Searching for Resources in MANETs - A Cluster Based Flooding Approach

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

In this paper, we propose a searching service optimized for highly dynamic mobile ad-hoc networks based on a flooding approach. MANETs unreliability and routing costs prevent the use of central servers or global infra-structured services on top of a priori defined virtual overlay networks. A flooding approach over a virtual overlay network created on-demand performs better. Flooding is supported by a light-weight clustering algorithm. The paper compares the relative efficiency of two clustering approaches using 1.5-hop and 2.5-hop neighborhood information, and of a non-clustered approach. It presents a set of simulation results on the clustering efficiency and on searching efficiency for low and high mobility patterns, showing that the 1.5-hop algorithm is more resilient to load and to node movement than the 2.5-hop algorithm.

Original languageEnglish
Title of host publicationE-business and Telecommunication Networks - 2nd International Conference, ICETE 2005, Selected Papers
EditorsJ. Filipe, H. Coelhas, M. Saramago
PublisherSpringer Verlag
Pages236-245
Number of pages10
ISBN (Print)9783540759928
DOIs
Publication statusPublished - 1 Jan 2007
Event2nd International Conference on E-business and Telecommunication Networks, ICETE 2005 - Reading, United Kingdom
Duration: 3 Oct 20057 Oct 2005

Publication series

NameCommunications in Computer and Information Science
PublisherSpringer Verlag
Volume3 CCIS
ISSN (Print)1865-0929

Conference

Conference2nd International Conference on E-business and Telecommunication Networks, ICETE 2005
Country/TerritoryUnited Kingdom
CityReading
Period3/10/057/10/05

Keywords

  • clustering protocol
  • Performance analysis of wireless ad hoc networks
  • searching service

Fingerprint

Dive into the research topics of 'Searching for Resources in MANETs - A Cluster Based Flooding Approach'. Together they form a unique fingerprint.

Cite this