نتایج جستجو برای: probabilistic epidemic forwarding
تعداد نتایج: 121643 فیلتر نتایج به سال:
In delay tolerant network (DTN), an end-to-end path is not guaranteed and packets are delivered from a source node to a destination node via store-carry-forward based routing. In DTN, a source node or an intermediate node stores packets in buffer and carries them while it moves around. These packets are forwarded to other nodes based on predefined criteria and finally are delivered to a destina...
In this paper, we present a measurement study of persistent forwarding loops and a flooding attack that exploits persistent forwarding loops. Persistent forwarding loops may share one or more links with forwarding paths to some hosts. An attacker can exploit persistent forwarding loops to overload the shared links and disrupt Internet connectivity to those hosts. To understand the extent of thi...
a r t i c l e i n f o a b s t r a c t The use of Vehicular Ad-Hoc Networks (VANETs) for the dissemination of data flows to mobile highway vehicles has gained recently attention. For this purpose, vehicle-to-vehicle multi-hop communications are employed. For the effective networking of packets among highway vehicles, it is necessary to implement efficient algorithms that vehicles use to elect th...
the establishment as well as the survival of mobile ad-hoc networks relies on the cooperation of nodes for performing network operations such as routing and packet forwarding. in these networks, misbehaving nodes can severely degrade network’s performance by not cooperating in networking operations. in this paper, we study the issue of node misbehavior in packet forwarding. to counter this type...
the ip lookup process is a key bottleneck in routing due to the increase in routing table size, increasing traıc and migration to ipv6 addresses. the ip address lookup involves computation of the longest prefix matching (lpm), which existing solutions such as bsd radix tries, scale poorly when traıc in the router increases or when employed for ipv6 address lookups. in this paper, we describe a ...
twenty patients, a family, their neighbors, and friends; with lesions suspicious of ringworm infection, were referred to us within a period of 80 days. the source of infection was found to be 3 persian cats (a mother and two kittens) living with the family. the cats had multiple lesions around their nose and on abdomen which reveales the prevalence of cutaneous fungi both on direct microscopic ...
Epidemic, or probabilistic, multicast protocols have emerged as a viable mechanism to circumvent the scalability problems of reliable multicast protocols. However, most existing epidemic approaches use connectionless transport protocols to exchange messages and rely on the intrinsic robustness of the epidemic dissemination to mask network omissions. Unfortunately, such an approach is not networ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید