scispace - formally typeset
Search or ask a question
Topic

Static routing

About: Static routing is a research topic. Over the lifetime, 25733 publications have been published within this topic receiving 576732 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: An optimization problem for a call center with heterogeneous agent pools, in which each pool is distinguished by the speed at which agents in that pool handle calls, is formulated and the resulting routing policy is a threshold policy that determines server pool priorities based on the total number of customers in the system.
Abstract: In a call center, there is a natural trade-off between minimizing customer wait time and fairly dividing the workload among agents of different skill levels. The relevant control is the routing policy, that is, the decision concerning which agent should handle an arriving call when more than one agent is available. We formulate an optimization problem for a call center with heterogeneous agent pools, in which each pool is distinguished by the speed at which agents in that pool handle calls. The objective is to minimize steady-state expected customer wait time subject to a “fairness” constraint on the workload division. We first solve the optimization problem by formulating it as a Markov decision process (MDP), and solving a related linear program. We note that this approach does not in general lead to an optimal policy that has a simple structure. Fortunately, the optimal policy does appear to have a simple structure as the system size grows large, in the Halfin-Whitt many-server heavy-traffic limit regime. Therefore, we solve the diffusion control problem that arises in this regime and interpret its solution as a policy for the original system. The resulting routing policy is a threshold policy that determines server pool priorities based on the total number of customers in the system. We prove that a continuous modification of our proposed threshold routing policy is asymptotically optimal in the Halfin-Whitt limit regime. We furthermore present simulation results to illustrate that our proposed threshold routing policy outperforms a common routing policy used in call centers (that routes to the agent that has been idle the longest).

123 citations

Journal ArticleDOI
TL;DR: A novel algorithm that detects internal attacks by using both message and route redundancy during route discovery and an optimal routing algorithm with routing metric combining both requirements on a node's trustworthiness and performance are proposed.
Abstract: To secure a mobile ad hoc network (MANET) in adversarial environments, a particularly challenging problem is how to feasibly detect and defend possible attacks on routing protocols, particularly internal attacks, such as a Byzantine attack. In this paper, we propose a novel algorithm that detects internal attacks by using both message and route redundancy during route discovery. The route-discovery messages are protected by pairwise secret keys between a source and destination and some intermediate nodes along a route established by using public key cryptographic mechanisms. We also propose an optimal routing algorithm with routing metric combining both requirements on a node's trustworthiness and performance. A node builds up the trustworthiness on its neighboring nodes based on its observations on the behaviors of the neighbor nodes. Both of the proposed algorithms can be integrated into existing routing protocols for MANETs, such as ad hoc on-demand distance vector routing (AODV) and dynamic source routing (DSR). As an example, we present such an integrated protocol called secure routing against collusion (SRAC), in which a node makes a routing decision based on its trust of its neighboring nodes and the performance provided by them. The simulation results have demonstrated the significant advantages of the proposed attack detection and routing algorithm over some known protocols.

123 citations

Proceedings ArticleDOI
M. Bahr1
01 Oct 2007
TL;DR: The paper gives an update on three areas where major changes have been introduced to HWMP: support for interworking with other networks; revised concept for proactive routing trees to root MPs; and a better aligned extensible path selection framework.
Abstract: HWMP, the default routing protocol of IEEE 802.11s has been revised during the comment resolution of the first letter ballot. The paper gives an update on three areas where major changes have been introduced to HWMP: support for interworking with other networks; revised concept for proactive routing trees to root MPs; and a better aligned extensible path selection framework.

122 citations

Journal ArticleDOI
TL;DR: This paper considers (p, q )-Epidemic Routing, a class of store-carry-forward routing schemes, for sparsely populated mobile ad hoc networks, taking account of the recovery process that deletes unnecessary packets from the network.
Abstract: This paper considers (p, q )-Epidemic Routing, a class of store-carry-forward routing schemes, for sparsely populated mobile ad hoc networks. Our forwarding scheme includes Two-Hop Forwarding and the conventional Epidemic Routing as special cases. In such forwarding schemes, the original packet is copied many times and its packet copies spread over the network. Therefore those packet copies should be deleted after a packet reaches the destination. We analyze the performance of (p, q)-Epidemic Routing with VACCINE recovery scheme. Unlike most of the existing studies, we discuss the performance of (p, q)-Epidemic Routing in depth, taking account of the recovery process that deletes unnecessary packets from the network.

122 citations

Patent
01 Nov 1996
TL;DR: In this paper, a method of interconnecting transistors and other devices in order to optimize area of a layout of a cell while honoring performance constraints and enhancing yield starts with a prerouting step.
Abstract: A method of interconnecting transistors and other devices in order to optimize area of a layout of a cell while honoring performance constraints (1502) and enhancing yield starts with a prerouting step (152) that routes adjacent transistors using diffusion wiring (1506), routes power and ground nets (1508), routes aligned gates (1510), routes all remaining aligned source/drain nets as well as any special nets (1512). Next, all of the remaining nets are routed using an area based router (1408). Nets are order based on time criticality or net topology (1602). A routing grid is assigned for all the layers to be used in routing (1604). An initial coarse routing is performed (1606). Wire groups are assigned to routing layers (1608). Routing is improved and vias are minimized (1610). A determination is then made whether the routing solution is acceptable (1612). If the routintg solution is not acceptable, the routing space is expanded and routing costs and via costs are modifyied to improve the routing solution. Finally, the best routing solution is picked (1414).

122 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
95% related
Wireless network
122.5K papers, 2.1M citations
93% related
Wireless ad hoc network
49K papers, 1.1M citations
93% related
Wireless sensor network
142K papers, 2.4M citations
93% related
Server
79.5K papers, 1.4M citations
92% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202391
2022209
202130
202035
201962
2018132