BN.com Gift Guide

Mesh-Based Survivable Networks: Options and Strategies for Optical, MPLS, SONET and ATM Networking

Overview

"Always on" information networks must automatically reroute around virtually any problem-but conventional, redundant ring architectures are too inefficient and inflexible. The solution: mesh-based networks that will be just as survivable-and far more flexible and cost-effective. Drawing heavily on the latest research, Wayne D. Grover introduces radical new concepts essential for deploying mesh-based networks. Grover offers "how-to" guidance on everything from logical design to operational strategy and evolution planning-including unprecedented
... See more details below
Available through our Marketplace sellers.
Other sellers (Hardcover)
  • All (1) from $304.06   
  • New (1) from $304.06   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$304.06
Seller since 2008

Feedback rating:

(196)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New

Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

"Always on" information networks must automatically reroute around virtually any problem-but conventional, redundant ring architectures are too inefficient and inflexible. The solution: mesh-based networks that will be just as survivable-and far more flexible and cost-effective. Drawing heavily on the latest research, Wayne D. Grover introduces radical new concepts essential for deploying mesh-based networks. Grover offers "how-to" guidance on everything from logical design to operational strategy and evolution planning-including unprecedented insight into migration from ring topologies and the important new concept of p-cycles.
  • Mesh survivability: realities and common misunderstandings
  • Basic span- and path-restoration concepts and techniques
  • Logical design: modularity, non-linear cost structures, express-route optimization, and dual-failure considerations
  • Operational aspects of real-time restoration and self-organizing pre-planning against failures
  • The "transport-stabilized Internet": self-organizing reactions to failure and unforeseen demand patterns
  • Leveraging controlled oversubscription of capacity upon restoration in IP networks
  • "Forcers": a new way to analyze the capacity structure of mesh-restorable networks
  • New techniques for evolving facility-route structures in mesh-restorable networks
  • p-Cycles: combining the simplicity and switching speed of ring networks with the efficiency of mesh networks
  • Novel Working Capacity Envelope concept for simplified dynamic demand provisioning
  • Dual-failure restorability and the availability of mesh networks

This is the definitive guide tomesh-based networking for every system engineer, network planner, product manager, researcher and graduate student in optical networking.

Read More Show Less

Product Details

  • ISBN-13: 9780134945767
  • Publisher: Prentice Hall Professional Technical Reference
  • Publication date: 7/24/2003
  • Pages: 841
  • Product dimensions: 7.26 (w) x 9.64 (h) x 1.44 (d)

Table of Contents

About the Book's Web Site
Foreword
Preface
Acknowledgements
Introduction and Outline 1
Pt. 1 Preparations 13
Ch. 1 Orientation to Transport Networks and Technology 15
Ch. 2 Internet Protocol and Optical Networking 61
Ch. 3 Failure Impacts, Survivability Principles, and Measures of Survivability 103
Ch. 4 Graph Theory, Routing, and Optimization 173
Pt. 2 Studies 269
Ch. 5 Span-Restorable and Span-Protected Mesh Networks 271
Ch. 6 Path Restoration and Shared Backup Path Protection 377
Ch. 7 Oversubscription-Based Design of Shared Backup Path Protection for MPLS or ATM 467
Ch. 8 Dual Failures, Nodal Bypass and Common Duct Effects on Design and Availability 507
Ch. 9 Mesh Network Topology Design and Evolution 579
Ch. 10 p-Cycles 659
Ch. 11 Ring-Mesh Hybrids and Ring-to-Mesh Evolution 749
Bibliography 809
Index 821
Read More Show Less

Preface

Preface

These are headlines arising in just one month from fiber optic cable disruptions. Despite the enormous advantages of fiber optics and wave-division multiplexing, the truth is that the information economy--fueled by fiber-optic capacity--is based on a surprisingly vulnerable physical medium. Every effort can be made to protect the relatively few thumb-sized cables on which our information society is built, but the cable-cuts and other disruptions just don't stop. From deep-sea shark bites to the fabled "backhoe fade," serious transmission outages are common and of increasing impact. Some form of fast rerouting at the network level has become essential to achieve the "always on" information networks that we depend upon.

One way to survive optical network damage is to duplicate every transmission path. In the form of rings and diverse-routed protection switching schemes, this is actually the most widespread solution in use today. Our view has long been that this is an inefficient expedient--the "get a bigger hammer" approach to solving a problem. Admittedly, rings filled the void when survivability issues reached crisis proportions in the 1990s. But now network operators want options that are just as survivable but more flexible, more growth-tolerant, able to accommodate service differentiation, and far more efficient in the use of capacity. This is where "shared-mesh" or "mesh-restorable" networks take the stage.

