Performance evaluation of TI-LFA in traffic-engineered segment routing-based networks

L Roelens, ÓG de Dios, I de Miguel… - … Conference on the …, 2023 - ieeexplore.ieee.org
Link failures have a significant negative impact on the availability of a network and should
therefore be resolved as soon as possible. Because of the slow convergence time of routing …

Network Security Toolkit Including Heuristic Solutions For Trust System Placement and Network Obfuscation

GH Greve - 2010 - scholar.afit.edu
For Part I, a supervisory control and data acquisition (SCADA) network consists of a group
stations and substations in a portion of the power grid. The use of Internet technology in …

Fast ReRoute Tensor Model with Quality of Service Protection Under Multiple Parameters

O Lemeshko, M Yevdokymenko… - Data-Centric Business and …, 2020 - Springer
The paper proposes a flow-based model of Fast ReRoute in a multiservice network with
Quality of Service protection under multiple parameters, such as bandwidth, probability of …

[HTML][HTML] Toward the mutual routing security in wide area networks: A scoping review of current threats and countermeasures

M Kowalski, W Mazurczyk - Computer Networks, 2023 - Elsevier
Background: The inter-domain routing security is often based on trust, which, as seen in
practice, is an insufficient approach. Due to the deficit of native security controls in the …

Dynamic model of multipath routing supporting traffic engineering queues with packets priorities

AS Ali - … of Infocommunications Science and Technology (PIC …, 2015 - ieeexplore.ieee.org
In this paper was developed a dynamic model of multipath routing based on balancing
lengths of queues at the routers of telecommunication network represented by a system of …

Efficiency evaluation of secure data communication protocols stack based on dynamic network topology

EA Kushko, NY Parotkin - 2019 International Russian …, 2019 - ieeexplore.ieee.org
One of the key stages in the implementation of network attacks is the interception and
analysis of network traffic. The article provides an overview of the main methods of data …

Increasing the efficiency of real-time content delivery by improving the technology of priority assignment and processing of IP traffic

M Beshley, M Seliuchenko, O Lavriv, V Chervenets… - SmartCR, 2015 - dbpia.co.kr
The method of dynamic prioritization of real-time multimedia flows is proposed. This method
stabilizes the delay of packet processing when transmitting real-time flows in cases of …

[引用][C] Comparing two pricing methods for path generation in a resilient network design problem

I Kalesnikau - Przegląd Telekomunikacyjny+ Wiadomości …, 2017

On the feasibility and efficacy of protection routing in IP networks

KW Kwong, L Gao, R Guérin… - IEEE/ACM Transactions …, 2011 - ieeexplore.ieee.org
With network components increasingly reliable, routing is playing an ever greater role in
determining network reliability. This has spurred much activity in improving routing stability …

A new method to deduce counterexamples in secure routing protocols based on strand space model

X Dong, C Yang, L Sheng, C Wang… - Security and …, 2016 - Wiley Online Library
Strand space model, an excellent formal analysis method, is still not effective enough when
it is used to analyze ad hoc routing protocols. Counterexamples cannot be deduced directly …