Reference : Token Traversal Strategies of a Distributed Spanning Forest Algorithm in Mobile Ad ho... |
Scientific congresses, symposiums and conference proceedings : Paper published in a book | |||
Engineering, computing & technology : Computer science | |||
http://hdl.handle.net/10993/9456 | |||
Token Traversal Strategies of a Distributed Spanning Forest Algorithm in Mobile Ad hoc - Delay Tolerant Networks | |
English | |
Piyatumrong, Apivadee [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >] | |
Ruiz, Patricia ![]() | |
Bouvry, Pascal ![]() | |
Guinand, Frederic [Le Havre University, France] | |
Lavangnananda, Kittichai [King Mongkut's University of Technology Thonburi, Thailand] | |
2009 | |
IAIT | |
Springer Berlin Heidelberg | |
96-109 | |
Yes | |
International | |
978-3-642-10391-9 | |
Third International Conference on Advances in Information Technology (IAIT 2009) | |
December 1-5, 2009 | |
Bangkok | |
Thailand | |
[en] Token traversal ; spanning tree ; distributed system ; delay tolerant networks ; Depth First Search | |
[en] This paper presents three distributed and decentralized strategies used for token traversal in spanning forest over Mobile Ad Hoc Delay Tolerant Networks. Such networks are characterized by behaviors like disappearance of mobile devices, connection disruptions, network partitioning, etc. Techniques based on tree topologies are well known for increasing the efficiency of network protocols and/or applications, such as Dynamicity Aware - Graph Relabeling System (DA-GRS). One of the main features of these tree based topologies is the existence of a token traversing in every tree. The use of tokens enables the creation and maintenance of spanning trees in dynamic environments. Subsequently, managing tree-based backbones relies heavily on the token behavior. An efficient and optimal token traversal can highly impact the design of the tree and its usage. In this article, we present a comparison of three distributed and decentralized techniques available for token management, which are Randomness, TABU and Depth First Search. | |
http://hdl.handle.net/10993/9456 | |
10.1007/978-3-642-10392-6 | |
http://www.springerlink.com/content/j08546l37m772545/ | |
Communications in Computer and Information Science
55 Book SeriesCommunications in Computer and Information Science ISSN1865-0929 (Print) 1865-0937 (Online) VolumeVolume 55 BookAdvances in Information Technology PublisherSpringer Berlin Heidelberg DOI10.1007/978-3-642-10392-6 Copyright2009 ISBN978-3-642-10391-9 (Print) 978-3-642-10392-6 (Online) DOI10.1007/978-3-642-10392-6_10 Pages96-109 Subject CollectionComputer Science SpringerLink DateMonday, November 16, 2009 Advances in Information Technology |
File(s) associated to this reference | ||||||||||||||
Fulltext file(s):
| ||||||||||||||
All documents in ORBilu are protected by a user license.