Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Cost Optimization of a Path Protection System with Partial Bandwidth Using Petri Nets

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

As people become more and more connected to each other through Internet services, the needs to ensure reliability in Internet connection become unavoidable. To serve data traffic with varying degree of importance when maintaining the lowest operational expense is one of challenges faced by network engineers. Critical data traffic must be protected from termination caused by unwanted failures that could happen along the data path, but at the same time, the operational expense spent on the path protection must be kept as minimal as possible. It ensures that the Internet provider can still gain reasonable profits from its services. In this study, the operational expense of the path protection system with partial bandwidth based on the toggling dual cost (TDC) algorithm aims to be optimized. The algorithm is modeled by a Petri net, a powerful tool for modeling asynchronous and concurrent systems. The model is analyzed based on the Petri net properties, namely, boundedness and liveness. Based on boundedness and liveness, the proposed model can have no overflow or deadlock problem in its implementation. The network engineers can optimize the TDC algorithm to maximum efficiency, in order to gain reasonable profits without sacrificing the network reliability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Li, Y., Ni, W., & Zhang, H. (2012). Availability analytical model for permanent dedicated path protection in WDM networks. IEEE Communications Letters, 16(1), 95–97.

    Article  Google Scholar 

  2. Velasco, L., Ruiz, M., Perello, J., & Spadaro, S. (2011). Service and resource differentiation in shared path protection environments to maximize network operator’s revenues. IEEE Journal of Optical Communications and Networking, 3(2), 117–126.

    Article  Google Scholar 

  3. Liew, S. Y., & Gan, M. L. (2012). An exact optimum paths-finding algorithm for α + 1 path protection. In International conference on information networking (pp. 210–215), February 2012.

  4. Rashid, S., Ayub, Q., & Abdullah, A. H. (2015). Reactive weight based buffer management policy for DTN routing protocols. Wireless Personal Communications, 80(3), 993–1010.

    Article  Google Scholar 

  5. Toral-Cruz, H., Mihovska, A. D., Voznak, M., Lakhtaria, K. I., & Bestak, R. (2015). Research trends and challenges for network-based ICT systems. Wireless Personal Communications, 85(1), 1–7.

    Article  Google Scholar 

  6. Murata, T. (1989). Petri nets: Properties, analysis and applications. Proceedings of the IEEE, 77(4), 541–580.

    Article  Google Scholar 

  7. Bharti, V., Trivedi, M. C., & Kumar, S. (2013). Protocol modeling and validation using coloured Petri nets. In International conference on computational intelligence and communication networks (pp. 197–204), September 2013.

  8. Hu, H., Zhou, M. C., & Li, Z. (2010). Low-cost and high-performance supervision in ratio-enforced automated manufacturing systems using timed Petri nets. IEEE Transactions on Automation Science and Engineering, 7(4), 933–944.

    Article  Google Scholar 

  9. Gniewek, L. (2013). Sequential control algorithm in the form of fuzzy interpreted Petri nets. IEEE Transactions on Systems, Man, and Cybernetics, 43(2), 451–459.

    Article  Google Scholar 

  10. Chen, S. M. (2002). Weighted fuzzy reasoning using weighted fuzzy Petri nets. IEEE Transactions on Knowledge and Data Engineering, 14(2), 386–397.

    Article  Google Scholar 

  11. Shen, V. R. L. (2006). Knowledge representation using high level fuzzy Petri nets. IEEE Transactions on System, Man and Cybernetics, Part A: Systems and Humans, 36(6), 1220–1227.

    Article  Google Scholar 

  12. Shen, V. R. L. (2003). Reinforcement learning for high level fuzzy Petri nets. IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics, 33(2), 351–362.

    Article  Google Scholar 

  13. Shen, V. R. L., Chang, Y. S., & Juang, T. T. Y. (2010). Supervised and unsupervised learning by using Petri nets. IEEE Transactions on System, Man and Cybernetics, Part A: Systems and Humans, 40(2), 363–375.

    Article  Google Scholar 

  14. Kamamura, S., Takeda, T., Miyamur, T., & Uematsu, Y. (2011). Sticky 1 + 1 path protection method by dynamic disjoint path discovery. In IEEE international conference on optical network design and modeling (pp. 1–6), February 2011.

  15. Overby, H., Biczok, G., Babarczi, P., & Tapolcai, J. (2012). Cost comparison of 1 + 1 path protection schemes: A case for coding. In IEEE international conference on communications (pp. 3067–3072), June 2012.

  16. Chang, X., Pang, H., & Hu, L. (2010). Distributed computer network model based on Petri nets. IEEE International Conference on Computer, Mechatronics, Control, and Electronic Engineering, 1, 200–203.

    Google Scholar 

  17. Dahshan, M. H. (2010). An algorithm for finding optimal node disjoint paths in optical switched networks. In IEEE international conference on computer technology and development (pp. 47–51), November 2010.

  18. WoPeD Website. http://woped.dhbw-karlsruhe.de/woped/.

Download references

Acknowledgments

The authors are very grateful to the anonymous reviewer for their constructive comments, which have improved the quality of this paper. This work was supported by the Ministry of Science and Technology, Taiwan, under grant MOST 103- 2221- E- 305- 015.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng-Ying Yang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shen, V.R.L., Shen, RK., Yang, CY. et al. Cost Optimization of a Path Protection System with Partial Bandwidth Using Petri Nets. Wireless Pers Commun 90, 1239–1259 (2016). https://doi.org/10.1007/s11277-016-3389-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3389-3

Keywords