290 research outputs found

    Service level agreement framework for differentiated survivability in GMPLS-based IP-over-optical networks

    Get PDF
    In the next generation optical internet, GMPLS based IP-over-optical networks, ISPs will be required to support a wide variety of applications each having their own requirements. These requirements are contracted by means of the SLA. This paper describes a recovery framework that may be included in the SLA contract between ISP and customers in order to provide the required level of survivability. A key concern with such a recovery framework is how to present the different survivability alternatives including recovery techniques, failure scenario and layered integration into a transparent manner for customers. In this paper, two issues are investigated. First, the performance of the recovery framework when applying a proposed mapping procedure as an admission control mechanism in the edge router considering a smart-edge simple-core GMPLS-based IP/WDM network is considered. The second issue pertains to the performance of a pre-allocated restoration and its ability to provide protected connections under different failure scenarios

    Scalable Approach to Dynamic SLA Negotiation Mechanism in Protected Shared Mesh Optical Networks

    Get PDF
    AbstractThis paper investigates the scalability issues concerned with the dynamic SLA negotiation mechanism proposed in the previous study. The previous work presented a dynamic service level agreement negotiation mechanism considering intra- and inter-domain communications over shared mesh optical networks which may cause heavy control overheads in a dynamic environment such as the control plane of GMPLS-based networks. In this paper, two main issues regarding the dynamic propagation of information will be analyzed: i) control overhead, and ii) propagation delay. The paper employs some alternative means of communication to reduce the overheads and resolve the possible scalability issues

    Availability Constrained Routing And Wavelength Assignment And Survivability In Optical Wdm Networks

    Get PDF
    Tez (Doktora) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2009Thesis (PhD) -- İstanbul Technical University, Institute of Science and Technology, 2009Bu çalışmada, optik ağlarda kullanılabilirlik kısıtı altında yol ve dalgaboyu atama konusu farklı sürdürülebilirlik politikaları altında çalışılmış ve elde edilen sonuçlar benzetim aracılığıyla doğrulanarak sunulmuştur. Öncelikle paylaşılan yol koruması altında sınırsız kaynak bulunması durumunda kullanılabilirlik kısıtı altında yol ve dalgaboyu atamaya yönelik planlama amaçlı bağlantı kurma yöntemleri sezgisel ve optimizasyona dayalı olarak önerilmiştir. Sonrasında bu teknikler kısıtlı kaynak altında ve farklılaştırılmış kullanılabilirlik düzeyi gereksinimleri ile gelen bağlantı isteklerinin olması koşulu altında çalışabilecek şekilde adapte edilmiş ve başarımları sınanmıştır. Önerilen tekniklerin literatürde yaygın olarak bilinen bağlantı kurma tekniklerinin başarımını bağlantı düşürme olasılığı ve bağlantı kullanılabilirliği açısından yükselttiği, bunun yanında yedek kaynak tüketim fazlasını da gözeterek kabul edilir bir düzeyde tuttuğu gözlenmiştir. Özellikle optimizasyon tabanlı bağlantı kurma tekniğinin, farklılaştırılmış bağlantı isteklerinin bulunduğu ortamda kaynak tüketimini de düşürdüğü gösterilmiştir. Son olarak da, segmanlı koruma için önceden önerilmiş bir kullanılabilirlik analizine rastlanamadığı için, paylaşılan segmanlı koruma için kullanılabilirlik analizi yöntemi önerilerek benzetim aracılığıyla doğrulanmıştır. Bu analiz kullanılarak da segmanlı koruma altında kullanılabilirliği gözeten yol ve dalgaboyu atama yöntemleri oluşturularak başarımları kaynak kısıtlı ve kaynakça zengin ortamlarda denenerek uygulanabilirlikleri belirlenmiştir.In this study, we have proposed availability aware routing and wavelength assignment schemes for optical networks under different survivability policies. The proposed techniques are evaluated by simulation. First, we have proposed heuristic and optimization driven connection provisioning schemes under shared backup path protection in resource plentiful environment. Then, the proposed schemes are modified to work in resource limited environment where connections arrive with differentiated availability requirements. The proposed techniques are compared to a conventional reliable connection provisioning algorithm. The simulation results show that the proposed techniques lead to lower connection blocking probability and better connection availability. Besides this, it is also shown that the proposed techniques also keep the resource overbuild due to protection in a feasible range. Moreover, the experimental results also show that the optimization driven technique leads to a decreased resource overbuild under resource limited environment for connection arrivals with differentiated availability requirements. The last part of this work deals with shared segment protection. Since there is no specific availability analysis method for shared segment protection, an availability analysis method for this protection scheme is proposed and validated by simulation. Based on this analysis, availability aware connection provisioning schemes are constructed, their performance is evaluated in resource plentiful and resource scarce environments, and the applicability of the schemes are determined in terms of environmental constraints.DoktoraPh

