2016
DOI: 10.12928/telkomnika.v14i4.3880
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Broadcast Storm on Metro Ethernet Network Using PVST+

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…The evaluation of the effectiveness of the proposed method was performed and we saw that the proposed approach could outperform the classical approach of load distribution. As a future work, this proposed method can be used in other types of networks such as wireless access network [10], MPLS networks [11], ethernet networks [12], wireless sensor networks [13], [14], and all platforms used for 5G-based internet of things (IoT). As another next work, the problem can be resolved based on the proposed formulation but by using other optimization techniques.…”
Section: Resultsmentioning
confidence: 99%
“…The evaluation of the effectiveness of the proposed method was performed and we saw that the proposed approach could outperform the classical approach of load distribution. As a future work, this proposed method can be used in other types of networks such as wireless access network [10], MPLS networks [11], ethernet networks [12], wireless sensor networks [13], [14], and all platforms used for 5G-based internet of things (IoT). As another next work, the problem can be resolved based on the proposed formulation but by using other optimization techniques.…”
Section: Resultsmentioning
confidence: 99%
“…In the end, the effectiveness of the service risk model is verified by exploiting the practical network model. Nugraha et al (2016) implemented PVST+ (Per VLAN Spanning Tree Plus) to overcome the problem caused by broadcast storm attack on the Metro Ethernet Network. The PVST+ serves as redundant network management and it prevents looping on the network.…”
Section: Introductionmentioning
confidence: 99%