Proceedings. Fourth IEEE International Conference on Engineering of Complex Computer Systems (Cat. No.98EX193)
DOI: 10.1109/iceccs.1998.706662
|View full text |Cite
|
Sign up to set email alerts
|

VP reservation for rapid restoration using multiagents

Abstract: This paper discusses how a backup VP between each pair of a source node and a destination node is set up such that when some nodes and links in primary VP's fail, primary VP's are changed to backup VP's rapidly. Then, this paper proposes a multiagent-based method for such rapid restoration from primary VP's to backup VP's.The proposed method consists of the following three steps. The first step enumerates candidates of backup VP between each pair of a source node and a destination node. In the second step, cap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…2 In S nodes (1,1), (2,2), messages msg and ack are transmitted in parallel along backup VP candidates 2-1, 2-2 for SD pair ((2,2), (6,6)) and backup VP candidates 1-1, 1-2 for SD pair ((1,1), (5,5) In addition, nodes (4,3), (5,6), (5,4), (1,3) obtain a synchronism of message ack at time points #1, #2, #3, #4. For example, at #1, after waiting for the reception of ack from nodes (5,6), (5,4), ack is transmitted to nodes (1,1), (2,2). By this synchronism, the competition information of links on backup VP candidates 1-1, 2-2 can be transmitted to S nodes (1,1), (2,2).…”
Section: Execution Examplementioning
confidence: 95%
See 2 more Smart Citations
“…2 In S nodes (1,1), (2,2), messages msg and ack are transmitted in parallel along backup VP candidates 2-1, 2-2 for SD pair ((2,2), (6,6)) and backup VP candidates 1-1, 1-2 for SD pair ((1,1), (5,5) In addition, nodes (4,3), (5,6), (5,4), (1,3) obtain a synchronism of message ack at time points #1, #2, #3, #4. For example, at #1, after waiting for the reception of ack from nodes (5,6), (5,4), ack is transmitted to nodes (1,1), (2,2). By this synchronism, the competition information of links on backup VP candidates 1-1, 2-2 can be transmitted to S nodes (1,1), (2,2).…”
Section: Execution Examplementioning
confidence: 95%
“…For example, at #1, after waiting for the reception of ack from nodes (5,6), (5,4), ack is transmitted to nodes (1,1), (2,2). By this synchronism, the competition information of links on backup VP candidates 1-1, 2-2 can be transmitted to S nodes (1,1), (2,2).…”
Section: Execution Examplementioning
confidence: 95%
See 1 more Smart Citation