Protection Switching Methods for Point‐to‐Multipoint Connections in Packet Transport Networks

In this paper, we discuss the issues of providing protection for point‐to‐multipoint connections in both Ethernet and MPLS‐TP‐based packet transport networks. We introduce two types of per‐leaf protection–linear and ring. Neither of the two types requires that modifications to existing standards be...

Full description

Saved in:
Bibliographic Details
Published inETRI journal Vol. 38; no. 1; pp. 18 - 29
Main Authors Kim, Dae‐Ub, Ryoo, Jeong‐dong, Lee, Jong Hyun, Kim, Byung Chul, Lee, Jae Yong
Format Journal Article
LanguageEnglish
Published Electronics and Telecommunications Research Institute (ETRI) 01.02.2016
한국전자통신연구원
Subjects
Online AccessGet full text
ISSN1225-6463
2233-7326
DOI10.4218/etrij.16.0115.0024

Cover

Abstract In this paper, we discuss the issues of providing protection for point‐to‐multipoint connections in both Ethernet and MPLS‐TP‐based packet transport networks. We introduce two types of per‐leaf protection–linear and ring. Neither of the two types requires that modifications to existing standards be made. Their performances can be improved by a collective signal fail mechanism proposed in this paper. In addition, two schemes — tree protection and hybrid protection — are newly proposed to reduce the service recovery time when a single failure leads to multiple signal fail events, which in turn places a significant amount of processing burden upon a root node. The behavior of the tree protection protocol is designed with minimal modifications to existing standards. The hybrid protection scheme is devised to maximize the benefits of per‐leaf protection and tree protection. To observe how well each scheme achieves an efficient traffic recovery, we evaluate their performances using a test bed as well as computer simulation based on the formulae found in this paper.
AbstractList In this paper, we discuss the issues of providing protection for point‐to‐multipoint connections in both Ethernet and MPLS‐TP‐based packet transport networks. We introduce two types of per‐leaf protection–linear and ring. Neither of the two types requires that modifications to existing standards be made. Their performances can be improved by a collective signal fail mechanism proposed in this paper. In addition, two schemes — tree protection and hybrid protection — are newly proposed to reduce the service recovery time when a single failure leads to multiple signal fail events, which in turn places a significant amount of processing burden upon a root node. The behavior of the tree protection protocol is designed with minimal modifications to existing standards. The hybrid protection scheme is devised to maximize the benefits of per‐leaf protection and tree protection. To observe how well each scheme achieves an efficient traffic recovery, we evaluate their performances using a test bed as well as computer simulation based on the formulae found in this paper.
