2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 20
DOI: 10.1109/sahcn.2005.1557080
|View full text |Cite
|
Sign up to set email alerts
|

Blacklist-aided forwarding in static multihop wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 11 publications
0
16
0
Order By: Relevance
“…This may not provide full improvements which may be attained by determining the configuration of the neighboring mesh routers while recovering faulty links [4]. 3) Fault tolerant routing protocols [5], [6] uses detour path. For example consider fig.…”
Section: Fig1: Wireless Mesh Networkmentioning
confidence: 99%
“…This may not provide full improvements which may be attained by determining the configuration of the neighboring mesh routers while recovering faulty links [4]. 3) Fault tolerant routing protocols [5], [6] uses detour path. For example consider fig.…”
Section: Fig1: Wireless Mesh Networkmentioning
confidence: 99%
“…A class of proactive routing protocols called controlled flooding protocols reduce this control overhead (broadcast storm) by selecting a subset of stations to broadcast the link states to maintain routes; this includes [9], [10], [11], [12], [13]. Most of these controlled flooding algorithms, also use local neighborhood information to prune the link state locally [2], [14].…”
Section: Related Workmentioning
confidence: 99%
“…The Localized On-demand Link State (LOLS) ; Nelakuditi et al (2005)] attributes a long-term cost and a short-term cost to links. Longterm and short-term costs represent, respectively, the usual (historical) and the current cost of a link.…”
Section: Controlled-flooding Protocolsmentioning
confidence: 99%