首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
吴满全 《移动通信》2014,(12):42-45
现有传输网中SDH、PTN、OTN三个网络分别进行路由及安全设计耗费了大量的人力和物力,而且无法达到预期的资源及安全效果。针对传输路由规划和多点故障保护难点,提出了利用OTN统一承载网实现核心汇聚路由自动分离及汇聚层端到端最短路径保护算法。通过此方案,可以用简单的方式实现路由自动分离及用少量的资源耗费实现多重保护,从而提升网络容灾能力。  相似文献   

2.
提出了智能光网中的备份路径的本地恢复、全局恢复和更为合理的两阶段恢复方案,并在GMPLs控制平面内设计了若干信令协议用于实现备份路径的建立与故障通知和恢复过程。该方案充分考虑了备份路径保护,能够提高预建立备份路径保护方案的可靠性。  相似文献   

3.
At the transport layer in interoffice and interexchange networks, shared protection rings (SPRINGS) interconnected at matched nodes can provide 100% restoration in milliseconds after cable cuts and central office failures. The author introduces the SPRING and explains how its capacity advantage over other ring configurations enables it to be the most economical solution in more applications. Transport restoration technologies-1+1 diversity, digital crossconnect systems, and SPRINGS-in interoffice and interexchange environments are compared. A representative network study is presented to justify the choice of SPRINGs and matched nodes for the target architecture. Recommendations on how to evolve today's asynchronous networks in preparation for a fully survivable SONET ring-based network are also provided. Generic ring planning guidelines and network examples are presented to demonstrate how today's networks can be evolved to provide end-to-end survivable SONET transport. An approach to ring-based network design that simplifies the planning process and minimizes network cost is provided  相似文献   

4.
提出了生存性技术的基本分类原则和光网络生存性的分层视图,在此范畴内,分析比较了包括纯链路、纯路径、Meta-Mesh、p-cycles、SBPP、SLSP在内的逻辑层生存性技术,最后总结出逻辑层生存性技术所具有的灵活性和容量利用高效率的特征.  相似文献   

5.
A common approach to overcome the limited nature of sensor networks is to aggregate data at intermediate nodes. A challenging issue in this context is to guarantee end-to-end security mainly because sensor networks are extremely vulnerable to node compromises. We propose three schemes to secure data aggregation that rely on multipath routing. The first guarantees data confidentiality through secret sharing, while the second and third provide data availability through information dispersal. Based on qualitative analysis and implementation, we show that by applying these schemes, a sensor network can achieve data confidentiality, authenticity, and protection against denial of service attacks even in the presence of multiple compromised nodes.  相似文献   

6.
Optical networks based on wavelength-division-multiplexing (WDM) techniques are very likely to be omnipresent in future telecommunication networks. Those networks are deployed in order to face the steady growth of traffic, which is for a large part Internet related. In the resulting IP-over-WDM scenario, TCP/IP constitutes an important fraction of the traffic transported over these networks. As IP networks are becoming increasingly mission-critical, it is of the utmost importance that these networks (and hence the supporting transport networks) be able to recover quickly from failures such as cable breaks or equipment outages. To that end, several IP-over-WDM network scenarios and corresponding protection and restoration strategies have been devised. It is clear that some trade-offs will have to be made in order to choose an appropriate strategy. In this paper, we investigate the effects of such recovery actions on the behavior of TCP, being the ubiquitous protocol used by today's network users. We examine the influence of different parameters such as the speed of recovery actions, changing length of the routes followed by the client data (TCP flows), changes in available bandwidth, etc. Thereby, we focus on what the TCP end-users care about, i.e., the number of bytes transported end-to-end within a certain time interval.  相似文献   

7.
The emergence of wireless multimedia sensor networks (WMSN) has given birth to several civilian as well as defense applications. Some of the interesting applications employing low cost sensor nodes to manipulate rich multimedia content include traffic monitoring, border surveillance, smart homes, environment and habitat monitoring. Unlike the traditional sensor networks which are aimed at maximizing network lifetime by decreasing energy utilization, the main objective of WMSNs is optimized delivery of multimedia content along with energy efficiency. Multimedia communications in WMSNs, has stringent delay and high bandwidth requirement as compared to scalar data transfer in WSNs. Fulfilling these constraints in resource and energy constrained WMSNs is a huge challenge. In WMSNs, each layer of the protocol stack is responsible and fully involved in providing QoS guarantees. There is a need for new schemes at each layer of the protocol stack- from advanced coding techniques that reduce encoder complexity and achieve maximum compression to dynamic routing and MAC protocols that provide service differentiation and reduce end-to-end latency. In wireless sensor networks, where all layers have dependency on each other, QoS guarantees are possible through the cross layer interaction of different layers. This paper gives an overview of the different existing layered schemes in WMSNs, followed by a discussion on the significance and efficiency gains that can be achieved from cross layer interactions in WMSNs along with the review of the existing cross layer approaches. Finally, we identify the open research issues which have not been adequately addressed so far.  相似文献   

