Trading Availability Among Shared-Protected Dynamic Connections in WDM
Trading Availability Among Shared-Protected Dynamic Connections in WDM
9 May 2012
Computer Networks xxx (2012) xxxxxx
1
Computer Networks
journal homepage: www.elsevier.com/locate/comnet
2
3
4
Q1
5
6
7
Q2
a r t i c l e
1 4
0
2
11
12
13
14
15
i n f o
Article history:
Received 14 October 2011
Received in revised form 17 April 2012
Accepted 18 April 2012
Available online xxxx
16
17
18
19
20
21
22
23
Keywords:
Optical network
WDM
Elastic availability
Holding time
Shared protection
SLA Violation Risk
a b s t r a c t
Novel automatized management systems for optical WDM networks promise to allow customers asking for a connection (i.e., a bandwidth service) to specify on-demand the terms
of the Service Level Agreement (SLA) to be guaranteed by the Network Operator (NO). In
this work, we exploit the knowledge, among the other Service Level Specications (SLS),
of the holding time and of the availability target of the connections to operate shared-path
protection in a more effective manner.
In the proposed approach, for each connection we monitor the actual downtime experienced by the connection, and, when the network state changes (typically, for a fault occurrence, or a connection departure or arrival), we estimate a new updated availability target
for each connection based on our knowledge of all the predictable network-state changes,
i.e., the future connection departures. Since some of the connections will be ahead of the
stipulated availability target in their SLA (credit), while other connections will be behind
their availability target (debit), we propose a mechanism that allows us to trade availability credits and debits, by increasing or decreasing the shareability level of the
backup capacity. Our approach permits to exibly manage the availability provided to living connections during their holding times.
The quality of the provided service is evaluated in terms of availability as well as probability of violation of availability target stipulated in the SLA (also called SLA Violation Risk),
a recently-proposed metric that has been demonstrated to guarantee higher customer satisfaction than the classical statistical availability. For a typical wavelength-convertible US
nationwide network, our approach obtains signicative savings on Blocking Probability
(BP), while reducing the penalties due to SLA violations. We also analytically demonstrate
that proposed scheme can be highly benecial if the monitored metric is the SLA Violation
Risk instead of the availability.
2012 Published by Elsevier B.V.
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
1. Introduction
In optical WDM networks survivability mechanisms are
needed to avoid that a failure of a network element may
cause signicant losses of revenue for those customers that
53
54
55
Q3
Q1
Corresponding author.
E-mail addresses: [email protected] (D. Lucerna), tornator@
elet.polimi.it (M. Tornatore), [email protected] (B. Mukherjee),
[email protected] (A. Pattavina).
Q1 Please cite this article in press as: D. Lucerna et al., Trading availability among shared-protected dynamic connections in WDM networks,
Comput. Netw. (2012), http://dx.doi.org/10.1016/j.comnet.2012.04.021
56
57
58
59
60
61
62
63
64
65
COMPNW 4771
9 May 2012
Q1
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
2. Prior work
164
This paper provides novel contributions on two complementary, bus distinct, lines of research in the eld of
shared-path protection: (1) how to route of availabilityguaranteed shared-path-protected connections and (2)
how to evaluate the SLA Violation Risk, or interval availability, for availability-guaranteed SPP routing.
165
171
172
Q1 Please cite this article in press as: D. Lucerna et al., Trading availability among shared-protected dynamic connections in WDM networks,
Comput. Netw. (2012), http://dx.doi.org/10.1016/j.comnet.2012.04.021
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
166
167
168
169
170
173
174
175
176
177
178
179
180
181
182
COMPNW 4771
9 May 2012
Q1
216
217
218
As a second aspect of the overview, consider that, in order to apply availability-aware routing, one has to rely on
rigorous analytical approaches to evaluate the long-term
theoretical availability of an SPP connection. Different availability analysis methods can be found in literature [1822].
An exhaustive comparison of these approaches can be
found in [23]. While the analytical estimation of the availability of an SPP connection is a mature topic, recent literature has shown that the theoretical long-term availability is
not enough to evaluate the quality of a connection provided
over a short period of time (e.g., a period comparable with
the average failure interval) in terms of SLA satisfaction.
