Comparison of two path restoration schemes in self-healing networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A novel class-based protection algorithm providing fast service recovery in IP/WDM networks
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
On certain behavior of scale-free networks under malicious attacks
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Priority-Enabled optimization of resource utilization in fault-tolerant optical transport networks
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Capacity efficient shared protection and fast restoration scheme in self-configured optical networks
SelfMan'06 Proceedings of the Second IEEE international conference on Self-Managed Networks, Systems, and Services
1+1 protection of overlay distributed computing systems: modeling and optimization
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Hi-index | 0.00 |
In this paper we propose the novel concept of a region protection/ restoration, where one backup path protects a certain region of an active path. We show that using the region protection/restoration we can keep both restoration times and network resource utilization ratio at the reasonable level. Since the optimization problem of finding working and backup paths is NP-complete, we developed the heuristic algorithm. We show that in the worst case our algorithm gave network resource utilization ratio only about 3.9 percent higher compared to the optimal one returned by the CPLEX program. Results of the U.S. Long-Distance Network modeling show that region protection gives a good compromise between path and link protection.