Exploiting the power of multiplicity: a holistic survey of network-layer multipath
The Internet is inherently a multipath network: For an underlying network with only a single path, connecting various nodes would have been debilitatingly fragile. Unfortunately, traditional Internet technologies have been designed around the restrictive assumption of a single working path between a...
| Main Authors: | Qadir, Junaid, Ali, Anwaar, Yau, Alvin Kok-Lim *, Arjuna Sathiaseelan, Crowcroft, Jon |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2015
|
| Subjects: | |
| Online Access: | http://eprints.sunway.edu.my/303/ http://eprints.sunway.edu.my/303/1/NLMultipathing_v10b.pdf |
Similar Items
Wild interdisciplinarity: ethnography and computer science
by: Goulden, Murray, et al.
Published: (2016)
by: Goulden, Murray, et al.
Published: (2016)
Multipath routing protocol based on cross-layer approach for MANET
by: Allahham, Alaa Azmi, et al.
Published: (2017)
by: Allahham, Alaa Azmi, et al.
Published: (2017)
QoS in IEEE 802.11-based wireless networks: A contemporary review
by: Malik, Aqsa, et al.
Published: (2015)
by: Malik, Aqsa, et al.
Published: (2015)
Using Multipath Priority Routing for Solar Powered Wireless Sensor Networks
by: Thirumal, Kandasamy, et al.
Published: (2008)
by: Thirumal, Kandasamy, et al.
Published: (2008)
Mitigation of multipath fading in indoor radiometric fingerprinting systems
by: Agel, Mabruka Mohamed, et al.
Published: (2019)
by: Agel, Mabruka Mohamed, et al.
Published: (2019)
Smart Routing Management Framework Exploiting Dynamic Data Resources of Cross-Layer Design and Machine Learning Approaches for Mobile Cognitive Radio Networks: A Survey
by: Salih, Qusay Medhat, et al.
Published: (2020)
by: Salih, Qusay Medhat, et al.
Published: (2020)
Optimization algorithms for multipath transfer over asymmetric paths using concurrent multipath transfer stream control transmission protocol
by: Abass, Abdulridha Hanash
Published: (2016)
by: Abass, Abdulridha Hanash
Published: (2016)
Basic study of OFDM with multipath propagation
model in GNU Platform
by: Muslimin, Jusnaini, et al.
Published: (2016)
by: Muslimin, Jusnaini, et al.
Published: (2016)
A feasibility study of an in-the-wild experimental public access WiFi network
by: Sathiaseelan, Arjuna, et al.
Published: (2014)
by: Sathiaseelan, Arjuna, et al.
Published: (2014)
PERFORMANCE EVALUATION OF SINGLE-PATH AND MULTIPATH MANETS ROUTING PROTOCOLS FOR DENSE AND SPARSE TOPOLOGY
by: Mahdi, Mohammed A., et al.
Published: (2017)
by: Mahdi, Mohammed A., et al.
Published: (2017)
Enhanced Bluetooth Low Energy 5 Aodv-Based Mesh Communication Protocol With Multipath Support
by: Ghori, Muhammad Rizwan
Published: (2023)
by: Ghori, Muhammad Rizwan
Published: (2023)
Multipath Cluster Based Routing Protocol For Non-Uniform Node Density Mobile Ad Hoc Networks
by: Mohammed Mahdi, Mohammed Abdo
Published: (2016)
by: Mohammed Mahdi, Mohammed Abdo
Published: (2016)
Business Process Reengineering: A Holistic Approach
by: Tehraninasr, Ali, et al.
Published: (2009)
by: Tehraninasr, Ali, et al.
Published: (2009)
Energy and mobility conscious multipath routing protocol for route stability and load balancing in MANET‐IoT networks
by: Jabbar, Waheb A., et al.
Published: (2018)
by: Jabbar, Waheb A., et al.
Published: (2018)
Guest editorial
by: Chieng, David, et al.
Published: (2015)
by: Chieng, David, et al.
Published: (2015)
Modelling, Detection And Exploitation Of Lexical Functions For Analysis.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
by: Che Akmal, Che Yahaya, et al.
Published: (2022)
by: Che Akmal, Che Yahaya, et al.
Published: (2022)
Crowd Associated Network: Exploiting over a Smart Garbage Management System
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Reinforcement learning-based trust and reputation model for spectrum leasing in cognitive radio networks
by: Ling, Mee Hong *, et al.
Published: (2013)
by: Ling, Mee Hong *, et al.
Published: (2013)
Multiple hashes of single key with passcode for multiple accounts
by: Lee, Kok-wah, et al.
Published: (2007)
by: Lee, Kok-wah, et al.
Published: (2007)
A design theory for holistic student self-service university management system
by: Muhamad Idaham, Umar Ong, et al.
Published: (2019)
by: Muhamad Idaham, Umar Ong, et al.
