Research Article
Modeling and Algorithm for Multiple Spanning Tree Provisioning in Resilient and Load Balanced Ethernet Networks
Figure 2
Example of the proposed leaf constrained VLAN protection scheme.
| (a) Original input topology |
| (b) Normal state VLAN 1 (working) |
| (c) Backup VLAN 2 for |
| (d) Backup VLAN 3 for |