In this paper, we discuss the issues of providing protection for point-to-multipoint connections in both Ethernet and MPLS-TP-based packet transport networks. We introduce two types of per-leaf protection—linear and ring. Neither of the two types requires that modifications to existing standards be made. Their performances can be improved by a collective signal fail mechanism proposed in this paper. In addition, two schemes—tree protection and hybrid protection—are newly proposed to reduce the service recovery time when a single failure leads to multiple signal fail events, which in turn places a significant amount of processing burden upon a root node. The behavior of the tree protection protocol is designed with minimal modifications to existing standards. The hybrid protection scheme is devised to maximize the benefits of per-leaf protection and tree protection. To observe how well each scheme achieves an efficient traffic recovery, we evaluate their performances using a test bed as well as computer simulation based on the formulae found in this paper. KCI Citation Count: 6
Author Lee, Jong Hyun
Kim, Dae‐Ub
Lee, Jae Yong
Kim, Byung Chul
Ryoo, Jeong‐dong
Author_xml – sequence: 1
  givenname: Dae‐Ub
  surname: Kim
  fullname: Kim, Dae‐Ub
  email: artkdu@etri.re.kr
– sequence: 2
  givenname: Jeong‐dong
  surname: Ryoo
  fullname: Ryoo, Jeong‐dong
  email: ryoo@etri.re.kr
– sequence: 3
  givenname: Jong Hyun
  surname: Lee
  fullname: Lee, Jong Hyun
  email: jlee@etri.re.kr
– sequence: 4
  givenname: Byung Chul
  surname: Kim
  fullname: Kim, Byung Chul
  email: byckim@cnu.ac.kr
– sequence: 5
  givenname: Jae Yong
  surname: Lee
  fullname: Lee, Jae Yong
  email: jyl@cnu.ac.kr
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002076496$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNqNkM9OAjEQhxuDiYC-gKcevSz23253j4SgkoASxHNTul0oiy1pawg3H8Fn9ElkgZMH42Ummfy-mczXAS3rrAbgFqMeIzi_19GbdQ9nPYRx2kOIsAvQJoTShFOStUAbE5ImGcvoFeiEsD4kEEvzNpBT76JW0TgLX3cmqpWxSzjRceXKACvn4dQZG78_v6I7lMnHJpptM4EDZ-0JDNBYOJWq1hHOvbRh63yEzzrunK_DNbis5Cbom3PvgreH4XzwlIxfHkeD_jhRlNM8waxKFyQlrCxUrnlFtV5wJbVECyKxlCnXBVJUoYpJXmiZpZwVWCleEqY5LWkX3J32Wl-JWhnhpDn2pRO1F_3ZfCQKzAnJDtH8FFXeheB1JZSJsnklemk2AiPRWBVHqwJnorEqGqsHlPxCt968S7__Gzrf25mN3v-DEMP5jCCEc_oDEyiUPg
CitedBy_id crossref_primary_10_5573_ieie_2016_53_9_026
crossref_primary_10_1109_JLT_2018_2820144
crossref_primary_10_1051_matecconf_201713400033
crossref_primary_10_1049_iet_com_2018_6129
crossref_primary_10_1109_ACCESS_2022_3168740
crossref_primary_10_1016_j_ress_2019_106575
Cites_doi 10.4218/etrij.12.0111.0341
10.4218/etrij.10.1409.0097
10.1016/j.comnet.2009.08.012
10.1109/MCOM.2008.4463778
10.1109/MCOM.2014.6979981
10.4218/etrij.09.0209.0244
10.1109/glocom.2010.5683945
10.1109/MCOM.2008.4623718
10.4218/etrij.08.0208.0253
ContentType Journal Article
Copyright 2016 ETRI
Copyright_xml – notice: 2016 ETRI
DBID AAYXX
CITATION
ACYCR
DOI 10.4218/etrij.16.0115.0024
DatabaseName CrossRef
Korean Citation Index
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2233-7326
EndPage 29
ExternalDocumentID oai_kci_go_kr_ARTI_917226
10_4218_etrij_16_0115_0024
ETR20018
Genre article
GrantInformation_xml – fundername: ICT R&D program of MSIP/IITP
  funderid: B0101‐15‐0024
GroupedDBID -~X
.4S
.DC
.UV
0R~
1OC
29G
2WC
5GY
5VS
9ZL
AAKPC
AAYBS
ACGFS
ACXQS
ACYCR
ADBBV
ADDVE
AENEX
ALMA_UNASSIGNED_HOLDINGS
ARCSS
AVUZU
BCNDV
DU5
E3Z
EBS
EDO
EJD
GROUPED_DOAJ
IPNFZ
ITG
ITH
JDI
KQ8
KVFHK
MK~
ML~
O9-
OK1
P5Y
RIG
RNS
TR2
TUS
WIN
XSB
AAYXX
ADMLS
CITATION
OVT
ID FETCH-LOGICAL-c3738-14f5b2524d9c8e7f3eeb7caea0b2a1aa57e90c3c0f4a79ea657491cc7d24e73d3
ISSN 1225-6463
IngestDate Sun Mar 09 07:52:04 EDT 2025
Thu Apr 24 23:09:21 EDT 2025
Tue Jul 01 02:03:16 EDT 2025
Wed Jan 22 16:53:48 EST 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c3738-14f5b2524d9c8e7f3eeb7caea0b2a1aa57e90c3c0f4a79ea657491cc7d24e73d3
Notes artkdu@etri.re.kr
is with the Communications & Internet Research Laboratory, ETRI, Daejeon, Rep. of Korea.
