Proceedings of the 7th Annual International Conference on Mobile Computing and Networking 2001
DOI: 10.1145/381677.381682
|View full text |Cite
|
Sign up to set email alerts
|

Preemptive routing in Ad Hoc networks

Abstract: Routing in Ad hoc networks is a challenging problem because nodes are mobile and links are continuously being created and broken. Existing on-demand Ad hoc routing algorithms initiate route discovery only after a path breaks, incurring a significant cost in detecting the disconnection and establishing a new route. In this work, we investigate adding proactive route selection and maintenance to on-demand Ad hoc routing algorithms. More specifically, when a path is likely to be broken, a warning is sent to the s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
111
0

Year Published

2003
2003
2017
2017

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 153 publications
(112 citation statements)
references
References 20 publications
0
111
0
Order By: Relevance
“…Networking protocols for routing data in wireless networks are very popular within the literature [12,1,4,5], however, none of them address higher level issues of data processing, merely techniques for data routing. Our tree based routing approach is clearly inferior to these approaches for peer to peer routing, but works well for the aggregation scenarios we are focusing on.…”
Section: Related Workmentioning
confidence: 99%
“…Networking protocols for routing data in wireless networks are very popular within the literature [12,1,4,5], however, none of them address higher level issues of data processing, merely techniques for data routing. Our tree based routing approach is clearly inferior to these approaches for peer to peer routing, but works well for the aggregation scenarios we are focusing on.…”
Section: Related Workmentioning
confidence: 99%
“…The signal power of received messages can be used to estimate the distance between them. In [5] the signal power is determined to be…”
Section: Exchange Of Credentialsmentioning
confidence: 99%
“…Hence, it is better that the video encoding rate is versatile to the system transmission procedure. To this end, crosslayer video transmission has pulled in heaps of consideration including cross-layer rate control [7], [9][10][11][12][13], cross-layer asset allotment [14][15][16][17][18]. Not the same as these current works, we concentrate on examining the effect of video encoding rate and the transmission procedure of all sessions on the video transmission quality while considering the stochastic property of obstruction.…”
Section: Introductionmentioning
confidence: 99%