-
1
-
-
33745257098
-
The backhoe: A real cyberthreat
-
January 9
-
K. Poulsen, "The backhoe: a real cyberthreat," Wired News, January 9, 2006, http://wired.com/news/technology/0, 70040-0.html?tw=wn_tophead_1
-
(2006)
Wired News
-
-
Poulsen, K.1
-
2
-
-
84894019241
-
-
note
-
If nodal cross-connection actions were assumed to be relatively slow, however, pre-cross-connection may still be desirable even in an opaque network, sheerly from a speed-of-restoration standpoint. This in fact was the original motivation for studying pre-cross-connection in Ref. [3].
-
-
-
-
3
-
-
0031164504
-
Optimal spare capacity preconfiguration for faster restoration of mesh networks
-
M. H. MacGregor, W. D. Grover, and K. Ryhorchuk, "Optimal spare capacity preconfiguration for faster restoration of mesh networks," J. Netw. Syst. Manage. 5, 159-171 (1997).
-
(1997)
J. Netw. Syst. Manage.
, vol.5
, pp. 159-171
-
-
MacGregor, M.H.1
Grover, W.D.2
Ryhorchuk, K.3
-
5
-
-
84894022934
-
-
note
-
In addition to Ref. [4], we hear from colleagues in network operating companies interested in adopting efficient shared mesh optical protection schemes that this seems to be the main practical obstacle to deploying such schemes with optically transparent optical cross connects. Interestingly, most academic literature and IETF-based deliberations have overlooked this in considering the "backup multiplexing" or shared-backup path protection principle which always involves on-the-fly assembly of backup paths from preplanned, but not preconnected, spare channels on backup routes.
-
-
-
-
6
-
-
0028762596
-
On the potential for spare capacity preconnection to reduce crossconnection workloads in mesh-restorable networks
-
W. D. Grover and M. H. MacGregor, "On the potential for spare capacity preconnection to reduce crossconnection workloads in mesh-restorable networks," Electron. Lett. 30, 194-195 (1994).
-
(1994)
Electron. Lett.
, vol.30
, pp. 194-195
-
-
Grover, W.D.1
MacGregor, M.H.2
-
7
-
-
84894023190
-
-
"Method for preconfiguring a network to withstand anticipated failures," U.S. Patent 5850505 (December 15)
-
W. D. Grover and M. H. MacGregor, "Method for preconfiguring a network to withstand anticipated failures," U.S. Patent 5850505 (December 15, 1998).
-
(1998)
-
-
Grover, W.D.1
MacGregor, M.H.2
-
8
-
-
4344639608
-
Fast optical layer mesh protection using pre-cross-connected trails
-
T. Y. Chow, F. Chudak, and A. M. French, "Fast optical layer mesh protection using pre-cross-connected trails," IEEE/ACM Trans. Netw. 12, 539-547 (2004).
-
(2004)
IEEE/ACM Trans. Netw.
, vol.12
, pp. 539-547
-
-
Chow, T.Y.1
Chudak, F.2
French, A.M.3
-
9
-
-
84894022738
-
-
note
-
While it is true that 1+1 automatic protection switching (APS) and demandwise shared protection [10] schemes also employ preconnected linear segments to protect against failures, we refer here to architectures that achieve high-capacity efficiencies by sharing the spare capacity on these segments over multiple nonsimultaneous failure scenarios that each simultaneously affect demands exchanged between multiple node pairs. In other words, the protection structures here are not dedicated to only a single node pair.
-
-
-
-
10
-
-
33846285417
-
A computational study for demand-wise shared protection
-
16-19 October
-
C. Gruber, A. Koster, A. Zymolka, R. Wessäly, and S. Orlowski, "A computational study for demand-wise shared protection," presented at Fifth International Workshop On Design Of Reliable Communication Networks (DRCN 2005), 16-19 October 2005.
