References
[1]. Al-Nakhala, N., Riley, R., & Elfouly, T. (2015).
Distributed algorithms in wireless sensor networks: An
approach for applying binary consensus in a real
testbed. Computer Networks, 79, 30-38. https://doi.org/
10.1016/j.comnet.2014.12.011
[2]. Chamberland, S. (2005). Point of presence design in
Internet protocol networks with performance guarantees.
Computers & Operations Research, 32(12), 3247-3264.
https://doi.org/10.1016/j.cor.2004.05.010
[3]. Chaudhry, A. U., Ahmad, N., & Hafez, R. H. (2012).
Improving throughput and fairness by improved channel
assignment using topology control based on power
control for multi-radio multi-channel wireless mesh
networks. EURASIP Journal on Wireless Communications
and Networking, 2012(1), 155. https://doi.org/10.1186/
1687-1499-2012-155
[4]. Diarrassouba, I., Lourimi, A., Mahjoub, A. R., &
Youssef, H. (2013). Hose workload based exact algorithm
for the optimal design of virtual private networks.
Computer Networks, 57(14), 2766-2774. https://doi.org
/10.1016/j.comnet.2013.06.009
[5]. Goścień, R., Walkowiak, K., & Klinkowski, M. (2015).
Tabu search algorithm for routing, modulation and
spectrum allocation in elastic optical network with
anycast and unicast traffic. Computer Networks, 79, 148-
165. https://doi.org/10.1016/j.comnet.2014.12.004
[6]. Han, S., Kim, M., Lee, B., & Kang, S. (2015). Fast
Directional Handoff and lightweight retransmission
protocol for enhancing multimedia quality in indoor
WLANs. Computer Networks, 79, 133-147. https://doi.org
/10.1016/j.comnet.2014.12.019
[7]. Hassan, D. S., Fahmy, H. M., & Bahaa-ElDin, A. M.
(2014). RCA: Efficient connected dominated clustering
algorithm for mobile ad hoc networks. Computer
Networks, 75, 177-191. https://doi.org/10.1016/j.comnet
.2014.10.010
[8]. Hsu, T. H., & Wu, J. S. (2008). An application-specific
duty cycle adjustment MAC protocol for energy
conserving over wireless sensor networks. Computer
Communications, 31(17), 4081-4088. https://doi.org/10.
1016/j.comcom.2008.08.010
[9]. Kim, J., & Park, K. H. (2009). An energy-efficient,
transport-controlled MAC protocol for wireless sensor
networks. Computer Networks, 53(11), 1879-1902. https:
//doi.org/10.1016/j.comnet.2009.03.002
[10]. Liu, Y. Y., Hong, J., & Yue, G. X. (2006). Routing
protocol with optimal location of aggregation point in
wireless sensor networks. The Journal of China Universities
of Posts and Telecommunications, 13(1), 1-5. https://doi.
org/10.1016/S1005-8885(07)60070-3
[11]. Ma, X. X., & Qin, Z. G. (2008). Partition and multipath
transmission: An encryption-free reputation sharing
protocol in Gnutella-like peer-to-peer network. Computer
communications, 31(14), 3059-3063. https://doi.org/10.
1016/j.comcom.2008.05.037
[12]. Magurawalage, C. M. S., Yang, K., Hu, L., & Zhang,
J. (2014). Energy-efficient and network-aware offloading
algorithm for mobile cloud computing. Computer
Networks, 74, 22-33. https://doi.org/10.1016/j.comnet.
2014.06.020
[13]. Mahmood, M. A., Seah, W. K., & Welch, I. (2015).
Reliability in wireless sensor networks: A survey and
challenges ahead. Computer Networks, 79, 166-187.
https://doi.org/10.1016/j.comnet.2014.12.016
[14]. Quintero, A., & Castro, H. (2007). A location routing
protocol based on smart antennas for ad hoc networks. Journal of Network and Computer Applications, 30(2),
614-636.https://doi.org/10.1016/j.jnca.2006.01.004
[15]. Wan, Z., Deng, R. H., Bao, F., & Ananda, A. L. (2007).
Access control protocols with two-layer architecture for
wireless networks. Computer Networks, 51(3), 655-670.
https://doi.org/10.1016/j.comnet.2006.05.009
[16]. Wang, N. C., & Lee, C. Y. (2009). A reliable QoS
aware routing protocol with slot assignment for mobile ad
hoc networks. Journal of Network and Computer
Applications, 32(6), 1153-1166. https://doi.org/10.1016
/j.jnca.2009.06.001
[17]. Wang, P., Cai, Y., Huang, J., & Xu, X. (2006). A
hierarchical multicast protocol in mobile IPv6 networks.
Computer communications, 30(1), 144-152. https://doi.
org/10.1016/j.comcom.2006.08.004