首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 656 毫秒
1.
In an optical WDM mesh network, different protection schemes (such as dedicated or shared protection) can be used to improve the service availability against network failures. However, in order to satisfy a connections service-availability requirement in a cost-effective and resource-efficient manner, we need a systematic mechanism to select a proper protection scheme for each connection request while provisioning the connection. In this paper, we propose to use connection availability as a metric to provide differentiated protection services in a wavelength-convertible WDM mesh network. We develop a mathematical model to analyze the availabilities of connections with different protection modes (i.e., unprotected, dedicated protected, or shared protected). In the shared-protection case, we investigate how a connection's availability is affected by backup resource sharing. The sharing might cause backup resource contention between several connections when multiple simultaneous (or overlapping) failures occur in the network. Using a continuous-time Markov model, we derive the conditional probability for a connection to acquire backup resources in the presence of backup resource contention. Through this model, we show how the availability of a shared-protected connection can be quantitatively computed. Based on the analytical model, we develop provisioning strategies for a given set of connection demands in which an appropriate, possibly different, level of protection is provided to each connection according to its predefined availability requirement, e.g., 0.999, 0.997. We propose integer linear programming (ILP) and heuristic approaches to provision the connections cost effectively while satisfying the connections' availability requirements. The effectiveness of our provisioning approaches is demonstrated through numerical examples. The proposed provisioning strategies inherently facilitate the service differentiation in optical WDM mesh networks.  相似文献   

2.
One of the major challenges of optical network operators is ensuring the stringent levels of availability required by their highest-class clients. To achieve this, we introduce relative priorities among the different primary connections contending for access to the protection paths. In this letter, we propose an analytical model for the proposed priority-enabled scheme. As a key distinguishing feature from existing literature, we derive explicit analytic expressions for the average availability and service disruption rate for the different priority classes  相似文献   

3.
A persisting major challenge for optical network operators is to meet the various availability requirements of the different subscribed services through the deployment of effective protection strategies. Priority-aware shared protection is a promising scheme that has been proposed in the open literature as a potential approach to tackling this challenge. However, the priority-aware protection strategy is rigid in the sense that it privileges the high priority connections regardless of the low priority ones. Hence, this letter proposes to improve priority-aware protection by introducing the mutation probability parameter. This parameter expresses the likelihood that a highpriority connection be relegated temporarily to a lower priority level during recovery. In this way, the mutation-based protection strategy offers optical operators the possibility to increase the availability of their low-priority clients without violating the availability requirements of their high-priority ones. Performance of this novel protection strategy is analyzed in this letter by precisely calculating the connection availabilities resulting from its deployment.  相似文献   

4.
Internet protocol (IP) traffic connections arrive dynamically at wavelength‐division multiplexing (WDM) network edges with low data rates compared with the wavelength capacity, availability, and quality‐of‐service (QoS) constraints. This paper introduces a scheme to be integrated into the control and management plane of IP/WDM networks to satisfy the availability and QoS required for IP traffic connections bundled onto a single wavelength (lightpath) in WDM networks protected by shared‐backup path protection (SBPP). This scheme consists of two main operations: (i) routing multi‐granular connections and traffic grooming policies, and (ii) providing appropriate shared protection on the basis of subscribers’ service‐level agreements in terms of data rate, availability, and blocking probability. Using the Markov chain process, a probabilistic approach is developed to conceive connection blocking probability models, which can quantify the blocking probability and service utilization of M:N and 1:N SBPP schemes. The proposed scheme and developed mathematical models have been evaluated in terms of bandwidth blocking ratio, availability satisfaction rate, network utilization, and connection blocking probability performance metrics. The obtained research results in this paper provide network operators an operational setting parameter, which controls the allocation of working and backup resources to dynamic IP traffic connections on the basis of their priority and data rate while satisfying their requirements in terms of bandwidth and availability. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

