{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T13:54:31Z","timestamp":1774274071090,"version":"3.50.1"},"reference-count":288,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"COST Action CA15127"},{"name":"COST (European Cooperation in Science and Technology); http:\/\/www.cost.eu"},{"DOI":"10.13039\/501100001821","name":"Vienna Science and Technology Fund (WWTF) Project, Fast and Quantitative What-If Analysis for Dependable Communication Networks","doi-asserted-by":"publisher","award":["ICT19-045"],"award-info":[{"award-number":["ICT19-045"]}],"id":[{"id":"10.13039\/501100001821","id-type":"DOI","asserted-by":"publisher"}]},{"name":"KTH Digital Futures Center"},{"name":"Ericsson Research, Hungary"},{"name":"Austrian\u2013Hungarian Joint Research Project","award":["FWF-30668\/OTKA-135606"],"award-info":[{"award-number":["FWF-30668\/OTKA-135606"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/comst.2021.3063980","type":"journal-article","created":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T21:02:06Z","timestamp":1615496526000},"page":"1253-1301","source":"Crossref","is-referenced-by-count":86,"title":["A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9675-9729","authenticated-orcid":false,"given":"Marco","family":"Chiesa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1461-4735","authenticated-orcid":false,"given":"Andrzej","family":"Kamisinski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7276-6097","authenticated-orcid":false,"given":"Jacek","family":"Rak","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5958-7817","authenticated-orcid":false,"given":"Gabor","family":"Retvari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7798-1711","authenticated-orcid":false,"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref275","author":"chiesa","year":"2014","journal-title":"Exploring the limits of static failover routing (v4)"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03850-6_6"},{"key":"ref277","article-title":"Operator experience from ISIS convergence tuning","author":"villf\u00f6r","year":"0"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737438"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2871089"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.43"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS47363.2019.00028"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1607880"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00039"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354653"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2255891"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2005.70"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44884-5_16"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1145\/1321753.1321764"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.227"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7490"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566882"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/1095921.1095962"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5715"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2722380"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DEPCOS-RELCOMEX.2006.52"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848157"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5286"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2020981"},{"key":"ref30","first-page":"1","article-title":"Auto-discovery of shared risk link groups","volume":"3","author":"sebos","year":"2001","journal-title":"Optical Fiber Communication Conf Exhibit (OFC)"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1094876"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.09.010"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365410"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DT.2015.7222986"},{"key":"ref269","first-page":"399","article-title":"F10: A fault-tolerant engineered network","author":"liu","year":"2013","journal-title":"Proc 10th USENIX Conf Netw Syst Design Implement (NSDI)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2007.382443"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20186"},{"key":"ref288","article-title":"Bit index explicit replication (BIER) forwarding for network device components","author":"zhang","year":"2017"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1109\/SDS49854.2020.9143935"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987284"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070570"},{"key":"ref284","year":"2020","journal-title":"Cisco ASR 901S Series Aggregation Services Router Software Configuration Guide"},{"key":"ref181","year":"2012","journal-title":"Cisco IOS XR Routing Configuration Guide for the Cisco CRS Router Release 4 2"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.1003042"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6571"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218413"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2015.47"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2876749"},{"key":"ref185","first-page":"78","article-title":"Effectiveness of link cost optimization for IP rerouting and IP fast reroute","author":"hock","year":"2010","journal-title":"Measurement Modelling and Evaluation of Computing Systems and Dependability and Fault Tolerance"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935135"},{"key":"ref183","year":"2012","journal-title":"JUNOS 12 3 Routing Protocols Configuration Guide"},{"key":"ref182","year":"2008","journal-title":"HP 6600 Router Series QuickSpecs"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.11.009"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-013-9822-y"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.09.004"},{"key":"ref186","first-page":"2","article-title":"Network optimization techniques for improving fast IP-level resilience with loop-free alternates","volume":"3","author":"csikor","year":"2011","journal-title":"Infocommun J"},{"key":"ref28","year":"2017","journal-title":"Configuring BGP PIC Edge and Core for IP and MPLS"},{"key":"ref27","year":"2013","journal-title":"Openflow"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2906742"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2004.1301021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2332432.2332478"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674985"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/49.887914"},{"key":"ref24","first-page":"881","article-title":"Fast