2004 IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communications
DOI: 10.1109/sarnof.2004.1302867
|View full text |Cite
|
Sign up to set email alerts
|

Design and analysis of five protection schemes for preplanned recovery in multicast WDM networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
27
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(27 citation statements)
references
References 11 publications
0
27
0
Order By: Relevance
“…Multicast protection and restoration in optical mesh networks have been studied extensively in recent work. A wide range of multicast protection algorithms and strategies [6][7][8][9][10][11][12][13] have been proposed to make the multicast sessions survivable after various failure scenarios such as fiber cut and duct cut. A primary light-tree itself needs a large number of network resources, and the protection consumes more bandwidth.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Multicast protection and restoration in optical mesh networks have been studied extensively in recent work. A wide range of multicast protection algorithms and strategies [6][7][8][9][10][11][12][13] have been proposed to make the multicast sessions survivable after various failure scenarios such as fiber cut and duct cut. A primary light-tree itself needs a large number of network resources, and the protection consumes more bandwidth.…”
Section: Related Workmentioning
confidence: 99%
“…Two multicast protection schemes, namely one ring for one session and one ring for all sessions, have been proposed in [11,12]. Each multicast session is allocated in a separated and dedicated ring.…”
Section: Related Workmentioning
confidence: 99%
“…Five major multicast protection approaches are proposed in the literature and most of them focus on link failure recovery: 1) tree-based protection [1]- [2]- [3], 2) path-based protection [4]- [5], 3) segment-based protection [6]- [7], 4) ring-based protection [8]- [9], and 4) p-cycle (preconfigured protection cycle) based protection [10]- [11]. In [12], G. Xue et al propose to deploy two link-disjoint light-trees: an active lighttree and a backup light-tree.…”
Section: Introductionmentioning
confidence: 99%
“…Five major multicast protection approaches are proposed in the literature and most of them focus on link failure recovery: 1) tree-based protection [1]- [2]- [3], 2) path-based protection [4]- [5], 3) segment-based protection [6]- [7], 4) ring-based protection [8]- [9], and 4) p-cycle (preconfigured protection cycle) based protection [10]- [11]. In [12], G. Xue and al. propose to deploy two link-disjoint light-trees: an active light-tree and a backup light-tree.…”
Section: Introductionmentioning
confidence: 99%