Protection Switching Methods for Point‐to‐Multipoint Connections in Packet Transport Networks
In this paper, we discuss the issues of providing protection for point‐to‐multipoint connections in both Ethernet and MPLS‐TP‐based packet transport networks. We introduce two types of per‐leaf protection–linear and ring. Neither of the two types requires that modifications to existing standards be...
Saved in:
Published in | ETRI journal Vol. 38; no. 1; pp. 18 - 29 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Electronics and Telecommunications Research Institute (ETRI)
01.02.2016
한국전자통신연구원 |
Subjects | |
Online Access | Get full text |
ISSN | 1225-6463 2233-7326 |
DOI | 10.4218/etrij.16.0115.0024 |
Cover
Abstract | In this paper, we discuss the issues of providing protection for point‐to‐multipoint connections in both Ethernet and MPLS‐TP‐based packet transport networks. We introduce two types of per‐leaf protection–linear and ring. Neither of the two types requires that modifications to existing standards be made. Their performances can be improved by a collective signal fail mechanism proposed in this paper. In addition, two schemes — tree protection and hybrid protection — are newly proposed to reduce the service recovery time when a single failure leads to multiple signal fail events, which in turn places a significant amount of processing burden upon a root node. The behavior of the tree protection protocol is designed with minimal modifications to existing standards. The hybrid protection scheme is devised to maximize the benefits of per‐leaf protection and tree protection. To observe how well each scheme achieves an efficient traffic recovery, we evaluate their performances using a test bed as well as computer simulation based on the formulae found in this paper. |
---|---|
AbstractList | In this paper, we discuss the issues of providing protection for point‐to‐multipoint connections in both Ethernet and MPLS‐TP‐based packet transport networks. We introduce two types of per‐leaf protection–linear and ring. Neither of the two types requires that modifications to existing standards be made. Their performances can be improved by a collective signal fail mechanism proposed in this paper. In addition, two schemes — tree protection and hybrid protection — are newly proposed to reduce the service recovery time when a single failure leads to multiple signal fail events, which in turn places a significant amount of processing burden upon a root node. The behavior of the tree protection protocol is designed with minimal modifications to existing standards. The hybrid protection scheme is devised to maximize the benefits of per‐leaf protection and tree protection. To observe how well each scheme achieves an efficient traffic recovery, we evaluate their performances using a test bed as well as computer simulation based on the formulae found in this paper. In this paper, we discuss the issues of providing protection for point-to-multipoint connections in both Ethernet and MPLS-TP-based packet transport networks. We introduce two types of per-leaf