Literatura académica sobre el tema "Multiple Spanning Tree Protocol"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Multiple Spanning Tree Protocol".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Multiple Spanning Tree Protocol"
Seo, Seok Weon, Seong Mun Kim y Sung Gi Min. "Extensible Multiple Spanning Tree Protocol for Virtual eXtensible LAN". International Journal of Computer and Communication Engineering 5, n.º 2 (2016): 120–29. http://dx.doi.org/10.17706/ijcce.2016.5.2.120-129.
Texto completoTang, Jun Yong y Hai Yan Hao. "An Optimizing Strategy of Load Balancing Based on MSTP". Advanced Materials Research 490-495 (marzo de 2012): 2221–25. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.2221.
Texto completoFortz, Bernard, Luís Gouveia y Martim Joyce-Moniz. "Optimal design of switched Ethernet networks implementing the Multiple Spanning Tree Protocol". Discrete Applied Mathematics 234 (enero de 2018): 114–30. http://dx.doi.org/10.1016/j.dam.2016.07.015.
Texto completoWang, Jian-Yong, Zhen Tian, Xu Zhu y Naif D. Alotaibi. "Finite-Time Consensus with a Time-Varying Reference State and Switching Topology". Complexity 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/6038584.
Texto completoJin, Rencheng, Xiaolei Fan y Ting Sun. "Centralized Multi-Hop Routing Based on Multi-Start Minimum Spanning Forest Algorithm in the Wireless Sensor Networks". Sensors 21, n.º 5 (4 de marzo de 2021): 1775. http://dx.doi.org/10.3390/s21051775.
Texto completoWang, Ling Xiu y Ye Wen Cao. "Ant Colony-Based Load Balancing Algorithm for Multi-Source Multicast Networks". Advanced Materials Research 204-210 (febrero de 2011): 1399–402. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1399.
Texto completoWei, Xiaoqian y Jianying Yang. "Finite time simultaneous attack for a maneuvering target with unknown acceleration". Transactions of the Institute of Measurement and Control 41, n.º 7 (17 de octubre de 2018): 1849–60. http://dx.doi.org/10.1177/0142331218788119.
Texto completoChelik, Mourad y Rachid Beghdad. "Proposed method: mean delays synchronization protocol (MDSP) for wireless sensor networks". International Journal of Pervasive Computing and Communications 16, n.º 1 (24 de enero de 2020): 74–100. http://dx.doi.org/10.1108/ijpcc-03-2019-0013.
Texto completoHuang, Mingyang, Chenglin Liu y Liang Shan. "Containment Control of First-Order Multi-Agent Systems under PI Coordination Protocol". Algorithms 14, n.º 7 (14 de julio de 2021): 209. http://dx.doi.org/10.3390/a14070209.
Texto completoStachowiak, Krzysztof, Tytus Pawlak y Maciej Piechowiak. "Performance Evaluation of Multicast Overlay Routing Protocols". Image Processing & Communications 17, n.º 1-2 (1 de diciembre de 2012): 19–31. http://dx.doi.org/10.2478/v10248-012-0012-4.
Texto completoTesis sobre el tema "Multiple Spanning Tree Protocol"
Veisllari, Raimena. "Employing Ethernet Multiple Spanning Tree Protocol in an OpMiGua network". Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10913.
Texto completoPoláčeková, Simona. "Modelování a simulace spanning-tree protokolů". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445508.
Texto completoEisazadeh, Ali Akbar y Nora Espahbodi. "Fast Fault Recovery in Switched Networks for Carrying IP Telephony Traffic". Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-3859.
Texto completoOne of the most parts of VOIP management is fault management and, in having a good fault management, finding good mechanisms to detect faults in the network have to be considered.
The main focus of this project is to implement different types of fast fault recovery protocols in networks, especially networks that carry IP telephony. Having a complete understanding of some common link failure detection and fault recovery protocols, such as spanning tree protocol (STP), rapid spanning tree protocol (RSTP) and per-VLAN spanning tree protocol (PVSTP), and also having a complete understanding of three other common techniques for fault detection and fault recovery, such as hot standby routing protocol (HSRP), virtual router redundancy protocol (VRRP) and gateway load balancing protocol (GLBP) will be regarded in the project. We are going to test some fault recovery protocols which can be used in IP telephony networks and choose the best. We intend to focus on this issue in LAN environment in theoretical descriptions and practical implementations.
