Filters








2,779 Hits in 3.4 sec

Distributed token circulation in mobile ad hoc networks

N. Malpani, Yu Chen, N.H. Vaidya, J.L. Welch
2005 IEEE Transactions on Mobile Computing  
This paper presents several distributed algorithms that cause a token to continually circulate through all the nodes of a mobile ad hoc network.  ...  Some of the proposed algorithms are aware of, and adapt to changes in, the ad hoc network topology.  ...  INTRODUCTION T HIS paper presents several distributed algorithms that cause a token to continually circulate through all the nodes of a mobile ad hoc network.  ... 
doi:10.1109/tmc.2005.25 fatcat:todrsu5ylrb6pgbk3dd22pycda

Distributed token circulation on mobile ad hoc networks

N. Malpani, N.H. Vaidya, J.L. Welch
Proceedings Ninth International Conference on Network Protocols. ICNP 2001  
This paper presents several distributed algorithms that cause a token to continually circulate through all the nodes of a mobile ad hoc network.  ...  Some of the proposed algorithms are aware of, and adapt to changes in, the ad hoc network topology.  ...  INTRODUCTION T HIS paper presents several distributed algorithms that cause a token to continually circulate through all the nodes of a mobile ad hoc network.  ... 
doi:10.1109/icnp.2001.992755 dblp:conf/icnp/MalpaniVW01 fatcat:vdhuixz5frdlpb3aj2cjkjq62a

Self-stabilizing mutual exclusion using tokens in mobile ad hoc networks

Yu Chen, Jennifer L. Welch
2002 Proceedings of the 6th international workshop on Discrete algorithms and methods for mobile computing and communications - DIALM '02  
In this paper, we propose a self-stabilizing mutual exclusion algorithm using tokens for the mobile ad hoc network.  ...  Since the liveness condition of mutual exclusion can't be guaranteed by any algorithm for a mobile ad hoc network with arbitary mobility, we consider a mobile ad hoc network with restricted mobility.  ...  For example, in [3] , several distributed token circulation algorithms on mobile ad hoc networks are discussed, in which the ÄÊÎ algorithm shows quite good performance in simulations. And in [?]  ... 
doi:10.1145/570810.570815 dblp:conf/dialm/ChenW02 fatcat:xvg3xgie2bhwzktcfoygpswfmm

Self-stabilizing mutual exclusion using tokens in mobile ad hoc networks

Yu Chen, Jennifer L. Welch
2002 Proceedings of the 6th international workshop on Discrete algorithms and methods for mobile computing and communications - DIALM '02  
In this paper, we propose a self-stabilizing mutual exclusion algorithm using tokens for the mobile ad hoc network.  ...  Since the liveness condition of mutual exclusion can't be guaranteed by any algorithm for a mobile ad hoc network with arbitary mobility, we consider a mobile ad hoc network with restricted mobility.  ...  For example, in [3] , several distributed token circulation algorithms on mobile ad hoc networks are discussed, in which the ÄÊÎ algorithm shows quite good performance in simulations. And in [?]  ... 
doi:10.1145/570811.570815 fatcat:yed6sjiaczdkddwzxbnibflpri

Token Traversal Strategies of a Distributed Spanning Forest Algorithm in Mobile Ad Hoc - Delay Tolerant Networks [chapter]

Apivadee Piyatumrong, Patricia Ruiz, Pascal Bouvry, Frederic Guinand, Kittichai Lavangnananda
2009 Communications in Computer and Information Science  
This paper presents three distributed and decentralized strategies used for token traversal in spanning forest over Mobile Ad Hoc Delay Tolerant Networks.  ...  Such networks are characterized by behaviors like disappearance of mobile devices, connection disruptions, network partitioning, etc.  ...  An emerging subclass of ad hoc networks, Mobile Ad Hoc Delay Tolerant networks (henceforth called mobile ad hoc DTNs for brevity), is characterized by including these undesirable behaviors.  ... 
doi:10.1007/978-3-642-10392-6_10 fatcat:bc75dbtwdrbpzbpe5ttc6sd43e

Self-Stabilization in Dynamic Networks

Toshimitsu MASUZAWA
2009 IEICE transactions on information and systems  
This advantage makes self-stabilizing protocols extremely attractive for designing highly dependable distributed systems on dynamic networks.  ...  in dynamic networks with frequent topology changes.  ...  Simulation of protocol LRV shows that the protocol performs well in mobile ad hoc networks [18] .  ... 
doi:10.1587/transinf.e92.d.108 fatcat:aon2azp2kzcipas64piezqp6ui

