10,038 research outputs found

    Toward reliable hybrid WDM/TDM passive optical networks

    Get PDF
    Individual users and enterprises are increasingly relying on the access to internet services and cannot accept long interruption time as easily as before. Moreover, the main characteristics of next generation optical access (NGOA) networks, such as long reach and a large number of users per feeder line, turn the network reliability to an important design parameter to offer uninterrupted service delivery. In this regard, protection mechanisms become one of the crucial aspects that need to be considered in the design process of access networks. On the other hand, it should be noted that not all users can afford to pay a high extra cost for protection; hence, it is important to provide resilience in a cost-efficient way. A PON combining WDM and TDM technologies, referred to as hybrid WDM/TDM PON or HPON, is one of the most promising candidates for NGOA networks due to its ability to serve a large number of subscribers and offer high capacity per user. For these reasons, in this article, we propose HPON architecture offering different degrees of resilience depending on the user profiles (i.e., partial and full protection for residential and business access, respectively). Also, the investment cost of providing resilience for the proposed schemes is investigated considering various protection upgrade road maps. Our results confirm that protecting the shared part of network with a large number of users is required in order to keep the failure impact at an acceptable level, with less than 5 percent increase of investment cost compared to the unprotected case. Meanwhile, the proposed end-to-end protection for business users considerably reduces the risk of service interruption for this type of demanding user without a need to duplicate the deployment cost of an unprotected connection. Furthermore, a sensitivity analysis is performed to investigate the impact of changes in business user percentage and protection upgrade time on the deployment cost. The results may be used as advice on cost-efficient deployment of reliable fiber access networks

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    Full text link
    With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of the data flowing through across networks provides the researchers with an interesting and intriguing potential for research. Design of these networks to ensure the protection of data faces the constraints of limited power and processing resources. We provide the basics of wireless sensor network security to help the researchers and engineers in better understanding of this applications field. In this chapter, we will provide the basics of information security with special emphasis on WSNs. The chapter will also give an overview of the information security requirements in these networks. Threats to the security of data in WSNs and some of their counter measures are also presented

    Network-provider-independent overlays for resilience and quality of service.

    Get PDF
    PhDOverlay networks are viewed as one of the solutions addressing the inefficiency and slow evolution of the Internet and have been the subject of significant research. Most existing overlays providing resilience and/or Quality of Service (QoS) need cooperation among different network providers, but an inter-trust issue arises and cannot be easily solved. In this thesis, we mainly focus on network-provider-independent overlays and investigate their performance in providing two different types of service. Specifically, this thesis addresses the following problems: Provider-independent overlay architecture: A provider-independent overlay framework named Resilient Overlay for Mission-Critical Applications (ROMCA) is proposed. We elaborate its structure including component composition and functions and also provide several operational examples. Overlay topology construction for providing resilience service: We investigate the topology design problem of provider-independent overlays aiming to provide resilience service. To be more specific, based on the ROMCA framework, we formulate this problem mathematically and prove its NP-hardness. Three heuristics are proposed and extensive simulations are carried out to verify their effectiveness. Application mapping with resilience and QoS guarantees: Assuming application mapping is the targeted service for ROMCA, we formulate this problem as an Integer Linear Program (ILP). Moreover, a simple but effective heuristic is proposed to address this issue in a time-efficient manner. Simulations with both synthetic and real networks prove the superiority of both solutions over existing ones. Substrate topology information availability and the impact of its accuracy on overlay performance: Based on our survey that summarizes the methodologies available for inferring the selective substrate topology formed among a group of nodes through active probing, we find that such information is usually inaccurate and additional mechanisms are needed to secure a better inferred topology. Therefore, we examine the impact of inferred substrate topology accuracy on overlay performance given only inferred substrate topology information

    Design and provisioning of WDM networks for traffic grooming

    Get PDF
    Wavelength Division Multiplexing (WDM) is the most viable technique for utilizing the enormous amounts of bandwidth inherently available in optical fibers. However, the bandwidth offered by a single wavelength in WDM networks is on the order of tens of Gigabits per second, while most of the applications\u27 bandwidth requirements are still subwavelength. Therefore, cost-effective design and provisioning of WDM networks require that traffic from different sessions share bandwidth of a single wavelength by employing electronic multiplexing at higher layers. This is known as traffic grooming. Optical networks supporting traffic grooming are usually designed in a way such that the cost of the higher layer equipment used to support a given traffic matrix is reduced. In this thesis, we propose a number of optimal and heuristic solutions for the design and provisioning of optical networks for traffic grooming with an objective of network cost reduction. In doing so, we address several practical issues. Specifically, we address the design and provisioning of WDM networks on unidirectional and bidirectional rings for arbitrary unicast traffic grooming, and on mesh topologies for arbitrary multipoint traffic grooming. In multipoint traffic grooming, we address both multicast and many-to-one traffic grooming problems. We provide a unified frame work for optimal and approximate network dimensioning and channel provisioning for the generic multicast traffic grooming problem, as well as some variants of the problem. For many-to-one traffic grooming we propose optimal as well as heuristic solutions. Optimal formulations which are inherently non-linear are mapped to an optimal linear formulation. In the heuristic solutions, we employ different problem specific search strategies to explore the solution space. We provide a number of experimental results to show the efficacy of our proposed techniques for the traffic grooming problem in WDM networks

    Second IEEE/LEOS Benelux Chapter, November 26th, 1997, Eindhoven University of Technology, The Netherlands

    Get PDF

    Second IEEE/LEOS Benelux Chapter, November 26th, 1997, Eindhoven University of Technology, The Netherlands

    Get PDF
    corecore