A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
On the robustness of soft state protocols
Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004.
Soft state has been a mantra of Internet protocol design for the past decade. ...
System designers build protocols that implement soft state mechanisms based on intuition or on qualitative arguments that the design is "better", yet there has never been a formal performance evaluation ...
Conclusion In this paper we have compared the robustness of soft and hard state protocols. ...
doi:10.1109/icnp.2004.1348084
dblp:conf/icnp/LuiMR04
fatcat:naayyh2o2fctlbqlzhx5wh3zpu
Robustness of Receiver-Driven Multi-hop Wireless Network with Soft-State Connectivity Management
2010
2010 Fifth International Conference on Systems and Networks Communications
In this paper, we focused on the analogy between this periodic ID-transmission and a periodic message in the soft-state management. ...
We propose a soft-state management of routing tables in IRDT, where each node uses the periodic ID-transmission not only for communication but also for update of a routing table. ...
Research (A) 21240004" of the Japan Society for the Promotion of Science (JSPS) in Japan, "The Okawa Foundation", and "The Sekisui Chemical Grant Program for Research on Manufacturing Based on Learning ...
doi:10.1109/icsnc.2010.13
fatcat:7dmaju7zjjdxhh2ksyllrwo334
Robust and Resilient Data Collection Protocols for Multihop Wireless Sensor Networks
2012
IEICE transactions on communications
Most of the existing studies on sensor networks, however, do not conduct quantitative evaluation on robustness and do not discuss what brings in robustness. ...
By computer simulation, we show that receiver-initiated MAC protocols are more robust than sender-initiated ones and a simple detour-routing algorithm has more than tripled robustness than the simple minimum-hop ...
Research (C) 23500097" of the Japan Society for the Promotion of Science (JSPS) in Japan. ...
doi:10.1587/transcom.e95.b.2740
fatcat:pf6i5dmp2zb2dpru3ngwf4raya
A model, analysis, and protocol framework for soft state-based communication
1999
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication - SIGCOMM '99
Toward this end, we sketch our design of the "Soft State Transport Protocol" (SSTP), which enjoys the robustness of soft state while retaining the performance benefit of hsrd state protocols like TCP through ...
Our model not only provides a foundation for understanding soft state, but also induces a new fundamental transport protocol based on probabilistic delivery. ...
Toward this end, we sketch our design of the "Soft State Transport Protocol" (SSTP), which enjoys the robustness of soft state while retaining the performance benefit of hsrd state protocols like TCP through ...
doi:10.1145/316188.316202
dblp:conf/sigcomm/RamanM99
fatcat:kbumxsjysjee5ffsjscilq7fke
A model, analysis, and protocol framework for soft state-based communication
1999
Computer communication review
Toward this end, we sketch our design of the "Soft State Transport Protocol" (SSTP), which enjoys the robustness of soft state while retaining the performance benefit of hsrd state protocols like TCP through ...
Our model not only provides a foundation for understanding soft state, but also induces a new fundamental transport protocol based on probabilistic delivery. ...
Toward this end, we sketch our design of the "Soft State Transport Protocol" (SSTP), which enjoys the robustness of soft state while retaining the performance benefit of hsrd state protocols like TCP through ...
doi:10.1145/316194.316202
fatcat:4weojt7y7beltnw52arlbuo45i
H2A: A hardened asynchronous network on chip
2013
2013 26th Symposium on Integrated Circuits and Systems Design (SBCCI)
One of the next challenges for asynchronous communication architectures is reliability, in the form of robustness to single event effects, when under the impact of particles generated by ionizing radiation ...
Keywords-asynchronous circuits; networks on chip; soft error; single event effect I. ...
The main advantage of the NOAP implementation is its filtering property, mainly in the empty state. This protocol modification brings two main advantages to pipeline robustness: 1. ...
doi:10.1109/sbcci.2013.6644865
dblp:conf/sbcci/PontesCV13
fatcat:uo7lmf3jsvedpcvsdxyvjeioou
A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Networks
2012
IOSR Journal of Computer Engineering
This paper surveys and discusses considerable number of multicast routing protocols of network layers as there exists several interesting tasks from formation of multicast session, cooperation of nodes ...
It also provides various issues and challenges to be considered for designing such protocols for its use in MANET. ...
Advantages: Robust and useful routing protocol when the numbers of senders are greater than the receivers. Disadvantages: Increase in control overhead due to soft state approach. ...
doi:10.9790/0661-0662735
fatcat:76hhmk6bc5ajflot7gw57lzb5q
Robust MAC-lite and soft header recovery for packetized multimedia transmission
2010
IEEE Transactions on Communications
Packet header recovery at various protocol layers using MAP estimation is the cornerstone of the proposed solution. ...
The best candidate is then obtained through soft decoding of CRC protected data and CRC redundancy information itself. ...
