• No results found

label switched path failure

A SURVEYON MPLS BASED TRAFFIC ENGINEERING MECHANISM

A SURVEYON MPLS BASED TRAFFIC ENGINEERING MECHANISM

... the label switched paths (LSPs) recognized between label edge router (LER) ...the label from the packet. This router is called Label Edge Router (LER) or egress ...such failure ...

12

Performance Analysis of MPLS VPN and Traditional IP Network

Performance Analysis of MPLS VPN and Traditional IP Network

... circuit switched, where continuous bit streams carried over the physical ...packet switched networks are used in which data is divided into small chunks called as a packet and these packets are routed over ...

6

ENERGY EFFICIENT DISTRIBUTED IMAGE COMPRESSION USING JPEG2000 IN WIRELESS SENSOR 
NETWORKS (WSNS)

ENERGY EFFICIENT DISTRIBUTED IMAGE COMPRESSION USING JPEG2000 IN WIRELESS SENSOR NETWORKS (WSNS)

... (RSVP), Label Distribution Protocol (LDP),Virtual Private Network (VPN), Loop Free Alternate (LFA), Next Hop Label Forwarding Entry (NHLFE), Intermediate System to Intermediate System ( IS-IS), Label ...

9

Network Resilience in Multiprotocol Label Switching

Network Resilience in Multiprotocol Label Switching

... recovery path between the Path Switch LSR (PSL) and egress ...recovery path is totally link and node disjoint with the working ...a failure is detected on the working path, a fault ...

8

A Trust Based Routing Protocol with Key Management

A Trust Based Routing Protocol with Key Management

... In MANET, the nodes are constantly moving and have no fixed topology. The proposed trust management method improves the MANET security. Malicious nodes in the network are detected by calculating trust value of each node. ...

7

Cost Aware Secure Routing based on Multi – Hop and Network Coding in Wireless Sensor Networks

Cost Aware Secure Routing based on Multi – Hop and Network Coding in Wireless Sensor Networks

... Cost - Aware Secure Routing protocol for WSNs to balance the energy consumption and increase network lifetime. CASER has the flexibility to support multiple routing strategies in message forwarding to extend the ...

6

Efficient regular path query evaluation using path indexes

Efficient regular path query evaluation using path indexes

... regular path queries (RPQs) ...every path in the graph such that the sequence of edge labels along the path forms a word in the language recognized by the regular ex- ...

5

A  new approach for finding minimum path in a network using triangular intuitionistic fuzzy number

A new approach for finding minimum path in a network using triangular intuitionistic fuzzy number

... Shortest Path Problem (SPP) since it is central to lots of ...shortest path between two vertices is one of the most fundamental problems in graph ...A path between two vertices is an ternating ...

7

Enterprise network convergence: path to cost optimization

Enterprise network convergence: path to cost optimization

... a failure message back to the requesting ...the path to destination have granted the resource reservation request, the application can be guaranteed that the resources it asked for are set aside for its ...

116

NetML: networking networks

NetML: networking networks

... 2) Routing and Loss: The core of this tool is Floyd’s algorithm, which calculates all the shortest paths through a network. In the case of layered networks this tool will carry out the shortest path analysis of ...

7

A Mazer with Genetic Algorithm

A Mazer with Genetic Algorithm

... For many real-world problems, the solution process consists of working your way through a sequence of decision points in which each choice leads you further along some path. Maze structures are also one of such ...

7

A Novel Method VESTAL to Label Lumber Vertebrae and Intervertebral Discs

A Novel Method VESTAL to Label Lumber Vertebrae and Intervertebral Discs

... to label lumber vertebrae and intervertebral discs ...To label vertebrae and IVDs, a new equation to model the path of spinal cord is derived using statistical properties of the spinal ...

7

A Retrieval Matching Method Based Case Learning for 3D Model

A Retrieval Matching Method Based Case Learning for 3D Model

... In the webpage search method, a kind of correlation matching method is often used. The retrieved webpage depends on correlation between the keywords in the webpage and the given keywords. When a webpage has a strong ...

5

BSCS_DCCN_W19_Week 6_SecE

BSCS_DCCN_W19_Week 6_SecE

... Communication Network Switched CN Broadcast CN Circuit-Switched CN Packet-Switched CN Datagram Network Virtual Circuit Network... Broadcast Vs Switched Network.[r] ...

52

Link/Node Failure Recovery through Backup Path Lengths

Link/Node Failure Recovery through Backup Path Lengths

... While single-link failures are the most common failure type, it is also interesting to explore methods that protect against two simultaneous link failures. Measurement studies indicate that about 30% of unplanned ...

7

Sensor node failure detection using round trip path and delay

Sensor node failure detection using round trip path and delay

... a path and back again rtridge, 1987; Sessini, Phillipa, and RTD time may be vary based upon number of nodes in the ...trip path is measured and it will be compared with a threshold value and faulty nodes ...

5

Indexing discrete sets in a label setting algorithm for solving the elementary shortest path problem with resource constraints

Indexing discrete sets in a label setting algorithm for solving the elementary shortest path problem with resource constraints

... a label setting algorithm, which we will present later in this paper, indicates that between 47% and 72% CPU cycles spent on computation are executing code responsible for pruning dominated labels when a trie is ...

8

Q-switched laser as a source for Thomson scattering from a hollow cathode arc.

Q-switched laser as a source for Thomson scattering from a hollow cathode arc.

... For the phthalocyanine solution in the 25“ mm cell, pulse widths remained essentially constant for reflectivities between 95% and 55% but approximately doubled for reflectivi­ ties less than 55%• Cryptocyanine in a 1 mm ...

44

A SURVEY: PERFORMANCE FAILURE DETECTION AND PATH COMPUTATION IN IP NETWORK

A SURVEY: PERFORMANCE FAILURE DETECTION AND PATH COMPUTATION IN IP NETWORK

... the path that satisfy all ...feasible path is obtained or no feasible path ...the path between source and destination that satisfies all constraints and the quality of returned ...

7

AN ENHANCED RULE APPROACH FOR NETWORK INTRUSION DETECTION USING EFFICIENT DATA 
ADAPTED DECISION TREE ALGORITHM

AN ENHANCED RULE APPROACH FOR NETWORK INTRUSION DETECTION USING EFFICIENT DATA ADAPTED DECISION TREE ALGORITHM

... the path discovery process. According to DOMR, the shortest path discovery procedure is invoked independently for each individual communication request to provide estimation of the ...

9

Show all 10000 documents...

Related subjects