2011
DOI: 10.1007/s11235-011-9577-2
|View full text |Cite
|
Sign up to set email alerts
|

Effective algorithms for finding optimum pairs of link-disjoint paths in α+1 path protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…In shared path protection, the calculation of an adequate AP and BP can be modeled as min-sum problem with ordered dual costs, which has been shown to be NP-Complete [16,17]. Algorithms for solving the min-sum problem with asymmetric weights can be found in [18] and [19]. A more general problem, the min-sum with dual costs, is solved in [20].…”
Section: Literature Review Of Resilient Routing Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…In shared path protection, the calculation of an adequate AP and BP can be modeled as min-sum problem with ordered dual costs, which has been shown to be NP-Complete [16,17]. Algorithms for solving the min-sum problem with asymmetric weights can be found in [18] and [19]. A more general problem, the min-sum with dual costs, is solved in [20].…”
Section: Literature Review Of Resilient Routing Issuesmentioning
confidence: 99%
“…A more general problem, the min-sum with dual costs, is solved in [20]. The algorithms in [18,19,20] are all variants of the Iterative Two Step Approach, which consists in using a k-shortest enumeration algorithm [21,22], for successively obtaining a candidate active path for which an adequate backup path is calculated. The iterative process continues until certain predefined criteria are met.…”
Section: Literature Review Of Resilient Routing Issuesmentioning
confidence: 99%
“…This problem is also NP-complete [15]. In [18] an algorithm, designated as a þ 1 protection, is proposed for a partial bandwidth protection scheme, where a is the ratio of the protection bandwidth (of the BP) to the full bandwidth (of active path).…”
Section: Introductionmentioning
confidence: 99%