ACKNOWLEDGEMENTS This work has been partly supported by the ANR DIVINE Project, and by the European Commission in the framework of the FP7 Network of Excellence in Wireless Communications NEWCOM++. ...
doi:10.1109/tcomm.2010.03.080303
fatcat:orbylov5lfgspgykbzcs7f235a
Self-tuning network support for MANETs
2008
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium
The impacts of soft state signalling, especially the refresh intervals, are studied under various scenarios. A variety of topology advertisement strategies are presented. ...
On the other hand, the dissemination of control messages has to be optimised for efficient resource usage and to alleviate channel contention problems. ...
MANET protocols and applications have to be resilient and robust in the presence of frequent topology changes. ...
doi:10.1109/noms.2008.4575275
dblp:conf/noms/HuangBS08
fatcat:cghx3fnn2nfadkt2e7g6ouisia
A Survey on Multicast Routing Protocols for Mobile Ad Hoc Networks
2014
International Journal of Computer Applications
The multicast routing protocols are divided into two categories-multicast routing based on application independence and multicast routing based on application dependence. ...
Multicasting is one of the major communication technologies primarily designed for bandwidth conservation and an efficient way of transferring data to a group of receivers in wireless mesh networks. ...
This can be done by either soft state approach or either hard state approach. Soft-State approach-Soft-State(SS) approach is also known as "connectionless approach" .In this the control packets are flooded ...
doi:10.5120/16864-6752
fatcat:lvnnfmvfb5ghrlmd4x4qcz7qtm
A Survey of Multicast Routing Protocols for Ad-Hoc Wireless Networks
2008
Menoufia Journal of Electronic Engineering Research
maintenance, core or coreless approach, and dependency on unicast routing protocols. ...
Many network applications require transmitting the same single copy of data packets concurrently to many destinations, it is called multicasting. ...
The protocols that follow this type are Bandwidth-Efficient Multicast Routing Protocol (BEMRP) [11] , Multicast Routing Protocol Based on Zone Routing (MZRP) [12] , Associativity-Based Ad Hoc Multicast ...
doi:10.21608/mjeer.2008.65207
fatcat:fmxsytsx2nfbzid2osmgdsjkkm
Autonomous Reconfiguration by Innovation of Diffusions
[chapter]
2006
IFIP International Federation for Information Processing
We present a novel Eramework that builds on the social science theory of diffusion of innovations, a theory which describes a flexible decision-making model. ...
The spatially and temporally diverse nature of ad hoc networks strongly suggests the development of a sophisticated multi protocol network-layer that should enable the ad hoc network's nodes to dynamically ...
It is during the execution of this stage of the protocol that each node decides which protocol suits it, based on the node's knowledge of its local network state. ...
doi:10.1007/0-387-31173-4_33
fatcat:ixkjocssxngx7hpsr3vunv3aoi
Resilient State Management in Large Scale Networks
[chapter]
2005
Lecture Notes in Computer Science
This paper describes, briefly, ongoing research on resource reservation state management, including research motivations and initial design. ...
Conclusions and Current Status This paper describes briefly ongoing PhD research on state management; simulations and experiments are being carried out; therefore more results will be available soon. ...
Dynamic Refresh Timer In existing soft state protocols, the values of the timer intervals are chosen by "matching empirical observations with desired recovery and response times" [4] . ...
doi:10.1007/11499169_31
fatcat:cn65hedokbeg3pyykvx4gdhiwa
Error-detecting/correcting-code-based self-checked/corrected/timed circuits
2010
2010 NASA/ESA Conference on Adaptive Hardware and Systems
Nanoscale VLSI design faces unprecedented reliability challenges in the presence of prevalent catastrophic defects, soft errors and parametric variations. ...
In this paper, I propose a group of error-detecting/correcting-code(EDC/ECC)based self-checked/corrected/timed circuits for logic robustness and performance scalability in nanoscale VLSI design. ...
. • A one-hot code with all default states leading to fault detection detects up-to-n-bit soft errors while n is the number of finite states [25] .It requires 117.1% internal nets, 109.4% total fanout ...
doi:10.1109/ahs.2010.5546217
dblp:conf/ahs/Liu10
fatcat:uq4lzvzdrrgvlou6i62lcdav4u
PBS: Signaling architecture for network traffic authorization
2013
IEEE Communications Magazine
The signaling approach enables easy installation and management of the permission state, and its use of soft-state improves robustness of the system. ...
On-path signaling is used to configure the permission state stored in routers for a data flow. ...
Soft-state of PBS supports the robustness of the system. Thus, the permission state is periodically refreshed by signaling messages. ...
doi:10.1109/mcom.2013.6553683
fatcat:lso2c6xkdbea5o6yobcxq3xdji
« Previous
Showing results 1 — 15 out of 76,220 results