10 research outputs found

    On Signaling-Free Failure Dependent Restoration in All-Optical Mesh Networks

    Get PDF
    Failure dependent protection (FDP) is known to achieve optimal capacity efficiency among all types of protection, at the expense of longer recovery time and more complicated signaling overhead. This particularly hinders the usage of FDP in all-optical mesh networks. As a remedy, the paper investigates a new restoration framework that enables all-optical fault management and device configuration via state-of-the-art failure localization techniques, such that the FDP restoration process. It can be implemented without relying on any control plane signaling. With the proposed restoration framework, a novel spare capacity allocation problem is defined, and is further analyzed on circulant topologies for any single link failure, aiming to gain a solid understanding of the problem. By allowing reuse of monitoring resources for restoration capacity, we are particularly interested in the monitoring resource hidden property where less or even no monitoring resources are consumed as more working traffic is in place. To deal with general topologies, we introduce a novel heuristic approach to the proposed spare capacity allocation problem, which comprises a generic FDP survivable routing scheme followed by a novel monitoring resource allocation method. Extensive simulation is conducted to examine the proposed scheme and verify the proposed restoration framework

    Network-wide localization of optical-layer attacks

    Get PDF
    Optical networks are vulnerable to a range of attacks targeting service disruption at the physical layer, such as the insertion of harmful signals that can propagate through the network and affect co-propagating channels. Detection of such attacks and localization of their source, a prerequisite for securenetwork operation, is a challenging task due to the limitations in optical performance monitoring, as well as the scalability and cost issues. In this paper, we propose an approach for localizing the source of a jamming attack by modeling the worst-case scope of each connection as a potential carrier of a harmful signal. We define binary words called attack syndromes to model the health of each connection at the receiver which, when unique, unambiguously identify the harmful connection. To ensure attack syndrome uniqueness, we propose an optimization approach to design attack monitoring trails such that their number and length is minimal. This allows us to use the optical network as a sensor for physical-layer attacks. Numerical simulation results indicate that our approach obtains network-wide attack source localization at only 5.8% average resource overhead for the attackmonitoring trails

    Correlates of orthographic learning in third-grade children's silent reading

    Get PDF
    This study examined word identification, phonological recoding efficiency, familiar word reading efficiency, orthographic choice for familiar words and serial naming speed as potential correlates of orthographic learning following silent reading in third-grade children. Children silently read a series of short stories, each containing six repetitions of a different target non-word. They subsequently read target non-words faster than homophones and preferred target non-words to homophones in an orthographic choice task, indicating that they had formed functional orthographic representations of the target non-words through phonologically recoding them during silent story reading. Target non-word orthographic choice was correlated with all measures bar non-symbol naming speed. The association between phonological recoding efficiency and orthographic learning lends support to the hypothesis that self-teaching occurs through phonological recoding even in silent reading. Our findings were not generally consistent with the view that serial naming speed assesses orthographic learning aptitude

    Failure Localization for Shared Risk Link Groups in All-Optical Mesh Networks Using Monitoring Trails

    No full text

    Survivable routing meets diversity coding

    Get PDF
    Survivable routing methods have been thoroughly investigated in the past decades in transport networks. However, the proposed approaches suffered either from slow recovery time, poor bandwidth utilization, high computational or operational complexity, and could not really provide an alternative to the widely deployed single edge failure resilient dedicated 1 + 1 protection approach. Diversity coding is a candidate to overcome these difficulties with a relatively simple technique: dividing the connection data into two parts, and adding some redundancy at the source node. However, a missing link to make diversity coding a real alternative to 1+1 in transport networks is finding its minimum cost survivable routing, even in sparse topologies, where previous approaches may fail. In this paper we propose a polynomial-time algorithm with O(|V||E| log |V|) complexity for this routing problem. On the other hand, we show that the same routing problem turns to be NP-hard as soon as we limit the forwarding capabilities of some nodes and the capacities of some links of the network. © 2015 IFIP
    corecore