Survey on Dependable IP-over-Fiber Networks

dc.contributor.authorKurant, M.
dc.contributor.authorNguyen, H.
dc.contributor.authorThiran, P.
dc.contributor.editorHutchison, D.
dc.contributor.editorKanade, T.
dc.contributor.editorKittler, J.
dc.contributor.editorKleinberg, J.
dc.contributor.editorKobsa, A.
dc.contributor.editorMattern, F.
dc.contributor.editorMitchell, J.
dc.contributor.editorNaor, M.
dc.contributor.editorNierstrasz, O.
dc.contributor.editorPandu Rangan, C.
dc.contributor.editorSteffen, B.
dc.contributor.editorSudan, M.
dc.contributor.editorTerzopoulos, D.
dc.contributor.editorTygar, J.
dc.contributor.editorWeikum, G.
dc.date.issued2006
dc.description.abstractThis paper gives a survey of the techniques for failure location, protection and restoration in IP over optical fiber networks. The first part of the paper reviews failure location algorithms at the optical and the IP layers. We classify the failure location algorithms at the optical layer into two main categories: the model based approach, that builds an abstract model of the network and uses this model to diagnose failures, and the learning based approach, that views the network as a black box and diagnoses failures using a set of rules obtained either by learning or by the expertise of the human manager. At the IP layer, we focus on the location of one of the main sources of failure: lossy links. The lossy link location algorithms can also be classified into two categories: the correlation approach, that requires strong correlation between monitoring packets, and the simple tomography approach, that requires some knowledge of the distribution of lossy links. The second part of the paper describes the main strategies that ensure survivability in IP-over-fiber networks. After a failure, traffic can be restored either at the optical layer or at the IP layer. Protection at the optical layer amounts to dedicate some lightpaths to reroute the traffic disrupted by the failure. Restoration at the IP layer eliminates the need to set up back-up optical paths, but requires to map the IP layer on the optical layer in a survivable way. We describe the most common approaches achieving this. © Springer-Verlag Berlin Heidelberg 2006.
dc.description.statementofresponsibilityMaciej Kurant, Hung X. Nguyen and Patrick Thiran
dc.identifier.citationLecture Notes in Computer Science (LNCS) 4028: Dependable Systems: Software, Computing, Networks, 2006 / Hutchison, D., Kanade, T., Kittler, J., Kleinberg, J., Kobsa, A., Mattern, F., Mitchell, J., Naor, M., Nierstrasz, O., Pandu Rangan, C., Steffen, B., Sudan, M., Terzopoulos, D., Tygar, J., Weikum, G. (ed./s), vol.4028 LNCS, pp.55-81
dc.identifier.doi10.1007/11808107_3
dc.identifier.isbn9783540368212
dc.identifier.orcidNguyen, H. [0000-0003-1028-920X]
dc.identifier.urihttp://hdl.handle.net/2440/56423
dc.language.isoen
dc.publisherSpringer
dc.publisher.placeBerlin
dc.relation.ispartofseriesLecture Notes in Computer Science 2006; 4028: 55-81
dc.source.urihttps://doi.org/10.1007/11808107_3
dc.titleSurvey on Dependable IP-over-Fiber Networks
dc.typeBook chapter
pubs.publication-statusPublished

Files