The author's love affair with the mesh-survivability approach began in 1987--with the naive certainty back then that sheer elegance and efficiency would suffice to see it adopted in SONET by 1990! The actual journey has been much longer andcomplicated than that. The Internet and Optical Networking had to happen first. And all the ideas had much more development to undergo before they would be really ready for use. Today, we understand the important values of mesh-based survivability go beyond just efficiency (and of course you can rarely make money off of elegance alone). Flexibility, automated provisioning, differentiated service capabilities, and the advent of Internet-style signaling and control are all important in making this a truly viable option. But its full exploitation still requires new concepts and ideas about network operation--letting the network self-organize its own logical configuration, for example, and letting it do its own preplanning and self-audit of its current survivability potential. New planning and design models are also required. These are the central topics of this book--designed to stimulate and facilitate the further evolution toward highly efficient, flexible and autonomous mesh-based survivable networks.

The book is written with two main communities in mind. One is my colleagues in industry; the system engineers, research scientists, technology planners, network planners, product line managers and corporate technology strategists in the telcos, in the vendor companies, and in corporate research labs. The are the key people who are continually assessing the economics of new architectural options and guiding technology and standards developments. Today these assessments of network strategy and technology selection put as much emphasis on operational expense reduction as on capital cost--capacity efficiency and flexibility are both important in future networks. Network operators are in an intensely competitive environment with prices dropping and volumes rising and success is dependent on all forms of corporate productivity enhancement. Mesh networking can provide fundamental productivity enhancements through greater network efficiencies and flexibility. The book aids the operating companies in finding these new efficiencies by giving many new options and ideas accompanied with the "how to" information to assess and compare the benefits on their own networks. Examples of the new directions and capabilities the book provides are in topology evolution, ring-to-mesh conversion by "ring-mining," multiple Quality-of-Protection design, tailoring restoration-induced packet congestion effects in a controlled manner, simplifying dynamic demand provisioning, and so on. An important plus is that the book also contains the first complete treatment of the intriguing and promising new concept called "p-cycles"--offering solutions with ring-speed and mesh-efficiency.

Providers of the networking equipment, the vendors, are--as the saying goes--"fascinated by anything that interests their boss." That means their network operating customers. Vendors must not just keep in step with the problems, opportunities, and thinking of their customers, but also aspire to bring their own unique equipment design strategies to the market and to provide leadership in development of advantageous new networking concepts. The vendor community will therefore be especially interested in the techniques for split-second mesh restoration and self-organizing traffic-adaptation as features for their intelligent optical cross-connects and Gigabit routers, for instance--as well ideas for new transport equipment such as the straddling span interface unit that converts an existing add/drop multiplexer into a p-cycle node. All of the other topics covered are of interest to vendors too because they enhance their ability to assist customers with network planning studies as part of the customer engagement and sales process.

Developers of network modeling, simulation and planning software will also be interested in many ideas in the book. By incorporating capabilities to design all types of architecture alternatives or, for example, to simulate dynamic provisioning operations in a protected working capacity envelope, or to model the incremental evolution of a survivable capacity design in the face of uncertain demand, or to support ring-mining evolutionary strategies--these suppliers enable their customers to pursue a host of interesting new "what if" planning studies.

The second main community for whom the book is intended is that of graduate-level teaching and research and new transport networking engineers who want a self-contained volume to get bootstrapped into the world of transport networking planning or to pursue thesis-oriented research work. A principle throughout has been to draw directly on my experience since 1992 at the University of Alberta of teaching graduate students about survivable transport networking. This allowed me to apply the test: "What needs to be included so that my graduate students would be empowered both to do advanced investigations in the area, but also to be knowledgeable in general about transport networking?" On one hand, I want these students to be able to defend a Ph.D. dissertation, but on the other hand also to have enough general awareness of the technology and the field to engage in discussion with working engineers in the field. This is really the reason the book has two parts.