The final outcome of the thesis is implementation in the Halmstad University’s lab environment to obtain the final result. For doing our thesis, we are going to use some technical tools as hardware tools (Cisco L3 and L2 switches, Routers, IP Phones) and tools which are used for network performance monitoring, like as CommVeiw.
Kahsay-Eriksson, Genet. "IMPLEMENTATION OF SPANNING TREE PROTOCOL IN SKINNSKATTEBERG COUNCIL'S NETWORK". Thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-5804.
Texto completoAbstract
In the substation automation applications the utility of Ethernet local area networks (LANs) that interconnects different network devices together has become so popular and has grown steadily, there is always an anxiety on how to protect against the event of a single link network failure? Though, the easiest way to be on the safest side is by the creation of more than one link between two network devices, having many paths between two network devices in the network establishes a loop (loops). A loop is very dangerous to have in data link layer where the frame doesn’t have TTL (time to live) counting down.[9] This can result in an endless loop in the entire LAN and put the network down [3]. To eliminate loop in Ethernet LAN with redundant link, we can use one of the data link layer protocol which is called STP (Spanning Tree Protocol).
In the past STP was not so popular but today more and more enterprises are beginning to use the STP. But not only companies have found the Spanning Tree Protocol to be very interesting, other establishments like schools, hospitals, businesses etc have also found this a great reliable protocol to have.
This thesis is focused on the study of how to create a redundancy link on the Skinnskatteberg council’s network and protecting loops by implementing the Spanning Tree Protocol on a fast growing council in the central region of Sweden. Actually the study is also useful to utilize in other LAN switched networks.
Lindström, Henrik. "Migration to P4-Programmable Switches and Implementation of the Rapid Spanning Tree Protocol". Thesis, Linköpings universitet, Programvara och system, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167509.
Texto completoLiyanage, M. (Madhusanka). "Enhancing security and scalability of Virtual Private LAN Services". Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526213767.
Texto completoTiivistelmä Ethernet-pohjainen VPLS (Virtual Private LAN Service) on läpinäkyvä, protokollasta riippumaton monipisteverkkomekanismi (Layer 2 Virtual Private Network, L2VPN), jolla yhdistetään asiakkaan etäkohteet IP (Internet Protocol)- tai MPLS (Multiprotocol Label Switching) -yhteyskäytäntöön pohjautuvien palveluntarjoajan verkkojen kautta. VPLS-verkoista on yksinkertaisen protokollasta riippumattoman ja kustannustehokkaan toimintatapansa ansiosta tullut kiinnostavia monien yrityssovellusten kannalta. Tällaisia sovelluksia ovat esimerkiksi DCI (Data Center Interconnect), VoIP (Voice over IP) ja videoneuvottelupalvelut. Uusilta VPLS-sovelluksilta vaaditaan kuitenkin uusia asioita, kuten parempaa tietoturvaa ja skaalautuvuutta, optimaalista verkkoresurssien hyödyntämistä ja käyttökustannusten pienentämistä entisestään. Tämän väitöskirjan tarkoituksena onkin kehittää turvallisia ja skaalautuvia VPLS-arkkitehtuureja tulevaisuuden tietoliikenneverkoille. Ensin väitöskirjassa esitellään skaalautuva ja turvallinen flat-VPLS-arkkitehtuuri, joka perustuu Host Identity Protocol (HIP) -protokollaan. Seuraavaksi käsitellään istuntoavaimiin perustuvaa tietoturvamekanismia ja tehokasta lähetysmekanismia, joka parantaa VPLS-verkkojen edelleenlähetyksen ja tietoturvatason skaalautuvuutta. Tämän jälkeen esitellään turvallinen, hierarkkinen VPLS-arkkitehtuuri, jolla saadaan aikaan ohjaustason skaalautuvuus. Väitöskirjassa kuvataan myös uusi salattu verkkotunnuksiin perustuva tietokehysten edelleenlähetysmekanismi, jolla L2-kehykset siirretään hierarkkisessa VPLS-verkossa. Lisäksi väitöskirjassa ehdotetaan uuden Distributed Spanning Tree Protocol (DSTP) -protokollan käyttämistä vapaan Ethernet-verkkosilmukan ylläpitämiseen VPLS-verkossa. DSTP:n avulla on mahdollista ajaa muokattu STP (Spanning Tree Protocol) -esiintymä jokaisessa VPLS-verkon etäsegmentissä. Väitöskirjassa esitetään myös kaksi Redundancy Identification Mechanism (RIM) -mekanismia, Customer Associated RIM (CARIM) ja Provider Associated RIM (PARIM), joilla pienennetään näkymättömien silmukoiden vaikutusta palveluntarjoajan verkossa. Viimeiseksi ehdotetaan uutta SDN (Software Defined Networking) -pohjaista VPLS-arkkitehtuuria (Soft-VPLS) vanhojen turvallisten VPLS-arkkitehtuurien tunnelinhallintaongelmien poistoon. Näiden lisäksi väitöskirjassa ehdotetaan kolmea uutta mekanismia, joilla voidaan parantaa vanhojen arkkitehtuurien tunnelinhallintatoimintoja: 1) dynaaminen tunnelinluontimekanismi, 2) tunnelin jatkomekanismi ja 3) nopea tiedonsiirtomekanismi. Ehdotetussa arkkitehtuurissa käytetään VPLS-tunnelin luomisen hallintaan keskitettyä ohjainta, joka perustuu reaaliaikaiseen verkon käyttäytymiseen. Tutkimuksen tulokset auttavat suunnittelemaan ja kehittämään turvallisempia, skaalautuvampia ja tehokkaampia VLPS järjestelmiä, sekä auttavat hyödyntämään tehokkaammin verkon resursseja ja madaltamaan verkon operatiivisia kustannuksia
