2013
DOI: 10.1109/tcomm.2012.091812.110582
|View full text |Cite
|
Sign up to set email alerts
|

Link Fault Localization Using Bi-Directional M-Trails in All-Optical Mesh Networks

Abstract: Abstract-The paper considers the problem of single-link failure localization in all-optical mesh networks. Our study follows a generic monitoring approach using supervisory lightpaths (SLPs), in which a set of bi-directional monitoring trails (bmtrails) are defined and closely monitored, such that the network controller can achieve unambiguous failure localization (UFL) for any single link by collecting the flooded alarms from the affected bm-trails. With a target of minimizing the number of bm-trails (or the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…Constraint (17) restraints that the total bandwidth in the system must be larger than or equal to the lower bound on the monitoring cost. Constraint (18) indicates that, for each node u, out of all service categories j, the number of times node u is selected as the end point of the service cannot exceed the number of times node u is used as the starting point of the service. (19) For each node u, the total amount of traffic between node u and other nodes in the service category j cannot exceed L. Constraint ( 20) -( 21) converts binary code to the decimal, and constraint ( 22) -( 23) prevent duplicate alarm codes.…”
Section: The Ilp Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Constraint (17) restraints that the total bandwidth in the system must be larger than or equal to the lower bound on the monitoring cost. Constraint (18) indicates that, for each node u, out of all service categories j, the number of times node u is selected as the end point of the service cannot exceed the number of times node u is used as the starting point of the service. (19) For each node u, the total amount of traffic between node u and other nodes in the service category j cannot exceed L. Constraint ( 20) -( 21) converts binary code to the decimal, and constraint ( 22) -( 23) prevent duplicate alarm codes.…”
Section: The Ilp Algorithmmentioning
confidence: 99%
“…Most of the above methods are used to locate single-link faults, and the following are some methods for bidirectional link and muti-link failure localization. [14][15][16][17] Janos T et al 18 proposed a localization scheme, which used a specific monitoring optical path to deploy a set of bidirectional monitoring paths to collect alarm information and realized rapid single-link failure localization. Elias A.…”
Section: Introductionmentioning
confidence: 99%
“…Separating path systems arise naturally in the context of network design (see, for instance, [1,13,21]). We are presented with a communication network with one (and at most one) defective link and our goal is to identify this link.…”
Section: Introductionmentioning
confidence: 99%
“…Wireless links may congest, not only because of the unbalance of loads or abnormal workloads for the nodes, but also because of equipment faults or environmental impact. Numerous fault management methods [1,2] have been developed for networks. Expert systems have gained wide acceptance as fault management tool.…”
mentioning
confidence: 99%