Notification:
We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

Linear programming approach to link capacity design for shared protection

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Matsumura, R. ; NTT Service Integration Labs., NTT Corp., Tokyo, Japan ; Tsujino, M. ; Hasegawa, H.

The end-to-end traffic volume between source and destination nodes in a telecommunication carrier network is essential traffic information for computing the necessary link capacity for the network's primary and backup paths. However, the end-to-end traffic volumes are not frequently measured because it puts additional loads onto the network equipment, and the measuring devices are too expensive to install on all the links of the network. Under these circumstances, network carriers must estimate the link capacity under limited available traffic information. We propose a link-capacity design model for shared protection to meet this demand. Shared protection is effective for economically constructing networks; however, it complicates network design. In this model, we formulate the link-capacity design as a series of linear programming problems. Since the algorithm for solving the model is time-consuming, we modified it to accelerate computation. We evaluated the proposed model from the viewpoint of the gap between computational and actual bandwidths in several networks and the proposed algorithms from the viewpoint of computing time.

Published in:

Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2010 International Congress on

Date of Conference:

18-20 Oct. 2010