热门
最新
红包
立Flag
投票
同城
我的
发布
夏尔Gaesar
4 年前
trueqq_45540735
In this example, both the initial and the final configurations
comply with the hard requirement.
下一条:
The firstrequirement is hard: it has to be maintained throughout the recon-figuration. In contrast, the second requirement is soft: it should be violated as little as possible. The scenario involves applying 3 com-mands: adding the BGP session a and adapting two link weightsb and c .1 For simplicity, we assume that there are no failures.
立即登录