Loading [MathJax]/extensions/MathZoom.js
Smita Paira - IEEE Xplore Author Profile

Showing 1-10 of 10 results

Filter Results

Show

Results

Inter-core crosstalk due to the presence of multiple cores is one of the major issues to be taken care of in space division multiplexing based elastic optical networks (SDM-EONs). Again due to the random occurrence of spectral fragmentations in online SDM-EON, many high-priority connections get blocked. The underlying SDM-EON also suffers from ample data loss even if a single link in the network f...Show More
Spectral fragmentation caused by frequent arrival and departure of random dynamic connections is a major area of concern, which may lead to block even some high prioritized dynamic connection requests in elastic optical network (EON). EONs supporting high bandwidth data traffic may also suffer from huge data loss even if a single link fails. To ensure survivability in elastic optical network, adeq...Show More
In this paper, we have proposed two energy-efficient heuristics: (i) CMDE-RSCA (crosstalk-aware), and (ii) FMDE-RSCA (fragmentation-aware) to address the issues of inter-core crosstalk, and fragmentation within the core respectively- to ensure quality transmission of the optical signal for dynamic traffic in space division multiplexing elastic optical network (SDM-EON), while maintaining survivabi...Show More
Huge demand of high bandwidth applications nowadays necessitates the use of data centers (DC) as storage house at the nodes of Elastic optical networks (EON). Huge cost associated with DC limits its usage to some of the nodes in the network. Proper placement of these DCs as well as the requested files residing in these DCs has also crucial importance on network performance such as survivability an...Show More
In WDM technology, link failures have serious effects on multicast sessions compared to unicast sessions. As a request is being carried to different destinations, it is more critical to maintain survivability of such communication sessions. Various methods have been discovered so far but most of them work with huge restoration times. In this paper, one efficient Routing and Wavelength Assignment s...Show More
In this letter, we have proposed a novel energy efficient multipath-based survivability scheme against single link failure in static traffic scenario. A two-step integer linear programming model is formulated to minimize the use of energy consuming elements by the network, where both the constraints regarding survivability and energy efficiency are considered simultaneously. It is observed that si...Show More
Due to the tremendous rise in traffic demand, the need for scalable high speed optical networks is in demand. Our work focuses on online routing and wavelength assignment for multicast sessions in WDM based networks. We proposed a G-stream based approach to maximize resource utilization and minimize blocking probability with promising simulation results.Show More
This paper presents the review of certain important and well discussed traditional as well as proposed search algorithms with respect to their time complexity, space Complexity, merits and demerits with the help of their realize applications. This paper also highlights their working principles. As it is well known that every sorted or unsorted list of elements requires searching technique so many ...Show More
Network security is an important aspect of information sharing. Attempts have been made to remove various insecurities over internet. For this, many technological implementations and security policies have been developed. The amount of data, transferred, is not a factor. The basic factor is, how much security, the channel provides while transmitting data. Cryptography is one such technique, which ...Show More
Technology is advancing day-to-day. For a better and faster technology, information security is a must. This requires data authentication at the execution levels. Cryptography is a useful tool through which secure data independency can be established. It uses two basic operations namely encryption and decryption for secure data communication. A large number of cryptographic techniques have been pr...Show More