Results 261 to 270 of about 4,205 (281)
Some of the next articles are maybe not open access.
An On-demand Routing Update Acquisition in Named-data Link State Routing Protocol
2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), 2021Advantages in multi-path forwarding, in-network caching, as well as information centric architecture, have made Named Data Networking (NDN) a great supporter for mobile scenarios, where rapid link changes need to be propagated timely to other nodes to maintain a consistent view of the topology.
Mengze Yuan, Yuanchen Hao, Yu Zhang
openaire +2 more sources
Efficient flooding for reliability in link-state routing protocols
2012 International Conference on ICT Convergence (ICTC), 2012In this paper we propose an efficient flooding process. Link state routing protocol has been widely employed in wired network applications. When network topology change occurs, a Link State Advertisement (LSA) is generated and flooded into the rest of the devices of the network.
Seung-Hwan Lee, Seung Hyong Rhee
openaire +2 more sources
Routing path authentication in link-state routing protocols
Network Security, 2012The rapid growth of the Internet has meant that many services are regarded as critical – such as web applications, including email and e-commerce, and real-time applications, such as video conferencing and Voice over IP (VoIP). These rely on the Internet infrastructure to provide them with reliable, efficient and secure communications.
openaire +2 more sources
Local restoration algorithm for link-state routing protocols
Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370), 2003Link-state protocols such as OSPF are the dominant routing technology in today's Internet. Despite their many advantages, these protocols require the flooding of new information across the entire routing area after changes in any link state (e.g., link failures).
Hong-Yi Tzeng, P. Narvaez, Kai-Yeung Siu
openaire +2 more sources
LS2RP: Link-State RAID Routing Protocol
2009 Eighth International Conference on Networks, 2009We introduce here a novel routing protocol for a class of reconfigurable wireless ad hoc networks. The main features of these ad hoc networks are increased nodes mobility, a larger number of nodes, and a large network span. We argue that current routing protocols do not provide a satisfactory solution for routing in this type of environment. We propose
openaire +2 more sources
Statistical anomaly detection for link-state routing protocols
Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256), 2002The JiNao project at MCNC/NCSU focuses on detecting intrusions, especially insider attacks, against the OSPF (open shortest path first) routing protocol. This paper presents the implementation and experiments of JiNao's statistical intrusion detection module.
B.M. Vetter+7 more
openaire +2 more sources
At the core of IP networks: link-state routing protocols
IEEE Internet Computing, 1999As end users and managers of both corporate and Internet service provider (ISP) IP networks, we ask a lot of those devices called routers. They must be reliable and easy to manage, while supporting a variety of LAN and WAN interfaces at a reasonable price. They must forward hundreds of thousands or even millions of packets per second.
openaire +2 more sources
On the secure optimized link state routing (SOLSR) protocol for MANETs
2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), 2017A plethora of routing protocols are available for effective and efficient data dissemination in MANETs. But due to broadcast nature of wireless communications, these protocols are prone to diverse security attacks. In this work, the Secure Optimized Link State Routing (SOLSR) protocol is proposed to fill the breach for security attacks while finding ...
Sajjad Hussain+4 more
openaire +2 more sources
A generic protocol for multipoint connections under link-state routing
Proceedings of 16th International Conference on Distributed Computing Systems, 2002We propose a protocol for the construction and maintenance of multipoint connections (MCs). The protocol is based on link-state routing: information regarding multipoint connections is broadcast to network switches, which perform all computations locally.
Philip K. McKinley, Yih Huang
openaire +2 more sources
Logical Wormhole Prevention in Optimized Link State Routing Protocol
IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, 2007A particularly severe attack on routing protocols in ad hoc networks is the so-called wormhole attack in which two or more colluding attacking nodes record packets at one location, and tunnel them to another location for a replay at that remote location.
J. Ben-Othman+3 more
openaire +2 more sources