Rui Xu, Bin Chen, Mingjun Dai, Xiaohui Lin, Hui Wang
{"title":"Disaster survivability in elastic optical datacenter networks","authors":"Rui Xu, Bin Chen, Mingjun Dai, Xiaohui Lin, Hui Wang","doi":"10.1109/OGC.2016.7590489","DOIUrl":null,"url":null,"abstract":"Due to the increasing network risk of large-scale disaster, it is important to protect failed requests for network operators. For the disaster survivable problem in an elastic optical datacenter networks with a bandwidth constraint, we formulate an integer linear program (ILP) for shared protection model. The algorithm utilizes the priori method to maximize the network throughput firstly, and then to minimize used spectrum resources. Unicast and anycast methods in shared protection are investigated. Simulation results show that both methods provide the same network throughput, but the anycast method can use much less spectrum resources than the unicast method.","PeriodicalId":300208,"journal":{"name":"2016 IEEE Optoelectronics Global Conference (OGC)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Optoelectronics Global Conference (OGC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/OGC.2016.7590489","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Due to the increasing network risk of large-scale disaster, it is important to protect failed requests for network operators. For the disaster survivable problem in an elastic optical datacenter networks with a bandwidth constraint, we formulate an integer linear program (ILP) for shared protection model. The algorithm utilizes the priori method to maximize the network throughput firstly, and then to minimize used spectrum resources. Unicast and anycast methods in shared protection are investigated. Simulation results show that both methods provide the same network throughput, but the anycast method can use much less spectrum resources than the unicast method.