Published: (2019)
Exploitation of ICT for strategic education marketing in
Malaysian Public Institutions of Higher Learning (MPIHL)
by: Khayon, Mohaiminah, et al.
Published: (2006)
by: Khayon, Mohaiminah, et al.
Published: (2006)
A collaborative model for post flood activities exploiting an enhanced expanding neighborhood search algorithm
by: Hasan, Md Munirul
Published: (2019)
by: Hasan, Md Munirul
Published: (2019)
Deep learning enabled fall detection exploiting gait analysis
by: Anwary, Arif Reza, et al.
Published: (2022)
by: Anwary, Arif Reza, et al.
Published: (2022)
Midrange exploration exploitation searching particle swarm optimization in dynamic environment
by: Nurul Izzatie Husna, Fauzi, et al.
Published: (2021)
by: Nurul Izzatie Husna, Fauzi, et al.
Published: (2021)
A survey on MAC-based physical layer security over wireless sensor network
by: Ur Rehman, Attique, et al.
Published: (2022)
by: Ur Rehman, Attique, et al.
Published: (2022)
Can an electronic textbooks be part of K-12 education?: Challenges, technological solutions and open issues
by: Lee, Jasmine Hee Jeong, et al.
Published: (2013)
by: Lee, Jasmine Hee Jeong, et al.
Published: (2013)
Spectrum leasing in cognitive radio networks: a survey
by: Syed, Aqeel Raza*, et al.
Published: (2014)
by: Syed, Aqeel Raza*, et al.
Published: (2014)
A reliable friendship mechanism for online social network exploiting pre and post-filtering approach
by: S M Nazmus, Sadat
Published: (2022)
by: S M Nazmus, Sadat
Published: (2022)
Exploiting an Elitist Barnacles Mating Optimizer implementation for substitution box optimization
by: Kamal Zuhairi, Zamli, et al.
Published: (2023)
by: Kamal Zuhairi, Zamli, et al.
Published: (2023)
Joint channel selection and cluster-based routing scheme based on reinforcement learning for cognitive radio networks
by: Yasir Saleem, *, et al.
Published: (2015)
by: Yasir Saleem, *, et al.
Published: (2015)
SMART: A SpectruM-Aware clusteR-based rouTing scheme for distributed cognitive radio networks
by: Saleem, Yasir *, et al.
Published: (2015)
by: Saleem, Yasir *, et al.
Published: (2015)
Mobile application for concrete strength measurement tools by exploiting heat imaging information
by: Nur Farhana Nabila, Zulkifli
Published: (2019)
by: Nur Farhana Nabila, Zulkifli
Published: (2019)
Midrange exploration exploitation searching particle swarm optimization with HSV-template matching for crowded environment object tracking
by: Nurul Izzatie Husna, Muhamad Fauzi
Published: (2023)
by: Nurul Izzatie Husna, Muhamad Fauzi
Published: (2023)
Multiple vehicle cooperation and collision avoidance in automated vehicles : Survey and an AI‑enabled conceptual framework
by: Abu Jafar, Md Muzahid, et al.
Published: (2023)
by: Abu Jafar, Md Muzahid, et al.
Published: (2023)
Multipath characterisation of the MeerKAT core site
by: Phiri, T., et al.
Published: (2017)
by: Phiri, T., et al.
Published: (2017)
Indoor multipath effect study on the Locata system
by: Bonenberg, Lukasz K., et al.
Published: (2010)
by: Bonenberg, Lukasz K., et al.
Published: (2010)
Application of reinforcement learning to wireless sensor
networks: models and algorithms
by: Yau, Alvin Kok-Lim *, et al.
Published: (2015)
by: Yau, Alvin Kok-Lim *, et al.
Published: (2015)
A cyber-enabled mission-critical system for post-flood response: Exploiting TV white space as network backhaul links
by: Rahman, Md. Arafatur, et al.
Published: (2019)
by: Rahman, Md. Arafatur, et al.
Published: (2019)
The Holistic Archival Personality Profiling Model (HAPPM): Comprehensive
Data Integration for Personality Analysis
by: Hutson, James, et al.
Published: (2023)
by: Hutson, James, et al.
Published: (2023)
Similar Items
-
Wild interdisciplinarity: ethnography and computer science
by: Goulden, Murray, et al.
Published: (2016) -
Multipath routing protocol based on cross-layer approach for MANET
by: Allahham, Alaa Azmi, et al.
Published: (2017) -
QoS in IEEE 802.11-based wireless networks: A contemporary review
by: Malik, Aqsa, et al.
Published: (2015) -
Using Multipath Priority Routing for Solar Powered Wireless Sensor Networks
by: Thirumal, Kandasamy, et al.
Published: (2008) -
Mitigation of multipath fading in indoor radiometric fingerprinting systems
by: Agel, Mabruka Mohamed, et al.
Published: (2019)