2006 IEEE International Conference on Communications 2006
DOI: 10.1109/icc.2006.254812
|View full text |Cite
|
Sign up to set email alerts
|

Fast Failure Handling in Ethernet Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…Various physical network scenarios with mesh topologies have been setup and tested, such as the topologies presented in Figure 2 and in [19]. The collected results prove that the proposed topology discovery mechanism is capable of accurately determining the entire physical topology of the network including both the active topology and physical links inactivated by RSTP, as opposite to the algorithms proposed in [8][9][10][11][12][13][14][15], which methods fail to detect the inactive links in Figure 2, represented by the dashed lines, thus result in the topology depicted in Figure 6.…”
Section: Implementation and Performance Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Various physical network scenarios with mesh topologies have been setup and tested, such as the topologies presented in Figure 2 and in [19]. The collected results prove that the proposed topology discovery mechanism is capable of accurately determining the entire physical topology of the network including both the active topology and physical links inactivated by RSTP, as opposite to the algorithms proposed in [8][9][10][11][12][13][14][15], which methods fail to detect the inactive links in Figure 2, represented by the dashed lines, thus result in the topology depicted in Figure 6.…”
Section: Implementation and Performance Resultsmentioning
confidence: 99%
“…For example, in MANs RSTP may not be suitable, especially when protective switching is applied [19] and static VLAN topologies are calculated by a traffic engineering algorithm based on the recently discovered physical topology. On the other hand, in an enterprise LAN, the network operator will most likely decide to keep RSTP running.…”
Section: Discovery Of Inactive Linksmentioning
confidence: 99%
“…Several mechanisms have been proposed to exploit MSTP to perform a global recovery scheme [8,[31][32][33][34][35], i.e., to take advantage of the use of two disjoint spanning tree paths (primary and backup) between each pair of border bridges. Such paths are usually pre-computed offline.…”
Section: Mstp-based Recovery Schemesmentioning
confidence: 99%
“…A VLAN that binds to a spanning tree instance can only use the links belonging to the tree to deliver frames. Multi-VLAN based network protection approaches have been proposed in [5,[10][11][12][13]. Backup VLANs are provisioned in advance to protect working VLANs.…”
Section: Introductionmentioning
confidence: 99%