The test of needed background has guided the definition of Chapters 1 to 4 which are called the "Preparatory" chapters. These chapters cover a lot of generally useful ground on IP and optical technology, routing algorithms, graph theory, network flow problems and optimization. Their aim is to provide a student or new engineer with tools to use, and an introductory understanding of issues, trends, and concepts that are unique to transport networking. In my experience, students may have done good theoretical research, but at their dissertations a committee member may still stump them with a down-to-earth question like "How often do cables actually get cut?" "Is this just for SONET or does it work for DWDM too?", "How does restorability affect the availability of the network?" or (perennially it seems) "...but I don't see where are you rerouting each phone call or packet." These few examples are meant just to convey my philosophy that as engineers we should know not only the theory, the mathematical methods, and so on, to pursue our "neat ideas" but we also need to know about the technology and the real-world backdrop to the research or planning context. This makes for the best-prepared graduate students and it transfers to the training of new engineers in a company so that they are prepared to participate and contribute right away in all discussions within the network planning group he or she joins. An engineer who can, for example, link the mathematics of availability analysis to a contentious, costly, and nitty-gritty issue such as how deep do cables have to be buried, is exactly the kind of valuable person this book aims to help prepare. Someone who can optimize a survivable capacity envelope for mixed dynamic services, but is also savvy enough to stay out of the fruitless "50 ms debate" is another conceptual example of the complimentary forms of training and knowledge the book aspires to provide.

The book is ultimately a network planners or technology strategists view of the networking ideas that are treated. It employs well-grounded theoretical and mathematical methods, but those are not the end in itself. The book is also not filled with theorems and proofs. The emphasis is on the network architectures, strategies and ideas and the benefits they may provide, not primarily on the computational theory of solving the related problems in the fastest possible way. Our philosophy is that if the networking ideas or science look promising, then the efforts on computational enhancement are justified and can follow. Fundamental questions and ideas about networks, and network architecture, (which is the main priority in my group) stand on their own, not to be confused with questions and ideas about algorithms and solution techniques to solve the related problems as fast as possible (others are stronger in that task). Obviously work in this area involves us in both networking science and computation, but the logical distinction is important--and often seems lost in the academic literature. The book is also not a compendium or survey of previously published papers. While suitably referenced, its content is unabashedly dominated by the author's own explorations and contains a large amount of previously unpublished material. Although setting the context in terms of modern transport technologies (WDM, SONET, ATM, IP, MPLS) our basic treatment of the networking ideas and related planning problems is in a generic logical framework. The generic models can be easily adapted for to any specific technologies, capacities, costs, or signaling protocols, etc. The book thus provides a working engineer or a new researcher with a comprehensive, theoretically based, reference book of basic architectural concepts, design methods and network strategy options to be applied on mesh-survivable networks now and in the future.

A few words about the flow of the book. The Introduction gives a much fuller roadmap of the content and novelty in each chapter. Briefly, however, Chapter 1 is an orientation to transport networking. Chapter 2 is devoted to background on IP and DWDM optical networking developments, as the technological backdrop. Part of Chapter 3 is partly just "interesting reading" on the effects of failures and the range of known schemes and techniques to counteract or avoid failures. The rest of Chapter 3 includes a more technical "sorting out" of the "--ilities": availability, reliability, network reliability, restorability, and other measures. Chapter 4 is then devoted to graph theory, routing algorithms and optimization theory and techniques but only as these topics specifically relate to transport network problems. Chapter 5 starts the second part of the book on more advanced studies and applications with an in-depth treatment of span protection and restoration. It has its counterpart devoted to path restoration in Chapter 6. Chapter 5 considerably "updates" the thinking about span-oriented survivability in optical networks with dynamic traffic.

If the book was a musical score, Chapters 7 through 11 would be the "variations." Each chapter treats a more advanced topic or idea selected by the author because of its perceived usefulness or possible influence on the direction of further research and development. These are some of the author's "shiny pebbles" (in the earnestly humble sense of Newton). Chapter 7 recognizes an important difference--and opportunity--in cell or packet-based transport: that of controlled oversubscription of capacity upon restoration. This is a unique advantage for MPLS/IP-based transport survivability. Chapter 8 is devoted to all aspects of dual-failure considerations in mesh restorable networks. An especially interesting finding is that with a "first-failure protection, second-failure restoration" concept, higher than 1+1 availability can be achieved for premium service paths at essentially no extra cost. Chapter 9 treats the challenging, and so far almost unaddressed, problem of optimizing or evolving the basic facility-route (physical layer) topology for a mesh-restorable network. Chapter 10 explains the new (and to us, very exciting) concept of p-cycles, which are rooted in the idea of pre-configuration of mesh spare capacity.

