To see the other types of publications on this topic, follow the link: BGP.

Dissertations / Theses on the topic 'BGP'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'BGP.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Novák, Adrián. "Modelování a simulace BGP." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403147.

Full text
Abstract:
This Master's thesis deals with modeling and simulation of BGP protocol within the OMNeT++ environment. The BGP protocol is described with employed data structures and the finite state machine of BGP peering. Next, the basic configuration is outlined involving the setup of the BGP protocol on Cisco devices. Further, BGP for OMNeT++ state-of-the-art is investigated together with its lack of functionality and issues. The second part of this thesis deals with design, implementation, and testing of the new functionality of BGP protocol and simulation models. The last section describes the overall
APA, Harvard, Vancouver, ISO, and other styles
2

Israr, Junaid. "Design of Lightweight Alternatives to Secure Border Gateway Protocol and Mitigate against Control and Data Plane Attacks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22812.

Full text
Abstract:
Border Gateway Protocol (BGP) is the backbone of routing infrastructure in the Internet. In its current form, it is an insecure protocol with potential for propagation of bogus routing information. There have been several high-profiles Internet outages linked to BGP in recent times. Several BGP security proposals have been presented in the literature; however, none has been adopted so far and, as a result, securing BGP remains an unsolved problem to this day. Among existing BGP security proposals, Secure BGP (S-BGP) is considered most comprehensive. However, it presents significant challenges
APA, Harvard, Vancouver, ISO, and other styles
3

Knoll, Thomas Martin. "BGP Class of Service Interconnection." Universitätsbibliothek Chemnitz, 2009. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200900251.

Full text
Abstract:
This document focuses on Class of Service Interconnection at inter- domain peering points. It specifies two new non-transitive attributes, which enable adjacent peers to signal Class of Service Capabilities and certain Class of Service admission control Parameters. The new "CoS Capability Attribute" is deliberately kept simple and denotes the general EF, AF Group and BE forwarding support across the advertising AS. The second "CoS Parameter Attribute" is of variable length and contains a more detailed description of available forwarding behaviours using the PHB id Co
APA, Harvard, Vancouver, ISO, and other styles
4

Tsumak, Dmitri. "Securing BGP using blockchain technology." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-247877.

Full text
Abstract:
The Border Gateway Protocol (BGP) is an important routing protocol used to exchangerouting information among autonomous systems on the Internet. The BGP version 4 doesnot include specific protection mechanisms against attacks or deliberate errors that couldcause disruptions of routing behavior. There were several securing solutions developedto mitigate security issues of BGP. In this thesis, current secure solutions are reviewedand evaluated against a list of security and deployment requirements. Furthermore, a newBGP securing solution is proposed which uses blockchain technology and smart con
APA, Harvard, Vancouver, ISO, and other styles
5

Nguyen, Lien K. "Predicting catastrophic BGP routing instabilities." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1642.

Full text
Abstract:
Approved for public release, distribution is unlimited<br>Inter-domain routing connects individual pieces of Internet topology, creating an integral, global data delivery infrastructure. Currently, this critical function is performed by the Border Gateway Protocol (BGP) version 4 [RFC1771]. Like all routing protocols, BGP is vulnerable to instabilities that reduce its effectiveness. Among the causes of these instabilities are those which are maliciously induced. Although there are other causes, e.g., natural events and network anomalies, this thesis will focus exclusively on maliciously induce
APA, Harvard, Vancouver, ISO, and other styles
6

Nguyen, Lien K. "Predicting catastrophic BGP routing instablities /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FNguyen.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jacquemart, Quentin. "Déceler les attaques par détournement BGP." Thesis, Paris, ENST, 2015. http://www.theses.fr/2015ENST0063/document.

Full text
Abstract:
Internet est constitué de milliers de systèmes autonomes (Autonomous Systems, AS) qui échangent des informations de routage grâce au protocole BGP (Border Gateway Protocol). Chaque AS attend des autres qu'il lui donne des informations de routage correctes, et leur accorde donc une confiance totale. Le détournement de préfixe (prefix hijacking) exploite cette confiance afin d'introduire des routes falsifiées. Les techniques qui détectent cette attaque génèrent un nombre important d'alertes, composé de faux positifs résultant d'opérations de routage courantes. Dans cette dissertation, nous cherc
APA, Harvard, Vancouver, ISO, and other styles
8

Jacquemart, Quentin. "Déceler les attaques par détournement BGP." Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0063.

