Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Pseudo-Wire"'
Autor:
Grebe, Andy
ITC/USA 2009 Conference Proceedings / The Forty-Fifth Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2009 / Riviera Hotel & Convention Center, Las Vegas, Nevada
With the emergence of higher bandwidth Ether
With the emergence of higher bandwidth Ether
Externí odkaz:
http://hdl.handle.net/10150/606014
http://arizona.openrepository.com/arizona/handle/10150/606014
http://arizona.openrepository.com/arizona/handle/10150/606014
Autor:
Merritt, Joseph
ITC/USA 2007 Conference Proceedings / The Forty-Third Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2007 / Riviera Hotel & Convention Center, Las Vegas, Nevada
The Eastern and Western Ranges along with DI
The Eastern and Western Ranges along with DI
Externí odkaz:
http://hdl.handle.net/10150/604589
http://arizona.openrepository.com/arizona/handle/10150/604589
http://arizona.openrepository.com/arizona/handle/10150/604589
Publikováno v:
Computer Communications
Computer Communications, Elsevier, 2013, ⟨10.1016/j.comcom.2012.11.009⟩
Computer Communications, 2013, ⟨10.1016/j.comcom.2012.11.009⟩
Computer Communications, Elsevier, 2013, ⟨10.1016/j.comcom.2012.11.009⟩
Computer Communications, 2013, ⟨10.1016/j.comcom.2012.11.009⟩
Multi-layer networks are networks in which several protocols may coexist at different layers. The Pseudo-Wire architecture provides encapsulation and de-capsulation functions of protocols over Packet-Switched Networks. In a multi-domain context, comp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::82cdb86f4b6588a53020ff25e55368e4
https://hal.archives-ouvertes.fr/hal-01218632
https://hal.archives-ouvertes.fr/hal-01218632
Publikováno v:
Lecture Notes in Computer Science
11th International Networking Conference (NETWORKING)
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.421-433, ⟨10.1007/978-3-642-30045-5_32⟩
NETWORKING 2012 ISBN: 9783642300448
Networking (1)
11th International Networking Conference (NETWORKING)
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.421-433, ⟨10.1007/978-3-642-30045-5_32⟩
NETWORKING 2012 ISBN: 9783642300448
Networking (1)
Part 8: LISP and Multi-domain Routing; International audience; Carrier-grade networks have often multiple layers of protocols. To tackle this heterogeneity, the Pseudo-Wire architecture provides encapsulation and decapsulation functions of protocols
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d3c2f937d21dde1f67df11b4200af6e6
https://hal.inria.fr/hal-01531112/file/978-3-642-30045-5_32_Chapter.pdf
https://hal.inria.fr/hal-01531112/file/978-3-642-30045-5_32_Chapter.pdf
Autor:
R. Aggarwal
Publikováno v:
IEEE Communications Magazine. 42:124-130
This article describes OAM in MPLS layer 2 transport networks. MPLS networks used to transport layer 2 traffic are referred to as MPLS layer 2 transport networks. They may be used to connect legacy layer 2 networks and/or provide layer 2 service to a
Autor:
N. Squibb
Publikováno v:
IEE Review. 43:17-20
The asynchronous transfer mode (ATM) was developed at the behest of the telecommunications industry, but is being deployed principally within private data networks. In this paper, the author explains this apparent paradox.
Publikováno v:
ASCC
This paper proposes a wide area equipment protection (WAEP) system, based on substation panoramic information, realizes wide area relay protection function. Firstly, the cancel of substation station level and bay level, and deploy of comprehensive in
Publikováno v:
StudentWorkshop@CoNEXT
Carrier-grade networks are complex systems that include several heterogeneous domains and support various types of services under specific Quality of Service (QoS) requirements. To tackle the problem of setting end-to-end connections across heterogen
Autor:
Joseph Merritt
Publikováno v:
MILCOM
The Eastern and Western Ranges along with DISA share a similar vision around Net-Centricity such that “Anyone, anywhere can get to any data source and exploit the information they are authorized to access.”1 Their legacy infrastructure is built a
Autor:
Upkar Varshney
Publikováno v:
Computer. 33:107-109
With the Internet quickly becoming a part of everyone's life and wireless devices being adopted by an increasingly mobile work force, networking has lately experienced an unprecedented number of advances. These advances have resulted in pushing high-