protection—linear and ring. Neither of the two types requires that modifications to existing standards be made. Their performances can be improved by a collective signal fail mechanism proposed in this paper. In addition, two schemes—tree protection and hybrid protection—are newly proposed to reduce the service recovery time when a single failure leads to multiple signal fail events, which in turn places a significant amount of processing burden upon a root node. The behavior of the tree protection protocol is designed with minimal modifications to existing standards. The hybrid protection scheme is devised to maximize the benefits of per-leaf protection and tree protection. To observe how well each scheme achieves an efficient traffic recovery, we evaluate their performances using a test bed as well as computer simulation based on the formulae found in this paper. KCI Citation Count: 6 |
Author | Lee, Jong Hyun Kim, Dae‐Ub Lee, Jae Yong Kim, Byung Chul Ryoo, Jeong‐dong |
Author_xml | – sequence: 1 givenname: Dae‐Ub surname: Kim fullname: Kim, Dae‐Ub email: artkdu@etri.re.kr – sequence: 2 givenname: Jeong‐dong surname: Ryoo fullname: Ryoo, Jeong‐dong email: ryoo@etri.re.kr – sequence: 3 givenname: Jong Hyun surname: Lee fullname: Lee, Jong Hyun email: jlee@etri.re.kr – sequence: 4 givenname: Byung Chul surname: Kim fullname: Kim, Byung Chul email: byckim@cnu.ac.kr – sequence: 5 givenname: Jae Yong surname: Lee fullname: Lee, Jae Yong email: jyl@cnu.ac.kr |
BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002076496$$DAccess content in National Research Foundation of Korea (NRF) |
BookMark | eNqNkM9OAjEQhxuDiYC-gKcevSz23253j4SgkoASxHNTul0oiy1pawg3H8Fn9ElkgZMH42Ummfy-mczXAS3rrAbgFqMeIzi_19GbdQ9nPYRx2kOIsAvQJoTShFOStUAbE5ImGcvoFeiEsD4kEEvzNpBT76JW0TgLX3cmqpWxSzjRceXKACvn4dQZG78_v6I7lMnHJpptM4EDZ-0JDNBYOJWq1hHOvbRh63yEzzrunK_DNbis5Cbom3PvgreH4XzwlIxfHkeD_jhRlNM8waxKFyQlrCxUrnlFtV5wJbVECyKxlCnXBVJUoYpJXmiZpZwVWCleEqY5LWkX3J32Wl-JWhnhpDn2pRO1F_3ZfCQKzAnJDtH8FFXeheB1JZSJsnklemk2AiPRWBVHqwJnorEqGqsHlPxCt968S7__Gzrf25mN3v-DEMP5jCCEc_oDEyiUPg |
CitedBy_id | crossref_primary_10_5573_ieie_2016_53_9_026 crossref_primary_10_1109_JLT_2018_2820144 crossref_primary_10_1051_matecconf_201713400033 crossref_primary_10_1049_iet_com_2018_6129 crossref_primary_10_1109_ACCESS_2022_3168740 crossref_primary_10_1016_j_ress_2019_106575 |
Cites_doi | 10.4218/etrij.12.0111.0341 10.4218/etrij.10.1409.0097 10.1016/j.comnet.2009.08.012 10.1109/MCOM.2008.4463778 10.1109/MCOM.2014.6979981 10.4218/etrij.09.0209.0244 10.1109/glocom.2010.5683945 10.1109/MCOM.2008.4623718 10.4218/etrij.08.0208.0253 |
ContentType | Journal Article |
Copyright | 2016 ETRI |
Copyright_xml | – notice: 2016 ETRI |
DBID | AAYXX CITATION ACYCR |
DOI | 10.4218/etrij.16.0115.0024 |
DatabaseName | CrossRef Korean Citation Index |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2233-7326 |
EndPage | 29 |
ExternalDocumentID | oai_kci_go_kr_ARTI_917226 10_4218_etrij_16_0115_0024 ETR20018 |
Genre | article |
GrantInformation_xml | – fundername: ICT R&D program of MSIP/IITP funderid: B0101‐15‐0024 |
GroupedDBID | -~X .4S .DC .UV 0R~ 1OC 29G 2WC 5GY 5VS 9ZL AAKPC AAYBS ACGFS ACXQS ACYCR ADBBV ADDVE AENEX ALMA_UNASSIGNED_HOLDINGS ARCSS AVUZU BCNDV DU5 E3Z EBS EDO EJD GROUPED_DOAJ IPNFZ ITG ITH JDI KQ8 KVFHK MK~ ML~ O9- OK1 P5Y RIG RNS TR2 TUS WIN XSB AAYXX ADMLS CITATION OVT |
ID | FETCH-LOGICAL-c3738-14f5b2524d9c8e7f3eeb7caea0b2a1aa57e90c3c0f4a79ea657491cc7d24e73d3 |
ISSN | 1225-6463 |
IngestDate | Sun Mar 09 07:52:04 EDT 2025 Thu Apr 24 23:09:21 EDT 2025 Tue Jul 01 02:03:16 EDT 2025 Wed Jan 22 16:53:48 EST 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c3738-14f5b2524d9c8e7f3eeb7caea0b2a1aa57e90c3c0f4a79ea657491cc7d24e73d3 |
Notes | artkdu@etri.re.kr is with the Communications & Internet Research Laboratory, ETRI, Daejeon, Rep. of Korea. Jeong‐dong Ryoo (corresponding author ryoo@etri.re.kr jyl@cnu.ac.kr Jong Hyun Lee is with the Communications & Internet Research Laboratory, ETRI, Daejeon, and with the Department of Engineering, Korea University of Science and Technology, Daejeon, Rep. of Korea. byckim@cnu.ac.kr is with the Communications & Internet Research Laboratory, ETRI, and with the Department of Information and Communications Engineering, Chungnam National University, Daejeon, Rep. of Korea. and Jae Yong Lee Dae‐Ub Kim This work was supported by the ICT R&D program of MSIP/IITP (No. B0101‐15‐0024, Terabit optical‐circuit‐packet converged switching system technology development for the next‐generation optical transport network). jlee@etri.re.kr Byung Chul Kim are with the Department of Information and Communications Engineering, Chungnam National University, Daejeon, Rep. of Korea. http://etrij.etri.re.kr/etrij/journal/article/article.do?volume=38&issue=1&page=18 G704-001110.2016.38.1.001 |
OpenAccessLink | https://onlinelibrary.wiley.com/doi/pdfdirect/10.4218/etrij.16.0115.0024 |
PageCount | 12 |
ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_917226 crossref_citationtrail_10_4218_etrij_16_0115_0024 crossref_primary_10_4218_etrij_16_0115_0024 wiley_primary_10_4218_etrij_16_0115_0024_ETR20018 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | February 2016 2016-02-01 2016-02 |
PublicationDateYYYYMMDD | 2016-02-01 |
PublicationDate_xml | – month: 02 year: 2016 text: February 2016 |
PublicationDecade | 2010 |
PublicationTitle | ETRI journal |
PublicationYear | 2016 |
Publisher | Electronics and Telecommunications Research Institute (ETRI) 한국전자통신연구원 |
Publisher_xml | – name: Electronics and Telecommunications Research Institute (ETRI) – name: 한국전자통신연구원 |
References | 2009 2010; 32 2010; 54 2008; 46 2014 2008; 30 2009; 31 2014; 52 2012 2011 2012; 34 2010 Key-10.4218/etrij.16.0115.0024-9 Key-10.4218/etrij.16.0115.0024-8 Key-10.4218/etrij.16.0115.0024-7 Key-10.4218/etrij.16.0115.0024-6 Key-10.4218/etrij.16.0115.0024-5 Key-10.4218/etrij.16.0115.0024-4 Key-10.4218/etrij.16.0115.0024-3 Key-10.4218/etrij.16.0115.0024-2 Key-10.4218/etrij.16.0115.0024-1 |