-
(2005)
Fifth International Workshop on Design of Reliable Communication Networks (DRCN 2005)
-
-
Gruber, C.1
Koster, A.2
Zymolka, A.3
Wessäly, R.4
Orlowski, S.5
-
11
-
-
84894016039
-
-
note
-
Ref. [8] says specifically in regards to p-cycles, "... in many situations, achieving high bandwidth efficiency requires the deployment of large p-cycles." Not only is this an implied claim that PXTs somehow avoid concerns of excess length (which our results contradict), but the statement itself perpetuates a misunderstanding that is only true for the unnecessary but intriguing case of employing a single Hamiltonian p-cycle to protect an entire network or domain. In all other cases typical network designs can achieve near-lower limits on bandwidth efficiency using a set of p-cycles of controlled maximum length, typically of no more than 5 to 7 hops. See Chap. 10 in Ref. [12] or Refs. [13, 14] for further discussion supporting these points.
-
-
-
-
13
-
-
2342512216
-
Hamiltonian pcycles for fiber-level protection in homogeneous and semi-homogeneous optical networks
-
Special Issue on Protection, Restoration, and Disaster Recovery
-
A. Sack and W. D. Grover, "Hamiltonian pcycles for fiber-level protection in homogeneous and semi-homogeneous optical networks," Special Issue on Protection, Restoration, and Disaster Recovery, IEEE Netw. 18, 49-56 (2004).
-
(2004)
IEEE Netw.
, vol.18
, pp. 49-56
-
-
Sack, A.1
Grover, W.D.2
-
14
-
-
31344453764
-
The threshold hop-limit effect in pcycles: Comparing hop- and circumference-limited design
-
A. Kodian, A. Sack, and W. D. Grover, "The threshold hop-limit effect in pcycles: comparing hop- and circumference-limited design," Opt. Switch. Netw. 7, 72-85 (2005).
-
(2005)
Opt. Switch. Netw.
, vol.7
, pp. 72-85
-
-
Kodian, A.1
Sack, A.2
Grover, W.D.3
-
15
-
-
84894014306
-
-
note
-
"Greedy" refers technically to a type of optimization algorithm where a series of local subproblems are optimized as a surrogate for direct optimization of the overall global problem.
-
-
-
-
17
-
-
84894015594
-
-
note
-
Despite these careful considerations, the trap situation did not actually arise in any of the experimental trials that follow. It is, however, an important consideration in general to ensure solution feasibility. Without it an algorithm such as that of Ref. [8] can actually produce a design that is not fully restorable.
-
-
-
-
18
-
-
84894023558
-
-
note
-
The single remaining test case showed a discrepancy of almost 70% and remains unexplained despite our efforts. The discrepancy occurred with the K6,6 network topology combined with the "uniform" demand pattern. The algorithm's dependence on demand order is a possible source of this discrepancy and makes the agreement between the other 11 test cases all the more striking. This outlier in our ability to reproduce the results from Ref. [8] may ultimately be due to a publication error or perhaps something attributable to the very regular nature and high connectivity of the K6,6 graph which makes reproducing the results significantly more dependent on using the same ordering of demands.
-
-
-
-
19
-
-
0031628329
-
Cycle-oriented distributed pre-configuration: Ring-like speed with mesh-like capacity for self-planning network restoration
-
IEEE
-
W. D. Grover and D. Stamatelakis, "Cycle-oriented distributed pre-configuration: ring-like speed with mesh-like capacity for self-planning network restoration," Proceedings of the IEEE International Conference on Communication (ICC '98) (IEEE, 1998), pp. 537-543.
-
(1998)
Proceedings of the IEEE International Conference on Communication (ICC '98)
, pp. 537-543
-
-
Grover, W.D.1
Stamatelakis, D.2
-
20
-
-
84894015273
-
-
note
-
Note the important distinction here between the length of a PXT itself and the length of any individual part of the PXT used as a protection path for a given failed demand. (This is similar to the difference between the circumference of a p-cycle and the maximum length of a protection path obtained from the cycle, which may be controlled if desired by design methods in Ref. [14]). We thank one of the reviewers for suggesting that we also inspect this characteristic measure for PXT designs.
-
-
-
|