Telecomunicazione. A Priority-Aware Protection Technique for QoS Enabled WDM Networks



Similar documents
(VCP-310)

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

Determining the sample size

Skytron Asset Manager

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1 - Describe Cisco VoIP Implementations

FPO. A global telecom s strategy. for Canada

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

FUEL / VEHICLE TRACKING UNIT GPS tracking and fuel monitoring solution providers

Resource Reservation and Utility based Rate Adaptation in Wireless LAN with Slow Fading Channels

Industrial & Energy Producing Facilities

CHAPTER 11 Financial mathematics

CHAPTER 3 THE TIME VALUE OF MONEY

CCH Accountants Starter Pack

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu

Z-TEST / Z-STATISTIC: used to test hypotheses about. µ when the population standard deviation is unknown

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

TruStore: The storage. system that grows with you. Machine Tools / Power Tools Laser Technology / Electronics Medical Technology

Agricultural & Agri-Business Grant Opportunities. Presented By: Connie Miner Grant Consultant

Verizon Wireless Broadband Network Connectivity and Data Transport Solutions. Verizon Wireless White Paper

LECTURE 13: Cross-validation

Convention Paper 6764

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction

June 3, Voice over IP

Subject CT5 Contingencies Core Technical Syllabus

Incremental calculation of weighted mean and variance

Amendments to employer debt Regulations

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)

How to Build More Successful Strategic Supplier Relationships

Data Center Ethernet Facilitation of Enterprise Clustering. David Flynn, Linux Networx Orlando, Florida March 16, 2004

Effective Data Deduplication Implementation

Agenda. Outsourcing and Globalization in Software Development. Outsourcing. Outsourcing here to stay. Outsourcing Alternatives

A Balanced Scorecard

Normal Distribution.

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Introducing Your New Wells Fargo Trust and Investment Statement. Your Account Information Simply Stated.

Supply Chain Management

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval

E-Plex Enterprise Access Control System

Chapter 1 INTRODUCTION TO MAINTENANCE AND REPLACEMENT MODELS

My first gold holdings. My first bank. Simple. Transparent. Individual. Our investment solutions for clients abroad.

On the Capacity of Hybrid Wireless Networks

Information about Bankruptcy

Modified Line Search Method for Global Optimization

Basic Measurement Issues. Sampling Theory and Analog-to-Digital Conversion

A Guide to Better Postal Services Procurement. A GUIDE TO better POSTAL SERVICES PROCUREMENT

Agency Relationship Optimizer

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks

QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy

EUROCONTROL PRISMIL. EUROCONTROL civil-military performance monitoring system

3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions

Security Functions and Purposes of Network Devices and Technologies (SY0-301) Firewalls. Audiobooks

ContactPro Desktop for Multi-Media Contact Center

ni.com/sdr Software Defined Radio

ANALYTICS. Insights that drive your business

SOCIAL MEDIA. Keep the conversations going

Radio Dispatch Systems

Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites

INVESTMENT PERFORMANCE COUNCIL (IPC)

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

I. Chi-squared Distributions

Reliability Analysis in HPC clusters

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

client communication

FM4 CREDIT AND BORROWING

CHAPTER 3 DIGITAL CODING OF SIGNALS

IT Support n n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user

Xantaro Maintenance Services & Operations. XTAC User Guide. UK Edition

Cantilever Beam Experiment

CHAPTER 3 The Simple Surface Area Measurement Module

GROSS MARGIN MANAGEMENT FRAMEWORK FOR MERCHANDISING DECISIONS IN COMPANIES WITH LARGE ASSORTMENT OF PRODUCTS

Repeating Decimals are decimal numbers that have number(s) after the decimal point that repeat in a pattern.

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

Lesson 17 Pearson s Correlation Coefficient

Is there employment discrimination against the disabled? Melanie K Jones i. University of Wales, Swansea

How to use what you OWN to reduce what you OWE

Swaps: Constant maturity swaps (CMS) and constant maturity. Treasury (CMT) swaps

Transcription:

Uiversità di Bergamo Facoltà di Igegeria dell Iformazioe e etodi atematici La Protezioe elle Reti di Telecomuicazioe A Priority-Aware Protectio Techique for QoS Eabled WD etworks Fabio artigo

Sommario Itroduzioe Strategie di Protezioe classiche Priority-Aware Shared-Protectio odelli atematici e risultati umerici Iterpretazioe dei risultati

Resiliece i WD etworks The maturig of WD techology: A sigle fiber carries huge amout of data Terabit/s The failure of a etwork compoet: Ca lead to huge loss i data ad reveue Solutio: Protectio a proactive procedure to recover traffic whe a failure occurs: Oe path is referred to as primary path used to carry traffic durig ormal operatio. Extra backup resources are pre-reserved ad activated whe the primary path fails.

