首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Networks employ link protection to achieve fast recovery from link failures. While the first link failure can be protected using link protection, there are several alternatives for protecting against the second failure. This paper formally classifies the approaches to dual-link failure resiliency. One of the strategies to recover from dual-link failures is to employ link protection for the two failed links independently, which requires that two links may not use each other in their backup paths if they may fail simultaneously. Such a requirement is referred to as backup link mutual exclusion (BLME) constraint and the problem of identifying a backup path for every link that satisfies the above requirement is referred to as the BLME problem. This paper develops the necessary theory to establish the sufficient conditions for existence of a solution to the BLME problem. Solution methodologies for the BLME problem is developed using two approaches by: 1) formulating the backup path selection as an integer linear program; 2)developing a polynomial time heuristic based on minimum cost path routing. The ILP formulation and heuristic are applied to six networks and their performance is compared with approaches that assume precise knowledge of dual-link failure. It is observed that a solution exists for all of the six networks considered. The heuristic approach is shown to obtain feasible solutions that are resilient to most dual-link failures, although the backup path lengths may be significantly higher than optimal. In addition, the paper illustrates the significance of the knowledge of failure location by illustrating that network with higher connectivity may require lesser capacity than one with a lower connectivity to recover from dual-link failures.  相似文献   

2.
In optical Wavelength Division Multiplexing (WDM) networks, different protection schemes have been proposed in the literature, namely, dedicated protection and shared protection. Shared protection techniques significantly reduce the required spare capacity by providing the same level of availability as dedicated protection. However, current mission critical applications (which heavily depend on the availability of communication resources) require connection availability in the order of 99.999% or higher, which corresponds to a downtime of almost 5 min a year on the average. Therefore, in order to satisfy a connection serviceavailability requirement defined by the users Service Level Agreement in a cost-effective and resource-efficient way, network operators need a systematic mechanism to evaluate the network availability under multiple failure scenario to ensure that current network configuration can meet the required availability degree; otherwise, a network upgrade is required. Unfortunately, under multiple failure scenario, traditional availability analysis techniques based on reliability block diagrams are not suitable for survivable networks with shared spare capacity. Therefore, a new concept is proposed to facilitate the calculations of network availability. In this paper, we propose an analytical model for evaluating the availability of a WDM network with shared-link connections under multiple link failures. The analytical model is also verified using Monte Carlo simulation. The proposed model significantly contributes to the related areas by providing network operators with a quantitative tool to evaluate the system availability and, thus, the expected survivability degree of WDM optical networks with shared connections under multiple link failures.  相似文献   

3.
Traditional integer linear programming model for shared backup path networks allows only one working route and one backup route per demand and does not scale well. By introducing multiple working routes and backup routes, the traditional multi-flow model solves in a faster manner. This paper seeks improvements on the traditional multi-flow model and develops an algorithm to assess availability for multi-flow shared backup path protection models. Experiments on 165 networks testify that the newly proposed model is 51% faster on average with similar total cost and overall network availability, compared with the traditional multi-flow model. All the networks in this paper are designed to be 100% single-failure restorable, and major findings regarding these networks include: (1) total cost of assigning backup capacity to each span dwindles away with increasing network average nodal degree; (2) network availability first rises then falls as network average nodal degree increases; and (3) when network scale increases, network availability decreases with fluctuations. The results found are explained with two case studies in this paper.  相似文献   

4.
For the abundant bandwidth, a malfunction in optical networks causes a great deal of loss to traffic, and hence the survivability of optical networks must be considered. Two technologies, protection and restoration, are used in general, and the former is investigated in this paper. The existing protection strategies mainly cope with a single link failure or a double-link failure in an optical network and not consider what causes these failures. In this paper, we study the reasons which lead to the network malfunctions, and pose a new concept named regional demolishment. A protection algorithm named Ellipse-underlay algorithm is also proposed. We compare the performance of the Ellipse-underlay algorithm to the Node-disjoint algorithm. Simulation results show that the Ellipse-underlay algorithm is more effective to the survivability of traffic than the Node-disjoint algorithm.  相似文献   

5.
王杨杨  江上  方强 《数字通信》2012,39(6):12-14
在光网络中,节点和链路故障是光网络生存性的关键因素。P圈保护被认为是一种非常有前途的保护方式,有着高效、高速等特点。对光网络中的P圈保护单故障和多故障的策略和方式进行分析,并分析了基于树和基于段的光组播P圈保护策略。最后,指出P圈保护在未来光网络中的研究发展方向。  相似文献   

