Back to Results
First PageMeta Content
Computer architecture / Internet protocols / Internet standards / Computer networking / Network protocols / Constrained Shortest Path First / Open Shortest Path First / Multiprotocol Label Switching / Routing / Network architecture / Computing / Routing protocols


R3: Resilient Routing Reconfiguration Ye Wang⋆ Hao Wang† Ajay Mahimkar§ Richard Alimi⋆ Yin Zhang§ Lili Qiu§ Yang Richard Yang⋆ Google† The University of Texas at Austin§
Add to Reading List

Document Date: 2010-07-07 10:04:02


Open Document

File Size: 416,84 KB

Share Result on Facebook

City

New Delhi / /

Company

LG / Rocketfuel / AT&T / BT / Sprint / Computer Communication Networks / Google / /

Continent

Asia / Europe / /

Country

United States / India / /

Currency

pence / USD / /

/

Event

Reorganization / /

Facility

Source Port / University of Texas / Austin§ Yale University / Destination Port / /

IndustryTerm

example network / real Internet topologies / router processing / business core network / protection algorithms / backbone routers / Online Reconfiguration pe / The central server / Operational networks / fault processing techniques / Online reconfiguration / communication services / backbone network / low router processing / traffic engineering algorithm / network fault processing capabilities / online reconfiguration phase / network operator / risk modeling algorithm / online phase / network devices / computing / loss-sensitive services / deployed network management infrastructure / online reconfiguration procedure / Internet traces / /

OperatingSystem

Linux / /

Organization

University of Texas at Austin / R3 MPLS / Yale University / World Congress / /

Person

Hao Wang / Ajay Mahimkar§ Richard Alimi / Lili Qiu§ Yang Richard / /

Position

general IP dI / Network Operations General / central controller / representative / general network topology / /

Product

PoP / R3 / Cowon D2+ Portable Audio Device / /

ProgrammingLanguage

E / V / /

ProvinceOrState

California / Arizona / /

Technology

OSPF routing protocol / using OSPF algorithm / traffic engineering algorithm / existing protection algorithms / Linux / VPN / same router / source router / risk modeling algorithm / backbone routers / ISP / MPLS / simulation / four algorithms / following protection algorithms / protection algorithms / Network Protocols / /

SocialTag