Sciweavers

1660 search results - page 50 / 332
» Forwarding in a content-based network
Sort
View
IMC
2005
ACM
15 years 9 months ago
Flooding Attacks by Exploiting Persistent Forwarding Loops
In this paper, we present flooding attacks that exploit routing anomalies in the Internet. In particular, we focus on routing anomalies introduced by persistent forwarding loops....
Jianhong Xia, Lixin Gao, Teng Fei
ICC
2009
IEEE
109views Communications» more  ICC 2009»
15 years 1 months ago
Loop-Free Forwarding Table Updates with Minimal Link Overflow
The forwarding paths in an IP network may change due to a link failure, network equipment maintenance, or reconfiguration of link weights. The forwarding tables in the routers need...
Lei Shi, Jing Fu, Xiaoming Fu
INFOCOM
2002
IEEE
15 years 9 months ago
A Quantitative Assured Forwarding Service
— The Assured Forwarding (AF) service of the IETF DiffServ architecture provides a qualitative service differentiation between classes of traffic, in the sense that a low-priori...
Nicolas Christin, Jörg Liebeherr, Tarek F. Ab...
AINA
2009
IEEE
15 years 10 months ago
A Pipelined IP Forwarding Engine with Fast Update
IP address lookup is one of the most important functionalities in the router design. To meet the requirements in high speed routers consisting of linecards with 40Gbps transfer ra...
Yeim-Kuan Chang, Yen-Cheng Liu, Fang-Chen Kuo
IPL
2007
87views more  IPL 2007»
15 years 3 months ago
The forwarding indices of augmented cubes
For a given connected graph G of order n, a routing R in G is a set of n(n − 1) elementary paths specified for every ordered pair of vertices in G. The vertex (resp. edge) forw...
Min Xu, Jun-Ming Xu