draft-weingarten-mpls-tp-ring-protection-06.txt:Akira Sakurai:UNKNOWN:UNKNOWN:27:sep:2011:1:figure,seccons,ianacons:Active:: draft-weingarten-mpls-tp-ring-protection-06.txt:Classically there are two protection architecture mechanisms for ring:UNKNOWN:UNKNOWN:27:sep:2011:1:figure,seccons,ianacons:Active:: draft-weingarten-mpls-tp-ring-protection-06.txt:Yaacov Weingarten:nsn:israel:27:sep:2011:1:figure,seccons,ianacons:Active:: draft-weingarten-mpls-tp-ring-protection-06.txt:Stewart Bryant:cisco:united kingdom:27:sep:2011:1:figure,seccons,ianacons:Active:: draft-weingarten-mpls-tp-ring-protection-06.txt:Nurit Sprecher:nsn:israel:27:sep:2011:1:figure,seccons,ianacons:Active:: draft-weingarten-mpls-tp-ring-protection-06.txt:Danielle Ceccarelli:ericsson:italy:27:sep:2011:1:figure,seccons,ianacons:Active:: draft-weingarten-mpls-tp-ring-protection-06.txt:Diego Caviglia:ericsson:italy:27:sep:2011:1:figure,seccons,ianacons:Active:: draft-weingarten-mpls-tp-ring-protection-06.txt:Marco Corsi:altran:italy:27:sep:2011:1:figure,seccons,ianacons:Active:: draft-weingarten-mpls-tp-ring-protection-06.txt:Bo Wu:zte:china:27:sep:2011:1:figure,seccons,ianacons:Active:: draft-weingarten-mpls-tp-ring-protection-06.txt:Xuehui Dai:zte:china:27:sep:2011:1:figure,seccons,ianacons:Active::