Results 1 to 10 of about 695,542 (311)

Security Analysis of the MPLS Label Distribution Protocol [PDF]

open access: bronzeCritical Infrastructure Protection, 2010
Since its inception more than a decade ago, multiprotocol label switching (MPLS) has become one of the fastest-growing telecommunications infrastructure technologies. The speed, flexibility, sophisticated traffic management and cost savings offered by MPLS have prompted service providers to converge existing and new technologies onto common MPLS ...
Daniel Guernsey   +3 more
semanticscholar   +4 more sources

Feedback mechanism validation and path query messages in the label distribution protocol [PDF]

open access: green28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings., 2004
In constraint-based routing a topology database is maintained on all participating nodes to be used in calculating a path through the network. This database contains a list of the links in the network and the set of constraints the links can meet. Since these constraints change rapidly, the topology database will not be consistent with respect to the ...
A. Gario, J. William Atwood
openalex   +3 more sources

Home - About - Disclaimer - Privacy