scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Efficient protection and grooming architectures for future optical networks

02 Nov 2009-pp 1-11
TL;DR: It is proposed that the main traffic types of today's applications should be carried using the following features: connection-oriented service, traffic grooming to fill those connection oriented pipes, and forward error recovery with protection provided in the physical layer.
Abstract: Internet services and applications require high reliability and different bandwidth that need to be supported over the high capacity wavelength channels. We will present a short overview of issues in design of wavelength division multiplexing, efficient protection, and access and grooming mechanisms to make the network transparent, scalable, reliable, and simple. Article not available.
Citations
More filters
Journal ArticleDOI
TL;DR: This paper provides an overview of p -cycle based optical multicast protection approaches for link failure recovery, combined node and link failures recovery, and source failure recovery on top of combined node-and-link failure recovery.

18 citations

DissertationDOI
01 Jan 2014
TL;DR: A chronology of key events and quotes from the 12-month investigation into the deaths of six British servicemen and women at the hands of Islamic extremists in Iraq and Syria is revealed.
Abstract: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x CHAPTER

6 citations


Cites background from "Efficient protection and grooming a..."

  • ...(36) In different versions of the work DPLP stood for distributed p-cycle link protection or dynamic p-cycle link protection (37)....

    [...]

References
More filters
Book
01 Jan 1998
TL;DR: The second edition of Optical Networks: A Practical Perspective succeeds the first as the authoritative source for information on optical networking technologies and techniques as discussed by the authors, covering componentry and transmission in detail but also emphasizing the practical networking issues that affect organizations as they evaluate, deploy, or develop optical solutions.
Abstract: This fully updated and expanded second edition of Optical Networks: A Practical Perspective succeeds the first as the authoritative source for information on optical networking technologies and techniques. Written by two of the field's most respected individuals, it covers componentry and transmission in detail but also emphasizes the practical networking issues that affect organizations as they evaluate, deploy, or develop optical solutions.

2,282 citations


"Efficient protection and grooming a..." refers background in this paper

  • ...Optical fiber offers low-loss transmission over an enormous frequency range, lower bit error rates, and is less susceptible to electromagnetic interferences and other undesirable effects [1]....

    [...]

Journal Article
TL;DR: The general concept of OBS protocols and in particular, those based on Just-Enough-Time (JET), is described, along with the applicability ofOBS protocols to IP over WDM, and the performance of JET-based OBS Protocols is evaluated.
Abstract: To support bursty traffic on the Internet (and especially WWW) efficiently, optical burst switching (OBS) is proposed as a way to streamline both protocols and hardware in building the future generation Optical Internet. By leveraging the attractive properties of optical communications and at the same time, taking into account its limitations, OBS combines the best of optical circuit-switching and packet/cell switching. In this paper, the general concept of OBS protocols and in particular, those based on Just-Enough-Time (JET), is described, along with the applicability of OBS protocols to IP over WDM. Specific issues such as the use of fiber delay-lines (FDLs) for accommodating processing delay and/or resolving conflicts are also discussed. In addition, the performance of JET-based OBS protocols which use an offset time along with delayed reservation to achieve efficient utilization of both bandwidth and FDLs as well as to support priority-based routing is evaluated.

1,997 citations


"Efficient protection and grooming a..." refers methods in this paper

  • ...the Collection and Distribution Network (CDN) will be constituted using multiple heterogeneous technologies including high-speed wireless packet access (a la WiMax), access using optical packet switching, [20], [21], [22], optical burst switching [23], [24], [25], and time-wavelength switching or time slot switching [26], [27], [28], [29], [30], or access using conventional electronic, or optical multi-access network such as light-trail, [31], [32], [33], [34], or light trees [35], etc....

    [...]

