首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
This paper addresses the protection problem in WDM optical networks and presents a New Shared-risk link groups (SRLG)-Disjoint Path Provisioning (NSDPP) approach with shared protection to tolerate the single-risk failure. Comparing to previous Shared-risk link groups (SRLG)-Disjoint Path Provisioning (SDPP) approach, NSDPP is able to obtain better performance, because in NSDPP some primary path and backup paths of other primary paths can share the common resources if the corresponding rules can be satisfied. Simulation results are shown to be promising.  相似文献   

2.
This article addresses the ubiquitous topic of quality of service (QoS) aware connection provisioning in wavelength-routed WDM optical networks. The impact of the connection setup time of an optical connection has not been adequately addressed in the open literature. As such, this paper presents a novel approach that uses the optical connection setup time as a service differentiator during connection provisioning. The proposed approach utilizes the Earliest Deadline First (EDF) queueing algorithm to achieve deadline-based connection setup management with the deadline being the setup time requirement of an optical connection. The proposed EDF-based approach would allow the network operator to improve the QoS perceived by the end clients. Performance of this novel scheme is analyzed by accurately calculating various parameters, such as the fraction of connections provisioned on-time (i.e. prior to deadline expiration) and the average time it takes to successfully setup a connection. In addition, the presented approach is validated by a simulation that analyzes the performance of the proposed connection setup scheme in the specific context of the National Science Foundation Network (NSFNET). The obtained results show that a deadline-based setup strategy can minimize blocking probability while achieving QoS differentiation.  相似文献   

3.
The availability of an optical connection is considered to be a critical service differentiator in WDM optical networks. In this regard, the design of a protection scheme that improves the availability of high priority optical connections and makes efficient use of optical resources is a major challenge faced by optical network operators. In a previous study, we proposed the so-called priority-aware shared protection survivability scheme as a potential solution to this design issue.In this paper, we complement our previous study. More specifically, we develop an offline study whose main purpose is to assess the efficiency of the priority-aware shared protection scheme. Through this study, we show that the priority-aware shared protection strategy as opposed to existing protection strategies is able to achieve the best tradeoff between optical resource usage and optical connections’ availability satisfaction.  相似文献   

4.
This paper investigates the problem of dynamic survivable routing for shared segment protection in mesh Wavelength-Division-Multiplexing (WDM) optical networks. We propose a heuristic algorithm, named Recursive Shared Segment Protection (RSSP), to introduce a more flexible way to partition the working path into segments and compute the corresponding backup segments. In RSSP, the working segments cannot be determined before the backup segments are found, we adopt a recursive process to compute the backup segments one by one and then choose an optimized way to partition the working path. The calculations of every neighbor working segment and its backup segment are connected with each other. We constrain the hop count for each backup segment to insure the short failure recovery time and control the bandwidth resource utilization. Compared with the Share Path Protection (SPP), RSSP can achieve much shorter failure recovery time with a little sacrifice in bandwidth resource utilization and RSSP can also perform better compromise between the failure recovery time and the bandwidth resource utilization than the Equal-Length Segment Protection (ELSP) algorithm. We evaluate the effectiveness of RSSP and the results are found to be promising.  相似文献   

5.
《Computer Networks》2008,52(10):1975-1987
Legacy ring-based networks have been deployed in conjunction with SONET/SDH technology to provide survivability to transport networks, and they achieve service recovery within 50 ms after fault detection. Current generalized multiprotocol label switching (GMPLS)-controlled optical transport networks need efficient resilience mechanisms to allow recovery times equivalent to those granted by SONET/SDH networks. In this paper, dedicated and shared optical multiplex section (OMS) protection systems are proposed. Both solutions consist of a mechanism based on extensions of the GMPLS link management protocol (LMP) to properly manage the protection actions, and both utilize a new reconfigurable optical add/drop multiplexer (ROADM) design to support the protection schemes. The performance of both solutions has been experimentally evaluated.  相似文献   

