2014 Underwater Communications and Networking (UComms) 2014
DOI: 10.1109/ucomms.2014.7017149
|View full text |Cite
|
Sign up to set email alerts
|

Capacity improvements for reduced flooding using distance to sink information in underwater networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…9) which by experience over time have proven to work well: 5 s, 65 s, 2.5 s, 20 s, and 60 s. With respect to the maximum number of retransmissions, we investigate the different possibilities . Note that a sink-packet extension to Dflood has also been proposed [42], which can improve protocol performance in large networks. This extension is not considered in this paper.…”
Section: Network Protocol Under Studymentioning
confidence: 99%
“…9) which by experience over time have proven to work well: 5 s, 65 s, 2.5 s, 20 s, and 60 s. With respect to the maximum number of retransmissions, we investigate the different possibilities . Note that a sink-packet extension to Dflood has also been proposed [42], which can improve protocol performance in large networks. This extension is not considered in this paper.…”
Section: Network Protocol Under Studymentioning
confidence: 99%
“…If nodes receive duplicate copies of the same packet within this time duration then it discards those copies. The algorithm proposed in [25] uses the back off timer with hop count to discard the duplicate copies. Many algorithms in past uses the same concept of timer and hop count.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The timer is selected randomly between the predefined minimum and maximum backoff duration that is 5 s and 65 s. This scheme does not use any additional network parameter in the forwarding decision. The above work was extended by authors in [ 25 ], where they used hop count information, additional to the backoff, to better decide which packet should be considered duplicate and discarded. There are many similar works in the literature that involve the backoff timers, however, in this section, we discuss the depth based opportunistic void avoidance schemes, which are closely related to our proposed EDOVE scheme.…”
Section: Previous Workmentioning
confidence: 99%