References_xml | – year: 2011 – year: 2009 – volume: 46 start-page: 136 issue: 9 year: 2008 end-page: 143 article-title: Ethernet Ring Protection for Carrier Ethernet Networks publication-title: IEEE Commun. Mag. – volume: 30 start-page: 874 issue: 6 year: 2008 end-page: 876 article-title: Ethernet Ring Protection Using Filtering Database Flip Scheme for Minimum Capacity Requirement publication-title: ETRI J. – volume: 34 start-page: 199 issue: 2 year: 2012 end-page: 209 article-title: Impacts of Hierarchy in Ethernet Ring Networks on Service Resiliency publication-title: ETRI J. – volume: 54 start-page: 57 issue: 1 year: 2010 end-page: 78 article-title: Resilience Technologies in Ethernet publication-title: Comput. Netw. – volume: 31 start-page: 631 issue: 5 year: 2009 end-page: 633 article-title: An Ethernet Ring Protection Method to Minimize Transient Traffic by Selective FDB Advertisement publication-title: ETRI J. – volume: 32 start-page: 184 issue: 2 year: 2010 end-page: 194 article-title: Flush Optimization to Guarantee Less Transient Traffic in Ethernet Ring Protection publication-title: ETRI J. – volume: 46 start-page: 97 issue: 3 year: 2008 end-page: 103 article-title: OAM and its Performance Monitoring Mechanisms for Carrier Ethernet Transport Networks publication-title: IEEE Commun. Mag. – start-page: 1 year: 2010 end-page: 6 article-title: Enhanced Protection Schemes to Guarantee Consistent Filtering Database in Ethernet Rings – year: 2014 – volume: 52 start-page: 16 issue: 12 year: 2014 end-page: 21 article-title: MPLS‐TP Linear Protection for ITU‐T and IETF publication-title: IEEE Commun. Mag. – year: 2012 – ident: Key-10.4218/etrij.16.0115.0024-5 doi: 10.4218/etrij.12.0111.0341 – ident: Key-10.4218/etrij.16.0115.0024-6 doi: 10.4218/etrij.10.1409.0097 – ident: Key-10.4218/etrij.16.0115.0024-9 doi: 10.1016/j.comnet.2009.08.012 – ident: Key-10.4218/etrij.16.0115.0024-8 doi: 10.1109/MCOM.2008.4463778 – ident: Key-10.4218/etrij.16.0115.0024-1 doi: 10.1109/MCOM.2014.6979981 – ident: Key-10.4218/etrij.16.0115.0024-4 doi: 10.4218/etrij.09.0209.0244 – ident: Key-10.4218/etrij.16.0115.0024-7 doi: 10.1109/glocom.2010.5683945 – ident: Key-10.4218/etrij.16.0115.0024-2 doi: 10.1109/MCOM.2008.4623718 – ident: Key-10.4218/etrij.16.0115.0024-3 doi: 10.4218/etrij.08.0208.0253 |
SSID | ssj0020458 |
Score | 2.0746784 |
Snippet | In this paper, we discuss the issues of providing protection for point‐to‐multipoint connections in both Ethernet and MPLS‐TP‐based packet transport networks.... In this paper, we discuss the issues of providing protection for point-to-multipoint connections in both Ethernet and MPLS-TP-based packet transport networks.... |
SourceID | nrf crossref wiley |
SourceType | Open Website Enrichment Source Index Database Publisher |
StartPage | 18 |
SubjectTerms | P2MP packet transport network point‐to‐multipoint Protection switching 전자/정보통신공학 |
Title | Protection Switching Methods for Point‐to‐Multipoint Connections in Packet Transport Networks |
URI | https://onlinelibrary.wiley.com/doi/abs/10.4218%2Fetrij.16.0115.0024 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002076496 |
Volume | 38 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
