2017
DOI: 10.1364/jocn.9.000207
|View full text |Cite
|
Sign up to set email alerts
|

Energy Efficient Survivable IP-Over-WDM Networks With Network Coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
39
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 55 publications
(41 citation statements)
references
References 22 publications
2
39
0
Order By: Relevance
“…The result in (16) analytically confirms our heuristic in [23] that can provide close to optimal solution. The heuristic produces a good solution by employing the following principles • Select the minimum number of hops for the working and protection paths (minimising the first term of (16)) • Encode a demand with another demand that has the highest number of shared hops and closest demand volume (maximising the second term of (16)) • More weight is given to finding minimal hop paths than searching for better encoding pair (from the equation, the weight ratio of the first to second terms is 4:1) • Three heuristics can be conceived.…”
Section: + 1 Protection With Network Codingsupporting
confidence: 75%
See 3 more Smart Citations
“…The result in (16) analytically confirms our heuristic in [23] that can provide close to optimal solution. The heuristic produces a good solution by employing the following principles • Select the minimum number of hops for the working and protection paths (minimising the first term of (16)) • Encode a demand with another demand that has the highest number of shared hops and closest demand volume (maximising the second term of (16)) • More weight is given to finding minimal hop paths than searching for better encoding pair (from the equation, the weight ratio of the first to second terms is 4:1) • Three heuristics can be conceived.…”
Section: + 1 Protection With Network Codingsupporting
confidence: 75%
“…The resource savings and therefore the power consumption reduction in this scheme depends on the network topology, the location and number of network coding enabled nodes as well as the nature of demands. In our previous paper [23] we studied the scheme and determined the optimum allocation using a MILP optimization model followed by 5 heuristics. The real time and most optimal version of the heuristics is called the Optimal search heuristic (OSH).…”
Section: + 1 Protection With Network Codingmentioning
confidence: 99%
See 2 more Smart Citations
“…technology (ICT) industry [20]. Centralization of fog computing capacity in existing ICT infrastructure locations such as COs, CSs and private computing clusters can aid the realization of this goal, while the interconnecting network topologies can play an important role in optimally placing the fog nodes [21] - [23]. Furthermore, adoption of the server disaggregation concept in such locations can significantly improve their efficiency.…”
mentioning
confidence: 99%