Academic literature on the topic 'BGP (Computer network protocol)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'BGP (Computer network protocol).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "BGP (Computer network protocol)"

1

Musril, Hari Antoni. "SIMULASI INTERKONEKSI ANTARA AUTONOMOUS SYSTEM (AS) MENGGUNAKAN BORDER GATEWAY PROTOCOL (BGP)." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 2, no. 1 (September 1, 2017): 1–9. http://dx.doi.org/10.30743/infotekjar.v2i1.151.

Full text
Abstract:
An autonomous system (AS) is the collection of networks having the same set of routing policies. Each AS has administrative control to its own inter-domain routing policy. Computer networks consisting of a bunch of AS's with different routing will not be able to interconnecttion one another. This is causes communication in the network to be inhibited. For that we need a protocol that can connect each different AS. Border Gateway Protocol (BGP) is an inter-domain routing protocol i.e. between different AS that is used to exchange routing information between them. In a typical inter-network (and in the Internet) each autonomous system designates one or more routers that run BGP software. BGP routers in each AS are linked to those in one or more other AS. The ability to exchange table routing information between Autonomous System (AS) is one of the advantages BGP. BGP implements routing policies based a set of attributes accompanying each route used to pick the “shortest” path across multiple ASs, along with one or more routing policies. BGP uses an algorithm which cannot be classified as a pure "Distance Vector", or pure "Link State". It is a path vector routing protocol as it defines a route as a collection of a number of AS that is passes through from source AS to destination AS. This paper discusses the implementation of the BGP routing protocol in the network that have different AS in order to interconnect. Its application using Packet Tracer 7.0 software for prototyping and simulating network. So that later can be applied to the actual network. Based on experiments that have been carried out, the BGP routing protocol can connect two routers that have different autonomous system.
APA, Harvard, Vancouver, ISO, and other styles
2

Alotaibi, Hamad Saud, Mark A. Gregory, and Shuo Li. "Multidomain SDN-Based Gateways and Border Gateway Protocol." Journal of Computer Networks and Communications 2022 (May 12, 2022): 1–23. http://dx.doi.org/10.1155/2022/3955800.

Full text
Abstract:
The Internet consists of distributed and interconnected autonomous systems (ASs). The flexibility afforded by the Internet architecture ensures that timely changes to the network topology can occur without centralized control. The Border Gateway Protocol (BGP) is an Internet protocol that routes the Internet traffic and exchanges the information between AS. However, BGP version 4 (BGP-4) currently suffers from a limitation called “high convergence delay” while doing routing updates, which is a very common limitation, damaging the performance of contemporary IP networks. Software-defined networking (SDN) was conceived at the beginning of the 21st century, and over the intervening years, it has gained traction. This technology has significantly enhanced traffic control, management, and monitoring, particularly in data centres and enterprise networks. Challenges have been found including how to provide administrative control, security, management, and monitoring at domain boundaries while introducing the SDN paradigm. In multidomain SDN, BGP-4 is used to exchange the information and route the traffic between domains or diverse AS. In this review, an investigation is provided on using the SDN paradigm to enhance multidomain traffic management and control and to optimize BGP operation. A detailed insight is provided into the penetration of the SDN paradigm into modern networking architectures and how it may help in facilitating future research to improve BGP-4.
APA, Harvard, Vancouver, ISO, and other styles
3

Pratama, I. Putu Agus Eka. "Design and Implementation of SDN IP Based on Open Network Operating System and Border Gateway Protocol." Bulletin of Computer Science and Electrical Engineering 2, no. 2 (December 30, 2021): 56–66. http://dx.doi.org/10.25008/bcsee.v2i2.1145.