More specically, different works have referred to the
concept of SLA Violation Risk, i.e., the probability that, given
a certain availability target AT and certain theoretical longterm availability associated to the path, the offered connection does satisfy the AT. The authors in [24,5] were the rst
to propose to quantify the uncertainty of optical-layer provisioning based on service settings and failure proles. In
[24], the probability of SLA violation is examined based on
simulation. By running a large number of connections in a
given network, the ratio of SLA violations over the total
admitted connections is determined, which essentially corresponds to our SLA Violation Risk at statistical level. How-
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
261
262
275
276
277
the arrival time and the holding time for the ith lightpath.
We associate a link vector [8] with each link in the network, to identify the sharing potential between backup
paths. The linkvector me for link e can be represented as
0
0
0
an integer set, mee j8e0 2 E; 0 6 mee 6 W e0 , where mee species the number of working lightpaths that traverse link
e0 and are protected by link e (i.e., their corresponding
289
Q1 Please cite this article in press as: D. Lucerna et al., Trading availability among shared-protected dynamic connections in WDM networks,
Comput. Netw. (2012), http://dx.doi.org/10.1016/j.comnet.2012.04.021
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
263
264
265
266
267
268
269
270
271
272
273
274
278
279
280
281
282
283
284
285
286
287
288
290
291
292
293
294
295
COMPNW 4771
9 May 2012
Q1
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
318
319
320
315
316
317
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
(C.5) the availability target AT of the incoming connection must be satised (AT 6 A);
(C.6) the availability target AT i of the existing connections must be satised (AT i 6 Ai ).
338
344
345
346
339
340
341
342
343
347
348
349
350
351
377
379
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
380
381
i
lw
382
384
Ce
8
>
<1
>
:
383
385
386
387
388
389
390
391
392
393
if
W ef
0^
0
9e0 2 lw jv ee v e
logAe ae otherwise
Q1 Please cite this article in press as: D. Lucerna et al., Trading availability among shared-protected dynamic connections in WDM networks,
Comput. Netw. (2012), http://dx.doi.org/10.1016/j.comnet.2012.04.021
352
395
396
397
398
399
400
401
402
403
404
405
406
407
COMPNW 4771
9 May 2012
Q1
408
8
Q
< ae 8e00 Rflw S egj9e0 2lw ^De0 ;e00 Pv Ae00
e
e
Q
S
: ae
e0 ;e00
Ae00
00
0
8e Rflw
>v e
if 8 e0 2 lw jv ee < v e
if W ef 0 ^ 9e0 2 lw jv ee v e
0
410
411
412
413
414
415
416
417
418
419
420
Let us now discuss the new concept of SPP with availability trading and what are the upgrades to AGP needed
to obtain an algorithm for the new approach.
In the proposed algorithm, whenever a new connection
is offered to the network, we exploit three crucial pieces of
information: (i) the outage history of the connection (i.e., if
an existing connection has been already subject to
outages), (ii) for how long the connection is going to remain
in the network, (iii) for how long the other existing
connections are going to remain in the network. Hence, we
will refer to this algorithm as Holding-Time-Aware (HTA)
algorithm.
The basic idea is that, with respect to a specic connection, NO may pass (with respect to its customers) from situations of availability credit to conditions of availability
debit, and vice versa, as long as the overall SLA target is
guaranteed. There are four possible availability transactions that can be managed by the NO:
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
4.1. NO credit
483
484
Q1 Please cite this article in press as: D. Lucerna et al., Trading availability among shared-protected dynamic connections in WDM networks,
Comput. Netw. (2012), http://dx.doi.org/10.1016/j.comnet.2012.04.021
463
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
COMPNW 4771
9 May 2012
Q1
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
530
Af
Ti
i
AT i t ih Ap t ia t c
t ia t ih t c
3
539
540
4.2. NO debit
531
532
533
534
535
536
537
538
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
e0 ;e00
00
;e
between two departures. mee Dsk ; ze
Dsk and De
e
Dsk will be updated according to the kth connection
departure. In other words, we have divided the time into a
series of intervals Ds which express the distance between
two departures. In Fig. 2 we focus on the departure events
on link CD of the network in Fig. 1, assuming that also connection r2 has been provisioned:
563
Ds1 (from time 10 to time 20): backup paths of connection r1 and connection r2 share a wavelength on
link CD. During this time interval the provided
availability A1(Ds1) = A2(Ds1) is low and equal to
0.98945.
