Academic literature on the topic 'Multicast Border Gateway Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multicast Border Gateway Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Multicast Border Gateway Protocol"

1

Xie, J., S. Nandi, A. K. Gupta, and A. Das. "Gateway-based multicast protocol – a novel multicast protocol for mobile ad hoc networks." IEE Proceedings - Communications 152, no. 6 (2005): 811. http://dx.doi.org/10.1049/ip-com:20045207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kent, S., C. Lynn, and K. Seo. "Secure Border Gateway Protocol (S-BGP)." IEEE Journal on Selected Areas in Communications 18, no. 4 (2000): 582–92. http://dx.doi.org/10.1109/49.839934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

GUO, Hui, and Jin-yi CHANG. "Survey on convergence problem of border gateway protocol." Journal of Computer Applications 30, no. 10 (2010): 2628–31. http://dx.doi.org/10.3724/sp.j.1087.2010.02628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mastilak, Lukas, Marek Galinski, Pavol Helebrandt, Ivan Kotuliak, and Michal Ries. "Enhancing Border Gateway Protocol Security Using Public Blockchain." Sensors 20, no. 16 (2020): 4482. http://dx.doi.org/10.3390/s20164482.

Full text
Abstract:
Communication on the Internet consisting of a massive number of Autonomous Systems (AS) depends on routing based on Border Gateway Protocol (BGP). Routers generally trust the veracity of information in BGP updates from their neighbors, as with many other routing protocols. However, this trust leaves the whole system vulnerable to multiple attacks, such as BGP hijacking. Several solutions have been proposed to increase the security of BGP routing protocol, most based on centralized Public Key Infrastructure, but their adoption has been relatively slow. Additionally, these solutions are open to
APA, Harvard, Vancouver, ISO, and other styles
5

Agarwal, Arushi, and Ayushi Pandey. "Reducing convergence time along with improvement in path service quality of border gateway protocol." International Journal of Engineering & Technology 7, no. 2.31 (2018): 203. http://dx.doi.org/10.14419/ijet.v7i2.31.13441.

Full text
Abstract:
Border Gateway Protocol (BGP) is an exterior gateway routing protocol used between various autonomous systems across the internet. BGP helps in selecting the best route for the transmission of data among the users. The transmission policy followed by BGP should be such that it should increase BGP routing performances. This work aims to reduce the convergence time of the network with the improvement of QOS (Quality of Service) in the routing of Border Gateway Protocol. Our results show that we can obtain a reduced framework environment which has a best routing path with better energy and qualit
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Chen, Bin Sun, Yi-xian Yang, and Yan Yang. "A Lightweight Mechanism for Border Gateway Protocol Path Verification." Journal of Electronics & Information Technology 34, no. 9 (2013): 2167–73. http://dx.doi.org/10.3724/sp.j.1146.2012.00285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Bradley R., and J. J. Garcia-Luna-Aceves. "Efficient security mechanisms for the border gateway routing protocol." Computer Communications 21, no. 3 (1998): 203–10. http://dx.doi.org/10.1016/s0140-3664(97)00186-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, K., and C. Hu. "Border gateway protocol monitoring system can be cost effective." IET Communications 5, no. 15 (2011): 2231–40. http://dx.doi.org/10.1049/iet-com.2010.0432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

claffy, kc. "Border gateway protocol (BGP) and traceroute data workshop report." ACM SIGCOMM Computer Communication Review 42, no. 3 (2012): 28–31. http://dx.doi.org/10.1145/2317307.2317313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bonaventure, O., A. Feldmann, L. Gao, T. Griffin, and Z. M. Mao. "Guest editorial - Interdomain routing and the border gateway protocol." IEEE Network 19, no. 6 (2005): 3–4. http://dx.doi.org/10.1109/mnet.2005.1541714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Multicast Border Gateway Protocol"

1

Khan, Shahzad Hayat, and Jehan Badshah. "Multicasting in Intra and Inter Domain Networks." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-14637.

Full text
Abstract:
Multicasting in a network improves the efficiency to deliver an IP packet to multiple clients at the same time. Small to medium sized organizations implement this technology to enhance their network capability, which is otherwise not possible just with normal routing. However, to use this technology, it requires proper network design with tidy resource implementation.Network administrators prefer automatic deployment of multicast technology because it reduces the potential risk of prolonged down time during network troubleshooting. On the other hand, choosing an auto deployment technology coul
APA, Harvard, Vancouver, ISO, and other styles
2

Karlsson, Jimmy. "Border Gateway Protocol : Implementationer på stubnätverk." Thesis, University of Skövde, School of Humanities and Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4062.