ispartofPNX | ETRI Journal, 2016, 38(1), , pp.18-29 |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NbtQwELa27QUOiF9R_mQkblHKZuPEzrEU0BYJtEK7qOJiOY63XRUl1Tarqj3xCDwjz8ADMGMnTrZFUHrJrpzESTxfxuPJNzOEvBJFMeewDAjZSKchyxQLhYhUGBWGqWyYYwYWZFt8Sscz9uEgORgMfvVYS6s639EXf4wruYlUoQ3kilGy_yFZ3yk0wH-QL2xBwrC9lownLsmCfefPFrWjRX60NaFtmoVgUi3K2vMZ6sr_tXG3J7g3sFQX7SnlEwXvdd0lPceQYCRvna758Kef94P-LSpfl_mtMv4qs9x_zzmv3CcegxTgdn9RNfNmjxGEtY_G56vyUrdvoOkw2DtqeIyNnyLy1ObWeear-rjc01Ms89OPgTn1XMMeTwKsbHyi1ividDSooDBljV40tg2MnDjksQu-bxV7LK4A2GnpRuO7-d51fXkmYWD6IKbq5QJmk3QHLWd0vrFu3my5Av7o5N_HW8MBngiZbGKDbI04R3LB1u6X2deZdxTgx2t0FLQP6oK98CKvr15gzaDaKJfz9WWWtZOmd8mdZoFDdx1a75GBKe-T2720lw-I6nBLPW5pg1sKuKUWtz-__6gr2HRYpT2s0kVJHVapxyptsfqQzN6_m-6Nw6bUR6gxtVYYsXmSwwCyItPC8HlsTM61Mgq0hYqUSrjJhjrWwzlTPDMqTTjLIq15MWKGx0X8iGyWVWkeE5qC0hGjHHYmhuWpyDMzLEQhRMI4MyrZJlE7XlI3efCxHMs3CethHGNpx1hGqcQxljjG2yTw55y4LDB_PfoliEEe64XE5O34e1jJ46WEJeq-BMUISx64Cyuka3QnW7w8ucE5T8mt7mV8Rjbr5co8BzO6zl80qPsNgunEfg |
linkProvider | Wiley-Blackwell |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT9wwEB3BcigcKqAgoAWM1FuVskkc2zkitGj5Wq3a3Qr1YjmOgyJQFu0G9dqfwG_kl3TGCStQJYS4JFISW9EbT_xmMn4G-KryvJAYBgQ8siLgqeGBUqEJwtxxk3YzUmChaouB6I_52VVytQC9p7UwjT7EPOFGnuG_1-TglJAmL-c4LZEV62mJni6-E6uhxAhfhCWiN1EHlo5-jX-P55EX_Q2kyAsHbyC4iJvVM9TP4f-9vJihFqtp8ZK3-onnZBU-toyRHTUmXoMFV63DyjMdwU9gho3aAmLMfv4pa18fyS795tAzhrSUDSdlVT_-fagnePCLbu_oCvN1Lr7hjJUVGxp06prNFc_ZoKkSn23A-KQ3Ou4H7d4JgSWtoiDkRZJFScTz1Coni9i5TFrjDMJvQmMS6dKujW234EamzohE8jS0VuYRdzLO403oVJPKbQETaEUVZXgzcTwTKktdN1e5UgmX3JlkG8InvLRthcVpf4tbjQEGYaw9xjoUmjDWhPE2fJu3uWtkNV59-gDNoG9sqUkNm87XE30z1cj5TzWONOSQ-BbeSG_oTvdGP6iUTO28o80-fOiPLi_0xeng_DMsI39qi7i_QKee3rtd5Ch1tteOwH8q1uJB |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1dT9swFLVKkSZ4QGxjojCYJ_GGsjWJYzuPCFrxsVUV0AnxYjm2g6KitGqDeOUn8Bv5JbvXCRUIaZp4SaQktqJz743Pda6PCdmT1uYC0oCARYYHLNUskDLUQWgd02k3QwUWrLYY8OMRO71Krlrk6HktTK0PsZhww8jw32sM8KnNMcgZjEpoxGpWQKDzH0hqcF6ELZFllMsDb18--DO6Hi0SL_wZiIkX-G7AGY_rxTPYz8-3vbwaoJbKWf6atvpxp79O1hrCSA9qC38kLVd-IqsvZAQ_Ez2sxRYAYnpxX1S-PJL-9ntDzymwUjqcFGX19PBYTeDg19xO8Qr1ZS6-4ZwWJR1qiOmKLgTP6aAuEp9vkFG_d3l4HDRbJwQGpYqCkOVJFiURs6mRTuSxc5kw2mlAX4daJ8KlXRObbs60SJ3miWBpaIywEXMitvEX0i4npdsklIMRZZTBzcSxjMssdV0rrZQJE8zppEPCZ7yUaXTFcXuLWwX5BWKsPMYq5AoxVohxh-wv2kxrVY1_Pv0dzKDGplAoho3nm4kazxRQ_hMFjgYUEt7CG-k_ulO9y3OsJJNb72jzjXwYHvXVr5PB2TZZAfbUlHB_Je1qdud2gKFU2W7jgH8B3Y3hag |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Protection+Switching+Methods+for+Point%E2%80%90to%E2%80%90Multipoint+Connections+in+Packet+Transport+Networks&rft.jtitle=ETRI+journal&rft.au=Kim%2C+Dae%E2%80%90Ub&rft.au=Ryoo%2C+Jeong%E2%80%90dong&rft.au=Lee%2C+Jong+Hyun&rft.au=Kim%2C+Byung+Chul&rft.date=2016-02-01&rft.pub=Electronics+and+Telecommunications+Research+Institute+%28ETRI%29&rft.issn=1225-6463&rft.eissn=2233-7326&rft.volume=38&rft.issue=1&rft.spage=18&rft.epage=29&rft_id=info:doi/10.4218%2Fetrij.16.0115.0024&rft.externalDBID=10.4218%252Fetrij.16.0115.0024&rft.externalDocID=ETR20018 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1225-6463&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1225-6463&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1225-6463&client=summon |