6.
Autonomic network management is an approach to the management of complex networks and services that incorporates the detection, diagnosis and reconfiguration, as well as optimization, of their performance. A control loop is fundamental as it facilitates the capture of the current state of the networks and the reconfiguration of network elements without human intervention. For new networking architectures such as software‐defined networking and OpenFlow networks, in which the control plane is moved onto a centralized controller, an efficient control loop and decision making are more crucial. In this paper, we propose a cognitive control loop based on a cognitive model for efficient problem resolving and accurate decision making. In contrast to existing control loops, the proposed control loop provides reactive, deliberative and reflective loops for managing systems based on analysis of current status. In order to validate the proposed control loop, we applied it to fault management in OpenFlow networks and found that the protection mechanism provides fast recovery from single failures in OpenFlow networks, but it cannot cover multiple‐failure cases. We therefore also propose a fast flow setup (FFS) algorithm for our control loop to manage multiple‐failure scenarios. The proposed control loop adaptively uses protection and FFS based on analysis of failure situations. We evaluate the proposed control loop and the FFS algorithm by conducting failure recovery experiments and comparing its recovery time to those of existing methods. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

7.
The introduction of the latest generation of ROADMs in the communication long-haul transport networks allows network planners to consider some new cost-effective design alternatives. Specifically, for video broadcast services ROADM wavelength drop-and-continue technology enables simple wavelength connections at each node via a tree-like topology, and the intelligent control plane permits the use of various shared protection schemes (with failure restoration switching times comparable to SONET BLSR). In this article we formulate models for reliable TV/video broadcast. We consider the network topologies based on minimum spanning trees. The objective is to minimize the total network cost while ensuring that the broadcast, originating in one (or two) source node(s), is delivered to a set of destination nodes and the network will tolerate at least one single link failure. The resulting protected tree networks are illustrated, and the cost of protection strategies is analyzed.  相似文献   

8.
Cloud-integrated fiber-wireless (FiWi) networks inheriting advantages of optical and wireless access networks have a broad prospect in the future. As various component failures may occur in cloud-integrated FiWi networks, survivability is becoming one of the key important issues. It is necessary to provide survivability strategies for cloud-integrated FiWi networks. Hence, this paper mainly focuses on the survivability of cloud-integrated FiWi networks against multiple fibers failure. Firstly, in this paper, a novel integer linear programming (ILP) solution is proposed to tolerate the failure of multiple distribution fibers with capacity and coverage constraints in the context of urban area. Then, considering the complexity of ILP models, an efficient heuristic scheme is proposed, in order to get the approximate solutions of ILP. Simulation results and analysis give the configurations of optical network units (ONUs) and wireless routers with different constraints and show the network coverage of clients for different number of ONUs and wireless routers with ILP solution and heuristic approach, respectively.  相似文献   

9.
Protected Working Capacity Envelope (PWCE) has been proposed to simplify resource management and traffic control for survivable WDM networks. In a PWCE-based network, part of the link capacity is reserved for accommodating working routes, and the remaining capacity is reserved for backup routes. The shortest path routing is applied in PWCE-based networks. An arrival call is accepted only when each link along the shortest path has a free working channel. Such a working path routing scheme greatly simplifies the call admission control process for dynamic traffic, and it is especially suitable for implementation in a distributed manner among network nodes. In this article, we investigate two protection strategies: Bundle Protection (BP) and Individual Protection (IDP). In BP, only one backup path can be used to protect a failure component, whereas multiple backup paths can be used in IDP. We formulate four mixed integer non-linear programming (MINLP) problems using BP and IDP strategies for single link and single node failure protection. Each model is designed to determine link metrics for shortest working path routing, working and backup channel assignments, and backup path planning. Our objective is to minimize call-blocking probability on the bottleneck link. Since these models are highly non-linear and non-convex, it is difficult to obtain exact global optimal solutions. We propose a Simulated Annealing-based Heuristic (SAH) algorithm to obtain near optimal solutions. This SAH adopts the concepts of simulated annealing as well as the bi-section technique to minimize call-blocking probabilities. To evaluate the performance, we made simulation comparisons between SAH and the unity link weight assignment scheme. The results indicate that SAH can greatly reduce call-blocking probabilities on benchmark and the randomly generated networks.  相似文献   

10.
Protection techniques for optical networks mainly rely on pre-allocated backup bandwidth, which may not be able to provide full protection guarantee when multiple failures occur in a network. After recovering from the previous failure, if failure occurs again, unprotected or vulnerable lightpaths cannot be recovered. In this paper, the minimal backup reprovisioning (MBR) problem is studied, in which the failure-independent path protecting p-cycles (FIPP p-cycles) scheme is considered for single-node failure on WDM networks. After recovering the affected lightpaths from a node failure, the goal of the MBR is to re-arrange the protecting and available resources such that working paths can be protected against next node failure if possible. An algorithm is designed to recover the protecting capabilities of the FIPP p-cycles, unless there is no sufficient network resource. The simulation results of the proposed method are also given.  相似文献   

