Buscar
Mostrando ítems 1-10 de 8106
Route leak identification: a step toward making inter-domain routing more reliable
(IEEE, 2014)
Route leaks are one of the anomalies of inter-domain routing that have the capacity to produce large Internet service disruptions. Route leaks are caused because of violation of routing policies among Autonomous Systems. ...
Self-reliant detection of route leaks in inter-domain routing
(2015)
Route leaks are among the several inter-domain routing anomalies that have the potential to cause large scale service disruptions on the Internet. The reason behind the occurrence of route leaks is the violation of routing ...
Performance Evaluation of AODV Routing Protocol in VANET with NS2
In intelligent transportation systems, the collaboration between vehicles and the road side units is essential to bring these systems to realization. The emerging Vehicular Ad Hoc Network (VANET) is becoming more and more ...
An approach for efficient ship routing
(John Wiley & Sons, 2013)
Ship routing problems are a particular kind of routing problems where the vehicles to be routed are vessels
or ships, usually in maritime environments. In contrast to land routing, ship routing has unique features,
including ...
DEVS-based Formalism for the Modeling of Routing Processes
(Springer Heidelberg, 2021-10-31)
The Discrete Event System Specification (DEVS) is a modular and hierarchical Modeling and Simulation (M&S) formalism based on systems theory that provides a general methodology for the construction of reusable models. ...
Load balancing in fixed-routing optical networks with weighted ordering heuristics
(2019-03-01)
In this paper we show that the adoption of a simple weighted ordering heuristic strategy to find fixed shortest path routes in a topology can improve load-balancing and, consequently, network performance. We compared our ...
Diagnosis of route leaks among autonomous systems in the internet
(IEEE, 2014)
Border Gateway Protocol (BGP) is the defacto inter-domain routing protocol in the Internet. It was designed without an inherent security mechanism and hence is prone to a number of vulnerabilities which can cause large ...
COMPARING A NOVEL QOS ROUTING ALGORITHM TO STANDARD
(2010-11-19)
The problem of finding QoS paths involving several
combinations of network metrics is NP-complete. This
motivates the use of heuristic approaches for finding
feasible QoS paths. Many constraint based routing
algorithms ...