Research on Fault Repair Method of All-optical Network based on SDN

来源 :第十二届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:longbatian911
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Variety of security issues exist while all-optical networks provide high-speed transmission,therefore effective means and strategies are needed to repair failure.This paper puts forward a multi-objective routing and wavelength assignment method based on SDN.The method is based on service function chain of SDN,and defines the indexes of scheduling time and link quality,and solve problem of routing and wavelength assignment by means of integer programming,meanwhile algorithm of improved binary particle swarm optimization is used to realize effective scheduling of network resources.Experimental results show that the performance of the proposed method is superior to that of traditional classic algorithms on indexes of recovery time,blocking probability and resource utilization.Overall,the method improved the efficiency of fault repair from model design to algorithm application.
其他文献
  In this paper,an efficient and scalable approach for simulating in homogeneous and non-linear elastic objects is introduced.
会议
  随着Apple iPhoneX的发布,智能手机中摄像头 表现为更多的模式:深摄,双摄、三摄、单摄、IR 等,这为计算机枧觉、计算机图形学、各类AI箅法 的研究和技术落地提供了更广阔的空
会议
  传统的计算机图形基于数学表达或交互设计形成 图形的描述,接下来的图形处理主要基于图形的基 本元素及其几何属性,而对图形所描述物体或场景的结构语义以及物理、功能、社
会议
  We introduce an approach to quadrilateral meshing of arbitrary triangulated surfaces that combines the theoretical guarantees of Morse-based approaches with
会议
  本报告以目前最流行的无人驾驶为例,阐述图形 学在人工智能中的应用及地位,报告从无人驾驶的 关鍵三部分-感知、决策及控制-讲述了计算机图形 学在此可以发挥的关键作用,而V
会议
  The security of SPECK under impossible differential cryptanalysis is studied.Based on multiple 6-round impossible differential distinguishers and combined w
  基于位置的数据服务在为用户提供生活便利的同时,不可信第三方无边界地采集个人位置、轨迹模式等信息,进行位置行为关联等分析行为存在着巨大的隐私泄露风险。针对位置数据
  Although the medical monitoring system has massive users,each of them only possesses one piece of data logging that participates in statistical computing.If
  We present an automatic algorithm for subtractive manufacturing of free form 3D objects using high-speed CNC machining.
会议
  目前,僵尸网络检测方法大多依靠对僵尸网络通信活动或通信内容的分析,前者对数据流的特征 进行统计分析,不涉及数据流中的内容,在检测加密类型方面具有较强优势,但准确性较低;