reroute paths algorithms","volume":"52","author":"jarry","year":"2013","journal-title":"Telecommun Syst"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICETA.2018.8572205"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.19"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4090"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6976"},{"key":"ref25","first-page":"1","article-title":"Evolution of IP fast-reroute strategies","author":"kamisi?ski","year":"2018","journal-title":"Proc 10th Int Workshop Resilient Netw Design Model (RNDM)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/0470845910"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1186560"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7811"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2123916"},{"key":"ref156","first-page":"152","article-title":"Redundant trees for fast IP recovery","author":"?i?ic","year":"2007","journal-title":"Proc BROADNETS"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7812"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5714"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461923"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1347"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2002.1188469"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24693-0_44"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2007.4762257"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.76"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/RNDM.2016.7608262"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22333-9"},{"key":"ref57","first-page":"705","article-title":"Evaluation of network resilience, survivability, and disruption tolerance: Analysis, topology generation, simulation, and experimentation","volume":"52","author":"sterbenz","year":"2013","journal-title":"Telecommun Syst"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.005"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2055887"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/NGI.2006.1678216"},{"key":"ref53","year":"2011","journal-title":"Network Performance Objectives for IP-Based Services"},{"key":"ref52","year":"2019","journal-title":"Internet Protocol Data Communication Service&#x2014;IP Packet Transfer and Availability Performance Parameters"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.09.012"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-015-0006-9"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT.2012.6459750"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524552"},{"key":"ref164","first-page":"134","article-title":"On the resiliency of randomized routing against multiple edge failures","volume":"55","author":"chiesa","year":"2016","journal-title":"Proc 43rd Int Colloquium Automata Lang Program (ICALP)"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2619398"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848098"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282408"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2003.1226686"},{"key":"ref4","author":"gibbs","year":"2017","journal-title":"ATT&#x2019;s 911 Outage Result of Mistakes Made by ATT FCC&#x2019;s Pai Says"},{"key":"ref3","author":"corfield","year":"2018","journal-title":"British Airways&#x2019; Latest Total Inability to Support Upwardness of Planes Caused by Amadeus System Outage"},{"key":"ref6","author":"saldan","year":"2016","journal-title":"Delay limits for real-time services"},{"key":"ref5","author":"young","year":"2017","journal-title":"Web Performance Analytics Show Even 100-Millisecond Delays Can Impact Customer Engagement and Online Revenue"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/90.731185"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ICETA.2014.7107614"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018477"},{"key":"ref49","year":"2012","journal-title":"Quality of service mapping and interconnection between Ethernet Internet protocol and multiprotocol label switching networks"},{"key":"ref157","author":"alaettinoglu","year":"2000","journal-title":"Towards milli-second IGP convergence"},{"key":"ref9","first-page":"406","article-title":"An approach to alleviate link overload as observed on an IP backbone","volume":"1","author":"iyer","year":"2003","journal-title":"Proc IEEE InfoCom"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637236"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4271"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44685-7"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5741159"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1522138"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2009.2031821"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.01.004"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2016.7550596"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1023\/A:1023088418684"},{"key":"ref73","author":"vasseur","year":"2004","journal-title":"Network Recovery Protection and Restoration of Optical SONET-SDH IP and MPLS"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.osn.2014.05.002"},{"key":"ref71","first-page":"333","article-title":"Recovery time analysis of differentiated resilience in MPLS","author":"autenrieth","year":"2003","journal-title":"Proc Int Workshop Design Reliable Commun Netw (DRCN)"},{"key":"ref70","author":"hellstrand","year":"2003","journal-title":"Framework for multi-protocol label switching (MPLS)-based recovery"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/49.887911"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498487"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2570599"},{"key":"ref75","year":"2000","journal-title":"Forward Error Correction for Submarine Systems"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5880"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/AICT.2010.65"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2894512"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3050923"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/RNDM.2016.7608263"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041911.00093"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-8157-6_13"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804331"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/35.978049"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4444749"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/35.989779"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8402"},{"key":"ref198","author":"bryant","year":"2007","journal-title":"IP