The paper presents a dynamic provisioning mechanism through which service providers can exploit the unused allowable down time of the connections to serve the additional upcoming requests. The algorithm work based on the holding time of the connections and the failure arrival rate over the selected primary or backup paths. The proposed mechanism in this paper routes the requests in a way that any service level agreement (SLA) violation is either avoided or minimized. To achieve this goal, the already established paths are flagged with a newly proposed path metric, path risk factor, to create a memory-aware mechanism of paths' history showing the risk tolerance to SLA violation. This path attribute can be disseminated over the network as a metric of prospective connections. The algorithm takes advantage of the already established connections' history to select the best path regarding the SLA violation with the lowest cost. Simulation results verify that the proposed mechanism has better performance in terms of the blocking rate, the availability satisfaction rate, and the resource utilization than existing algorithms. Performance evaluation is done over two different simulation environments, the network with high link failure arrival rate and the network with normal link failure arrival rate. In addition to the better performance over both network topologies, the algorithm provides more revenue for service providers compared to standard and existing algorithms.
[Show abstract][Hide abstract] ABSTRACT: The paper describes a literature overview of the main building blocks of service level agreement based architectures over priority-aware shared mesh optical networks. The standardized protocols and existing algorithms for path attributes and service level agreement parameters negotiation are studied in this paper and shortcomings of each are identified. A thorough study of the priority-aware and service level agreement based mechanisms including the existing mechanisms, their advantages and disadvantages, and the remedy for the shortcomings is provided. The mathematical models for availability analysis of different routing mechanisms, protection schemes, and network resources are discussed. Different routing strategies and wavelength assignment approaches are studied as well.
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.