dc.contributor.authors |
Dikbiyik, F; Tornatore, M; Mukherjee, B; |
|
dc.date.accessioned |
2020-01-13T07:56:59Z |
|
dc.date.available |
2020-01-13T07:56:59Z |
|
dc.date.issued |
2015 |
|
dc.identifier.citation |
Dikbiyik, F; Tornatore, M; Mukherjee, B; (2015). Exploiting Excess Capacity, Part II: Differentiated Services Under Traffic Growth. IEEE-ACM TRANSACTIONS ON NETWORKING, 23, 1609-1599 |
|
dc.identifier.issn |
1063-6692 |
|
dc.identifier.uri |
https://hdl.handle.net/20.500.12619/2432 |
|
dc.identifier.uri |
https://doi.org/10.1109/TNET.2014.2335252 |
|
dc.description.abstract |
Connections provisioned in a backbone network are usually protected. A "good" protection scheme can decrease the downtime experienced by a connection, which can reduce (or eliminate) penalties for the violation of the Service Level Agreement (SLA) between the network operator and its customer. Although "good" protection schemes can guarantee high availability to connections, they usually require high capacity (e.g., bandwidth). However, backbone networks usually have some excess capacity (EC) to accommodate traffic fluctuations and growth, and when there is enough EC, the high capacity requirement of protection schemes can be tolerated. However, under traffic growth, the network operator has to add more bandwidth to avoid capacity exhaustion, which increases upgrade costs. In this study, we show that, in case of connections supporting differentiated services, where connections' tolerable downtimes are diverse, efficient exploitation of EC can decrease both SLA violations and upgrade costs. We develop a novel EC management (ECM) approach that provides high-availability high-capacity protection schemes when EC is available, and reprovisions backup resources with multiple protection schemes so that SLAs are still respected, but network upgrade costs are kept under control. We formulate this problem as an integer linear program (ILP) and develop an efficient heuristic as the ILP is intractable for large problems. We present several alternatives of our ECM approach to show its compatibility with different protection-scheme combinations. Numerical examples are presented to illustrate how the proposed ECM technique finds a tradeoff between upgrade costs and penalties paid for SLA violations while reducing the total cost significantly. |
|
dc.language |
English |
|
dc.publisher |
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC |
|
dc.subject |
Telecommunications |
|
dc.title |
Exploiting Excess Capacity, Part II: Differentiated Services Under Traffic Growth |
|
dc.type |
Article |
|
dc.identifier.volume |
23 |
|
dc.identifier.startpage |
1599 |
|
dc.identifier.endpage |
1609 |
|
dc.contributor.department |
Sakarya Üniversitesi/Bilgisayar Ve Bilişim Bilimleri Fakültesi/Bilgisayar Mühendisliği Bölümü |
|
dc.contributor.saüauthor |
Dikbıyık, Ferhat |
|
dc.relation.journal |
IEEE-ACM TRANSACTIONS ON NETWORKING |
|
dc.identifier.wos |
WOS:000363254100017 |
|
dc.identifier.doi |
10.1109/TNET.2014.2335252 |
|
dc.identifier.eissn |
1558-2566 |
|
dc.contributor.author |
Dikbıyık, Ferhat |
|