11.
Comparison of failure dependent protection strategies in optical networks   总被引:2,自引:0,他引:2  
The criticality of survivable network design and operation increases with increasing transmission speed. Path protection strategies achieve better network utilization compared to link protection strategies; however, the recovery time of connections in path protection strategies are higher than that in link protection strategies. This paper evaluates and compares the performance of three failure dependent strategies: (1) failure dependent path protection; (2) link protection; and (3) Diversion—a variant of the segmented path protection approach. In addition, a framework for evaluating the connection recovery time is also developed. The protection strategies are compared for their recovery time and blocking performance using extensive simluations.  相似文献   

12.
New technologies and advanced network devices make it possible to move towards high capacity access networks able to satisfy the growing traffic demand. Wavelength division multiplexing (WDM) is considered as one of the promising technologies for the next generation access networks since it offers higher bandwidth and longer reach compared to the current technologies (such as time division multiplexing (TDM) based networks). However, the migration to a new technology is typically based on an overall techno-economic study which should assure the network operator that the new implementation is cost effective and profitable while able to provide the required services to the users. Another important aspect in the access network design is the network reliability performance, which can be improved by providing a certain level of protection for equipment and/or infrastructure with high failure impact ratio in order to prevent a big number of the users being affected by a single failure. The cost of protection should be carefully evaluated since providing the backup resources may be too expensive for a network operator.In this paper, we investigate the capital and operational expenditures for two next generation optical access (NGOA) networks based on the WDM technology in dense urban areas. Three scenarios with different splitting ratios are studied for each technology, with and without protection. The aim of this work is to investigate the impact of providing protection on the total cost of NGOA networks. The results show that in the dense urban areas the fibers and digging costs are highly shared among the end users but still vary according to the splitting ratios for different scenarios and the fiber layout. It also can be seen that with a proper fiber layout design, minor extra investment for protection of NGOA networks can make a significant saving on failure related operational cost and that operational expenditures depend significantly on the fiber layout.  相似文献   

13.
Automatic provisioning and recovery of lightpaths with selectable traffic engineering policies are considered basic features of near future optical transport networks (OTN). Worldwide researchers recognize generalized multi-protocol label switching (GMPLS) architecture as the viable control plane solution to achieve these issues in OTN. Growing effort is ongoing to find new recovery models for handling failure conditions in the networks, trying to set up alternative strategies to classical heavy-cost SDH/SONET protection techniques. In this paper, a pre-planned local repair recovery strategy is described. Allocation of primary paths is provided using the interference concept, in order to set a threshold between resources dedicated to working paths and those allocable for local backups in case of failure. Tests of the strategy are shown for a sample national optical transport network, aimed at valuing local-repair recovery times at different failure location and seriousness.  相似文献   

14.
Optical Network Survivability: Protection Techniques in the WDM Layer   总被引:2,自引:0,他引:2  
This paper is an introduction to survivability of WDM networks. All the main optical protection techniques proposed as far as now for the WDM layer are classified and reviewed. In particular, commonly adopted protection strategies for ring and mesh networks are explained. Moreover, off-line planning of WDM networks able to support path protection is briefly introduced. Finally, an example of heuristic network-capacity optimization is presented, discussing results obtained by considering a case-study network.  相似文献   

15.
Protection cycles in mesh WDM networks   总被引:4,自引:0,他引:4  
A fault recovery system that is fast and reliable is essential to today's networks, as it can be used to minimize the impact of the fault on the operation of the network and the services it provides. This paper proposes a methodology for performing automatic protection switching (APS) in optical networks with arbitrary mesh topologies in order to protect the network from fiber link failures. All fiber links interconnecting the optical switches are assumed to be bidirectional. In the scenario considered, the layout of the protection fibers and the setup of the protection switches is implemented in nonreal time, during the setup of the network. When a fiber link fails, the connections that use that link are automatically restored and their signals are routed to their original destination using the protection fibers and protection switches. The protection process proposed is fast, distributed, and autonomous. It restores the network in real time, without relying on a central manager or a centralized database. It is also independent of the topology and the connection state of the network at the time of the failure.  相似文献   