p-Cycles are, in a sense, so simple, and yet they combine the fast switching of ring networks with the capacity-efficiency of mesh-based networks. We include p-cycles as a mesh-based survivable architecture because they exhibit extremely low mesh-like capacity redundancy and because demands are routed via shortest paths over the entire facilities graph. They are admittedly, however, a rather unique form of protection scheme in their own right in that lies in many regards in-between rings and mesh. Candidly, I venture that many colleagues who went through the decade-long ring-versus-mesh "religious wars" of the 1990s would understand when I say that p-cycles call for that forehead-bumping gesture of sudden realization--this solution (which combines ring and mesh) was unseen for the whole decade-long duration of this debate! As of this writing the author knows several research groups that are shifting direction to work on p-cycles as well as a half-dozen key industry players looking closely at the concept.

Chapter 11 on ring-mesh hybrids and ring to mesh evolution is placed at the end. The logic is that if we assume success of the prior chapters in motivating the mesh-based option then the "problem" this creates is that many current networks are ring-based. Its like "Ok, we believe you--but how do we get there now?" The closing chapter therefore devotes itself to bridging the gulf between existing ring-based networks and future mesh or p-cycle based networks by considering the design of intermediate ring-mesh hybrid networks and "ring-mining" as a strategy to get to a mesh future from a ring starting-point today.

The Appendices, and other resources such as chapter supplements, a glossary, student problems, research project ideas, network models, and more are all web-based--so they can be continually updated and expanded in scope and usefulness. Many directly usable tools and resources are provided for work in the area of mesh-survivable networking. This includes AMPL models and programs to permit independent further study of most of the planning strategies presented, plus Powerpoint lectures on a selection of topics, technical reports, and additional references and discussions. The aim has been to create a highly useful and hopefully interesting book that is laden with new options, ideas, insights and methods for industry and academia to enjoy and benefit from.

Read More Show Less

Introduction

Preface

These are headlines arising in just one month from fiber optic cable disruptions. Despite the enormous advantages of fiber optics and wave-division multiplexing, the truth is that the information economy--fueled by fiber-optic capacity--is based on a surprisingly vulnerable physical medium. Every effort can be made to protect the relatively few thumb-sized cables on which our information society is built, but the cable-cuts and other disruptions just don't stop. From deep-sea shark bites to the fabled "backhoe fade," serious transmission outages are common and of increasing impact. Some form of fast rerouting at the network level has become essential to achieve the "always on" information networks that we depend upon.

One way to survive optical network damage is to duplicate every transmission path. In the form of rings and diverse-routed protection switching schemes, this is actually the most widespread solution in use today. Our view has long been that this is an inefficient expedient--the "get a bigger hammer" approach to solving a problem. Admittedly, rings filled the void when survivability issues reached crisis proportions in the 1990s. But now network operators want options that are just as survivable but more flexible, more growth-tolerant, able to accommodate service differentiation, and far more efficient in the use of capacity. This is where "shared-mesh" or "mesh-restorable" networks take the stage.

The author's love affair with the mesh-survivability approach began in 1987--with the naive certainty back then that sheer elegance and efficiency would suffice to see it adopted in SONET by 1990! The actual journey has been much longerand complicated than that. The Internet and Optical Networking had to happen first. And all the ideas had much more development to undergo before they would be really ready for use. Today, we understand the important values of mesh-based survivability go beyond just efficiency (and of course you can rarely make money off of elegance alone). Flexibility, automated provisioning, differentiated service capabilities, and the advent of Internet-style signaling and control are all important in making this a truly viable option. But its full exploitation still requires new concepts and ideas about network operation--letting the network self-organize its own logical configuration, for example, and letting it do its own preplanning and self-audit of its current survivability potential. New planning and design models are also required. These are the central topics of this book--designed to stimulate and facilitate the further evolution toward highly efficient, flexible and autonomous mesh-based survivable networks.

The book is written with two main communities in mind. One is my colleagues in industry; the system engineers, research scientists, technology planners, network planners, product line managers and corporate technology strategists in the telcos, in the vendor companies, and in corporate research labs. The are the key people who are continually assessing the economics of new architectural options and guiding technology and standards developments. Today these assessments of network strategy and technology selection put as much emphasis on operational expense reduction as on capital cost--capacity efficiency and flexibility are both important in future networks. Network operators are in an intensely competitive environment with prices dropping and volumes rising and success is dependent on all forms of corporate productivity enhancement. Mesh networking can provide fundamental productivity enhancements through greater network efficiencies and flexibility. The book aids the operating companies in finding these new efficiencies by giving many new options and ideas accompanied with the "how to" information to assess and compare the benefits on their own networks. Examples of the new directions and capabilities the book provides are in topology evolution, ring-to-mesh conversion by "ring-mining," multiple Quality-of-Protection design, tailoring restoration-induced packet congestion effects in a controlled manner, simplifying dynamic demand provisioning, and so on. An important plus is that the book also contains the first complete treatment of the intriguing and promising new concept called "p-cycles"--offering solutions with ring-speed and mesh-efficiency.

