Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,680,946 papers from all fields of science
Search
Sign In
Create Free Account
Source routing
Known as:
IP Source Routing
, Segment Routing
In computer networking, source routing, also called path addressing, allows a sender of a packet to partially or completely specify the route the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Bounce message
Cjdns
Coloured Book protocols
Equal-cost multi-path routing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
First demonstration of SDN-based segment routing in multi-layer networks
A. Sgambelluri
,
A. Giorgetti
,
F. Cugini
,
G. Bruno
,
Francesco Lazzeri
,
P. Castoldi
Optical Fiber Communications Conference and…
2015
Corpus ID: 41040903
Segment Routing enabling dynamic optical bypass in a multi-layer network is experimentally demonstrated. Edge nodes are…
Expand
2014
2014
RSAODV : A ROUTE STABILITY BASED AD HOC ON DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK
S. Prasad
,
K. Bhatia
2014
Corpus ID: 18220747
High mobility of mobile nodes is one of the major reasons for link failures in mobile ad hoc network (MANET). The present paper…
Expand
2012
2012
Delay Prediction in Mobile Ad Hoc Network using Artificial Neural Network
J. Singh
,
P. Dutta
,
Arindrajit Pal
2012
Corpus ID: 60732780
2011
2011
Energy-aware routing algorithms for wireless ad hoc networks with heterogeneous power supplies
J. Vazifehdan
,
R. V. Prasad
,
E. Onur
,
I. Niemegeers
Comput. Networks
2011
Corpus ID: 17771489
2011
2011
Performance evaluation for on-demand routing protocols based on OPNET modules in wireless mesh networks
Lei Guo
,
Yuhuai Peng
,
Xingwei Wang
,
Dingde Jiang
,
Yinpeng Yu
Computers & electrical engineering
2011
Corpus ID: 27427885
2009
2009
The Simulation and Comparison of Routing Attacks on DSR Protocol
Jiwen Cai
,
Ping Yi
,
Ye Tian
,
Yongkai Zhou
,
Ning Liu
International Conference on Wireless…
2009
Corpus ID: 7068571
This paper focuses on mobile ad hoc network's routing vulnerability and compares network performance under several attacks. First…
Expand
Highly Cited
2008
Highly Cited
2008
OLSR vs DSR: A comparative analysis of proactive and reactive mechanisms from an energetic point of view in wireless ad hoc networks
F. Rango
,
Juan-Carlos Cano
,
Marco Fotino
,
C. Calafate
,
P. Manzoni
,
S. Marano
Computer Communications
2008
Corpus ID: 6523933
2007
2007
Trusted Dynamic Source Routing Protocol
C. Yong
,
Chuanhe Huang
,
Wenming Shi
International Conference on Wireless…
2007
Corpus ID: 17421985
In this paper, we design a novel secure routing protocol for mobile ad hoc networks (MANETs), called trusted dynamic source…
Expand
Highly Cited
2005
Highly Cited
2005
Performance of ad hoc routing using directional antennas
Romit Roy Choudhury
,
N. Vaidya
Ad hoc networks
2005
Corpus ID: 16264009
Highly Cited
1993
Highly Cited
1993
Choice of allocation granularity in multipath source routing schemes
R. Krishnan
,
J. Silvester
IEEE INFOCOM '93 The Conference on Computer…
1993
Corpus ID: 35503274
Multipath source routing schemes can be distinguished by their choice of allocation granularity. The schemes proposed in the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE