An Approach to Shortest Path Technique for BGP Using OSPF
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 5
Abstract
The routing of traffic between Internet domains, or Autonomous Systems (ASs), a task known as interdomain routing, is currently handled by the Border Gateway Protocol (BGP). In this paper, we address interdomain routing in the view of Open Shortest Path First (OSPF) technique; here we apply the technique for finding the lowest and shortest path of BGP using OSPF. OSPF is a link-state protocol also it has routing updates
Authors and Affiliations
K. Krishna Chaitanya , Ch. Ravi Kishore
Application of Free and Open source software and its Impact on society
Free and open source software is one of the effective tool that can make the world self-dependent. It facilitates the design and use of your own software. This can also lead to economic liberty as the FOSS...
Security Enhancement of First Mile Wireless Access with Optimal QoS through Anonymity in Convergence Network
The first mile wireless access of convergence networks is prone to various attacks due to the broadcasting feature of transmission. Most of the existing security measures focus on protection of message contents, leaving...
AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION
Automatic image retargeting is used for large image.That are to be fit in small size display devices. Without any loss of information.our proposed methods one is saliency based mesh parameterization method is used to re...
A Multiobjective Genetic Algorithm for Feature Selection in Data Mining
The rapid advance of computer based highthroughput technique have provided unparalleled opportunities for humans to expand capabilities in production, services, communications, and research. Meanwhile, immense quantities...
Effect of User-Unknown Email addresses in spammers' lists
Spam emails are an extra burden over the network and also another Issue for the security of the internet. Today lot of spam mail are coming from the different resources. Many approaches and method are there to filter th...