PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Service restoration in survivable networks under attacks

Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
A comparison of service restoration quality in survivable optical transport networks OTN (WDM) degraded due to physical failures or degraded after intentional attack is described. Survivability assumptions are as follows: end-to-end path protection: preplanned node-disjoint backup path for each working path. The lightpaths optimization problem in survivable networks is NP-complete and we propose the heuristic SCNDP algorithm to solve the problem. The original author’s network simulator was used to model five network: National Science Foundation (NSF) network, PIONIER (Polish Optical Internet). Italian optical network, artificial intermediate network (AIN) and artificial scale-free network (ASF), corresponding to parameters of NSF. Single node outages being either a consequence of physical failures, or resulting from malicious attacks were simulated in each of the five networks. We showed that the differences in the effectiveness of service restoration caused by these two mechanisms are rather small in networks having regular topologies (like NSF), but in contrast, are significant in intermediate and scale-free networks (much more vulnerable to attacks). All results are the original contribution and are published for the first time.
Czasopismo
Rocznik
Strony
15--26
Opis fizyczny
Bibliogr. 17 poz., rys.
Twórcy
autor
autor
  • Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology, Gabriela Narutowicza 11/12, 80-952 Gdańsk, Poland, tomag@eti.pg.gda.pl
Bibliografia
  • [1] Albert R., Barabasi A.-L., Statistical mechanics of complex networks. Reviews of Modern Physics, Vol. 74. 2002. pp. 47-97.
  • [2] Colle D. et al.. Data-centric optical networks and their sur-vivability, IEEE J. Select. Areas Commun., Vol. 20. 2002, pp. 6-21.
  • [3] Crucitti P., Latora V., Marchiori M., Rapisarda A., Efficiency of Scale-Free Networks: Error and Attack Tolerance, cond-mat/020560 I.May 2002
  • [4] Faloutsos M.. Faloutsos P.. Faloutsos C., On Power-Law Relationships of the Internet Topology, Proc. ACM SIGCOMM’99, August 1999.
  • [5] Gierszewski T., Odporność na awarie sieci bezskalowych, II Konf. Technologie Informacyjne. Gdańsk, 16-18 May 2004, Technol. Informacyjne nr 4, pp. 455-462, (in Polish).
  • [6] Gierszewski T., Rak J., Scale-free networks. Scientific report no. 11/2004. Faculty of Electronics Telecommunications and Informatics, Gdańsk University of Technology. 12.2004. 74 p.
  • [7] Goh K.-I., Oh E., Jeong H., Kahng B.. Kim D., Classification of scale-free networks, Proc. Natl. Acad. Sci. U.S.A. 99, 2002, 12583-12588.
  • [8] Maher A., Shareabilily in optical networks: beyond bandwidth optimization, IEEE Optical Communications, 02/2004, pp. 511-515
  • [9] Mead N.R., Ellison R.J., Linger R.C., Longstaff T., McHugh J., Survivable network analysis method. Software Engineering Institute Rep. SEI 2000-TR-013, September 2000.
  • [10] Molisz W., Survivability issues in IP-MPLS networks. Systems Science, Vol. 31, No. 4, 2005, pp. 87-106.
  • [11] Molisz W.. Rak J., End-to-end service survivability under attacks on networks, 7th NATO Regional Conf. Military Communications and Information Systems RCMCIS 2005, October 4th-5th, 2005, Military Communication Institute in Zegrze, Poland, Burakowski W., Bella L. (eds.), 2005, pp. 116-125.
  • [12] Ramamurthy S., Mukherjee B., Survivable WDM mesh networks, Pan I - protection, Proc. IEEE INFOCOM’99, New York City, March 1999, pp. 744-751.
  • [13] Ramamurthy S., Mukherjee B.. Survivable WDM mesh networks, Pan II - restoration, Proc. IEEE ICC’99, Vol. 3, Vancouver. BC, June 1999, pp. 2023-2030.
  • [14] Suurballe J.W., Disjoint paths in a network. Networks, John Willey&Sons, 1974, pp. 125-145.
  • [15] Xiang B., Wang S., Li L., A traffic grooming algorithm based on shared protection in WDM mesh networks, Proc. Fourth IEEE Int. Conf. Parallel and Distributed Computing, Applications and Technologies, 2003, PDCAT’2003.27-29 August 2003, pp. 254-258.
  • [16] http://www.pionier.gov.pl/siec/infrastruktura.htm
  • [17] http://vlado.fmf.uni-lj.si/pub/networks/pajek/
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT5-0027-0067
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.