16.
The two protection methods wrapping and steering used in IEEE 802.17 resilient packet ring (RPR) provide fast but very inefficient and limited network failure recovery. Due to the increased length of the backup path, RPR suffers from high traffic loss, a decreased throughput-delay performance, and the lack of resilience against multiple link and/or node failures. To achieve an improved resilience, interconnecting a subset of the ring nodes by means of a dark-fiber single-hop star wavelength division multiplexing (WDM) network is proposed. In doing so, the ring network is divided into separate domains, each being fully recoverable from a single link or node failure without losing full network connectivity. A novel hybrid fault recovery technique, termed protectoration, is proposed and examined by means of probabilistic analysis and simulation in terms of stability, channel utilization, and throughput-delay performance. The proposed protectoration technique 1) combines the fast recovery time of protection and the bandwidth efficiency of restoration, 2) provides full recovery from multiple link and node failures, 3) builds on both wrapping and steering protection methods of RPR and, thus, allows for an evolutionary upgrade of existing RPR networks, and 4) does not require the convergence of routing protocols in response to failures and, thus, improves the routing stability and network availability. Numerical investigations in this paper show that the location of failures has a strong impact on the network performance. For a given failure location, the protectoration technique is able to accommodate multiple ring failures without significant performance loss.  相似文献   

17.
WDM optical networks allow the transmission of multiple services with high rates and low cost. Therefore, the occurrence of a failure in any network element can cause loss of several services. Some survival mechanisms may be used to try to overcome this type of failure event. We present in this paper a new dedicated protection algorithm for link-failure survivability in WDM optical networks, referred to as power series routing-based dedicated protection (PSR-DP) algorithm. PSR-DP is based on the evaluation of the network links’ costs by using a power series expansion. This power series expansion uses input variables based on some relevant information of the network such as link physical length and wavelength availability. Other contribution of this paper is to propose a new input variable based on the wavelength continuity constraint. The performance of the proposed algorithm is compared to other well-known algorithms in the literature. We also propose a modification to Suurballe’s algorithm and compare it with our PSR-DP algorithm. Three different topologies are used in our simulations, and statistical analysis is performed on the results of the investigated algorithms. In all simulated cases, PSR-DP algorithm outperformed the other analyzed algorithms.  相似文献   

18.
Wireless sensor networks (WSN) are susceptible to node capture and many network levels attacks. In order to provide protection against such threats, WSNs require lightweight and scalable key management schemes because the nodes are resource-constrained and high in number. Also, the effect of node compromise should be minimized and node capture should not hamper the normal working of a network. In this paper, we present an exclusion basis system-based key management scheme called MUQAMI+ for large-scale clustered sensor networks. We have distributed the responsibility of key management to multiple nodes within clusters, avoiding single points of failure and getting rid of costly inter-cluster communication. Our scheme is scalable and highly efficient in terms of re-keying and compromised node revocation.  相似文献   

19.
This paper proposes and analyzes a strategy for protection and restoration of optical paths in wavelength division multiplexing (WDM) networks for next-generation Internet infrastructure. Assuming a network model in which a multiprotocol label switching (MPLS) layer is overlaid on top of a WDM layer, and a segregation of the traffic on a wavelength basis, the strategy is based on a network dimensioning aiming at: 1) the support of different types of traffic, relating to different service categories; 2) the guarantee that all the wavelength paths carrying mission-critical services (with stringent quality of service requirements) are protected against failure; and 3) the possibility of restoring a large amount of wavelength paths carrying Internet best-effort services, i.e., low-priority (LP) preemptible traffic with no QoS requirements. The reference network scenario is an overlay model in which the optical network interacts with an MPLS network with a separated control plane; the optical network manages its resources to better serve the traffic coming from the MPLS network. Two path protection schemes, namely, disjoint path (DP) and single-link basis (SLB), and a link protection mechanism, namely, local repair (LP), are investigated. Furthermore, the paper considers both the case of using wavelength conversion in the optical nodes and the case in which wavelength conversion is not used at all. The analysis compares the performance of the different strategies in terms of the percentage of optical paths carrying LP traffic not served by the optical network after a failure and of the dimensions of the optical nodes for all the schemes. The analysis reveals that the proposed approach allows the restoration of a large amount of best-effort traffic with a reasonable increase of network redundancy.  相似文献   

20.
Unlike single omnidirectional antennas, multiple antennas offer wireless ad-hoc networks potential increases in their achievable throughput and capacity. Due to recent advances in antenna technology, it is now affordable to build wireless devices with more than one antenna. As a result, multiple antennas are expected to be an essential part of next-generation wireless networks to support the rapidly emerging multimedia applications characterized by their high and diverse QoS needs. This paper develops an admission control framework that exploits the benefits of multiple antennas to better support applications with QoS requirements in wireless ad-hoc networks. The developed theory provides wireless ad-hoc networks with flow-level admission control capabilities while accounting for cross-layer effects between the PHY and the MAC layers. Based on the developed theory, we propose a mechanism that multiple antenna equipped nodes can use to control flows' admissibility into the network. Through simulation studies, we show that the proposed mechanism results in high flow acceptance rates and high network throughput utilization.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号