Shared Protection of Virtual Private Networks With Traffic Concentration
In the authors' paper, they analyze algorithms that solve the optimal path search problem including the protection as well. They investigated the special case when multiple full mesh demand sets (forming VPNs) have to be built. They addressed the pro-active path based shared protection scheme and investigated heuristic algorithms to calculate the pair of paths. They formulated the problem generally without specialising to any particular network technology, i.e. the proposed methods can be used for various networks (e.g. ATM, MPLS, GMPLS, etc.). The service demands of VPNs are characterised by the bandwidth requirements of node-pairs (pipe-model).