2017
DOI: 10.24846/v26i4y201708
|View full text |Cite
|
Sign up to set email alerts
|

On Routing Protocols for High Performance

Abstract: Abstract:In computer networks, the routing protocols play the main role in source to destination delivery of packets with minimum communication time between the nodes as well as in selecting the best paths while utilizing fewer resources. The design of an efficient routing protocol almost in any kind of network is an important issue specifically in the Mobile Ad Hoc Networks (MANETs). Recently, the network research community has been very active towards efficient routing over MANETs in order to provide high-pe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…The author aims to define a theoretic game approach of deception involving an attacker and a defender in the IoT context. Y. M. Pa Pa et al show that Telnet-based attacks targeting IoT devices have an exponential trend and propose a low interaction honeypot system that emulates multiple CPU architectures (ARM, MIPS, and PPC) mainly used by IoT devices [28,29]. J. Guarnizo et al depict a new IoT honeypot-based scalable architecture named SIPHON.…”
Section: Iot Honeypot Systemsmentioning
confidence: 99%
“…The author aims to define a theoretic game approach of deception involving an attacker and a defender in the IoT context. Y. M. Pa Pa et al show that Telnet-based attacks targeting IoT devices have an exponential trend and propose a low interaction honeypot system that emulates multiple CPU architectures (ARM, MIPS, and PPC) mainly used by IoT devices [28,29]. J. Guarnizo et al depict a new IoT honeypot-based scalable architecture named SIPHON.…”
Section: Iot Honeypot Systemsmentioning
confidence: 99%
“…The topology of the network determines the size of this subset of nodes [17]. In OLSR, link state information is created and forwarded only by MPR nodes during the flooding process across the network [18]. In addition, OLSR uses two main types of control messages such as HELLO and Topology Control (TC) messages to find the route and maintain the network topology information.…”
Section: B Optimized Link State Routing Protocol (Olsr)mentioning
confidence: 99%
“…Scheduling of different data flows is based on a priority value, which is calculated by using the outstanding data of each flow. The researchers in [16] suggest that the design of a routing protocol is very important.…”
Section: Related Workmentioning
confidence: 99%