fast reroute using tunnels"},{"key":"ref199","author":"litkowski","year":"2020","journal-title":"Topology Independent Fast Reroute using Segment Routing"},{"key":"ref193","author":"atlas","year":"2006","journal-title":"U-turn alternates for IP\/LDP fast-reroute"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3704"},{"key":"ref195","first-page":"1","article-title":"RPFP: IP fast ReRoute with providing complete protection and without using tunnels","author":"zhang","year":"2013","journal-title":"Proc IEEE\/ACM 21st Int Symp Qual Service (IWQoS)"},{"key":"ref196","article-title":"Improving the convergence of IP routing protocols","author":"francois","year":"2018"},{"key":"ref95","first-page":"1","article-title":"Single link switching mechanism for fast recovery in tree-based recovery schemes","author":"jin","year":"2008","journal-title":"Proc Int Conf Telecommun"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESSNETS.2007.4447112"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8333"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354651"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73530-4_14"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749264"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-016-9369-9"},{"key":"ref91","year":"0"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.1998.95619"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199031"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199398"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2009.0395"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2079945"},{"key":"ref82","first-page":"1","article-title":"Local restoration with multiple spanning trees in metro Ethernet","author":"qiu","year":"2008","journal-title":"Proc Int Conf Opt Netw Design Model"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2004.94569"},{"key":"ref84","first-page":"314","article-title":"Ethernet ultra fast switching: A tree-based local recovery scheme","author":"su","year":"2008","journal-title":"Proc 11th IEEE Singapore Int Conf Commun Syst"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.229"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2031064"},{"key":"ref89","year":"0"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2001.93287"},{"key":"ref86","year":"0"},{"key":"ref87","first-page":"1","article-title":"Fast recovery from link failures in Ethernet networks","author":"gopalan","year":"2013","journal-title":"Proc 9th Int Conf Design Rel Commun Netw (DRCN)"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2315957"},{"key":"ref200","first-page":"157","article-title":"IP fast ReRoute: Lightweight not-via","author":"enyedi","year":"2009","journal-title":"Networking"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425776"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425321"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892851"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.020"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/DT.2014.6868726"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062229"},{"key":"ref202","article-title":"Novel algorithms for IP fast reroute","author":"enyedi","year":"2011"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/90.803380"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.358"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.06.010"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364688"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2012.6260822"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/NGI.2008.12"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211858"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498576"},{"key":"ref214","first-page":"142","article-title":"IP fast rerouting for single-link\/node failure recovery","author":"xi","year":"2007","journal-title":"Proc 3rd Int Conf Broadband Commun Netw Syst (BROADNETS)"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.926507"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24596-4_13"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2013.6765984"},{"key":"ref218","author":"kumar","year":"2012","journal-title":"Enhanced Multiple Routing Configurations for Fast IP Network Recovery From Multiple Failures"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2009.090301"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2161329"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2005.1563878"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2829399"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1016\/S0012-365X(00)00066-2"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2516442"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2440179"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2011.6163659"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8320"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4915"},{"key":"ref223","first-page":"457","article-title":"Relaxed multiple routing configurations for IP fast reroute","author":"?i?ic","year":"2008","journal-title":"Proc IEEE Netw Oper Manag Symp (NOMS)"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6372"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/HONET.2010.5715783"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851218"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.900411"},{"key":"ref129","author":"koushik","year":"2011","journal-title":"Multiprotocol Label Switching (MPLS) Traffic Engineering Management Information Base for Fast Reroute"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS.2011.5931348"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6981"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8271"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/UKRCON.2017.8100353"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON.2013.6603065"},{"key":"ref132","first-page":"202","article-title":"Design schemes for MPLS fast reroute","author":"lemeshko","year":"2013","journal-title":"Proc 12th Int Conf Exp Design Appl CAD Syst Microelectron (CADSM)"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8754"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347428"},{"key":"ref230","first-page":"218","article-title":"Performance comparison of not-via addresses and maximally redundant trees (MRTs)","author":"menth","year":"2013","journal-title":"Proc IFIP\/IEEE Int Symp Integr Netw Manage"},{"key":"ref231","year":"2012","journal-title":"IP Routing OSPF