共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper provides an overview of p-cycle based optical multicast protection approaches for link failure recovery, combined node and link failure recovery, and source failure recovery on top of combined node and link failure recovery. We discuss several recently proposed p-cycle based optical multicast protection approaches, including the link-protecting p-cycle based optical multicast protection approach, the tree-protecting p-cycle based optical multicast protection approach, node-and-link protecting p-cycle based optical multicast protection approach, and flow p-cycle based optical multicast protection approach. They outperform other existing optical multicast protection approaches in both capacity efficiency and recovery speed. 相似文献
2.
3.
p-Cycle recovery relies on a protection switching protocol. We detail several issues for such a protocol taking the evolution from ring networks to p-cycles into account. In particular, we propose and evaluate a protocol enhancement to provide means for node failure protection. For the evaluation, we describe an integer linear program, which is applied to network design case studies, and formulate availability models for p-cycles. The case studies show that the protocol enhancement improves availability at marginal additional design cost. 相似文献
4.
Lee Heesang Song Hae‐Goo Chung Ji‐Bok Chung Sung‐Jin 《Telecommunication Systems》2000,14(1-4):243-267
The survivability for ATM based B‐ISDN has become an important challenge for telecommunication network planners and engineers.
In this paper, we consider multiple grades of reliability concept and a multilayer survivable network architecture for survivable
ATM networks. We address two complementary ATM VP restoration schemes in this paper. First, we propose preplanned rerouting
models and algorithms based on combinatorial optimization to prepare efficient backup VP configuration. We test two formulations
and algorithms for this problem. Efficient column generation technique to solve linear programming relaxation and strong valid
inequalities incorporating the branch‐and‐bound scheme are suitable to solve the problem to optimality within small time limits.
Second, we propose a new dynamic VP path restoration scheme to restore nonprotected VPs by the preplanned rerouting. Our protocol
has shown the advantage in restoration effectiveness comparing a well‐known protocol in computational simulation. We, finally,
address the relationships between the suggested models of this paper and the expected results of our ongoing project.
This revised version was published online in August 2006 with corrections to the Cover Date. 相似文献
5.
6.
7.
A path inflation control strategy for dynamic traffic grooming in IP/MPLS over WDM network 总被引:1,自引:0,他引:1
The use of alternate routes for traffic grooming in IP/MPLS over wavelength-division multiplexing (WDM) networks may lead to the propagation of congestion from one link to others in the IP/MPLS layer. This can be tackled by using the path inflation control (PIC) strategy proposed here for operating an IP/MPLS over WDM network in the overlay model. This supports dynamic traffic grooming with less blocking than other strategies. Network resource usage is also efficient as new lightpaths are set up for a new label switched path (LSP) request only when indicated by the congestion conditions. 相似文献
8.
A broader industrial application of mobile intelligent robots fails, especially at small and medium enterprises, because of its high cost. Therefore, worldwide current research is focused on developing “affordable—Cost-oriented (COR)” robots. One contribution to this field of research is to find favorable methods for path planning and navigation. Therefore, in this paper two new methods are presented which can be realized with low-cost hardware and software. Amongst others, these heuristics methods, compared to previously known methods, provide the advantage of low computation time, however, with a small loss of accuracy, negligible for most applications. 相似文献
9.
Multi-link failure restoration with dynamic load balancing in spectrum-elastic optical path networks
Bowen Chen Jie Zhang Yongli Zhao Chunhui Lv Wei Zhang Shanguo Huang Xian Zhang Wanyi Gu 《Optical Fiber Technology》2012,18(1):21-28
In this paper, we investigate network performance of multi-link failure restoration in spectrum-elastic optical path networks (SLICE). To efficiently restore traffic under multi-link failures, a novel survivable algorithm, named dynamic load balancing shared-path protection (DLBSPP), is proposed to compute primary and link-disjoint shared backup paths. The DLBSPP algorithm employs first fit (FF) and random fit (RF) schemes to search and assign the available spectrum resource. Traffic-aware restoration (TAR) mechanism is adopted in the DLBSPP algorithm to compute new routes for carrying the traffic affected by the multi-link failures and then the multi-link failures can be efficiently restored. Simulation results show that, compared with the conventional shared-path protection (SPP) algorithm, the DLBSPP algorithm achieves lower blocking probability (BP), better spectrum utilization ratio (SUR), more reasonable average hop (AH) and higher failure restoration ratio (FRR). Thus, the proposed DLBSPP algorithm has much higher spectrum efficiency and much better survivability than SPP algorithm. 相似文献
10.
11.
12.
SDH传输网中的光电路路由算法 总被引:4,自引:0,他引:4
根据目前在SDH传输网管中存在的快速开通光路和电路的具体需求,针对由若干环构成的网络拓扑较为复杂的SDH传输网提出了光电路路由算法和电路路由算法,算法以光电路分层模型为基础进行,能迅速进行光路和电路的路由调度。最后对算法进行了简单的分析。 相似文献
13.
