• Study Resource
  • Explore Categories
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Tapestry: An Infrastructure for Fault-tolerant Wide-area
Tapestry: An Infrastructure for Fault-tolerant Wide-area

Energy and Latency Control in Low Duty Cycle MAC Protocols
Energy and Latency Control in Low Duty Cycle MAC Protocols

A Zero Burst Loss Architecture for star OBS Networks.
A Zero Burst Loss Architecture for star OBS Networks.

... congested. The core OXC may maintain not just the primary next hop routing entry but also secondary and tertiary next hops. Thus, each node based on its local information can choose any of the other next hops in case the primary is congested. It then has to calculate the additional offset value in c ...
Secure High-Throughput Multicast Routing in Wireless Mesh Networks
Secure High-Throughput Multicast Routing in Wireless Mesh Networks

... ODMRP [6]) build more resilient data paths, but have higher overhead due to redundant retransmissions. We focus on ODMRP as a representative mesh-based multicast protocol for wireless networks. Below we first give an overview of ODMRP, then describe how it can be enhanced with any linkquality metric ...
Square Region-Based Coverage and Connectivity Probability Model
Square Region-Based Coverage and Connectivity Probability Model

... every point within the region is covered by at least one sensor node. Definition 3.3: Network Connectivity. A network is said to be connected, if for every pair of nodes in the communication graph G, there exists a path between them, otherwise it is disconnected. In terms of communication networks, ...
Towards Joint Resource Allocation and Routing to Optimize Video
Towards Joint Resource Allocation and Routing to Optimize Video

... storage and computing resources, the cost saving could be quite small, if they are not appropriately scheduled. As a result, there is an opportunity to optimize the operational cost of delivering adaptive video streaming, by carefully allocating these two resources, and operating the network routing ...
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)

... Routing protocols for mobile ad-hoc networks have to face the challenge of frequently changing topology, low transmission power and asymmetric links. Both proactive and reactive routing protocols prove to be inefficient under these circumstances. The Zone Routing Protocol (ZRP) combines the advantag ...
Tapestry: A Resilient Global-scale Overlay for Service Deployment
Tapestry: A Resilient Global-scale Overlay for Service Deployment

Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems

CTC Information and Shortcuts
CTC Information and Shortcuts

... Network view shows all the nodes in a ring. A Superuser can set up this feature so each user will see the same network view, and users can create a custom view with maps. This view provides access to tabs and subtabs that you use to manage the network. Network view can contain domains. A domain is u ...
15-744: Computer Networking
15-744: Computer Networking

... • Addition goals to file location: • Provide publisher anonymity, security • Resistant to attacks – a third party shouldn’t be able to deny the access to a particular file (data item, object), even if it compromises a large fraction of machines ...
T R ECHNICAL ESEARCH
T R ECHNICAL ESEARCH

... Figure 6: INORA Coarse-Feedback number of links in the network at any given time. If node 6 fails to admit the ow, 6 sends an ACF The TORA routing table is restructured in INORA message to 3 as shown in g.9 Associated with every destination, there is a list of next hops which is created by TORA. W ...
TE2331953204
TE2331953204

Exploiting Route Redundancy via Structured Peer to Peer Overlays
Exploiting Route Redundancy via Structured Peer to Peer Overlays

IOSR Journal of Computer Engineering (IOSR-JCE)
IOSR Journal of Computer Engineering (IOSR-JCE)

Centrality Measures
Centrality Measures

... •  David  A.  Shamma,  Lyndon  Kennedy,  and   Elizabeth  F.  Churchill.  2009.  Tweet  the  debates:   understanding  community  annota;on  of   uncollected  sources.  In  Proceedings  of  the  first   SIGMM  workshop  on  Social  media  (WSM ...
System Level Design for Clustered Wireless Sensor Networks
System Level Design for Clustered Wireless Sensor Networks

... point is offered. Our solution is different from previous approaches, where single hop performance were optimized and best effort solutions proposed. We do not introduce clustering algorithms because we assume, as it is the case of many practical applications, that the clusters are already formed an ...
II. Background on ad-hoc networking protocols used
II. Background on ad-hoc networking protocols used

... Pro-active or table-driven routing protocols maintain fresh lists of destinations and their routes by distributing routing tables in the network periodically. The advantage of these protocols is that a route is immediately available when data needs to be sent to a particular destination. The disadva ...
Controller Area Network
Controller Area Network

... Abstract ...
Tapestry: A Resilient Global-scale Overlay for Service - IC
Tapestry: A Resilient Global-scale Overlay for Service - IC

pdf
pdf

pptx
pptx

... Pastry one could argue that complexity increases Kelips gets to a similar place and yet is very simple, but pays a higher storage cost than Chord/Pastry ...
A Novel Power Efficient Location-Based Cooperative Routing with
A Novel Power Efficient Location-Based Cooperative Routing with

Constrained Optical Multicast Routing
Constrained Optical Multicast Routing

... Optical Multicasting for Interactive Real-time Application in Sparse Splitting Optical Networks ...
Pi: A Practical Incentive Protocol for Delay Tolerant
Pi: A Practical Incentive Protocol for Delay Tolerant

... carry them until other DTN node appears within its transmission range. Therefore, the bundle propagation process in DTNs follows a “store-carry-and-forward" manner [8] and the bundles are opportunistically routed toward the destinations by intermittent connections. The opportunistic data propagation ...
< 1 2 3 4 5 6 7 8 9 10 ... 42 >

Kademlia

  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report