Reference : Token Traversal Strategies of a Distributed Spanning Forest Algorithm in Mobile Ad ho...
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/9456
Token Traversal Strategies of a Distributed Spanning Forest Algorithm in Mobile Ad hoc - Delay Tolerant Networks
English
Piyatumrong, Apivadee [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Ruiz, Patricia mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Bouvry, Pascal mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Guinand, Frederic [Le Havre University, France]
Lavangnananda, Kittichai [King Mongkut's University of Technology Thonburi, Thailand]
2009
IAIT
Springer Berlin Heidelberg
96-109
Yes
International
978-3-642-10391-9
Third International Conference on Advances in Information Technology (IAIT 2009)
December 1-5, 2009
Bangkok
Thailand
[en] Token traversal ; spanning tree ; distributed system ; delay tolerant networks ; Depth First Search
[en] This paper presents three distributed and decentralized strategies used for token traversal in spanning forest over Mobile Ad Hoc Delay Tolerant Networks. Such networks are characterized by behaviors like disappearance of mobile devices, connection disruptions, network partitioning, etc. Techniques based on tree topologies are well known for increasing the efficiency of network protocols and/or applications, such as Dynamicity Aware - Graph Relabeling System (DA-GRS). One of the main features of these tree based topologies is the existence of a token traversing in every tree. The use of tokens enables the creation and maintenance of spanning trees in dynamic environments. Subsequently, managing tree-based backbones relies heavily on the token behavior. An efficient and optimal token traversal can highly impact the design of the tree and its usage. In this article, we present a comparison of three distributed and decentralized techniques available for token management, which are Randomness, TABU and Depth First Search.
http://hdl.handle.net/10993/9456
10.1007/978-3-642-10392-6
http://www.springerlink.com/content/j08546l37m772545/
Communications in Computer and Information Science
55
Book SeriesCommunications in Computer and Information Science ISSN1865-0929 (Print) 1865-0937 (Online) VolumeVolume 55 BookAdvances in Information Technology PublisherSpringer Berlin Heidelberg DOI10.1007/978-3-642-10392-6 Copyright2009 ISBN978-3-642-10391-9 (Print) 978-3-642-10392-6 (Online) DOI10.1007/978-3-642-10392-6_10 Pages96-109 Subject CollectionComputer Science SpringerLink DateMonday, November 16, 2009
Advances in Information Technology

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
IAIT.pdfNo commentaryAuthor postprint214.36 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.