Share Email Print

Proceedings Paper

Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

A cost-effective and service-differentiated provisioning strategy is very desirable to service providers so that they can offer users satisfactory services, while optimizing network resource allocation. Providing differentiated protection services to connections for surviving link failure has been extensively studied in recent years. However, the differentiated protection services for workflow-based applications, which consist of many interdependent tasks, have scarcely been studied. This paper investigates the problem of providing differentiated services for workflow-based applications in optical grid. In this paper, we introduce the concept of failure probability to replace availability while evaluating the security level of data communication task. Then, we propose a task-based analytical model to quantify the failure probabilities of communication tasks with different protection modes (i.e., unprotected, shared protected, or dedicated protected). Particular emphasis is placed on quantifying communication task's failure probability with shared protection by employing conditional probability. Based on the mathematical model, we develop three differentiated protection services provisioning strategies which can provide security level guarantee and network-resource optimization for workflow-based applications. The simulation demonstrates that these heuristic algorithms provide protection cost-effectively while satisfying the applications' failure probability requirements.

Paper Details

Date Published:
Proc. SPIE 7989, Network Architectures, Management, and Applications VIII, ; doi: 10.1117/12.888430
Show Author Affiliations
Yaoquan Zhong, Shanghai Jiao Tong Univ. (China)
Wei Guo, Shanghai Jiao Tong Univ. (China)
Yaohui Jin, Shanghai Jiao Tong Univ. (China)
Weiqiang Sun, Shanghai Jiao Tong Univ. (China)
Weisheng Hu, Shanghai Jiao Tong Univ. (China)

Published in SPIE Proceedings Vol. 7989:
Network Architectures, Management, and Applications VIII

© SPIE. Terms of Use
Back to Top