By Jean-Philippe Vasseur M.S. in Computer Science, Mario Pickavet, Piet Demeester

Network Recovery is the 1st booklet to supply particular info on retaining and restoring conversation networks, and it units a sky-high commonplace for any which may keep on with. within, you’ll examine particular thoughts that paintings at each one layer of the networking hierarchy―including optical, SONET-SDH, IP, and MPLS―as good as multi-layer escalation concepts that provide the top point of security. The authors start with an incisive creation to the problems that outline the sector of community safeguard and recovery, and because the ebook progresses they clarify every thing you want to find out about the correct protocols, delivering theoretical analyses anywhere acceptable. for those who paintings for a network-dependent association, huge or small, you’ll are looking to continue community restoration nearby continually.

* exhibits you ways to enforce defense and restoration thoughts that would keep your company time and money.
* records concepts for the optical, SONET-SDH, IP, and MPLS layers, in addition to multi-layer escalation strategies.
* exhibits you the way to guage those suggestions relating to each other, so that you can boost an optimum community restoration design.
* offers examples and simulation results.
* Delves into the internal workings of suitable protocols and gives theoretical analyses at any place this data contributes for your sensible wisdom.

Show description

Read Online or Download Network recovery : protection and restoration of optical, SONET-SDH, IP and MPLS PDF

Similar management information systems books

Information Sharing on the Semantic Web (Advanced Information and Knowledge Processing)

Info contemporary learn in parts comparable to ontology layout for info integration, metadata iteration and administration, and illustration and administration of allotted ontologies. offers determination aid at the use of novel applied sciences, information regarding power difficulties, and instructions for the profitable software of current applied sciences.

Beautiful Teams: Inspiring and Cautionary Tales from Veteran Team Leaders

What is it prefer to paintings on an outstanding software program improvement workforce dealing with an very unlikely challenge? How do you construct an efficient crew? Can a bunch of people that do not get alongside nonetheless construct stable software program? How does a crew chief retain all people on target whilst the stakes are excessive and the time table is tight? attractive groups takes you behind the curtain with probably the most attention-grabbing groups in software program engineering historical past.

Network Security, Administration and Management: Advancing Technologies and Practice

Community safety, management and administration: Advancing applied sciences and Practices identifies the newest technological strategies, practices and rules on community defense whereas exposing attainable safeguard threats and vulnerabilities of up to date software program, undefined, and networked platforms. This booklet is a suite of present learn and practices in community defense and management for use as a reference via practitioners in addition to a textual content via academicians and running shoes.

Extra resources for Network recovery : protection and restoration of optical, SONET-SDH, IP and MPLS

Sample text

Another strategy is to duplicate vulnerable network elements. For instance, in the case of a cross-connect failure, all traffic can be switched to an identical hot standby cross-connect (most helpful in hardware failures). Also the network access link can be duplicated to ensure that users are not cut off from the network by a single failure. 12. When a failure occurs, the network can still be accessed via the unaffected network access link. Although the aforementioned measures alleviate the problem to some extent, in many cases they turn out to be insufficient to meet the network availability levels required by the customers.

This section elaborates on the criteria that represent the performance components of the recovery scheme. This overview of criteria allows us to weigh the performance and the cost of a recovery mechanism, to assess the pros and cons of any recovery mechanism, and to make a judicious comparison between recovery mechanisms [Sha03], [Owe02]. 1 Scope of Failure Coverage Recovery schemes may offer various types of failure coverage. The scope of failure coverage may be defined by several metrics, which are described in the following paragraphs.

This implies that a so-called single point of failure must be avoided in the network; it should be designed so that one single failure cannot disconnect a part of the network from the rest. If an equivalent QoS must be offered to the rerouted flows after the link or node failure, then other requirements on the recovery path must be satisfied as well: . There should be enough available bandwidth along the recovery path (capacity requirement), so a recovery scheme will typically require some additional capacity, the backup or spare capacity.

Download PDF sample

Network recovery : protection and restoration of optical, by Jean-Philippe Vasseur M.S. in Computer Science, Mario
Rated 4.20 of 5 – based on 41 votes