Full text
Abstract:
The development of computer network technology in the form of Software Defined Networking (SDN), provides many facilities for users to be able to develop network control applications, which can separate the data plane function from the control plane. The existence of this separation on routers and switches makes it easy for developers to centrally develop software and devices according to what is needed by users. However, there were obstacles to implementing SDN on IP networks in a short time. For this reason, it is necessary to implement SDN in stages by adding SDN to the existing IP network in the form of SDN IP, so that SDN can be connected and exchange routing information autonomously. This study focuses on the design and implementation of SDN IP using the Open Network Operating System (ONOS) on the Border Gateway Protocol (BGP). The results show that the design and implementation of SDN IP based on ONOS and BGP can be done well, where SDN can connect and exchange routing information with the Autonomous System (AS) native BGP-based network. Key word(s): Autonomous System (AS) Border Gateway Protocol (BGP) Open Network Operating System (ONOS) Software-Defined Networking (SDN) SDN IP
APA, Harvard, Vancouver, ISO, and other styles
4

Shukla, Shipra, and Mahesh Kumar. "Optimized MRAI Timers for Border Gateway Protocol in Large Networks." International Journal of Distributed Systems and Technologies 10, no. 4 (October 2019): 31–44. http://dx.doi.org/10.4018/ijdst.2019100103.

Full text
Abstract:
The global routing performance is essential for the services provided by the internet applications on the Internet. Border Gateway Protocol (BGP) is the extensively used routing protocol for the autonomous systems which constructs the internet. The reduction in convergence time is a crucial challenge for BGP. The past studies confirm that the Minimum Route Advertisement Interval (MRAI) decreases the convergence time. However, most of the approaches are focused on finding the optimum MRAI value. The techniques to implement the MRAI timers are less addressed by the researcher in compare to finding the optimum MRAI value. The implementation of reusable MRAI timers for large networks is critical at different load conditions. Therefore, this article presents the novel approach Optimized MRAI timer in a large network which reduces the convergence time. The proposed approach reduces the end-to-end delay, the number of exchanged updates message, and convergence time of BGP events and enhances the number of delivered packets in compare to related techniques.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhao, Jinjing, and Yan Wen. "Evaluation on the influence of internet prefix hijacking events." Computer Science and Information Systems 10, no. 2 (2013): 611–31. http://dx.doi.org/10.2298/csis121108023z.

Full text
Abstract:
The inter-domain routing system based on the BGP protocol is a kernel establishment in the Internet. There have been many incidents of IP prefix hijacking by BGP protocol in the Internet. Attacks may hijack victim's address space to disrupt network services or perpetrate malicious activities such as spamming and DoS attacks without disclosing identity. The relation between prefix hijacking and the Internet hierarchy is presented in this paper. The Internet is classified into three tiers based on the power-law and commercial relations of autonomous systems. The relation between network topology and prefix hijacking influence is presented for all sorts of hijacking events in different layers. The results assert that the hierarchical nature of network influences the prefix hijacking greatly.
APA, Harvard, Vancouver, ISO, and other styles
6

Azhari, Muhammad Ikhsan, Tengku Mohd Diansyah, and Ari Usman. "PERBANDINGAN ROUTING PROTOCOL EXTERIOR BGP VERSI 4 DENGAN ROUTING INTERIOR EIGRP PADA ALGORITMA LINKSTATE MENGGUNAKAN PARAMETER PACKET LOSS." JURNAL TEKNOLOGI INFORMASI 3, no. 2 (December 31, 2019): 185. http://dx.doi.org/10.36294/jurti.v3i2.1071.

Full text
Abstract:
Abstract - Computer networks very influential on the speed of transferring data from one computer to another computer by using a PC or server, in this case, the routing configuration is very influential. The best routing route selection is the solution to determine the most rapid and efficient routing, and as the best routing consideration, the researcher has examined two routings, namely BGP (Border Gateway Protocol) routing and EIGRP (Enhanced Interior Gateway Routing Protocol) using the Cisco Paket Traccer application. After the researcher was done an experiment, the researcher gets the result of the average EIGRP delay that is 54.619 and the packet loss result between EIGRP and BGP is not available (successful packet delivery). Keywords - BGP Routing Protocol Exterior, EIGRP Interior Routing, Algorithm Link state, Packet loss Abstrak - Jaringan komputer sangat berpengaruh pada kecepatan transfer data antar satu komputer ke komputer lain baik itu pc maupun server, dalam hal ini konfigurasi routing sangat berpengaruh. Pemilihan jalur routing terbaik merupakan solusi untuk menentukan routing yang paling cepat dan efisien, dan sebagai bahan pertimbangan routing terbaik penulis meneliti dua routing yakni routing BGP (Border Gateway Protocol) dan routing EIGRP (Enhanced Interior Gateway Routing Protocol) mengguanakan aplikasi Cisco Packet Traccer. Setelah dilakukannya percobaan yang penulis perbuat, maka didapatkan hasil dari rata-rata delay EIGRP yaitu 54,619 dan hasil dari packetloss antara EIGRP dan BGP tidak ada (pengiriman paket sukses). Kata Kunci - Routing Protocol Exterior BGP, Routing Interior EIGRP, Algoritma Link state, Packet loss.
APA, Harvard, Vancouver, ISO, and other styles
7

