Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking 1999
DOI: 10.1145/313451.313534
|View full text |Cite
|
Sign up to set email alerts
|

Query localization techniques for on-demand routing protocols in ad hoc networks

Abstract: Abstract. Mobile ad hoc networks are characterized by multi-hop wireless links, absence of any cellular infrastructure, and frequent host mobility. Design of efficient routing protocols in such networks is a challenging issue. A class of routing protocols called on-demand protocols has recently found attention because of their low routing overhead. We propose a technique that can reduce the routing overhead even further. The on-demand protocols depend on query floods to discover routes whenever a new route is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
60
0

Year Published

2002
2002
2011
2011

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 112 publications
(60 citation statements)
references
References 18 publications
0
60
0
Order By: Relevance
“…The value of probability is set according to packet counter that is not equal to the number of node neighbors. In [24], the authors introduced a technique to reduce the RREQ overhead during route discovery operation, using the previous path. They argue that when the path between source and destination is changed, the new path between them will not be extremely different from the previous one.…”
Section: Related Workmentioning
confidence: 99%
“…The value of probability is set according to packet counter that is not equal to the number of node neighbors. In [24], the authors introduced a technique to reduce the RREQ overhead during route discovery operation, using the previous path. They argue that when the path between source and destination is changed, the new path between them will not be extremely different from the previous one.…”
Section: Related Workmentioning
confidence: 99%
“…Table 1 lists these components and their composition. Each sensor node in the WSN runs application software (e.g., a query processor) developed using TinyOS [3]. The sink node acts as the root of the WSN and communicates with the data proxy.…”
Section: Terminologymentioning
confidence: 99%
“…However, such environments also make it hard to study techniques for data-centric WSN applications in real sensor networks. Furthermore, major techniques in data-centric WSNs, such as in-network query processing [8] [11] and queryinformed routing [3], need a realistic development and evaluation environment with system feedback at a suitable level of detail. In this design paper, we propose to develop an accurate sensor network emulator in order to facilitate studies of techniques for data-centric WSN applications.…”
Section: Introductionmentioning
confidence: 99%
“…Although these algorithms have strong distribution and can achieve most approximate solution, but the reliability was not so strong as to be applied in practice. To solve the problem, the engineers has brought out mechanism to reduce broadcast overhead by use of position information [5,6] or available path information [7], the most advantage of which is that the spatial localization of node mobile was utilized. It is benefit for broadcasting inquiring near the original paths and executing deterministic routing communication, but it is not suitable for general basic broadcasting communication.…”
mentioning
confidence: 99%