Ds2 (from time 20 to time 40): r2 has a dedicated
resource on link CD because connection r1 has left
the network. In this time interval the suppliable
availability A2(Ds2) is equal to 0.99152.
570
565
566
567
568
569
571
572
573
574
575
576
577
578
579
As examined in previous section, during Ds1, NO can reduce its availability credit with connection r1. Moreover, at
the same time interval, NO can go voluntarily into debit
with r2 because it will be paid off during the r2s residual
lifetime, i.e., Ds2. Likewise, the NO will be able to guaranf2 0:99083 and also connectee an overall availability of A
tion r2 will be accepted.
More generally, the state of a link can vary in time, passing, e.g., from shared to dedicated. and the availability provided to the connection could consequently change. Each
of these availability contributions Ai(Dsk) can then be
weighted proportionally over each time interval according
to the following equation:
Aei
580
581
582
583
584
585
586
587
588
589
590
591
592
593
Dsk Ai D k D k
t ia t ih tc
Q1 Please cite this article in press as: D. Lucerna et al., Trading availability among shared-protected dynamic connections in WDM networks,
Comput. Netw. (2012), http://dx.doi.org/10.1016/j.comnet.2012.04.021
564
595
596
597
598
599
600
601
602
603
COMPNW 4771
9 May 2012
Q1
621
622
As often mentioned throughout the paper, availabilityguaranteed provisioning in a optical WDM network must
typically satisfy the condition that the theoretical longterm availability A provided to a connection is greater or
equal to the stipulated availability target SLA. However,
due to the stochastic nature of network failures, even if
A 6 SLA, over a limited time period, there is a not-negligible probability that the actual provided availability turns
out to be less than the availability target, and so the stipulated contracts are usually at risk. Different works have referred to concept of calculating the SLA-Violation Risk
(SLA-VR), i.e., the probability that, given a certain availability target SLA and a certain theoretical long-term availability A associated to a connection, the provisioned path
satises the SLA target (see e.g., [6,7]).
In this section, we investigate an analytical approach
that allows us to utilize the HTA trading approach
proposed considering the SLA-Violation Risk (SLA-VR)
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
we know the actual availability AAi (i.e., AAi here do not represent the long-term availability, but the actual experienced availability), we can easily calculate the Provided
DownTime (PDTi) and the Stipulated maximum allowable DownTime (SDTi) as:
648
642
643
644
645
646
647
649
650
651
652
653
PDT i 1 AAi t ih ;
SDT i 1 AT i tih :
655
656
657
658
659
660
661
662
663
664
665
666
667
668
670
671
(C.5bis) The availability target A of the incoming connection must be guaranteed with an SLA-VR lower or
equal than a Prexed Risk Probability (PRP).
(C.6bis) The availability target Ai of the existing connections must be guaranteed with a SLA-VRi lower or equal
than a Prexed Risk Probability (PRP).
676
Q1 Please cite this article in press as: D. Lucerna et al., Trading availability among shared-protected dynamic connections in WDM networks,
Comput. Netw. (2012), http://dx.doi.org/10.1016/j.comnet.2012.04.021
641
672
673
674
675
677
678
679
680
681
COMPNW 4771
9 May 2012
Q1
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
706
707
708
709
ki
1 Ai
:
MTTR i 1 Ai MTTR i
SLA VR i
711
712
713
714
715
716
717
718
719
720
721
722
xjf1AT t ih <xMTTR
i
x
i
eki th ki tih
x!
725
728
X eki tia tih tc ki t ia t ih tc x
SLA g
VR i
x!
x
723
724
726
10
732
i
i
where xjf1 Af
T i t a t h t c < x MTTR i g and a new
couple of availability target and SLA Violation Risk
g
f Af
can substitute the previous one
T i ; SLA VRi g
fAT i ; SLA VRi g during the check of condition C.6bis.
733
734
729
730
731
735
736
737
P
ki
Dsk ki D k D k
t ia t ih t c
MTTR i
s Dsk
12
740
741
743
744
754
755
778
779
3
With an average connection holding time of 15 days, the MTTR results
equal to 12 h.