Tsai, Pang-Wei, Aris Cahyadi Risdianto, Meng Hui Choi, Satis Kumar Permal, and Teck Chaw Ling. "SD-BROV: An Enhanced BGP Hijacking Protection with Route Validation in Software-Defined eXchange." Future Internet 13, no. 7 (June 30, 2021): 171. http://dx.doi.org/10.3390/fi13070171.

Full text
Abstract:
In global networks, Border Gateway Protocol (BGP) is widely used in exchanging routing information. While the original design of BGP did not focus on security protection against deliberate or accidental errors regarding to routing disruption, one of fundamental vulnerabilities in BGP is a lack of insurance in validating authority for announcing network layer reachability. Therefore, a distributed repository system known as Resource Public Key Infrastructure (RPKI) has been utilized to mitigate this issue. However, such a validation requires further deployment steps for Autonomous System (AS), and it might cause performance and compatibility problems in legacy network infrastructure. Nevertheless, with recent advancements in network innovation, some traditional networks are planning to be restructured with Software-Defined Networking (SDN) technology for gaining more benefits. By using SDN, Internet eXchange Point (IXP) is able to enhance its capability of management by applying softwarized control methods, acting as a Software-Defined eXchange (SDX) center to handle numerous advertisement adaptively. To use the SDN method to strengthen routing security of IXP, this paper proposed an alternative SDX development, SD-BROV, an SDX-based BGP Route Origin Validation mechanism that establishes a flexible route exchange scenario with RPKI validation. The validating application built in the SDN controller is capable of investigating received routing information. It aims to support hybrid SDN environments and help non-SDN BGP neighbors to get trusted routes and drop suspicious ones in transition. To verify proposed idea with emulated environment, the proof-of-concept development is deployed on an SDN testbed running over Research and Education Networks (RENs). During BGP hijacking experiment, the results show that developed SD-BROV is able to detect and stop legitimate traffic to be redirected by attacker, making approach to secure traffic forwarding on BGP routers.
APA, Harvard, Vancouver, ISO, and other styles
8

Chan, Haowen, Debabrata Dash, Adrian Perrig, and Hui Zhang. "Modeling adoptability of secure BGP protocol." ACM SIGCOMM Computer Communication Review 36, no. 4 (August 11, 2006): 279–90. http://dx.doi.org/10.1145/1151659.1159946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Berzin, Oleg. "Mobility label based network: Mobility support in label switched networks with multi-protocol BGP." Computer Networks 52, no. 9 (June 2008): 1732–44. http://dx.doi.org/10.1016/j.comnet.2008.03.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alberro, Leonardo, Felipe Velázquez, Sara Azpiroz, Eduardo Grampin, and Matías Richart. "Experimenting with Routing Protocols in the Data Center: An ns-3 Simulation Approach." Future Internet 14, no. 10 (October 14, 2022): 292. http://dx.doi.org/10.3390/fi14100292.

Full text
Abstract:
Massive scale data centers (MSDC) have become a key component of current content-centric Internet architecture. With scales of up to hundreds of thousands servers, conveying traffic inside these infrastructures requires much greater connectivity resources than traditional broadband Internet transit networks. MSDCs use Fat-Tree type topologies, which ensure multipath connectivity and constant bisection bandwidth between servers. To properly use the potential advantages of these topologies, specific routing protocols are needed, with multipath support and low control messaging load. These infrastructures are enormously expensive, and therefore it is not possible to use them to experiment with new protocols; that is why scalable and realistic emulation/simulation environments are needed. Based on previous experiences, in this paper we present extensions to the ns-3 network simulator that allow executing the Free Range Routing (FRR) protocol suite, which support some of the specific MSDC routing protocols. Focused on the Border Gateway Protocol (BGP), we run a comprehensive set of control plane experiments over Fat-Tree topologies, achieving competitive scalability running on a single-host environment, which demonstrates that the modified ns-3 simulator can be effectively used for experimenting in the MSDC. Moreover, the validation was complemented with a theoretical analysis of BGP behavior over selected scenarios. The whole project is available to the community and fully reproducible.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "BGP (Computer network protocol)"

