Showing 1 - 20 results of 38 for search '"network routing"', query time: 0.07s Refine Results
  1. 1
  2. 2

    Multiobjective Optimization and Network Routing With Near-Term Quantum Computers by Shao-Hen Chiew, Kilian Poirier, Rajesh Mishra, Ulrike Bornheimer, Ewan Munro, Si Han Foon, Christopher Wanru Chen, Wei Sheng Lim, Chee Wei Nga

    Published 2024-01-01
    “…We study the application of this scheme to the network routing problem in detail, by first mapping it to the multiobjective shortest-path problem. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Cognitive network routing algorithm based on service awareness and policy choice by Cheng-jie GU, Shun-yi ZHANG, Yan-fei SUN

    Published 2011-11-01
    “…A cognitive network routing (CNR) algorithm based on service awareness and policy choice oriented to cognitive network was proposed.This algorithm takes network resource,flow,policy choice into account and obtains the flow characteristics and network resources condition in advance.CNR algorithm fulfills the distribution of resources through offline network allocation and gets the optimal path of each flow by online path computation.Simulation verified the effectiveness of cognitive network routing algorithm and showed that compared with the traditional routing algorithms,the cognitive network routing algorithm can improve the cognitive utilization of network resources,avoid network congestion coursed by resources allocation and optimize network performance at different levels.…”
    Get full text
    Article
  7. 7

    Requirements Analysis of Data Center Network Routing Algorithm Based on SDN Architecture by Zifu Fan, Chunling Wu, Jinhong Wang

    Published 2015-02-01
    “…Then the requirements of the data center network routing performance based on the SDN were analyzed and summarized and the solutions were proposed in order to provide the reference for the future construction and routing design of the data center network in China.…”
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    A review of the latest research on SDN technology optimization by IAOZiyu X

    Published 2015-12-01
    “…Under the background of SDN technology from the college to commercial,the research results of OpenFlow protocol optimization,application oriented flow table design,SDN multi-domain control,data center network routing optimization and requirements of security network architecture were introduced and summarized.At last,the application scenarios and research directions for the future SDN technology was proposed.…”
    Get full text
    Article
  14. 14

    Construction scheme analysis of computing force network by Lili WANG

    Published 2022-06-01
    “…The government puts forward higher requirements for the deployment of computing force network (CFN), so the telecom operators accelerate the implementation of computing network integration.Aiming to solve the problems of computing and network coordination and scheduling, based on the study of standards related to CFN, the research progress of CFN was summarized, the business requirements of CFN were analyzed, combined with the current reality of telecom operators, the deployment scheme of sustainable construction of CFN was put forward, which concerned with computing power reserve, transmission network, network routing and intelligent scheduling, it provides a reference for the early stage of CFN construction.…”
    Get full text
    Article
  15. 15

    Research on polymorphic routing mechanism for customized diversified services by Yu-xiang HU, Fang DONG, Peng WANG, Ju-long LAN

    Published 2015-07-01
    “…How to provide diversified routing services for various applications based on limited and constant network resources has become the urgent challenge.Based on the network self-organization and self-adjustment researches on the adaptive matching between routing and application was made,and a polymorphic routing model for customized diversified services was provided.By adaptive self-matching of basic macro-core of the network routing architecture the derivation and inheritance of customized addressing and routing mechanisms could be realized.Then the network to self-adjust for various routing services was dynamical,and therefore the co-existence of multiple modes and multiple morphologies of routing and addressing mechanisms was allowed.…”
    Get full text
    Article
  16. 16

    IEDR:an infrastructure enhanced DTN routing protocol by Zhen YU, Jing-dong XU, Jian-zhong ZHANG, Yu ZHANG

    Published 2013-08-01
    “…To cope with un-ideal conditions in mobile network where connectivity is only intermittent,a novel DTN (delay tolerant network) routing protocol,IEDR,was proposed,which incorporates experiences gained before and strives to fully utilize node contacts for data exchange,in order to maximize delivery ratio and minimize delivery delay,while still with controlled overhead.Additionally,IEDR attempted to use wireless access points for data propagation,as access points were supposed to be widely deployed and interconnected with high speed,providing an opportunity to efficiently distribute data in large areas.The evaluation proves that IEDR is better than many classic DTN routing protocols.…”
    Get full text
    Article
  17. 17

    Research on Routing Optimization in Satellite Internet Based on Deep Reinforcement Learning by Linhui WEI, Guowen LIU, Yu LIU, Yumei WANG

    Published 2022-09-01
    “…With the rapid development of satellite communication, the satellite internet is one of the core technologies of 6G network to realize global coverage, full-time access and full scene service.The high dynamics and limited capacity of satellite network lead to a series of management and control challenges such as heterogeneous network management, dynamic resource allocation and so on.Since the machine learning-based technologies have strength in network design, the intelligent architecture of software-defi ned satellite internet was put forward.In view of the intelligent routing in satellite internet, and leverages the deep reinforcement algorithm based on double delayed deep deterministic policy gradient (TD3) to solve the network routing optimization problem.The experimental results showed that compared with DDPG algorithm, the TD3 algorithm reduced the delay by 19.19%.…”
    Get full text
    Article
  18. 18

    Fundamental performance bounds for multi-performance criteria in wireless ad hoc networks by Qi WANG, Jaffrès-Runser Katia, Yi SUN, Jun LI, Jun ZHANG, Bin DA, Zhong-cheng LI

    Published 2015-06-01
    “…In wireless ad hoc networks,the fundamental performance bounds could provide insight to improve network routing or resource allocation protocol as well as an upper bound against which to compare the performance of existing protocols.This work addresses the problem of deriving fundamental performance bounds including Pareto optimal upper and lower bounds for wireless ad hoc networks when multiple criteria including throughput,delay and energy are of interest.It is based on a performance evaluation framework composed of a broadcast and interference-limited network model.Fundamental performance bounds derived for a 1-relay and a 2-relay with multi-flow topologies are assessed through simulations.The model is validated with highest RMSE lower than 10<sup>-3</sup>.…”
    Get full text
    Article
  19. 19

    Communication and Security Integrated Space-Earth Heterogeneous Network Architecture by Xiaoning ZHANG, Lidong ZHU

    Published 2020-12-01
    “…., space-earth heterogeneous network service layer, space-earth heterogeneous network traffi c layer, space-earth heterogeneous network routing layer and space-earth heterogeneous network access layer) and fi ve network identifi ers (i.e., service identifi er, traffi c identifi er, routing identifi er, access identifi er and host identifi er).With the method of effi cient network identifi er mapping, the communication and security integrated requirement for space information networks and ground private communication networks could be guaranteed.…”
    Get full text
    Article
  20. 20

    Secure topology protocol for mobile peer-to-peer networks by LI Zhi-yuan1, WANG Ru-chuan1

    Published 2010-01-01
    “…For the security problem in mobile peer to peer(MP2P) networks,an adaptive mobile peer-to-peer secure topology protocol(AMPSTP) was proposed.Firstly,Fortune algorithm was used to divide a large geographical region into some small sub regions.Secondly,temporary anchor node selection and update strategies were given.Thirdly,MP2P overlay network topology construction and maintenance mechanisms were also given.Fourthly,MP2P overlay network routing discovery algorithm and node selection mechanism based on game theory for MP2P networks were successively proposed.Finally,the performance of the AMPSTP protocol was theoretically analyzed and simulated on the platform of NS-2.Theoretical analysis and simulation results show that compared with MADPastry protocol,AMPSTP protocol not only can guarantee the network security and improve network performance,but also greatly reduce the control overhead.…”
    Get full text
    Article