메뉴 건너뛰기




Volumn 10, Issue 5, 2002, Pages 679-692

Resource management with hoses: Point-to-cloud services for virtual private networks

Author keywords

Point to cloud; Point to multipoint; Quality of service; Service level agreements

Indexed keywords

POINT-TO-CLOUD; POINT-TO-MULTIPOINT; SERVICE LEVEL AGREEMENT;

EID: 0036805721     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2002.803918     Document Type: Article
Times cited : (127)

References (18)
  • 2
    • 0032184579 scopus 로고    scopus 로고
    • The tempest, a framework for safe, resource assured, programmable networks
    • Oct.
    • S. Rooney, J. E. van der Merwe, S. Crosby, and I. Leslie, "The Tempest, a framework for safe, resource assured, programmable networks," IEEE Commun. Mag., vol. 36, pp. 42-53, Oct. 1998.
    • (1998) IEEE Commun. Mag. , vol.36 , pp. 42-53
    • Rooney, S.1    Van Der Merwe, J.E.2    Crosby, S.3    Leslie, I.4
  • 3
    • 84866578681 scopus 로고    scopus 로고
    • (Mar.) Bgp/mpls vpns.; [Online]
    • E. Rosen and Y. Rekhter. (1999, Mar.) Bgp/mpls vpns. RFC 2547. IETF. [Online]. Available: http://www.ietf.org/rfc/rfc2547.txt
    • (1999) RFC 2547. IETF
    • Rosen, E.1    Rekhter, Y.2
  • 4
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the Internet protocol
    • Nov.
    • S. Kent and R. Atkinson, "Security architecture for the Internet protocol," IETF, RFC 2401, Nov. 1998.
    • (1998) IETF, RFC 2401
    • Kent, S.1    Atkinson, R.2
  • 8
    • 0036352015 scopus 로고    scopus 로고
    • Restoration algorithms for virtual private networks in the hose model
    • G. Italiano, R. Rastogi, and B. Yener, "Restoration algorithms for virtual private networks in the hose model," in Proc. IEEE INFOCOM, 2002, pp. 131-139.
    • Proc. IEEE INFOCOM, 2002 , pp. 131-139
    • Italiano, G.1    Rastogi, R.2    Yener, B.3
  • 9
    • 21344482808 scopus 로고
    • A storage model with self-similar input
    • I. Norros, "A storage model with self-similar input," Queueing Syst., vol. 16, pp. 387-396, 1994.
    • (1994) Queueing Syst. , vol.16 , pp. 387-396
    • Norros, I.1
  • 14
  • 15
    • 0029323403 scopus 로고
    • Wide-area traffic: The failure of Poisson modeling
    • Feb.
    • V. Paxson and S. Floyd, "Wide-area traffic: The failure of Poisson modeling," IEEE/ACM Trans. Networking, vol. 3, pp. 226-244, Feb. 1995.
    • (1995) IEEE/ACM Trans. Networking , vol.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 16
    • 84866579957 scopus 로고    scopus 로고
    • Cisco NetFlow [Online]
    • Cisco NetFlow [Online]. Available: http://www.cisco/com/warp/public/732/netflow/
  • 18
    • 0032667028 scopus 로고    scopus 로고
    • Admission control for statistical QoS: Theory and practice
    • E. Knightly and N. Shroff, "Admission control for statistical QoS: Theory and practice," IEEE Network, vol. 13, pp. 20-29, 1999.
    • (1999) IEEE Network , vol.13 , pp. 20-29
    • Knightly, E.1    Shroff, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.