2010
DOI: 10.1109/tnet.2009.2031064
|View full text |Cite
|
Sign up to set email alerts
|

Maximizing Restorable Throughput in MPLS Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…An important conclusion following from this subsection and the previous one is that fast recovery of the affected flows (especially essential for real-time services with stringent requirements on availability and reliability such as Voice-over-IP [52], [73]) is possible by the application of local protection schemes. These methods involve short backup paths installed before the failure and eliminate the need to send the end-to-end notifications along the working path [65].…”
Section: Recovery Proceduresmentioning
confidence: 74%
“…An important conclusion following from this subsection and the previous one is that fast recovery of the affected flows (especially essential for real-time services with stringent requirements on availability and reliability such as Voice-over-IP [52], [73]) is possible by the application of local protection schemes. These methods involve short backup paths installed before the failure and eliminate the need to send the end-to-end notifications along the working path [65].…”
Section: Recovery Proceduresmentioning
confidence: 74%
“…Soft switch technology is the core technology of NGN, VAP draws on the advantages of IP, ATM and TDM to form a layered, fully opened architecture. Its core idea is software, through the software to achieve the original switch control, connection and business processing functions [7] [8]. The entities are connected and communicated through standard protocols.…”
Section: Discussionmentioning
confidence: 99%
“…Several FEC techniques such as low density parity check (LDPC) and REED Solomon (R-S) codes etc., are used to recover from packet losses [10,11]. In link recovery, each primary path has a back path or collection of backup path.…”
Section: Related Workmentioning
confidence: 99%