没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
This paper proposes a new survivable algorithm named sub-path protection based on auxiliary virtual topology (SPAVT) to tolerate the single-link failure in WDM optical networks. First, according to the protection-switching time constraint, SPAVT searches multiple pairs of primary and backup paths for each node pair in the network by the off-line manner, and then map these paths to the virtual topology. When a connection request arrives, SPAVT only needs to run one time of the Dijkstra's algorith
资源推荐
资源详情
资源评论






















A new algorithm based on auxiliary virtual topology for sub-path protection
in WDM optical networks
q
Xingwei Wang, Lei Guo
*
, Xuekui Wang, Yu Zhang, Xiaobing Zheng, Weigang Hou, Hongming Li,
Hongpeng Wang
College of Information Science and Engineering, Northeastern University, P.O. Box 365, Shenyang 110004, China
article info
Article history:
Received 19 July 2008
Received in revised form 30 November 2008
Accepted 3 December 2008
Available online 24 December 2008
Keywords:
Optical networks
Virtual topology
Sub-path protection
Protection-switching time
Time complexity
abstract
This paper proposes a new survivable algorithm named sub-path protection based on auxiliary virtual
topology (SPAVT) to tolerate the single-link failure in WDM optical networks. First, according to the pro-
tection-switching time constraint, SPAVT searches multiple pairs of primary and backup paths for each
node pair in the network by the off-line manner, and then map these paths to the virtual topology. When
a connection request arrives, SPAVT only needs to run one time of the Dijkstra’s algorithm to search a
virtual route in virtual topology, where the route may consist of multiple pairs of sub-paths, to meet
the protection-switching time constraint. Then, according to the shared resources policy, SPAVT chooses
an optimal pair of sub-paths. Simulation results show that SPAVT has smaller blocking probability and
lower time complexity than conventional algorithms.
Ó 2008 Elsevier B.V. All rights reserved.
1. Introduction
In wavelength-division-multiplexing (WDM) optical network,
since each wavelength channel can provide very high transmission
rate, the failure of fiber links may cause a lot of data loss. Therefore,
survivability in WDM networks is more important [1]. In recent
years, many papers have studied the survivable mechanism, in
which the general idea is to take account the protection mecha-
nism into the optical layer. According to the state of backup re-
sources, the protection mechanism can be divided into dedicated
protection, shared protection and mixed-shared protection [2–4].
According to the size of protection areas, the protection mecha-
nism also can be divided into link protection, segment protection
[5–8] and path protection [2–4].
In order to protect the single-link failure, the literature [2] pro-
posed shared-path protection (SPP) algorithm, which searches one
pair of a primary path and a link-disjoint backup path for each con-
nection request. For any two connection requests, if their primary
paths are link-disjoint, their corresponding backup paths can share
the backup resources on the common fiber links. Although SPP can
provide better resource utilization ratio and lower blocking proba-
bility than other shared protection algorithms, it does not consider
guaranteeing the protection-switching time. The protection-
switching time is an important factor in network performance
and can not be ignored. The shorter the protection-switching time
is, the sooner the restoration from the failures is.
In order to solve the problem of protection-switching time con-
straint, by integrating the merit of link protection and path protec-
tion, the literature [5–8] proposed the shared-sub-path protection
(SSP) algorithm. According to the protection-switching time con-
straint, SSP first searches a primary path for each connection re-
quest, and then it separates the primary path into several equal
length sub-primary paths and follows to compute a link-disjoint
sub-backup path for each sub-path. Since the primary path will
be divided into several sub-primary paths, SSP may run multiple
times of the routing algorithm (e.g., Dijkstra’s algorithm) to com-
pute several sub-backup paths, and then the route computation
time will increase and the algorithm time complexity will be high.
In order to improve the problem in previous studies, in this pa-
per, we propose a new survivable algorithm named sub-path pro-
tection based on auxiliary virtual topology (SPAVT) to tolerate the
single-link failure in WDM optical networks. According to the pro-
tection-switching time constraint, SPAVT first searches multiple
pairs of working and backup paths for each node pair in the network
by the off-line manner, and then map these paths to the virtual
topology. When a connection request arrives, SPAVT only needs to
0140-3664/$ - see front matter Ó 2008 Elsevier B.V. All rights reserved.
doi:10.1016/j.comcom.2008.12.007
q
The preliminary work of this paper was presented at the International
Conference on Convergence and hybrid Information Technology (ICCIT) 2008. This
work was supported in part by the National Natural Science Foundation of China
(Nos. 60802023, 60673159, 70671020), the National High-Tech Research and
Development Plan of China (No. 2007AA041201), the Key Project of Chinese
Ministry of Education (No. 108040), the Specialized Research Fund for the Doctoral
Program of Higher Education (Nos. 20070145096, 20070145017, 20060145012),
and the Program for New Century Excellent Talents in University.
* Corresponding author. Tel./fax: +86 24 83687758.
Computer Communications 32 (2009) 777–781
Contents lists available at ScienceDirect
Computer Communications
journal homepage: www.elsevier.com/locate/comcom
资源评论


weixin_38606169
- 粉丝: 4
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助


最新资源
- 3DSMax插件安装完全向导.doc
- 软件技术职业生涯规划.doc
- 单片机实用系统设计方案教学进度表、教案.doc
- 大数据视角下的人工智能技术应用探讨.docx
- 2017-2018学年高中数学-第二章-算法初步-2.2-算法框图的基本结构及设计-2.2.3-循环结构-北师大版必修3.ppt
- 医院财务管理信息化研究.docx
- 云计算在现代远程教育中的应用研究.docx
- 区块链视角的企业业财融合与财务共享研究.docx
- RSA数据加密算法分析与改进.docx
- 单片机汇编语言经典一百例.doc
- 以培养学生自觉意识为基础的计算机程序设计课程教学改革研究.docx
- JAVA计算器课程设计.docx
- 声源定位在智能语音识别中的应用-洞察研究.pptx
- 自学考试C--程序设计C--笔记.doc
- 基于云计算环境下数据存储安全的关键技术初探.docx
- C语言-第12章.ppt
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈



安全验证
文档复制为VIP权益,开通VIP直接复制