5.
We propose a dynamic joint scheduling and call admission control (CAC) scheme for service classes defined in IEEE 802.16 standard. Using priority functions, equipped with service weights and service arrival rates, the proposed scheduling scheme differentiates service classes from each other. Based on obtained priority values, we first allocate the achievable bandwidth proportionally. Within individual service classes, we then use appropriate local schedulers to transmit packets accordingly. Moreover, instead of immediate admitting or blocking a new connection request, the proposed CAC scheme computes the average transmission rate that can be allocated to that connection during a time interval. The connection is admitted if its required rate is satisfied while at the same time QoS requirements of ongoing connections are not violated. Our numerical results demonstrate the effectiveness of the proposed schemes compared to the other schemes in the literature.  相似文献   

6.
The article first presents a broad overview of the fault management mechanisms involved in deploying a survivable optical mesh network which employs optical crossconnects. We review various protection and restoration schemes, primary and back-up route computation methods, shareability optimization, and dynamic restoration. We then describe different parameters that can measure the quality of service provided by a WDM mesh network to upper protocol layers (e.g., IP network backbones, ATM network backbones, leased lines, virtual private networks), such as service availability, service reliability, restoration time, and service restorability. We review these concepts, the factors that affect them, and how to improve them. In particular, we present a framework for cost-effective availability-aware connection provisioning to provide differentiated services in WDM mesh networks. Through the framework, the more realistic scenario of multiple near-simultaneous failures can be handled. In addition, the emerging problem of protecting low-speed connections of different bandwidth granularities is also reviewed.  相似文献   

7.
The Internet is a platform providing connection channels for various services. Whereas for services like email the best‐effort nature of the Internet can be considered sufficient, other services strongly depend on service‐specific connection quality parameters. This quality dependence has led to dedicated content distribution networks as a workaround solution for services like YouTube. Such workarounds are applicable to a small number of services only. With the global application of the Internet, the impact of quality of service varies from annoyance due to jitter in VoIP communication to endangering human lives in telemedicine applications. Thus network connections with end‐to‐end quality guarantees are indispensable for various existing and evolving services. In this paper we consider point‐to‐point multi‐domain network connections for which the end‐to‐end quality has to be assured. Our contribution includes the classification of fault cases in general and countermeasures against end‐to‐end performance degradation. By correlating events and reasonable countermeasures, this work provides the foundation for quality assurance during the operation phase of end‐to‐end connections. We put our contribution in the context of a vision of global‐goal‐aware self‐adaptation in computer networks and outline further research areas that require a similar classification to the work provided here. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

8.
IEEE 802.16 standard lacks a Media Access Control (MAC) scheduling architecture to enforce Quality of Service (QoS) requirements of different services classes. In this paper, we propose an opportunistic and optimized scheduler that meets connections' QoS requirements while it pledges fairness among admitted connections. Our approach involves separating the scheduling problem into two sub‐problems. In the first sub‐problem, which addresses interclass time‐slots allocation, the proposed scheduler calculates the optimum number of time‐slots in each time frame corresponding to the service classes with the objective of minimizing the blocking probability of each class. In the second sub‐problem, the intraclass slot allocation problem, time‐slots for each class are allocated using an integrated cross‐layer priority functions (PFs) that provide proportional fairness among a class connections. The simulation results reveal that the proposed scheduler realizes our objectives, and provides efficient QoS scheduling without starving the connections of the BE class. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

9.
The service level agreement (SLA) specifies the service availability that a service provider promises to a customer. Through introducing SLA into optical packet switching networks, a balancing scheme for quality of service-aware service provisioning is proposed, which uses packet loss ratio as availability index to obtain a larger number of SLA-satisfied services and achieve a better balance among different level services by means of discarding packets with better packet loss capacity in priority to fully make use of the capacity of services themselves. The theoretical analysis and simulation results show that the proposed scheme outperforms the other two typical service provisioning schemes in terms of the above two aspects.  相似文献   

