Journal articles on the topic 'Multicast Border Gateway Protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Multicast Border Gateway Protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Xie, J., S. Nandi, A. K. Gupta, and A. Das. "Gateway-based multicast protocol – a novel multicast protocol for mobile ad hoc networks." IEE Proceedings - Communications 152, no. 6 (2005): 811. http://dx.doi.org/10.1049/ip-com:20045207.
Full textKent, S., C. Lynn, and K. Seo. "Secure Border Gateway Protocol (S-BGP)." IEEE Journal on Selected Areas in Communications 18, no. 4 (2000): 582–92. http://dx.doi.org/10.1109/49.839934.
Full textGUO, Hui, and Jin-yi CHANG. "Survey on convergence problem of border gateway protocol." Journal of Computer Applications 30, no. 10 (2010): 2628–31. http://dx.doi.org/10.3724/sp.j.1087.2010.02628.
Full textMastilak, Lukas, Marek Galinski, Pavol Helebrandt, Ivan Kotuliak, and Michal Ries. "Enhancing Border Gateway Protocol Security Using Public Blockchain." Sensors 20, no. 16 (2020): 4482. http://dx.doi.org/10.3390/s20164482.
Full textAgarwal, Arushi, and Ayushi Pandey. "Reducing convergence time along with improvement in path service quality of border gateway protocol." International Journal of Engineering & Technology 7, no. 2.31 (2018): 203. http://dx.doi.org/10.14419/ijet.v7i2.31.13441.
Full textZhao, Chen, Bin Sun, Yi-xian Yang, and Yan Yang. "A Lightweight Mechanism for Border Gateway Protocol Path Verification." Journal of Electronics & Information Technology 34, no. 9 (2013): 2167–73. http://dx.doi.org/10.3724/sp.j.1146.2012.00285.
Full textSmith, Bradley R., and J. J. Garcia-Luna-Aceves. "Efficient security mechanisms for the border gateway routing protocol." Computer Communications 21, no. 3 (1998): 203–10. http://dx.doi.org/10.1016/s0140-3664(97)00186-2.
Full textChen, K., and C. Hu. "Border gateway protocol monitoring system can be cost effective." IET Communications 5, no. 15 (2011): 2231–40. http://dx.doi.org/10.1049/iet-com.2010.0432.
Full textclaffy, kc. "Border gateway protocol (BGP) and traceroute data workshop report." ACM SIGCOMM Computer Communication Review 42, no. 3 (2012): 28–31. http://dx.doi.org/10.1145/2317307.2317313.
Full textBonaventure, O., A. Feldmann, L. Gao, T. Griffin, and Z. M. Mao. "Guest editorial - Interdomain routing and the border gateway protocol." IEEE Network 19, no. 6 (2005): 3–4. http://dx.doi.org/10.1109/mnet.2005.1541714.
Full textAhmed, Muhammed Zaharadeen, Aisha Hassan AbdallahHashim, Othman Omran Khalifa, and Momoh J. E. Salami. "Border Gateway Protocol to provide failover in multihoming environment." International Journal of Information Technology 9, no. 1 (2017): 33–39. http://dx.doi.org/10.1007/s41870-017-0003-1.
Full textShukla, Shipra, and Mahesh Kumar. "Optimized MRAI Timers for Border Gateway Protocol in Large Networks." International Journal of Distributed Systems and Technologies 10, no. 4 (2019): 31–44. http://dx.doi.org/10.4018/ijdst.2019100103.
Full textPapadopoulos, Stavros, Konstantinos Moustakas, Anastasios Drosou, and Dimitrios Tzovaras. "Border gateway protocol graph: detecting and visualising internet routing anomalies." IET Information Security 10, no. 3 (2016): 125–33. http://dx.doi.org/10.1049/iet-ifs.2014.0525.
Full textSolayman, Nasser, Mohammed Badawy, and Ayman EL-SAYED. "Performance Enhancement of Border Gateway protocol for Large-Scale Autonomous." Menoufia Journal of Electronic Engineering Research 26, no. 1 (2017): 213–25. http://dx.doi.org/10.21608/mjeer.2017.63478.
Full textSeberry, Jennifer, Yi Mu, Fuchun Guo, and Tim Wellsmore. "Efficient authentication and integrity protection for the border gateway protocol." International Journal of Security and Networks 9, no. 4 (2014): 234. http://dx.doi.org/10.1504/ijsn.2014.066179.
Full textMusril, Hari Antoni. "SIMULASI INTERKONEKSI ANTARA AUTONOMOUS SYSTEM (AS) MENGGUNAKAN BORDER GATEWAY PROTOCOL (BGP)." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 2, no. 1 (2017): 1–9. http://dx.doi.org/10.30743/infotekjar.v2i1.151.
Full textAzhari, Muhammad Ikhsan, Tengku Mohd Diansyah, and Ari Usman. "PERBANDINGAN ROUTING PROTOCOL EXTERIOR BGP VERSI 4 DENGAN ROUTING INTERIOR EIGRP PADA ALGORITMA LINKSTATE MENGGUNAKAN PARAMETER PACKET LOSS." JURNAL TEKNOLOGI INFORMASI 3, no. 2 (2019): 185. http://dx.doi.org/10.36294/jurti.v3i2.1071.