Jeong‐dong Ryoo (corresponding author
ryoo@etri.re.kr
jyl@cnu.ac.kr
Jong Hyun Lee
is with the Communications & Internet Research Laboratory, ETRI, Daejeon, and with the Department of Engineering, Korea University of Science and Technology, Daejeon, Rep. of Korea.
byckim@cnu.ac.kr
is with the Communications & Internet Research Laboratory, ETRI, and with the Department of Information and Communications Engineering, Chungnam National University, Daejeon, Rep. of Korea.
and Jae Yong Lee
Dae‐Ub Kim
This work was supported by the ICT R&D program of MSIP/IITP (No. B0101‐15‐0024, Terabit optical‐circuit‐packet converged switching system technology development for the next‐generation optical transport network).
jlee@etri.re.kr
Byung Chul Kim
are with the Department of Information and Communications Engineering, Chungnam National University, Daejeon, Rep. of Korea.
http://etrij.etri.re.kr/etrij/journal/article/article.do?volume=38&issue=1&page=18
G704-001110.2016.38.1.001
OpenAccessLink https://onlinelibrary.wiley.com/doi/pdfdirect/10.4218/etrij.16.0115.0024
PageCount 12
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_917226
crossref_citationtrail_10_4218_etrij_16_0115_0024
crossref_primary_10_4218_etrij_16_0115_0024
wiley_primary_10_4218_etrij_16_0115_0024_ETR20018
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate February 2016
2016-02-01
2016-02
PublicationDateYYYYMMDD 2016-02-01
PublicationDate_xml – month: 02
  year: 2016
  text: February 2016
PublicationDecade 2010
PublicationTitle ETRI journal
PublicationYear 2016
Publisher Electronics and Telecommunications Research Institute (ETRI)
한국전자통신연구원
Publisher_xml – name: Electronics and Telecommunications Research Institute (ETRI)
– name: 한국전자통신연구원
References 2009
2010; 32
2010; 54
2008; 46
2014
2008; 30
2009; 31
2014; 52
2012
2011
2012; 34
2010
Key-10.4218/etrij.16.0115.0024-9
Key-10.4218/etrij.16.0115.0024-8
Key-10.4218/etrij.16.0115.0024-7
Key-10.4218/etrij.16.0115.0024-6
Key-10.4218/etrij.16.0115.0024-5
Key-10.4218/etrij.16.0115.0024-4
Key-10.4218/etrij.16.0115.0024-3
Key-10.4218/etrij.16.0115.0024-2
Key-10.4218/etrij.16.0115.0024-1
References_xml – year: 2011
– year: 2009
– volume: 46
  start-page: 136
  issue: 9
  year: 2008
  end-page: 143
  article-title: Ethernet Ring Protection for Carrier Ethernet Networks
  publication-title: IEEE Commun. Mag.
– volume: 30
  start-page: 874
  issue: 6
  year: 2008
  end-page: 876
  article-title: Ethernet Ring Protection Using Filtering Database Flip Scheme for Minimum Capacity Requirement
  publication-title: ETRI J.
– volume: 34
  start-page: 199
  issue: 2
  year: 2012
  end-page: 209
  article-title: Impacts of Hierarchy in Ethernet Ring Networks on Service Resiliency
  publication-title: ETRI J.
– volume: 54
  start-page: 57
  issue: 1
  year: 2010
  end-page: 78
  article-title: Resilience Technologies in Ethernet
  publication-title: Comput. Netw.
– volume: 31
  start-page: 631
  issue: 5
  year: 2009
  end-page: 633
  article-title: An Ethernet Ring Protection Method to Minimize Transient Traffic by Selective FDB Advertisement
  publication-title: ETRI J.
– volume: 32
  start-page: 184
  issue: 2
  year: 2010
  end-page: 194
  article-title: Flush Optimization to Guarantee Less Transient Traffic in Ethernet Ring Protection
  publication-title: ETRI J.
– volume: 46
  start-page: 97
  issue: 3
  year: 2008
  end-page: 103
  article-title: OAM and its Performance Monitoring Mechanisms for Carrier Ethernet Transport Networks
  publication-title: IEEE Commun. Mag.
