Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/29249
Title: Analysing GeoPath diversity and improving routing performance in optical networks
Authors: Cheng, Y
Gardner, MT
Li, J
May, R
Medhi, D
Sterbenz, JPG
Keywords: Area-based network disasters
Cross-layer routing protocol
Graph-centrality targeted attacks
Multipath geographic routing heuristics
Network resilience and survivability
Physical network topology diversity
Issue Date: 2015
Publisher: Elsevier
Source: Computer networks, 2015, v. 82, p. 50-67 How to cite?
Journal: Computer Networks 
Abstract: With the increasing frequency of natural disasters and intentional attacks that challenge telecommunication networks, vulnerability to cascading and regional-correlated challenges is escalating. Given the high complexity and large traffic load of optical networks, these correlated challenges cause substantial damage to reliable network communication. In this paper, we propose a network vulnerability identification mechanism and study different vulnerability scales using real-world optical network data. We further propose geographical diversity and incorporate it into a new graph resilience metric cTGGD (compensated Total Geographical Graph Diversity), which is capable of characterising and differentiating resiliency levels among different optical fibre networks. It is shown to be an effective resilience level indicator under regional network challenges or attacks. We further propose two heuristics for solving the path geodiverse problem (PGD) in which the calculation of a number of geographically separated paths is required. Geodiverse paths can be used to circumvent physical challenges such as large-scale disasters in telecommunication networks. We present the GeoDivRP routing protocol with two new routing heuristics implemented, which provides the end nodes with multiple geographically diverse paths. Our protocol demonstrates better performance compared to OSPF when the network is subject to area-based challenges. We have analysed the mechanism by which the attackers could use to maximise the attack impact with a limited budget and demonstrate the effectiveness of restoration plans.
URI: http://hdl.handle.net/10397/29249
ISSN: 1389-1286
DOI: 10.1016/j.comnet.2015.02.021
Appears in Collections:Journal/Magazine Article

Access
View full-text via PolyU eLinks SFX Query
Show full item record

SCOPUSTM   
Citations

8
Last Week
0
Last month
1
Citations as of Oct 11, 2017

WEB OF SCIENCETM
Citations

7
Last Week
0
Last month
0
Citations as of Oct 17, 2017

Page view(s)

45
Last Week
4
Last month
Checked on Oct 16, 2017

Google ScholarTM

Check

Altmetric



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.