    Availability-Aware Spare Capacity Allocation with Partially Protected Rings

    Get PDF
    This thesis work focuses on designing a survivable IP-core network with the minimal investment of spare capacity. A span-oriented spare capacity allocation (SCA) scheme is proposed to satisfy customers' availability requirements in the end-to-end (E2E) sense. The novelty of the proposed SCA scheme is that it meets the E2E availability requirements despite the lack of knowledge of E2E bandwidth by employing protection rings covering all links in the network. Different ring selection methods are presented and also compared from the aspect of network redundancy and LP feasibility which provide more flexibility to the design. The proposed SCA algorithm further minimizes total cost of spare capacity by incorporating partial protection within the proposed architecture. The simulation results show that it can significantly reduce the spare capacity consumption depending on the availability. The proposed SCA scheme also performs better in terms of redundancy than that of two other dominant methods available these days

    Network Virtualization Over Elastic Optical Networks: A Survey of Allocation Algorithms

    Get PDF
    Network virtualization has emerged as a paradigm for cloud computing services by providing key functionalities such as abstraction of network resources kept hidden to the cloud service user, isolation of different cloud computing applications, flexibility in terms of resources granularity, and on‐demand setup/teardown of service. In parallel, flex‐grid (also known as elastic) optical networks have become an alternative to deal with the constant traffic growth. These advances have triggered research on network virtualization over flex‐grid optical networks. Effort has been focused on the design of flexible and virtualized devices, on the definition of network architectures and on virtual network allocation algorithms. In this chapter, a survey on the virtual network allocation algorithms over flexible‐grid networks is presented. Proposals are classified according to a taxonomy made of three main categories: performance metrics, operation conditions and the type of service offered to users. Based on such classification, this work also identifies open research areas as multi‐objective optimization approaches, distributed architectures, meta‐heuristics, reconfiguration and protection mechanisms for virtual networks over elastic optical networks

    A Survey on the Path Computation Element (PCE) Architecture

    Get PDF
    Quality of Service-enabled applications and services rely on Traffic Engineering-based (TE) Label Switched Paths (LSP) established in core networks and controlled by the GMPLS control plane. Path computation process is crucial to achieve the desired TE objective. Its actual effectiveness depends on a number of factors. Mechanisms utilized to update topology and TE information, as well as the latency between path computation and resource reservation, which is typically distributed, may affect path computation efficiency. Moreover, TE visibility is limited in many network scenarios, such as multi-layer, multi-domain and multi-carrier networks, and it may negatively impact resource utilization. The Internet Engineering Task Force (IETF) has promoted the Path Computation Element (PCE) architecture, proposing a dedicated network entity devoted to path computation process. The PCE represents a flexible instrument to overcome visibility and distributed provisioning inefficiencies. Communications between path computation clients (PCC) and PCEs, realized through the PCE Protocol (PCEP), also enable inter-PCE communications offering an attractive way to perform TE-based path computation among cooperating PCEs in multi-layer/domain scenarios, while preserving scalability and confidentiality. This survey presents the state-of-the-art on the PCE architecture for GMPLS-controlled networks carried out by research and standardization community. In this work, packet (i.e., MPLS-TE and MPLS-TP) and wavelength/spectrum (i.e., WSON and SSON) switching capabilities are the considered technological platforms, in which the PCE is shown to achieve a number of evident benefits

    Holding time and delay tolerance aware, availability-guaranteed connection provisioning in WDM networks

