Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Flooding

Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts
a simple routing algorithm in which every incoming packet is sent through every outgoing link
Published in Chapter:
Vehicular Delay Tolerant Networks
Daniel Câmara (EURECOM Sophia Antipolis, France), Nikolaos Frangiadakis (University of Maryland, USA), Fethi Filali (QU Wireless Innovations Center, Qatar), and Christian Bonnet (EURECOM Sophia Antipolis, France)
DOI: 10.4018/978-1-60960-042-6.ch023
Abstract
Traditional networks suppose the existence of some path between endpoints, small end to end round-trip Delay time, and loss ratio. Today, however, new applications, environments and types of devices are challenging these assumptions. In Delay Tolerant Networks (DTNs), an end-to-end path from source to destination may not exist. Nodes may connect and exchange information in an opportunistic way. This book chapter presents a broad overview of DTNs, particularly focusing on Vehicular DTNs, their main characteristics, challenges, and research projects on this field. In the near future, cars are expected to be equipped with devices that will allow them to communicate wirelessly. However, there will be strict restrictions to the duration of their connections with other vehicles, whereas the conditions of their links will greatly vary; DTNs present an attractive solution. Therefore, VDTNs constitute an attractive research field.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Flood Risk and Vulnerability: An Approach to Urban Floods in Ribeira de Machico in the Autonomous Region of Madeira
Result of the concentration of excess rainwater that cannot be absorbed by already saturated soil and other forms of runoff.
Full Text Chapter Download: US $37.50 Add to Cart
Machine Learning Techniques to Mitigate Security Attacks in IoT
The deliberate congestion of communication channels through relay of unnecessary messages and high traffic.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR