2006 3rd International Conference on Broadband Communications, Networks and Systems 2006
DOI: 10.1109/broadnets.2006.4374325
|View full text |Cite
|
Sign up to set email alerts
|

Protection and Spatial Reuse in Optical Burst Transport (OBT) Networks

Abstract: Optical Burst Transport network is a novel WDM ring architecture for Metropolitan Area Networks (MAN). It leverages the advantages of optical burst switching and WDM rings, while using a token-based medium access scheme. In this paper, we investigate protection together with spatial reuse property. Specifically we show how protection in OBT can be different from conventional protection and propose three algorithms for implementing a fast and low implementation cost, unidirectional 1:1 protection scheme. We ana… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2007
2007
2010
2010

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Therefore, to make the protocol complete, protection algorithm is required for the OBT protocol. In this paper, as an extension of the protocol improvement of the OBT, we experimentally demonstrate network protection on the OBT network, following the algorithm presented in previous literature [5]. The result shows that the OBT network can achieve link surveillance within 292 µsec plus round trip time of the ring network.…”
Section: Introductionmentioning
confidence: 86%
See 1 more Smart Citation
“…Therefore, to make the protocol complete, protection algorithm is required for the OBT protocol. In this paper, as an extension of the protocol improvement of the OBT, we experimentally demonstrate network protection on the OBT network, following the algorithm presented in previous literature [5]. The result shows that the OBT network can achieve link surveillance within 292 µsec plus round trip time of the ring network.…”
Section: Introductionmentioning
confidence: 86%
“…If the 'FaultOK' message traverses the ring and returns to the NOF, the latter assumes that the fiber cut has been successfully bypassed and it resumes operation as normal. For more detail of protection algorithm and further analysis, reader can refer to the previous paper [5]. We configure testbed as described in Figure 2.…”
Section: Network Protection In Obtmentioning
confidence: 99%