<--- Back to Details
First PageDocument Content
Routing algorithms / Technology / Routing protocols / Routing / Computer networking / Ad hoc On-Demand Distance Vector Routing / Destination-Sequenced Distance Vector routing / Dynamic Source Routing / Optimized Link State Routing Protocol / Wireless networking / Network architecture / OSI protocols
Date: 2012-11-07 00:19:02
Routing algorithms
Technology
Routing protocols
Routing
Computer networking
Ad hoc On-Demand Distance Vector Routing
Destination-Sequenced Distance Vector routing
Dynamic Source Routing
Optimized Link State Routing Protocol
Wireless networking
Network architecture
OSI protocols

Microsoft Word - Ph.d. Thesis babar

Add to Reading List

Source URL: prr.hec.gov.pk

Download Document from Source Website

File Size: 69,03 KB

Share Document on Facebook

Similar Documents

Routing algorithms / Edsger W. Dijkstra / Mathematics / Game artificial intelligence / Combinatorial optimization / Search algorithms / Computing / Applied mathematics / Pathfinding / Shortest path problem / Deadlock / Routing

Efficient Traffic Routing with Progress Guarantees Stefan Blumer Manuel Eichelberger Roger Wattenhofer

DocID: 1xVZy - View Document

Internet architecture / Computing / Information and communications technology / Network architecture / OpenFlow / Networking hardware / Computer networking / Router / Routing

Sweet Little Lies: Fake Topologies for Flexible Routing Stefano Vissicchio University of Louvain

DocID: 1xVPP - View Document

Computing / Computer networking / Information and communications technology / Data transmission / Internet architecture / Internet protocols / Internet privacy / Network performance / Proxy server / Router / SOCKS / Internet protocol suite

Decoy Routing: Toward Unblockable Internet Communication Josh Karlin Daniel Ellard

DocID: 1xVLC - View Document

Cryptocurrencies / Computing / Bitcoin / Internet / Free software / Alternative currencies / Blockchains / Internet security / BGP hijacking / Mining pool / Ghash.io / Denial-of-service attack

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies https://btc-hijack.ethz.ch Maria Apostolaki Aviv Zohar

DocID: 1xVI1 - View Document

Wheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing Luca Cittadini Giuseppe Di Battista

DocID: 1xVsm - View Document