6.
The protection design is a key issue in survivable wavelength division multiplexing (WDM) optical networks. Most researches focused on protecting unicast traffic against the failure of a single network component such as a link or a node. In this paper, we investigate the protection scheme for multicast traffic in meshed WDM optical networks under dual-link failure consideration, and propose a novel protection algorithm called shared segment protection with reprovisioning (SSPR). Through dynamically adjusting link-cost according to the current network state, SSPR establishes a primary light-tree and corresponding link-disjoint backup segments for each multicast connection request. A backup segment can efficiently share wavelength capacity of its working tree or the common resource of other backup segments. Capacity reprovisioning establishes new segments for the vulnerable connections after a link failure and tolerates following link failures. The simulation results show that SSPR not only can make good use of wavelength resources and protect multicast sessions against any single-link failure, but also can greatly improve the traffic restorability in the event of dual-link breakdown.  相似文献   

7.
W.  K.  G.   《Computer Communications》2007,30(18):3690-3697
The availability of an optical connection is considered to be a critical service differentiator in WDM optical networks. In this regard, the design of a protection scheme that is able to improve the availability of high priority connections while making efficient use of optical resources is a major concern for optical network operators. In a previous work, we proposed the so-called priority-aware shared protection as a potential survivability scheme for next generation WDM networks to deal with the previously exhibited concern.

This paper develops an online study whose main purpose is to assess the efficiency of the aforementioned protection scheme. Through this study, we show that the priority-aware shared protection strategy is able to achieve both the best efficiency in terms of resource usage and in terms of availability satisfaction rate compared to existing protection solutions.  相似文献   


8.
在波长路由全光网中,波长转换以及路由和波长分配算法(RWA)是降低网络阻塞率、改善网络性能的两个重要方法。研究了树形网络中波长转换器的配置问题,结合树形网络的特点,对影响波长转换器配置的主要因素进行了分析。综合路径长度、路径通信负荷以及节点的度,提出了基于网络直径的波长转换器配置算法和基于网络中心的波长转换器配置算法。通过算法演示和仿真,表明提出的两种算法各有优点。  相似文献   

9.
《Computer Networks》2008,52(7):1492-1505
With the development of real-time applications, the traffic recovery time, which is defined as the duration between the failure occurrence on the working path and the interruptive traffic has been successfully switched to the backup path, has become the basic Quality-of-Service (QoS) requirement in survivable WDM networks. In this paper, we address the problem of shared sub-path protection with considering the constraint of traffic recovery time and propose a new heuristic algorithm called Traffic recovery time Constrained Shared Sub-Path Protection (TC_SSPP) to compute the working path and the Shared-Risk-Link-Group (SRLG)-disjoint backup sub-paths. The main target of our work is to improve the resource utilization ratio and reduce the blocking probability for dynamic network environment. By properly setting the delay parameter for each link and running the Delay Constrained Shortest Path Algorithm (DCSPA) to compute the backup sub-paths, TC_SSPP can effectively guarantee the traffic recovery time. Simulation results show that the proposed TC_SSPP can outperform the traditional algorithms.  相似文献   

10.
《Computer Networks》2008,52(10):1905-1915
This work proposes two different distributed strategies for provisioning lightpaths in the presence of optical physical-layer impairments in GMPLS networks. The first approach is a more classical one, which introduces new extensions to the OSPF-TE routing protocol. The other approach makes use of an Ant Colony Optimization (ACO) algorithm to adaptively calculate routes in the network by actively monitoring the aggregate optical power of each link.By using an analytical model to incorporate the constraints of the Amplified Spontaneous Emission (ASE) noise of the optical amplifiers into the routing, we demonstrate the effectiveness of our approaches by means of an illustrative numerical example.  相似文献   