Q1 Please cite this article in press as: D. Lucerna et al., Trading availability among shared-protected dynamic connections in WDM networks,
Comput. Netw. (2012), http://dx.doi.org/10.1016/j.comnet.2012.04.021
739
11
Dsk MTTR i D k
t ia tih tc
738
745
746
747
748
749
750
751
752
753
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
780
781
782
783
784
785
786
787
788
COMPNW 4771
9 May 2012
Q1
11
20
21
16
12
15
22
4
13
10
17
14
18
23
24
Table 1
Blocking probability, BP (%): AGP vs. HTA vs. [29].
Arrival rate
AGP
[29]
HTA
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
20
40
60
80
100
0.526
0.250
0.151
4.38
2.567
1.028
9.0411
5.745
2.6190
14.092
9.034
4.9650
17.677
12.270
7.2391
forms AGP, especially for high loads: e.g., at around 100 Erlangs, BP decreases from 17% to 12%. The HTA approach further reduces the BP respect to the previous approach
reported in [29]: at around 100 Erlangs, BP decreases from
12% to 7%. The connection blocking may be due to four different causes: lack of resources, violation of condition C.5,
violation of condition C.6, and violation of both conditions
C.5 and C.6. Fig. 5a and b shows the impact of the various
contribution to BP in the AGP and HTA approach, respectively, for increasing trafc load. Note that in AGP approach,
the inability to guarantee the SLA availability target to existing connections is the main causes of connection blocking
(violation of condition C.6). As show in Fig. 5b, HTA outperforms AGP, because it drastically reduces the blocking due to
violation of condition C.6.
804
805
814
815
816
806
807
808
809
810
811
812
813
817
818
819
820
836
837
856
857
Q1 Please cite this article in press as: D. Lucerna et al., Trading availability among shared-protected dynamic connections in WDM networks,
Comput. Netw. (2012), http://dx.doi.org/10.1016/j.comnet.2012.04.021
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
COMPNW 4771
9 May 2012
Q1
10
Fig. 6. Percentage of violated SLA targets for SLA Class 3 (a) and unprotected connections percentage for SLA Class 2 (b): AGP vs. HTA.
Table 2
Actual availability supplied by AGP and HTA, compared to the target SLA.
Arrival rate
Average stipulated
SLA
AGP
HTA
876
877
878
879
880
20
40
60
80
100
0.9963
0.9963
0.9963
0.9963
0.9963
0.99897
0.99882
0.99896
0.99870
0.99895
0.99862
0.99895
0.99854
0.99894
0.99848
Q1 Please cite this article in press as: D. Lucerna et al., Trading availability among shared-protected dynamic connections in WDM networks,
Comput. Netw. (2012), http://dx.doi.org/10.1016/j.comnet.2012.04.021
881
882
883
884
885
COMPNW 4771
9 May 2012
Q1
11
Fig. 7. SLA Violation Risk for increasing percentage of the expired holding time without (a) and with (b) availability trading and SLA target redenition.
909
910
7. Conclusion
911
924
925
Acknowledgments
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
912
913
914
915
916
917
918
919
920
921
922
923
926
927
928
Q4
929
931
933
MTTR
l
;
MTBF MTTR l k
932
A:1
where A is the availability, MTBF = 1/k is the mean time between two consecutive failures, and MTTR = 1/l is the
mean time to repair [19]. According to [30] we consider
failure-immune nodes and we focus only on link failures.
Then, let Ae denotes the availability of the link e.
The availability of the working and the backup paths
can be individually computed. Let lw and lb denote the set
of links used by working path and backup path, respectively. Then, the availabilities of the paths are given by
the following equations:
Al w
Ae ;
A:2
Ae :
A:3
934
935
936
937
938
939
940
941
943
944
945
946
947
948
949
950
951
952
953
954
e2lw
Al b
956
e2lb
De
e0
e00
e0 ;e00
v e v e ze
A:4
Q1 Please cite this article in press as: D. Lucerna et al., Trading availability among shared-protected dynamic connections in WDM networks,
Comput. Netw. (2012), http://dx.doi.org/10.1016/j.comnet.2012.04.021
930
957
958
959
960
961
962
963
964
965
966
967
968
969
970
972
COMPNW 4771
9 May 2012
Q1
12
0
00
982
983
985
986
References
973
974
975
976
977
978
979
980
981
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
Q5
Q6
A:5
[1] C. Pinart, G.J. Giralt, On managing optical services in future controlplane-enabled IP/WDM networks, Journal of Lightwave Technology
23 (2005) 28682876.
