Please use this identifier to cite or link to this item: https://doi.org/10.1109/ICBN.2005.1589608
DC FieldValue
dc.titleDifferentiated QoS routing of restorable sub-lambda connections in IP-over-WDM networks using a multi-layer protection approach
dc.contributor.authorRatnam, K.
dc.contributor.authorGurusamy, M.
dc.contributor.authorLuying, Z.
dc.date.accessioned2014-06-19T03:06:25Z
dc.date.available2014-06-19T03:06:25Z
dc.date.issued2005
dc.identifier.citationRatnam, K., Gurusamy, M., Luying, Z. (2005). Differentiated QoS routing of restorable sub-lambda connections in IP-over-WDM networks using a multi-layer protection approach. 2nd International Conference on Broadband Networks, BROADNETS 2005 2005 : 137-146. ScholarBank@NUS Repository. https://doi.org/10.1109/ICBN.2005.1589608
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/69943
dc.description.abstractThis paper addresses the problem of quality of service (QoS) differentiation of sub-wavelength level label switched path (LSP) requests considering both differentiated survivability services and transmission quality in terms of end-to-end delay requirements of requests. We define different classes of LSP requests and propose a novel QoS differentiation scheme for IP-over-WDM networks. The scheme adopts a multi-layer protection approach with new inter-class backup resource sharing strategies and efficient dynamic online routing strategies. The multi-layer protection approach consists of dedicated lightpath protection, shared lightpath protection, and shared LSP protection methods. The inter-class backup resource sharing technique is used in addition to the traditionally used backup sharing technique for the purpose of improving the performance of different classes of traffic. The routing strategies consider efficient resource utilization and end-to-end delay requirements of different priority requests. In this work, LSPs belonging to different classes with different protection requirements are allowed to traverse the same lightpath to use resources effectively. This grooming approach is efficient in terms of resource usage and at the same time it poses several challenges: 1) how efficiently an existing lightpath protection can be used or modified to satisfy the protection requirement of a newly traversed LSP, and 2) when and how the protection resources are released or updated when an LSP is released while preserving the other LSPs' protection needs. Furthermore, a suitable network modeling is essential to implement the backup sharing strategies. In addition to this, an effective way of distributing signaling messages for failure recovery should also be considered as different protection methods are used. We address all these issues in the proposed scheme. Through simulation experiments, we investigate the impacts of the backup sharing strategies and the routing strategies on connections acceptance rate for different classes of traffic and end-to-end delay requirements of different priority requests. Based on simulation results we demonstrate how the selection of a suitable sharing strategy and a routing strategy can be done that gives the best performance for all the classes and show the effectiveness of the scheme in satisfying both users' QoS requirements and network services providers' requirements. © 2005 IEEE.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/ICBN.2005.1589608
dc.sourceScopus
dc.typeConference Paper
dc.contributor.departmentELECTRICAL & COMPUTER ENGINEERING
dc.description.doi10.1109/ICBN.2005.1589608
dc.description.sourcetitle2nd International Conference on Broadband Networks, BROADNETS 2005
dc.description.volume2005
dc.description.page137-146
dc.identifier.isiut000289904800036
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.