IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference 2007
DOI: 10.1109/glocom.2007.471
|View full text |Cite
|
Sign up to set email alerts
|

A Distributed Bandwidth Sharing Heuristic for Backup LSP Computation

Abstract: Abstract-With the advent of MPLS, the restoration times of communications is decreased down to 50 ms by the use of preconfigured backup LSPs. To ensure there are enough resources after a failure, the backup LSPs must reserve the resources they need beforehand. However and contrarily to the primary LSPs which really use their resources, the backup LSPs do not use them until a failure of the protected component occurs. Hence, to optimize and maximize resource availability in the network, backup LSPs may share th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
17
0

Year Published

2008
2008
2009
2009

Publication Types

Select...
2
1

Relationship

3
0

Authors

Journals

citations
Cited by 3 publications
(17 citation statements)
references
References 7 publications
0
17
0
Order By: Relevance
“…With the increasing interest for local proactive protection in the last decade, several works [1,2,9,6,10,11,7,12,13] have been devoted to the determination of algorithms computing the backup paths. To minimize the quantity of bandwidth allocated on links while avoiding the bandwidth constraint violation (bandwidth insufficiency), the Backup Path Computation (BPC) algorithms require the knowledge of some information like the primary and backup paths, bandwidth allocations and protected risks.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…With the increasing interest for local proactive protection in the last decade, several works [1,2,9,6,10,11,7,12,13] have been devoted to the determination of algorithms computing the backup paths. To minimize the quantity of bandwidth allocated on links while avoiding the bandwidth constraint violation (bandwidth insufficiency), the Backup Path Computation (BPC) algorithms require the knowledge of some information like the primary and backup paths, bandwidth allocations and protected risks.…”
Section: Related Workmentioning
confidence: 99%
“…to guarantee the communication repair success), the backup paths should reserve the bandwidth they need beforehand. Besides, to decrease the bandwidth allocations and accept much more connection establishments, the practical hypothesis of single failure is often adopted [9,6,10,11,7,12,13]. With such hypothesis, all the backup paths protecting against failures of different components can share their bandwidth allocations (on their common links) since they cannot be active at the same time.…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…To offer scalability without increasing the recovery cycle, new computation heuristics which approximate and reduce the bandwidth information (protection costs especially) transmitted in the network have emerged [7,9]. Hence, once the bandwidth information is collected, nodes aggregate it before its flooding in the network.…”
Section: Related Workmentioning
confidence: 99%