메뉴 건너뛰기




Volumn , Issue , 1988, Pages 43-54

Pitfalls in the design of distributed routing algorithms

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET PROTOCOLS; NETWORK ARCHITECTURE; ROUTING ALGORITHMS; TOPOLOGY;

EID: 85013974135     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/52324.52330     Document Type: Conference Paper
Times cited : (10)

References (12)
  • 1
    • 85035218074 scopus 로고
    • A protocol for distributed computation of a spanning tree in an extended LAN
    • Vancouver
    • R. Perimait, "A Protocol for Distributed Computation of a Spanning Tree in an Extended LAN," Ninth Data Communications Symposium, Vancouver, 1985.
    • (1985) Ninth Data Communications Symposium
    • Perimait, R.1
  • 2
    • 85035242785 scopus 로고
    • MAC bridges
    • IEEE 802.1 Document Number IEEE-802.87 1.563, Aug
    • "MAC Bridges," Draft IEEE Standard 802.1: Part D Rev C, IEEE 802.1 Document Number IEEE-802.87 1.563, Aug 1987.
    • (1987) Draft IEEE Standard 802.1: Part D Rev C
  • 3
    • 0023827422 scopus 로고
    • Transparent bridges for interconnection of IEEE 802 LANS
    • January
    • F. Backes, "Transparent Bridges for Interconnection of IEEE 802 LANS," IEEE Network, Vol 2, no. 1, January 1988.
    • (1988) IEEE Network , vol.2 , Issue.1
    • Backes, F.1
  • 4
    • 84945724495 scopus 로고
    • Source routing for bridged LANs
    • January
    • D.A. Pitt, "Source Routing for Bridged LANs," IEEE Network, Vol 2, no. 1, January 1988.
    • (1988) IEEE Network , vol.2 , Issue.1
    • Pitt, D.A.1
  • 7
    • 0020890176 scopus 로고
    • Incorporation of multiaccess links into a routing protocol
    • Massachusetts
    • R. Perlman, "Incorporation of Multiaccess Links Into a Routing Protocol," Eighth Data Communications Symposium, Massachusetts, 1983.
    • (1983) Eighth Data Communications Symposium
    • Perlman, R.1
  • 8
    • 0020811707 scopus 로고
    • A local communications network based on interconnected token-access rings: A tutorial
    • No 5, Sept.
    • N. Strole, "A Local Communications Network Based on Interconnected Token-Access Rings: A Tutorial," IBM J. Res. Develop, Vol 27, No 5, Sept., 1983.
    • (1983) IBM J. Res. Develop , vol.27
    • Strole, N.1
  • 9
    • 0004934998 scopus 로고
    • Vulnerabilities of network control protocols: An example
    • July
    • E.C. Rosen, "Vulnerabilities of Network Control Protocols: An Example," Computer Communication Review, July 1981.
    • (1981) Computer Communication Review
    • Rosen, E.C.1
  • 10
    • 18944394151 scopus 로고
    • The design and analysis of computer algorithms
    • Reading, MA
    • A. Aho, J. Hopcroft, and J. Ullman, "The Design and Analysis of Computer Algorithms," Addison Wesley, Reading, MA 1974.
    • (1974) Addison Wesley
    • Aho, A.1    Hopcroft, J.2    Ullman, J.3
  • 12
    • 0023862362 scopus 로고
    • Comparison of two LAN bridge approaches
    • January
    • M. Soha and R. Perlman, "Comparison of two LAN Bridge Approaches," IEEE Network, Vol 2, no. 1, January 1988.
    • (1988) IEEE Network , vol.2 , Issue.1
    • Soha, M.1    Perlman, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.