Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Article

Download BibTeX

Title

Evaluation of Different Path Composition Approaches to Multicast Optimization with Fuzzy Sets

Authors

[ 1 ] Katedra Sieci Telekomunikacyjnych i Komputerowych, Wydział Elektroniki i Telekomunikacji, Politechnika Poznańska | [ P ] employee

Year of publication

2013

Published in

The Mediterranean Journal of Electronics and Communications

Journal year: 2013 | Journal volume: vol. 9 | Journal number: no. 3

Article type

scientific article

Publication language

english

Keywords
EN
  • optimization
  • multicast
  • fuzzy sets
  • routing
Abstract

EN Nowadays, the variety of types of traffic transmitted over a single medium increases rapidly. The problem of finding the shortest path and the minimum cost multicast tree for the Internet topology can no longer be easily defined as there is an increasing number of different traffic characteristics. Therefore, in the mathematical models used to solve modern routing problems multiple criteria must be taken into account. One of the interesting classes of the optimization problem is the problem of finding a solution that is minimized against one of the criteria under certain constraints with regard to the others. Such a variety of parameters complicate the research methodology and, accordingly, it seems necessary to find a fast and reliable methods that evaluate routing algorithms. In this article, different algorithms that are based on different interpretations of the path composition are evaluated and compared. A new technique – the Aggregated MLARAC is proposed and described. Two different ways of the algorithm performance evaluation have been utilized in order to present different aspects of the considered algorithms. The article also presents a proposal of a new methodology that would evaluate multiconstrained multicast routing algorithms in packet-switched networks with an application of fuzzy sets theory.

Pages (from - to)

594 - 600

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.