Full textNicholes, Martin O., and Biswanath Mukherjee. "A survey of security techniques for the border gateway protocol (BGP)." IEEE Communications Surveys & Tutorials 11, no. 1 (2009): 52–65. http://dx.doi.org/10.1109/surv.2009.090105.
Full textWeitz, Konstantin, Doug Woos, Emina Torlak, Michael D. Ernst, Arvind Krishnamurthy, and Zachary Tatlock. "Scalable verification of border gateway protocol configurations with an SMT solver." ACM SIGPLAN Notices 51, no. 10 (2016): 765–80. http://dx.doi.org/10.1145/3022671.2984012.
Full textD'Ignazio, Alessio, and Emanuele Giovannetti. "ANTITRUST ANALYSIS FOR THE INTERNET UPSTREAM MARKET: A BORDER GATEWAY PROTOCOL APPROACH." Journal of Competition Law & Economics 2, no. 1 (2006): 43–69. http://dx.doi.org/10.1093/joclec/nhl003.
Full textShukla, Shipra, and Mahesh Kumar. "An improved energy efficient quality of service routing for border gateway protocol." Computers & Electrical Engineering 67 (April 2018): 520–35. http://dx.doi.org/10.1016/j.compeleceng.2018.02.018.
Full textDarmawan, Darmawan, and Teguh Imanto. "Analisa Link Balancing dan Failover 2 Provider Menggunakan Border Gateway Protocol (BGP) Pada Router Cisco 7606s." Jurnal Nasional Teknologi dan Sistem Informasi 3, no. 3 (2017): 326–33. http://dx.doi.org/10.25077/teknosi.v3i3.2017.326-333.
Full textDevikar, Rohit Nilkanth, D. V. Patil, and V. Chandraprakash. "Study of BGP Convergence Time." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (2016): 413. http://dx.doi.org/10.11591/ijece.v6i1.8106.
Full textDevikar, Rohit Nilkanth, D. V. Patil, and V. Chandraprakash. "Study of BGP Convergence Time." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 1 (2016): 413. http://dx.doi.org/10.11591/ijece.v6i1.pp413-420.
Full textAchar, Rakesh Kumar, M. Swagath Babu, and M. Arun. "Border Gateway Protocol Performance and its Protection against Disturbed Denial of Service attack." Indian Journal of Science and Technology 8, S2 (2015): 127. http://dx.doi.org/10.17485/ijst/2015/v8is2/59169.
Full textAngrish, Sumit, and Gunjan Gandhi. "Enhancement in Path Diversity Technique in Inter Domain Routing Using Border Gateway Protocol." International Journal of Engineering Trends and Technology 11, no. 1 (2014): 10–13. http://dx.doi.org/10.14445/22315381/ijett-v11p203.
Full textAchar, Rakesh Kumar, Swagath Babu M, and Arun Dr. M. "Border Gateway Protocol Performance and Its Protection against Disturbed Denial of Service Attack." Bonfring International Journal of Research in Communication Engineering 4, no. 1 (2014): 05–09. http://dx.doi.org/10.9756/bijrce.10345.
Full textMarcus, Ronald David, and Eleazar Tfuakani. "Perancangan Jaringan Skala Besar dengan Menggunakan Metode Border Gateway Protocol (BGP) Berbasis Mikrotik." Briliant: Jurnal Riset dan Konseptual 4, no. 3 (2019): 401. http://dx.doi.org/10.28926/briliant.v4i3.361.
Full textBaggan, Vidhu, Devendra Prasad, and Prabhjot Kaur. "Fast Network Path Restoration Through Modified Finite State Machine Model in Border Gateway Protocol." Journal of Computational and Theoretical Nanoscience 16, no. 10 (2019): 4394–99. http://dx.doi.org/10.1166/jctn.2019.8531.
Full textOti, Stephen Brako, and James Ben Hayfron-Acquah. "Practical Security Approaches against Border Gateway Protocol (BGP) Session Hijacking Attacks between Autonomous Systems." Journal of Computer and Communications 02, no. 08 (2014): 10–21. http://dx.doi.org/10.4236/jcc.2014.28002.
Full textCarl, Glenn, and George Kesidis. "Large-scale testing of the Internet's Border Gateway Protocol (BGP) via topological scale-down." ACM Transactions on Modeling and Computer Simulation 18, no. 3 (2008): 1–30. http://dx.doi.org/10.1145/1371574.1371577.
Full textZhao, Xi, Shahab S. Band, Said Elnaffar, Mehdi Sookhak, Amir Mosavi, and Ely Salwana. "The Implementation of Border Gateway Protocol Using Software-Defined Networks: A Systematic Literature Review." IEEE Access 9 (2021): 112596–606. http://dx.doi.org/10.1109/access.2021.3103241.
Full textZhang, Jun, and Fu Xiang Peng. "Routing Strategy and Quality of Service (QoS) Realization Research of Guangxi Meteorology Network." Advanced Engineering Forum 6-7 (September 2012): 919–23. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.919.