Full text
Abstract:
Internet est constitué de milliers de systèmes autonomes (Autonomous Systems, AS) qui échangent des informations de routage grâce au protocole BGP (Border Gateway Protocol). Chaque AS attend des autres qu'il lui donne des informations de routage correctes, et leur accorde donc une confiance totale. Le détournement de préfixe (prefix hijacking) exploite cette confiance afin d'introduire des routes falsifiées. Les techniques qui détectent cette attaque génèrent un nombre important d'alertes, composé de faux positifs résultant d'opérations de routage courantes. Dans cette dissertation, nous cherc
APA, Harvard, Vancouver, ISO, and other styles
9

Knoll, Thomas Martin. "BGP Extended Community Attribute for QoS Marking." Universitätsbibliothek Chemnitz, 2008. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200800767.

Full text
Abstract:
This document specifies a simple signalling mechanism for inter-domain QoS marking using a BGP Extended Community QoS Attribute. Class based packet forwarding for delay and loss critical services is currently performed in an individual AS internal manner. The new QoS marking attribute makes the QoS class setup within the IP prefix advertising AS known to all access and transit ASes. This enables individual (re-)marking and forwarding treatment adaptation to the original QoS class setup of the respective IP prefix. The attribute provides the means to signal QoS markings on different layers,
APA, Harvard, Vancouver, ISO, and other styles
10

Rosa, José Luís da Silva. "Customer-side detection of BGP routing attacks." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/17808.

Full text
Abstract:
Mestrado em Engenharia de Computadores e Telemática<br>A utilização diária da Internet tornou-se uma rotina que foi assimilada pelas pessoas sem considerarem a complexidade interna desta gigante rede. Até um certo ponto, o Border Gateway Protocol é o que mantem toda esta conectividade possível apesar de ser um protocolo defeituoso por natureza. Em 2008, um ataque Man-In-The-Middle foi pela primeira vez apresentado ao grande público e desde de então mais técnicas para explorar este protocolo e obter tráfego alheio de forma ilícita foram dadas a conhecer. Mesmo que o desvio não aconteça c
APA, Harvard, Vancouver, ISO, and other styles
11

Stamatelatos, Nikolaos. "A measurement study of BGP Blackhole routing performance." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FStamatelatos.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering and M.S. in Computer Science)--Naval Postgraduate School, September 2006.<br>Thesis Advisor(s): Geoffrey Xie. "September 2006." Includes bibliographical references (p. 91). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
12

Harris, E. D. "Rate limiting in an event-driven BGP speaker." Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.603760.

Full text
Abstract:
The Border Gateway Protocol (BGP) is the Internet’s <i>interdomain</i> routing system  BGP is a global, distributed, peer-to-peer system consisting of tens of thousands of routers in the different networks which make up the Internet. Each BGP-speaking router, or <i>speaker</i>, is continually exchanging information with its neighbours about changes to the destinations to which it can send packets and the routes it uses to get there. However BGP is also just another application, competing for processor time and resources with all the other applications running on the same router. The way a rout
APA, Harvard, Vancouver, ISO, and other styles
13

Oprescu, Mihaela Iuniana. "Virtualization and distribution of the BGP control plane." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2012. http://tel.archives-ouvertes.fr/tel-00785007.

Full text
Abstract:
L'Internet est organisé sous la forme d'une multitude de réseaux appelés Systèmes Autonomes (AS). Le Border Gateway Protocol (BGP) est le langage commun qui permet à ces domaines administratifs de s'interconnecter. Grâce à BGP, deux utilisateurs situés n'importe o'u dans le monde peuvent communiquer, car ce protocole est responsable de la propagation des messages de routage entre tous les réseaux voisins. Afin de répondre aux nouvelles exigences, BGP a dû s'améliorer et évoluer à travers des extensions fréquentes et de nouvelles architectures. Dans la version d'origine, il était indispensable
APA, Harvard, Vancouver, ISO, and other styles
14

Antoshchenko, І. М. "Динамічна маршрутизація з використанням протоколу пограничної маршрутизації BGP". Master's thesis, Сумський державний університет, 2019. http://essuir.sumdu.edu.ua/handle/123456789/76457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Lychev, Robert D. "Evaluating security-enhanced interdomain routing protocols in full and partial deployment." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52325.

