메뉴 건너뛰기




Volumn , Issue , 2007, Pages 369-382

Tesseract: A 4D network control plane

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CONTROL SYSTEMS; SYSTEMS ANALYSIS;

EID: 85094324897     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (58)

References (23)
  • 1
    • 84877667688 scopus 로고    scopus 로고
    • Operations and management of IP networks: What researchers should know
    • August
    • A. Shaikh and A. Greenberg, “Operations and management of IP networks: What researchers should know,” August 2005. ACM SIGCOMM Tutorial.
    • (2005) ACM SIGCOMM Tutorial
    • Shaikh, A.1    Greenberg, A.2
  • 4
    • 20444469606 scopus 로고    scopus 로고
    • A new approach to dynamic all pairs shortest paths
    • C. Demetrescu and G. F. Italiano, “A new approach to dynamic all pairs shortest paths,” J. ACM, vol. 51, no. 6, pp. 968-992, 2004.
    • (2004) J. ACM , vol.51 , Issue.6 , pp. 968-992
    • Demetrescu, C.1    Italiano, G. F.2
  • 5
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 1, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.1 , pp. 612-613
    • Shamir, A.1
  • 6
    • 0003418425 scopus 로고    scopus 로고
    • Internet Security Association and Key Management Protocol (ISAKMP), November
    • D. Maughan, M. Schertler, M. Schneider, and J. Turner, “Internet Security Association and Key Management Protocol (ISAKMP).” RFC 2048, November 1998.
    • (1998) RFC 2048
    • Maughan, D.1    Schertler, M.2    Schneider, M.3    Turner, J.4
  • 12
    • 33645789305 scopus 로고    scopus 로고
    • Configuration management delivers business resiliency
    • Nov
    • Z. Kerravala, “Configuration management delivers business resiliency.” The Yankee Group, Nov 2002.
    • (2002) The Yankee Group
    • Kerravala, Z.1
  • 14
    • 33749467476 scopus 로고    scopus 로고
    • Rethinking the service model: Scaling Ethernet to a million nodes
    • November
    • A. Myers, T. S. E. Ng, and H. Zhang, “Rethinking the service model: Scaling Ethernet to a million nodes,” in Proc. HotNets, November 2004.
    • (2004) Proc. HotNets
    • Myers, A.1    Ng, T. S. E.2    Zhang, H.3
  • 15
    • 8344256495 scopus 로고    scopus 로고
    • Rbridges: Transparent routing
    • March
    • R. Perlman, “Rbridges: Transparent routing,” in Proc. IEEE INFOCOM, March 2004.
    • (2004) Proc. IEEE INFOCOM
    • Perlman, R.1
  • 16
    • 38149109851 scopus 로고    scopus 로고
    • On count-to-infinity induced forwarding loops in ethernet networks
    • K. Elmeleegy, A. L. Cox, and T. S. E. Ng, “On count-to-infinity induced forwarding loops in ethernet networks,” in Proc. IEEE INFOCOM, 2006.
    • (2006) Proc. IEEE INFOCOM
    • Elmeleegy, K.1    Cox, A. L.2    Ng, T. S. E.3
  • 18
    • 85094324512 scopus 로고    scopus 로고
    • Gigabit campus network design - principles and architecture
    • “Gigabit campus network design - principles and architecture.” Cisco White Paper.
    • Cisco White Paper
  • 22
    • 0032184579 scopus 로고    scopus 로고
    • The Tempest: a framework for safe, resource assured, programmable networks
    • Oct
    • S. Rooney, J. van der Merwe, S. Crosby, and I. Leslie, “The Tempest: a framework for safe, resource assured, programmable networks,” IEEE Communications Magazine, vol. 36, pp. 42-53, Oct 1998.
    • (1998) IEEE Communications Magazine , vol.36 , pp. 42-53
    • Rooney, S.1    van der Merwe, J.2    Crosby, S.3    Leslie, I.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.