11.
Although optical multistage interconnection networks (OMINs) promise to meet the ever growing demands of communication networks and multiprocessor systems in fast communication, they suffer from challenges such as path dependent loss and switch crosstalk. In this paper, we propose an innovative approach for reducing not only the path dependent loss but also the number of switch crosstalks in OMINs. Our approach is centered upon modelling OMINs with Petri nets and using the P-invariants method to determine the minimum number of stages mmin that is sufficient to establish requested communication patterns in variable-stage OMINs. Being composed of the smallest number of stages and consequently directional couplers (or photonic switches), mmin-stage OMIN employs minimal structure and, therefore, path dependent loss and also number of switch crosstalks reach the least possible values in the realization of requested communication patterns.We prove that the size of Petri nets created in this work is in polynomial dependence on the problem size which alleviates memory consumption significantly and ascertains the fact that memory capacity and performance of modern computers are indeed sufficient to run our task. We also show that the complexity results obtained in this research improve similar results reported in our previous paper. We carry out a series of computer experiments to confirm the effectiveness of the proposed approach.  相似文献   

12.
针对当前基于地址转发表实现链路层拓扑发现的典型算法在复杂多子网环境下应用存在的问题,提出利用下行链路完整地址转发表构建并优化同一子网交换设备间的最短路径,实现链路层拓扑自动发现的算法。经理论和实际环境验证,证明该算法可以较好地发现复杂多子网链路层拓扑结构,具有较强的实践意义和推广价值。  相似文献   

13.
This paper addresses the Delay-Shared Risk Link Groups (SRLG) constrained path protection problem in green WDM networks with sleep scheduling, and presents a Green Delay-SRLG Constrained Protection (GDSCP) approach. In order to balance the QoS (delay, SRLG reliability, etc.) and energy consumption, the path search algorithm in GDSCP adopts different principles in the search of the primary and backup paths. The choice of the primary path is optimal for the end-to-end delay while minimizing the node awaking to save energy. When necessary, the rarely used backup paths are allowed to go through more sleeping nodes that lead to potential node awaking to ensure the disjoint degree, and thus increase the SRLG reliability of the combined path. Besides the traditional wavelength sharing between backup paths, our approach further encourages paths of different connections to wake up common sleeping nodes to increase the utilization of the reserved node awaking and thus reduce the demand for the new node-state switching in the network. Comparing to the traditional energy-aware schemes, simulations show promising results that GDSCP can obtain significant improvement in terms of increasing the sleeping percentage of the network and reducing the number of node-state switching without sacrificing the performance of blocking rate.  相似文献   

14.
针对WDM光网络中的双链路故障,采用P-cycle与共享通路保护结合的方式来实现。其主要思路是:对给定的工作路径,在寻找一条与工作通路分离的保护通路的同时,再为工作通路上的每条链路寻找与保护通路部分分离的P-cycle。最后在三种不同的业务模型下进行了仿真,结果显示该算法能实现双链路故障的100%恢复,并且具有较低的阻塞率和资源冗余度。  相似文献   

15.
Multi-protocol label switching (MPLS) is an evolving network technology that is used to provide traffic engineering (TE) and high speed networking. Internet service providers, which support MPLS technology, are increasingly demanded to provide high quality of service (QoS) guarantees. One of the aspects of QoS is fault tolerance. It is defined as the property of a system to continue operating in the event of failure of some of its parts. Fault tolerance techniques are very useful to maintain the survivability of the network by recovering from failure within acceptable delay and minimum packet loss while efficiently utilizing network resources.In this paper, we propose a novel approach for fault tolerance in MPLS networks. Our approach uses a modified (k, n) threshold sharing scheme with multi-path routing. An IP packet entering MPLS network is partitioned into n MPLS packets, which are assigned to node/link disjoint LSPs across the MPLS network. Receiving MPLS packets from k out of n LSPs are sufficient to reconstruct the original IP packet. The approach introduces no packet loss and no recovery delay while requiring reasonable redundant bandwidth. In addition, it can easily handle single and multiple path failures.  相似文献   