Full text
Abstract:
The Internet consists of over 50 thousand smaller networks, called Autonomous Systems (ASes) (e.g., AT&T, Sprint, Google), that use the Border Gateway Protocol (BGP) to figure out how to reach each other. One way or another, we all rely on BGP because it is what glues the Internet together, but despite its crucial role, BGP remains vulnerable to propagation of bogus routing information due to malicious attacks or unintentional misconfigurations. The United States Department of Homeland Security (DHS) views BGP security as part of its national strategy for securing the Internet, and there is a
APA, Harvard, Vancouver, ISO, and other styles
16

Tan, Guan Chye. "A performance analysis of BGP/MPLS VPN failover functionality." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FTan_Guan.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2006.<br>Thesis Advisor(s): Geoffrey Xie. "December 2006." Includes bibliographical references (p. 91-93). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
17

Keyston, Rebecca. "Homotypic and heterotypic adhesion mediated by biliary glycoprotein, BGP." Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=23900.

Full text
Abstract:
Glycophosphatidyl-inositol (GPI)-linked carcinoembryonic antigen (CEA) family members, including CEA itself, are absent in rodents and seem to have evolved recently. We have shown previously that CEA-CEA binding required for intercellular adhesion involves a double reciprocal interaction between the N-terminal (N domain) and internal A3B3 domains of anti-parallel molecules on apposed cell surfaces. To answer the question of whether this binding mechanism also evolved with CEA, the adhesive binding mechanism for transmembrane biliary glycoprotein (BGP), presumably more primordial, was investiga
APA, Harvard, Vancouver, ISO, and other styles
18

Miranda, Botelho Teixeira Ana Maria. "Structural analysis of the Bilary Glycoprotein (BGP) binding site." Thesis, University College London (University of London), 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Sobotka, David. "Simulační úlohy v NS2 ověřující znalosti protokolů BGP a multicastu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218733.

Full text
Abstract:
Network simulation can be beneficial not only in solving problems while applying new standards or recommendations, but also primarily an aid in understanding and verifying knowledge of behaviour of communications protocols. The aim of the thesis is to create illustrative tasks in the simulation environment, Network Simulator 2 (NS-2), which are designed to verify the behavior of BGP and multicast. Created tasks are above all devoted to BGP, which is the cornerstone of routing information of all IP networks conglomerate, the Internet. The first two tasks designed for BGP use the implementation
APA, Harvard, Vancouver, ISO, and other styles
20

Khalid, Muhammad Adnan, and Qamar Nazir. "Security Issue of BGP in complex Peering and Transit Networks." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2447.

Full text
Abstract:
<p>Border Gateway Protocol (BGP) is a critical routing protocol of the internet, used to</p><p>exchange routing information between autonomous systems (ASes). BGP is highly</p><p>vulnerable to many attacks that can cause routing disturbance on the internet. This</p><p>paper describes BGP attacks, misconfigurations, causes of misconfigurations, impact</p><p>of these attacks and misconfigurations in BGP and counter measures. Also we</p><p>analyze new security architectures for BGP, comparison of these security protocols</p><p>and their deployment issues. At the end we propose new security soluti
APA, Harvard, Vancouver, ISO, and other styles
21

Knoll, Thomas Martin. "A Concept of inter-AS Priority Signaling using BGP Attributes." Universitätsbibliothek Chemnitz, 2009. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200900238.

Full text
Abstract:
The increasing number of delay and loss critical services in packet networks require differentiated packet handling in the forwarding plane. Quality of Service (QoS) guarantees can be given for networks using resource reservation and admission control. However, such strategies require complex control plane extensions and might lead to higher operation expenditures. Network operators therefore often use over-provisioning and traffic differentiation to offer cheaper class of service quality in their internet protocol (IP) packet networks. Priority marking and forwarding of packetized data traffi
APA, Harvard, Vancouver, ISO, and other styles
22

Aputis, Artūras. "DDoS (distributed denial of service) atakų atrėmimo algoritmų tyrimas ir modeliavimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_095501-14832.

