{"title":"DWDM网络保护/恢复令牌树算法的不同实现","authors":"Yuna Zhang, O. Yang","doi":"10.1109/ICCCN.2002.1043080","DOIUrl":null,"url":null,"abstract":"High-speed optical networks need efficient protection/restoration schemes. A heuristic distributed MST algorithm, called the token tree (TT) algorithm, is proposed in this paper. The TT algorithm consists of four subalgorithms, Namely the upward root selection (URS) algorithm, the star token polling (STP) algorithm, the passive state (PS) algorithm and the active state (AS) algorithm cooperate together to form a logical spanning tree for network protection. Tokens are polled between the PS and AS algorithm and thus decide the node sequence in a spanning tree. The restoration strategy lies in two points: using tree links to protect non-tree links, and seeking a shortest path from a node to its parent in order to protect the corresponding tree link. Performance analysis of the algorithms is performed in some topologies based on existing networks.","PeriodicalId":302787,"journal":{"name":"Proceedings. Eleventh International Conference on Computer Communications and Networks","volume":"133 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Different implementations of token tree algorithm for DWDM network protection/restoration\",\"authors\":\"Yuna Zhang, O. Yang\",\"doi\":\"10.1109/ICCCN.2002.1043080\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"High-speed optical networks need efficient protection/restoration schemes. A heuristic distributed MST algorithm, called the token tree (TT) algorithm, is proposed in this paper. The TT algorithm consists of four subalgorithms, Namely the upward root selection (URS) algorithm, the star token polling (STP) algorithm, the passive state (PS) algorithm and the active state (AS) algorithm cooperate together to form a logical spanning tree for network protection. Tokens are polled between the PS and AS algorithm and thus decide the node sequence in a spanning tree. The restoration strategy lies in two points: using tree links to protect non-tree links, and seeking a shortest path from a node to its parent in order to protect the corresponding tree link. Performance analysis of the algorithms is performed in some topologies based on existing networks.\",\"PeriodicalId\":302787,\"journal\":{\"name\":\"Proceedings. Eleventh International Conference on Computer Communications and Networks\",\"volume\":\"133 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-12-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. Eleventh International Conference on Computer Communications and Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCN.2002.1043080\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. Eleventh International Conference on Computer Communications and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN.2002.1043080","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Different implementations of token tree algorithm for DWDM network protection/restoration
High-speed optical networks need efficient protection/restoration schemes. A heuristic distributed MST algorithm, called the token tree (TT) algorithm, is proposed in this paper. The TT algorithm consists of four subalgorithms, Namely the upward root selection (URS) algorithm, the star token polling (STP) algorithm, the passive state (PS) algorithm and the active state (AS) algorithm cooperate together to form a logical spanning tree for network protection. Tokens are polled between the PS and AS algorithm and thus decide the node sequence in a spanning tree. The restoration strategy lies in two points: using tree links to protect non-tree links, and seeking a shortest path from a node to its parent in order to protect the corresponding tree link. Performance analysis of the algorithms is performed in some topologies based on existing networks.