By Topic

Path Computation Algorithms for Dynamic Service Provisioning With Protection and Inverse Multiplexing in SDH/SONET Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Madanagopal Ramachandran ; Computer Science and Engineering, Indian Institute of Technology, Madras, Chennai, India ; N. Usha Rani ; Timothy A. Gonsalves

Synchronous Digital Hierarchy (SDH) and Synchronous Optical Network (SONET) are time-division multiplexing technologies widely used in transport networks to provide bandwidth services. Dynamic service provisioning requires the use of online algorithms that automatically compute the path to be taken to satisfy the given service request. SDH/SONET multiplexing structure imposes restrictions on the allocation of bandwidth. Bandwidth services mostly require protection so that they are resilient to failures in the network. Two types of protection techniques-namely, dedicated protection and shared protection-are commonly used to protect bandwidth. Also, SDH/SONET provides standard protection mechanisms like linear MSP/APS, MS-SPRing/BLSR and SNCP/UPSR. In shared protection, complete path information for all the existing connections has to be maintained to maximize sharing for future service requests. This information will be typically very large. To overcome this problem, a minimum information scenario is proposed as a tradeoff between maintaining less information and maximizing sharing. In this work, heuristic algorithms are proposed for dedicated and shared protection that take into account the above-mentioned factors. These algorithms use the path computation algorithms for SDH networks proposed in a previous work of the authors, which compute paths for service requests without considering protection. The performance is evaluated for different values for the relative weight of sharing for the complete and minimum information scenarios. An extension to these algorithms for satisfying bandwidth requests that use various inverse multiplexing techniques is also proposed.

Published in:

IEEE/ACM Transactions on Networking  (Volume:18 ,  Issue: 5 )