Full text
Abstract:
Šiuo metu yra sukurta nemažai priemonių aptikti įvairiausias DDoS atakas, tačiau siekiant sustabdyti arba bent sušvelninti DDoS atakų poveikį yra nuveikta labai nedaug. Yra labai sunku pasirinkti tinkamą DDoS atakos atrėmimo metodą. DDoS atakų atrėmimo metodų analizė galėtų padėti pasirinkti tinkamiausią metodą. „BGP DDoS Diversion“ atakų atrėmimo metodas yra vienas efektyviausių ir mažiausiai kaštų reikalaujantis metodas. Šis metodas įgyvendinamas panaudojant BGP protokolą. Ataka yra atremiama kuomet BGP protokolo pagalba yra paskelbiama tik dalis tinklo. DDoS atakos duomenų srautas tokiu atv
APA, Harvard, Vancouver, ISO, and other styles
23

Khanafer, Mounib. "Extending BGP protocol to achieve inter-domain routing in optical networks." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27465.

Full text
Abstract:
The revolution of Internet and its popularity among millions of users has resulted in significant increase in the data traffic carried by today's telecommunications networks. The evolution of optical networks, along with its ingenious technologies like Wavelength Division Multiplexing (WDM), has played a critical role in coping with that huge data traffic. However, the unusual growth in the number of users has been paralleled by a similar growth in the size of the networks. The latter has complicated the task of network management and mandated the need to segregate huge networks into several a
APA, Harvard, Vancouver, ISO, and other styles
24

Nédellec, Patrick. "Characterization and functional studies of the mouse biliary glycoprotein (Bgp) genes." Thesis, McGill University, 1995. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=29094.

Full text
Abstract:
Adhesion molecules are present throughout embryonic development and during several physiological and pathological processes. Biliary glycoproteins (Bgp) are cell adhesion molecules that belong to the carcinoembryonic antigen (CEA) family, a member of the Ig supergene family. In an attempt to develop a relevant mouse model, we characterized the gene organization, regulation and expression patterns of the mouse Bgp1 gene. The mouse Bgp1 gene is down-regulated upon tumor transformation. This phenomenon has been correlated with a change in the methylation state of the promoter region of the mouse
APA, Harvard, Vancouver, ISO, and other styles
25

Scott, Ben. "Advancing BGP anomaly detection: Multidimensional recurrence quantification analysis and matrix profile." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2887.

Full text
Abstract:
The Border Gateway Protocol (BGP) is the essential interdomain routing protocol for global connectivity, enabling the efficient routing of Internet traffic. However, inherent vulnerabilities expose BGP to various security threats, from benign misconfigurations to malicious attacks designed to disrupt network operations. Established detection frameworks and techniques often rely on extensive feature sets, specialised tuning, and intensive computation, which may not scale effectively or adapt to evolving threats. Traditionally, BGP anomaly detection has focused on single points of observation an
APA, Harvard, Vancouver, ISO, and other styles
26

Agrawal, Mukesh. "Spare a Little Change? Towards a 5-Nines Internet in 250 Lines of Code." Research Showcase @ CMU, 2011. http://repository.cmu.edu/dissertations/51.

Full text
Abstract:
From its beginnings as a single link between two research institutions in 1969, the Internet has grown in size and scope, to become a global internetwork connecting over 700 million computers, and 1.7 billion users. No longer a niche facility for scientific collaboration, the Internet now touches the lives of the world’s population, irrespective of their occupation or geography. It is used by people the world over, to pay bills, read the news, listen to music, watch videos, telephone or video-conference friends and family, and much more. The Internet is the premier communications network of ou
APA, Harvard, Vancouver, ISO, and other styles
27

Carvalho, Filipe André Luís Ribeiro de. "Tratamento pela periferia de falhas na internet." Master's thesis, Faculdade de Ciências e Tecnologia, 2012. http://hdl.handle.net/10362/8490.

