Wu Jia, Song Yu, Yongjun Zhang, Hua Zhang, W. Gu
{"title":"终端节点自保护方案采用基于单向分离器的环","authors":"Wu Jia, Song Yu, Yongjun Zhang, Hua Zhang, W. Gu","doi":"10.1002/ett.1437","DOIUrl":null,"url":null,"abstract":"In special networks, such as military or finance networks, terminal nodes deserve more attentions because of higher demands on reliability and survivability than switching nodes. A three nodes non-break-self-protection unidirectional splitter-based ring is introduced and designed to protect the terminal nodes. The performances are compared with the traditional (existing) 1+2 protection scheme in terms of the cost, connection availability, recovery time and optical power budget. Calculation results show this proposed scheme can keep data integrity and has very high survivability and connection availability, while the cost, recovery time and power budget are acceptable. Copyright © 2010 John Wiley & Sons, Ltd.","PeriodicalId":50473,"journal":{"name":"European Transactions on Telecommunications","volume":"32 1","pages":"640-647"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Terminal node self-protection scheme by using unidirectional splitter-based ring\",\"authors\":\"Wu Jia, Song Yu, Yongjun Zhang, Hua Zhang, W. Gu\",\"doi\":\"10.1002/ett.1437\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In special networks, such as military or finance networks, terminal nodes deserve more attentions because of higher demands on reliability and survivability than switching nodes. A three nodes non-break-self-protection unidirectional splitter-based ring is introduced and designed to protect the terminal nodes. The performances are compared with the traditional (existing) 1+2 protection scheme in terms of the cost, connection availability, recovery time and optical power budget. Calculation results show this proposed scheme can keep data integrity and has very high survivability and connection availability, while the cost, recovery time and power budget are acceptable. Copyright © 2010 John Wiley & Sons, Ltd.\",\"PeriodicalId\":50473,\"journal\":{\"name\":\"European Transactions on Telecommunications\",\"volume\":\"32 1\",\"pages\":\"640-647\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"European Transactions on Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/ett.1437\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Transactions on Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/ett.1437","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3