2011
DOI: 10.11591/ijece.v1i2.84
|View full text |Cite
|
Sign up to set email alerts
|

Comparison Analysis Of Recovery Mechanism At Mpls Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…), computation and/or establishment moment of the backup paths (before failure for protection and after failure occurrence for the restoration), resource usage (without resource sharing or with resource sharing), scope (global or local protection) and domain (intra-domain or interdomain protection). In MPLS networks, and under different network parameters and constraints, [21,22] propose various comparison metrics, such as the packet loss, rejection probability and restoration time, to evaluate the level of protection. Unfortunately, nether [21,22] nor [20] consider global sharing in their studies.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…), computation and/or establishment moment of the backup paths (before failure for protection and after failure occurrence for the restoration), resource usage (without resource sharing or with resource sharing), scope (global or local protection) and domain (intra-domain or interdomain protection). In MPLS networks, and under different network parameters and constraints, [21,22] propose various comparison metrics, such as the packet loss, rejection probability and restoration time, to evaluate the level of protection. Unfortunately, nether [21,22] nor [20] consider global sharing in their studies.…”
Section: Related Workmentioning
confidence: 99%
“…In MPLS networks, and under different network parameters and constraints, [21,22] propose various comparison metrics, such as the packet loss, rejection probability and restoration time, to evaluate the level of protection. Unfortunately, nether [21,22] nor [20] consider global sharing in their studies.…”
Section: Related Workmentioning
confidence: 99%
“…Upon a failure occurrence, only backup paths protecting against that failure are activated to repair the affected primary paths. As a result, the backup paths protecting against different failures should share their resources to save them [1]. Such a sharing, applied only between backup paths, is called in this paper restrained resource sharing (RRS).…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we try to fill the gap by studying and measuring the impact of an optimal primary routing, according to a strictly positive and static metric, on the performances of the backup 1 In the rest of this document, resource refers to bandwidth. path routing.…”
Section: Introductionmentioning
confidence: 99%
“…Represented solution based on approach proposed in [1]- [3], and it is realized as nonlinear flow-based model in which the conditions for link overload prevention are modified for the case when only some flows can switch to backup routes but not all of them. The main drawback of the fault-tolerant routing based on the network resources reservation is the decreasing of overall performance and scalability of protocol solutions.…”
Section: Introductionmentioning
confidence: 99%