<--- Back to Details
First PageDocument Content
Routing algorithms / Routing / Telecommunications engineering / Multipath routing / Computer networking / IP forwarding / Link-state routing protocol / Computer network / Dynamic routing / Router / Equal-cost multi-path routing / Adaptive quality of service multi-hop routing
Routing algorithms
Routing
Telecommunications engineering
Multipath routing
Computer networking
IP forwarding
Link-state routing protocol
Computer network
Dynamic routing
Router
Equal-cost multi-path routing
Adaptive quality of service multi-hop routing

Microsoft Word - [en] Sujet thèse multichemins 2014.docx

Add to Reading List

Source URL: icube-reseaux.unistra.fr

Download Document from Source Website

File Size: 118,87 KB

Share Document on Facebook

Similar Documents

The Interleaved Authentication for Filtering False Reports in Multipath Routing based Sensor Networks Youtao Zhang 1,3 , Jun Yang 2 , Hai T Vu 3 1 Computer Science Department

DocID: 1uqsM - View Document

Routing-aware Multiple Description Coding with Multipath Transport for Video Delivered over Mobile Ad-hoc Networks Yiting Liao and Jerry D. Gibson Department of Electrical and Computer Engineering University of Californi

DocID: 1rCPw - View Document

Computing / Network architecture / Network performance / Internet protocols / Computer networking / Routing / Streaming / Transmission Control Protocol / Packet loss / Load balancing / Multipath TCP / Traffic flow

FlowBender: Flow-level Adaptive Routing for Improved Latency and Throughput in Datacenter Networks Abdul Kabbani Balajee Vamanan

DocID: 1rtxQ - View Document

Routing algorithms / Computing / Network architecture / Internet / Multipath routing / Routing

Microsoft PowerPoint - SecureRouting22Apr05ppt.ppt

DocID: 1rt8e - View Document

Computing / Routing algorithms / Cyberwarfare / Concurrent computing / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Computer network / Multipath routing / Botnet / Routing / Crowds

On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC 2 ETH Zurich, Switzerland

DocID: 1raw5 - View Document