scispace - formally typeset
Book ChapterDOI

The Evaluation of Unconstrained Multicast Routing Algorithms in Ad-Hoc Networks

Reads0
Chats0
TLDR
It is proved that well-known multicast heuristic algorithms designed for packet networks have a good performance in ad-hoc networks with grid structure.
Abstract
Wireless ad-hoc networks are playing an important role in extending the implementation of traditional wireless infrastructure (cellular networks, wireless LAN, etc). Routing design in ad-hoc networks is a challenge because of limited node resources. Thus efficient data transmission techniques like multicasting are under scrutiny. The article analyzes and explores the performance of multicast heuristic algorithms without constraints and quality of multicast trees in ad-hoc networks and proves the thesis that well-known multicast heuristic algorithms designed for packet networks have a good performance in ad-hoc networks with grid structure.

read more

Citations
More filters
Book ChapterDOI

An Algorithm for Finding Shortest Path Tree Using Ant Colony Optimization Metaheuristic

TL;DR: The ShortestPathTreeACO algorithm designed for finding near-optimal and optimal solutions for the shortest path tree problem is introduced and the quality of generated solutions is addressed, as well as the issues of execution time.
Proceedings ArticleDOI

Firewall rule with token bucket as a DDoS protection tool

TL;DR: A new method for counteracting DDoS attacks - firewall rule with token bucket implementation from Quality of Services method is presented, which gives possibility for user to finish they work which was started before the DDoS attack occurs and they do not suffer from DDoS attacked.
Book ChapterDOI

NEW QoS CONCEPT for Protecting Network Resources

TL;DR: The concept of Quality of Services methods and some well know network protocols for preparing network to fight with the DDoS attacks are presented and lets the administrator to protect their network resources during the attack.
Book ChapterDOI

Fuzzy Observation of DDoS Attack

TL;DR: The presented results prove that Ordered Fuzzy Numbers have a huge potential for usage in observation of DDoS attacks and give a possibility for the network administrators to protect server resources.
References
More filters
Proceedings ArticleDOI

Ad-hoc on-demand distance vector routing

TL;DR: An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure and the proposed routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad- hoc networks.
Journal ArticleDOI

Routing of multipoint connections

TL;DR: In this article, a weighted greedy algorithm is proposed for a version of the dynamic Steiner tree problem, which allows endpoints to come and go during the life of a connection.
Book

Topology Control in Wireless Ad Hoc and Sensor Networks

Paolo Santi
TL;DR: In this article, the authors state several problems related to topology control in wireless ad hoc and sensor networks, and survey state-of-the-art solutions which have been proposed to tackle them.
Journal ArticleDOI

A fast algorithm for Steiner trees

TL;DR: The heuristic algorithm has a worst case time complexity of O(¦S¦¦V¦2) on a random access computer and it guarantees to output a tree that spans S with total distance on its edges no more than 2(1−1/l) times that of the optimal tree.
Related Papers (5)