2015
DOI: 10.1109/tnet.2014.2335252
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Excess Capacity, Part II: Differentiated Services Under Traffic Growth

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 39 publications
0
6
0
Order By: Relevance
“…Here, we consider to exploit EC in the network for this adaptive protection scheme by admitting connections with dedicated protection and switch their protection schemes based on the downtimes they experienced. Even though, in previous works [1], [2], we propose EC management approaches, where each connection occupies an entire wavelength channel, applying them to grooming-capable networks is not straightforward because survivable grooming techniques are quite different than the protection techniques considered in [1], [2]. Also, EC, in this work, is defined by considering both excess bandwidth and grooming ports.…”
Section: Problem Statementmentioning
confidence: 99%
See 3 more Smart Citations
“…Here, we consider to exploit EC in the network for this adaptive protection scheme by admitting connections with dedicated protection and switch their protection schemes based on the downtimes they experienced. Even though, in previous works [1], [2], we propose EC management approaches, where each connection occupies an entire wavelength channel, applying them to grooming-capable networks is not straightforward because survivable grooming techniques are quite different than the protection techniques considered in [1], [2]. Also, EC, in this work, is defined by considering both excess bandwidth and grooming ports.…”
Section: Problem Statementmentioning
confidence: 99%
“…Let L p t and L b t be the sets of lightpaths on primary and backup paths, respectively. Then, we can similarly define the availabilities as follows: 2 Here, we mean the statistical availability of the links for convenience, which is the long-term availability. However, a link's actual availability is usually less than its statistical availability during a typical holding time of a connection.…”
Section: Comparison Of Survivable Traffic-groomingmentioning
confidence: 99%
See 2 more Smart Citations
“…In [7,8], the authors exploited the excess capacity for new connection pre-provisioning and backup re-provisioning by developing a Mixed-Integer Linear Programming (MILP) and a heuristic. During traffic fluctuation and growth, the algorithm starts free protection resources to be used by newly arrived connection requests, and then starts re-provisioning protection paths with less availability protection schemes.…”
Section: Introductionmentioning
confidence: 99%