2007 6th International Workshop on Design and Reliable Communication Networks 2007
DOI: 10.1109/drcn.2007.4762265
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting connection-holding time for an efficient dynamic traffic grooming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…For example, the authors in [17,35,36] exploit t h awareness for efficient utilization of lightpath capacity and bandwidth allocation for the traffic grooming problem, while [12,37] make use of t h information for enhancement of backup resource sharability in survivable networks. Finally, the works reported in [18,38,39] utilize t h knowledge to distribute the load among the network links efficiently and to reduce the network congestion.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, the authors in [17,35,36] exploit t h awareness for efficient utilization of lightpath capacity and bandwidth allocation for the traffic grooming problem, while [12,37] make use of t h information for enhancement of backup resource sharability in survivable networks. Finally, the works reported in [18,38,39] utilize t h knowledge to distribute the load among the network links efficiently and to reduce the network congestion.…”
Section: Related Workmentioning
confidence: 99%
“…There are several approaches available in the literature addressing the connection provisioning problem for the abovementioned set of demanding applications. Among them, the strategies exploiting the time dimension of a connection request, i.e., t d and t h , have proven to be particularly effective [12,[15][16][17][18]. t d improves connection provisioning by rescheduling the connection request for a series of provisioning attempts, within a predefined amount of waiting time, when the required network resources are not free.…”
Section: Introductionmentioning
confidence: 99%
“…Due to rapid exhaustion of optical fiber physical capacity [15], approaches such as exploiting the time dimension of a connection request, i.e., t d and t h , have proven to be particularly effective in provisioning the increasing traffic demands [16][17][18]9]. However, in service differentiated provisioning based on delay tolerance, where each SC tolerates a different value of t d , the fairness between blocking performance of different SCs may be poor.…”
Section: Introductionmentioning
confidence: 97%