10.
The demand for multimedia services, such as voice over Internet Protocol, video on demand, information dissemination, and ?le sharing, is increasing explosively in wireless local area networks. These multimedia services require a certain level of QoS. Thus, it is important to provide QoS for multimedia applications. IEEE 802.11e tries to meet the QoS requirement of multimedia services by using Enhanced Distributed Channel Access. This gives more weights to high‐priority tra?c than low‐priority tra?c in accessing the wireless channel. However, Enhanced Distributed Channel Access suffers from many problems such as low aggregate throughput, high collision rates, and ineffective QoS differentiation among priority classes. In this paper, we propose a new medium access scheme, the Arbitration Interframe Space‐controlled Medium Access Control (AC‐MAC), that guarantees absolute priority in 802.11 wireless networks. In AC‐MAC, the AIFS and contention window values are controlled, so that a higher‐priority tra?c can preferentially access and effectively utilize the channel. Extensive simulations show that AC‐MAC can perfectly provide absolute priority and good throughput performance regardless of the number of contending nodes. In the simulation of voice over Internet Protocol service, AC‐MAC provides effective QoS differentiation among services and also meets the high level of QoS requirements. AC‐MAC also adapts quickly in a dynamic environment and provides good fairness among the nodes belonging to the same priority class. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

11.
Performance studies on LAN/MAN-BISDN interworking have mainly focused on the requirements of isochronous and connectionless services. In this paper we extend performance results to cover also the case of non-isochronous connection oriented (CO) services supported by the queued arbitrated (QA) mode of access of the DQDB protocol. Using this case we stress the more general issue of service integration impact on the interworking unit (IWU) architecture design in terms of protocol stacks and expected performance. We herein evaluate the performance of IWU architectures tailored to relay information in the lowest possible layer while implementing several service priority schemes and buffer management policies towards QoS objectives. The conditions under which the IWU design is efficient regarding performance, protocol complexity and implementation cost in this integrated services environment are identified.  相似文献   

12.
This paper investigates a generalized protection framework for availability-guaranteed connection provisioning in an optical wavelength-division-multiplexed (WDM) network. Reliability is a crucial concern in high-speed optical networks. A service level agreement (SLA), which mandates high service availability even in the face of network failures must be met in provisioning a reliable connection. In this study, a new link-state-modeling mechanism is developed to form a dynamic link-state parameter called link and resource availability (LRA), which represents physical-layer availability and resource status for an optical link. Such up-to-date link-state information can be used by a standard link-state routing protocol to efficiently provision reliable connections. Based on the link-state availability model, LRA, a connection-provisioning algorithm is then proposed which can guarantee customers' availability requirements. A new generalized protection model is developed through dynamic LRA-based provisioning. Numerical results demonstrate the performance of the proposed provisioning approach to be promising.  相似文献   

13.
We propose and experimentally demonstrate a service‐aware optical transport system. The proposed service‐aware optical transport system makes a flow based on service type and priority of traffic. The generated flow is mapped to a corresponding sub‐λ for transport over an optical network. Using sub‐λ provided by the centralized control plane, we could effectively provide quality‐of‐service guaranteed Ethernet service and best‐effort service simultaneously in a single link. The committed information rate (CIR) traffic and best‐effort traffic are assigned to different sub‐λs. The bandwidth of the CIR traffic is guaranteed without being affected by violation traffic because the bandwidth is managed per each sub‐λ. The failure detection time and restoration time from a link failure is measured to be about 60 µs and 22 ms, respectively, in the ring network. The measured restoration time is much smaller than the 50 ms industry requirement for real‐time services. The fast restoration time allows the proposed service‐aware optical transport system to offer high availability and reliability which is a requirement for transport networks.  相似文献   

