Simulation Technologies in Networking and Communications 2014
DOI: 10.1201/b17650-21
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Flooding Algorithms for Wireless Sensor Networks Based on EffiSen: The Custom-Made Simulator

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Additionally, multipath and multiple-copy ( n-copy ) routing may be deployed to increase the probability of successful delivery. Opportunistic networks can even operate without, or based on scarce, routing information, implementing simple flooding-like methods [ 40 ] or more sophisticated ones, such as beacon-less routing [ 41 ], where no node presence messages (beacons) are periodically broadcast to make neighboring nodes aware of the existence (and often location) of other nodes. Opportunistic routing has been shown to achieve better performance than traditional routing under a variety of demanding conditions.…”
Section: Routing Research Problems In Urban Networkmentioning
confidence: 99%
“…Additionally, multipath and multiple-copy ( n-copy ) routing may be deployed to increase the probability of successful delivery. Opportunistic networks can even operate without, or based on scarce, routing information, implementing simple flooding-like methods [ 40 ] or more sophisticated ones, such as beacon-less routing [ 41 ], where no node presence messages (beacons) are periodically broadcast to make neighboring nodes aware of the existence (and often location) of other nodes. Opportunistic routing has been shown to achieve better performance than traditional routing under a variety of demanding conditions.…”
Section: Routing Research Problems In Urban Networkmentioning
confidence: 99%
“…Node deployment is the basic element that influences the way the topology of a sensor network is controlled [1], [45]. Moreover, the empirical practices related to topology control in commercially-oriented ventures, as discussed in the following sections, seem to focus, first and foremost, on the distribution of nodes.…”
Section: Sensor Nodes Deploymentmentioning
confidence: 99%
“…The deployment of nodes or the range of their relocation makes it possible to prolong the operating time of a network. This can be also achieved, for example, by securing such distances between sensors that would enable the routing mechanisms applied to remain operable in the most effective way, without the need to manipulate the power of transceivers [1], [39].…”
Section: Deterministic Deploymentmentioning
confidence: 99%
See 1 more Smart Citation
“…Another analysis carried out to examine the performance characteristics of both discussed routing protocols is the analysis of the buffer capacity of the message. Builtin memory resources in modern microcontrollers allow designers to implement data buffers that are able to hold at the same time more than 1000 individual messages [9].…”
Section: Routing Protocolsmentioning
confidence: 99%