Full text
Abstract:
Dissertação para obtenção do Grau de Mestre em Engenharia Informática<br>O crescimento da Internet acabou por evidenciar um conjunto de limitações que o desenho da mesma possui, tanto ao nível do encaminhamento como da arquitectura. O protocolo de encaminhamento usado (i.e. Border Gateway Protocol) apresenta deficiências para lidar com os actuais requisitos da Internet, que se agravam cada vez mais, levando a que o tempo de convergência do sistema em caso de falhas se esteja a tornar elevado e difícil de tratar. A juntar aos problemas inerentes ao protocolo, existem cada vez mais sistem
APA, Harvard, Vancouver, ISO, and other styles
28

Mazloum, Riad. "La caractérisation du routage dans l'Internet à l'aide des mesures IP et BGP." Thesis, Paris 6, 2016. http://www.theses.fr/2016PA066668.

Full text
Abstract:
Internet est le résultat de l’interaction des milliers de réseaux qui le composent. On les appelle les systèmes autonomes, chacun est identifié par un numéro unique (ASN). Les politiques de routage des AS et les accords économiques restent confidentiels normalement. Afin de mieux comprendre le routage dans l’Internet, les chercheurs modèlent le routage. Le model souvent utilisé c’est la représentation d’un AS par un atome. Nous présentons trois contributions dans ce travail. On montre d’abord des contradictions entre les décisions de routage réellement faites et les inférences à partir d’un en
APA, Harvard, Vancouver, ISO, and other styles
29

Alshamrani, Hussain Hameed. "Detecting IP prefix hijack events using BGP activity and AS connectivity analysis." Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/9566.

Full text
Abstract:
The Border Gateway Protocol (BGP), the main component of core Internet connectivity, suffers vulnerability issues related to the impersonation of the ownership of IP prefixes for Autonomous Systems (ASes). In this context, a number of studies have focused on securing the BGP through several techniques, such as monitoring-based, historical-based and statistical-based behavioural models. In spite of the significant research undertaken, the proposed solutions cannot detect the IP prefix hijack accurately or even differentiate it from other types of attacks that could threaten the performance of t
APA, Harvard, Vancouver, ISO, and other styles
30

El, Hassad Sara. "Learning commonalities in RDF & SPARQL." Thesis, Rennes 1, 2018. http://www.theses.fr/2018REN1S011/document.

Full text
Abstract:
La recherche de points communs entre des descriptions de données ou de connaissances est un problème de raisonnement fondamental en Machine Learning, qui a été formalisé par G. Plotkin dans les années 70s sous la forme du calcul du plus petit généralisant de ces descriptions. L'identification des plus petits généralisants a un large panel d'applications qui vont de l'optimisation de requêtes (e.g., pour matérialiser les points communs entre des requêtes lors de la sélection de vues ou pour factoriser leur exécution dans un contexte d'accès concurrentiel), à la recommandation dans le contexte d
APA, Harvard, Vancouver, ISO, and other styles
31

Dimitropoulos, Christos Xenofontas A. "Measuring and Modeling Internet Routing for Realistic Simulations." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11471.

Full text
Abstract:
The Internet is composed of thousands of diverse networks that exchange routing information using the Border Gateway Protocol (BGP). BGP is one of the most critical protocols of the Internet, since it connects these diverse networks to enable communication between remote domains. Despite its critical nature, BGP suffers from a variety of serious problems, which have triggered substantial research on developing improved versions of BGP and new routing architectures. In this dissertation, we introduce necessary tools and data-mining techniques for analyzing the present routing architecture and f
APA, Harvard, Vancouver, ISO, and other styles
32

Namjoshi, Aditya. "EXTENDING AND ENHANCING GT-ITM." UKnowledge, 2006. http://uknowledge.uky.edu/gradschool_theses/232.

Full text
Abstract:
GT-ITMis a topology generation tool. Since its release GTITMis widely used in the scientific community for network simulations. GTITM is extended to support routing on its topology. The routing algorithm used for interdomain routing attempts to emulate the BGP routing protocol seen on the internet. It uses a policy file if supplied to make routing decisions. An additional functionality provided with the tool is the ability to automatically generate policy file for large graphs.
APA, Harvard, Vancouver, ISO, and other styles
33

Öhlin, Anton, and Sebastian Viking. "MPLS kontra traditionell IP-routing : en jämförelse av resursåtgång." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-12813.

