Sciweavers

574 search results - page 92 / 115
» Message delay in MANET
Sort
View
E2EMON
2006
IEEE
15 years 3 months ago
Implementation and Evaluation of a Protocol for Detecting Network-Wide Threshold Crossing Alerts
— Threshold crossing alerts (TCAs) indicate to a management system that a management variable, associated with the state, performance or health of the network, has crossed a cert...
Fetahi Wuhib, Rolf Stadler, Alexander Clemm
ICDCSW
2006
IEEE
15 years 3 months ago
Evaluation of Unstructured Overlay Maintenance Protocols under Churn
An overlay network is formed on top of – and generally independently from – the underlying physical computer network, by the peers (nodes) of a P2P system. The dynamics of pee...
Roberto Baldoni, Silvia Bonomi, Adriano Rippa, Leo...
97
Voted
CONEXT
2006
ACM
15 years 3 months ago
Using forgetful routing to control BGP table size
Running the Border Gateway Protocol (BGP), the Internet’s interdomain routing protocol, consumes a large amount of memory. A BGP-speaking router typically stores one or more rou...
Elliott Karpilovsky, Jennifer Rexford
BROADNETS
2005
IEEE
15 years 3 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
ICDCS
2005
IEEE
15 years 3 months ago
ZAL: Zero-Maintenance Address Allocation in Mobile Wireless Ad Hoc Networks
— The allocation of IP addresses in hybrid wireless networks is one of the most critical issues in all-IP converged wireless networks. The reason is that centralized IP address a...
Zhihua Hu, Baochun Li