<--- Back to Details
First PageDocument Content
Network architecture / Computing / Computer architecture / Network protocols / Internet architecture / Computer networking / Internet protocols / Multiprotocol Label Switching / Software-defined networking / MPLS local protection / Automatically switched optical network / OpenFlow
Date: 2018-10-24 08:56:51
Network architecture
Computing
Computer architecture
Network protocols
Internet architecture
Computer networking
Internet protocols
Multiprotocol Label Switching
Software-defined networking
MPLS local protection
Automatically switched optical network
OpenFlow

SDN Use Cases for Service Provider Networks Evolving to an SDN-Enabled ISP Backbone: Key Technologies and Applications Martin Birk, Gagan Choudhury, Bruce Cortez, Alvin Goddard, Narayan Padi, Aswatnarayan Raghuram, Kath

Add to Reading List

Source URL: www.research.att.com

Download Document from Source Website

File Size: 170,55 KB

Share Document on Facebook

Similar Documents

The Second Internet Reinventing Computer Networking with IPv6 Lawrence E. Hughes

The Second Internet Reinventing Computer Networking with IPv6 Lawrence E. Hughes

DocID: 1urf9 - View Document

Int. J. Advanced Networking and Applications Volume: 07 Issue: 01 Pages: ISSN: Security Solutions against Computer Networks

Int. J. Advanced Networking and Applications Volume: 07 Issue: 01 Pages: ISSN: Security Solutions against Computer Networks

DocID: 1ur6d - View Document

Master Degree Program /Laurea Magistrale in Computer Science and Networking September 22, 2014

Master Degree Program /Laurea Magistrale in Computer Science and Networking September 22, 2014

DocID: 1ufEi - View Document

Computer Networking What is a Computer Network? Computer networking is a way for computers to communicate with each other. The computers could be located in the same room or across the other side of the world. They could

Computer Networking What is a Computer Network? Computer networking is a way for computers to communicate with each other. The computers could be located in the same room or across the other side of the world. They could

DocID: 1tRNb - View Document

Program Outline Report: Advanced Cybersecurity Advanced Cybersecurity Certificate of Accomplishment ­ Active Department: Computer Networking & Information Technology

Program Outline Report: Advanced Cybersecurity Advanced Cybersecurity Certificate of Accomplishment ­ Active Department: Computer Networking & Information Technology

DocID: 1tJOJ - View Document