نتائج البحث

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
تم إضافة الكتاب إلى الرف الخاص بك!
عرض الكتب الموجودة على الرف الخاص بك .
وجه الفتاة! هناك خطأ ما.
وجه الفتاة! هناك خطأ ما.
أثناء محاولة إضافة العنوان إلى الرف ، حدث خطأ ما :( يرجى إعادة المحاولة لاحقًا!
هل أنت متأكد أنك تريد إزالة الكتاب من الرف؟
{{itemTitle}}
{{itemTitle}}
وجه الفتاة! هناك خطأ ما.
وجه الفتاة! هناك خطأ ما.
أثناء محاولة إزالة العنوان من الرف ، حدث خطأ ما :( يرجى إعادة المحاولة لاحقًا!
    منجز
    مرشحات
    إعادة تعيين
  • الضبط
      الضبط
      امسح الكل
      الضبط
  • مُحَكَّمة
      مُحَكَّمة
      امسح الكل
      مُحَكَّمة
  • السلسلة
      السلسلة
      امسح الكل
      السلسلة
  • مستوى القراءة
      مستوى القراءة
      امسح الكل
      مستوى القراءة
  • السنة
      السنة
      امسح الكل
      من:
      -
      إلى:
  • المزيد من المرشحات
      المزيد من المرشحات
      امسح الكل
      المزيد من المرشحات
      نوع المحتوى
    • نوع العنصر
    • لديه النص الكامل
    • الموضوع
    • الناشر
    • المصدر
    • المتبرع
    • اللغة
    • مكان النشر
    • المؤلفين
    • موقع
28 نتائج ل "BGP (Computer network protocol)"
صنف حسب:
Hands-on BGP
Unlock the power of BGP networking with our hands-on video course and gain expertise in configuring, managing, and optimizing BGP networks for advanced networking solutions Key Features: Configure Hands-on BGP labs interactivelyGain an in-depth understanding of BGP attributesApply practical knowledge of BGP route reflectors. course Description: The course begins with an introduction to BGP, explaining what it is and why it is essential in the networking landscape. You'll . Explore topics such as Autonomous System Numbers (ASNs), BGP attributes, and route selection. The course also covers advanced concepts like BGP route reflectors, communities, and route summarization. The course focuses on real-world scenarios and hands-on labs, ensuring you gain practical experience in configuring and managing BGP in different network environments. By the end of this course, you'll have the expertise to design, implement, and troubleshoot BGP networks effectively. Whether you're a network administrator, engineer, or IT professional, this course will enhance your networking skills and open new career opportunities in the field of advanced networking. What you will learn: Understand BGP attributes and path selection. Implement BGP route reflectors for efficient routingUtilize BGP communities for traffic management. Explore route summarization techniques. Optimize network resources with BGP. Troubleshoot common BGP issues. Who this course is for: This course is ideal for IT professionals, system administrators, and developers aiming to specialize in networking and BGP. Basic knowledge of networking concepts and familiarity with routing protocols is recommended. Perfect for those aspiring to enhance their networking skills and pursue advanced networking roles.
Versatile routing and services with BGP
Design a robust BGP control plane within a secure, scalable network for smoother services A robust Border Gateway Protocol setup is vital to ensuring reliable connectivity, an essential capability for any organization.
Optimizing Network Performance: A Comparative Analysis of EIGRP, OSPF, and BGP in IPv6-Based Load-Sharing and Link-Failover Systems
The purpose of this study is to evaluate and compare how well different routing protocols perform in terms of load sharing, link failover, and overall network performance. Wireshark was used for packet-level analysis, VMWare was used for virtualization, GNS3 was used for network simulation, and Iperf3 was used to measure network performance parameters. Convergence time, packet losses, network jitter, and network delay are the parameters that were selected for assessment. To examine the behaviors of Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP) routing protocols in a variety of network settings, a simulated network environment incorporating both protocols along with Border Gateway Protocol (BGP) is created for the research. The setup for the experiment entails simulating different network conditions, such as fluctuating traffic loads and connection failures, to track how the protocols function in dynamic situations. The efficiency metrics for OSPF and EIGRP with BGP are measured and evaluated using the data generated by Wireshark and Iperf3. The results of this research show that EIGRP has a better failover convergence time and packet loss percentage as compared to the OSPF.
