Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,059 papers from all fields of science
Search
Sign In
Create Free Account
Source routing
Known as:
IP Source Routing
, Segment Routing
In computer networking, source routing, also called path addressing, allows a sender of a packet to partially or completely specify the route the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Bounce message
Cjdns
Coloured Book protocols
Equal-cost multi-path routing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
First demonstration of SDN-based segment routing in multi-layer networks
A. Sgambelluri
,
A. Giorgetti
,
F. Cugini
,
G. Bruno
,
Francesco Lazzeri
,
P. Castoldi
Optical Fiber Communications Conference and…
2015
Corpus ID: 41040903
Segment Routing enabling dynamic optical bypass in a multi-layer network is experimentally demonstrated. Edge nodes are…
Expand
2014
2014
RSAODV : A ROUTE STABILITY BASED AD HOC ON DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK
S. Prasad
,
K. Bhatia
2014
Corpus ID: 18220747
High mobility of mobile nodes is one of the major reasons for link failures in mobile ad hoc network (MANET). The present paper…
Expand
2011
2011
Energy-aware routing algorithms for wireless ad hoc networks with heterogeneous power supplies
J. Vazifehdan
,
R. V. Prasad
,
E. Onur
,
I. Niemegeers
Comput. Networks
2011
Corpus ID: 17771489
2011
2011
Performance evaluation for on-demand routing protocols based on OPNET modules in wireless mesh networks
Lei Guo
,
Yuhuai Peng
,
Xingwei Wang
,
Dingde Jiang
,
Yinpeng Yu
Computers & electrical engineering
2011
Corpus ID: 27427885
2009
2009
The Simulation and Comparison of Routing Attacks on DSR Protocol
Jiwen Cai
,
Ping Yi
,
Ye Tian
,
Yongkai Zhou
,
Ning Liu
International Conference on Wireless…
2009
Corpus ID: 7068571
This paper focuses on mobile ad hoc network's routing vulnerability and compares network performance under several attacks. First…
Expand
Highly Cited
2008
Highly Cited
2008
OLSR vs DSR: A comparative analysis of proactive and reactive mechanisms from an energetic point of view in wireless ad hoc networks
F. Rango
,
Juan-Carlos Cano
,
Marco Fotino
,
C. Calafate
,
P. Manzoni
,
S. Marano
Computer Communications
2008
Corpus ID: 6523933
2007
2007
Trusted Dynamic Source Routing Protocol
C. Yong
,
Chuanhe Huang
,
Wenming Shi
International Conference on Wireless…
2007
Corpus ID: 17421985
In this paper, we design a novel secure routing protocol for mobile ad hoc networks (MANETs), called trusted dynamic source…
Expand
Highly Cited
2005
Highly Cited
2005
Performance of ad hoc routing using directional antennas
Romit Roy Choudhury
,
N. Vaidya
Ad hoc networks
2005
Corpus ID: 16264009
Highly Cited
2004
Highly Cited
2004
GA-based heuristic algorithms for bandwidth-delay-constrained least-cost multicast routing
A. Haghighat
,
K. Faez
,
M. Dehghan
,
A. Mowlaei
,
Y. Ghahremani
Computer Communications
2004
Corpus ID: 14140610
2003
2003
Performance Evaluation of AODV Routing Protocol: Real-Life Measurements
Jean-Pierre Hubaux
2003
Corpus ID: 10735559
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required