Designing networks with hop bounded protection paths | IEEE Conference Publication | IEEE Xplore