1999
DOI: 10.1109/90.803380
|View full text |Cite
|
Sign up to set email alerts
|

Redundant trees for preplanned recovery in arbitrary vertex-redundant or edge-redundant graphs

Abstract: Abstract-We present a new algorithm which creates redundant trees on arbitrary node-redundant or link-redundant networks. These trees are such that any node is connected to the common root of the trees by at least one of the trees in case of node or link failure. Our scheme provides rapid preplanned recovery of communications with great flexibility in the topology design. Unlike previous algorithms, our algorithm can establish two redundant trees in the case of a node failing in the network. In the case of fai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
195
0
2

Year Published

2003
2003
2017
2017

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 264 publications
(197 citation statements)
references
References 70 publications
0
195
0
2
Order By: Relevance
“…In the redundant tree protocol [7], [13]- [15], a packet from a node to a node is transmitted from to the root node and then from the root node to . For example, a packet from to in Fig.…”
Section: Fast Recovery Using Redundant Treesmentioning
confidence: 99%
See 3 more Smart Citations
“…In the redundant tree protocol [7], [13]- [15], a packet from a node to a node is transmitted from to the root node and then from the root node to . For example, a packet from to in Fig.…”
Section: Fast Recovery Using Redundant Treesmentioning
confidence: 99%
“…In Section II, we introduce concepts and definitions relating to fast recovery using redundant trees and define the optimization problems involving quality-of-service (QoS) and QoP. In Section III, we first present the MFBG scheme of [15] and illustrate this with an example. We then present a scheme, called the G-MFBG scheme, which generalizes the MFBG scheme.…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…Five major multicast protection approaches are proposed in the literature and most of them focus on link failure recovery: 1) tree-based protection [1]- [2]- [3], 2) path-based protection [4]- [5], 3) segment-based protection [6]- [7], 4) ring-based protection [8]- [9], and 4) p-cycle (preconfigured protection cycle) based protection [10]- [11]. In [12], G. Xue et al propose to deploy two link-disjoint light-trees: an active lighttree and a backup light-tree.…”
Section: Introductionmentioning
confidence: 99%