Jieke, Pan. "Cooperative Intrusion Detection For The Next Generation Carrier Ethernet". Master's thesis, Department of Informatics, University of Lisbon, 2008. http://hdl.handle.net/10451/13881.
Texto completoVan, Staden Teaan. "Investigation into the optimization of low speed communication protocols for narrow band networks". Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/71884.
Texto completoENGLISH ABSTRACT: In this thesis, the investigation into the optimization of low speed communication protocols for narrow band networks will be presented. The main focus will be on analysing commonly used low speed communication protocols and investigate an alternative to these protocols to provide an optimized low speed narrow band network that provides better performance at high and low channel utilization. A study of existing low speed communication networks within the field of water supply has been used to identify the most appropriate protocols to be included in the analysis. The analysis of each protocol discussed includes the development of a simulation and theoretical model, with parameters based on those obtained from implemented communication networks focusing on the parameters used within the Namib water supply scheme of NamWater in Namibia. Of the currently implemented contention protocols, the non-persistent Carrier Sense Multiple Access (CSMA) protocol is implemented the most. Current models used for modelling these protocols make use of various assumptions. These models have been expanded to provide a more accurate representation of the non-persistent CSMA model. The Round Robin Polling (RRP) protocol is another well known protocol used within the telemetry industry and has also been modelled as an alternative to the non-persistent CSMA model. The Adaptive Tree Walk (ATW) protocol has been identified as the limited contention protocol to be modelled as a possible alternative to the conventional methods used. A new model has been developed for modelling this protocol by making use of the same strategies and tools used in the modelling of the non-persistent CSMA and RRP protocols. The Simulation modelling has been developed by making use of DESMO-J, an Object Orientated Simulation API based in Java, developed by the Faculty of Informatics at the University of Hamburg. DESMO-J has been chosen as an alternative to the more traditional simulation languages due to its complete documentation, support structures, ease of use and flexibility. All theoretical models have been implemented in Matlab.
AFRIKAANSE OPSOMMING: In hierdie tesis sal die ondersoek na die optimering van laespoed protokolle vir kommunikasie oor nouband netwerke voorgelê word. Die hoof fokus is op die analise van algemene laespoed kommunikasie protokolle en die ondersoek van alternatiewe wat ’n meer optimale laespoed nouband netwerk sal lewer deur beter werkverigting by lae en hoë kanaalverkeer. ’n Studie van praktiese laespoed nouband netwerke in die veld van waterverspreiding word gebruik om die mees algemene protokolle te identifiseer wat in die analise ingesluit moet word. Die analise van die protokolle sluit in teoretiese en simulasie modelle, met parameters soos geidentifiseer uit die studie van ‘n praktiese netwerk, naamlik die Namib waterverspreidingskema van NamWater in Namibië. Die ’Non-persistent Carrier Sense Multiple Access’ en ’Round Robin Polling’ protokolle is geidentifiseer as dié wat meeste geimplementeer word. Die werkverigting van die protokolle is geanaliseer deur gebruik te maak van teoretiese en simulasie modeleringstegnieke. Huidige modelle van die CSMA protokol is gebaseer op sekere aannames. Hierdie aannames word aangepas en verbeter vir implementering van die teoretiese model. Die model word ook verder uitgebrei om beter resultate te lewer oor ’n groter parameterstel. Die ’Adaptive Tree Walk’ protokol is geidentifiseer as ’n moontlike optimale protokol en word gemodeleer en vergelyk teen die CSMA en RRP protokolle se werkverigting. Die simulasiemodelle is ontwikkel deur gebruik te maak van die DESMO-J sagteware, soos ontwikkel as ’n Java program-koppelvlak deur die Universiteit van Hamburg se Fakulteit van Informatika. DESMO-J is gekies as ’n alternatief vir die meer tradisionele simuleringstale omrede goeie dokumentasie, maklike gebruik en buigbaarheid. Alle teoretiese modelering is uitgevoer in Matlab.
