Sciweavers

170 search results - page 26 / 34
» Prohibitive-link Detection and Routing Protocol
Sort
View
SIGCOMM
2012
ACM
13 years 2 months ago
Reduction-based analysis of BGP systems with BGPVerif
Today’s inter-domain routing protocol, the Border Gateway Protocol (BGP), is increasingly complicated and fragile due to policy misconfiguration by individual autonomous system...
Anduo Wang, Alexander J. T. Gurney, Xianglong Han,...
ICC
2000
IEEE
376views Communications» more  ICC 2000»
15 years 4 months ago
TCP-Bus: Improving TCP Performance in Wireless Ad-Hoc Networks
Abstract: Reliable data transmission over wireless multi-hop networks, called ad hoc networks, has proven to be non-trivial. TCP (Transmission Control Protocol), a widely used end-...
Dongkyun Kim, Chai-Keong Toh, Yanghee Choi
INFOCOM
2007
IEEE
15 years 6 months ago
Detection and Localization of Network Black Holes
— Internet backbone networks are under constant flux, struggling to keep up with increasing demand. The pace of technology change often outstrips the deployment of associated fa...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
SPW
2001
Springer
15 years 4 months ago
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World
In the IPv6 world, the IP protocol itself, i.e., IPv6, is used for a number of functions that currently fall beyond the scope of the IPv4 protocol. These functions include address ...
Pekka Nikander
CCR
2010
139views more  CCR 2010»
14 years 11 months ago
Longitudinal study of BGP monitor session failures
BGP routing data collected by RouteViews and RIPE RIS have become an essential asset to both the network research and operation communities. However, it has long been speculated t...
Pei-chun Cheng, Xin Zhao, Beichuan Zhang, Lixia Zh...