16.
刘铭  毛玉明  冷甦鹏 《计算机应用》2018,38(10):2913-2917
面对干扰和窃听,传统的安全信息传输大都基于密钥加密的方法,在面向动态变化无线网络环境时会产生对称性密码系统的密钥分配、非对称性密码系统的高计算复杂度等问题。而快速增长的无线业务流量和物联网类型的海量设备接入,会引起计算复杂度的进一步提升和能量开销的激增。针对此问题,提出一种基于物理层安全技术的全双工无线供能物联网的安全通信方法,利用噪声和无线信道随机性来限制窃听者接收信息量。该方法首先基于信息论对全双工无线供能物联网安全容量进行分析,然后根据安全容量的分析模型推导得到了安全中断概率(SOP)的闭合表达式。最后,考虑到噪声、干扰机干扰、空间互干扰,以及残余自干扰等因素对安全容量的影响,提出一种全双工无线供能物联网安全波束成形方法,该方法通过降低联合干扰来增加发送和接收端的互信息量,提高全双工无线功能物联网的安全容量。通过蒙特卡罗仿真验证了推导结果的准确性,仿真结果表明,在安全容量和SOP指标上,全双工无线供能物联网比传统半双工无线功能物联网有较大性能增益。  相似文献   

17.
频谱灵活光网络中,为了降低业务保护路径上所需的资源,提出基于可控调制阶数的业务带宽压缩机制,根据业务的等级对业务进行灵活的柔性保护,提高网络的生存性。仿真结果表明,当路径上的频谱资源不足以恢复受损业务时,采用柔性保护技术在保证一定信号质量的前提下,可以降低业务传输所需的带宽,提高受损业务的恢复率。  相似文献   

18.
Many applications of location based services (LBSs), it is useful or even necessary to ensure that LBSs services determine their location. For continuous queries where users report their locations periodically, attackers can infer more about users’ privacy by analyzing the correlations of their query samples. The causes of path privacy problems, which emerge because the communication by different users in road network using location based services so, attacker can track continuous query information. LBSs, albeit useful and convenient, pose a serious threat to users’ path privacy as they are enticed to reveal their locations to LBS providers via their queries for location-based information. Traditional path privacy solutions designed in Euclidean space can be hardly applied to road network environment because of their ignorance of network topological properties. In this paper, we proposed a novel dynamic path privacy protection scheme for continuous query service in road networks. Our scheme also conceals DPP (Dynamic Path Privacy) users’ identities from adversaries; this is provided in initiator untraceability property of the scheme. We choose the different attack as our defending target because it is a particularly challenging attack that can be successfully launched without compromising any user or having access to any cryptographic keys. The security analysis shows that the model can effectively protect the user identity anonymous, location information and service content in LBSs. All simulation results confirm that our Dynamic Path Privacy scheme is not only more accurate than the related schemes, but also provide better locatable ratio where the highest it can be around 95 % of unknown nodes those can estimate their position. Furthermore, the scheme has good computation cost as well as communication and storage costs.Simulation results show that Dynamic Path Privacy has better performances compared to some related region based algorithms such as IAPIT scheme, half symmetric lens based localization algorithm (HSL) and sequential approximate maximum a posteriori (AMAP) estimator scheme.  相似文献   

19.
Liu  Xiaoming  Liu  Dong  Fu  Tianyu  Pan  Zhifang  Hu  Wei  Zhang  Kai 《Multimedia Tools and Applications》2019,78(12):15817-15838
Multimedia Tools and Applications - Optical coherence tomography (OCT) is a high-resolution and non-invasive imaging modality that has become one of the most prevalent techniques for ophthalmic...  相似文献   

20.
研究了多域光网络中的路由保护问题;为了克服多域光网络中可扩展性约束,提出了一种混合拓扑聚合方法。该方法结合了全连通和生成树拓扑聚合的优点,在网络中需要存储和发布的链路状态信息与聚合信息反映实际物理拓扑的精确性之间进行了折中;然后在此混合拓扑聚合方法的基础上,提出了一种基于查询机制的多域分段保护算法。仿真表明,相比传统的多域保护算法,该算法阻塞率低,可扩展性好。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号