[2] L. Song, J. Zhang, B. Mukherjee, Dynamic provisioning with
availability guarantee for differentiated services in survivable mesh
networks, IEEE Journal on Selected Areas in Communications 25
(2007) 3543.
[3] A. Iselt, A. KirstSdter, R. Chahine, The role of ASON and GMPLS for the
bandwidth trading market, in: Proc. 1st International Conference on
E-business and Telecomm. Networks (ICETE2004), 2004.
[4] Z. Pandi, M. Tacca, A. Fumagalli, L. Wosinska, Dynamic provisioning
of availability-constrained optical circuits in the presence of optical
node failures, IEEE/OSA Journal of Lightwave Technology 24 (2007)
32683279.
[5] Z. Ling, W.D. Grover, A Theory for Setting the Safety Margin on
Availability Guarantees in an SLA, DRCN 2005, October 2005.
[6] D. Mello, H. Waldman, G.S. Quiterio, Interval availability estimation
for protected connections in optical networks, Computer Networks
55 (2011) 193204.
[7] C.M.M. Xia, M. Tornatore, B. Mukherjee, Risk-aware provisioning for
optical WDM Mesh Networks, IEEE/ACM Transactions on
Networking 19 (2011) 921931.
[8] Canhui Ou, Jing Zang, Hui Zang, L.H. Sahasrabuddhe, Biswanath
Mukherjee, New and improved approaches for shared-path
protection in WDM mesh networks, IEEE Journal of Lightwave
Technology 22 (2004) 12231232.
[9] J.Y. Yen, Finding K shortest loopless paths in a network, Management
Science (1971) 712716.
[10] G. Li, D. Wang, C. Kalmanek, R. Doverspike, Efcient distributed path
selection for shared restoration connections, in: Proc. IEEE
INFOCOM, June 2002, pp. 140149.
[11] M. Tornatore, C. (Sam) Ou, J. Zhang, A. Pattavina, B. Mukherjee,
PHOTO: an efcient shared-path protection strategy based on
connection-holding-time
awareness,
IEEE/OSA
Journal
on
Lightwave Technology 23 (2005) 31383146.
[12] J. Zhang, K. Zhu, H. Zang, B. Mukherjee, A new provisioning
framework to provide availability-guaranteed service in WDM
mesh networks, in: Proc. IEEE ICC03, May 2003, pp. 14841488.
[13] D.A.A. Mello, J.U. Pelegrini, R.P. Ribeiro, D.A. Schupke, H. Waldman,
Dynamic provisioning of shared-backup path protected connections
with guaranteed availability requirements, International Workshop
on Guaranteed Optical Service Provisioning (GOSP), October 2005.
[14] Y. Li, Q. Qiu, L. Li, Availability-aware routing in optical networks with
primary-backup sharing, in: Proc. High Performance Switching and
Routing (HPSR08).
[15] Q. Guo, P.-H. Ho, A. Haque, H.T. Mouftah, Availability-constrained
shared backup path protection (SBPP) for GMPLS-based spare
capacity reconguration, in: Proc. ICC07.
[16] B. Kantarci, H.T. Mouftah, S. Oktug, Adaptive schemes for
differentiated availability-aware connection provisioning in optical
transport networks, OSA Journal of Optical Networking 27 (2009)
45954602.
[17] C. Cavdar, L. Song, M. Tornatore, B. Mukherjee, Holding-time-aware
and availability-guaranteed connection provisioning in optical WDM
mesh networks, in: International Symposium High Capacity Optical
Networks and Enabling Technologies, HONET, November 2007.
[18] J. Zhang, K. Zhu, H. Zang, N.S. Matloff, B. Mukherjee, Availabilityaware provisioning strategies for differentiated protection services
in wavelength-convertible WDM mesh networks, IEEE/ACM
Transactions on Networking 15 (2007) 11771190.
