1997
DOI: 10.1145/263876.263885
|View full text |Cite
|
Sign up to set email alerts
|

A cluster-based approach for routing in dynamic networks

Abstract: The design and analysis of routing protocols is an important issue in dynamic networks such as packet radio and ad-hoc wireless networks. Most conventional protocols exhibit their least desirable behavior for highly dynamic interconnection topologies. We propose a new methodology for routing and topology information maintenance in dynamic networks. The basic idea behind the protocol is to divide the graph into a number of overlapping clusters. A change in the network topology corresponds to a change in cluster… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
186
0
3

Year Published

2002
2002
2008
2008

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 357 publications
(190 citation statements)
references
References 11 publications
1
186
0
3
Order By: Relevance
“…To form the MANET into clusters, we use the cluster formation algorithm [20]. Every node is aware of its neighbor nodes.…”
Section: Ids Leader Electionmentioning
confidence: 99%
See 1 more Smart Citation
“…To form the MANET into clusters, we use the cluster formation algorithm [20]. Every node is aware of its neighbor nodes.…”
Section: Ids Leader Electionmentioning
confidence: 99%
“…To defend node N 1 efficiently, the leader-IDS's optimal strategy is to sample the links, using Eq. (20), as follows: fAN 1 ¼ 0:3Â15 16:9 ; BN 1 ¼ 0:5Â18 16:9 ; CN 1 ¼ 0:2Â17 16:9 g. Note that, our solution will be iterated until the budget constraint is satisfied.…”
Section: Illustrative Examplementioning
confidence: 99%
“…The network size and distribution of nodes may change dynamically, which affects the number of clusters as defined by the cluster management protocol [11], [12], [13], [14]. For the purposes of the proposed DCA-based PKI architecture, we shall assume the basic functions of a generic cluster management protocol, i.e., cluster splitting and merging operations.…”
Section: Cluster Splitting and Mergingmentioning
confidence: 99%
“…At the lowest tier individual nodes are organized into clusters using standard clustering schemes [11], [12], [13], [14]. The next tier consists of one or more certificate repositories in each cluster.…”
Section: Introductionmentioning
confidence: 99%
“…The SSA algorithm has further improved the communication quality for message routing in a wireless ad-hoc mobile network. Besides the above the two algorithms, there have been many attempts from different researchers trying to solve some basic problems for such networks [IB94], [KCVP95], [CE95], [PB94], [DSB97].…”
Section: Introductionmentioning
confidence: 99%