Results 11 to 20 of about 153,848 (286)

Reverse Engineering TCP/IP-like Networks using Delay-Sensitive Utility Functions [PDF]

open access: yes, 2007
TCP/IP can be interpreted as a distributed primal-dual algorithm to maximize aggregate utility over source rates. It has recently been shown that an equilibrium of TCP/IP, if it exists, maximizes the same delay-insensitive utility over both source ...
Low, Steven H., Pongsajapan, John
core   +1 more source

On the utility of network coding in dynamic environments [PDF]

open access: yes, 2004
Many wireless applications, such as ad-hoc networks and sensor networks, require decentralized operation in dynamically varying environments. We consider a distributed randomized network coding approach that enables efficient decentralized operation of ...
Chang, Yu-Han   +5 more
core   +2 more sources

Revisiting Source Routing for Underwater Networking: The SUN Protocol

open access: yesIEEE Access, 2018
With respect to other routing paradigms, source routing has received comparatively less attention in the underwater acoustic networking domain.
Giovanni Toso   +5 more
doaj   +1 more source

Analysis and Modeling Experiment Performance Parameters of Routing Protocols in MANETs and VANETs [PDF]

open access: yes, 2012
In this paper, a framework for experimental parameters in which Packet Delivery Ratio (PDR), effect of link duration over End-to-End Delay (E2ED) and Normalized Routing Overhead (NRO) in terms of control packets is analyzed and modeled for Mobile Ad-Hoc ...
Bibi, A.   +5 more
core   +1 more source

Performance Enhancement of Optimized Link State Routing Protocol by Parameter Configuration for UANET

open access: yesDrones, 2022
The growing need for wireless communication has resulted in the widespread usage of unmanned aerial vehicles (UAVs) in a variety of applications. Designing a routing protocol for UAVs is paramount as well as challenging due to its dynamic attributes. The
Esmot Ara Tuli   +3 more
doaj   +1 more source

Evaluation comparison of some ad hoc networks routing protocols

open access: yesEgyptian Informatics Journal, 2011
Mobile ad hoc networks (MANETs) are characterized by multi-hop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols plays an important role.
A.A.A. Radwan   +2 more
doaj   +1 more source

Towards a Testbed for Dynamic Vehicle Routing Algorithms [PDF]

open access: yes, 2017
Since modern transport services are becoming more flexible, demand-responsive, and energy/cost efficient, there is a growing demand for large-scale microscopic simulation platforms in order to test sophisticated routing algorithms. Such platforms have to
Bischoff, Joschka   +3 more
core   +1 more source

Threshold based AntNet algorithm for dynamic traffic routing of road networks

open access: yesEgyptian Informatics Journal, 2012
Dynamic routing algorithms play an important role in road traffic routing to avoid congestion and to direct vehicles to better routes. AntNet routing algorithms have been applied, extensively and successfully, in data communication network.
Ayman M. Ghazy   +2 more
doaj   +1 more source

An optimized routing scheme for congestion avoidance using mobile nodes in Wireless Sensor Network

open access: yesMeasurement: Sensors, 2022
Wireless Sensor Network (WSN) consists of a group of dynamic sensor nodes such nodes form a volatile topology. When an event occurs the dynamic nodes WSN communicate wirelessly from source to destination node without any infrastructure.
Suma S, Bharati Harsoor
doaj   +1 more source

Efficient Route Discovery and Link Failure Detection Mechanisms for Source Routing Protocol in Mobile Ad-Hoc Networks

open access: yesIEEE Access, 2020
The rapid advances in the wireless communication industry have paved the way for the enhancement of wireless mobile ad-hoc networks (MANETs) to support various domains including civilian environments, emergency operations, and military affairs.
Baidaa Hamza Khudayer   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy