IEEE Global Telecommunications Conference, 2004. GLOBECOM '04.
DOI: 10.1109/glocom.2004.1378120
|View full text |Cite
|
Sign up to set email alerts
|

Optimising expanding ring search for multi-hop wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(22 citation statements)
references
References 3 publications
0
22
0
Order By: Relevance
“…Hassan and Jha [7] explored to find an optimum TTL threshold L that would minimize the expected bandwidth cost of ERS. They give the following experimental results; search threshold L of 3 is optimum for three categories of networks, that is, large networks with small radius, medium networks with large radius and medium networks with small radius.…”
Section: Related Workmentioning
confidence: 99%
“…Hassan and Jha [7] explored to find an optimum TTL threshold L that would minimize the expected bandwidth cost of ERS. They give the following experimental results; search threshold L of 3 is optimum for three categories of networks, that is, large networks with small radius, medium networks with large radius and medium networks with small radius.…”
Section: Related Workmentioning
confidence: 99%
“…they are not organized and independent. Therefore, the search algorithms are less efficient in this family, including Flooding [2,3], Expanding Ring Search [2,3,6,7], Random Walks [2,3,5], etc. Because each node has little information about the resources shared by other nodes, when a node issues a search request, it has to query more nodes to hit the target with higher probability.…”
Section: Introductionmentioning
confidence: 99%
“…Expanding ring algorithm ( Hassan & Jha, 2004) is an extension of the flooding search algorithm. It performs successive flooding searches with an incremental TTL.…”
Section: Uninformed Search Methodsmentioning
confidence: 99%
“…If the TTL is defined very low, on the other hand, one may fail to find resources although they exist in the network. Therefore, many algorithms and approaches have emerged to enhance P2P search performance, for example, UbiSrvInt (Yuan & Chen, 2007), Freenet (Clarke, Sandberg, Wiley, & Hong, 2001), modified breath-first search (BFS) (Kalogeraki et al, 2002;Tsoumakos et al, 2006Tsoumakos et al, , 2003, iterative deepening (Lv et al, 2002;Yang et al, 2002Yang et al, , 2003, expanding ring (Hassan & Jha, 2004), random walk (Gkantsidis, Mihail, & Saberi, 2004), interest cluster (Tong et al, 2005;Borch, 2005;Cohen, Fiat, & Kaplan, 2003), trust-based recommendation (Griffiths, 2006;Li & Kao, 2009), distributed hash table (DHT) Gummadi et al, 2003, JXTA (Juxtapose) (Nottelmann & Fischer, 2007), and grid architecture (Tsai & Hung, 2009). However, as more information is added into the Internet in an increasingly rapid speed, how to facilitate P2P search performance always deserves emphasis and research.…”
Section: Introductionmentioning
confidence: 99%