Full text
Abstract:
<p>Arbetet tar upp BGP-multihoming för mindre organisationer. Den jämför ett kommersiell alternativ mot open source-alternativ. Detta är för att se vad som krävs en av open source-lösning för ge konkurrens på routermarknaden, samt besparingar för organisationer som ska använda denna lösning.Praktiska och teoretiska jämförelser görs där Cisco-lösningar jämförs med OpenBGPD. Datan utifrån dessa tester används för att svara på problemfrågan. Sammanfattningsvis har open source produkter en fördel hårdvarumässigt på grund av lägre kostnader medan kommersiella har stora fördelar då de förlitar sig p
APA, Harvard, Vancouver, ISO, and other styles
3

Santori, Alessandro. "Analisi e critica del Border Gateway Protocol." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amslaurea.unibo.it/1639/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Desai, Ushesh K. "A non-intrusive approach to secure the Border Gateway Protocol." Connect to online resource, 2007. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1447668.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khalid, Muhammad Adnan, and Qamar Nazir. "Security Issue of BGP in complex Peering and Transit Networks." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2447.

Full text
Abstract:
<p>Border Gateway Protocol (BGP) is a critical routing protocol of the internet, used to</p><p>exchange routing information between autonomous systems (ASes). BGP is highly</p><p>vulnerable to many attacks that can cause routing disturbance on the internet. This</p><p>paper describes BGP attacks, misconfigurations, causes of misconfigurations, impact</p><p>of these attacks and misconfigurations in BGP and counter measures. Also we</p><p>analyze new security architectures for BGP, comparison of these security protocols</p><p>and their deployment issues. At the end we propose new security soluti
APA, Harvard, Vancouver, ISO, and other styles
6

Baball, Kavita 1977. "Distribution of certificates, CRLs and address attestations in the Secure Border Gateway Protocol." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87183.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.<br>Includes bibliographical references (leaves 95-96).<br>by Kavita Baball.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
7

White, Cory B. "A Neural Network Approach to Border Gateway Protocol Peer Failure Detection and Prediction." DigitalCommons@CalPoly, 2009. https://digitalcommons.calpoly.edu/theses/215.

Full text
Abstract:
The size and speed of computer networks continue to expand at a rapid pace, as do the corresponding errors, failures, and faults inherent within such extensive networks. This thesis introduces a novel approach to interface Border Gateway Protocol (BGP) computer networks with neural networks to learn the precursor connectivity patterns that emerge prior to a node failure. Details of the design and construction of a framework that utilizes neural networks to learn and monitor BGP connection states as a means of detecting and predicting BGP peer node failure are presented. Moreover, this frame
APA, Harvard, Vancouver, ISO, and other styles
8

Israr, Junaid. "Design of Lightweight Alternatives to Secure Border Gateway Protocol and Mitigate against Control and Data Plane Attacks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22812.

Full text
Abstract:
Border Gateway Protocol (BGP) is the backbone of routing infrastructure in the Internet. In its current form, it is an insecure protocol with potential for propagation of bogus routing information. There have been several high-profiles Internet outages linked to BGP in recent times. Several BGP security proposals have been presented in the literature; however, none has been adopted so far and, as a result, securing BGP remains an unsolved problem to this day. Among existing BGP security proposals, Secure BGP (S-BGP) is considered most comprehensive. However, it presents significant challenges
APA, Harvard, Vancouver, ISO, and other styles
9

Misseri, Xavier. "Vers une utilisation de la diversité de chemins dans l'internet." Thesis, Paris, ENST, 2013. http://www.theses.fr/2013ENST0057/document.

Full text
Abstract:
Nous considérons, dans cette thèse, un nouveau service par lequel les opérateurs de télécommunications offrent des routes supplémentaires à leurs clients (en plus de la route par défaut) comme un service gratuit ou à valeur ajoutée. Ces routes supplémentaires peuvent être utilisées par des clients afin d’optimiser leurs communications, en outrepassant des points de congestion d’Internet, ou les aider à atteindre leurs objectifs d’ingénierie de trafic (meilleurs délais etc.) ou dans un but de robustesse. Nous proposons d’abord une architecture simple permettant à un opérateur de télécommunicati
APA, Harvard, Vancouver, ISO, and other styles
10

Falgert, Marcus. "Geo-distributed application deployment assistance based on past routing information." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-206970.