A path forward: improving Internet routing security by enabling zones of trust
Abstract Although Internet routing security best practices have recently seen auspicious increases in uptake, Internet Service Providers (ISPs) have limited incentives to deploy them. They are operationally complex and expensive to implement and provide little competitive advantage. The practices with significant uptake protect only against origin hijacks, leaving unresolved the more general threat of path hijacks. We propose a new approach to improved routing security that achieves four design goals: improved incentive alignment to implement best practices; protection against path hijacks; expanded scope of such protection to customers of those engaged in the practices; and reliance on existing capabilities rather than needing complex new software in every participating router. Our proposal leverages an existing coherent core of interconnected ISPs to create a zone of trust, a topological region that protects not only all networks in the region, but all directly attached customers of those networks. Customers benefit from choosing ISPs committed to the practices, and ISPs thus benefit from committing to the practices. We discuss the concept of a zone of trust as a new, more pragmatic approach to security that improves security in a region of the Internet, as opposed to striving for global deployment. We argue that the aspiration for global deployment is unrealistic, since the global Internet includes malicious actors. We compare our approach to other schemes and discuss how a related proposal, ASPA, could be used to increase the scope of protection our scheme achieves. We hope this proposal inspires discussion of how the industry can make practical, measurable progress against the threat of route hijacks in the short term by leveraging institutionalized cooperation rooted in transparency and accountability.
Issuance Policies of Route Origin Authorization with a Single Prefix and Multiple Prefixes: A Comparative Analysis
Resource Public Key Infrastructure (RPKI) is a solution to mitigate the security issues faced by inter-domain routing. Within the RPKI framework, Route Origin Authorization (ROA) plays a crucial role as an RPKI object. ROA allows address space holders to place a single IP address prefix or multiple IP address prefixes in it. However, this feature has introduced security risks during the global deployment of RPKI. In this study, we analyze the current status of ROA issuance and discuss the impact of using two ROA issuance policies on RPKI security and synchronization efficiency. Based on the aforementioned work, recommendations are proposed for the utilization of ROA issuance policies.
Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups
North Korean cyber-attack groups such as Kimsuky, Lazarus, Andariel, and Venus 121 continue to attempt spear-phishing APT attacks that exploit social issues, including COVID-19. Thus, along with the worldwide pandemic of COVID-19, related threats also persist in cyberspace. In January 2022, a hacking attack, presumed to be Kimsuky, a North Korean cyber-attack group, intending to steal research data related to COVID-19. The problem is that the activities of cyber-attack groups are continuously increasing, and it is difficult to accurately identify cyber-attack groups and attack origins only with limited analysis information. To solve this problem, it is necessary to expand the scope of data analysis by using BGP archive data. It is necessary to combine infrastructure and network information to draw correlations and to be able to classify infrastructure by attack group very accurately. Network-based infrastructure analysis is required in the fragmentary host area, such as malware or system logs. This paper studied cyber ISR and BGP and a case study of cyber ISR visualization for situational awareness, hacking trends of North Korean cyber-attack groups, and cyber-attack tracking. Through related research, we estimated the origin of the attack by analyzing hacking cases through cyber intelligence-based profiling techniques and correlation analysis using BGP archive data. Based on the analysis results, we propose an implementation of the cyber ISR visualization method based on BGP archive data. Future research will include a connection with research on a cyber command-and-control system, a study on the cyber battlefield area, cyber ISR, and a traceback visualization model for the origin of the attack. The final R&D goal is to develop an AI-based cyber-attack group automatic identification and attack-origin tracking platform by analyzing cyber-attack behavior and infrastructure lifecycle.
Optimized MRAI Timers for Border Gateway Protocol in Large Networks
The global routing performance is essential for the services provided by the internet applications on the Internet. Border Gateway Protocol (BGP) is the extensively used routing protocol for the autonomous systems which constructs the internet. The reduction in convergence time is a crucial challenge for BGP. The past studies confirm that the Minimum Route Advertisement Interval (MRAI) decreases the convergence time. However, most of the approaches are focused on finding the optimum MRAI value. The techniques to implement the MRAI timers are less addressed by the researcher in compare to finding the optimum MRAI value. The implementation of reusable MRAI timers for large networks is critical at different load conditions. Therefore, this article presents the novel approach Optimized MRAI timer in a large network which reduces the convergence time. The proposed approach reduces the end-to-end delay, the number of exchanged updates message, and convergence time of BGP events and enhances the number of delivered packets in compare to related techniques.
