2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom) 2008
DOI: 10.1109/percom.2008.25
|View full text |Cite
|
Sign up to set email alerts
|

MeshChord: A Location-Aware, Cross-Layer Specialization of Chord for Wireless Mesh Networks (concise contribution)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
27
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 30 publications
(28 citation statements)
references
References 15 publications
1
27
0
Order By: Relevance
“…The work that is more closely related to this paper is [3], in which we investigated the performance of the Chord P2P algorithm in typical wireless mesh network scenarios through extensive, packet-level simulations. Furthermore, we proposed the MESHCHORD specialization of the basic Chord design, which, by explicitly accounting for peculiar features of mesh networks, reduces total network-level traffic of as much as 40% with respect to Chord.…”
Section: Related Work and Contributionmentioning
confidence: 99%
See 4 more Smart Citations
“…The work that is more closely related to this paper is [3], in which we investigated the performance of the Chord P2P algorithm in typical wireless mesh network scenarios through extensive, packet-level simulations. Furthermore, we proposed the MESHCHORD specialization of the basic Chord design, which, by explicitly accounting for peculiar features of mesh networks, reduces total network-level traffic of as much as 40% with respect to Chord.…”
Section: Related Work and Contributionmentioning
confidence: 99%
“…Recently, we have proposed MESHCHORD [3], a specialization for mesh networks of the well-known Chord algorithm [15], which exploits i) the availability of a wireless infrastructure and ii) the I-hop broadcast nature of wireless communications, to realize a) location-aware ID assignment to nodes, and b) implementation of a cross-layering technique that bridges the MAC to the middleware layer.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations