2015
DOI: 10.5815/ijcnis.2015.06.05
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Traffic Engineering Strategies for Optimizing Network Throughput in WDM All-Optical Networks

Abstract: In this paper we investigate traffic-engineering issues in Wavelength Division Multiplexing (WDM) alloptical networks. In such networks, the wavelength continuity constraint along with the wavelength clash constraint, lead to poor network performances when dealing with the lightpath provisioning problem. The impact of these constraints is especially severe when traffic demands are unpredictable and characterized by random arrivals and departures. In order to alleviate the impact of these constraints, we propos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 40 publications
0
1
0
Order By: Relevance
“…For example, end-to-end capacity estimation tools can be used to identify the bottleneck along a path between sender and receiver. If a bottleneck is located in the path, it may be possible replace or bypass the path to improve the overall performance of the network [12]. The knowledge of per-hop capacities is useful for network tomography where the topology of a network can be inferred through end-to-end measurements without needing access to intermediate network elements.…”
Section: Introductionmentioning
confidence: 99%
“…For example, end-to-end capacity estimation tools can be used to identify the bottleneck along a path between sender and receiver. If a bottleneck is located in the path, it may be possible replace or bypass the path to improve the overall performance of the network [12]. The knowledge of per-hop capacities is useful for network tomography where the topology of a network can be inferred through end-to-end measurements without needing access to intermediate network elements.…”
Section: Introductionmentioning
confidence: 99%