Academic literature on the topic 'BGP (Computer network protocol)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'BGP (Computer network protocol).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "BGP (Computer network protocol)"
Musril, Hari Antoni. "SIMULASI INTERKONEKSI ANTARA AUTONOMOUS SYSTEM (AS) MENGGUNAKAN BORDER GATEWAY PROTOCOL (BGP)." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 2, no. 1 (September 1, 2017): 1–9. http://dx.doi.org/10.30743/infotekjar.v2i1.151.
Full textAlotaibi, Hamad Saud, Mark A. Gregory, and Shuo Li. "Multidomain SDN-Based Gateways and Border Gateway Protocol." Journal of Computer Networks and Communications 2022 (May 12, 2022): 1–23. http://dx.doi.org/10.1155/2022/3955800.
Full textPratama, I. Putu Agus Eka. "Design and Implementation of SDN IP Based on Open Network Operating System and Border Gateway Protocol." Bulletin of Computer Science and Electrical Engineering 2, no. 2 (December 30, 2021): 56–66. http://dx.doi.org/10.25008/bcsee.v2i2.1145.
Full textShukla, Shipra, and Mahesh Kumar. "Optimized MRAI Timers for Border Gateway Protocol in Large Networks." International Journal of Distributed Systems and Technologies 10, no. 4 (October 2019): 31–44. http://dx.doi.org/10.4018/ijdst.2019100103.
Full textZhao, Jinjing, and Yan Wen. "Evaluation on the influence of internet prefix hijacking events." Computer Science and Information Systems 10, no. 2 (2013): 611–31. http://dx.doi.org/10.2298/csis121108023z.
Full textAzhari, Muhammad Ikhsan, Tengku Mohd Diansyah, and Ari Usman. "PERBANDINGAN ROUTING PROTOCOL EXTERIOR BGP VERSI 4 DENGAN ROUTING INTERIOR EIGRP PADA ALGORITMA LINKSTATE MENGGUNAKAN PARAMETER PACKET LOSS." JURNAL TEKNOLOGI INFORMASI 3, no. 2 (December 31, 2019): 185. http://dx.doi.org/10.36294/jurti.v3i2.1071.
Full textTsai, Pang-Wei, Aris Cahyadi Risdianto, Meng Hui Choi, Satis Kumar Permal, and Teck Chaw Ling. "SD-BROV: An Enhanced BGP Hijacking Protection with Route Validation in Software-Defined eXchange." Future Internet 13, no. 7 (June 30, 2021): 171. http://dx.doi.org/10.3390/fi13070171.
Full textChan, Haowen, Debabrata Dash, Adrian Perrig, and Hui Zhang. "Modeling adoptability of secure BGP protocol." ACM SIGCOMM Computer Communication Review 36, no. 4 (August 11, 2006): 279–90. http://dx.doi.org/10.1145/1151659.1159946.
Full textBerzin, Oleg. "Mobility label based network: Mobility support in label switched networks with multi-protocol BGP." Computer Networks 52, no. 9 (June 2008): 1732–44. http://dx.doi.org/10.1016/j.comnet.2008.03.001.
Full textAlberro, Leonardo, Felipe Velázquez, Sara Azpiroz, Eduardo Grampin, and Matías Richart. "Experimenting with Routing Protocols in the Data Center: An ns-3 Simulation Approach." Future Internet 14, no. 10 (October 14, 2022): 292. http://dx.doi.org/10.3390/fi14100292.
Full textDissertations / Theses on the topic "BGP (Computer network protocol)"
Nguyen, Lien K. "Predicting catastrophic BGP routing instablities /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FNguyen.pdf.
Full textNguyen, Lien K. "Predicting catastrophic BGP routing instabilities." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1642.
Full textInter-domain routing connects individual pieces of Internet topology, creating an integral, global data delivery infrastructure. Currently, this critical function is performed by the Border Gateway Protocol (BGP) version 4 [RFC1771]. Like all routing protocols, BGP is vulnerable to instabilities that reduce its effectiveness. Among the causes of these instabilities are those which are maliciously induced. Although there are other causes, e.g., natural events and network anomalies, this thesis will focus exclusively on maliciously induced instabilities. Most current models that attempt to predict a BGP routing instability confine their focus to either macro- or micro-level metrics, but not to both. The inherent limitations of each of these forms of metric gives rise to an excessive rate of spurious alerts, both false positives and false negatives. It is the original intent of this thesis to develop an improved BGP instability prediction model by statistically combining BGP instability metrics with user level performance metrics. The motivation for such a model is twofold. 1) To provide sufficient prior warning of impending failure to facilitate proactive protection measures. 2) To improve warning reliability beyond existing models, by demonstrably reducing both false positives and false negatives. However, our analysis of actual network trace data shows that a widely used BGP instability metric, the total number of update messages received in a time period, is not a good indicator of future user level performance.