Full text
Abstract:
Cloud computing platforms allow users to deploy geographically distributed applications on servers around the world. Applications may be simple to deploy on these platforms, but it is up to the user and the application to decide which regions and servers to use for application placement. Furthermore, network conditions and routing between the geo-distributed servers change over time, which can lead to sub-optimal performance of applications deployed on such servers. A user could either employ a static deployment configuration of servers, or attempt to use a more dynamic configuration. However,
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Multicast Border Gateway Protocol"

1

Technology, National Institute of Standards and. Border Gateway Protocol Security. CreateSpace Independent Publishing Platform, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Big book of border gateway protocol (BGP) RFCs. Morgan Kaufmann, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Inc, Cisco Systems. Ip Routing: Border Gateway Protocol (Bgp) (Cisco Interactive Mentor). Cisco Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Beijnum, Iljitsch van. Bgp: Building Reliable Networks with the Border Gateway Protocol. O'Reilly Media, Incorporated, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Loshin, Peter, ed. Big Book of Border Gateway Protocol (BGP) RFCs (Big Book (Morgan Kaufmann)). Academic Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

López Echeverry, Ana María, Ramírez Giraldo Miller, and Penagos Granada Edward Fabián. Guía de Implementación de los Protocolos Border Gateway Protocol (BGP) y Multiprotocol Label Switching (MPLS). Universidad Tecnológica de Pereira, 2018. http://dx.doi.org/10.22517/9789587223156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Newman, Mark. Technological networks. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198805090.003.0002.

Full text
Abstract:
An introduction to technological networks and their measurement. The internet is discussed at some length, including a description of its overall structure, methods for measuring it based on traceroute and the Border Gateway Protocol, and representations of the network at the level of routers, domains, and autonomous systems. Other technological networks discussed in this chapter include the telephone network, power grids, transportation networks, and distribution networks.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Multicast Border Gateway Protocol"

1

Paul, Sanjoy. "Border Gateway Multicast Protocol (BGMP)." In Multicasting on the Internet and its Applications. Springer US, 1998. http://dx.doi.org/10.1007/978-1-4615-5713-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Aweya, James. "Border Gateway Protocol (BGP)." In IP Routing Protocols. CRC Press, 2021. http://dx.doi.org/10.1201/9781003149019-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kent, Stephen T. "Securing the Border Gateway Protocol: A Status Update." In Communications and Multimedia Security. Advanced Techniques for Network and Data Protection. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45184-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vadakkepalisseri, Manoj V. N., and K. Chandrashekaran. "Border Gateway Routing Protocol Convergence Time Analysis with Minimum Route Advertisement Information." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Beyene, Asrat Mulatu, and Shimelis Asrat Argaw. "Improving Quality of Service of Border Gateway Protocol Multiprotocol Label Switching Virtual Private Network of EthioTelecom Service Level Agreements." In Communications in Computer and Information Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26630-1_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Goralski, Walter. "Border Gateway Protocol." In The Illustrated Network. Elsevier, 2017. http://dx.doi.org/10.1016/b978-0-12-811027-0.00016-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Goralski, Walter. "Border Gateway Protocol." In The Illustrated Network. Elsevier, 2009. http://dx.doi.org/10.1016/b978-0-12-374541-5.50022-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Aboelela, Emad. "BGP: Border Gateway Protocol." In Network Simulation Experiments Manual. Elsevier, 2012. http://dx.doi.org/10.1016/b978-0-12-385210-6.00008-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chakraborty, Suvradip, and Bhaskar Sardar. "Security in Border Gateway Protocol (BGP)." In Encyclopedia of Information Science and Technology, Third Edition. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-5888-2.ch682.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Mutairi, Abdulrahman, and Stephen D. Wolthusen. "A Security Analysis of MPLS Service Degradation Attacks Based on Restricted Adversary Models." In Information Security in Diverse Computing Environments. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-6158-5.ch008.