Full textMUKTADIR, Abu Hena Al, Kenji FUJIKAWA, Hiroaki HARAI, and Lixin GAO. "Route Advertisement Policies and Inbound Traffic Engineering for Border Gateway Protocol with Provider Aggregatable Addressing." IEICE Transactions on Communications E101.B, no. 6 (2018): 1411–26. http://dx.doi.org/10.1587/transcom.2017ebp3213.
Full textComer, D., P. Singh, and S. Vasudevan. "Effective border gateway protocol protection that does not require universal adoption of a public key infrastructure." IET Networks 1, no. 4 (2012): 217–28. http://dx.doi.org/10.1049/iet-net.2012.0145.
Full textDevikar, Rohit Nilkanth, Dipak V. Patil, and V. Chandraprakash. "Study of BGP Convergence Time: A Survey." TELKOMNIKA Indonesian Journal of Electrical Engineering 16, no. 2 (2015): 341. http://dx.doi.org/10.11591/tijee.v16i2.1622.
Full textAl-Musawi, Bahaa Qasim, and Philip Branch. "Identifying Recurrence Behaviour in the Underlying BGP Traffic." International Journal of Information, Communication Technology and Applications 4, no. 1 (2018): 34–47. http://dx.doi.org/10.17972/ijicta20184142.
Full textErnawati, Tati, and Jemi Endrawan. "Peningkatan Kinerja Jaringan Komputer dengan Border Gateway Protocol (BGP) dan Dynamic Routing (Studi Kasus PT Estiko Ramanda)." Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika 4, no. 1 (2018): 35. http://dx.doi.org/10.23917/khif.v4i1.5656.
Full textDundjerski, Dejan, and Milo Tomašević. "Graphical processing unit-based parallelization of the Open Shortest Path First and Border Gateway Protocol routing protocols." Concurrency and Computation: Practice and Experience 27, no. 1 (2014): 237–51. http://dx.doi.org/10.1002/cpe.3223.
Full textKriswantono, Andi, Arief Setyanto, and Suwanto Raharjo. "Kinerja Quagga Pada Routing BGP IPv6 Menggunakan Metode Dual Stack." Creative Information Technology Journal 5, no. 1 (2019): 28. http://dx.doi.org/10.24076/citec.2017v5i1.141.
Full textMonita, Vivi, Indrarini Dyah Irawati, and Rohmat Tulloh. "Comparison of routing protocol performance on multimedia services on software defined network." Bulletin of Electrical Engineering and Informatics 9, no. 4 (2020): 1612–19. http://dx.doi.org/10.11591/eei.v9i4.2389.
Full textLi, Peipei, Bin Lu, and Daofeng Li. "BGP Neighbor Trust Establishment Mechanism Based on the Bargaining Game." Information 12, no. 3 (2021): 110. http://dx.doi.org/10.3390/info12030110.
Full textTkalec, Gordana, Iva Rosanda Žigo, and Žarka Dolinara. "Implementing a Simulation Model for the Evaluation of BGP Updates Impact on Real-Time Applications." European Journal of Interdisciplinary Studies 3, no. 2 (2017): 105. http://dx.doi.org/10.26417/ejis.v3i2.p105-111.
Full textLiu, Ya Ping, Zhi Hong Liu, and Shi Cong Ma. "A Novel Secure Inter-Domain Routing for Identifier/Locator Split Network." Applied Mechanics and Materials 411-414 (September 2013): 653–61. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.653.
Full textLevis, Pierre, Mohamed Boucadair, Pierrick Morand, et al. "A New Perspective for a Global QoS-based Internet." Journal of Communications Software and Systems 1, no. 1 (2017): 13. http://dx.doi.org/10.24138/jcomss.v1i1.314.
Full textAmin, Sadia, Saira Ahthasham, Aftab Ahmed Shaikh, Ahthasham Sajid, and Mirza Aamir Mehmood. "Improvement of BGP Session Maintenance." International Journal of Engineering & Technology 1, no. 2 (2012): 94. http://dx.doi.org/10.14419/ijet.v1i2.77.
Full textYu, Chao, Xing Wei Wang, and Min Huang. "A BGP Fast Convergence Mechanism Based on Doubtful Path Judgment." Applied Mechanics and Materials 602-605 (August 2014): 3067–70. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3067.
Full textAsharov, Gilad, Daniel Demmler, Michael Schapira, et al. "Privacy-Preserving Interdomain Routing at Internet Scale." Proceedings on Privacy Enhancing Technologies 2017, no. 3 (2017): 147–67. http://dx.doi.org/10.1515/popets-2017-0033.
Full textLi, Chunxiu, Xin Li, Ke Li, et al. "Relationship-Oriented Software Defined AS-Level Fast Rerouting for Multiple Link Failures." Mathematical Problems in Engineering 2015 (2015): 1–15. http://dx.doi.org/10.1155/2015/838340.
Full textKong, Lingjing, and Hong Shen. "Achieving inter-domain routing security based on distributed translator trust model." Computer Science and Information Systems 12, no. 4 (2015): 1327–44. http://dx.doi.org/10.2298/csis140910057k.
Full text