1

Nguyen, Lien K. "Predicting catastrophic BGP routing instablities /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FNguyen.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nguyen, Lien K. "Predicting catastrophic BGP routing instabilities." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1642.

Full text
Abstract:
Approved for public release, distribution is unlimited
Inter-domain routing connects individual pieces of Internet topology, creating an integral, global data delivery infrastructure. Currently, this critical function is performed by the Border Gateway Protocol (BGP) version 4 [RFC1771]. Like all routing protocols, BGP is vulnerable to instabilities that reduce its effectiveness. Among the causes of these instabilities are those which are maliciously induced. Although there are other causes, e.g., natural events and network anomalies, this thesis will focus exclusively on maliciously induced instabilities. Most current models that attempt to predict a BGP routing instability confine their focus to either macro- or micro-level metrics, but not to both. The inherent limitations of each of these forms of metric gives rise to an excessive rate of spurious alerts, both false positives and false negatives. It is the original intent of this thesis to develop an improved BGP instability prediction model by statistically combining BGP instability metrics with user level performance metrics. The motivation for such a model is twofold. 1) To provide sufficient prior warning of impending failure to facilitate proactive protection measures. 2) To improve warning reliability beyond existing models, by demonstrably reducing both false positives and false negatives. However, our analysis of actual network trace data shows that a widely used BGP instability metric, the total number of update messages received in a time period, is not a good indicator of future user level performance.
Civilian, Department of Defense
APA, Harvard, Vancouver, ISO, and other styles
3

Lam, Fung. "Internet inter-domain traffic engineering and optimizatioon /." Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk:8888/cgi-bin/hkuto%5Ftoc%5Fpdf?B23273173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

White, Cory B. "A Neural Network Approach to Border Gateway Protocol Peer Failure Detection and Prediction." DigitalCommons@CalPoly, 2009. https://digitalcommons.calpoly.edu/theses/215.

Full text
Abstract:
The size and speed of computer networks continue to expand at a rapid pace, as do the corresponding errors, failures, and faults inherent within such extensive networks. This thesis introduces a novel approach to interface Border Gateway Protocol (BGP) computer networks with neural networks to learn the precursor connectivity patterns that emerge prior to a node failure. Details of the design and construction of a framework that utilizes neural networks to learn and monitor BGP connection states as a means of detecting and predicting BGP peer node failure are presented. Moreover, this framework is used to monitor a BGP network and a suite of tests are conducted to establish that this neural network approach as a viable strategy for predicting BGP peer node failure. For all performed experiments both of the proposed neural network architectures succeed in memorizing and utilizing the network connectivity patterns. Lastly, a discussion of this framework's generic design is presented to acknowledge how other types of networks and alternate machine learning techniques can be accommodated with relative ease.
APA, Harvard, Vancouver, ISO, and other styles
5

Lam, Fung, and 林峰. "Internet inter-domain traffic engineering and optimizatioon." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31224581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Novák, Adrián. "Modelování a simulace BGP." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403147.

Full text
Abstract:
This Master's thesis deals with modeling and simulation of BGP protocol within the OMNeT++ environment. The BGP protocol is described with employed data structures and the finite state machine of BGP peering. Next, the basic configuration is outlined involving the setup of the BGP protocol on Cisco devices. Further, BGP for OMNeT++ state-of-the-art is investigated together with its lack of functionality and issues. The second part of this thesis deals with design, implementation, and testing of the new functionality of BGP protocol and simulation models. The last section describes the overall achieved results.
APA, Harvard, Vancouver, ISO, and other styles
7

Jacquemart, Quentin. "Déceler les attaques par détournement BGP." Thesis, Paris, ENST, 2015. http://www.theses.fr/2015ENST0063/document.

