Skip to main content

Showing 1–3 of 3 results for author: H, M D

Searching in archive cs. Search in all archives.
.
  1. arXiv:1504.04420  [pdf

    cs.NI

    PAR: Petal ant routing algorithm for mobile ad hoc network

    Authors: Manjunath M, Manjaiah D. H

    Abstract: During route discovery of mobile ad hoc network, broadcasting of route request and route reply packets are the essential operations for finding the path between two ends. In such situations, intermediate node which may or may not belongs will participate in route discovery process, update routing table and rebroadcast the route discovery packets again to its neighboring nodes. Finally optimal path… ▽ More

    Submitted 16 April, 2015; originally announced April 2015.

    Comments: 14 Pages, 17 figures

  2. Peer-to-Peer Live Streaming and Video On Demand Design Issues and its Challenges

    Authors: Hareesh. K, Manjaiah D. H

    Abstract: Peer-to-Peer Live streaming and Video on Demand is the most popular media applications over the Internet in recent years. These systems reduce the load on the server and provide a scalable content distribution. A new paradigm of P2P network collaborates to build large distributed video applications on existing networks .But, the problem of designing the system are at par with the P2P media streami… ▽ More

    Submitted 29 November, 2011; originally announced November 2011.

    Comments: International Journal of Peer to Peer Networks (IJP2P), Vol.2, No.4, October 2011

  3. arXiv:0908.0548  [pdf

    cs.NI cs.CR

    IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model:A Case Study for University of Mysore Network

    Authors: Hanumanthappa J., Manjaiah D. H

    Abstract: The actual transition from IPv4 to IPv6 requires network administrators to become aware of the next generation protocol and the associated risk problems.Due to the scale and complexity of current internet architecture how to protect from the existing investment and reduce the negative influence to users and service providers during the transition from IPv4 to IPv6 is a very important future topi… ▽ More

    Submitted 4 August, 2009; originally announced August 2009.

    Comments: 12 Pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS July 2009, Vol. 3, No. 1, USA