2014
DOI: 10.1016/j.jda.2013.03.006
|View full text |Cite
|
Sign up to set email alerts
|

Improving time-efficiency in blocking expanding ring search for mobile ad hoc networks

Abstract: We propose a new strategy for reducing the amount of latency and energy consumption in Block-

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Now we present a comparison between F&C and other repeal-based flooding schemes. BERS [ 12 ], tBERS, and tBERS* [ 17 ] were selected for this analysis since they are protocols comparable to F&C since they chase the initial flooding once the source and target nodes find each other. To evaluate the performance of such protocols and compared them to F&C, we performed simulations in SimPy [ 34 ].…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Now we present a comparison between F&C and other repeal-based flooding schemes. BERS [ 12 ], tBERS, and tBERS* [ 17 ] were selected for this analysis since they are protocols comparable to F&C since they chase the initial flooding once the source and target nodes find each other. To evaluate the performance of such protocols and compared them to F&C, we performed simulations in SimPy [ 34 ].…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…An update was performed in BERS* [ 15 ] by halving the waiting time in each ring, thus speeding up the route discovery. In [ 17 ], the chase stage occurs in the receiver rather than in the source node as performed earlier. In [ 14 ], the authors used the ring as a boundary to retransmit the RQ at two different speeds.…”
Section: Related Workmentioning
confidence: 99%
“…The goal of confined techniques is preventing unnecessary circulation of query packets by limiting its hop count. Techniques like LBA [19], LHBA [20], revisiting-TTL ERS [21], blocking ERS [22], blocking ERS+ [15], BCIR [4], and tBERS [23] belong to this category. Chase-based strategy is used in almost all broadcasting techniques, revisiting-TTL ERS being an exception.…”
Section: Confined Broadcasting Techniquesmentioning
confidence: 99%
“…There is a trade-off between time efficiency and energy efficiency for protocols using chasing packets. More recent protocols such as Broadcast Cancellation Initiated from Resource (BCIR ) [10] and time-BERS (tBERS) [9], instead of waiting for the initiator node to start the cancellation process, start sending cancellation packets as soon as the resource is found. Both protocols improve time efficiency without additional energy costs.…”
Section: Related Workmentioning
confidence: 99%
“…Some energy efficient search mechanisms aim to attenuate the negative impact of flooding by limiting the query scope [8], [9], [10]. This can be achieved by intentionally delaying propagation, exploring a trade-off between energy This work is financed by the FCT − Fundação para a Ciência e a Tecnologia (Portuguese Foundation for Science and Technology) within project UID/EEA/50014/2013.…”
Section: Introductionmentioning
confidence: 99%