Saputro, Nico. "Performance Optimization of Network Protocols for IEEE 802.11s-based Smart Grid Communications". FIU Digital Commons, 2016. http://digitalcommons.fiu.edu/etd/2555.
Texto completoQiao, Wenbao. "GPU component-based neighborhood search for Euclidean graph minimization problems". Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCA020.
Texto completoIn this thesis, we propose parallel solutions based on current graphics processing unit (GPU) system for two Euclidean graph minimization problems, namely the Euclidean minimum spanning forest/tree (EMSF/EMST) and the travelling salesman problem (TSP). The proposed solutions also solve the bichromatic closest pair (BCP) problem, and follow technique of ``decentralized control, data parallelism, GPU shared memories".We propose a Euclidean K-dimensional nearest neighbourhood search (NNS) technique based on classical Elias' NNS approaches that divide the Euclidean space into congruent and non-overlapping cells where size of points in each cell is bounded. We propose a pruning technique to obtain component-based NNS to find a query point set Q's closest outgoing point within sequential linear time complexity when the data is uniformly distributed. These techniques are used together with two proposed GPU tree traversal algorithms, namely the GPU two-direction Breadth-first search and distributed dynamic linked list, to address the BCP. Based on the BCP solution, a divide and conquer parallel algorithm is implemented for building EMSF and EMST totally on GPU side. The TSP is addressed with different parallel 2-opt local search algorithms, in which we propose a ``multiple K-opt evaluation, multiple K-opt moves" methodology in order to simultaneously execute, without interference, massive 2-/3-opt moves that are globally found on the same TSP tour for many edges. This methodology is explained in details to show how we obtain high performance computing both on GPU and CPU side. We test the proposed solutions and report experimental comparison results against the state-of-the-art algorithms
Capítulos de libros sobre el tema "Multiple Spanning Tree Protocol"
Li, Dancheng, Chen Zheng, Chunyan Han y Yixian Liu. "Research and Application of Heterogeneous Network Topology Discovery Algorithm Based on Multiple Spanning Tree Protocol". En Advances in Intelligent and Soft Computing, 437–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27708-5_60.
Texto completoFortz, Bernard, Luís Gouveia y Martim Moniz. "Mathematical Programming Models for Traffic Engineering in Ethernet Networks Implementing the Multiple Spanning Tree Protocol". En Lecture Notes in Computer Science, 242–54. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09174-7_21.
Texto completoFortz, Bernard, Luís Gouveia y Martim Moniz. "Mathematical Programming Models for Traffic Engineering in Ethernet Networks Implementing the Multiple Spanning Tree Protocol". En Lecture Notes in Computer Science, 242–54. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14115-2_21.
Texto completoLopes, João, Susana Sargento y André Zúquete. "A Dependable Alternative to the Spanning Tree Protocol". En Lecture Notes in Computer Science, 148–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38789-0_13.
Texto completoDomagała, Wojciech. "Spanning Tree Protocol in Wireless Industrial Communication System". En Computer Networks, 306–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13861-4_32.
Texto completoRuzika, Stefan y Horst W. Hamacher. "A Survey on Multiple Objective Minimum Spanning Tree Problems". En Algorithmics of Large and Complex Networks, 104–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02094-0_6.
Texto completoLi, Dancheng, Chen Zheng, Chunyan Han y Yixian Liu. "Research and Application of Multiple Spanning Tree Network Topology Discovery Algorithm". En Lecture Notes in Electrical Engineering, 165–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25541-0_22.
Texto completoSantos, Dorabella, Amaro de Sousa y Filipe Alvelos. "Traffic Engineering of Telecommunication Networks Based on Multiple Spanning Tree Routing". En Traffic Management and Traffic Engineering for the Future Internet, 114–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04576-9_8.