Configuration Guide Cisco IOS Release 15 2s&#x2014;OSPF IPv4 Remote Loop-Free Alternate IP Fast Reroute"},{"key":"ref239","first-page":"161","article-title":"BLINK: Fast connectivity recovery entirely in the data plane","author":"holterbach","year":"2019","journal-title":"Proc 16th USENIX Conf Netw Syst Design Implement (NSDI)"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098856"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498520"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015491"},{"key":"ref237","first-page":"413","article-title":"LOUP: The principles and practice of intra-domain route dissemination","author":"gvozdiev","year":"2013","journal-title":"Proc 10th USENIX Conf Netw Syst Design Implement (NSDI)"},{"key":"ref236","first-page":"25","article-title":"R-BGP: Staying connected in a connected world","author":"kushman","year":"2007","journal-title":"Proc 4th USENIX Conf Netw Syst Design Implement (NSDI)"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281432"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486261"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8679"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TCSET.2018.8336365"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.902727"},{"key":"ref140","author":"arora","year":"2017","journal-title":"Introduction to Optimum Design"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863991"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159926"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431308"},{"key":"ref2","author":"tweney","year":"2013","journal-title":"5-minute outage costs Google $545 000 in revenue"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535862"},{"key":"ref1","author":"chirgwin","year":"2017","journal-title":"Google Routing Blunder Sent Japan&#x2019;s Internet Dark on Friday"},{"key":"ref145","first-page":"113","article-title":"Header space analysis: Static checking for networks","author":"kazemian","year":"0"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992760"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948207"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633028"},{"key":"ref244","article-title":"Towards localizing root causes of BGP dynamics","author":"caesar","year":"2003"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1145\/885651.781043"},{"key":"ref248","author":"kopka","year":"2013","journal-title":"IP Routing Fast Convergence"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.906045"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098854"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486036"},{"key":"ref249","author":"filsfils","year":"2007","journal-title":"BGP Convergence in Much Less Than a Second"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2012.6606799"},{"key":"ref108","year":"0"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934877"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500475"},{"key":"ref105","year":"0"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834097"},{"key":"ref103","first-page":"1","article-title":"Partial spatial protection for differentiated reliability in FSTR-based metro Ethernet networks","author":"shan","year":"2011","journal-title":"Proc IEEE Global Telecommun Conf (GLOBECOM)"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2011.6009146"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2018.8403927"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1998.682929"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2014.6991462"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1145\/2838344.2856460"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.09.011"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364688"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2013.6761297"},{"key":"ref252","year":"2011"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.5.001066"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535774"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2014.13"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2328"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620746"},{"key":"ref11","year":"2002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851192"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377709"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342390"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1070873.1070877"},{"key":"ref16","first-page":"113","article-title":"Ensuring connectivity via data plane mechanisms","author":"liu","year":"0"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916720"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096541"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3209"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref19","first-page":"27","article-title":"Tesseract: A 4D network control plane","volume":"7","author":"yan","year":"2007","journal-title":"Proc NSDI"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2001.956316"},{"key":"ref114","author":"mcmanus","year":"1999","journal-title":"Requirements for traffic engineering over mpls"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMMST.2014.6992292"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3031"},{"key":"ref115","author":"haskin","year":"2000","journal-title":"A Method for Setting An Alternative Label Switched Paths to Handle Fast Reroute"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4427"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4428"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5036"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5151"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502425"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890957"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8459923"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1145\/3229574.3229580"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600177"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491187"},{"key":"ref266","year":"2020","journal-title":"Tofino World's fastest p4-programmable ethernet switch asics"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/9438976\/09375492.pdf?arnumber=9375492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:58:03Z","timestamp":1639771083000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9375492\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":288,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/comst.2021.3063980","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}