2013
DOI: 10.1016/j.comnet.2012.07.019
|View full text |Cite
|
Sign up to set email alerts
|

Protecting multicast services in optical internet backbones

Abstract: Many applications in the future Internet will use the multicasting service mode. Since many of these applications will generate large amounts of traffic, and since users expect a high level of service availability, it is important to provision multicasting sessions in the future Internet while also providing protection for multicast sessions against network component failures. In this paper we address the multicast survivability problem of using minimum resources to provision a multicast session and its protec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 27 publications
(28 reference statements)
0
3
0
Order By: Relevance
“…They proposed a service-provisioning scheme, named multicast protection through spanning paths, where a primary multicast tree is protected using backup network resources which are shared between different multicast sessions. In [17], the authors addressed the problem of multicast survivability. They proposed a solution where a multicast session is provisioned as the primary multicast tree with each of its segment being protected by another backup multicast tree.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They proposed a service-provisioning scheme, named multicast protection through spanning paths, where a primary multicast tree is protected using backup network resources which are shared between different multicast sessions. In [17], the authors addressed the problem of multicast survivability. They proposed a solution where a multicast session is provisioned as the primary multicast tree with each of its segment being protected by another backup multicast tree.…”
Section: Related Workmentioning
confidence: 99%
“…(1) (lines [17][18]. If the end-to-end latency fulfills the required latency, the incoming XR live stream request is admitted and the algorithm updates and returns the bandwidth reserved on each link, throughput reserved on each node, computing and storage resources reserved in each serving DC using the hash maps ∆, Σ, Φ, and Ψ (line [19][20][21][22].…”
Section: ) Xr Live Stream Is Available In the DC Clustermentioning
confidence: 99%
“…In [21] authors present a slightly modified MPH algorithm to provide better blocking probability in arc-disjoint tree protection. In [63] authors devise tree-based protection to protect each segment on the primary tree.…”
Section: Snh Incrementally Adds Non-destination Nodes To the Set Of Dmentioning
confidence: 99%