{"title":"Multiple Mode Protection Switching Failure Recovery Mechanism under MPLS Network","authors":"Zhou Jia, Guo Yunfei","doi":"10.1109/WMSVM.2010.77","DOIUrl":null,"url":null,"abstract":"In order to solve the problem of constrained routing algorithm without capability of dealing with failures, this paper proposes a failure recovery method based on multiple mode protection switching including global protection???segment protection and local protection. This method quantifies the performance of three protections switching styles as a protection metric, making use of this metric to computer the optimal protection style for the working path. This paper put this failure recovery method into constrained routing algorithm to enhance the invulnerability of the algorithm","PeriodicalId":167797,"journal":{"name":"2010 Second International Conference on Modeling, Simulation and Visualization Methods","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Modeling, Simulation and Visualization Methods","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WMSVM.2010.77","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
In order to solve the problem of constrained routing algorithm without capability of dealing with failures, this paper proposes a failure recovery method based on multiple mode protection switching including global protection???segment protection and local protection. This method quantifies the performance of three protections switching styles as a protection metric, making use of this metric to computer the optimal protection style for the working path. This paper put this failure recovery method into constrained routing algorithm to enhance the invulnerability of the algorithm