Providers of the networking equipment, the vendors, are--as the saying goes--"fascinated by anything that interests their boss." That means their network operating customers. Vendors must not just keep in step with the problems, opportunities, and thinking of their customers, but also aspire to bring their own unique equipment design strategies to the market and to provide leadership in development of advantageous new networking concepts. The vendor community will therefore be especially interested in the techniques for split-second mesh restoration and self-organizing traffic-adaptation as features for their intelligent optical cross-connects and Gigabit routers, for instance--as well ideas for new transport equipment such as the straddling span interface unit that converts an existing add/drop multiplexer into a p-cycle node. All of the other topics covered are of interest to vendors too because they enhance their ability to assist customers with network planning studies as part of the customer engagement and sales process.

Developers of network modeling, simulation and planning software will also be interested in many ideas in the book. By incorporating capabilities to design all types of architecture alternatives or, for example, to simulate dynamic provisioning operations in a protected working capacity envelope, or to model the incremental evolution of a survivable capacity design in the face of uncertain demand, or to support ring-mining evolutionary strategies--these suppliers enable their customers to pursue a host of interesting new "what if" planning studies.

The second main community for whom the book is intended is that of graduate-level teaching and research and new transport networking engineers who want a self-contained volume to get bootstrapped into the world of transport networking planning or to pursue thesis-oriented research work. A principle throughout has been to draw directly on my experience since 1992 at the University of Alberta of teaching graduate students about survivable transport networking. This allowed me to apply the test: "What needs to be included so that my graduate students would be empowered both to do advanced investigations in the area, but also to be knowledgeable in general about transport networking?" On one hand, I want these students to be able to defend a Ph.D. dissertation, but on the other hand also to have enough general awareness of the technology and the field to engage in discussion with working engineers in the field. This is really the reason the book has two parts.

The test of needed background has guided the definition of Chapters 1 to 4 which are called the "Preparatory" chapters. These chapters cover a lot of generally useful ground on IP and optical technology, routing algorithms, graph theory, network flow problems and optimization. Their aim is to provide a student or new engineer with tools to use, and an introductory understanding of issues, trends, and concepts that are unique to transport networking. In my experience, students may have done good theoretical research, but at their dissertations a committee member may still stump them with a down-to-earth question like "How often do cables actually get cut?" "Is this just for SONET or does it work for DWDM too?", "How does restorability affect the availability of the network?" or (perennially it seems) "...but I don't see where are you rerouting each phone call or packet." These few examples are meant just to convey my philosophy that as engineers we should know not only the theory, the mathematical methods, and so on, to pursue our "neat ideas" but we also need to know about the technology and the real-world backdrop to the research or planning context. This makes for the best-prepared graduate students and it transfers to the training of new engineers in a company so that they are prepared to participate and contribute right away in all discussions within the network planning group he or she joins. An engineer who can, for example, link the mathematics of availability analysis to a contentious, costly, and nitty-gritty issue such as how deep do cables have to be buried, is exactly the kind of valuable person this book aims to help prepare. Someone who can optimize a survivable capacity envelope for mixed dynamic services, but is also savvy enough to stay out of the fruitless "50 ms debate" is another conceptual example of the complimentary forms of training and knowledge the book aspires to provide.

The book is ultimately a network planners or technology strategists view of the networking ideas that are treated. It employs well-grounded theoretical and mathematical methods, but those are not the end in itself. The book is also not filled with theorems and proofs. The emphasis is on the network architectures, strategies and ideas and the benefits they may provide, not primarily on the computational theory of solving the related problems in the fastest possible way. Our philosophy is that if the networking ideas or science look promising, then the efforts on computational enhancement are justified and can follow. Fundamental questions and ideas about networks, and network architecture, (which is the main priority in my group) stand on their own, not to be confused with questions and ideas about algorithms and solution techniques to solve the related problems as fast as possible (others are stronger in that task). Obviously work in this area involves us in both networking science and computation, but the logical distinction is important--and often seems lost in the academic literature. The book is also not a compendium or survey of previously published papers. While suitably referenced, its content is unabashedly dominated by the author's own explorations and contains a large amount of previously unpublished material. Although setting the context in terms of modern transport technologies (WDM, SONET, ATM, IP, MPLS) our basic treatment of the networking ideas and related planning problems is in a generic logical framework. The generic models can be easily adapted for to any specific technologies, capacities, costs, or signaling protocols, etc. The book thus provides a working engineer or a new researcher with a comprehensive, theoretically based, reference book of basic architectural concepts, design methods and network strategy options to be applied on mesh-survivable networks now and in the future.

