共查询到20条相似文献,搜索用时 0 毫秒
1.
We present a monitoring system for a dynamic network in which a set of domain nodes shares the responsibility for producing and storing monitoring information about a set of visitors. This information is stored persistently when the set of domain nodes grows and shrinks. Such a system can be used to store traffic or other logs for auditing or can be used as a subroutine for many applications to allow significant increases in functionality and reliability. The features of our system include authenticating visitors, monitoring their traffic through the domain, and storing this information in a persistent, efficient, and searchable manner. The storage process is O(log n){hbox{-}}{rm competitive} in the number of network messages with respect to an optimal offline algorithm; we show that this is as good as any online algorithm can achieve and significantly better than many commonly used strategies for distributed load balancing. 相似文献
2.
Dynamic Grooming Algorithms for Survivable WDM Mesh Networks 总被引:6,自引:0,他引:6
Wen Haibo Li Lemin He Rongxi Yu Hongfang Wang Sheng Song Na 《Photonic Network Communications》2003,6(3):253-263
Within a WDM grooming mesh network and under the constraints of the number of transceivers per node and wavelength continuity, we propose a novel dynamic grooming graph which models the number of transceivers per node in addition to the usage of wavelength and bandwidth resources. Based on the grooming graph, we first propose a dynamic traffic-grooming algorithm called integrated grooming algorithm (IGA). And we also propose two dynamic survivable traffic-grooming algorithms, which are called protection per lightpath traffic-grooming algorithm (PPL) and protection per connection traffic-grooming algorithm (PPC). These algorithms are evaluated via simulations. 相似文献
3.
Arunita Jaekel 《Photonic Network Communications》2006,11(2):201-209
In recent years, there has been considerable research interest in the design of survivable wavelength division multiplexing
(WDM) networks. Many papers have proposed mixed-integer linear program (MILP) formulations as well as heuristics to optimally
allocate lightpaths, using protection based schemes. Such schemes provide quick and guaranteed recovery, but do not use resources
efficiently. About 50% of allocated resources remain idle, under fault-free conditions. If these “idle” resources were used
for low-priority connections (which could be pre-empted if necessary), the resource utilization would improve significantly.
This paper introduces two MILP formulations for priority-based dynamic lightpath allocation in survivable WDM networks. We define three different levels of service and allocate resources
based on the requested service level. An important advantage of our approach is that while we can handle multiple levels of
service, the traditional (single level) shared and dedicated path protection schemes can be treated simply as a special case
of the proposed formulations. The first formulation solves the problem optimally, but is quite time consuming. The second
formulation makes some simplifications, and is more efficient. The results demonstrate that our approach can significantly
improve resource utilization and is feasible for practical sized networks, particularly under low- to medium-traffic load.
For large networks and high traffic conditions, simpler heurtistic algorithms are more appropriate. In such cases, the proposed
MILP formulation can be a useful tool to validate the performance of the heuristics. 相似文献
4.
信息网络模型结构化研究方法综述 总被引:2,自引:0,他引:2
从统计性能层次,逻辑层次和时间层次对现代信息网络建模仿真及性能评价各种研究方法的发展历程,应用现状及研究方向进行综述,提出了为适应信息网络日益增长的系统复杂性,结构非线性的要求,结构化模型方法体系有待扩充和探索的有关问题。 相似文献
5.
6.
We consider a route in a rectilinear grid communications network and compute the ratio of the additional capacity per tandem node required to make the route immune to a single tandem node failure (which causes all arcs incident to the node to fail), divided by the additional capacity per arc required to make the route immune to a single arc failure. For any route satisfying a mild assumption, we prove the ratio is between 1 and 4/3. For random routes, we show that the expected value of the ratio is 10/9 for routes using 2 arcs, 202/189 for routes using 3 arcs, and has the limit (as the number of arcs increases to infinity) of 7/6. The theoretical results are in close agreement with empirical results, using a network design algorithm, for large data communications networks. 相似文献
7.
8.
IntegratedVP-BasedControlStrategiesforATMSurvivableNetworks¥ChenShanzhi;ChengShiduan;andChenJunliang(StateKeyLaboratoryofSwit... 相似文献
9.
Maher Ali 《Networking, IEEE/ACM Transactions on》2006,14(6):1388-1399
Shared path protection has been demonstrated to be a very efficient survivability scheme for optical networking. In this scheme, multiple backup paths can share a given optical channel if their corresponding primary routes are not expected to fail simultaneously. The focus in this area has been the optimization of the total channels (i.e., bandwidth) provisioned in the network through the intelligent routing of primary and backup routes. In this work, we extend the current path protection sharing scheme and introduce the Generalized Sharing Concept. In this concept, we allow for additional sharing of important node devices. These node devices (e.g., optical-electronic-optical regenerators (OEOs), pure all-optical converters, etc.) constitute the dominant cost factor in an optical backbone network and the reduction of their number is of paramount importance. For demonstration purposes, we extend the concept of 1:N shared path protection to allow for the sharing of electronic regenerators needed for coping with optical transmission impairments. Both design and control plane issues are discussed through numerical examples. Considerable cost reductions in electronic budget are demonstrated 相似文献
10.
