2006 Innovations in Information Technology 2006
DOI: 10.1109/innovations.2006.301902
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach for Fault Tolerance in MPLS Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2012
2012

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Erasure coding scales a small message of k symbols into a larger one of say n symbols such that a subset of k symbols is adequate to recover the original message. Authors in [2] applied this scheme for fault tolerance in multicast networks where n disjoint multicast trees carry packets containing the original and redundant data. Recovery of original encoded data at receivers is effected through reception of a minimum of k out of the n transmitted packets, enabling recovery from failures of at most n-k paths.…”
Section: Introductionmentioning
confidence: 99%
“…Erasure coding scales a small message of k symbols into a larger one of say n symbols such that a subset of k symbols is adequate to recover the original message. Authors in [2] applied this scheme for fault tolerance in multicast networks where n disjoint multicast trees carry packets containing the original and redundant data. Recovery of original encoded data at receivers is effected through reception of a minimum of k out of the n transmitted packets, enabling recovery from failures of at most n-k paths.…”
Section: Introductionmentioning
confidence: 99%
“…3) The network coding at the intermediate nodes is simple xoring and can be accomplished using a Field of size (2). Additionally Field size for generating coded packets at the source is small.…”
Section: Proposed Approach Discussionmentioning
confidence: 99%
“…This approach [2] for fault tolerance is based on Adi Shamir's Threshold Sharing Scheme (TSS) in security. The scheme uses a modified version of TSS.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations