Removal of loop back in p-cycle protection: Second phase reconfiguration

被引:0
|
作者
Asthana, Rachna [1 ]
Singh, Y. N. [2 ]
机构
[1] Harcourt Butler Technol Inst, Dept Elect Engn, Kanpur, Uttar Pradesh, India
[2] Indian Inst Technol, Dept Elect Engn, Kanpur, Uttar Pradesh, India
关键词
optical networks; p-cycle protection; reconfiguration of restored path;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
P-cycles are one of the most promising techniques of span protection used in optical networks. However the protection path provided by p-cycle may contain some nodes, which are part of the working path also. When the p-cycle is used to provide protection to any failed span of the working path, then due to the common nodes in working path and protection path provided by p-cycle, there will be overlapping of these nodes in the restored path. These overlapping nodes will appear twice in the restored path, once in the working path and then in the protection path provided by p-cycle for the protection of any failed span. This repetition will make loops at the overlapping nodes. Hence redundant span capacity will be used. To remove these loops, and release the redundant capacity a scheme is developed to reconfigure the restored path. This aspect of the p-cycle has not been discussed so far in the literature. The released capacity is calculated and it has been found that significant amount of capacity is released. The average amount of released capacity with second phase reconfiguration, is in the range of 26% to 28% for the test network, depending upon the traffic distribution.
引用
收藏
页码:506 / +
页数:3
相关论文
共 50 条
  • [21] Intelligent p-Cycle Protection for Dynamic Multicast Sessions in WDM Networks
    Feng, Taiming
    Ruan, Lu
    Zhang, Wensheng
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2010, 2 (07) : 389 - 399
  • [22] p-Cycle based protection schemes for multi-domain networks
    Farkas, A
    Szigeti, J
    Cinkler, T
    5TH INTERNATIONAL WORKSHOP ON DESIGN OF RELIABLE COMMUNICATION NETWORKS, PROCEEDINGS: RELIABLE NETWORKS FOR RELIABLE SERVICES, 2005, : 223 - 230
  • [23] A hybrid p-cycle search algorithm for protection in WDM mesh networks
    Lo, Kungmeng
    Habibi, Daryoush
    Rassan, Alexander
    Phung, Quoc Viet
    Nguyen, Hoang Nghia
    Kang, ByungKyu
    ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 262 - +
  • [24] Hybrid FRR/p-cycle design for link and node protection in MPLS networks
    Cao, Chang
    Rouskas, George N.
    Wang, Jianquan
    Tang, Xiongyan
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2013, 67 (06) : 470 - 478
  • [25] Protection Optimization of Power Communication Backbone Network Based on Equipotential P-cycle
    Qi B.
    Liu L.
    Li B.
    Sun Y.
    Zhu C.
    Xue J.
    Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2019, 39 (13): : 3799 - 3806
  • [26] Algorithm design of the p-Cycle protection applied to SDN based on OFDM transmission
    Zhao, Dezhi
    Li, Xingming
    Liu, Shun
    MECHANICAL COMPONENTS AND CONTROL ENGINEERING III, 2014, 668-669 : 1231 - 1236
  • [27] Application of p-Cycle Protection for the Substation Communication Network Under SRLG Constraints
    Li, Bin
    Yang, Jiao
    Qi, Bing
    Sun, Yi
    Yan, Huaguang
    Chen, Songsong
    IEEE TRANSACTIONS ON POWER DELIVERY, 2014, 29 (06) : 2510 - 2518
  • [28] P-Cycle Protection Strategy Based on Power Demand Response Service Characteristics
    Qi B.
    Ye X.
    Li B.
    Liu L.
    Chen S.
    Wu X.
    Dianwang Jishu/Power System Technology, 2021, 45 (12): : 4789 - 4797
  • [29] Service Availability Oriented p-Cycle Protection Design in Elastic Optical Networks
    Chen, Xiaoliang
    Ji, Fan
    Zhu, Zuqing
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2014, 6 (10) : 901 - 910
  • [30] A Distributed p-Cycle Protection Scheme in Multi-Domain Optical Networks
    Jaumard, Brigitte
    Kien Do Trung
    Toulouse, Michel
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 3019 - 3025