Full text
Abstract:
Multi Protocol Label Switching (MPLS) är en routingteknik som blir allt vanligare i dagens nätverk. Vid implementation av MPLS i nätverk är det grundläggande att hårdvaran har tillräckligt hög prestanda för att hantera tekniken. Om så inte är fallet kan det leda till negativa konsekvenser såsom paketförluster eller i värsta fall att routern havererar. Syftet med arbetet var att ta reda på hur processorbelastningen på en router skiljer sig när MPLS var implementerat jämfört med traditionell IP-routing. Routingprotokollen BGP, OSPF och RIP användes tillsammans med de olika routingteknikerna för
APA, Harvard, Vancouver, ISO, and other styles
34

Mazloum, Riad. "La caractérisation du routage dans l'Internet à l'aide des mesures IP et BGP." Electronic Thesis or Diss., Paris 6, 2016. http://www.theses.fr/2016PA066668.

Full text
Abstract:
Internet est le résultat de l’interaction des milliers de réseaux qui le composent. On les appelle les systèmes autonomes, chacun est identifié par un numéro unique (ASN). Les politiques de routage des AS et les accords économiques restent confidentiels normalement. Afin de mieux comprendre le routage dans l’Internet, les chercheurs modèlent le routage. Le model souvent utilisé c’est la représentation d’un AS par un atome. Nous présentons trois contributions dans ce travail. On montre d’abord des contradictions entre les décisions de routage réellement faites et les inférences à partir d’un en
APA, Harvard, Vancouver, ISO, and other styles
35

Dinitz, Michael. "Algorithms and Models for Problems in Networking." Research Showcase @ CMU, 2010. http://repository.cmu.edu/dissertations/9.

Full text
Abstract:
Many interesting theoretical problems arise from computer networks. In this thesis we will consider three of them: algorithms and data structures for problems involving distances in networks (in particular compact routing schemes, distance labels, and distance oracles), algorithms for wireless capacity and scheduling problems, and algorithms for optimizing iBGP overlays in autonomous systems on the Internet. While at first glance these problems may seem extremely different, they are similar in that they all attempt to look at a previously studied networking problem in new, more realistic frame
APA, Harvard, Vancouver, ISO, and other styles
36

Assunção, Cláudio Fernando Sequeira. "Hybrid link-state path-vector protocol ++." Master's thesis, Faculdade de Ciências e Tecnologia, 2012. http://hdl.handle.net/10362/7561.

Full text
Abstract:
Dissertação para obtenção do Grau de Mestre em Engenharia Electrotécnica e de Computadores Mestrado Integrado em Engenharia Electrotécnica e de Computadores<br>O protocolo usado actualmente na Internet para realizar encaminhamento inter-domínio é o BGP (Border Gateway Protocol). Este protocolo foi desenhado para obter acessibilidade dos domínios e não está preparado para todos os requisitos das redes modernas, sofrendo de problemas graves, como convergência lenta e escalabilidade limitada. O protocolo HLP (Hybrid Link-state Path-vector) foi proposto como uma possível solução para estes proble
APA, Harvard, Vancouver, ISO, and other styles
37

Mikulecký, Miloš. "Laboratorní úlohy v prostředí OPNET pro předmět Pokročilé komunikační techniky." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219482.

Full text
Abstract:
The Master´s Thesis describes laboratory exercises for Advanced communication technology subject. Exercises are created in Opnet IT Guru aplication. Each exercise has detailed instructions according to which can be realized whole exercise. Each exercise also contains individual task, where are checked knowledge gained from studies of example exercise. Exercises are based on issues of routing in autonomous systems, protocol BGP, protocols TCP and UDP and issues of QoS in IP networks.
APA, Harvard, Vancouver, ISO, and other styles
38

Karlík, Martin. "Rozbor protokolů CISCO sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-242154.

Full text
Abstract:
ABSTRACT Bc.Karlík, Martin Department of Telecommunications, Faculty of Electrical Engineering and Communication, Brno University of Technology. Analysis of CISCO networking protocols This semestral thesis is focused on CISCO networks and protocols like MPLS, BGP, Ipv4, Ipv6, Multicast – sprase / dense mode. The task was study of those protocols and design and implement lab excercise with one of those protocols by using free network simulator GNS3. In this excercise is used CISCO router 3745.
APA, Harvard, Vancouver, ISO, and other styles
39

Del, Fiore Julian Martin. "Detecting hidden broken pieces of the Internet : BGP lies, forwarding detours and failed IXPs." Thesis, Strasbourg, 2021. http://www.theses.fr/2021STRAD001.

