-
1
-
-
85035218074
-
A protocol for distributed computation of a spanning tree in an extended LAN
-
Vancouver
-
R. Perimait, "A Protocol for Distributed Computation of a Spanning Tree in an Extended LAN," Ninth Data Communications Symposium, Vancouver, 1985.
-
(1985)
Ninth Data Communications Symposium
-
-
Perimait, R.1
-
2
-
-
85035242785
-
MAC bridges
-
IEEE 802.1 Document Number IEEE-802.87 1.563, Aug
-
"MAC Bridges," Draft IEEE Standard 802.1: Part D Rev C, IEEE 802.1 Document Number IEEE-802.87 1.563, Aug 1987.
-
(1987)
Draft IEEE Standard 802.1: Part D Rev C
-
-
-
3
-
-
0023827422
-
Transparent bridges for interconnection of IEEE 802 LANS
-
January
-
F. Backes, "Transparent Bridges for Interconnection of IEEE 802 LANS," IEEE Network, Vol 2, no. 1, January 1988.
-
(1988)
IEEE Network
, vol.2
, Issue.1
-
-
Backes, F.1
-
4
-
-
84945724495
-
Source routing for bridged LANs
-
January
-
D.A. Pitt, "Source Routing for Bridged LANs," IEEE Network, Vol 2, no. 1, January 1988.
-
(1988)
IEEE Network
, vol.2
, Issue.1
-
-
Pitt, D.A.1
-
5
-
-
0019007971
-
PUP: An internetwork architecture
-
April
-
D.R. Boggs, J.F. Shoch, E.A. Taft, and R.M. Metcalfe, "PUP: An Internetwork Architecture," IEEE Transactions on Communications, April 1980.
-
(1980)
IEEE Transactions on Communications
-
-
Boggs, D.R.1
Shoch, J.F.2
Taft, E.A.3
Metcalfe, R.M.4
-
6
-
-
0020890869
-
Interconnection of broadband local area networks
-
Massachusetts
-
C. Sunshine, D. Kaufman, G. Ennis, and K. Biba, "Interconnection of Broadband Local Area Networks," Eighth Data Communications Symposium, Massachusetts, 1983.
-
(1983)
Eighth Data Communications Symposium
-
-
Sunshine, C.1
Kaufman, D.2
Ennis, G.3
Biba, K.4
-
7
-
-
0020890176
-
Incorporation of multiaccess links into a routing protocol
-
Massachusetts
-
R. Perlman, "Incorporation of Multiaccess Links Into a Routing Protocol," Eighth Data Communications Symposium, Massachusetts, 1983.
-
(1983)
Eighth Data Communications Symposium
-
-
Perlman, R.1
-
8
-
-
0020811707
-
A local communications network based on interconnected token-access rings: A tutorial
-
No 5, Sept.
-
N. Strole, "A Local Communications Network Based on Interconnected Token-Access Rings: A Tutorial," IBM J. Res. Develop, Vol 27, No 5, Sept., 1983.
-
(1983)
IBM J. Res. Develop
, vol.27
-
-
Strole, N.1
-
9
-
-
0004934998
-
Vulnerabilities of network control protocols: An example
-
July
-
E.C. Rosen, "Vulnerabilities of Network Control Protocols: An Example," Computer Communication Review, July 1981.
-
(1981)
Computer Communication Review
-
-
Rosen, E.C.1
-
10
-
-
18944394151
-
The design and analysis of computer algorithms
-
Reading, MA
-
A. Aho, J. Hopcroft, and J. Ullman, "The Design and Analysis of Computer Algorithms," Addison Wesley, Reading, MA 1974.
-
(1974)
Addison Wesley
-
-
Aho, A.1
Hopcroft, J.2
Ullman, J.3
-
11
-
-
0019021284
-
The new routing algorithm for the arpanet
-
May
-
J.M. McQuillan, I. Richer, E.C. Rosen, "The New Routing Algorithm for the Arpanet," IEEE Transactions on Communications, Vol Com-28, no. 5, May 1980.
-
(1980)
IEEE Transactions on Communications
, vol.COM-28
, Issue.5
-
-
McQuillan, J.M.1
Richer, I.2
Rosen, E.C.3
-
12
-
-
0023862362
-
Comparison of two LAN bridge approaches
-
January
-
M. Soha and R. Perlman, "Comparison of two LAN Bridge Approaches," IEEE Network, Vol 2, no. 1, January 1988.
-
(1988)
IEEE Network
, vol.2
, Issue.1
-
-
Soha, M.1
Perlman, R.2
|