2011
DOI: 10.1007/978-3-642-20367-1_48
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach to the Provision of Non-simple Node-Protecting p-Cycles in WDM Mesh Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…The pricing problem is used to generate nodeprotecting p-cycles on dynamically in each iteration of the optimization process. The master problem below is quite similar to the ones in [19], [20] thanks to their same functionality. However, the associated candidate constructions here are different.…”
Section: B Comparisons Of the Design Methodsmentioning
confidence: 78%
See 3 more Smart Citations
“…The pricing problem is used to generate nodeprotecting p-cycles on dynamically in each iteration of the optimization process. The master problem below is quite similar to the ones in [19], [20] thanks to their same functionality. However, the associated candidate constructions here are different.…”
Section: B Comparisons Of the Design Methodsmentioning
confidence: 78%
“…The key to use the CG techniques consists in the composition scheme of the original problem. Here, we use the same scheme as those in [19], [20], [22]. The master problem selects node-protecting p-cycles from the candidate set such that all (intermediate) nodes and links in an optical network are protected against any single failure.…”
Section: B Comparisons Of the Design Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the short recovery time cannot always be guaranteed due to the flexibility of the protection structure. The authors in [16] enhanced the protection capacity utilization by solving the backhaul problem, in which the same link is traversed twice in opposite directions by the protection path before reaching the destination after a link failure. However, it suffers from longer switch reconfiguration time due to the fact that all failure-aware nodes need to carry out protection switching after failure detection.…”
Section: Background and Related Workmentioning
confidence: 99%