2005), Hong Kong, China, May 12-14, 2005.
An Approach to Dual-failure Survivability for Multi Quality Data Based On Double p-cycle
An Approach to Dual-failure Survivability for Multi Quality Data Based On Double p-cycle Ajeeth Singh 1 Skyline Institute of Engineering and Technology, Greater Noida, UP, India. 2 MVN Education City Palwal,
More informationMODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS
MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS IT Specialist Dorina LuminiŃa Copaci Gorj Court IT Expert Constantin Alin Copaci ANRCTI Bucharest Abstract: A large number of recovery mechanisms
More informationProgress Report No. 15. Shared Segments Protection
NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury
More informationA Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks
A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland
More informationAnalysis and Algorithms for Partial Protection in Mesh Networks
Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT
More informationCandidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks
Candidate-Cycle-based Heuristic Algorithm for Node-and-Link Protection of Dynamic Multicast Traffic in Optical DWDM Networks Ahmed Frikha, Samer Lahoud, and Bernard Cousin University of Rennes 1, IRISA,
More informationBridging the Ring-Mesh Dichotomy with p-cycles:
Bridging the Ring-Mesh Dichotomy with p-cycles: Ring-like speed with mesh-like capacity Wayne D. Grover, Demetrios Stamatelakis TRLabs, University of Alberta, Edmonton, Alberta, Canada DRCN 2000 April
More informationP Cycles: Design and Applications
P Cycles: Design and Applications -Aman Nijhawan Abstract Survivability is becoming an increasingly important goal in network design. An important aspect of network design today is designing networks with
More informationA Novel Efficient Design of Survivable WDM Mesh Networks
1684 JOURNAL OF COMPUTERS, VOL. 9, NO. 7, JULY 2014 A Novel Efficient Design of Survivable WDM Mesh Networks HONG HUI LI, XUE LIANG FU College of Computer and Information Engineering Inner Mongolia Agricultural
More informationECE442 Communications Lecture 4. Optical Networks
ECE442 Communications Lecture 4. Optical Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Network Elements 1 WDM networks provide circuit switched end-to-end optical
More informationIntroduction Metro Area Optical Networks Components of a MAN Metro Service POP Core MAN Services Access Services Metro Optical Services Service POP
Introduction Metro Area Optical Networks Components of a MAN Metro Service POP Core MAN Services Access Services Metro Optical Services Service POP Services Core Services MAON Physical Topologies Four
More informationSurvivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation
Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation Muhammad S. Javed, Krishnaiyan Thulasiraman, Matthew A. Gaines School of Computer Science, University
More informationSYSC 5801 Protection and Restoration
SYSC 5801 Protection and Restoration Introduction Fact: Networks fail. Types of failures: Link failures Node failures Results: packet losses, waste of resources, and higher delay. What IGP does in the
More informationComplexity in Multi-level Restoration and Protection Strategies in Data Networking
Complexity in Multi-level Restoration and Protection Strategies in Data Networking mailto:dward@cisco.com October, 2002 NANOG 1 What makes it complex? Multi-technology network viewed as a stack of singlelayered
More informationSONET Topologies and Upgrades
CHAPTER 9 Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring
More informationSPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS
SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS D. Harle, S. Albarrak, F. Ali Department of Electrical and Electronic Engineering, University of Strathclyde, U. K {d.harle,sbarrak,
More informationDavid Tipper Graduate Telecommunications and Networking Program University of Pittsburgh. Motivation
Survivable Network Design David Tipper Graduate Telecommunications and Networking Program University of Pittsburgh Telcom 2110 Slides 12 Motivation Communications networks need to be survivable? Communication
More informationFault management. Acnowledgements
Fault management Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Computer Networks Design and Management - Acnowledgements Inspired by Davide
More informationSurvivability with P-Cycle in WDM Networks
Survivability with P-Cycle in WDM Networks K. Aparna 1, P. Ramya Krishna 2 JNTUA College of Engineering, Pulivendula Abstract: In this paper we discuss about the Pre-Configured survivability schemes. Network
More informationApplying p-cycle Protection Approach for a Reliable IPTV Service in IP-over-DWDM Networks
Frikha et al. RESEARCH Applying p-cycle Protection Approach for a Reliable IPTV Service in IP-over-DWDM Networks Ahmed Frikha *, Bernard Cousin and Samer Lahoud Abstract Today, IPTV service has become
More informationMulti-layer protection and restoration requirements