Civilian, Department of Defense
Lam, Fung. "Internet inter-domain traffic engineering and optimizatioon /." Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk:8888/cgi-bin/hkuto%5Ftoc%5Fpdf?B23273173.
Full textWhite, Cory B. "A Neural Network Approach to Border Gateway Protocol Peer Failure Detection and Prediction." DigitalCommons@CalPoly, 2009. https://digitalcommons.calpoly.edu/theses/215.
Full textLam, Fung, and 林峰. "Internet inter-domain traffic engineering and optimizatioon." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31224581.
Full textNovák, Adrián. "Modelování a simulace BGP." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403147.
Full textJacquemart, Quentin. "Déceler les attaques par détournement BGP." Thesis, Paris, ENST, 2015. http://www.theses.fr/2015ENST0063/document.
Full textThe Internet is composed of tens of thousands Autonomous Systems (ASes) that exchange routing information using the Border Gateway Protocol (BGP). Consequently, every AS implicitly trusts every other ASes to provide accurate routing information. Prefix hijacking is an attack against the inter-domain routing infrastructure that abuses mutual trust in order to propagate fallacious routes. The current detection techniques pathologically raise a large number of alerts, mostly composed of false positives resulting from benign routing practices. In this Dissertation, we seek the root cause of routing events beyond reasonable doubts. First, we reduce the global number of alerts by analyzing false positive alerts, from which we extract constructs that reflect real-world standard routing practices. We then consider the security threat associated with these constructs in a prefix hijacking scenario. Second, we use a variety of auxiliary datasets that reflect distinct facets of the networks involved in a suspicious routing event in order to closely approximate the ground-truth, which is traditionally only known by the network owner. Specifically, we investigate Multiple Origin AS (MOAS) prefixes, and introduce a classification that we use to discard up to 80% of false positive. Then we show a real-world case where a MOAS coincided with spam and web scam traffic. We look at prefix overlaps, clarify their global use, and present a prototype that discards around 50% of false positive sub-MOAS alerts. Finally, we explore the IP blackspace, study the routing-level characteristics of those networks, find live IP addresses, and uncover a large amount of spam and scam activities
Sundaresan, Latha. "Simple network management protocol /." Online version of thesis, 1995. http://hdl.handle.net/1850/12254.
Full textKarlsson, Jimmy. "Border Gateway Protocol : Implementationer på stubnätverk." Thesis, University of Skövde, School of Humanities and Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4062.
Full textArbetet tar upp BGP-multihoming för mindre organisationer. Den jämför ett kommersiell alternativ mot open source-alternativ. Detta är för att se vad som krävs en av open source-lösning för ge konkurrens på routermarknaden, samt besparingar för organisationer som ska använda denna lösning.Praktiska och teoretiska jämförelser görs där Cisco-lösningar jämförs med OpenBGPD. Datan utifrån dessa tester används för att svara på problemfrågan. Sammanfattningsvis har open source produkter en fördel hårdvarumässigt på grund av lägre kostnader medan kommersiella har stora fördelar då de förlitar sig på nyare standarder.
Frisk, Johan. "Cross Continental Access of Information and the Boarder Gateway Protocol." Thesis, Linköpings universitet, Databas och informationsteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-153880.
Full textBooks on the topic "BGP (Computer network protocol)"
Danny, McPherson, and Srihari Sangli, eds. Practical BGP. Boston: Addison-Wesley, 2005.
Find full text1924-, Green Paul Eliot, ed. Network interconnection and protocol conversion. New York: IEEE Press, 1988.
Find full textSpiropoulos, George. Computer network protocols and protocol proving. Birmingham: University of Birmingham, 1988.
Find full textByrnes, Philippe. Protocol management in computer networking. Boston: Artech House, 2000.
Find full textBook chapters on the topic "BGP (Computer network protocol)"
Byun, Haesun, and Meejeong Lee. "Network Architecture and Protocols for BGP/MPLS Based Mobile VPN." In Lecture Notes in Computer Science, 244–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89524-4_25.
Full textUhlig, Steve, and Sébastien Tandel. "Quantifying the BGP Routes Diversity Inside a Tier-1 Network." In NETWORKING 2006. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 1002–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11753810_83.
Full textWeik, Martin H. "network management protocol." In Computer Science and Communications Dictionary, 1088. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12251.
Full textBarksdale, William J. "Network Protocol and Architecture." In Practical Computer Data Communications, 319–84. Boston, MA: Springer US, 1986. http://dx.doi.org/10.1007/978-1-4684-5164-1_10.
