(a) Original input topology
(b) Normal state VLAN 1 (working)
(c) Backup VLAN 2 for
(d) Backup VLAN 3 for
Figure 2: Example of the proposed leaf constrained VLAN protection scheme.