Results 101 to 110 of about 166,291 (365)
Security Threats to the Optimized Link State Routing Protocol Version 2 (OLSRv2)
This document analyzes common security threats to the Optimized Link State Routing Protocol version 2 (OLSRv2) and describes their potential impacts on Mobile Ad Hoc Network (MANET) operations. It also analyzes which of these security vulnerabilities can
semanticscholar +1 more source
Wired/Wireless Compound Networking [PDF]
International audienceThis chapter explores techniques that enable efficient link state routing on compound networks. These techniques rely on the selection and maintenance of a subset of links in the network (i.e.
Cordero Fuertes+11 more
core +4 more sources
Avoiding Transient Loops During the Convergence of Link-State Routing Protocols
When using link-state protocols such as OSPF or IS-IS, forwarding loops can occur transiently when the routers adapt their forwarding tables as a response to a topological change. In this paper, we present a mechanism that lets the network converge to its optimal forwarding state without risking any transient loops and the related packet loss.
François, Pierre, Bonaventure, Olivier
openaire +3 more sources
An Optimized Framework for WSN Routing in the Context of Industry 4.0
The advancements in Industry 4.0 have opened up new ways for the structural deployment of Smart Grids (SGs) to face the endlessly rising challenges of the 21st century. SGs for Industry 4.0 can be better managed by optimized routing techniques. In Mobile
Shalli Rani+5 more
doaj +1 more source
Objective Patients with knee osteoarthritis rely on symptomatic treatments, in which up to 75% of the pain reduction can be attributed to the placebo effect. This effect may vary based on treatment type (eg, biologics vs nonbiologic injection) and route of administration (eg, intra‐articular vs topical vs oral).
Johanna M. Borst+5 more
wiley +1 more source
Routing Protocols for Mobile Ad Hoc Network - A Survey and Analysis [PDF]
Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand ...
Desai, Rahul M+2 more
core +3 more sources
The trust-based routing mechanisms are proposed to enhance the security of the mobile ad hoc network (MANET), which use the performance metrics of a node to evaluate the trust value of the node.
Xiaoliang Wang+3 more
doaj +1 more source
Routing Load of Route Discovery and Route Maintenance in Wireless Reactive Routing Protocols [PDF]
In this paper, we present analytical study of routing overhead of reactive routing protocols for Wireless Multihop Networks (WMhNs). To accomplish the framework of generalized routing overhead, we choose Ad-Hoc on Demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Dynamic MANET on Demand (DYMO). Considering basic themes of these protocols,
arxiv +1 more source
Objective This study analyzed longitudinal trajectories of soluble Flt1 (sFlt1) levels, placenta growth factor (PlGF) levels, and sFlt1:PlGF ratios in a cohort of pregnant patients with systemic lupus erythematosus (SLE). Methods Blood samples were collected (14–18, 24–26, 30–32, 34–36, and 38–40 weeks), stored at −80°C, and evaluated for serum levels ...
Nilson R. de Jesús+7 more
wiley +1 more source
This document specifies integrity and replay protection for the Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP) and the Optimized Link State Routing Protocol version 2 (OLSRv2).
U. Herberg, C. Dearlove, T. Clausen
semanticscholar +1 more source