Cognitive radio is a technological concept pushing for the introduction of intelligent radio operation that goes beyond traditional system adaptation. So far, a rather limited amount of work has been published on the cognitive mechanisms that should be embedded into communicating equipments to achieve such an intelligent behavior. This paper presents a generic cognitive framework for autonomous decision making with regard to multiple, possibly conflicting, operational objectives in a time-varying environment. The framework is based on the definition of two scales introducing order relationships between the configurations that help the reasoning and learning processes. The resulting cognitive engine learns to progressively identify the optimal configurations for the design objectives imposed given the current radio environment. The proposed approach is illustrated for a case of cognitive waveform design and extensive simulation results validate the cognitive engine behavior. 相似文献
14.
Due to the explosive growth of data-related traffic driven by the Internet, network reliability becomes an important issue. We investigate various protection approaches to handle failures for dynamic traffic demands in IP/MPLS-over-WDM networks. An LSP can be protected at either the IP/MPLS layer or the optical layer. In IP/MPLS layer protection, an LSP is protected by providing a link-disjoint backup LSP between its end nodes. In optical layer protection, an LSP is protected by the backup lightpath of each lightpath traversed by the LSP. We present two integrated routing algorithms: hop-based integrated routing algorithm and bandwidth-based integrated routing algorithm (BIRA) to set up the restorable bandwidth-guaranteed paths efficiently. Then we present a multilayer protection scheme for multiclass traffic in such networks. This scheme takes into account the different QoS and recovery requirements of the traffic to provide protection capability either at the MPLS layer or at the optical layer in a cost-effective manner. We use the connection blocking probability and number of optical-electrical-optical conversions as performance metrics to compare various protection approaches. 相似文献
15.
吕虹 《太赫兹科学与电子信息学报》2021,19(2):224-227
收集数据是部署无线传感网络(WSNs)的根本目的。采用移动信宿策略可有效缓解WSNs的能耗问题,信宿的移动路径是该策略的关键。为此,提出基于伪驻留点的数据收集(VRDC)算法。VRDC算法先依据驻留点规划信宿路径,再依据路径选择伪驻留点(VRPs)。VRPs可通过一跳直接向移动信宿传输数据,而其他的节点则将数据传输至最近的VRPs,进而减少传输跳数,降低能耗。仿真结果表明,提出的VRDC算法能有效降低能耗,并平衡节点间的能耗。 相似文献
16.
《AEUE-International Journal of Electronics and Communications》2007,61(6):353-362
This paper addresses the problem of shared path protection algorithm in survivable wavelength-division-multiplexing (WDM) optical networks, taking into consideration of differentiated reliability (DiR) under Shared-Risk-Link-Group (SRLG) constraint. A subset of network links that share the risk of failure at the same time are said to be in a common SRLG. Rather than the conventional complete SRLG-disjoint shared path protection, we introduce a heuristic Partial SRLG-disjoint Shared Path Protection algorithm (Pd-SPP) based on the concept of SRLG conditional failure probability, to provide differentiated reliability protection. The main target of our work is to improve the network resource utilization ratio under the DiR constraint. We adopt the ideas of partial SRLG-disjoint and the K-shortest paths algorithm such we can efficiently solve the “trap” problem. The experimental results show that our algorithm outperforms the complete SRLG-disjoint shared path protection in both blocking probability ratio and network resource utilization, i.e. the results are found to be promising. 相似文献
17.
18.
Embedding and reconfiguration algorithms for service aggregation in network virtualization 下载免费PDF全文
Yiming Jiang Julong Lan Zhiming Wang Yuanyuan Deng 《International Journal of Communication Systems》2016,29(1):33-46
Network virtualization and transmission quality optimization are promising techniques for future Internet. Previous researches on virtual network embedding focused on efficient utilization of network resources. In this paper, we present a virtual network embedding scheme that aims at improving the effect of transmission quality optimization. In order to enable more service benefit from optimization, the embedding algorithm presented in this paper follows the service aggregation embedding principle. We also develop a reconfiguration algorithm based on service aggregation and load balance. Simulation experiments demonstrate that the proposed algorithms can achieve good performance on service aggregation as well as efficient resource utilization. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
19.
This paper presented a simple monitoring, protection switching, and fast restoration approach for fiber to the home passive optical network (FTTH-PON) using Access Control System (ACS). ACS is developed for centralized monitoring and failure detection from central office (CO) in downstream direction (from CO towards customer sides). The proposed system architecture incorporating low cost and enable the network service providers and field engineers to remotely control the testing module from anywhere in the world and automatically identify any fiber fault and address the failure location in the fiber field. Another unique function of ACS is to provide the activation for optical switching in a restoration scheme which implemented at the drop region of FTTH-PON. A protection device named Customer Protection Device that comprises of programmable optical switches will be employed at the customer sides, just before the optical network unit, for rerouting the disrupted signals to the protection line when failure occurs in the working line to ensure continuous service delivery to customers. 相似文献