Full text
Abstract:
Internet est constitué de milliers de systèmes autonomes (Autonomous Systems, AS) qui échangent des informations de routage grâce au protocole BGP (Border Gateway Protocol). Chaque AS attend des autres qu'il lui donne des informations de routage correctes, et leur accorde donc une confiance totale. Le détournement de préfixe (prefix hijacking) exploite cette confiance afin d'introduire des routes falsifiées. Les techniques qui détectent cette attaque génèrent un nombre important d'alertes, composé de faux positifs résultant d'opérations de routage courantes. Dans cette dissertation, nous cherchons à trouver la cause principale de ces alertes, de manière indubitable. A cette fin, d'une part, nous réduisons le nombre d'alertes en analysant en profondeur ces réseaux, dont nous dérivons une série de structures qui reflètent les pratiques standard de routage du monde réel, et en considérant le risque associé à ces structures lors une attaque par détournement. D'autre part, nous utilisons des bases de données auxiliaires qui nous permettent de connaître la raison derrière un évènement de routage, qui n'est, en général, connue que du propriétaire du réseau. Précisément, nous regardons les préfixes à origines multiples (Multiple Origin AS, MOAS), et mettons en évidence une classification nous permettant d'éliminer 80% des alertes. Nous présentons un cas réel où un MOAS coïncide avec du spam et des sites d'arnaque en ligne. Nous étudions les préfixes non-disjoints, et présentons un prototype permettant d'éliminer 50% des alertes sub-MOAS.Nous explorons l'espace IP non assigné, cherchons des adresses IP joignables, et localisons une grande quantité de spam et des sites d'arnaques en ligne
The Internet is composed of tens of thousands Autonomous Systems (ASes) that exchange routing information using the Border Gateway Protocol (BGP). Consequently, every AS implicitly trusts every other ASes to provide accurate routing information. Prefix hijacking is an attack against the inter-domain routing infrastructure that abuses mutual trust in order to propagate fallacious routes. The current detection techniques pathologically raise a large number of alerts, mostly composed of false positives resulting from benign routing practices. In this Dissertation, we seek the root cause of routing events beyond reasonable doubts. First, we reduce the global number of alerts by analyzing false positive alerts, from which we extract constructs that reflect real-world standard routing practices. We then consider the security threat associated with these constructs in a prefix hijacking scenario. Second, we use a variety of auxiliary datasets that reflect distinct facets of the networks involved in a suspicious routing event in order to closely approximate the ground-truth, which is traditionally only known by the network owner. Specifically, we investigate Multiple Origin AS (MOAS) prefixes, and introduce a classification that we use to discard up to 80% of false positive. Then we show a real-world case where a MOAS coincided with spam and web scam traffic. We look at prefix overlaps, clarify their global use, and present a prototype that discards around 50% of false positive sub-MOAS alerts. Finally, we explore the IP blackspace, study the routing-level characteristics of those networks, find live IP addresses, and uncover a large amount of spam and scam activities
APA, Harvard, Vancouver, ISO, and other styles
8

Sundaresan, Latha. "Simple network management protocol /." Online version of thesis, 1995. http://hdl.handle.net/1850/12254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Karlsson, Jimmy. "Border Gateway Protocol : Implementationer på stubnätverk." Thesis, University of Skövde, School of Humanities and Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4062.

Full text
Abstract:

Arbetet tar upp BGP-multihoming för mindre organisationer. Den jämför ett kommersiell alternativ mot open source-alternativ. Detta är för att se vad som krävs en av open source-lösning för ge konkurrens på routermarknaden, samt besparingar för organisationer som ska använda denna lösning.Praktiska och teoretiska jämförelser görs där Cisco-lösningar jämförs med OpenBGPD. Datan utifrån dessa tester används för att svara på problemfrågan. Sammanfattningsvis har open source produkter en fördel hårdvarumässigt på grund av lägre kostnader medan kommersiella har stora fördelar då de förlitar sig på nyare standarder.

APA, Harvard, Vancouver, ISO, and other styles
10

Frisk, Johan. "Cross Continental Access of Information and the Boarder Gateway Protocol." Thesis, Linköpings universitet, Databas och informationsteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-153880.

