2013
DOI: 10.1016/j.comcom.2013.01.006
|View full text |Cite
|
Sign up to set email alerts
|

E-CHANET: Routing, forwarding and transport in Information-Centric multihop wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
58
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 127 publications
(58 citation statements)
references
References 20 publications
0
58
0
Order By: Relevance
“…Request messages sent and received and offered a method for preventing and controlling of congestion in patient safety network [18]. Amadeo and Molinaro were named datas and with send request storm, the nearest node with the requested content, to provide an appropriate response [4].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Request messages sent and received and offered a method for preventing and controlling of congestion in patient safety network [18]. Amadeo and Molinaro were named datas and with send request storm, the nearest node with the requested content, to provide an appropriate response [4].…”
Section: Related Workmentioning
confidence: 99%
“…Request packets are also led to occupy buffer and the occurrence of congestion in the network [1,4,18,19]. Redundancy and the data packets rotate, can lead to occurrence of congestion in the network.…”
Section: Introductionmentioning
confidence: 99%
“…As a consequence, complicated handoff mechanisms are required as in current host-based communication. Current works in wireless information-centric communication do not consider forwarding tables to route Interests and either consider only one-hop communication to wired infrastructure [16], [6] or consider routing on a high-level [14] with endpoint identifiers [10], [1].…”
Section: Introductionmentioning
confidence: 99%
“…In wireless networks, topologies may change and periodic exchange of routing information may overload the network. Existing works [10], [1], threrefore, exploit the broadcast nature of the wireless medium. Requests are flooded and content prefix are overheared to learn distances to available content sources similar to existing routing protocols like AODV [12].…”
Section: Introductionmentioning
confidence: 99%
“…For example, TOP-CCN [4] reduces the number of control packets by multipoint relay (MPR) based packet flooding. E-CHANET [5] uses a counter-based suppression mechanism before packet transmissions. REMIF [6] reduces the power consumption by restricting duplicate interest packet transmissions.…”
Section: Introductionmentioning
confidence: 99%