Research Article

Modeling and Algorithm for Multiple Spanning Tree Provisioning in Resilient and Load Balanced Ethernet Networks

Figure 2

Example of the proposed leaf constrained VLAN protection scheme.
(a) Original input topology
(b) Normal state VLAN 1 (working)
(c) Backup VLAN 2 for
(d) Backup VLAN 3 for