Robust routing table design for IPv6 lookup
The most pressing issue in IP lookup has been to solve the longest prefix match (LPM) problem. The solution must appeal to 3 major criteria of lookup and update performance of the routing table, and memory consumption. However, in IPv6 route table lookup addressing the problem of the possible long p...
| Main Authors: | Yong, S. M., Ewe, Hong Tat |
|---|---|
| Format: | Book Section |
| Language: | English |
| Published: |
IEEE Xplore
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2389/ http://shdl.mmu.edu.my/2389/1/Robust%20routing%20table%20design%20for%20IPv6%20lookup.pdf |
Similar Items
IPv6 packet classification based on flow label, source and destination addresses
by: Poh, Eric C. K., et al.
Published: (2005)
by: Poh, Eric C. K., et al.
Published: (2005)
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009)
by: Budiarto, Rahmat
Published: (2009)
Optimizing The MPLS Support For Real Time IPv6-Flows Using MPLS-PHS Approach.
by: Tat, Chee Wan, et al.
Published: (2009)
by: Tat, Chee Wan, et al.
Published: (2009)
Ipv6 Migration Framework For Government Agencies In
Malaysia
by: Mohinder Singh, A Winder Kaur
Published: (2009)
by: Mohinder Singh, A Winder Kaur
Published: (2009)
Energy efficient routing for wireless sensor networks with grid topology
by: Goh, Hock Guan, et al.
Published: (2006)
by: Goh, Hock Guan, et al.
Published: (2006)
QoS Mechanism With Probability For IPv6-Based IPTV Network.
by: H.S, Primantara, et al.
Published: (2009)
by: H.S, Primantara, et al.
Published: (2009)
Enhancing security on IPv6 neighbor discovery using trust-ND.
by: Chong , Yung Wey
Published: (2017)
by: Chong , Yung Wey
Published: (2017)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
IPv6 performance analysis on FreeBSD workstation using simple applications
by: Ettikan, K., et al.
Published: (2000)
by: Ettikan, K., et al.
Published: (2000)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Ant algorithm for amplifier spontaneous emission (ASE)-aware routing
by: Chin, Tan Saw, et al.
Published: (2007)
by: Chin, Tan Saw, et al.
Published: (2007)
Impact of Redhat IPv6 router on heterogeneous host connections
by: Syed Mohamed, Sulaiman, et al.
Published: (2007)
by: Syed Mohamed, Sulaiman, et al.
Published: (2007)
A Study on Techniques for Handling Transmission Error of IPV6 Packets over Fmer Optic Links
by: Budiarto, Rahmat, et al.
Published: (2010)
by: Budiarto, Rahmat, et al.
Published: (2010)
Improving IPv6 Packets Transmission Over High Speed Networks By Introducing CRC Extension Header
by: Supriyanto, .
Published: (2010)
by: Supriyanto, .
Published: (2010)
Simulation study of a heuristic near-maximum ant-based dynamic routing
by: Tan, Chin, et al.
Published: (2008)
by: Tan, Chin, et al.
Published: (2008)
Simulation study of a heuristic near-maximum ant-based dynamic routing
by: Tan, Chin, et al.
Published: (2008)
by: Tan, Chin, et al.
Published: (2008)
An optimized framework for header suppression of real time IPV6 traffic in multiprotocol label switching (MPLS) networks.
by: Mohammed, Imad Jasim
Published: (2011)
by: Mohammed, Imad Jasim
Published: (2011)
A model for secure knowledge sharing
by: Ismail Ahmad,, et al.
Published: (2005)
by: Ismail Ahmad,, et al.
Published: (2005)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
Coinware for Multilingual Passphrase Generation and Its Application for Chinese Language Password
by: Lee, Kok-wah, et al.
Published: (2006)
by: Lee, Kok-wah, et al.
Published: (2006)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
The Effect Of Using XCAST Based Routing Protocol in Wireless Ad Hoc Networks.
by: Alzyoud, Faisal Y., et al.
Published: (2009)
by: Alzyoud, Faisal Y., et al.
Published: (2009)
PERFORMANCE EVALUATION OF SINGLE-PATH AND MULTIPATH MANETS ROUTING PROTOCOLS FOR DENSE AND SPARSE TOPOLOGY
by: Mahdi, Mohammed A., et al.
Published: (2017)
by: Mahdi, Mohammed A., et al.
Published: (2017)
Passphrase with semantic noises and a proof on its higher information rate
by: Lee, Kok-Wah, et al.
Published: (2007)
by: Lee, Kok-Wah, et al.
Published: (2007)
Multiple hashes of single key with passcode for multiple accounts
by: Lee, Kok-wah, et al.
Published: (2007)
by: Lee, Kok-wah, et al.
Published: (2007)
Performance study of Byzantine Agreement Protocol with artificial neural network
by: Lee, Kok-Wah, et al.
Published: (2007)
by: Lee, Kok-Wah, et al.
Published: (2007)
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table
by: Jaber, Aws Naser
Published: (2013)
by: Jaber, Aws Naser
Published: (2013)
A robust face recognition system
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Robust incremental growing multi-experts network
by: LOO, C, et al.
Published: (2006)
by: LOO, C, et al.
Published: (2006)
Robust And Imperceptible Digital Video
Watermarking Techniques
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
Robust and imperceptible digital video watermarking techniques.
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
Ant Colony Optimization approaches to the degree-constrained minimum spanning tree problem
by: Bau, Yoon Teck, et al.
Published: (2008)
by: Bau, Yoon Teck, et al.
Published: (2008)
A hybrid entropy decomposition and support vector machine method for agricultural crop type classification
by: Tan, Chue Poh, et al.
Published: (2007)
by: Tan, Chue Poh, et al.
Published: (2007)
AN ENHANCED ANT COLONY OPTIMIZATION METAHEURISTIC FOR THE MINIMUM DOMINATING SET PROBLEM
by: Ho, Chin Kuan, et al.
Published: (2006)
by: Ho, Chin Kuan, et al.
Published: (2006)
A study of fresnel scattered fields for ellipsoidal, and elliptic-disk-shaped scatterers
by: Koay, Jun Yi, et al.
Published: (2008)
by: Koay, Jun Yi, et al.
Published: (2008)
Robust Video Watermarking Based On 3D-DWT Domain.
by: A.M .Al-Taweel, Sadik., et al.
Published: (2009)
by: A.M .Al-Taweel, Sadik., et al.
Published: (2009)
CST332 - INTERNET PROTOCOL ARCHITECTURE & ROUTING APRIL 2008.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CST332 - INTERNET PROTOCOLS, ARCHITECTURE AND ROUTING JANUARY 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
Similar Items
-
IPv6 packet classification based on flow label, source and destination addresses
by: Poh, Eric C. K., et al.
Published: (2005) -
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007) -
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009) -
Optimizing The MPLS Support For Real Time IPv6-Flows Using MPLS-PHS Approach.
by: Tat, Chee Wan, et al.
Published: (2009) -
Ipv6 Migration Framework For Government Agencies In
Malaysia
by: Mohinder Singh, A Winder Kaur
Published: (2009)