– start-page: 1
  year: 2010
  end-page: 6
  article-title: Enhanced Protection Schemes to Guarantee Consistent Filtering Database in Ethernet Rings
– year: 2014
– volume: 52
  start-page: 16
  issue: 12
  year: 2014
  end-page: 21
  article-title: MPLS‐TP Linear Protection for ITU‐T and IETF
  publication-title: IEEE Commun. Mag.
– year: 2012
– ident: Key-10.4218/etrij.16.0115.0024-5
  doi: 10.4218/etrij.12.0111.0341
– ident: Key-10.4218/etrij.16.0115.0024-6
  doi: 10.4218/etrij.10.1409.0097
– ident: Key-10.4218/etrij.16.0115.0024-9
  doi: 10.1016/j.comnet.2009.08.012
– ident: Key-10.4218/etrij.16.0115.0024-8
  doi: 10.1109/MCOM.2008.4463778
– ident: Key-10.4218/etrij.16.0115.0024-1
  doi: 10.1109/MCOM.2014.6979981
– ident: Key-10.4218/etrij.16.0115.0024-4
  doi: 10.4218/etrij.09.0209.0244
– ident: Key-10.4218/etrij.16.0115.0024-7
  doi: 10.1109/glocom.2010.5683945
– ident: Key-10.4218/etrij.16.0115.0024-2
  doi: 10.1109/MCOM.2008.4623718
– ident: Key-10.4218/etrij.16.0115.0024-3
  doi: 10.4218/etrij.08.0208.0253
SSID ssj0020458
Score 2.0746784
Snippet In this paper, we discuss the issues of providing protection for point‐to‐multipoint connections in both Ethernet and MPLS‐TP‐based packet transport networks....
In this paper, we discuss the issues of providing protection for point-to-multipoint connections in both Ethernet and MPLS-TP-based packet transport networks....
SourceID nrf
crossref
wiley
SourceType Open Website
Enrichment Source
Index Database
Publisher
StartPage 18
SubjectTerms P2MP
packet transport network
point‐to‐multipoint
Protection switching
전자/정보통신공학
Title Protection Switching Methods for Point‐to‐Multipoint Connections in Packet Transport Networks
URI https://onlinelibrary.wiley.com/doi/abs/10.4218%2Fetrij.16.0115.0024
https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002076496
Volume 38
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX ETRI Journal, 2016, 38(1), , pp.18-29
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NbtQwELa27QUOiF9R_mQkblHKZuPEzrEU0BYJtEK7qOJiOY63XRUl1Tarqj3xCDwjz8ADMGMnTrZFUHrJrpzESTxfxuPJNzOEvBJFMeewDAjZSKchyxQLhYhUGBWGqWyYYwYWZFt8Sscz9uEgORgMfvVYS6s639EXf4wruYlUoQ3kilGy_yFZ3yk0wH-QL2xBwrC9lownLsmCfefPFrWjRX60NaFtmoVgUi3K2vMZ6sr_tXG3J7g3sFQX7SnlEwXvdd0lPceQYCRvna758Kef94P-LSpfl_mtMv4qs9x_zzmv3CcegxTgdn9RNfNmjxGEtY_G56vyUrdvoOkw2DtqeIyNnyLy1ObWeear-rjc01Ms89OPgTn1XMMeTwKsbHyi1ividDSooDBljV40tg2MnDjksQu-bxV7LK4A2GnpRuO7-d51fXkmYWD6IKbq5QJmk3QHLWd0vrFu3my5Av7o5N_HW8MBngiZbGKDbI04R3LB1u6X2deZdxTgx2t0FLQP6oK98CKvr15gzaDaKJfz9WWWtZOmd8mdZoFDdx1a75GBKe-T2720lw-I6nBLPW5pg1sKuKUWtz-__6gr2HRYpT2s0kVJHVapxyptsfqQzN6_m-6Nw6bUR6gxtVYYsXmSwwCyItPC8HlsTM61Mgq0hYqUSrjJhjrWwzlTPDMqTTjLIq15MWKGx0X8iGyWVWkeE5qC0hGjHHYmhuWpyDMzLEQhRMI4MyrZJlE7XlI3efCxHMs3CethHGNpx1hGqcQxljjG2yTw55y4LDB_PfoliEEe64XE5O34e1jJ46WEJeq-BMUISx64Cyuka3QnW7w8ucE5T8mt7mV8Rjbr5co8BzO6zl80qPsNgunEfg
