Back to Results
First PageMeta Content
Internet / Computer networking / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Path vector protocol / Bellman–Ford algorithm / Convergence / Routing protocols / Computing / Network architecture


BGP Safety with Spurious Updates Martin Suchara, Alex Fabrikant, and Jennifer Rexford Computer Science Department, Princeton University Email: {msuchara, afabrika, jrex}@cs.princeton.edu Abstract—We explore BGP safety
Add to Reading List

Document Date: 2010-10-19 04:18:50


Open Document

File Size: 451,95 KB

Share Result on Facebook

Company

Ford / Addison-Wesley Longman Publishing Co. Inc. / /

/

Event

FDA Phase / /

IndustryTerm

interdomain routing protocol / polynomial time algorithm / software routers / border gateway protocol / safety verification algorithm / autonomous systems / path vector protocols / breadth-first search / Internet routing / Cluster routers / pathvector protocols / /

NaturalFeature

K. Fall / /

Organization

Jennifer Rexford Computer Science Department / Princeton University / /

Person

Jennifer Rexford / Coy Optimum / J. W. Stewart / III / Alex Fabrikant / Martin Suchara / /

Position

monolithic BGP speaker / model / tackle / single BGP speaker / representative / /

Product

BGP / /

Technology

BGP protocol / DeCoy algorithm / polynomial time algorithm / Cluster routers / 3 C. Dynamic Path Vector Protocol / safety verification algorithm The DeCoy algorithm / border gateway protocol / cluster-based router / ISP / path vector protocols / pathvector protocols / interdomain routing protocol / software routers / /

URL

http /

SocialTag