peer reviewedThe protocol described in this paper builds and maintains an overlay topology on top of an ad hoc network. The overlay is intended to be used by a routing application. As flooding is a key component of many route discovery mechanisms in MANETs, we evaluate the delivery percentage, bandwidth consumption and time duration of flooding a message on the overlay. We also consider the overlay path stretch as an indicator for the data transfer transmission time. The protocol does not require any information from the underlay routing protocol, nor cooperation from the nodes that do not belong to the overlay. Each overlay node maintains a set of nearest overlay nodes and exchanges its neighbourhood information with them in order to se...
Peer-to-Peer (P2P) overlays were initially proposed for use with wired networks. However, the very ...
We study overlay architecture for dynamic routing, such that only a subset of devices (overlay nodes...
Dynamic overlay routing has been proposed as a way to enhance the reliability and performance of IP ...
peer reviewedThe protocol described in this paper builds and maintains an overlay topology on top of...
peer reviewedWe discuss what kind of overlay topology should be pro-actively built before an overlay...
Abstract. We discuss what kind of overlay topology should be pro-actively built before an overlay ro...
International audienceIn practice, ad hoc networks are still too unreliable for standard mobile and ...
International audienceAchieving reliable communication of critical data on mobile ad hoc networks is...
Overlay networks are built on top of an existing network, using its services for building overlay ne...
peer reviewedWe first motivate the use of ad hoc overlays. In particular, we argue that overlay rout...
Peer-to-Peer overlay networks can be deployed over Mobile Ad hoc Networks (MANET) to address content...
Abstract. Unstructured overlay networks are driven by simple protocols that are easy to analyze and ...
Application-layer overlay networks have recently emerged as a promising platform to deploy additiona...
In this age of information, new models of information exchange methodologies based on overlay networ...
Peer-to-peer (P2P) computing involves exchanging resources and files by computers connected through ...
Peer-to-Peer (P2P) overlays were initially proposed for use with wired networks. However, the very ...
We study overlay architecture for dynamic routing, such that only a subset of devices (overlay nodes...
Dynamic overlay routing has been proposed as a way to enhance the reliability and performance of IP ...
peer reviewedThe protocol described in this paper builds and maintains an overlay topology on top of...
peer reviewedWe discuss what kind of overlay topology should be pro-actively built before an overlay...
Abstract. We discuss what kind of overlay topology should be pro-actively built before an overlay ro...
International audienceIn practice, ad hoc networks are still too unreliable for standard mobile and ...
International audienceAchieving reliable communication of critical data on mobile ad hoc networks is...
Overlay networks are built on top of an existing network, using its services for building overlay ne...
peer reviewedWe first motivate the use of ad hoc overlays. In particular, we argue that overlay rout...
Peer-to-Peer overlay networks can be deployed over Mobile Ad hoc Networks (MANET) to address content...
Abstract. Unstructured overlay networks are driven by simple protocols that are easy to analyze and ...
Application-layer overlay networks have recently emerged as a promising platform to deploy additiona...
In this age of information, new models of information exchange methodologies based on overlay networ...
Peer-to-peer (P2P) computing involves exchanging resources and files by computers connected through ...
Peer-to-Peer (P2P) overlays were initially proposed for use with wired networks. However, the very ...
We study overlay architecture for dynamic routing, such that only a subset of devices (overlay nodes...
Dynamic overlay routing has been proposed as a way to enhance the reliability and performance of IP ...