Reading PAGE

Peer Evaluation activity

Downloads 2
Views 19

Total impact ?

    Send a

    Bernard has...

    Trusted 0
    Reviewed 0
    Emailed 0
    Shared/re-used 0
    Discussed 0
    Invited 0
    Collected 0

     

    This was brought to you by:

    block this user Bernard A. Cousin Trusted member

    Professor

    University of Rennes 1
    IRISA laboratory

    Extending Node Protection Concept of P-Cycles for an Efficient Resource Utilization in Multicast Traffic

    Export to Mendeley

    In this paper, we consider link-and-node failure recovery in dynamic multicast traffic in WDM networks. We extend the node protection concept of the p-cycle approach to achieve more efficient resource utilization. Then, we propose a novel algorithm that integrates our concept for the node protection, named node-and-link protecting p-cycle based algorithm (NPC). We also propose a second algorithm, named node-and-link protecting candidate p-cycle based algorithm (NPCC). This algorithm deploys our concept for node protection and relies on a candidate p-cycle set to speed up the computational time. We compare our proposed algorithms to the ESHN algorithm, which is reported to be the most efficient algorithm for protecting dynamic multicast sessions. Extensive simulations show that the NPC algorithm achieves the lowest blocking probability, but has the highest computational time among the NPCC and ESHN algorithms. The NPCC algorithm outperforms the ESHN algorithm in terms of resource utilization efficiency and computational time.

    Oh la laClose

    Your session has expired but don’t worry, your message
    has been saved.Please log in and we’ll bring you back
    to this page. You’ll just need to click “Send”.

    Your evaluation is of great value to our authors and readers. Many thanks for your time.

    Review Close

    Short review
    Select a comment
    Select a grade
    You and the author
    Anonymity My review is anonymous( Log in  or  Register )
    publish
    Close

    When you're done, click "publish"

    Only blue fields are mandatory.

    Relation to the author*
    Overall Comment*
    Anonymity* My review is anonymous( Log in  or  Register )
     

    Focus & Objectives*

    Have the objectives and the central topic been clearly introduced?

    Novelty & Originality*

    Do you consider this work to be an interesting contribution to knowledge?

    Arrangement, Transition and Logic

    Are the different sections of this work well arranged and distributed?

    Methodology & Results

    Is the author's methodology relevant to both the objectives and the results?

    Data Settings & Figures

    Were tables and figures appropriate and well conceived?

    References and bibliography

    Is this work well documented and has the bibliography been properly established?

    Writing

    Is this work well written, checked and edited?

    Write Your Review (you can paste text as well)
    Please be civil and constructive. Thank you.


    Grade (optional, N/A by default)

    N/A 1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 10
    Close

    Your mailing list is currently empty.
    It will build up as you send messages
    and links to your peers.

     No one besides you has access to this list.
    Close
    Enter the e-mail addresses of your recipients in the box below.  Note: Peer Evaluation will NOT store these email addresses   log in
    Your recipients

    Your message:

    Your email : Your email address will not be stored or shared with others.

    Your message has been sent.

    Description

    Title : Extending Node Protection Concept of P-Cycles for an Efficient Resource Utilization in Multicast Traffic
    Author(s) : Ahmed Frikha, Bernard Cousin, Samer Lahoud
    Abstract : In this paper, we consider link-and-node failure recovery in dynamic multicast traffic in WDM networks. We extend the node protection concept of the p-cycle approach to achieve more efficient resource utilization. Then, we propose a novel algorithm that integrates our concept for the node protection, named node-and-link protecting p-cycle based algorithm (NPC). We also propose a second algorithm, named node-and-link protecting candidate p-cycle based algorithm (NPCC). This algorithm deploys our concept for node protection and relies on a candidate p-cycle set to speed up the computational time. We compare our proposed algorithms to the ESHN algorithm, which is reported to be the most efficient algorithm for protecting dynamic multicast sessions. Extensive simulations show that the NPC algorithm achieves the lowest blocking probability, but has the highest computational time among the NPCC and ESHN algorithms. The NPCC algorithm outperforms the ESHN algorithm in terms of resource utilization efficiency and computational time.
    Keywords : multicast, node link protection, p cycle, survivability, optical wdm networks

    Subject : unspecified
    Area : Other
    Language : English
    Year : 2011

    Affiliations University of Rennes 1
    Conference_title : 36th Annual IEEE Conference on Local Computer Networks LCN 2011
    Url : http://api.mendeley.com/research/extending-node-protection-concept-pcycles-efficient-resource-utilization-multicast-traffic/

    Leave a comment

    This contribution has not been reviewed yet. review?

    You may receive the Trusted member label after :

    • Reviewing 10 uploads, whatever the media type.
    • Being trusted by 10 peers.
    • If you are blocked by 10 peers the "Trust label" will be suspended from your page. We encourage you to contact the administrator to contest the suspension.

    Does this seem fair to you? Please make your suggestions.

    Please select an affiliation to sign your evaluation:

    Cancel Evaluation Save

    Please select an affiliation:

    Cancel   Save

    Bernard's Peer Evaluation activity

    Bernard has...

    Trusted 0
    Reviewed 0
    Emailed 0
    Shared/re-used 0
    Discussed 0
    Invited 0
    Collected 0
    Invite this peer to...
    Title
    Start date (dd/mm/aaaa)
    Location
    URL
    Message
    send
    Close

    Full Text request

    Your request will be sent.

    Please enter your email address to be notified
    when this article becomes available

    Your email


     
    Your email address will not be shared or spammed.