Full text
Abstract:
The usage of technical equipment and the interconnection of all these devices has become essential to our every day life and to provide as good service as possible for the internet of today. However, many have the opportunity to inspect the data as it is being rushed across the globe to provide users with information at the press of a button. This study examines the routing patterns from hundred thousands of trace routes going from user to server around the globe. Using this trace data, we demonstrate not only the number of companies involved in data transfers on other continents then where they are currently not residing, but also give some insight into the amount of routes pertaining to same continent data transfers which takes paths not contained within that same continent. In doing so, we try to explain the inner workings of the protocols used within the process of data transfer, answer a number of security related questions regarding the protocols used, as well as discuss which other circumstances can affect the decision making process.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "BGP (Computer network protocol)"

1

Beijnum, Iljitsch van. BGP. Beijing: O'Reilly, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Danny, McPherson, and Srihari Sangli, eds. Practical BGP. Boston: Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Routing first-step. Indianapolis, IN: Cisco Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

BGP4: Inter-domain routing in the Internet. Reading, Mass: Addison Wesley, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Expert Network Time Protocol. Berkeley: Apress, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Naugle, Matthew G. Network protocol handbook. New York: McGraw-Hill, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1924-, Green Paul Eliot, ed. Network interconnection and protocol conversion. New York: IEEE Press, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Spiropoulos, George. Computer network protocols and protocol proving. Birmingham: University of Birmingham, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Byrnes, Philippe. Protocol management in computer networking. Boston: Artech House, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Communication protocol engineering. Boca Raton, FL: Taylor & Francis, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "BGP (Computer network protocol)"

1

Byun, Haesun, and Meejeong Lee. "Network Architecture and Protocols for BGP/MPLS Based Mobile VPN." In Lecture Notes in Computer Science, 244–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89524-4_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Uhlig, Steve, and Sébastien Tandel. "Quantifying the BGP Routes Diversity Inside a Tier-1 Network." In NETWORKING 2006. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems, 1002–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11753810_83.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weik, Martin H. "network management protocol." In Computer Science and Communications Dictionary, 1088. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_12251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barksdale, William J. "Network Protocol and Architecture." In Practical Computer Data Communications, 319–84. Boston, MA: Springer US, 1986. http://dx.doi.org/10.1007/978-1-4684-5164-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weik, Martin H. "Simple Network Management Protocol." In Computer Science and Communications Dictionary, 1591. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_17461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shionozaki, A., and M. Tokoro. "Towards a Responsive Network Protocol." In Responsive Computer Systems, 99–122. Vienna: Springer Vienna, 1993. http://dx.doi.org/10.1007/978-3-7091-9288-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jestratjew, Arkadiusz, and Andrzej Kwiecień. "Using HTTP as Field Network Transfer Protocol." In Computer Networks, 306–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21771-5_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kim, Dong-Seong, and Hoa Tran-Dang. "Communication Using Controller Area Network Protocol." In Computer Communications and Networks, 31–41. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04927-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yu, Yongxue, Jiayu Xie, Yujue Wang, and Yin Zhou. "Research on Space Information Network Protocol." In Communications in Computer and Information Science, 163–71. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3442-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bochmann, Gregor V., and Carl A. Sunshine. "Formal Methods for Protocol Specification and Validation." In Computer Network Architectures and Protocols, 513–31. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "BGP (Computer network protocol)"

