Virtual ring routing: network routing inspired by DHTs

This paper presents Virtual Ring Routing (VRR), a new network routing protocol that occupies a unique point in the design space. VRR is inspired by overlay routing algorithms in Distributed Hash Tables (DHTs) but it does not rely on an underlying network routing protocol. [1]

Enhancing Source-Location Privacy in Sensor Network Routing

One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechanisms, one sensor network privacy issue that cannot be adequately addressed by network security is source-location privacy. Adversaries may use RF localization techniques to perform hop-by-hop traceback to the source sensor’s location. [2]

Survey of mobile ad hoc network routing protocols

Emerging ubiquitous computing needs “anytime and anywhere” network connections. Mobile ad hoc networks are well suited for this application area because they are self-organizing networks without depending on any network infrastructure. [3]

Solving Network Routing Problem Using Artificial Intelligent Techniques

The rapid revolution of communication networks requires a solution of network routing problem to be addressed in packet switched network. In the recent years, researchers have been solving routing problem in other to maintain continuous network transmission without any loss of packets. [4]

On Stability of Widest Path in Network Routing

The problem of widest path (WP) is a well-established topic in network routing and digital compositing. This paper contemplates one facet of the robustness of optimal solutions to the widest path; i.e., stability analysis of the WP problem. The study here deals with infimum and supremum perturbations which determine multiplicative changes each individual arc can tolerate conserving the optimality of a given WP. [5]

Reference

[1] Caesar, M., Castro, M., Nightingale, E.B., O’Shea, G. and Rowstron, A., 2006. Virtual ring routing: network routing inspired by DHTs. ACM SIGCOMM computer communication review36(4), pp.351-362.

[2] Kamat, P., Zhang, Y., Trappe, W. and Ozturk, C., 2005, June. Enhancing source-location privacy in sensor network routing. In 25th IEEE international conference on distributed computing systems (ICDCS’05) (pp. 599-608). IEEE.

[3] Liu, C. and Kaiser, J., 2005. Survey of mobile ad hoc network routing protocols.

[4] Oloduowo, A., Babalola, A. and Daniel, A. (2016) “Solving Network Routing Problem Using Artificial Intelligent Techniques”, Journal of Advances in Mathematics and Computer Science, 17(3), pp. 1-9. doi: 10.9734/BJMCS/2016/27033.

[5] Hosseini, A. and Baiki, B. (2017) “On Stability of Widest Path in Network Routing”, Journal of Advances in Mathematics and Computer Science, 23(6), pp. 1-10. doi: 10.9734/JAMCS/2017/35358.

Leave a Reply

Your email address will not be published. Required fields are marked *