Protection in survivable WDM grooming network.

dc.contributor.advisorDr. Rudra Dutta, Committee Chairen_US
dc.contributor.advisorDr. Mladen A. Vouk, Committee Memberen_US
dc.contributor.advisorDr. Injong Rhee, Committee Memberen_US
dc.contributor.authorTiyachate, Ruaroben_US
dc.date.accessioned2010-04-02T18:10:03Z
dc.date.available2010-04-02T18:10:03Z
dc.date.issued2004-05-05en_US
dc.degree.disciplineComputer Networkingen_US
dc.degree.levelthesisen_US
dc.degree.nameMSen_US
dc.description.abstractOptical networks have been widely expected to fill the need for tomorrow's backbone networks because of the high bandwidth and highly predictable performance they promise. However, in recent years, the downturn of the economy has made the deployment of costly equipment to obtain very high bandwidth less immediately attractive. In the current context, research must address these realistic conditions, and this is part of the motivation for the area in which the research in this thesis is performed. We propose a two-step approach to design, and show how this approach is suitable from both the grooming and the protection points of view. We adopt well-known heuristics from literature to perform stand-alone grooming and stand-alone protection at the virtual link level, enhancing the protection algorithm by adotping a failure independent routing but failure-specific wavelength assignment for protection virtual links. We show that in relative terms, the grooming performance of the protection design is already quite good due to this approach. However, protecting at the virtual link level invariably increases the grooming cost of the protection solution, and this cost can be significant at the node at which it is maximum. We go on to show how this can be countered by performing sub-wavelength protection. All our theoretical expectations are validated by numerical simulations. Our results are as follows. Subwavelength protection can effectively use unutilized capacity in existing virtual topology. Proposed protection results in protection solution with less total amount of electronic processing from both individual traffic component and overall traffic component point of view. Proposed algorithm not only decreases the amount of electronic processing from protection solution, but also decreases amount of virtual link setup for protection. The implementation of the two-phase approach help reduce the computation time to find an effective protection solution. Numerical results show that proposed algorithm has performed well and produces similar effects on different traffic patterns and topologies.en_US
dc.identifier.otheretd-02052004-135503en_US
dc.identifier.urihttp://www.lib.ncsu.edu/resolver/1840.16/2065
dc.rightsI hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to NC State University or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report.en_US
dc.subjectWDMen_US
dc.subjectoptical networksen_US
dc.subjectsurvivabilityen_US
dc.subjectprotectionen_US
dc.subjectgroomingen_US
dc.titleProtection in survivable WDM grooming network.en_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
etd.pdf
Size:
960.14 KB
Format:
Adobe Portable Document Format

Collections