Figure 6From: Applying p-cycle protection for a reliable IPTV service in IP-over-DWDM networks Protecting a node using the ESHN algorithm. Back to article page