2005
DOI: 10.1109/tnet.2005.852879
|View full text |Cite
|
Sign up to set email alerts
|

Shared risk link Group (SRLG)-diverse path provisioning under hybrid service level agreements in wavelength-routed optical mesh networks

Abstract: Abstract-The static provisioning problem in wavelength-routed optical networks has been studied for many years. However, service providers are still facing the challenges arising from the special requirements for provisioning services at the optical layer. In this paper, we incorporate some realistic constraints into the static provisioning problem, and formulate it under different network resource availability conditions. We consider three classes of shared risk link group (SRLG)-diverse path protection schem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
45
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 100 publications
(46 citation statements)
references
References 24 publications
1
45
0
Order By: Relevance
“…It removes e m,n (line 9), and then uses Algorithm 1 to compute B m,n with minimum failure probability (line 10). Next, the algorithm determines the rerouted traffic load r m,n (lines [11][12][13][14][15][16], which is the smaller one between l m,n and the usable bandwidth of B m,n . Finally, it updates the usable bandwidth of logical links and removes the logical links without usable bandwidth (lines [17][18][19][20][21][22] …”
Section: Algorithm 1 Selectbpmentioning
confidence: 99%
“…It removes e m,n (line 9), and then uses Algorithm 1 to compute B m,n with minimum failure probability (line 10). Next, the algorithm determines the rerouted traffic load r m,n (lines [11][12][13][14][15][16], which is the smaller one between l m,n and the usable bandwidth of B m,n . Finally, it updates the usable bandwidth of logical links and removes the logical links without usable bandwidth (lines [17][18][19][20][21][22] …”
Section: Algorithm 1 Selectbpmentioning
confidence: 99%
“…Note at that point that an arc of the virtual network may belong to several SRGs (= colors). However, following [1], [2], [5], we apply the simple transformation on G VN described in [6], [8] : each multi-colored arc is replaced with a chain of monocolored arcs, so that each arc now belongs to exactly one color. For simplicity purpose we will denote also by G VN the modified graph.…”
Section: Network Model and Notationsmentioning
confidence: 99%
“…This has been fostered by the growing use of virtual and overlay networks which are embedded, in a transparent way, on an underlying network. Therefore, a great deal of researchers efforts have been concentrated on the design of efficient protection mechanisms at the backbone level (see for example [1]- [4]). At this level, the reliability of a single connection in the network might be measured as a function of the number of links it uses, each single link having its own probability of failure.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Two heuristics, maximizing single-hop traffic (MSHT) and maximizing resource utilization (MRU), were proposed to solve the problem efficiently. The works in [8] and [9] considered the static-routing and wavelength-assignment problems with path protection in wavelength-division-multiplexed (WDM) mesh networks without grooming capability.…”
Section: Introductionmentioning
confidence: 99%