Full text
Abstract:
Whilst the security and integrity of exterior gateway protocols such as the Border Gateway Protocol (BGP) and, to a lesser extent, interior gateway protocols, including the Multi-Protocol Label Switching (MPLS), have been investigated previously, more limited attention has been paid to the problem of availability and timeliness that is crucial for service levels needed in critical infrastructure areas such as financial services and electric power (smart grid) networks. The authors describe a method for modeling adversaries for the analysis of attacks on quality of service characteristics underpinning such real-time networks as well as a model of policies employed by MPLS routers based on simplified networks and give an analysis of attack vectors based on assumed adversaries derived from the introduced method.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Multicast Border Gateway Protocol"

1

Shan, Baosong, Xiangzhi Sheng, and Tian Jin. "Border Media Gateway: Extending Multimedia Multicast Gateway to Support Inter-AS Conferencing." In 2006 International Conference on Communication Technology. IEEE, 2006. http://dx.doi.org/10.1109/icct.2006.341881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Karimi, Mohsen, Ali Jahanshahi, Abbas Mazloumi, and Hadi Zamani Sabzi. "Border Gateway Protocol Anomaly Detection Using Neural Network." In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9006201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kaddoura, Maher, Barry Trent, Ranga Ramanujan, and Gregory Hadynski. "BGP-MX: Border Gateway Protocol with Mobility Extensions." In MILCOM 2011 - 2011 IEEE Military Communications Conference. IEEE, 2011. http://dx.doi.org/10.1109/milcom.2011.6127755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bendale, Shailesh P., and Girish V. Chowdhary. "Stable path selection and safe backup routing for Optical Border Gateway Protocol (OBGP) and Extended Optical Border Gateway Protocol (OBGP+)." In 2012 International Conference on Communication, Information & Computing Technology (ICCICT). IEEE, 2012. http://dx.doi.org/10.1109/iccict.2012.6398201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Reina Alzate, Jackson, and Roberto Carlos Hincapie Reyes. "Evaluation of improvement proposals for Border Gateway Protocol (BGP)." In 2012 IEEE Colombian Communications Conference (COLCOM). IEEE, 2012. http://dx.doi.org/10.1109/colcomcon.2012.6233645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abaid, Almekdad, Mahmoud Hraib, Abdulrazig Ben Ghazzi, and Salem Sati. "Convergence Time Analysis of Border Gateway Protocol Using GNS3." In 2021 IEEE 1st International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering MI-STA. IEEE, 2021. http://dx.doi.org/10.1109/mi-sta52233.2021.9464522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chang, George, Majid Arianezhad, and Ljiljana Trajkovic. "Using resource public key infrastructure for secure border gateway protocol." In 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2016. http://dx.doi.org/10.1109/ccece.2016.7726675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mujtaba, Muhammad, Priyadarsi Nanda, and Xiangjian He. "Border Gateway Protocol Anomaly Detection Using Failure Quality Control Method." In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. http://dx.doi.org/10.1109/trustcom.2012.100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lina Ding, Xingwei Wang, Fuliang Li, and Min Huang. "A parallel processing method for Border Gateway Protocol UPDATE messages." In 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE, 2015. http://dx.doi.org/10.1109/fskd.2015.7382265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Israr, Junaid, Mouhcine Guennoun, and Hussein T. Mouftah. "Analysis of impact of trust on Secure Border Gateway Protocol." In 2011 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2011. http://dx.doi.org/10.1109/iscc.2011.5983852.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Multicast Border Gateway Protocol"

1

Thaler, D. Border Gateway Multicast Protocol (BGMP): Protocol Specification. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lougheed, K., and Y. Rekhter. Border Gateway Protocol (BGP). RFC Editor, 1990. http://dx.doi.org/10.17487/rfc1163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kuhn, D. R., K. Sriram, and D. C. Montgomery. Border gateway protocol security. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lougheed, K., and Y. Rekhter. Border Gateway Protocol (BGP). RFC Editor, 1989. http://dx.doi.org/10.17487/rfc1105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lougheed, K., and Y. Rekhter. Border Gateway Protocol 3 (BGP-3). RFC Editor, 1991. http://dx.doi.org/10.17487/rfc1267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rekhter, Y., T. Li, and S. Hares, eds. A Border Gateway Protocol 4 (BGP-4). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rekhter, Y., and T. Li. A Border Gateway Protocol 4 (BGP-4). RFC Editor, 1995. http://dx.doi.org/10.17487/rfc1771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rekhter, Y. A Border Gateway Protocol 4 (BGP-4). Edited by T. Li. RFC Editor, 1994. http://dx.doi.org/10.17487/rfc1654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McPherson, D., V. Gill, D. Walton, and A. Retana. Border Gateway Protocol (BGP) Persistent Route Oscillation Condition. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rekhter, Y., and P. Gross. Application of the Border Gateway Protocol in the Internet. RFC Editor, 1995. http://dx.doi.org/10.17487/rfc1772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!