Evolution to a converged layer 1, 2 in a global-scale, native ethernet over WDM-based optical networking architecture

Antonis Hadjiantonis, Mohamed A. Ali, Haidar Chamas, William Bjorkman, Stuart Elby, Ahmad Khalil, Georgios Ellinas, Nasir Ghani

Research output: Contribution to journalArticlepeer-review

Abstract

There is an emerging wide interest to transition from legacy WAN transport technologies to Ethernet-based technology. The current round of carrier Ethernet standards will successfully equip service providers (SPs) with the required tools to provide carrier-grade scalability and to provision and engineer connection-oriented point-to-point (P2P) packet trunks across a native Ethernet infrastructure. Building on these standards, this paper demonstrates how to support and implement full traffic engineering in a global-scale, two-tiered native Ethernet-over-WDM optical networking architecture. To achieve these objectives, several networking innovations are presented and developed including: 1) a GMPLS-based unified control plane that offers a tighter integration between layer-1 (optical transport layer) and layer-2 (Ethernet layer), 2) a fully distributed integrated routing and signaling framework for dynamically provisioning Ethernet switched paths (ESPs) at any bandwidth granularity including both full wavelength and finer granularity (sub-lambda) ESPs in an integrated Ethernet-optical networking environment, and 3) a novel notion of an integrated link-state advertisements strategy that is consistent with a fully integrated routing and signaling protocol

Original languageEnglish
Article number4211240
Pages (from-to)1048-1058
Number of pages11
JournalIEEE Journal on Selected Areas in Communications
Volume25
Issue number5
DOIs
Publication statusPublished - 2007

Keywords

  • GigE-over-WDM
  • Optical signaling and routing algorithms
  • Optical unified control plane

Fingerprint

Dive into the research topics of 'Evolution to a converged layer 1, 2 in a global-scale, native ethernet over WDM-based optical networking architecture'. Together they form a unique fingerprint.

Cite this