Constraint-based local search for finding node-disjoint bounded-paths in optical access networks

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

Mass deployment of fibre access networks is without doubt one of the goals of many network operators around the globe. The Passive Optical Network has been proposed as a solution to help deliver mass deployment of fibre-to-the-home (FTTH), by reducing the cost per customer compared to current commercially available technologies. A major failure in the access network (e.g., fibre cut, amplifier failure, or other equipment can fail) might affect tens of thousands of customers. Therefore, protecting the network from such failures is one of the most important requirements in the deployment of FTTH solutions. In this paper we use a constraint-based local search approach to design reliable passive optical networks via node-disjoint paths whereby each customer is protected against any one node or link failure. We experiment with a set of very large size real-world networks corresponding to Ireland, Italy and the UK and demonstrate the tradeoff between cost and resiliency.

Original languageEnglish
Title of host publicationPrinciples and Practice of Constraint Programming - 21st International Conference, CP 2015, Proceedings
EditorsGilles Pesant
PublisherSpringer Verlag
Pages499-507
Number of pages9
ISBN (Print)9783319232188
DOIs
Publication statusPublished - 2015
Externally publishedYes
Event21st International Conference on the Principles and Practice of Constraint Programming, CP 2015 - Cork, Ireland
Duration: 31 Aug 20154 Sep 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9255
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference21st International Conference on the Principles and Practice of Constraint Programming, CP 2015
Country/TerritoryIreland
CityCork
Period31/08/154/09/15

Fingerprint

Dive into the research topics of 'Constraint-based local search for finding node-disjoint bounded-paths in optical access networks'. Together they form a unique fingerprint.

Cite this