Results 11 to 20 of about 2,963,380 (356)

Macro-routing: a new hierarchical routing protocol [PDF]

open access: yesIEEE Global Telecommunications Conference, 2004. GLOBECOM '04., 2005
In a continually evolving Internet, tools such as quality of service routing must be used in order to accommodate user demands. QoS routing raises scalability issues within very large networks, which can he avoided by using hierarchical routing strategies. However, such strategies can lead to inaccurate path selection due to the aggregation process. To
Dragos, Sanda-Maria, Collier, Martin
openaire   +4 more sources

Analisis Kinerja Protokol Routing AODV dan DSDV

open access: yesSistemasi: Jurnal Sistem Informasi, 2019
MANET merupakan tipe jaringan khusus yang mampu melibatkan banyak orang atau peralatan komunikasi tanpa ketergantungan terhadap suatu infrastruktur. AODV dan DSDV merupakan contoh routing protocol yang efisien untuk jaringan Ad Hoc pada tipe routing ...
fajar baihaqy
doaj   +1 more source

A Kalman Filter Based Hybrid Routing Protocol for Efficient Vehicle Connectivity and Traffic Management

open access: yesTransport and Telecommunication, 2022
The geographic routing protocols in Vehicular Ad Hoc Networks (VANETs) are contemplated as most efficacious protocols. Though, such types of protocols communicate a huge quantity of data that influence the network connectivity negatively.
Punia Divya, Kumar Rajender
doaj   +1 more source

TEZEM: A new energy-efficient routing protocol for next-generation wireless sensor networks

open access: yesInternational Journal of Distributed Sensor Networks, 2022
The design and implementation of energy-efficient routing protocols for next-generation wireless sensor networks is always a challenge due to limited power resource capabilities.
Zain ul Abidin Jaffri   +6 more
doaj   +1 more source

(In)Corruptibility of Routing Protocols [PDF]

open access: yes, 2015
Analyses of routing protocols security are nearly always supported by simulations, which often evaluate the ability to deliver messages to a given destination. Several competing definitions for secure routing exist, but to our knowledge, they only address source routing protocols.
Jamet, Raphaël, Lafourcade, Pascal
openaire   +3 more sources

Probabilistic Routing Protocol for Intermittently Connected Networks [PDF]

open access: yes, 2012
This document is a product of the Delay Tolerant Networking Research Group and has been reviewed by that group. No objections to its publication as an RFC were raised.
Davies, Elwyn   +3 more
core   +2 more sources

Analisa dan Perbandingan Kinerja Routing Protocol OSPF dan EIGRP dalam Simulasi GNS3

open access: yesJISA (Jurnal Informatika dan Sains), 2019
Router is the network equipment for route the packet from one network segment to another in a bigscale network. Router can route packet because there is a routing table in router configuration.
Gede Andika Loka   +2 more
doaj   +1 more source

Reliability Of Routing Protocols [PDF]

open access: yesJournal of KONBiN, 2015
Abstract The article refers to the impact of damage and dynamic variables on operation of routing protocols and consequently to the whole network. On this purpose, there was introduced the characteristic of the routing protocols and both an internal and an exterior gateway.
Rafał Polak, Dariusz Laskowski
openaire   +2 more sources

A Survey on Underwater Acoustic Sensor Network Routing Protocols

open access: yesSensors, 2016
Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor
Ning Li   +3 more
doaj   +1 more source

Improving IoT Applications Using a Proposed Routing Protocol

open access: yesJournal of Engineering, 2023
The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications.
Dheyaa Jasim Kadhim   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy