Açık Akademik Arşiv Sistemi

Exploiting Excess Capacity, Part II: Differentiated Services Under Traffic Growth

Show simple item record

dc.contributor.authors Dikbiyik, F; Tornatore, M; Mukherjee, B;
dc.date.accessioned 2020-01-13T07:56:59Z
dc.date.available 2020-01-13T07:56:59Z
dc.date.issued 2015
dc.identifier.citation Dikbiyik, F; Tornatore, M; Mukherjee, B; (2015). Exploiting Excess Capacity, Part II: Differentiated Services Under Traffic Growth. IEEE-ACM TRANSACTIONS ON NETWORKING, 23, 1609-1599
dc.identifier.issn 1063-6692
dc.identifier.uri https://hdl.handle.net/20.500.12619/2432
dc.identifier.uri https://doi.org/10.1109/TNET.2014.2335252
dc.description.abstract Connections provisioned in a backbone network are usually protected. A "good" protection scheme can decrease the downtime experienced by a connection, which can reduce (or eliminate) penalties for the violation of the Service Level Agreement (SLA) between the network operator and its customer. Although "good" protection schemes can guarantee high availability to connections, they usually require high capacity (e.g., bandwidth). However, backbone networks usually have some excess capacity (EC) to accommodate traffic fluctuations and growth, and when there is enough EC, the high capacity requirement of protection schemes can be tolerated. However, under traffic growth, the network operator has to add more bandwidth to avoid capacity exhaustion, which increases upgrade costs. In this study, we show that, in case of connections supporting differentiated services, where connections' tolerable downtimes are diverse, efficient exploitation of EC can decrease both SLA violations and upgrade costs. We develop a novel EC management (ECM) approach that provides high-availability high-capacity protection schemes when EC is available, and reprovisions backup resources with multiple protection schemes so that SLAs are still respected, but network upgrade costs are kept under control. We formulate this problem as an integer linear program (ILP) and develop an efficient heuristic as the ILP is intractable for large problems. We present several alternatives of our ECM approach to show its compatibility with different protection-scheme combinations. Numerical examples are presented to illustrate how the proposed ECM technique finds a tradeoff between upgrade costs and penalties paid for SLA violations while reducing the total cost significantly.
dc.language English
dc.publisher IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
dc.subject Telecommunications
dc.title Exploiting Excess Capacity, Part II: Differentiated Services Under Traffic Growth
dc.type Article
dc.identifier.volume 23
dc.identifier.startpage 1599
dc.identifier.endpage 1609
dc.contributor.department Sakarya Üniversitesi/Bilgisayar Ve Bilişim Bilimleri Fakültesi/Bilgisayar Mühendisliği Bölümü
dc.contributor.saüauthor Dikbıyık, Ferhat
dc.relation.journal IEEE-ACM TRANSACTIONS ON NETWORKING
dc.identifier.wos WOS:000363254100017
dc.identifier.doi 10.1109/TNET.2014.2335252
dc.identifier.eissn 1558-2566
dc.contributor.author Dikbıyık, Ferhat


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record