2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577) 2004
DOI: 10.1109/icc.2004.1312816
|View full text |Cite
|
Sign up to set email alerts
|

Light-tree based protection strategies for multicast traffic in transport WDM mesh networks with multifiber systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0
1

Year Published

2007
2007
2016
2016

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 28 publications
(19 citation statements)
references
References 4 publications
0
18
0
1
Order By: Relevance
“…Two multicast protection schemes, namely one ring for one session and one ring for all sessions, have been proposed in [11,12]. Each multicast session is allocated in a separated and dedicated ring.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Two multicast protection schemes, namely one ring for one session and one ring for all sessions, have been proposed in [11,12]. Each multicast session is allocated in a separated and dedicated ring.…”
Section: Related Workmentioning
confidence: 99%
“…Multicast protection and restoration in optical mesh networks have been studied extensively in recent work. A wide range of multicast protection algorithms and strategies [6][7][8][9][10][11][12][13] have been proposed to make the multicast sessions survivable after various failure scenarios such as fiber cut and duct cut. A primary light-tree itself needs a large number of network resources, and the protection consumes more bandwidth.…”
Section: Related Workmentioning
confidence: 99%
“…Four light-tree based protection strategies for multicast traffic was presented in [11], namely, LR, LIR, OB, and OBF protection strategies. In the LR (Light-Tree Reconfiguration) and LIR (Light-Tree-Interrupted Reconfiguration), any failure that occurs in multicast network, the multicast trees will be reconfigured to overcome the situation.…”
Section: Related Workmentioning
confidence: 99%
“…The closer the link is to the source node, the more destinations would be affected [4]. Most current multicast protection methods focus on single link protection and may be classified into five major categories: (i) tree-based protection [5][6][7]; (ii) ring-based protection [8,9]; (iii) path-based protection [6,10]; (iv) segment-based protection [6,11,12];…”
Section: Introductionmentioning
confidence: 99%