10th IEEE Symposium on Computers and Communications (ISCC'05)
DOI: 10.1109/iscc.2005.84
|View full text |Cite
|
Sign up to set email alerts
|

Improving Survivability through Traffic Engineering in MPLS Networks

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Although it states that MIRA is computationally complex yet, it has been utilized more number of times than that in the original MIRA algorithm [7]. The paper [3] proposes a probabilistic algorithm for improving survivability of the selected paths for the traffic demands in the network. It proposes four cost functions and computes their performance by sequentially implementing the cost functions in the algorithms.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although it states that MIRA is computationally complex yet, it has been utilized more number of times than that in the original MIRA algorithm [7]. The paper [3] proposes a probabilistic algorithm for improving survivability of the selected paths for the traffic demands in the network. It proposes four cost functions and computes their performance by sequentially implementing the cost functions in the algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Failure in the network cannot be fully avoided but it can be reduced if some consideration is paid to the failure history of the link during its selection [3]. This paper proposes a model for selection of paths with the lowest cost functions.…”
Section: Introductionmentioning
confidence: 99%
“…Protection at the network layer can provide high level of flexibility and better resource efficiency. Research presented in [11], [12] are examples about protection trends where it was shown that SBPP can provide flexible, low cost and end-to-end protection.In this section, we review two important multipath provisioning methods based on SPM for IP/MPLS and in SONET/SDH networks.…”
Section: Related Work and Backgroundmentioning
confidence: 99%
“…In the proposed method, each LSR establishes the bypass tunnels to its NNHop LSR, and the PBT (n hops) means that the bypass tunnels established by a LSR can have n extra hops over the LSR and its NNHop LSR. RSVP represents Extended RSVP [11], and Pre-Qualify represents Efficient Pre-Qualify [17]. Fig.…”
Section: Simulationsmentioning
confidence: 99%
“…Some methods also consider the traffic engineering when establishing the backup path [7,9,11,17]. A broken link or LSR affects all working paths passing through it.…”
Section: Introductionmentioning
confidence: 99%