This paper gives a survey of the techniques for failure location, protection and restoration in IP over optical fiber networks. The first part of the paper reviews failure location algorithms at the optical and the IP layers. We classify the failure location algorithms at the optical layer into two main categories: the model based approach, that builds an abstract model of the network and uses this model to diagnose failures, and the learning based approach, that views the network as a black box and diagnoses failures using a set of rules obtained either by learning or by the expertise of the human manager. At the IP layer, we focus on the location of one of the main sources of failure: lossy links. The lossy link location algorithms can al...
With the continuous advancement in technology data communication at higher data rates have become th...
Network survivability endeavors to ensure the uninterrupted provisioning of services by the network ...
Abstract—Backup paths are widely used to protect IP links from failures. Existing solutions such as ...
icawww.epfl.ch/kurant/hasler Abstract. We address failure location and restoration in both optical a...
We address failure location and restoration in both optical and wireless ad hoc networks. First, we ...
This book covers the issues of monitoring, failure localization, and restoration in the Internet opt...
This paper discusses the optical network management issues and identifies potential areas for focus...
This paper discusses the optical network management issues and identifies potential areas for focus...
The provisioning of resilience against network failures in multi-layer IP-based optical networks is ...
The provisioning of resilience against network failures in multi-layer IP-based optical networks is ...
Abstract—Economic sustainability of the ever-increasing traffic requirements is built on the cost re...
We propose an algorithm for localizing multiple failures in an IP/WDM network. They can be either ha...
An important requirement in any high speed network is to ensure the network’s survivability, i.e., t...
The resilience of networks is increasingly becoming crucial as the adoption of cloud- based computin...
Recenzenci pracy: Michał Pióro, Andrzej Pach.Praca doktorska. Akademia Górniczo-Hutnicza im. Stanisł...
With the continuous advancement in technology data communication at higher data rates have become th...
Network survivability endeavors to ensure the uninterrupted provisioning of services by the network ...
Abstract—Backup paths are widely used to protect IP links from failures. Existing solutions such as ...
icawww.epfl.ch/kurant/hasler Abstract. We address failure location and restoration in both optical a...
We address failure location and restoration in both optical and wireless ad hoc networks. First, we ...
This book covers the issues of monitoring, failure localization, and restoration in the Internet opt...
This paper discusses the optical network management issues and identifies potential areas for focus...
This paper discusses the optical network management issues and identifies potential areas for focus...
The provisioning of resilience against network failures in multi-layer IP-based optical networks is ...
The provisioning of resilience against network failures in multi-layer IP-based optical networks is ...
Abstract—Economic sustainability of the ever-increasing traffic requirements is built on the cost re...
We propose an algorithm for localizing multiple failures in an IP/WDM network. They can be either ha...
An important requirement in any high speed network is to ensure the network’s survivability, i.e., t...
The resilience of networks is increasingly becoming crucial as the adoption of cloud- based computin...
Recenzenci pracy: Michał Pióro, Andrzej Pach.Praca doktorska. Akademia Górniczo-Hutnicza im. Stanisł...
With the continuous advancement in technology data communication at higher data rates have become th...
Network survivability endeavors to ensure the uninterrupted provisioning of services by the network ...
Abstract—Backup paths are widely used to protect IP links from failures. Existing solutions such as ...