Interchanging the search space between the logical and physical layers in future IP optical networks

Antonis Hadjiantonis, Ahmad Khalil, M. A. Ali, Nasser Abdellatif, Jalil Moghaddasi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper addresses the problem of dynamically provisioning low-speed connection requests in IP/MPLS-centric mesh-based WDM networks with traffic grooming capabilities. Specifically, rather than formulating an optimization problem, this work focuses on building a dynamic logical topology where lightpaths are setup and torn down in response to dynamic traffic demands. We explore the potential of optimizing the logical topology by means of interchanging the search space between logical and physical layers. We present several search schemes and compare their performances.

Original languageEnglish
Title of host publicationProceedings of the IASTED International Conference on Communication, Network, and Information Security
EditorsM.H. Hamza
Pages177-181
Number of pages5
Publication statusPublished - 2003
EventProceedings of the IASTED International Conference on Communication, Network, an d Information Security - New York, NY., United States
Duration: 10 Dec 200312 Dec 2003

Other

OtherProceedings of the IASTED International Conference on Communication, Network, an d Information Security
CountryUnited States
CityNew York, NY.
Period10/12/0312/12/03

Keywords

  • Adaptive Routing
  • IP/WDM Networks
  • RWA
  • Sub-wavelength provisioning
  • Traffic Grooming

Fingerprint Dive into the research topics of 'Interchanging the search space between the logical and physical layers in future IP optical networks'. Together they form a unique fingerprint.

  • Cite this

    Hadjiantonis, A., Khalil, A., Ali, M. A., Abdellatif, N., & Moghaddasi, J. (2003). Interchanging the search space between the logical and physical layers in future IP optical networks. In M. H. Hamza (Ed.), Proceedings of the IASTED International Conference on Communication, Network, and Information Security (pp. 177-181)