ABSTRACT
Photonic firewall primarily uses all-optical pattern matching techniques in the optical domain to filter the information carried by optical signals. Its purpose is to identify hidden network intrusions and attacks. Based on the advantages of fast processing, high efficiency and large capacity, one photonic firewall can replace tens of thousands of traditional electronic firewalls. However, it is difficult to place photonic firewalls at any node because its technology is still immature and in the early stages of research. Therefore, several suitable nodes are selected for photonic firewall placement, and the corresponding requirement is that each service passes through at least one photonic firewall. In this paper, a photonic firewall deployment scheme that minimizes the number of photonic firewalls and spectrum resource consumption is proposed. A linear programming model and a heuristic algorithm are developed to implement the proposed photonic firewall deployment scheme. Simulations are performed on two typical topologies. The results show that the linear programming and heuristic algorithm achieve a trade-off between the number of photonic firewalls and the consumption of network spectrum resources and have good feasibility.
- J. Guo, X. Li, Y. Tang, L. Zhang, T. Gao and S. Huang. 2019. An All-Optical Binary Pattern Recognition System Applied in Photonic Firewall based on VPI Simulation. 2019 24th OptoElectronics and Communications Conference (OECC) and 2019 International Conference on Photonics in Switching and Computing (PSC), 1-3, doi: 10.23919/PS.2019.8817663.Google ScholarCross Ref
- T. Das, V. Sridharan and M. Gurusamy. 2020. A Survey on Controller Placement in SDN. in IEEE Communications Surveys & Tutorials, 22(1):472-503, doi: 10.1109/COMST.2019.2935453.Google ScholarDigital Library
- Y. Liu, H. Gu, X. Yu and J. Zhou. 2018. Dynamic SDN Controller Placement in Elastic Optical Datacenter Networks. 2018 Asia Communications and Photonics Conference (ACP), 1-3, doi: 10.1109/ACP.2018.8596219.Google ScholarCross Ref
- V. W. S. Chan. 2018. Resilient Optical Networks. 2018 20th International Conference on Transparent Optical Networks (ICTON), 1-4, doi: 10.1109/ ICTON.2018.8473976.Google Scholar
- S. Baroni, P. Bayvel, R. J. Gibbens and S. K. Korotky. 1999. Analysis and design of resilient multifiber wavelength-routed optical transport networks. in Journal of Lightwave Technology, 17(5):743-758, doi: 10.1109/50.762888.Google ScholarCross Ref
- N. Makariye. 2017. Towards shortest path computation using Dijkstra algorithm. 2017 International Conference on IoT and Application (ICIOT), 1-3, doi: 10.1109/ICIOTA.2017.8073641.Google ScholarCross Ref
- N. Jasika, N. Alispahic, A. Elma, K. Ilvana, L. Elma and N. 2012. Nosovic, “Dijkstra's shortest path algorithm serial and parallel execution performance analysis. 2012 Proceedings of the 35th International Convention MIPRO, 1811-1815.Google Scholar
- V. M. Bhadrashetti, G. Pathak, S. B. Tantry, P. Biswagar, M. Sachin and S. P. Nagesh. 2019. Performance Analysis of Routing and Wavelength Assignment in Optical networks. 2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE), 287-290, doi: 10.1109/ ICATIECE45860.2019.9063853.Google Scholar
- J. Yang, J. Niu and X. Tian. 2014. A Load Balance Based Routing and Wavelength Assignment Algorithm. 2014 7th International Conference on Intelligent Computation Technology and Automation, 23-27, doi: 10.1109/ICICTA.2014.13.Google ScholarDigital Library
Index Terms
- Photonic Firewall Placement for Static Services in All-Optical Networks
Recommendations
Optical add-drop multiplexers based on autocloned photonic crystals
We describe and demonstrate the operation of optical add-drop multiplexers (OADMs) based on photonic crystal (PC) structures fabricated by autocloning technology. In these OADMs, a three-dimensional PC structure was utilized as a Bragg reflector. We ...
Multiple attack localization and identification in all-optical networks
The security characteristics of currently emerging all-optical networks display many unique features compared to traditional communication networks. In particular, network transparency raises many security vulnerabilities that differ substantially from ...
Traffic grooming and regenerator placement in impairment-aware optical WDM networks
ONDM'10: Proceedings of the 14th conference on Optical network design and modelingIn this paper, we address the problem of traffic grooming and regenerator placement in a WDM optical network in which lightpaths are hop-constrained by physical impairments. The efficient placement of regenerators and electronic grooming equipment at ...
Comments