    Get PDF
    Optik dalga boyu bölmeli çoğullama (Wavelength Division Multiplexing- WDM) ağlarında, yeni teknolojilerdeki ilerleme, yüksek bant genişliği isteyen uygulamalara yüksek kapasite sağlamak üzere kiralanabilir devrelerin dinamik ve kısa vadeli olarak kurulup serbest bırakılmasına olanak sağlamaktadır. Yüksek hızlı optik bağlantının kesilmesi, büyük veri kaybına neden olduğundan, bu bağlantıların arızalara karşı korunması gerekmektedir. Diğer yandan, veri, ses ve video gibi verilerin farklı trafik tiplerinin hızla artması, kullanılabilirliği garantili bant genişliğinin yanı sıra farklılaştırılmış hizmetler gerektirmektedir. Bu nedenle, ilerideki ağ taşıyıcılarının, HDA (Hizmet Düzeyi Anlaşması) (Service Level Agreement- SLA) ilkelerini karşılaması ve böylece belli bir hizmet düzeyi garantilemesi ve verimli kaynak kullanımı sağlaması gerekmektedir. Bu amaçla bu çalışmada farklı sürdürülebilir yol kurulum teknikleri bağlantı isteklerinin düzeyine göre tercih edilmektedir. Hizmet kalitesine bağlı olarak korunmasız, yol paylaşımlı korumalı ve yol atamalı korumalı bağlantı kurulumunun tercihli kullanımı sonucunda, isteklerin farklılaşmış kullanılabilirlik gereklilikleri karşılanmaktadır. Bu çalışmada yedek kapasite kullanım oranının ve bloke olma olasılığının düşürülmesi amacıyla farklı iki teknik tanıtılmıştır. Birinci teknik, yeni gelen isteğin bağlantısını kurmadan önce sistemde önceden kurulmuş bağlantıların hizmet sürelerinden yararlanarak paylaşımı artırma esasına dayanmaktadır. İkinci yöntem ise bloke olma olasılığını düşürmek amacıyla kullanıcı tarafından belirlenen zaman toleransı parametresinden yararlanmaktadır. Bu iki yöntem önceki benzer amaca yönelik algoritmalarla karşılaştırılmaktadır. Sonuç olarak önerilen algoritmaların kaynak kullanımını azalttığı, bloke olma oranını ise yeni kaynak eklenmesine gerek duyulmaksızın düşürdüğü gözlemlenmiştir.  Anahtar Kelimeler: Optik ağlar, dalga boyu bölmeli çoğullama, kullanılabilirlik, yol atama.With the development of agile optical switches, dynamic optical circuit switching has become possible and connections are set up and torn down on- demand basis. The explosive growth of different traffic types such as data, voice and video requires the support of differentiated services in terms of survivability measures and timing requirements. In order to guarantee a specific level of survivability, availability-guaranteed bandwidth provisioning is considered. On the other hand, connections are set up and released for specific time durations, with sliding or fixed set-up times. Connection requests arrive to the network provider with specified holding times, delay tolerances and availability requirements which need to be satisfied. Delay tolerance is defined as the maximum time which a request can tolerate before the connection is set up. Future network carriers need to meet strict SLA (Service Level Agreement) guidelines, thus guaranteeing a level of service, as well as achieving efficient resource utilization. Connection availability is an important metric to measure the quality of service (QoS) in a survivable network. It is defined as the probability that a connection will be found in the operating state at a random time in the future (Clouqueur et al., 2002). It is affected by many factors such as network component failure probabilities, failure repair times, etc. Usually, the availability target for a connection is specified in a Service Level Agreement (SLA), which is a contract between a service provider (e.g., a network operator) and one of its customers (e.g., a large institutional user of bandwidth). An SLA violation may result in a penalty to be paid by the network operator to the customer according to the contract (Grover, 1999). In order to provide the appropriate level of availability stated in the SLAs, different recovery mechanisms can be used to provision different connection requests. In this study, we consider unprotected, shared-path protected and dedicated-path protected provisioning mechanisms at the same time to satisfy different QoS requirements in a dynamic manner. Previous studies, while maximizing sharability by routing backup paths in a dynamic traffic environment, do not make any estimation on future sharability of resources. They take the current link states into consideration to choose sharable links. Reference (Tornatore et al., 2005a,b) shows that resource overbuild (RO) in shared-path protection can be decreased by exploiting the holding-time information of connections which have already been provisioned in the network. Since holding times of incoming traffic demands may be known in advance for a variety of applications, this information about the future states of the links makes the route decision more intelligent by allowing the choice of more sharable paths. In this paper, unprotected, shared-path, and dedicated-path protection techniques are used to meet the differentiated availability requirements. Recently, among the other Service Level Specifications (SLSs), many new applications are identified by known-in-advance holding-time and delay tolerance. So, in this paper, for dynamic provisioning of availability-guaranteed connections in an optical mesh network, we propose two new algorithms which exploit 1-the knowledge of connection holding times to accomplish minimum backup capacity allocation as compared to the previous holding-time-unaware approach and 2- the knowledge of delay tolerances to degrease the blocking probability in the conditions that the system resources are not available to satisfy the SLS demands of connection requests. Here we also propose a new routing mechanism for backup paths optimizing backup resources considering the future departure time of existing connections. In order to show the performance gain; the first proposal, AGSDP_HT (Holding-time aware Availability-Guaranteed Service-Differentiated Provisioning) is compared by a base line algorithm AGSDP. The second proposal ADT (Availability-guaranteed, service differentiated provisioning with Delay Tolerance) is compared by a base line approach which does not consider delay tolerance. For the second proposal, both algorithms dedicated protection is not used as a choice, since blocking is decreased by delay tolerance. Keywords: WDM Networks, availability aware provisioning, survivability
    corecore