1

Wu, Yanwei, Ru Wang, and Xiaohua Xu. "A Certificate Pin BGP Protocol: CP-BGP." In 2020 5th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2020. http://dx.doi.org/10.1109/icccs49078.2020.9118593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nawaz, Muhammad Faisal, Fazl-e-Hadi, and Shakir Ullah Shah. "RouterSim: A New Router Simulator for BGP and IS-IS Protocol." In 2009 International Conference on Future Computer and Communication (ICFCC). IEEE, 2009. http://dx.doi.org/10.1109/icfcc.2009.70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bryzgalov, Viktor V. "Using of protocol BGP-4 on the main site of a network." In 2009 International Conference and Seminar on Micro/Nanotechnologies and Electron Devices (EDM). IEEE, 2009. http://dx.doi.org/10.1109/edm.2009.5173958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Berzin, Oleg, and Afshin Daryoush. "Mobility label based network: Support for mobility using MPLS and Multi-Protocol BGP." In 2008 IEEE Radio and Wireless Symposium. IEEE, 2008. http://dx.doi.org/10.1109/rws.2008.4463541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhai, Peng, Lu Qi, Liping Zhang, and Bin Zhao. "Design of Conformance Testing System for BGP Protocol of IPv6 Based on XML." In 2012 International Conference on Computer Science and Service System (CSSS). IEEE, 2012. http://dx.doi.org/10.1109/csss.2012.153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gontara, Salah, Amine Boufaied, and Ouajdi Korbaa. "Routing the Pi-Containers in the Physical Internet using the PI-BGP Protocol." In 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2018. http://dx.doi.org/10.1109/aiccsa.2018.8612885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Matcharashvili, Teimuraz, and Archil Prangishvili. "Quantifying regularity of the Internet Interdomain Routing based on Border Gateway Protocol (BGP) data bases." In 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE). IEEE, 2020. http://dx.doi.org/10.1109/icecce49384.2020.9179264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xiao-yang, Mu, Chen Yue-xin, Deng Yue-hua, and Zheng Hui. "A novel algorithm for AS path inference based on BGP routing tables." In 2013 3rd International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2013. http://dx.doi.org/10.1109/iccsnt.2013.6967094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Song, Zhenxing, P. W. C. Prasad, Abeer Alsadoon, L. Pham, and A. Elchouemi. "Upgrading Internet service provider (ISP) network in multiprotocol label switching (MPLS) and border gateway protocol (BGP) environment." In 2016 International Conference on Advances in Electrical, Electronic and Systems Engineering (ICAEES). IEEE, 2016. http://dx.doi.org/10.1109/icaees.2016.7888045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Aguas, Elkin, Thomas Green, and Anthony Lambert. "Poster Abstract: On the Feasibility of Event-Driven Network Automation Scenarios for BGP." In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2019. http://dx.doi.org/10.1109/infcomw.2019.8845039.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "BGP (Computer network protocol)"

1

LI, Zhendong, Hangjian Qiu, xiaoqian Wang, chengcheng Zhang, and Yuejuan Zhang. Comparative Efficacy of 5 non-pharmaceutical Therapies For Adults With Post-stroke Cognitive Impairment: Protocol For A Bayesian Network Analysis Based on 55 Randomized Controlled Trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, June 2022. http://dx.doi.org/10.37766/inplasy2022.6.0036.

Full text
Abstract:
Review question / Objective: This study will provide evidence-based references for the efficacy of 5 different non-pharmaceutical therapies in the treatment of post-stroke cognitive impairment(PSCI). 1. Types of studies. Only randomized controlled trials (RCTs) of Transcranial Magnetic Stimulation(TMS), Transcranial Direct Current Stimulation(tDCS), Acupuncture, Virtual Reality Exposure Therapy(VR) and Computer-assisted cognitive rehabilitation(CA) for PSCI will be recruited. Additionally, Studies should be available in full papers as well as peer reviewed and the original data should be clear and adequate. 2. Types of participants. All adults with a recent or previous history of ischaemic or hemorrhagic stroke and diagnosed according to clearly defined or internationally recognized diagnostic criteria, regardless of nationality, race, sex, age, or educational background. 3.Types of interventions and controls. The control group takes non-acupuncture treatment, including conventional rehabilitation or in combination with symptomatic support therapy. The experimental group should be treated with acupuncture on basis of the control group. 4.The interventions of the experimental groups were Transcranial Magnetic Stimulation(TMS), Transcranial Direct Current Stimulation(tDCS), Acupuncture, Virtual Reality Exposure Therapy(VR) or Computer-assisted cognitive rehabilitation(CA), and the interventions of the control group takes routine rehabilitation and cognition training or other therapies mentioned above that were different from the intervention group. 5.Types of outcomes. The primary outcomes are measured with The Mini-Mental State Examination (MMSE) and/or The Montreal Cognitive Assessment Scale (MoCA), which have been widely used to evaluate the cognitive abilities. The secondary outcome indicator was the Barthel Index (BI) to assess independence in activities of daily living (ADLs).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography