The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In IP over WDM networks, a single failure in the WDM layer breaks down multiple IP links and may leave the virtual topology disconnected. This will make the restoration by the IP layer impossible, which must be avoided by suitable virtual topology design. In this paper, we focus on single-node failure and develop a Remove-Node Algorithm to map IP links on lightpaths in such a way that the IP topology...
GMPLS grew out of MPLS, a packet-switching technology designed to improve the efficiency of data networks. In this paper, we discuss the GMPLS technology, analyze its application. GMPLS is an advanced protocol which is essential for managing a diverse and complex network, because service deployment and service provisioning are manual, lengthy and costly processes. GMPLS has caused technical challenges...
Due to the frequent occurrence of fiber cuts and the traffic loss a failure can occur, network survivability becomes a critical concern in network design and operation. As networks migrate from ring based networks to mesh based networks, because its inefficient resource usage, researches on survivable WDM mesh network have received increasing attention. In this paper, we analyze the protection principle...
In WDM network, the load balance problem has received much attention in parallel and distributed applications because good solutions are critical to achieving speedups. This paper discusses traffic technology and load balancing in optical networks. In WDM network, enhancing the performance of an operational network, at both the traffic and the resource levels, are major objectives of traffic engineering...
Protection is a very important problem in optical network. With the rapid development of WDM optical network, protection technology is paid more and more attentions. In this paper, we analyze the protection principle of WDM optical network, propose a protection method for optical network. We study several conventional protection mechanisms, and compare their performance with the proposed mechanism.
The popularity of the Internet and its related services continues to be one of the main reasons for the explosive growth of traffic volume in global information and telecommunications networks. This trend of data-centric traffic growth, emerging new requirements and the need of network operators to reduce investments and operational costs (capital expenditure and operational expenditure) represent...
Routing is simultaneously the most complicated function of a network and the most important in optical network. In this paper, we propose a new mechanism on re-routing in optical network. We make extensive experiments based on this re-routing model, in order to find out the influence of different re-routing parameters, such as the metric chosen or the frequency of crank-back. Through the simulation...
In this paper, we propose a new mechanism on multiple connections technology in optical network. Multiple connections technology is a very complicated function of a network and also the one of the most important technologies in optical network. There are two main uses for multiple Internet links connected to the same internal network. One common use is to select an outbound link based on the type...
Wavelength-division multiplexing (WDM) is the best technology currently available to handle the rapidly increasing demand for bandwidth in fiber-optical telecommunications networks. This paper analyzes WDM transport network and discusses GMPLS technology for WDM network. Today, WDM optical transport networks have become more complex over the years and have extended into the metropolitan areas closer...
In recent years, IP over WDM has become a key technology of choice for meeting the tremendous bandwidth demand in the optical infrastructure. Survivability is an emerging discipline that blends optical network security with business risk management for the purpose of protecting highly distributed information services and assets. No system is totally immune to attacks, accidents, or failures. Therefore,...
In recent years, there have been dramatic changes in the character of security problems, in their technical and business contexts, and in the goals and purposes of their stakeholders. As a consequence, many of the assumptions underlying traditional security technologies are no longer valid. Failure to recognize the depth and breadth of these changes in combination prevents effective solutions to modern...
Generalized multi-protocol label switching (GMPLS) is being developed by the IETF as the industry standard for transport network control planes. GMPLS defines IP based control of optical resources. Routers are expected to deliver advanced services at higher throughput while handling large amounts of label switching path (LSP) creation/deletion, traffic engineering link information exchange, and link...
Protection and survivability are very important problems in optical network. With the rapid development of WDM optical network, protection technology is paid more and more attentions. In this paper, we analyze the protection principle of WDM optical network, propose a protection method for optical network. Protection schemes can be divided into link protection, path protection, and partial path protection...
This paper proposes a protection scheme for the WDM network. The emergence of WDM technology has provided an unprecedented opportunity to dramatically increase the bandwidth capacity of telecommunications networks. In protection schemes, there are spare resources reserved for each protected part while those resources are not used under normal conditions. So restoration usually has better resource...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.