Texto completoIrawati, Indrarini Dyah y Mohammad Nuruzzamanirridha. "Spanning Tree Protocol Simulation Based on Software Defined Network Using Mininet Emulator". En Communications in Computer and Information Science, 395–403. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46742-8_36.
Texto completoHorváth, Dániel, Gábor Kapitány, Sándor Plósz, István Moldován y Csaba Lukovszki. "Ring Flushing for Reduced Overload in Spanning Tree Protocol Controlled Ethernet Networks". En The Internet of the Future, 11–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03700-9_2.
Texto completoActas de conferencias sobre el tema "Multiple Spanning Tree Protocol"
Son, Myunghee, Jong-Hyup Lee y Yoo-Kyoung Lee. "Multiple spanning tree protocols in 10-Gb Ethernet edge system". En Asia-Pacific Optical and Wireless Communications 2002, editado por Wanyi Gu, Cedric F. Lam y Yuan-Hao Lin. SPIE, 2002. http://dx.doi.org/10.1117/12.480730.
Texto completoKrishnan, Y. Navaneeth, Chandan N. Bhagwat y Aparajit P. Utpat. "Optimizing spanning tree protocol using port channel". En 2014 International Conference on Electronics and Communication Systems (ICECS). IEEE, 2014. http://dx.doi.org/10.1109/ecs.2014.6892831.
Texto completoLai, Yingxu, Qiuyue Pan, Zenghui Liu, Yinong Chen y Zhizheng Zhou. "Trust-Based Security for the Spanning Tree Protocol". En 2014 IEEE International Parallel & Distributed Processing Symposium Workshops (IPDPSW). IEEE, 2014. http://dx.doi.org/10.1109/ipdpsw.2014.150.
Texto completoHePeng PanHeng, LiXiangdong y ZhengQiusheng. "Physical topology discovery based on spanning tree protocol". En 2010 International Conference on Computer Application and System Modeling (ICCASM 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccasm.2010.5622296.
Texto completoMei-Jie Zhu, Gui-Wu Hu, Qi-Lun Zheng y Hong Peng. "Multiple sequence alignment using minimum spanning tree". En Proceedings of 2005 International Conference on Machine Learning and Cybernetics. IEEE, 2005. http://dx.doi.org/10.1109/icmlc.2005.1527521.
Texto completoMarchese, M., M. Mongelli y G. Portomauro. "Simple Protocol Enhancements of Rapid Spanning Tree Protocol over Ring Topologies". En GLOBECOM 2010 - 2010 IEEE Global Communications Conference. IEEE, 2010. http://dx.doi.org/10.1109/glocom.2010.5683943.
Texto completoAntonova, G. S. "Spanning Tree Protocol Interoperability with Other Loop Prevention Algorithms". En 2007 Canadian Conference on Electrical and Computer Engineering. IEEE, 2007. http://dx.doi.org/10.1109/ccece.2007.280.
Texto completoMirjalily, Ghasem, F. Akhavan Sigari y Reza Saadat. "Best Multiple Spanning Tree in Metro Ethernet Networks". En 2009 Second International Conference on Computer and Electrical Engineering. IEEE, 2009. http://dx.doi.org/10.1109/iccee.2009.200.
Texto completoBuregoni, Ravi Kumar. "Handling Routed Traffic Over Ports Participating in Spanning Tree Protocol". En The 9th International Conference on Advanced Communication Technology. IEEE, 2007. http://dx.doi.org/10.1109/icact.2007.358765.
Texto completoGomes, Tome, Lucas Guardalben, Paulo Salvador y Susana Sargento. "A Spanning Tree Protocol over mobile wireless ad hoc networks". En 2013 ICC - 2013 IEEE International Conference on Communication Workshop (ICC). IEEE, 2013. http://dx.doi.org/10.1109/iccw.2013.6649399.
Texto completoInformes sobre el tema "Multiple Spanning Tree Protocol"
Zhang, M., H. Wen y J. Hu. Spanning Tree Protocol (STP) Application of the Inter-Chassis Communication Protocol (ICCP). RFC Editor, enero de 2016. http://dx.doi.org/10.17487/rfc7727.
Texto completoLevi, D. y D. Harrington. Definitions of Managed Objects for Bridges with Rapid Spanning Tree Protocol. RFC Editor, diciembre de 2005. http://dx.doi.org/10.17487/rfc4318.
Texto completo