Energy Efficiency Using the Fast Reroute Technique

Energy Efficiency Using the Fast Reroute Technique

Diego Reforgiato Recupero, Sergio Consoli
ISBN13: 9781466658882|ISBN10: 1466658886|EISBN13: 9781466658899
DOI: 10.4018/978-1-4666-5888-2.ch699
Cite Chapter Cite Chapter

MLA

Recupero, Diego Reforgiato, and Sergio Consoli. "Energy Efficiency Using the Fast Reroute Technique." Encyclopedia of Information Science and Technology, Third Edition, edited by Mehdi Khosrow-Pour, D.B.A., IGI Global, 2015, pp. 7096-7105. https://doi.org/10.4018/978-1-4666-5888-2.ch699

APA

Recupero, D. R. & Consoli, S. (2015). Energy Efficiency Using the Fast Reroute Technique. In M. Khosrow-Pour, D.B.A. (Ed.), Encyclopedia of Information Science and Technology, Third Edition (pp. 7096-7105). IGI Global. https://doi.org/10.4018/978-1-4666-5888-2.ch699

Chicago

Recupero, Diego Reforgiato, and Sergio Consoli. "Energy Efficiency Using the Fast Reroute Technique." In Encyclopedia of Information Science and Technology, Third Edition, edited by Mehdi Khosrow-Pour, D.B.A., 7096-7105. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-5888-2.ch699

Export Reference

Mendeley
Favorite

Abstract

This article is addressed to network engineers and managers of large enterprises that are interested in energy consumption of network devices. In the last years many efforts in telecommunications network research and design have been devoted to reduce energy consumption of network devices. Development of green routers aimed at saving energy when the input traffic is low is receiving increasing attention in the scientific community. In this article we face the problem of further reducing power consumption in transport networks adopting the Fast Reroute technique together with a low power idle approach, which result in substantial energy saving when the traffic on the network is low. We have run simulations using NS-2 and as test case, we developed the proposed approach on top of the NetFPGA architecture and results are very promising for larger exploitation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.