scholarly journals An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks

2017 ◽  
Vol 3 (1) ◽  
pp. 11-18 ◽  
Author(s):  
Nogbou G. Anoh ◽  
Michel Babri ◽  
Ahmed D. Kora ◽  
Roger M. Faye ◽  
Boko Aka ◽  
...  
Author(s):  
Toshiaki Suzuki ◽  
Hiroyuki Kubo ◽  
Hayato Hoshihara ◽  
Taro Ogawa

A packet transport network recovery system based on failure pattern under examination of transmission quality is proposed. Network failures are segmented into one of the three patterns: single failure of a node, failures of multiple nodes, and failures of multiple network areas. The single failure is recovered by a protection scheme. For failures of multiple nodes or multiple areas, recovery is performed by a node-based multiple-backup operation plane scheme or by an area-based multiple-back operation plane scheme, respectively. A unique recovery ID is assigned to each failure pattern and backup paths with the recovery ID are stored in each node. When network failures occur, the network management server determines the type of failure and sends the appropriate recovery ID to the nodes. Then recovery paths are configured. Our proposed system took about 0.5[Formula: see text]s to configure 1000 backup paths after failures were detected, compared to about 4[Formula: see text]s by a conventional scheme. For the examination of data transmission quality, multiple paths that do not share the same link are grouped and configured concurrently. The number of groups is regarded as the performance of the configuration. The performance of the proposed system is about three times faster than a configuration without grouping.


2007 ◽  
Vol 18 (2) ◽  
pp. 163-168 ◽  
Author(s):  
Lei Guo ◽  
Lemin Li ◽  
Hongfang Yu ◽  
Jin Cao

2007 ◽  
Author(s):  
Yue Wang ◽  
Xianqing Wang ◽  
Yueming Lu ◽  
Yuefeng Ji

Author(s):  
Paolo Monti ◽  
Lena Wosinska ◽  
Cicek Cavdar ◽  
Andrea Fumagalli ◽  
Jiajia Chen

<div>Originally, networks were engineered to provide only one type of service, i.e. either voice or data, so only one level of resiliency was requested. This trend has changed, and today’s approach in service provisioning is quite different. A Service Level Agreement (SLA) stipulated between users and service providers (or network operators) regulates a series of specific requirements, e.g., connection set-up times and connection availability that has to be met in order to avoid monetary fines. In recent years this has caused a paradigm shift on how to provision these services. From a “one-solution-fits-all” scenario, we witness now a more diversified set of approaches where trade-offs among different network parameters (e.g., level of protection vs. cost and/or level of protection vs. blocking probability) play an important role.</div><div>This chapter aims at presenting a series of network resilient methods that are specifically tailored for a dynamic provisioning with such differentiated requirements. Both optical backbone and access networks are considered. In the chapter a number of provisioning scenarios - each one focusing on a specific Quality of Service (QoS) parameter - are considered. First the effect of delay tolerance, defined as the amount of time a connection request can wait before being set up, on blocking probability is investigated when Shared Path Protection is required. Then the problem of how to assign “just-enough” resources to meet each connection availability requirement is described, and a possible solution via a Shared Path Protection Scheme with Differentiated Reliability is presented. Finally a possible trade off between deployment cost and level of reliability performance in Passive Optical Networks (PONs) is investigated.&nbsp;The presented results highlight the importance of carefully considering each connection’s QoS parameters while devising a resilient provisioning strategy. By doing so the benefits in terms of cost saving and blocking probability improvement becomes relevant, allowing network operators and service providers to maintain satisfied customers at reasonable capital and operational expenditure levels</div>


Author(s):  
Jian Yuan ◽  
Jie Zhang ◽  
Yongli Zhao ◽  
Chen Ma ◽  
Ruiying He

Sign in / Sign up

Export Citation Format

Share Document