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT9wwEB3BcigcKqAgoAWM1FuVskkc2zkitGj5Wq3a3Qr1YjmOgyJQFu0G9dqfwG_kl3TGCStQJYS4JFISW9EbT_xmMn4G-KryvJAYBgQ8siLgqeGBUqEJwtxxk3YzUmChaouB6I_52VVytQC9p7UwjT7EPOFGnuG_1-TglJAmL-c4LZEV62mJni6-E6uhxAhfhCWiN1EHlo5-jX-P55EX_Q2kyAsHbyC4iJvVM9TP4f-9vJihFqtp8ZK3-onnZBU-toyRHTUmXoMFV63DyjMdwU9gho3aAmLMfv4pa18fyS795tAzhrSUDSdlVT_-fagnePCLbu_oCvN1Lr7hjJUVGxp06prNFc_ZoKkSn23A-KQ3Ou4H7d4JgSWtoiDkRZJFScTz1Coni9i5TFrjDMJvQmMS6dKujW234EamzohE8jS0VuYRdzLO403oVJPKbQETaEUVZXgzcTwTKktdN1e5UgmX3JlkG8InvLRthcVpf4tbjQEGYaw9xjoUmjDWhPE2fJu3uWtkNV59-gDNoG9sqUkNm87XE30z1cj5TzWONOSQ-BbeSG_oTvdGP6iUTO28o80-fOiPLi_0xeng_DMsI39qi7i_QKee3rtd5Ch1tteOwH8q1uJB
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1dT9swFLVKkSZ4QGxjojCYJ_GGsjWJYzuPCFrxsVUV0AnxYjm2g6KitGqDeOUn8Bv5JbvXCRUIaZp4SaQktqJz743Pda6PCdmT1uYC0oCARYYHLNUskDLUQWgd02k3QwUWrLYY8OMRO71Krlrk6HktTK0PsZhww8jw32sM8KnNMcgZjEpoxGpWQKDzH0hqcF6ELZFllMsDb18--DO6Hi0SL_wZiIkX-G7AGY_rxTPYz8-3vbwaoJbKWf6atvpxp79O1hrCSA9qC38kLVd-IqsvZAQ_Ez2sxRYAYnpxX1S-PJL-9ntDzymwUjqcFGX19PBYTeDg19xO8Qr1ZS6-4ZwWJR1qiOmKLgTP6aAuEp9vkFG_d3l4HDRbJwQGpYqCkOVJFiURs6mRTuSxc5kw2mlAX4daJ8KlXRObbs60SJ3miWBpaIywEXMitvEX0i4npdsklIMRZZTBzcSxjMssdV0rrZQJE8zppEPCZ7yUaXTFcXuLWwX5BWKsPMYq5AoxVohxh-wv2kxrVY1_Pv0dzKDGplAoho3nm4kazxRQ_hMFjgYUEt7CG-k_ulO9y3OsJJNb72jzjXwYHvXVr5PB2TZZAfbUlHB_Je1qdud2gKFU2W7jgH8B3Y3hag
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Protection+Switching+Methods+for+Point%E2%80%90to%E2%80%90Multipoint+Connections+in+Packet+Transport+Networks&rft.jtitle=ETRI+journal&rft.au=Kim%2C+Dae%E2%80%90Ub&rft.au=Ryoo%2C+Jeong%E2%80%90dong&rft.au=Lee%2C+Jong+Hyun&rft.au=Kim%2C+Byung+Chul&rft.date=2016-02-01&rft.pub=Electronics+and+Telecommunications+Research+Institute+%28ETRI%29&rft.issn=1225-6463&rft.eissn=2233-7326&rft.volume=38&rft.issue=1&rft.spage=18&rft.epage=29&rft_id=info:doi/10.4218%2Fetrij.16.0115.0024&rft.externalDBID=10.4218%252Fetrij.16.0115.0024&rft.externalDocID=ETR20018
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1225-6463&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1225-6463&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1225-6463&client=summon