22.07.2013 Views

Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Proactive Protocols<br />

Most of the schemes discussed so far are reactive<br />

Proactive schemes based on distance-vector and<br />

link-state mechanisms have also been proposed<br />

161

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!