Multi-layer protection and restoration requirements Date: July 23 rd, 2001 Source: Sudheer Dharanikota Raj Jain Nayna Networks Yong Xue Erik Sherk WorldCom ABSTRACT: This document provides the necessary
More informationFault management. Fault management. Acnowledgements. The impact of network failures. Pag. 1. Inspired by
Fault management ndrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 cnowledgements Inspired by Davide
More informationSONET Topologies and Upgrades
8 CHAPTER Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring
More informationAnalysis and Algorithms for Partial Protection in Mesh Networks
Technical Report, April 2011 Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu
More informationBenefits of Metropolitan Mesh Optical Networks
Tellabs 4951 Indiana Avenue Lisle, Illinois 60532 U.S.A. Tel: +1.630.378.8800 Fax: +1.630.852.7346 www.tellabs.com Benefits of Metropolitan Mesh Optical Networks Bert Buescher, senior product marketing
More informationSpare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection
Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Victor Yu Liu Network Advanced Research, Huawei Technologies Santa Clara, California, USA yuliu@ieee.org Abstract
More informationExtending the p-cycle Concept to Path Segment Protection for Span and Node Failure Recovery
1306 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 8, OCTOBER 2003 Extending the p-cycle Concept to Path Segment Protection for Span and Node Failure Recovery Gangxiang Shen, Student Member,
More informationOptical Communications and Networking 朱祖勍. Nov. 27, 2017
Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by
More informationSurvivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks
Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Master s Thesis Defense Ananth Nagarajan EECS Department, University of Kansas 10/13/98 Outline
More informationOptical Fiber Communications. Optical Networks- unit 5
Optical Fiber Communications Optical Networks- unit 5 Network Terminology Stations are devices that network subscribers use to communicate. A network is a collection of interconnected stations. A node
More informationSHARED MESH RESTORATION IN OPTICAL NETWORKS
SHARED MESH RESTORATION IN OPTICAL NETWORKS OFC 2004 Jean-Francois Labourdette, Ph.D. labourdette@ieee.org Page: 2 Outline Introduction Network & Restoration Arch Evolution Mesh Routing & Provisioning
More informationShared Protection by Concatenated Rings in Optical WDM Networks
Shared Protection by Concatenated Rings in Optical WDM Networks Hyunseung Choo, Minhan Son, Min Young Chung, and Tae-Jin Lee School of Information and Communication Engineering Sungkyunkwan University
More informationDiversity Coded 5G Fronthaul Wireless Networks
IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University
More informationLSP placement in an MPLS-TP mesh network with shared mesh protection mechanism
LSP placement in an MPLS-TP mesh network with shared mesh protection mechanism CLÁUDIO ROBERTO FERREIRA COSTA, WAGNER LUIZ ZUCCHI Escola Politécnica Departamento de Engenharia de Sistemas Eletrônicos Universidade
More informationSurvivable WDM Mesh Networks
870 JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 21, NO. 4, APRIL 2003 Survivable WDM Mesh Networks S. Ramamurthy, Laxman Sahasrabuddhe, Member, IEEE, and Biswanath Mukherjee, Member, IEEE Abstract In a wavelength-division-muliplexing
More informationP-Cycle Based Protection Schemes for Multi-Domain Networks
P-Cycle Based Protection Schemes for Multi-Domain Networks Arnold Farkas, Janos Szigeti, Tibor Cinklert High-Speed Networks Laboratory Department of Telecommunications and Media Informatics Budapest University
More informationOn Efficient Protection Design for Dynamic Multipath Provisioning in Elastic Optical Networks
On Efficient Protection Design for Dynamic Multipath Provisioning in Elastic Optical Networks Xiaoliang Chen, Shilin Zhu,DiChen, Shuguang Hu, Chang Li, Zuqing Zhu School of Information Science and Technology,
More informationFault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee
DIMACS Series in Discrete Mathematics and Theoretical Computer Science Fault-Tolerant Design of Wavelength-Routed Optical Networks S. Ramamurthy and Biswanath Mukherjee Abstract. This paper considers optical
More informationClassification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering
Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering GET/ENST Bretagne - Département Réseaux et Services Multimédia 2 rue de la Châtaigneraie - CS 1767-35576
More informationA Study of Protection Switching: Wrapping or Steering
Study of Protection Switching: Wrapping or Steering Jason Fan Luminous Networks, Inc. March 2001, IEEE 802.17 Luminous Networks/Jason Fan 1 Wrapped Protection Wrapped protection is analogous to LSR Wrapping
More informationMPLS network built on ROADM based DWDM system using GMPLS signaling
MPLS network built on ROADM based DWDM system using GMPLS signaling PIONIER experiences in GMPLS based next generation optical network and strategy for integration of MPLS based metropolitan academic networks
More informationResilient IP Backbones. Debanjan Saha Tellium, Inc.
