{"title":"可用性感知光网络设计中具有可共享性的连接配置","authors":"B. Kantarci, H. Mouftah, S. Oktug","doi":"10.1109/ICTON.2008.4598645","DOIUrl":null,"url":null,"abstract":"In this paper, we present two adaptive connection provisioning algorithms to offer better availability per connection under dynamic traffic with shared backup path protection. The proposed schemes monitor the status of the network in terms of resource consumption and average unavailability per connection and adapt the sharing degree for the links. We compare our heuristic and optimized sharing degree approach with a conventional connection provisioning approach under two different topologies. The simulation results show that our proposed approaches offer better availability to incoming connection requests. Results referring to resource overbuild guarantee that shared backup protection is not violated since resource overbuild is kept in a feasible range.","PeriodicalId":230802,"journal":{"name":"2008 10th Anniversary International Conference on Transparent Optical Networks","volume":"151 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Connection provisioning with feasible shareability determination for availability-aware design of optical networks\",\"authors\":\"B. Kantarci, H. Mouftah, S. Oktug\",\"doi\":\"10.1109/ICTON.2008.4598645\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we present two adaptive connection provisioning algorithms to offer better availability per connection under dynamic traffic with shared backup path protection. The proposed schemes monitor the status of the network in terms of resource consumption and average unavailability per connection and adapt the sharing degree for the links. We compare our heuristic and optimized sharing degree approach with a conventional connection provisioning approach under two different topologies. The simulation results show that our proposed approaches offer better availability to incoming connection requests. Results referring to resource overbuild guarantee that shared backup protection is not violated since resource overbuild is kept in a feasible range.\",\"PeriodicalId\":230802,\"journal\":{\"name\":\"2008 10th Anniversary International Conference on Transparent Optical Networks\",\"volume\":\"151 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-06-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 10th Anniversary International Conference on Transparent Optical Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTON.2008.4598645\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 10th Anniversary International Conference on Transparent Optical Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTON.2008.4598645","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Connection provisioning with feasible shareability determination for availability-aware design of optical networks
In this paper, we present two adaptive connection provisioning algorithms to offer better availability per connection under dynamic traffic with shared backup path protection. The proposed schemes monitor the status of the network in terms of resource consumption and average unavailability per connection and adapt the sharing degree for the links. We compare our heuristic and optimized sharing degree approach with a conventional connection provisioning approach under two different topologies. The simulation results show that our proposed approaches offer better availability to incoming connection requests. Results referring to resource overbuild guarantee that shared backup protection is not violated since resource overbuild is kept in a feasible range.