8.
The exponentially growing number of Internet users armed with emerging multimedia Internet applications is continuously thirsty for more network capacity. Wavelength-division multiplexing networks that directly support IP-the so-called IP over WDM architecture-have the appropriate characteristics to quench this bandwidth thirst. As everyday life increasingly relies on telecommunication services, users become more and more demanding, and connection reliability is currently as critical as high capacity. Both IP and WDM layers can fulfil this need by providing various resilient schemes to protect users' traffic from disruptions due to network faults. This article first reviews the most common restoration and protection schemes available at the IP and WDM layers. These schemes may be present concurrently in the IP over WDM architecture, with the resilient mechanism of each connection specifically chosen as a function of the overall cost, application requirements, and management complexity. The article describes a versatile heuristic based on simulated annealing that may be adopted to optimize the concurrent use of IP restoration and WDM protection schemes in the same (mesh) network. The proposed heuristic allows varying the percentage of traffic protected by the WDM layer and that of traffic relying on IP restoration, taking into account topology constraints and network cost minimization. An additional feature of the proposed heuristic is the potential to trade solution optimality for computational time, thus yielding fast solutions in support of interactive design.  相似文献   

9.
In last decade,due to that the popularity of the internet, data-central traffic kept growing,some emerging networking requirements have been posed on the todays telecommunication networks,especially in the area of network survivability.Obviously,as a key networking problem,network reliability will be more and more important.The integration of different technologies such as ATM,SDH,and WDM in multilayer transport networks raises many questions regarding the coordination of the individual network layers.This problem is referred as multilayer network survivability.The integrated multilayer network survivability is investingated as well as the representation of an interworking strategy between different single layer survivability schemes in IP via generalized multi-protocol label switching over optical network.  相似文献   

10.
Supporting fast restoration for general mesh topologies with minimal network over-build is a technically challenging problem. Traditionally, ring-based SONET networks have offered close to 50 ms restoration at the cost of requiring 100% over-build. Recently, fast (local) reroute has gained momentum in the context of MPLS networks. Fast reroute, when combined with pre-provisioning of protection capacities and bypass tunnels, enables faster restoration times in mesh networks. Pre-provisioning has the additional advantage of greatly simplifying network routing and signaling. Thus, even for protected connections, online routing can now be oblivious to the offered protection, and may only involve single shortest path computations. In this paper, we are interested in the problem of reserving the least amount of the network capacity for protection, while guaranteeing fast (local) reroute-based restoration for all the supported connections. We show that the problem is NP-complete, and we present efficient approximation algorithms for the problem. The solution output by our algorithms is guaranteed to use at most twice the protection capacity, compared to any optimal solution. These guarantees are provided even when the protection is for multiple link failures. In addition, the total amount of protection capacity reserved by these algorithms is just a small fraction of the amount reserved by existing ring-based schemes (e.g., SONET), especially on dense networks. The presented algorithms are computationally efficient, and can even be implemented on the network elements. Our simulation, on some standard core networks, show that our algorithms work well in practice as well  相似文献   

11.
Advances in Wireless Video Delivery   总被引:12,自引:0,他引:12  
This paper reviews practical video delivery technologies, examining existing mobile networks, commercialized or standardized transport, and coding technologies. Compression efficiency, power dissipation, and error control are intrinsic issues in wireless video delivery. Among these issues, error control technologies are evaluated at four layers: 1) layer-1/2 transport; 2) end-to-end transport layer such as TCP/IP or RTP/UDP/IP; 3) error-resilience tool and network adaptation layer) and 4) source coder layer. Layer-1/2 transport tends to provide two distinct conditions: one quasi-error-free, in which upper layer error control technologies show a limited improvement, and one with a burst of errors during the fading period, in which the adaptability of error control is essential. Emerging mobile network quality of service will have a large variation of bandwidth and delay. Thus, adaptive rate control and error recovery are identified as more crucial issues for future research.  相似文献   

12.
文章结合当前电力光纤通信网的建设情况以及光纤网络技术的发展,阐述了基于同步数字体系(SDH)的网络主要的保护恢复方法及应用,网络互连时可采用的保护方式,并针对多层网络协同工作的问题,对基于SDH的多层网络生存性协调进行探讨,为网络拓扑的实际应用和网络结构的优化提供参考.  相似文献   

13.
ATM网络业务恢复机制研究   总被引:1,自引:0,他引:1  
提出了基于网管控制下的层次化ATM网络业务恢复管理机制,指出了在网络维护管理过程中采用多种恢复机制并进行层次化技术处理的重要性。ATM网络的正常可靠运行需要从网络各个层次,运用各种恢复管理机制对业务进行管理维护。在网络实际运行过程当中,联合应用网络各层次上的恢复管理机制是非常重要的。描述了该技术具体应用以及基于网管控制的业务恢复策略。  相似文献   

14.
The fast evolution of networks has been continuously driven by new advances in enabling technologies, as well as the growth of Internet traffic. All-optical packet switching provides high throughput, rich routing functionalities, and excellent flexibility. These characteristics make it an excellent candidate for next-generation metropolitan area networks, which will be much more dynamic and demanding than today's networks. In this article we not only discuss some of the architectural challenges involved in the design of all-optical packet switched networks, but also present the reader a high-level picture of how such future networks could be integrated with other network segments, to provide users end-to-end connectivity with performance and simplicity  相似文献   

15.
Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks (VANETs), etc. In this context, conventional routing schemes would fail, because they try to establish complete end-to-end paths, before any data is sent. To deal with such networks researchers have suggested to use flooding-based routing schemes. While flooding-based schemes have a high probability of delivery, they waste a lot of energy and suffer from severe contention which can significantly degrade their performance. With this in mind, we look into a number of ldquosingle-copyrdquo routing schemes that use only one copy per message, and hence significantly reduce the resource requirements of flooding-based algorithms. We perform a detailed exploration of the single-copy routing space in order to identify efficient single-copy solutions that (i) can be employed when low resource usage is critical, and (ii) can help improve the design of general routing schemes that use multiple copies. We also propose a theoretical framework that we use to analyze the performance of all single-copy schemes presented, and to derive upper and lower bounds on the delay of any scheme.  相似文献   

16.
A next-generation optical regional access network   总被引:2,自引:0,他引:2  
We describe an optical regional access network which combines electronic IP routing with intelligent networking functionality of the optical WDM layer. The optical WDM layer provides such networking functions as network logical topology reconfiguration, optical flow switching to offload traffic and bypass IP routers, wavelength routing of signals, protection switching and restoration in the optical domain, and flexible network service provisioning by reconfigurable wavelength connectivity. We discuss key enabling technologies for the WDM layer and describe their limitations. The symbiosis of electronic and optical WDM networking functions also allows support for heterogeneous format traffic and will enable efficient gigabit-per-second user access in next-generation Internet networks  相似文献   

17.
18.
The ever-increasing demand for network bandwidth makes network survivability an issue of great concern. Lightpath restoration is a valuable approach to guaranteeing an acceptable level of survivability in WDM optical networks with better resource utilization than that of its protection counterpart. Active restoration (AR) is a newly proposed lightpath restoration scheme [M. Mostafa et al. OSA Journal of Optical Networking, vol. 3, no. 4, pp. 247–260] that combines the best of protection and reactive restoration while avoiding their shortcomings. In this paper, we conduct detailed performance analysis on the restoration probability of AR-based WDM networks. In particular, analytical models of restoration probability are developed respectively for networks with full-wavelength conversion capability and for networks without wavelength conversion capability under different backup path searching schemes. Based on the new models, we investigate the effects of wavelength availability, wavelength conversion capability, path length as well as backup path seeking methods on the restoration probability.  相似文献   

19.
Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this context, conventional routing schemes fail, because they try to establish complete end-to-end paths, before any data is sent. To deal with such networks researchers have suggested to use flooding-based routing schemes. While flooding-based schemes have a high probability of delivery, they waste a lot of energy and suffer from severe contention which can significantly degrade their performance. Furthermore, proposed efforts to reduce the overhead of flooding-based schemes have often been plagued by large delays. With this in mind, we introduce a new family of routing schemes that "spray" a few message copies into the network, and then route each copy independently towards the destination. We show that, if carefully designed, spray routing not only performs significantly fewer transmissions per message, but also has lower average delivery delays than existing schemes; furthermore, it is highly scalable and retains good performance under a large range of scenarios. Finally, we use our theoretical framework proposed in our 2004 paper to analyze the performance of spray routing. We also use this theory to show how to choose the number of copies to be sprayed and how to optimally distribute these copies to relays.  相似文献   

20.
组播应用主要是一些带宽密集型的业务,而光网络又能够提供巨大的带宽.随着光通信技术的发展,在光层实现组播已经成为光网络研究的热点之一.主要讨论了在光层实现对组播业务的保护,对现有的保护方案进行了分类和比较研究,最后讨论了有待进一步研究的问题.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号