An improved approximation algorithm for computing disjoint QoS paths

Peng Chao, Shen Hong

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

The survivability of a network has assumed great importance in against of losing huge volumes of data due to a link cut or node failure. Recently some scholars have proposed some path restoration schemes which used two disjoint paths with multiple constraints to satisfy both the survivability and the QoS requirements. In this paper we will study the issue of how to identify two paths that satisfy the multiple QoS constraints imposed by network applications. More specifically, we will focus on finding two link-disjoint paths that satisfy the delay constraints at a reasonable total cost. We present two efficient approximation algorithms with provable performance guarantees for this problem.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06
DOIs
Publication statusPublished - 2006
Externally publishedYes
EventInternational Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06 - Morne, Mauritius
Duration: 23 Apr 200629 Apr 2006

Publication series

NameProceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies,ICN/ICONS/MCL'06
Volume2006

Conference

ConferenceInternational Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06
Country/TerritoryMauritius
CityMorne
Period23/04/0629/04/06

Fingerprint

Dive into the research topics of 'An improved approximation algorithm for computing disjoint QoS paths'. Together they form a unique fingerprint.

Cite this