Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Exploiting Excess Capacity for Survivable Traffic Grooming in Optical Backbone Networks

Not Accessible

Your library or personal account may give you access

Abstract

Backbone networks usually have some excess capacity (EC) to accommodate traffic fluctuations and to avoid early capacity exhaustion. Network operators can exploit EC in optical wavelength division multiplexed (WDM) backbone networks to support survivable traffic grooming, where connection requests are of subwavelength granularity and each provisioned request has to be protected from single-link failures. We investigate novel EC management techniques that can improve network performance, in terms of Service-Level Agreement (SLA) violations and bandwidth blockings, with no requirement of deploying additional capacity. We investigate exploiting and managing EC by the following techniques. i) Preprovisioning: When traffic is light, network resources are reserved by a preprovisioning scheme, i.e., a connection can be provisioned on reserved protected links to increase availability. We show that preprovisioning also decreases connection setup time, an important metric for delay-sensitive services. iiBackup reprovisioning: Since high-availability protection schemes usually consume more resources, connections in our solution can be switched to a protection scheme that provides lower availability (but higher resource efficiency) by reprovisioning backup resources when traffic increases. iiiHold-lightpath: We propose a new “hold-lightpath” scheme to exploit EC. This scheme prevents the termination of pre-established (but unused) resources to increase availability and decrease connection setup time. We compare our techniques with traditional protection schemes for typical daily fluctuating traffic on typical backbone network topologies and find that significant improvements can be achieved in terms of decreasing SLA violations, bandwidth blocking, and connection setup time.

© 2014 Optical Society of America

Full Article  |  PDF Article
More Like This
Survivable Multipath Traffic Grooming in Telecom Mesh Networks With Inverse Multiplexing

Sheng Huang, Ming Xia, Chip Martel, and Biswanath Mukherjee
J. Opt. Commun. Netw. 2(8) 545-557 (2010)

Survivable Impairment-Aware Traffic Grooming and Regenerator Placement With Connection-Level Protection

Chengyi Gao, Hakki C. Cankaya, Ankitkumar N. Patel, Jason P. Jue, Xi Wang, Qiong Zhang, Paparao Palacharla, and Motoyoshi Sekiya
J. Opt. Commun. Netw. 4(3) 259-270 (2012)

Accumulated-Downtime-Oriented Restoration Strategy With Service Differentiation in Survivable WDM Mesh Networks

Lei Song and Biswanath Mukherjee
J. Opt. Commun. Netw. 1(1) 113-124 (2009)

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (12)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (3)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (11)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.