6Decentralized:router knows physically-connected neighbors, linkcosts to neighborsiterative process ofcomputation, exchange of infowith neighbors"distance vector" algorithmsperiodic updatein response to link costchangesChapter 4: Network Layer4.5 Routing algorithmsLink stateLink stateNET 331: Computer Networks...
Part of the book series:Lecture Notes in Computer Science((LNTCS,volume 5193)) Included in the following conference series: European Symposium on Algorithms 1964Accesses Abstract Most data networks nowadays use shortest path protocols to route the traffic. Given administrative routing lengths for the ...
This paper was partially supported by BK21 program. Tae-Jin Lee is the corresponding author. Author information Editor information Editors and Affiliations
Campbell - 《Lecture Notes in Computer Science》 被引量: 38发表: 1999年 Adaptive rate control for streaming flows over the Internet Descriptors: C.2.2 [Computer Communication Networks]: NetworkProtocolsGeneral Terms: Algorithms, DesignKeywords: Congestion control design - Rate-based control ... LA ...
A Survey: Routing Protocols In Mobile Ad hoc Networks Topology-Based routing protocols become not suitable for MANETs when the nodes are highly mobile because of the excessive overhead of maintaining up-to- date network topology information. Now a days geographic routing algorithms are exte... RS...
The entangled network structure of the quantum Internet formulates a high complexity routing space that is hard to explore. Scalable routing is a routing method that can determine an optimal routing at particular subnetwork conditions in the quantum Internet to perform a high-performance and low-comp...
In Balasubramaniam et al. (2009), survivability-related routing algorithms (inspired by chemotaxis, reaction-diffusion, and quorum sensing biological processes) were proposed. They work together to effectively reconfigure network resources when transient link failures occur. The network survivability is ...
We proposed here two adaptive routing algorithms based on reinforcement learning. In the first algorithm, we have used a neural network to approximate a reinforcement signal, allowing the learner to incorporate various parameters into its distance estimation such as local queue size. Moreover, each ...
Nahle, S., Malouch, N. (2011). Fast-Converging Scheduling and Routing Algorithms for WiMAX Mesh Networks. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds) NETWORKING 2011. NETWORKING 2011. Lecture Notes in Computer Science, vol 6641. Springer, Berlin...
Baraneetharan E (2020) Role of machine learning algorithms intrusion detection in WSNs: a survey. J. Inf. Technol. Digit. World 02(03):161–173. https://doi.org/10.36548/jitdw.2020.3.004 Article Google Scholar Batra PK, Kant K (2016) LEACH-MAC: a new cluster head selection algorithm...