Protections for multicast session in WDM optical networks under reliability constraints

  • Authors:
  • Rongping Lin;Sheng Wang;Lemin Li

  • Affiliations:
  • Key Lab of Broadband Optical Fiber Transmission and Communication Networks, University of Electronic Science and Technology of China, Chengdu 610054, PR China;Key Lab of Broadband Optical Fiber Transmission and Communication Networks, University of Electronic Science and Technology of China, Chengdu 610054, PR China;Key Lab of Broadband Optical Fiber Transmission and Communication Networks, University of Electronic Science and Technology of China, Chengdu 610054, PR China

  • Venue:
  • Journal of Network and Computer Applications
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we investigate protections of multicast session under reliability constraints in WDM optical networks, which is not referred in previous works. All of the papers about protection of multicast session discuss 100% reliability that may be distinct in different users' requirement. At the beginning of the paper, we discuss the reliability of a tree. Then under reliability constraints, we propose three novel protection algorithms, which are Arc-Disjoint Tree with Different Reliability (ADT_DiR), Partial Tree Protection (PTP) and Choosing Segments Protection (CSP). ADT_DiR finds an arc-disjoint tree if the reliability of primary tree does not meet users' requirement. PTP finds a small protection tree for some part of primary tree and also meets users' requirement. CSP divides primary tree into segments first, and then protects some segments that are picked up by a strategy while satisfying users' requirement. Compared with all protection schemes in other papers, which provide 100% reliability, ADT_DiR, PTP and CSP all decrease the resources needed by backup tree and reduce the failure probability of finding backup trees. The simulation results show that all the three protection schemes decrease the blocking ratio and reduce the protection resources consumed comparing to other protection schemes while meeting users' requirement under dynamic traffics.