Journal ArticleDOI
TL;DR: An architecture for Burst Switching Systems designed to switch data among WDM links, treating each link as a shared resource rather than just a collection of independent channels is presented.
Abstract: Demand for network bandwidth is growing at unprecedented rates, placing growing demands on switching and transmission technologies. Wavelength division multiplexing will soon make it possible to combine hundreds of gigabit channels on a single fiber. This paper presents an architecture for Burst Switching Systems designed to switch data among WDM links, treating each link as a shared resource rather than just a collection of independent channels. The proposed network architecture separates burst level data and control, allowing major simplifications in the data path in order to facilitate all-optical implementations. To handle short data bursts efficiently, the burst level control mechanisms in burst switching systems must keep track of future resource availability when assigning arriving data bursts to channels or storage locations. The resulting Lookahead Resource Management problems raise new issues and require the invention of completely new types of high speed control mechanisms. This paper introduces these problems and describes approaches to burst level resource management that attempt to strike an appropriate balance between high speed operation and efficiency of resource usage.

893 citations


"Efficient protection and grooming a..." refers methods in this paper

  • ...the Collection and Distribution Network (CDN) will be constituted using multiple heterogeneous technologies including high-speed wireless packet access (a la WiMax), access using optical packet switching, [20], [21], [22], optical burst switching [23], [24], [25], and time-wavelength switching or time slot switching [26], [27], [28], [29], [30], or access using conventional electronic, or optical multi-access network such as light-trail, [31], [32], [33], [34], or light trees [35], etc....

    [...]

Proceedings ArticleDOI
21 Mar 1999
TL;DR: This study examines different approaches to protect mesh based WDM optical networks from single-link failures, and formulated integer linear programs to determine the capacity requirements for the above protection schemes for a static traffic demand.
Abstract: This investigation considers optical networks which employ wavelength cross-connects that enable the establishment of wavelength-division-multiplexed (WDM) channels, between node-pairs. In such and other networks, the failure of a network element (e.g., fiber link, cross-connect, etc.) may cause the failure of several optical channels, thereby leading to large data losses. This study examines different approaches to protect mesh based WDM optical networks from single-link failures. These approaches are based on two basic survivability paradigms: (a) path protection/restoration, and (b) link protection/restoration. In path- and link-protection schemes, backup paths and wavelengths are reserved in advance at the time of call setup. Path- and link-restoration schemes are dynamic schemes in which backup paths are discovered (from the spare capacity in the network) upon the occurrence of a failure. In part 1 of this study presented in this paper, we formulated integer linear programs to determine the capacity requirements for the above protection schemes for a static traffic demand.

727 citations


"Efficient protection and grooming a..." refers background in this paper

  • ...We propose that future network should be designed with the two prominent features, traffic grooming [8], [9], [10], [11], [12], [13], [14], [15] and providing protection [16], [17], [18], [19] in the physical layer....

    [...]

Proceedings ArticleDOI
07 Jun 1998
TL;DR: It is shown that through a strategy of pre-failure cross-connection between the spare links of a mesh network, it is possible to achieve 100% restoration with little, if any, additional spare capacity than in aMesh network.
Abstract: Cycle-oriented preconfiguration of spare capacity is a new idea for the design and operation of mesh-restorable networks. It offers a sought-after goal: to retain the capacity-efficiency of a mesh-restorable network, while approaching the speed of line-switched self-healing rings. We show that through a strategy of pre-failure cross-connection between the spare links of a mesh network, it is possible to achieve 100% restoration with little, if any, additional spare capacity than in a mesh network. In addition, we find that this strategy requires the operation of only two cross-connections per restoration path. Although spares are connected into cycles, the method is different than self-healing rings because each preconfigured cycle contributes to the restoration of more failure scenarios than can a ring. Additionally, two restoration paths may be obtained from each pre-formed cycle, whereas a ring only yields one restoration path for each failure it addresses. We give an optimal design formulation and results for preconfiguration of spare capacity and describe a distributed self-organizing protocol through which a network can continually approximate the optimal preconfiguration state.

594 citations


"Efficient protection and grooming a..." refers methods in this paper

  • ...A p-Cycle is a preconfigured structure in a network where every functioning link used to create the structure is used to protect any link protected by the p-Cycle [54], [55], [56], [57]....

    [...]