2014
DOI: 10.1016/j.osn.2013.06.006
|View full text |Cite
|
Sign up to set email alerts
|

Network coding-based protection

Abstract: This paper serves as a tutorial lecture on the use of network coding to provide resource efficient, and agile proactive protection. Network coding, which was introduced in [1], allows intermediate network nodes to form linear combinations of packets received on different input links. The use of network coding results in capacity enhancement. This capacity enhancement is used to provide protection channels which are used to carry combinations of redundant data, and are solved by the receivers in order to recove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 33 publications
(38 reference statements)
0
16
0
Order By: Relevance
“…In recent years, the application of network coding to failure recovery in optical network has been noted and increasingly studied, collectively known as network coding based protection [2]. Indeed, this marks a major departure from traditional research in optical protection as it can potentially achieve both rapid recovery and capacity improvement, challenging the well-known trade-off of trading speed of recovery for capacity, efficiency or vice versa.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, the application of network coding to failure recovery in optical network has been noted and increasingly studied, collectively known as network coding based protection [2]. Indeed, this marks a major departure from traditional research in optical protection as it can potentially achieve both rapid recovery and capacity improvement, challenging the well-known trade-off of trading speed of recovery for capacity, efficiency or vice versa.…”
Section: Introductionmentioning
confidence: 99%
“…On one hand, in multi-path routing (or shared path protection approaches [13,6]) we have to wait for the highest delay path to reconstruct user data. On the other hand, the additional redundancy provided by diversity coding ensures that the two lower delay paths determine the delay of the connection (as we can reconstruct user data from arbitrary two of the three routing DAGs with low additional coding complexity owing to the applied simple XOR codes [4]).…”
Section: Defining the Delay Of A Routing Dagmentioning
confidence: 99%
“…(4). Similarly to DARC-QoS, Constraint (5) formulates the flow conservation for each path w. Constraint (6) ensures that the disjointness of the paths. Constraint (7) gives a lower bound for the integer variable y w , which captures the worst case delay increase of path (routing DAG) w upon a single link failure formulated in Eq.…”
Section: Integer Linear Program For Darc-ddmentioning
confidence: 99%
See 1 more Smart Citation
“…Manley et al [12] provided a comprehensive study on all-optical network coding. Work by Kamal et al [13] comprehensively surveyed network coding for protection in the optical layer.…”
mentioning
confidence: 99%