11.
12.
Wavelength division multiplexed (WDM) networks are matured to provide, scalable data centric infrastructure, capable of delivering flexible, value added, high speed and high bandwidth services directly from the optical domain. Optical virtual private networks (OVPNs) make use of the concept of highly reconfigurable nature of lightpaths offered by WDM, to create secure tunnels of high bandwidth across the intelligent WDM optical transport network. An OVPN is a private connection between two or more edge devices (access nodes), that allows a group of clients to fully exploit the flexibility of the switched intelligent optical network. However, OVPNs will not be a viable alternative unless they can guarantee a predictable bandwidth, availability, response time, and fault-tolerance to users. In this paper, we study the problem of dynamically establishing lightpaths for OVPNs over intelligent optical transport networks to provide varying classes of service based on the type of primary and backup lightpaths and the number of backup lightpaths, when each OVPN is specified by the desired logical connectivity and Class of Service. The type of primary and backup lightpaths determines the QoS parameters such as response time and bandwidth. Whereas, the number of backup lightpaths determines the level of fault-tolerance and availability of OVPN. Based on the service classes, any OVPN in the network falls into one of the six classes viz. single dedicated primary and single dedicated backup (SDPSDB), single dedicated primary and multiple dedicated backups (SDPMDB), single dedicated primary and single shared backup (SDPSSB), single shared primary and single shared backup (SSPSSB), single shared primary and multiple shared backups (SSPMSB), and best-effort (BE). In BE, we consider two variations—(1) OVPN as dedicated logical ring topology (DLRT) and (2) OVPN as shared logical ring topology (SLRT). We conduct extensive simulation experiments to compare and evaluate the effectiveness of different classes of OVPNs for varying network configurations–varying number of fibers, wavelengths on physical links, and number of nodes in OVPN. 相似文献
13.
14.
Design of Survivable Networks with Connectivity Requirements 总被引:2,自引:0,他引:2
In this paper we study the problem of survivable network design (SND). The problem can be stated as follows: Given a set of nodes, possible edges and costs for each edge and the number of permitted node or edge failures between each pair of nodes, we want to design a cost effective communications network which has the property that there is at least one communication route present between all the communicating node pairs, even in the case of node or link failure. We present the formulation of the problem and present a solution technique based on a constraint addition approach. We decompose the problem into smaller problems that are computationally not difficult to solve. We use the solutions of these smaller problems to generate new constraints that are added to the overall design problem. This iterative procedure is able to solve the survivable network design problem very efficiently. Extensive computational results show the effectiveness of our solution procedure. 相似文献
15.
Present analog cordless telephones suffer from lack of privacy, limited facilities and can support only a relatively low density of users. This restricts their benefits and market opportunities. Hence the need for an advanced cordless telecommunications service (ACTS). Consideration is given here to the needs of this service in terms of requirements, demand, system aspects, spectrum needs, propagation, and performance. This leads to a proposed system design for the service which is already under consideration within Europe. It uses 32 kbit/s speech encoding and time-division duplex operation to achieve both-way speech communication on a single 100 KHz-wide radio channel. A pool of radio channels are available to choose from at both base and handset in order to minimize overall interference and maximize system capacity. The addition of another aerial at only the base unit can provide the full spatial diversity improvement to both directions of transmission. The service is due for introduction in the United Kingdom in 1987. 相似文献
16.
17.
C. M. Russell M. R. Holladay P. B. Barnsley M. Martin J. Dobson 《BT Technology Journal》1999,17(2):147-162
The telecommunications industry is becoming both more co-operative and more competitive and this has dramatic consequences on the character of operational support. Operational activities make up the majority of telecommunications companies, and investment in these activities is huge. Dynamic markets and emerging new roles and supply chains stress the design of such operational systems and processes, some of which can trace their origins back to the monopolistic days of the past. This paper presents preparatory work in the search for new architectural tools to prepare operational support for the next millennium. The paper provides a definition for a value-adding enterprise and shows how conversation theory can help analyse the interaction of roles within an enterprise model. Such models can describe the interaction between responsibilities within enterprises and, in future, the required operational support systems, activities, data and processes. 相似文献
18.
19.
By arranging a small number of arrayed-waveguide gratings in survivable topologies with specific interconnection patterns, we can construct passive optical networks with a high degree of protection. A variety of designs are presented that differ in the level of survivability, the protection mechanism, and the amount of required end-user equipment. 相似文献
20.
This paper describes an advanced scheduling system and method for generating large volumes of calls to be used for testing a telecommunications network. The system is capable of preparing large-scale and complex network tests by viewing the task as a scheduling problem. The various requirements of the scheduling problem are analysed and represented as constraints or optimisation criteria. A fast heuristic method is proposed for solving the problem. The approach is based on a greedy algorithm for constructing solutions and it incorporates limited backtracking and dynamic value-ordering heuristics. The algorithm and system are currently being used for call charge verification in BT's PSTN and CSP networks. 相似文献