2008
DOI: 10.1007/s11107-008-0124-3
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of p-cycle based protection methods for provisioning of dynamic multicast sessions in mesh WDM networks

Abstract: Network survivability is crucial to both unicast and multicast traffic. Up to now, extensive research has been done on unicast traffic protection. Recently, due to the rapid growth of multicast applications, such as video-conferencing, high definition television (HDTV), distance learning, and multi-player on-line gaming, the problem of multicast traffic protection has started to draw more research interests. The preconfigured protection cycle ( p-cycle) method proposed by Grover offers fast speed in restoratio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(19 citation statements)
references
References 25 publications
0
19
0
Order By: Relevance
“…In WDM optical networks, multicast protection approach can be classified into following five categories: (1) tree-based protection [15,16], (2) ring-based protection [17], (3) path-based protection [18][19][20][21], (4) segment-based protection [22,23], and (5) cycle-based protection [24][25][26][27]. Generally, to protect a light-tree for optical multicast, a pair of link-disjoint or arc-disjoint light-trees [23] is deployed.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In WDM optical networks, multicast protection approach can be classified into following five categories: (1) tree-based protection [15,16], (2) ring-based protection [17], (3) path-based protection [18][19][20][21], (4) segment-based protection [22,23], and (5) cycle-based protection [24][25][26][27]. Generally, to protect a light-tree for optical multicast, a pair of link-disjoint or arc-disjoint light-trees [23] is deployed.…”
Section: Previous Workmentioning
confidence: 99%
“…Ring based approaches are fast in link failure recovery, because only the end nodes of the failed link take action, but the drawback is the inefficiency of resource utilization [17]. Several p-cycle based protection approaches including the link-protecting p-cycle [24,26], flow p-cycle [27], and path-protecting p-cycle [30] were proposed for protecting links, segments and paths, respectively. Compared with the ring based protection approaches it has better re-provisioning and it also offers mesh-like high efficiency, because p-cycles can protect both on-cycle and straddling links [27].…”
Section: Previous Workmentioning
confidence: 99%
“…The generalization of p-cycle protection to allow for path and link protection was proposed by [2]. P-cycle protection of unicast and multicast traffic networks requires preconfiguration, and the offline nature allows for the efficient cycles to be selected [12,13]. [14] examined both path-based and link-based protection schemes in WDM networks.…”
Section: Light-trail Cycle Routing and Fault-tolerancementioning
confidence: 99%
“…The generalization of p-cycle protection to allow for path and link protection was proposed by [6]. P-cycle protection of unicast and multicast traffic networks requires preconfiguration and the offline nature allows for the efficient cycles to be selected [7], [8]. The use of path-pair protection, linked-based shared protection, spanning paths, and p-cycles to protect multicast sessions have all been proposed for WDM networks as well [9]- [13].…”
Section: Light-trail Cycle Routing Andmentioning
confidence: 99%