A few words about the flow of the book. The Introduction gives a much fuller roadmap of the content and novelty in each chapter. Briefly, however, Chapter 1 is an orientation to transport networking. Chapter 2 is devoted to background on IP and DWDM optical networking developments, as the technological backdrop. Part of Chapter 3 is partly just "interesting reading" on the effects of failures and the range of known schemes and techniques to counteract or avoid failures. The rest of Chapter 3 includes a more technical "sorting out" of the "--ilities": availability, reliability, network reliability, restorability, and other measures. Chapter 4 is then devoted to graph theory, routing algorithms and optimization theory and techniques but only as these topics specifically relate to transport network problems. Chapter 5 starts the second part of the book on more advanced studies and applications with an in-depth treatment of span protection and restoration. It has its counterpart devoted to path restoration in Chapter 6. Chapter 5 considerably "updates" the thinking about span-oriented survivability in optical networks with dynamic traffic.

If the book was a musical score, Chapters 7 through 11 would be the "variations." Each chapter treats a more advanced topic or idea selected by the author because of its perceived usefulness or possible influence on the direction of further research and development. These are some of the author's "shiny pebbles" (in the earnestly humble sense of Newton). Chapter 7 recognizes an important difference--and opportunity--in cell or packet-based transport: that of controlled oversubscription of capacity upon restoration. This is a unique advantage for MPLS/IP-based transport survivability. Chapter 8 is devoted to all aspects of dual-failure considerations in mesh restorable networks. An especially interesting finding is that with a "first-failure protection, second-failure restoration" concept, higher than 1+1 availability can be achieved for premium service paths at essentially no extra cost. Chapter 9 treats the challenging, and so far almost unaddressed, problem of optimizing or evolving the basic facility-route (physical layer) topology for a mesh-restorable network. Chapter 10 explains the new (and to us, very exciting) concept of p-cycles, which are rooted in the idea of pre-configuration of mesh spare capacity.

p-Cycles are, in a sense, so simple, and yet they combine the fast switching of ring networks with the capacity-efficiency of mesh-based networks. We include p-cycles as a mesh-based survivable architecture because they exhibit extremely low mesh-like capacity redundancy and because demands are routed via shortest paths over the entire facilities graph. They are admittedly, however, a rather unique form of protection scheme in their own right in that lies in many regards in-between rings and mesh. Candidly, I venture that many colleagues who went through the decade-long ring-versus-mesh "religious wars" of the 1990s would understand when I say that p-cycles call for that forehead-bumping gesture of sudden realization--this solution (which combines ring and mesh) was unseen for the whole decade-long duration of this debate! As of this writing the author knows several research groups that are shifting direction to work on p-cycles as well as a half-dozen key industry players looking closely at the concept.

Chapter 11 on ring-mesh hybrids and ring to mesh evolution is placed at the end. The logic is that if we assume success of the prior chapters in motivating the mesh-based option then the "problem" this creates is that many current networks are ring-based. Its like "Ok, we believe you--but how do we get there now?" The closing chapter therefore devotes itself to bridging the gulf between existing ring-based networks and future mesh or p-cycle based networks by considering the design of intermediate ring-mesh hybrid networks and "ring-mining" as a strategy to get to a mesh future from a ring starting-point today.

The Appendices, and other resources such as chapter supplements, a glossary, student problems, research project ideas, network models, and more are all web-based--so they can be continually updated and expanded in scope and usefulness. Many directly usable tools and resources are provided for work in the area of mesh-survivable networking. This includes AMPL models and programs to permit independent further study of most of the planning strategies presented, plus Powerpoint lectures on a selection of topics, technical reports, and additional references and discussions. The aim has been to create a highly useful and hopefully interesting book that is laden with new options, ideas, insights and methods for industry and academia to enjoy and benefit from.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)