IEEE INFOCOM 2019 - IEEE Conference on Computer Communications 2019
DOI: 10.1109/infocom.2019.8737536
|View full text |Cite
|
Sign up to set email alerts
|

A stack-vector routing protocol for automatic tunneling

Abstract: In a network, a tunnel is a part of a path where a protocol is encapsulated in another one. A tunnel starts with an encapsulation and ends with the corresponding decapsulation. Several tunnels can be nested at some stage, forming a protocol stack. Tunneling is very important nowadays and it is involved in several tasks: IPv4/IPv6 transition, VPNs, security (IPsec, onion routing), etc. However, tunnel establishment is mainly performed manually or by script, which present obvious scalability issues. Some works a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(16 citation statements)
references
References 16 publications
0
16
0
Order By: Relevance
“…On the side of routing in multilayer networks, the authors of [10] proposed the first distributed algorithm to compute the shortest paths while automatically establishing tunnels. It is widely inspired by Bellman-Ford algorithm.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…On the side of routing in multilayer networks, the authors of [10] proposed the first distributed algorithm to compute the shortest paths while automatically establishing tunnels. It is widely inspired by Bellman-Ford algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…However, the second operation must keep all valid paths, and in equality cases, i.e., valid paths having the same protocol stack (tunnel), must keep the shortest one. The proposed algebraic structures can be used to prove some convergence properties of the stackvector algorithm proposed in [10].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The SERP protocol algorithm is described as follows: First, initialize the parameters after completing the arrangement of sensor nodes and base station nodes. Then, calculate R i , the cluster radius of each node and ratio of cluster heads p, the optimal cluster head ratio according to Formulas (10) and (12). Determine T(s i ), the cluster head selection threshold for each node by the distance factor D f and the energy factor E f , select the cluster head by comparing it with a randomly generated random number within the range of 0-1, and update the G set.…”
Section: Description Of Algorithm Flowmentioning
confidence: 99%
“…The actuators execute operations based on the perceived data or the request from the user. At the same time, the self-organizing network technique and routing protocols [9][10][11] are the key objects of research on the perception layer, and efficient routing protocols can improve the efficiency of sensor node data fusion and the overall life cycle of the network. However, the method of randomly selecting cluster heads can easily give rise to problems such as uneven clustering and uncoordinated cluster sizes.…”
Section: Introductionmentioning
confidence: 99%