Full textWeik, Martin H. "Simple Network Management Protocol." In Computer Science and Communications Dictionary, 1591. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_17461.
Full textShionozaki, A., and M. Tokoro. "Towards a Responsive Network Protocol." In Responsive Computer Systems, 99–122. Vienna: Springer Vienna, 1993. http://dx.doi.org/10.1007/978-3-7091-9288-7_6.
Full textJestratjew, Arkadiusz, and Andrzej Kwiecień. "Using HTTP as Field Network Transfer Protocol." In Computer Networks, 306–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5_33.
Full textKim, Dong-Seong, and Hoa Tran-Dang. "Communication Using Controller Area Network Protocol." In Computer Communications and Networks, 31–41. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04927-0_3.
Full textYu, Yongxue, Jiayu Xie, Yujue Wang, and Yin Zhou. "Research on Space Information Network Protocol." In Communications in Computer and Information Science, 163–71. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3442-3_13.
Full textBochmann, Gregor V., and Carl A. Sunshine. "Formal Methods for Protocol Specification and Validation." In Computer Network Architectures and Protocols, 513–31. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_17.
Full textConference papers on the topic "BGP (Computer network protocol)"
Wu, Yanwei, Ru Wang, and Xiaohua Xu. "A Certificate Pin BGP Protocol: CP-BGP." In 2020 5th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2020. http://dx.doi.org/10.1109/icccs49078.2020.9118593.
Full textNawaz, Muhammad Faisal, Fazl-e-Hadi, and Shakir Ullah Shah. "RouterSim: A New Router Simulator for BGP and IS-IS Protocol." In 2009 International Conference on Future Computer and Communication (ICFCC). IEEE, 2009. http://dx.doi.org/10.1109/icfcc.2009.70.
Full textBryzgalov, Viktor V. "Using of protocol BGP-4 on the main site of a network." In 2009 International Conference and Seminar on Micro/Nanotechnologies and Electron Devices (EDM). IEEE, 2009. http://dx.doi.org/10.1109/edm.2009.5173958.
Full textBerzin, Oleg, and Afshin Daryoush. "Mobility label based network: Support for mobility using MPLS and Multi-Protocol BGP." In 2008 IEEE Radio and Wireless Symposium. IEEE, 2008. http://dx.doi.org/10.1109/rws.2008.4463541.
Full textZhai, Peng, Lu Qi, Liping Zhang, and Bin Zhao. "Design of Conformance Testing System for BGP Protocol of IPv6 Based on XML." In 2012 International Conference on Computer Science and Service System (CSSS). IEEE, 2012. http://dx.doi.org/10.1109/csss.2012.153.
Full textGontara, Salah, Amine Boufaied, and Ouajdi Korbaa. "Routing the Pi-Containers in the Physical Internet using the PI-BGP Protocol." In 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2018. http://dx.doi.org/10.1109/aiccsa.2018.8612885.
Full textMatcharashvili, Teimuraz, and Archil Prangishvili. "Quantifying regularity of the Internet Interdomain Routing based on Border Gateway Protocol (BGP) data bases." In 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE). IEEE, 2020. http://dx.doi.org/10.1109/icecce49384.2020.9179264.
Full textXiao-yang, Mu, Chen Yue-xin, Deng Yue-hua, and Zheng Hui. "A novel algorithm for AS path inference based on BGP routing tables." In 2013 3rd International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2013. http://dx.doi.org/10.1109/iccsnt.2013.6967094.
Full textSong, Zhenxing, P. W. C. Prasad, Abeer Alsadoon, L. Pham, and A. Elchouemi. "Upgrading Internet service provider (ISP) network in multiprotocol label switching (MPLS) and border gateway protocol (BGP) environment." In 2016 International Conference on Advances in Electrical, Electronic and Systems Engineering (ICAEES). IEEE, 2016. http://dx.doi.org/10.1109/icaees.2016.7888045.
Full textAguas, Elkin, Thomas Green, and Anthony Lambert. "Poster Abstract: On the Feasibility of Event-Driven Network Automation Scenarios for BGP." In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2019. http://dx.doi.org/10.1109/infcomw.2019.8845039.
Full textReports on the topic "BGP (Computer network protocol)"
LI, Zhendong, Hangjian Qiu, xiaoqian Wang, chengcheng Zhang, and Yuejuan Zhang. Comparative Efficacy of 5 non-pharmaceutical Therapies For Adults With Post-stroke Cognitive Impairment: Protocol For A Bayesian Network Analysis Based on 55 Randomized Controlled Trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, June 2022. http://dx.doi.org/10.37766/inplasy2022.6.0036.
Full text