Resilient IP Backbones Debanjan Saha Tellium, Inc. dsaha@tellium.com 1 Outline Industry overview IP backbone alternatives IP-over-DWDM IP-over-OTN Traffic routing & planning Network case studies Research
More informationTransport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are:
E Transport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are: Native support for all SAN protocols including ESCON, Fibre Channel and Gigabit
More informationProtection Switching and Rerouting in MPLS
Protection Switching and Rerouting in MPLS S. Veni Dr.G.M.Kadhar Nawaz Research Scholar, Director, Dept. of MCA Bharathiar University Sona College of Technology Coimbatore, India Salem, India venii_k@yahoo.com
More informationAutomatic Service and Protection Path Computation - A Multiplexing Approach
Automatic Service and Protection Path Computation - A Multiplexing Approach Loay Alzubaidi 1, Ammar El Hassan 2, Jaafar Al Ghazo 3 1 Department of Computer Engineering & Science, Prince Muhammad bin Fahd
More informationEvolution of Protection Technologies in Metro Core Optical Networks
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Evolution of Protection Technologies in Metro Core Optical Networks
More informationOPTICAL networks based on wavelength division multiplexing
IEEE/ACM TRANSACTIONS ON NETWORKING 1 ILP Formulations for p-cycle Design Without Candidate Cycle Enumeration Bin Wu, Member, IEEE, Kwan L. Yeung, Senior Member, IEEE, and Pin-Han Ho Abstract The concept
More informationp-cycle Protection in Wavelength Routed Networks
p-cycle Protection in Wavelength Routed Networks Christian Mauz Communication Technology Laboratory ETH Zurich Switzerland mauz@nari.ee.ethz.ch Abstract The concept of p-cycle protection (PCP) in virtual
More informationTHE EXPLOSIVE growth of Web-related services over the. A Practical Approach to Operating Survivable WDM Networks
34 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 A Practical Approach to Operating Survivable WDM Networks Murari Sridharan, Student Member, IEEE, Murti V. Salapaka, and
More informationIN transport communication networks two rather diverse
apacity-efficient Planning of Resilient Networks with p-ycles laus G. Gruber, ominic. Schupke fclaus.gruber, dominic.schupkeg@ei.tum.de Munich University of Technology Institute of ommunication Networks
More informationAn Incremental Procedure for Improving Path Assignment in a Telecommunications Network
Journal of Heuristics, 9: 375 399, 2003 c 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. An Incremental Procedure for Improving Path Assignment in a Telecommunications Network D. ALLEN,
More information1912 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 10, OCTOBER 2000
1912 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 10, OCTOBER 2000 Influence of Modularity and Economy-of-Scale Effects on Design of Mesh-Restorable DWDM Networks John Doucette, Student
More informationRecover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet
Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet Midori Terasawa, Masahiro Nishida, Sho Shimizu, Yutaka Arakawa, Satoru Okamoto and Naoaki Yamanaka Department
More informationON THE PARTIAL PATH PROTECTION SCHEME FOR WDM OPTICAL NETWORKS AND POLYNOMIAL TIME COMPUTABILITY OF PRIMARY AND SECONDARY PATHS
JOURNAL OF INDUSTRIAL AND Website: http://aimsciences.org MANAGEMENT OPTIMIZATION Volume 3, Number 4, November 2007 pp. 625 643 ON THE PARTIAL PATH PROTECTION SCHEME FOR WDM OPTICAL NETWORKS AND POLYNOMIAL
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY /$ IEEE
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY 2010 67 1+NNetwork Protection for Mesh Networks: Network Coding-Based Protection Using p-cycles Ahmed E. Kamal, Senior Member, IEEE Abstract
More informationAll-Optical Switches The Evolution of Optical Functionality Roy Appelman, Zeev Zalevsky, Jacob Vertman, Jim Goede, Civcom
All-Optical Switches The Evolution of Optical Functionality Roy Appelman, Zeev Zalevsky, Jacob Vertman, Jim Goede, Civcom Introduction Over the last few years, significant changes in optical networking
