2010
DOI: 10.1109/tcomm.2010.06.090266
|View full text |Cite
|
Sign up to set email alerts
|

Optimal timer based selection schemes

Abstract: Timer-based mechanisms are often used to help a given (sink) node select the best helper node from among many available nodes. In these, a node transmits a packet when its timer expires. The timer value is a monotone non-increasing function of its local suitability metric, which ensures that the best node is the first to transmit and is selected successfully if no other node's timer expires within a "vulnerability" window after its timer expiry and so long as the sink can hear the available nodes. In this pape… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
74
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 67 publications
(75 citation statements)
references
References 21 publications
1
74
0
Order By: Relevance
“…A timer scheme, on the other hand, runs for a fixed preallocated selection duration T max , and does not require any feedback from the sink while it is running [1], [8], [9]. In it, a node i sets its timer based on its metric µ i .…”
Section: A Distributed Node Selection Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…A timer scheme, on the other hand, runs for a fixed preallocated selection duration T max , and does not require any feedback from the sink while it is running [1], [8], [9]. In it, a node i sets its timer based on its metric µ i .…”
Section: A Distributed Node Selection Schemesmentioning
confidence: 99%
“…The metricto-timer mapping is monotone non-increasing, which ensures that the best node transmits first. However, a collision occurs if a node transmits its packet within a time interval Δ v after the best node's transmission [8], [11], [12]. The time interval Δ v is known as the vulnerability window and is determined by the physical layer capabilities of the system.…”
Section: A Distributed Node Selection Schemesmentioning
confidence: 99%
“…Shah et al [17] propose a selection protocol where metrics of nodes are mapped to discrete timers. The better the node's metric value, the shorter it waits until it accesses the shared medium.…”
Section: Related Workmentioning
confidence: 99%
“…As our results show, from an overall system-level throughput perspective, the system is sometimes better off allocating more time to the selection phase, e.g., 7-8 slots, to improve the odds of selecting the best relay. Our results, thus, suggest that a joint design is also necessary in cooperative systems that use other selection mechanisms such as the back-off timer-based mechanism of [12], [13] or the handshaking message-based tracking approach used in [11].…”
Section: Introductionmentioning
confidence: 97%
“…In [11], the source node uses overhead handshaking messages to exhaustively track the rate that each candidate relay can support. The selection phase overhead can be reduced by using distributed mechanisms based on back-off timers [12], [13] or time-slotted splitting algorithms [14]- [16].…”
Section: Introductionmentioning
confidence: 99%