scispace - formally typeset
Search or ask a question

Why does AWS CNI networking make use of source based routing on the nodes? 

Answers from top 8 papers

More filters
Papers (8)Insight
Open accessProceedings ArticleDOI
30 Apr 1991
19 Citations
The network allows for a simple routing algorithm, even when nodes or links are faulty.
Open accessJournal ArticleDOI
Jabed Faruque, Ahmed Helmy 
43 Citations
So, routing protocols can use this natural gradient as an important attribute to forward the query towards source.
Hence, cryptographic security mechanisms are not sufficient to select appropriate nodes among many neighbouring nodes for secure packet routing from source to sink.
The algorithm lends itself to both node routing and source routing.
The hierarchical routing retains many advantages of source routing.
The algorithm can result in fewer replacements of sensor nodes and more reused routing paths.
Moreover, it does not require any location information of sensor nodes and only a small number of nodes are involved during the end-to-end routing process.
We prove the optimality of this algorithm and show that 1) nodes on the shortest path may not always be favored when selecting forwarders for NC-based routing and 2)the minimal cost of NC-based routing is upper-bounded by the cost of shortest path routing.

Related Questions

How to build cnc router?4 answersTo build a CNC router, several steps need to be followed. First, design the machine using CAD software and determine the required components and specifications. Next, select the appropriate motors, lead screws, and guides for the machine. Then, assemble the mechanical components, including the frame, liner guide, transmission system, and drive system. The machine can be controlled using open-source software such as Mach-3, connected to the machine via a parallel port and a breakout board. After fabrication, conduct experimental tests to measure the performance and accuracy of the CNC router. Additionally, consider incorporating cleaning and painting functions into the router apparatus for added functionality. Finally, ensure that the machine is suitable for remote/online education in mechatronics engineering.
How does routing work in NDN?5 answersRouting in Named Data Networking (NDN) is a crucial factor in determining the best path for data transmission. NDN uses variable-length names to identify data and employs stateful forwarding to deliver packets. The forwarding scheme in NDN is based on Protocol-Oblivious Forwarding (POF), which extends a stateful module in the POF architecture. The POF switch implements stateless forwarding functions, such as the Forwarding Information Base (FIB), while the stateful module handles stateful forwarding functions like the Pending Interest Table (PIT) and the Content Store (CS). The POF controller is responsible for control functions, including NDN routing mechanisms. Additionally, NDN requires a routing protocol that is scalable, robust, and efficient in content delivery. Proactive routing protocols have been analyzed in NDN networks, demonstrating better throughput and delay compared to IP networks. A distance-vector routing protocol called NDVR has also been developed to propagate data reachability information in ad hoc mobile scenarios. Furthermore, a centralized NDN routing mechanism has been proposed, combining the NLSR protocol and the P4 environment, to achieve network integration between NDN and TCP/IP.
How to routing between different networks?3 answersRouting between different networks involves selecting the most efficient path for network traffic. One method is to use a data link layer gateway device to connect the physical network to the SDN network. This device receives data and routes it to a computing device, which is selected to receive packets transmitted between the networks. Another method involves determining rankings for different paths and rerouting traffic along a more efficient path if it exceeds a threshold. Additionally, analyzing IP data flows can help determine alternate routing paths for network traffic between known and unknown networks. Another approach is to determine multiple paths from the origin to the destination, combining performance scores for each path, and selecting the one below a threshold for routing the traffic flow. Finally, in a network with multiple nodes and links, assigning waiting time distributions for means of transport at intermediate nodes can help determine alternative means of transport for routing.
How many Mac addresses a network node like switch can have?10 answers
What is the default Ansible's network protocol for communicating with the controller node?9 answers
What is the purpose of an edge node in an SD access network fabric?7 answers