14.
The static provisioning problem in wavelength-routed optical networks has been studied for many years. However, service providers are still facing the challenges arising from the special requirements for provisioning services at the optical layer. In this paper, we incorporate some realistic constraints into the static provisioning problem, and formulate it under different network resource availability conditions. We consider three classes of shared risk link group (SRLG)-diverse path protection schemes: dedicated, shared, and unprotected. We associate with each connection request a lightpath length constraint and a revenue value. When the network resources are not sufficient to accommodate all the connection requests, the static provisioning problem is formulated as a revenue maximization problem, whose objective is maximizing the total revenue value. When the network has sufficient resources, the problem becomes a capacity minimization problem with the objective of minimizing the number of used wavelength-links. We provide integer linear programming (ILP) formulations for these problems. Because solving these ILP problems is extremely time consuming, we propose a tabu search heuristic to solve these problems within a reasonable amount of time. We also develop a rerouting optimization heuristic, which is based on previous work. Experimental results are presented to compare the solutions obtained by the tabu search heuristic and the rerouting optimization heuristic. For both problems, the tabu search heuristic outperforms the rerouting optimization heuristic.  相似文献   

15.
The introduction of new service categories withdifferent bandwidth requirements, e.g., data and multimedia, to cellularmobile radio networks makes many of the traditional mechanisms for controlingtraffic unusable orless efficient. The call admission and the handover handling are of the mostsensitive issues in this extension to new services. The performance of allservices includingthe traditional voice and the new services can be dramatically affected ifappropriate schemes are not used. In this paper, we propose call admission andhandover handling schemes for a cellular mobile network that offers twoservice types: voice and data. The data connections are assumed to transmitatdifferent transmission rates that are integer multiples to that of one radiochannel. In the case of congestion, the base station asks the active dataconnections to reduce their transmission rate in order to provide freechannels for the newly arrived request of both service types. This isbasically intended for incoming handover requests. The request will berejected if the transmission rate of the active connections reaches a givenminimum rate. Similar mechanism can also be used for new call arrivals, butsome priority can be given to handovers by setting a higher transmission ratethreshold for the new call rejection. As an extension to the proposedscalability, aqueuing of new calls is also proposed and analyzed. Analytical models werebuilt for the two proposed schemes together with the traditional channelreservation scheme. The effect of different traffic and configurationparameters on the performance measures like the grade of service, blockingprobabilities, and utilization, are studied using the proposed technique.Results show that the proposed schemes provide very good performance and morefairness among the different service types.  相似文献   

16.
A Study of Path Protection in Large-Scale Optical Networks   总被引:1,自引:1,他引:0  
We consider the problem of designing a network of optical cross-connects (OXCs) which provides end-to-end lightpath services to large numbers of client nodes, under the requirement that the network will survive any single-link failure. Our main objective is to quantify the additional resource requirements of implementing path protection schemes over a network with no survivability properties. To this end, we present heuristic routing and wavelength assignment algorithms for dedicated path protection and two variants of shared path protection, and integrate them into the physical and logical topology design framework we developed in an earlier study. We apply our heuristics to networks with up to 1000 client nodes, with a number of lightpaths that is an order of magnitude greater than the number of clients, and for a wide range of values for system parameters such as the number of wavelengths per fiber, the number of optical transceivers per client node, and the number of ports per OXC. Our results provide insight into the relative resource requirements of dedicated and shared path protection schemes. We also find that, using shared path protection schemes, it is possible to build cost-effective survivable networks that provide rich connectivity among client nodes with only a modest additional amount of resources over a network with no survivability properties.  相似文献   

