11,332 research outputs found

    Storage Protection with Connectivity and Processing Restoration for Survivable Cloud Services

    Get PDF
    The operation and management of software-based communication systems and services is a big challenge for infrastructure and service providers.The challenge is mainly associated with the larger number of configurable elements and the higher dynamicity in the software-based systems compared to the classical ones. On the other hand, the modularity and programmability in software-based networks enabled by technologies like Software Defined Networking (SDN) and Network Function Virtualization (NFV) provide new opportunities for operators to realize advanced network and service management strategies beyond the classical techniques.In our work, we elaborate on these new opportunities and propose a novel strategy for the management of survivable cloud services.In particular, we leverage the flexibility of SDN and NFV to combine proactive protection and reactive restoration mechanisms and we put forward a novel strategy for enhancing the survivability of cloud services. Through comprehensive evaluations, we demonstrate that the proposed strategy offers significant benefits in terms of availability and restorability of services while reducing, at the same time, the overhead caused by the relocation of cloud services in case of failures

    Spare capacity modelling and its applications in survivable iP-over-optical networks

    Get PDF
    As the interest in IP-over-optical networks are becoming the preferred core network architecture, survivability has emerged as a major concern for network service providers; a result of the potentially huge traffic volumes that will be supported by optical infrastructure. Therefore, implementing recovery strategies is critical. In addition to the traditional recovery schemes based around protection and restoration mechanisms, pre-allocated restoration represents a potential candidate to effect and maintain network resilience under failure conditions. Preallocated restoration technique is particularly interesting because it provides a trade-off in terms of recovery performance and resources between protection and restoration schemes. In this paper, the pre-allocated restoration performance is investigated under single and dual-link failures considering a distributed GMPLSbased IP/WDM mesh network. Two load-based spare capacity optimisation methods are proposed in this paper; Local Spare Capacity Optimisation (LSCO) and Global Spare Capacity Optimisation (GSCO)

    Advancement of Monitoring Scheme in FTTH-PON Using Access Control System (ACS)

    Get PDF
    This paper proposes a new developed system named Access Control System (ACS) which is designed to enhance the monitoring, scalability and survivability of Passive Optical Network (PON) toward the implementation of full & Complete edition of Fiber-to-the Network (FTTH) network. The system automatically identifies faults and controls each optical fiber line to provide the restoration against failure in the drop region of PON downwardly from optical line terminal at the central office to the optical network unit of the subscriber. ACS manages the Optical Time Domain Reflectometer (OTDR) troubleshooting wavelength to enable the status of each line which can be displayed onto one single screen in the central office. Our proposed mechanism in this paper is the first reported thus far. Keywords: ACS, monitoring, path routing, experimental, FTTH-PO

    Redundancy Strategies for a High Splitting Optically Amplified Passive Optical Network

    Get PDF
    Copyright IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.High splitting, optically amplified, passive optical networks (SuperPONs) are investigated in terms of redundancy provision and protection mechanisms. Options for redundancy, including the important special case of dual homing, are detailed, and it is determined as to which of these options (duplication of the feeder and first distribution section, and N+1 protection of the optical amplifiers in the amplified splitter) would be required to be provided to all attached users to facilitate appropriate availability of the basic telephony service. The distributed amplified splitter dual homing solution is found to outperform the single amplified splitter solution in terms of its survivability. The protection mechanisms necessary to automatically switch to the redundant provision are discussed and it is seen that with the aid of suitable regular precautionary procedures protection switching can generally be provided rapidly (<50 ms). Finally, an availability, and cost versus availability, study confirms the aforementioned redundancy assessment for fiber-to-the-home (FTTH) implementations, but shows fiber-to-the-curb (FTTC) as needing additional redundancyPeer reviewe

    MATCASC: A tool to analyse cascading line outages in power grids

    Full text link
    Blackouts in power grids typically result from cascading failures. The key importance of the electric power grid to society encourages further research into sustaining power system reliability and developing new methods to manage the risks of cascading blackouts. Adequate software tools are required to better analyze, understand, and assess the consequences of the cascading failures. This paper presents MATCASC, an open source MATLAB based tool to analyse cascading failures in power grids. Cascading effects due to line overload outages are considered. The applicability of the MATCASC tool is demonstrated by assessing the robustness of IEEE test systems and real-world power grids with respect to cascading failures

    A Framework for Secure and Survivable Wireless Sensor Networks

    Get PDF
    Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future. A wireless sensor network (WSN) is vulnerable to security attacks due to the insecure communication channels, limited computational and communication capabilities and unattended nature of sensor node devices, limited energy resources and memory. Security and survivability of these systems are receiving increasing attention, particularly critical infrastructure protection. So we need to design a framework that provide both security and survivability for WSNs. To meet this goals, we propose a framework for secure and survivable WSNs and we present a key management scheme as a case study to prevent the sensor networks being compromised by an adversary. This paper also considers survivability strategies for the sensor network against a variety of threats that can lead to the failure of the base station, which represents a central point of failure.key management scheme, security, survivability, WSN
    • …
    corecore