More informationLocal Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet etworks for Multiple Link Failures Shibu. V Department of Computer Applications. Preetha Mathew K Department of Computer Applications. Jabir.K.V.T Department of Information
More informationDesign of Resilient Ethernet Ring Protection (ERP) Mesh Networks With Improved Service Availability
JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 31, NO. 2, JANUARY 15, 2013 203 Design of Resilient Ethernet Ring Protection (ERP) Mesh Networks With Improved Service Availability Mohammad Nurujjaman, Samir Sebbah,
More informationRedundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w)
Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 0.1w) Michael Galea, Marzio Pozzuoli RuggedCom Inc. - Industrial Strength Networks Woodbridge, Ontario, Canada Introduction Ethernet
More informationProtection Interoperability for WDM Optical Networks
384 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 8, NO 3, JUNE 2000 Protection Interoperability for WDM Optical Networks Olivier Crochat, Member, IEEE, Jean-Yves Le Boudec, Member, IEEE, and Ornan Gerstel,
More informationIndex Terms Backbone Networks Optimization, Resilience, Virtual Private Network, Traffic Demands and Traffic Flows
International Journal of Computer Science and Telecommunications [Volume 2, Issue 8, November 2011] 12 ISSN 2047-3338 Designing Different Models of Robust IP/MPLS over DWDM Networks Marko Rožman University
More informationTraffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks
Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Ankitkumar N. Patel, Chengyi Gao, and Jason P. Jue Erik Jonsson School of Engineering and Computer Science The University
More informationDynamic service Allocation with Protection Path
www.ijcsi.org 115 Dynamic service Allocation with Protection Path Loay Alzubaidi Department of Computer Engineering & Science, Prince Muhammad bin Fahd University AL-Khobar, Saudi Arabia Abstract Path
More informationOnePlanner. Unified Design System
DATA SHEET OnePlanner Unified Design System OnePlanner is an advanced multi-layer network design and optimization tool that leverages Ciena s extensive background in Layer 1 control plane planning and
More informationOPTICAL NETWORKS. Optical Metro Networks. A. Gençata İTÜ, Dept. Computer Engineering 2005
OPTICAL NETWORKS Optical Metro Networks A. Gençata İTÜ, Dept. Computer Engineering 2005 Introduction Telecommunications networks are normally segmented in a three-tier hierarchy: Access, metropolitan,
More informationA Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks
A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks Iyad Katib and Deep Medhi Computer Science & Electrical Engineering Department University of Missouri-Kansas City, USA {IyadKatib,
More informationInternet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks
Internet Traffic Characteristics Bursty Internet Traffic Statistical aggregation of the bursty data leads to the efficiency of the Internet. Large Variation in Source Bandwidth 10BaseT (10Mb/s), 100BaseT(100Mb/s),
More informationDynamic p-cycles selection in optical WDM Mesh networks
Research Online ECU Publications Pre. 2011 2005 Dynamic p-cycles selection in optical WDM Mesh networks ungmang Lo Daryoush Habibi Quoc Viet Phung Hoang Nguyen Byungkyu ang 10.1109/ICON.2005.1635625 This
More informationSURVIVABLE VNE. By Sedef Savas Networks Lab, May 25, 2017
SURVIVABLE VNE By Sedef Savas Networks Lab, May 25, 2017 1 SURVEY ON SURVIVABLE VIRTUAL NETWORK EMBEDDING PROBLEM AND SOLUTIONS Sandra Herker, Ashiq Khan, Xueli An DOCOMO Communications Laboratories Europe
More informationTopology Design of Large-Scale Optical Networks. Yufeng Xin
ABSTRACT Yufeng Xin. Topology Design of Large-Scale Optical Networks. (Under the direction of Professor George N. Rouskas and Professor Harry G. Perros). Optical networks consisting of optical cross-connects(oxcs)
More informationBW Protection. 2002, Cisco Systems, Inc. All rights reserved.
