Proceedings 23rd Annual Conference on Local Computer Networks. LCN'98 (Cat. No.98TB100260)
DOI: 10.1109/lcn.1998.727652
|View full text |Cite
|
Sign up to set email alerts
|

Source-initiated adaptive routing algorithm (SARA) for autonomous wireless local area networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…The network was configured such that: 1) The flows' routes intersect with each other; and 2) The nodes are continuously moving in order to cause route breakups and reordering of the flows' packets. The routing protocol that was utilized in the simulation is Source-Initiated Adaptive Routing Algorithm (SARA) [10]. Fig.…”
Section: Resultsmentioning
confidence: 99%
“…The network was configured such that: 1) The flows' routes intersect with each other; and 2) The nodes are continuously moving in order to cause route breakups and reordering of the flows' packets. The routing protocol that was utilized in the simulation is Source-Initiated Adaptive Routing Algorithm (SARA) [10]. Fig.…”
Section: Resultsmentioning
confidence: 99%
“…The Cluster Gateway has been successfully implemented on top of SARA (Source-initiated Ad hoc Routing Algorithm) [7] on both the Windows NT and Linux platforms. The testbed consisted of four machines for the AWLAN, three notebook computers and one desktop computer (CG).…”
Section: Methodsmentioning
confidence: 99%
“…However, the QoS aware SPARROW protocols are targeted for MAC technologies that support channel reservations. The Source Initiated Routing Protocol (SARA) [7] addresses many of the weaknesses of the proposed MANET protocols. SARA was initially proposed for adaptive QoS of multimedia streams in best-effort wireless environments such as 802.11.…”
Section: Ad Hoc Routing Protocolsmentioning
confidence: 99%
“…Asymmetry has been dealt with in a variety of ways, including the exchange of neighbor lists in periodic local messages to detect asymmetric links [13], similar to the approach used in our network. End-to-end techniques have also been employed to deal with asymmetric links, for example, by flooding route reply messages rather than simply reversing the route request path [8].…”
Section: Related Workmentioning
confidence: 99%