<--- Back to Details
First PageDocument Content
Computer networking / Routing protocols / Routing / Internet Standards / Internet protocols / Border Gateway Protocol / Route Views / Router / Control plane / Peering / Convergence / IP hijacking
Date: 2004-05-12 22:28:16
Computer networking
Routing protocols
Routing
Internet Standards
Internet protocols
Border Gateway Protocol
Route Views
Router
Control plane
Peering
Convergence
IP hijacking

Security and Predictability: Two Missing Pieces in BGP Lakshmi Subramanian UC Berkeley 1 Introduction

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Download Document from Source Website

File Size: 17,33 KB

Share Document on Facebook

Similar Documents

1  Computing Minimal Update Sequences for Graceful Router-wide Reconfigurations Francois Clad1 , Stefano Vissicchio2 , Pascal Mérindol1 , Pierre Francois3 and Jean-Jacques Pansiot1 1

1 Computing Minimal Update Sequences for Graceful Router-wide Reconfigurations Francois Clad1 , Stefano Vissicchio2 , Pascal Mérindol1 , Pierre Francois3 and Jean-Jacques Pansiot1 1

DocID: 1xVAh - View Document

1  Computing Minimal Update Sequences for Graceful Router-wide Reconfigurations Francois Clad1 , Stefano Vissicchio2 , Pascal Mérindol1 , Pierre Francois3 and Jean-Jacques Pansiot1 1

1 Computing Minimal Update Sequences for Graceful Router-wide Reconfigurations Francois Clad1 , Stefano Vissicchio2 , Pascal Mérindol1 , Pierre Francois3 and Jean-Jacques Pansiot1 1

DocID: 1xUCT - View Document

Leveraging Router Programmability for Traffic Matrix Computation ⇤  Giacomo Balestra‡

Leveraging Router Programmability for Traffic Matrix Computation ⇤ Giacomo Balestra‡

DocID: 1xUmh - View Document

PDF Document

DocID: 1wULk - View Document

PDF Document

DocID: 1wgdG - View Document