1 |
L. Martini, E. Rosen, N. El-Aawar, and G. Heron, 'Encapsulation methods for transport of ethernet frames over IP and MPLS networks,' RFC 4448, IETF, Apr. 2002
|
2 |
L. Andersson, and E. Rosen, 'Framework for layer 2 virtual private networks (L2VPNs),' RFC 4664, IETF, June 2004
|
3 |
'Operation & maintenance mechanism for MPLS networks,' ITU-T Recommendation Y.1711, 2003
|
4 |
W. Augustyn and Y. Serbest, 'Service requirements for layer-2 provider-provisioned virtual private networks,' RFC 4665, IETF, Aug. 2004
|
5 |
'Network node interface for the synchronous digital hierarchy (SDH),' ITU-T Recommendation G.707/Y.1322, 2003
|
6 |
'Ethernet virtual private line service,' ITU-T Recommendation Y.8011.2/Y.1307.2, 2005
|
7 |
'Types and characteristics of SDH network protection architectures,' ITU-T Recommendation G.841, 2000
|
8 |
'Generic fame procedure (GFP),' ITU-T Recommendation Y.7041, 2001
|
9 |
BcN Deployment plan in Korea, Korea MIC, Feb. 2004
|
10 |
'Characteristics of synchronous digital hierarchy (SDH) equipment functional block,' ITU-T Recommendation G.783, 2004
|
11 |
'OAM functions and mechanisms for Ethernet based networks,' ITU-T draft Recommendation Y.1731, 2006
|
12 |
'Protection switching for MPLS networks,' ITU-T Recommendation Y.1720, 2003
|