Sciweavers

113 search results - page 10 / 23
» Locating internet routing instabilities
Sort
View
CCS
2003
ACM
14 years 26 days ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
SIGCOMM
2012
ACM
11 years 10 months ago
LIFEGUARD: practical repair of persistent route failures
The Internet was designed to always find a route if there is a policycompliant path. However, in many cases, connectivity is disrupted despite the existence of an underlying vali...
Ethan Katz-Bassett, Colin Scott, David R. Choffnes...
CN
2004
119views more  CN 2004»
13 years 7 months ago
On characterizing BGP routing table growth
The sizes of the BGP routing tables have increased by an order of magnitude over the last six years. This dramatic growth of the routing table can decrease the packet forwarding sp...
Tian Bu, Lixin Gao, Donald F. Towsley
JCM
2006
72views more  JCM 2006»
13 years 7 months ago
QoS Routing with Bandwidth and Hop-Count Consideration: A Performance Perspective
QoS Routing has been studied to provide evidence that it can increase network utilization compared to routing that is insensitive to QoS traffic requirements. However, because of i...
Bo Peng, Andrew H. Kemp, Said Boussakta
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 6 months ago
Delay-Constrained Multicast Routing Algorithm Based on Average Distance Heuristic
Multicast is the ability of a communication network to accept a single message from an application and to deliver copies of the message to multiple recipients at different locatio...
Ling Zhou, Wei-xiong Ding, Yu-xi Zhu