2011
DOI: 10.1007/s11235-011-9583-4
|View full text |Cite
|
Sign up to set email alerts
|

Reliable anycast and unicast routing: protection against attacks

Abstract: Recent communication networks are commonly protected against random failures, i.e. being the results of forces of nature, human errors, or hardware faults. In simulation experiments, network topologies are often assumed to be more or less regular. Known mechanisms typically refer to the case of unicast traffic protection. However, owing to the observed convergence of technologies/services, the importance of other transmission techniques (e.g. anycast, or multicast) has been increasing. Moreover, it turns out t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
5

Relationship

4
1

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…In the considered example, the updated topology from Fig. 3c does not include links located within heavy rain storm areas (e.g., links (3,4), (10,11), (14,15), and (15, 16)).…”
Section: Given a Graph Of Conflicts G=(v L) Where V Denotes The Setmentioning
confidence: 99%
See 1 more Smart Citation
“…In the considered example, the updated topology from Fig. 3c does not include links located within heavy rain storm areas (e.g., links (3,4), (10,11), (14,15), and (15, 16)).…”
Section: Given a Graph Of Conflicts G=(v L) Where V Denotes The Setmentioning
confidence: 99%
“…They were originally proposed for wired networks, and typically utilize the idea of backup (alternate) paths [10] forwarding the traffic after failures of links/nodes affecting the respective primary paths of transmission. In general, in order to provide protection against failures of links/nodes, every alternate path should be link-(node-)disjoint with the respective primary path [11,12].…”
Section: Introductionmentioning
confidence: 99%
“…[8,33,34,42]) we are rather interested in pure overlays and multicast communication. Nevertheless, most of previous research on survivable overlay multicasting concentrates on the issues related to either special coding or providing many disjoint parents for each receiver.…”
Section: Survivability Aspectsmentioning
confidence: 99%
“…After removing random flows from multicast trees, T * requires updating which is performed in lines 28-33. In the next loop (34)(35)(36)(37)(38)(39)(40)(41)(42)(43)(44)(45)(46)(47)(48)(49), new flows are assigned to the neighbor solution. Basically, it is performed as same as Random Search works, however consecutive trees selected from set T * are subject to having a maximum value of remaining throughput r max t (line 35).…”
Section: Neighborhoodmentioning
confidence: 99%
“…Also, apart from failures that are random by nature, there is a large group of accidents being result of malicious human activities, referred to as attacks. The respective proposals of resistantto-attack routing approaches can be found e.g., in [1,117].…”
mentioning
confidence: 99%