Full text
Abstract:
L'objectif de cette thèse est de détecter des éléments défaillants d'Internet. Tout d'abord,nous étudions le déploiement des points d'échange Internet (IXP) en Amérique latine et constatons que certains pays sont en situation d'échec dans leur déploiement IXP, c'est-à-dire aucun IXP du tout, ou bien que l'IXP n'a pas réussi à attirer suffisamment de membres. Deuxièmement, nous étudions BGP, le protocole de routage utilisé sur Internet, et en particulier s'il existe des mensonges BGP, c’est à dire si les routes par lesquelles les paquets circulent réellement sur Internet divergent des chemins q
APA, Harvard, Vancouver, ISO, and other styles
40

Falgert, Marcus. "Geo-distributed application deployment assistance based on past routing information." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-206970.

Full text
Abstract:
Cloud computing platforms allow users to deploy geographically distributed applications on servers around the world. Applications may be simple to deploy on these platforms, but it is up to the user and the application to decide which regions and servers to use for application placement. Furthermore, network conditions and routing between the geo-distributed servers change over time, which can lead to sub-optimal performance of applications deployed on such servers. A user could either employ a static deployment configuration of servers, or attempt to use a more dynamic configuration. However,
APA, Harvard, Vancouver, ISO, and other styles
41

Misseri, Xavier. "Vers une utilisation de la diversité de chemins dans l'internet." Thesis, Paris, ENST, 2013. http://www.theses.fr/2013ENST0057/document.

Full text
Abstract:
Nous considérons, dans cette thèse, un nouveau service par lequel les opérateurs de télécommunications offrent des routes supplémentaires à leurs clients (en plus de la route par défaut) comme un service gratuit ou à valeur ajoutée. Ces routes supplémentaires peuvent être utilisées par des clients afin d’optimiser leurs communications, en outrepassant des points de congestion d’Internet, ou les aider à atteindre leurs objectifs d’ingénierie de trafic (meilleurs délais etc.) ou dans un but de robustesse. Nous proposons d’abord une architecture simple permettant à un opérateur de télécommunicati
APA, Harvard, Vancouver, ISO, and other styles
42

Hiran, Rahul Gokulchand. "Collaborative Network Security: Targeting Wide-area Routing and Edge-network Attacks." Doctoral thesis, Linköpings universitet, Databas och informationsteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131959.

Full text
Abstract:
To ensure that services can be delivered reliably and continuously over theInternet, it is important that both Internet routes and edge networks aresecured. However, the sophistication and distributed nature of many at-tacks that target wide-area routing and edge networks make it difficult foran individual network, user, or router to detect these attacks. Thereforecollaboration is important. Although the benefits of collaboration betweendifferent network entities have been demonstrated, many open questionsstill remain, including how to best design distributed scalable mechanismsto mitigate att
APA, Harvard, Vancouver, ISO, and other styles
43

Babjarčiková, Lenka. "Návrh nových laboratorních úloh pro výuku principů komunikačních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442405.

Full text
Abstract:
The aim of this master thesis is to create two laboratory exercises in ns-3 network simulator for chosen communication protocols. The chosen protocols are BGP and ICMPv6. The first part of this thesis contains teoretical knowledge used in order to design laboratory exercise. It contains descriptions of funcionality of both protocols and messages they use. This chapter also includes brief description of three options which were considered for implementation of BGP protocol into ns-3 enviroment. The second chapter consists of actual laboratory exercises which were created as a purpose of this th
APA, Harvard, Vancouver, ISO, and other styles
44

Lam, Fung. "Internet inter-domain traffic engineering and optimizatioon /." Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk:8888/cgi-bin/hkuto%5Ftoc%5Fpdf?B23273173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Frisk, Johan. "Cross Continental Access of Information and the Boarder Gateway Protocol." Thesis, Linköpings universitet, Databas och informationsteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-153880.