17.
In this work, we introduce a priority‐aware deterministic access protocol called Vehicular Deterministic Access (VDA). VDA is based on 802.11p/DSRC and allows vehicles to access the shared medium in collision‐free periods. Particularly, VDA supports two types of safety services (emergency and routine safety messages) with different priorities and strict requirements on delay. To avoid long delays and high packet collisions, VDA allows vehicles to access the wireless medium at selected times with a lower contention than would otherwise be possible within a two‐hop neighborhood by the classical 802.11p Enhanced Distributed Channel Access or Distributed Coordination Function schemes. A non‐VDA‐enabled vehicle, that is, a vehicle not configured with the optional VDA capability over 802.11p, may start transmitting on the shared channel just before or during the VDA opportunities reserved for vehicles with VDA capabilities. To avoid the aforementioned issues and prevent interfering transmissions from VDA‐enabled vehicles and non‐VDA‐enabled vehicles, we also proposed a novel scheme called extended VDA. We analyzed the impact of several design tradeoffs between the contention free period/contention period dwell time ratios on the performance of safety applications with different priorities for VDA and extended VDA. Simulations show that the proposed schemes clearly outperform the backoff‐based schemes currently used by 802.11p in high communication density conditions while bounding the transmission delay of safety messages and increasing the packet reception rate. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

18.
Optical networks employing wavelength- division multiplexing (WDM) are prone to failures. In case of a failure, the time to recovery is an important metric, since the amount of lost information and the performance of carried application strongly depends on the time of service interruption. Moreover, as the current trend in network development is moving toward a unified solution providing support for voice, data and various multimedia services, different application and users may tolerate different time of service interruption. Therefore, it is imperative to provide recovery-time guaranteed connections in WDM optical networks. In this paper, we propose a new shared-segment protection algorithm, called AGBSP-QoP, to provision connection requests according to their differentiated recovery-time requirements. Given a working path, AGBSP-QoP first computes all possible recovery-time guaranteed working-backup segment pairs, and then dynamically selects a least-cost eligible subset based on a dexterously constructed auxiliary graph. We conduct simulations under single class of service and multiple classes of service, and compare AGBSP-QoP with other protection algorithms. The results show that AGBSP-QoP yields the best performance and can properly provision connection requests according to their differentiated recovery-time requirements.  相似文献   

19.
User mobility management is one of the important components of mobile multimedia systems. In a cell-based network, a mobile should be able to seamlessly obtain transmission resources after handoff to a new base station. This is essential for both service continuity and quality of service assurance. In this paper, we present strategies for accommodating continuous service to mobile users through estimating resource requirements of potential handoff connections. A diverse mix of heterogeneous traffic with diverse resource requirements is considered. The investigate static and dynamic resource allocation schemes. The dynamic scheme probabilistically estimates the potential number of connections that will be handed off from neighboring cells, for each class of traffic. The performance of these strategies in terms of connection blocking probabilities for handoff and local new connection requests are evaluated. The performance is also compared to a scheme previously proposed by Yu and Leung (see IEEE J. Select. Areas Commun., vol.15, p.1208-25, 1997). The results indicate that using dynamic estimation and allocation, we can significantly reduce the dropping probability for handoff connections  相似文献   

20.
The introduction of high‐bandwidth demanding services such as multimedia services has resulted in important changes on how services in the Internet are accessed and what quality‐of‐experience requirements (i.e. limited amount of packet loss, fairness between connections) are expected to ensure a smooth service delivery. In the current congestion control mechanisms, misbehaving Transmission Control Protocol (TCP) stacks can easily achieve an unfair advantage over the other connections by not responding to Explicit Congestion Notification (ECN) warnings, sent by the active queue management (AQM) system when congestion in the network is imminent. In this article, we present an accountability mechanism that holds connections accountable for their actions through the detection and penalization of misbehaving TCP stacks with the goal of restoring the fairness in the network. The mechanism is specifically targeted at deployment in multimedia access networks as these environments are most prone to fairness issues due to misbehaving TCP stacks (i.e. long‐lived connections and a moderate connection pool size). We argue that a cognitive approach is best suited to cope with the dynamicity of the environment and therefore present a cognitive detection algorithm that combines machine learning algorithms to classify connections into well‐behaving and misbehaving profiles. This is in turn used by a differentiated AQM mechanism that provides a different treatment for the well‐behaving and misbehaving profiles. The performance of the cognitive accountability mechanism has been characterized both in terms of the accuracy of the cognitive detection algorithm and the overall impact of the mechanism on network fairness. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号