Challeges The operator is faced by several challeges: Satisfy the QoS requiremets of the cliet defied through a SLA Service Level Agreemet: A SLA Violatio may cause a certai amout of pealty to be paid by the operator. Out of service criterio Recovery time with degraded SLA Full recovery time Service uavailability Premium Degraded BER0-4 ot spec. 50 ms 0-5 old Degraded BER0-3 50 ms 300 ms 0-4 Silver Fault LOS 500 ms 5 sec Broze Fault LOS 5 sec 5 mi At the same time select a cost effective protectio scheme to achieve this goal 0-3 0-2

Why do we protect? Protectio is ormally doe for the purpose of icreasig the availability of the ed-to-ed coectio. Availability: Availability fractio of time the coectio is up durig etire service time uit: mis/year Availability available Time/available Time+ dow time. Protectio does help to icrease availability: Traffic o failed primary path will be switched to the backup path The more backup resources we have the greater will be the availability

Availability Each etwork compoet is characterized by its availability which depeds upo: Failure rate: ea Time To Failure TTF /Lambda Failure recovery rate: ea Time To Repair TTR /u 5042 FIT/000 miles FITFailure I Time how may failures the compoeet experieces i 0 9 hours

Availability 2 Path availability: Product of i betwee compoets availability Where: A t A i i A i TTF/TTR + TTF ai reaso for failure is related to fiber liks

Availability 3

First Coclusio To reach the 5 9 s objective for log distace coectios we eed to protect the sigal Several protectio schemes exist i the literature: Each oe has its ow advatage ad disadvatage. The most commo: Dedicated Protectio Shared Protectio Still we do t kow with each protectio scheme what is the resultig availability: We ted to combie the advatages from both approaches to use resources efficietly while meetig user s requiremet

Dedicated Protectio X Y S D B C Dedicated Protectio: : or +

Dedicated Protectio Y Z W X S D B C Dedicated Protectio: 2:

Dedicated Protectio Aalysis Advatages Availability is icreased by several orders of magitude Excludig the multiple cocurret failure sceario Availability 00% Drawbacks: Resource redudacy 00%

Shared Protectio X Y S D E F B C Shared Protectio

Shared Protectio Aalysis Advatages Less resources are eeded for protectio compared to dedicated protectio case Drawbacks: Less Availability is obtaied i case of multiple failures

Our Propositio Priority-Aware Shared Protectio Scheme

Priority-Aware Shared Protectio A ew scheme exploitig the advatage of dedicated ad shared protectio may be realized Istead of equally treatig the coectios sharig the protectio chael: A otio of service differetiatio may be itroduced So old coectios ad S Silver coectios may share the same backup path. old coectios ca preempt Silver oes i the utilizatio of backup resources.

athematical odels For both Classical ad Priority Aware protectio Schemes We compute the Availability for every coectio

We have workig paths protected by a sigle protectio path The system ca be modeled with a arkov Chai havig + states State i i paths icludig Workig ad Protectio paths are dow Steady State Probability: Aalysis of : protectio without Service Differetiatio 0 + 3 2 + - -2 2 +µ µ µ 2µ 3µ 4µ + + + + + + + + + A A p ρ ρ ρ ρ ρ µ ρ µ ea Repair Rate ea Failure Rate!!! + +

Aalysis of : protectio without Service Differetiatio Performace of the : Protectio Scheme: ea Uavailability: U µ + 2 p ello stato per >2 ci soo ifatti - coessioi o protette sul totale delle coessioi La probabilità che ello stato ua coessioe scelta a caso fra le sia proprio tra le - o protette è data dal rapporto -/

We have old coectios Silver coectios ea Uavailability for the old ad Silver Coectios: Aalysis of : protectio with Service Differetiatio + 2 p U µ S S U U U µ µ µ S Le coessioi old è come se o vedessero eache quelle Silver viste che possoo preemptarle ell occupare il cammio di backup. Quidi l uavailability U di ua coessioe old è pari a quella di ua coessioe i u sistema co protezioe : L uavailability totale U si coserva.

We have Protectio paths protectig Workig paths We model the system with a arkov Chai with + states State i i paths icludig Workig ad Protectio paths are dow Steady State Probability: Aalysis of : protectio without Service Differetiatio A A p + + + + + + + + + ρ ρ ρ ρ ρ 0 + +- 3 2 + +- +-2 +-3 2 +µ +-µ µ 2µ 3µ 4µ

Aalysis of : protectio without Service Differetiatio Performace of the : Protectio Scheme: ea Uavailability: U µ + + p ello stato per >+ ci soo ifatti - coessioi o protette sul totale delle coessioi La probabilità che ello stato ua coessioe scelta a caso fra le sia proprio tra le - o protette è data dal rapporto -/

We have old coectios Silver coectios ea Uavailability for the old ad Silver Coectios: ea Frequecy of Failure for the old ad Silver Coectios: Aalysis of : protectio with Service Differetiatio + + p U µ S S U U U µ µ µ S + p F µ S S F F F µ µ µ

umeric Results Based o the mathematical we defied for each protectio scheme the resultig availability

umeric Results: :3 Protectio The Priority-Aware scheme allows the provisioig of oe Platium coectio 99.999% which was impossible with the classical scheme. Two old coectios ca be provisioed Availabilty > 99.99%

umeric Results: : Protectio 800 km The Priority-Aware scheme allows the deploymet of oe Platium coectio 99.999% for every value of - old coectios ca be provisioed Availability > 99.99%

Coclusios We proposed a improvemet of the classical shared protectio based o relative priorities We developed a detailed mathematical model to gauge the impact of our propositio We showed that service differetiatio is better achieved through the use of our proposed protectio scheme We developed a simulatio study showig that the proposed scheme achieves high Availability Satisfactio Rates while realizig cost-effectiveess i terms of resource usage i the etwork.