Full text
Abstract:
The usage of technical equipment and the interconnection of all these devices has become essential to our every day life and to provide as good service as possible for the internet of today. However, many have the opportunity to inspect the data as it is being rushed across the globe to provide users with information at the press of a button. This study examines the routing patterns from hundred thousands of trace routes going from user to server around the globe. Using this trace data, we demonstrate not only the number of companies involved in data transfers on other continents then where th
APA, Harvard, Vancouver, ISO, and other styles
46

Sepúlveda, Rojas Pablo Ignacio. "Sanidad de las Rutas Chilenas en Internet." Tesis, Universidad de Chile, 2010. http://repositorio.uchile.cl/handle/2250/103935.

Full text
Abstract:
Internet es una red de redes; para poder comunicarse, se debe encontrar un camino entre el emisor y el receptor. El protocolo más usado para encontrar caminos entre redes distantes es Border Gateway Protocol (BGP). Este protocolo se basa en la confianza, por lo que es vulnerable a ataques y a errores de configuración, además, estos errores se propagan rápidamente, pudiendo afectar una parte considerable de Internet. Por esto se hace necesario contar con herramientas que detecten estos problemas. Cada red se dice visible desde algún punto, si desde ese punto se puede enviar información hacia es
APA, Harvard, Vancouver, ISO, and other styles
47

Grandhomme, Florian. "Protocole de routage externe type BGP dans un environnement réseaux tactiques adhoc mobiles : faisabilité et performances." Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1S069/document.

Full text
Abstract:
Les théâtres d’opérations militaires s’organisent aujourd’hui sous la forme de coalitions. Les forces armées qui sont déployées possèdent des moyens technologiques (communication, routage) et créent des réseaux sans fil. Le mouvement de ces forces sur le terrain donne au réseau une topologie fortement dynamique. Il se caractérise comme un réseau sans fil mobile, plus communément appelé MANET (Mobile Ad hoc NETwork). Pour l’efficacité de la mission et des communications, il est intéressant d’interconnecter facilement les différents groupes participant à la coalition. Cependant, chaque membre de
APA, Harvard, Vancouver, ISO, and other styles
48

VIENJIPURAM, KRISHNA KUMARAN, and ASMEER BABU ABDUL. "Improving the Quality of Multicast Networks by Using the OPNET Modeler." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2432.

Full text
Abstract:
This thesis presents different Internet Protocol (IP) multicasting design models and together with their implementation methods in OPNET Modeler 14.5. The models presented in this report are designed for handling various types of advanced multimedia applications and services when using the multicast communication paradigm. The architectural models presented in this thesis are independent of the routing protocols used as well as of the underlying networking environment. Several exiting challenges related to high bandwidth requirements, low network delay, and jitter are discussed together with t
APA, Harvard, Vancouver, ISO, and other styles
49

Karlsson, Jimmy. "Border Gateway Protocol : Implementationer på stubnätverk." Thesis, University of Skövde, School of Humanities and Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4062.

Full text
Abstract:
<p>Arbetet tar upp BGP-multihoming för mindre organisationer. Den jämför ett kommersiell alternativ mot open source-alternativ. Detta är för att se vad som krävs en av open source-lösning för ge konkurrens på routermarknaden, samt besparingar för organisationer som ska använda denna lösning.Praktiska och teoretiska jämförelser görs där Cisco-lösningar jämförs med OpenBGPD. Datan utifrån dessa tester används för att svara på problemfrågan. Sammanfattningsvis har open source produkter en fördel hårdvarumässigt på grund av lägre kostnader medan kommersiella har stora fördelar då de förlitar sig p
APA, Harvard, Vancouver, ISO, and other styles
50

Jaafar, Talal Mohamed. "Simulation-Based Routing Protocols Analyses." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16197.

Full text
Abstract:
A new approach to distributed network simulations that eases the burdens on the simulation developer in creating space-parallel simulations is presented. It provides a full-topology knowledge for every federate (simulator instance) to make the best routing decision to destinations simulated at other federates. Later, this technique was used to characterize the benefits of IP Anycast mechanism at large scale. Different IP Anycast scenarios were simulated in a detailed Border Gateway Protocol (BGP) simulator using a realistic large-scale AS topology. Results indicated that Anycast indeed pro
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!