[19] M. Tornatore, G. Maier, A. Pattavina, Availability design of optical
transport network, IEEE Journal on Selected Areas in
Communications 23 (2005) 15201532.
[20] D.A.A. Mello, D.A. Schupke, H. Waldman, A matrix-based analytical
approach to connection unavailability estimation in shared backup
path protection, IEEE Communications Letters 9 (2005) 3543.
[21] L. Zhou, M. Held, U. Sennhauser, Connection availability analysis of
shared backup path-protected mesh networks, IEEE/OSA Journal of
Lightwave Technology 25 (2007) 11111119.
[22] J. Segovia, E. Calle, P. Villa, J. Marzo, J. Tapolcai, Topology-focused
availability analysis of basic protection schemes in optical transport
networks, OSA Journal of Optical Networking 7 (2008) 351364.
[23] M. Tornatore, D. Lucerna, B. Mukherjee, A. Pattavina, Multilayer
protection with availability guarantees in WDM optical networks,
Journal of System and Network Management (Springer) 20 (2012)
3455.
[24] R. Clemente, M. Bartoli, M. Bossi, G. DOrazio, G. Cosmo, Risk
management in availability SLA, in: Proc. of Conference on Design of
Reliable Communication Network (DRCN05). Ischia, Italy.
[25] M. Xia, J. Choi, T. Wang, Risk Assessment in SLA-Based WDM
Backbone Networks, OFC 2009, March 2009.
[26] P. Cholda, A. Mykkeltveit, B. Helvik, A. Jajszczyk, Continuity-based
resilient communication, in: Proc. of Conference on Design of
Reliable Communication Network (DRCN09). Washington, DC, USA.
[27] D. Mello, G.S. Quiterio, H. Waldman, D.A. Schupke, Specication of SLA
survivability requirements for optical path protected connections, in:
Proc. of Optical Fiber Communication Conference (OFC06).
[28] K. Jong, K. Shin, Performance evaluation of dependable real-time
communication with elastic QoS, in: Proc. of International
Conference on Dependable Systems and Networks, (DSN), pp. 295
303.
[29] M. Tornatore, D. Lucerna, L. Song, B. Mukherjee, A. Pattavina,
Dynamic SLA Redenition for Shared-Path-Protected Connections
with Known Duration, OFC 2008, February 2008.
[30] L. Jereb, T. Jakab, F. Unghvary, Availability analysis of multi-layer
optical networks, Optical Networks Magazine (2002) 8494.
[31] J. Doucette, M. Clouqueur, W.D. Grover, On the availability and
capacity requirements of shared backup path-protected mesh
networks, Optical Networks Magazine 4 (2003) 2944.
1086
Diego Lucerna received a Ph.D. in Information
Engineering in 2011 from Politecnico di
Milano. His research interests include
switching technologies, network equipments,
telematic applications and management of
public and private networks. He is currently
enrolled in Huawei Technologies Italia as
Customer Support Optical Engineer for
WDM, SDH and microwave systems.
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1088
Massimo Tornatore (S03-M07) received the
Ph.D. degree in information engineering from
the Polytechnic University of Milan, Milan,
Italy, in May 2006. He is currently an Assistant
Professor with the Department of Electronics
and Information, Polytechnic University of
Milan. From 2007 to 2009, he was a PostDoctoral Researcher with the University of
California, Davis, where he is still collaborating as a Visiting Researcher. He is coauthor of
more than 80 conference and journal papers.
His research interests include design, energy
efciency, trafc grooming in optical networks, and group communication security.
Q1 Please cite this article in press as: D. Lucerna et al., Trading availability among shared-protected dynamic connections in WDM networks,
Comput. Netw. (2012), http://dx.doi.org/10.1016/j.comnet.2012.04.021
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1100
1115
COMPNW 4771
9 May 2012
Q1
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1117
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
13
1148
1149
1150
1151
1152
1153
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1155
1170
1171
1172
1173
1174
1175
1176
1177
1178
Q1 Please cite this article in press as: D. Lucerna et al., Trading availability among shared-protected dynamic connections in WDM networks,
Comput. Netw. (2012), http://dx.doi.org/10.1016/j.comnet.2012.04.021