Minimizing vulnerability with end-to-end protection schemes for optical networks

Sun il Kim, Xiaolan J. Zhang, Steven Sam Lumetta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we present techniques that allow network end-to-end protection reconfiguration algorithms to achieve maximum robustness under multiple failures. With the presented approach, maximum robustness can be achieved for a given topology.

Original languageEnglish (US)
Title of host publicationOptical Fiber Communication Conference, OFC 2007
PublisherOptical Society of America
ISBN (Print)1557528306, 9781557528308
StatePublished - Jan 1 2007
EventOptical Fiber Communication Conference, OFC 2007 - Anaheim, CA, United States
Duration: Mar 25 2007Mar 25 2007

Publication series

NameOptics InfoBase Conference Papers
ISSN (Electronic)2162-2701

Other

OtherOptical Fiber Communication Conference, OFC 2007
CountryUnited States
CityAnaheim, CA
Period3/25/073/25/07

ASJC Scopus subject areas

  • Instrumentation
  • Atomic and Molecular Physics, and Optics

Fingerprint Dive into the research topics of 'Minimizing vulnerability with end-to-end protection schemes for optical networks'. Together they form a unique fingerprint.

  • Cite this

    Kim, S. I., Zhang, X. J., & Lumetta, S. S. (2007). Minimizing vulnerability with end-to-end protection schemes for optical networks. In Optical Fiber Communication Conference, OFC 2007 (Optics InfoBase Conference Papers). Optical Society of America.