Self-Healing Hybrid Protection Architecture for Passive Optical Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 8
Abstract
Expanding size of passive optical networks (PONs) along with high availability expectation makes the reliability performance a crucial need. Most protection architectures utilize redundant network components to enhance network survivability, which is not economical. This paper proposes new self-healing protection architecture for passive optical networks (PONs), with a single ring topology and star-ring topology at feeder and distribution level respectively. The proposed architecture provides desirable protection to the network by avoiding fiber duplication at both feeder and distribution level. Moreover, medium access control (MAC) controlled switching is utilized to provide efficient detection, and restoration of faults or cuts throughout the network. Analytical analysis reveals that the proposed self-healing hybrid protection architecture ensures survivability of the affected traffic along with desirable connection availability of 99.9994 % at minimum deployment cost, through simple architecture and simultaneous protection against failures.
Authors and Affiliations
Waqas Imtiaz, P. Mehar, M. Waqas, Yousaf Khan
Use of Blockchain in Healthcare: A Systematic Literature Review
Blockchain is an emerging field which works on the concept of a digitally distributed ledger and consensus algorithm removing all the threats of intermediaries. Its early applications were related to the finance sector b...
The Implementation of Software Anti-Ageing Model towards Green and Sustainable Products
Software ageing is a phenomenon that normally occurs in a long running software. Progressive degradation of software performance is a symptom that shows software is getting aged and old. Researchers believe that the agei...
Performance Evaluation of Transmission Line Protection Characteristics with DSTATCOM Implementation
To meet with the ever-enhancing load demands, new transmission lines should be bolted-on in the existing power system but the economic and environmental concerns are major constraints to this addition. Hence utilities ha...
Text Steganography using Extensions Kashida based on the Moon and Sun Letters Concept
Existing steganography methods are still lacking in terms of capacity. Hence, a new steganography method for Arabic text is proposed. The method hides secret information bits within Arabic letters using two features, whi...
Compound Mapping and Filter Algorithm for Hybrid SSD Structure
With the recent development of byte-unit non-volatile random access memory (RAM), various methods utilizing quad level cell (QLC) not-AND (NAND) flash memory with non-volatile RAM have been proposed. However, tests have...