2015
DOI: 10.1016/j.osn.2015.01.003
|View full text |Cite
|
Sign up to set email alerts
|

Delay tolerance aware queueing and scheduling for differentiated services in dynamic survivable WDM networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 31 publications
(61 reference statements)
0
2
0
Order By: Relevance
“…Considering the service differentiation based on the delay tolerance and holding time, the service classes with high delay tolerance could have been serviced with some delay. The paper [18] proposed a strategy which intentionally inserts these service classes into a queue to save optical resources for future requests, schedules the queue after each departure event and chooses the best group of the waiting connections to provision. The approach results in significant decrease in overall blocking probability (BP), while reducing the BP of the service classes with stringent delay tolerance as well.…”
Section: Related Workmentioning
confidence: 99%
“…Considering the service differentiation based on the delay tolerance and holding time, the service classes with high delay tolerance could have been serviced with some delay. The paper [18] proposed a strategy which intentionally inserts these service classes into a queue to save optical resources for future requests, schedules the queue after each departure event and chooses the best group of the waiting connections to provision. The approach results in significant decrease in overall blocking probability (BP), while reducing the BP of the service classes with stringent delay tolerance as well.…”
Section: Related Workmentioning
confidence: 99%
“…SLA policy is an agreement between the client and the network service provider in which the type of service, time constraints, service price, and negotiation policies are defined 16 . In this work, the traffic is classified into three different CoSs, that is, CoS1: real‐time traffic (i.e., online audio–video traffic), CoS2: nonreal‐time traffic (i.e., compressed video and transactional data traffic), and CoS3: delay‐tolerant traffic (like store‐and‐forward bulk data files transfer between various datacenters) 18–21 . The priority order of these CoS is as CoS1 > CoS2 > CoS3.…”
Section: Introductionmentioning
confidence: 99%