Versatile routing and services with BGP: understanding and implementing BGP in SRS-OS
Design a robust BGP control plane within a secure, scalable network for smoother services A robust Border Gateway Protocol setup is vital to ensuring reliable connectivity, an essential capability for any organization. The Internet has become a necessary, always-on service in homes and businesses, and BGP is the protocol that keeps communication flowing. But BGP also has become crucial to delivery of intra-domain business services. But the network is only as reliable as BGP, so service enablement depends upon making BGP more stable, reliable, and service-rich. Alcatel-Lucent Service Router Operating System is engineered to bear the load of the most demanding networks. The system features support for Symmetric Multiprocessing and unprecedented depth of advanced routing features, all within a single OS that′s supported across the entire Alcatel-Lucent IP/MPLS router portfolio. Versatile Routing and Services with BGP provides guidance toward implementation of BGP within SR-OS, and details the use and control of each feature. The book provides in-depth coverage of topics such as: BGP/MPLS IP-VPN, VPLS, VPWS Labeled Unicast IPv4, reconvergence, and multicast Security, graceful restart and error handling IPv6 PE (6PE) and IPv6 extensions to BGP/MPLS IP-VPN A look at forthcoming features such as Ethernet VPN Basic BGP competency is assumed, but the book is accessible even to those with zero familiarity with Alcatel-Lucent′s SR-OS. It underscores the idea that BGP is more than just service enablement, and can also be used for infrastructure layer transport - but both layers must be solid, scalable, and able to quickly reconverge. Versatile Routing and Services with BGP demonstrates the creation of a robust BGP control plane within a, secure network, allowing the delivery of flawless, uninterrupted service.
MPLS-Enabled Applications
With a foreword by Yakov Rekhter \"Here at last is a single, all encompassing resource where the myriad applications sharpen into a comprehensible text that first explains the whys and whats of each application before going on to the technical detail of the hows.\" —Kireeti Kompella, CTO Junos, Juniper Networks The authoritative guide to MPLS, now in its Third edition, fully updated with brand new material! MPLS is now considered the networking technology for carrying all types of network traffic, including voice telephony, real-time video, and data traffic. In MPLS-Enabled Applications, Third Edition, the authors methodically show how MPLS holds the key to network convergence by allowing operators to offer more services over a single physical infrastructure. The Third Edition contains more than 170 illustrations, new chapters, and more coverage, guiding the reader from the basics of the technology, though all its major VPN applications. MPLS Enabled-Applications contains up-to-date coverage of: The current status and future potential of all major MPLS applications, including L2VPN, L3VPN, pseudowires and VPLS A new chapter with up to date coverage of the MPLS transport profile, MPLS-TP MPLS in access networks and Seamless MPLS, the new architecture for extending MPLS into the access, discussed in depth for both the unicast and the multicast case Extensive coverage of multicast support in L3VPNs (mVPNs), explaining and comparing both the PIM/GRE and the next generation BGP/MPLS solutions, and including a new chapter on advanced topics in next generation multicast VPNs A new chapter on advanced protection techniques, including detailed discussion of 50 ms end-to-end service restoration Comprehensive coverage of the base technology, as well as the latest IETF drafts, including topics such as pseudowire redundancy, VPLS multihoming, IRB and P2MP pseudowires MPLS-Enabled Applicationswill provide those involved in the design and deployment of MPLS systems, as well as those researching the area of MPLS networks, with a thoroughly modern view of how MPLS is transforming the networking world. \"Essential new material for those trying to understand the next steps in MPLS.\" —Adrian Farrel, IETF Routing Area Director \"MPLS-Enabled Applications takes a unique and creative approach in explaining MPLS concepts and how they are applied in practice to meet the needs of Enterprise and Service Provider networks. I consistently recommend this book to colleagues in the engineering, education and business community.\" —Dave Cooper, Chief IP Technologist, Global Crossing Ltd.