By Topic

Comprehensive Performance Study of Active Restoration-Based Optical Networks under Dual-Failure Attacks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Azim, M.M.A. ; Graduate Sch. of Inf. Sci., Tohoku Univ., Sendai ; Xiaohong Jiang ; Horiguchi, S. ; Pin-han Ho

Optical networks, based on the emergence of the optical layer in transport networks, provide higher capacity and reduced costs for new network applications such as the VoIP, video on demand, and advanced digital services. With the increasing demand for network bandwidth, optical network survivability has become a critical issue in such high capacity networks. A significant finding is that designs offering complete dual-failure restorability require almost triple the amount of spare capacity. Active Restoration Scheme is an efficient restoration scheme proposed recently. In (Mohamed Mostafa A. Azim, et al., 2005) we compare the dual-failure restorability of the path-based protection (PBP) scheme to that of the AR. In this paper we extend our study on the performance of AR when considering single-failure and dual-failure attacks. In particular, we present the blocking behavior as well as the restoration behavior of AR-based optical networks. Extensive simulation results on two typical test networks show that, on the average, AR scheme achieves lower blocking probability as well as better restoration probability compared to PBP scheme when considering single and dual like failures attacks

Published in:

Information, Communications and Signal Processing, 2005 Fifth International Conference on

Date of Conference:

0-0 0