NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium 2018
DOI: 10.1109/noms.2018.8406152
|View full text |Cite
|
Sign up to set email alerts
|

A ring-based single-link failure recovery approach in SDN data plane

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…So far, a number of solutions regarding failure recovery in SDN have already been proposed . Among these mechanisms, 7 mechanisms are protection failure recovery mechanisms [13][14][15][16][17][18][19]. Fourteen mechanisms are restoration failure recovery mechanisms [20][21][22][23][24][25][26][27][28][29][30][31][32][33].…”
Section: Internetmentioning
confidence: 99%
See 2 more Smart Citations
“…So far, a number of solutions regarding failure recovery in SDN have already been proposed . Among these mechanisms, 7 mechanisms are protection failure recovery mechanisms [13][14][15][16][17][18][19]. Fourteen mechanisms are restoration failure recovery mechanisms [20][21][22][23][24][25][26][27][28][29][30][31][32][33].…”
Section: Internetmentioning
confidence: 99%
“…The datapath-based technology is also widely used [12,13]. In [14], BFD is used to detect failure in SDN.…”
Section: Failure Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the case of protection, rerouting is almost immediate, but then minimizing the number of table entries is crucial. Feng et al [12] provide an algorithm for this purpose. Hu et al [13] investigate protection with multiple controllers and propose a scheme based on local rerouting and reverse forwarding.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, the passive strategy reactively adjusts routing decisions when link failure occurs, while the active strategy pre-deploys backup resources in the network. For example, the shared ring method is proposed in [12] to reuse backup resources, aiming to cost effectively pre-deploying backup resources in TCAM. Although both recovery delay and the TCAM usage could be improved, the congestion may occurs in the post-recovery network.…”
Section: Introductionmentioning
confidence: 99%