BW Protection 2002, Cisco Systems, Inc. All rights reserved. 1 Cisco MPLS - Traffic Engineering for VPNs Amrit Hanspal Sr. Product Manager MPLS & QoS Internet Technologies Division 2 Agenda MPLS Fundamentals
More informationResilient Packet Rings with Heterogeneous Links
Resilient Packet Rings with Heterogeneous Links Mete Yilmaz Edge Routing Business Unit Cisco CA 95134, USA myilmaz@cisco.com Nirwan Ansari Department of Electrical and Computer Engineering New Jersey Institute
More informationA Comparison of Path Protections with Availability Concern in WDM Core Network
A Comparison of Path Protections with Availability Concern in WDM Core Network M. A. Farabi Photonic Technology Lab, Universiti Teknologi, S. M. Idrus Member, IEEE Photonic Technology Lab, Universiti Teknologi,
More informationBandwidth Protection in MPLS Networks Using p-cycle Structure
Bandwidth Protection in MPLS Networks Using p-cycle Structure Jianghui Kang, Martin J. Reed Department of Electronic System Engineering University of Essex Colchester, CO4 3SQ, United Kingdom Email: {jkangf,
More informationReliable Video Broadcasts via Protected Steiner Trees
TOPICS IN OPTICAL COMMUNICATIONS Reliable Video Broadcasts via Protected Steiner Trees J. David Allen and Peter Kubat, Verizon Network and Technology ABSTRACT The introduction of the latest generation
More informationON JOINT RESTORATION OF PACKET-OVER-OPTICAL NETWORKS
ON JOINT RESTORATION OF PACKET-OVER-OPTICAL NETWORKS Chunxiao Chigan 1,2 Gary W. Atkinson 1 Ramesh Nagarajan 1 Thomas G. Robertazzi 2 1 Bell Labs, Lucent Technologies, 101 Crawfords Corner Road, NJ 07733
More informationSynchronous Optical Networking Service (SONETS)
Synchronous Optical Networking Service (SONETS) SONET, the U.S. standard for fiber optic synchronous transmission, enables the transport of voice, data, and multimedia information at rates ranging from
More informationRESILIENT PACKET RING TECHNOLOGY
1 RESILIENT PACKET RING TECHNOLOGY INTRODUCTION 1. An important trend in networking is the migration of packet-based technologies from Local Area Networks to Metropolitan Area Networks (MANs). The rapidly
More informationLarge scale SPVC ATM network
Written by Paul Holland and Don Wells Large scale SPVC ATM network Introduction: Asynchronous Transfer Mode (ATM) Data Networks differ from Internet Protocol (IP) Data Networks in many ways, but one of
More informationAnalysis and Algorithms for Partial Protection in Mesh Networks
1 Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman, Student Member, IEEE, Eytan Modiano, Fellow, IEEE, and Aradhana Narula-Tam, Member, IEEE Abstract This paper develops a novel
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationAVAILABILITY IMPROVEMENT OF WDM SYSTEM USING RING STRUCTURES
Journal of ELECTRICAL ENGINEERING, VOL. 62, NO. 5, 2011, 297 301 AVAILABILITY IMPROVEMENT OF WDM SYSTEM USING RING STRUCTURES Ivan RADOŠ This work deals with modelling and availability analysis for the
More informationWhy Service Providers Should Consider IPoDWDM for 100G and Beyond
Why Service Providers Should Consider IPoDWDM for 100G and Beyond Executive Summary The volume of traffic on service providers networks is growing dramatically and correspondingly increasing cost pressures.
More informationCHAPTER I INTRODUCTION. In Communication Networks, Survivability is an important factor
1 CHAPTER I INTRODUCTION In Communication Networks, Survivability is an important factor to be considered in planning and designing of Survivable Fiber Optic Networks (SFON). Survivability depicts network
More informationCommon Issues With Two Fiber Bidirectional Line Switched Rings
Common Issues With Two Fiber Bidirectional Line Switched Rings Document ID: 13556 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Working and Protect
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed
More informationA Novel Optimization Method of Optical Network Planning. Wu CHEN 1, a
A Novel Optimization Method of Optical Network Planning Wu CHEN 1, a 1 The engineering & technical college of chengdu university of technology, leshan, 614000,china; a wchen_leshan@126.com Keywords:wavelength
More informationData and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet
Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings,
More informationTo Infinity and Beyond! : Why 40km+ links matter, and what HSSG might do about it
To Infinity and Beyond! : Why 40km+ links matter, and what HSSG might do about it Prepared for March 2007 HSSG Meeting: Orlando FL Telcordia Contact: Name: Ted K. Woodward tkw@research.telcordia.com (732)
More informationBackup segments. Path after failure recovery. Fault. Primary channel. Initial path D1 D2. Primary channel 1. Backup channel 1.
A Segmented Backup Scheme for Dependable Real Time Communication in Multihop Networks Gummadi P. Krishna M. Jnana Pradeep and C. Siva Ram Murthy Department of Computer Science and Engineering Indian Institute
More informationSplitter Placement in All-Optical WDM Networks
plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National
More informationEffects of Rerouting After Service Disruption in MPLS based networks
Effects of Rerouting After Service Disruption in MPLS based networks BJØRN JÆGER, Bjorn.Jager@hiMolde.no KETIL DANIELSEN, Ketil.Danielsen@hiMolde.no Molde University College, Molde, NORWAY July 19, 2006
More informationAvailable online at ScienceDirect. Procedia Computer Science 34 (2014 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 34 (2014 ) 680 685 International Workshop on Software Defined Networks for a New Generation of Applications and Services
More information198 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005
198 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005 Approximating Optimal Spare Capacity Allocation by Successive Survivable Routing Yu Liu, Member, IEEE, David Tipper, Senior Member,
More informationBest Practices When Configuring Circuits on the ONS 15454
Best Practices When Configuring Circuits on the ONS 15454 Document ID: 13557 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Automatically Provisioned
More informationGeneralized Multiprotocol Label Switching (GMPLS)
Generalized Multiprotocol Label Switching (GMPLS) Definition and Overview The premise of multiprotocol label switching (MPLS) is to speed up packet forwarding and provide for traffic engineering in Internet
More informationEfficient path protection using Bi-directional WDM transmission technology. Title
Title Efficient path protection using Bi-directional WDM transmission technology Author(s) Li, J; Yeung, KL Citation Globecom - Ieee Global Telecommunications Conference, 2005, v. 4, p. 1910-1914 Issued
More informationAVALANCHE: A NETWORK CODING ANALYSIS
COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application
More informationAn Efficient Way to Optimize Bandwidth using Dedicated Path Protection for Sonet/SDH Network
An Efficient Way to Optimize Bandwidth using Dedicated Path Protection for Sonet/SDH Network 1 Deepak Dhadwal, 2 Karishma Bajaj 1, 2 (Department of Electronics & Communication, M.M University, Ambala,
More informationSystem Applications Description
NT7E65DJ 323-1111-150 SONET Transmission Products S/DMS TransportNode / NE TBM System Applications Description Standard Rel 14 February 2001 What s inside... / network element applications Copyright 1992
More information