A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks

Bharti Sharma, Ravinder Singh Bhatia, Awadhesh Kumar Singh
2014 Journal of Information Processing Systems  
The article proposes a token-based mutual exclusion algorithm for the clustered mobile ad hoc networks (MANETs).  ...  In order to enhance reliability, we applied a distributed token circulation scheme at the inter-cluster level.  ...  mobile networks, mobile ad hoc networks, and sensor networks).  ... 
doi:10.3745/jips.2014.10.1.036 fatcat:aop7aroygnb3vmf5okstogi3ey

A Non-Token-Based-Distributed Mutual Exclusion Algorithm for Single-Hop Mobile Ad Hoc Networks [chapter]

Romain Mellier, Jean-Frederic Myoupo, Vlady Ravelomanana
2005 IFIP International Federation for Information Processing  
This paper presents a simple mutual exclusion algorithm for ad hoc mobile networks. Our algorithm does not use the token circulation technique.  ...  Mobile ad hoc networks are formed by a collection of mobile wireless nodes. Communication links form and disappear as nodes come into and go out of each other communication range.  ...  Introduction Nowadays, the research in Mobile Ad hoc NETworks (MANET for short) is attractive and desirable, due to the development of wireless networks and personal communication ( [Bose et al., 1999  ... 
doi:10.1007/0-387-23150-1_25 fatcat:7xbpfzrlqjfgzabw2xec2w446e

A Distributed Mutual Exclusion Algorithm for Mobile Ad Hoc Networks

Kayhan Erciyes
2012 International Journal of Computer Networks & Communications  
We propose a distributed mutual exclusion algorithm for mobile ad hoc networks. This algorithm requires a ring of cluster coordinators as the underlying topology.  ...  networks.  ...  Baldoni [31] et al. proposed a token based distributed mutual exclusion algorithm suited for mobile ad-hoc networks.  ... 
doi:10.5121/ijcnc.2012.4209 fatcat:3x3xtynggrcttd7vkfzxlmfrly

Strategical Comparison: Recognizing and Evicting Sybil Attack in Vehicular Ad Hoc Networks

Sagar Narang, Kundan Munjal
2014 International Journal of Computer Applications  
Vehicular Ad-Hoc  ...  There is dissimilarity between Ad-Hoc network and MANET: "MANETs are always Ad-Hoc but Ad-Hoc are not always MANETs" MANET is architecture-less network sanctioning mobile devices associated in network  ...  INTRODUCTION MANET is generalization of Wireless Ad-Hoc Network (WANET) which is further generalization of Ad-Hoc networks.  ... 
doi:10.5120/17602-8216 fatcat:x7ooyos54rh3jaoalfdr7w24vi

An Energy Efficient Algorithm For Distributed Mutual Exclusion In Mobile Ad-Hoc Networks

Sayani Sil, Sukanta Das
2010 Zenodo  
This paper reports a distributed mutual exclusion algorithm for mobile Ad-hoc networks. The network is clustered hierarchically.  ...  The proposed algorithm considers the clustered network as a logical tree and develops a token passing scheme to get the mutual exclusion.  ...  In this paper we have proposed a new energy efficient mutual exclusion algorithm for mobile ad-hoc network.  ... 
doi:10.5281/zenodo.1058558 fatcat:efrovoigtjdejjx5mlragebg4i

Dynamic Request Set based Mutual Exclusion Algorithm in MANETs

Ashish Khanna, Awadhesh Kumar Singh, Abhishek Swaroop
2015 International Journal of Wireless and Microwave Technologies  
Handling ME problem becomes difficult due to the dynamic nature of the ad hoc environment. This paper presents a token-based solution to ME problem in the mobile ad hoc environment.  ...  Token loss problem has also been handled separately in the present exposition.  ...  Introduction Mobile ad hoc network (MANET) contains mobile hosts which move arbitrarily in the environment.  ... 
doi:10.5815/ijwmt.2015.04.01 fatcat:pgx7kab4nvapjh7knym3yfoxfm

A study of token traversal strategies on tree-based backbones for mobile ad hoc - delay tolerant networks

Apivadee Piyatumrong, Pascal Bouvry, Frederic Guinand, Kittichai Lavangnananda
2009 2009 International Conference on Ultra Modern Telecommunications & Workshops  
Tree-based backbone establishment and maintenance in Mobile Ad hoc -Delay Tolerant Networks is often operated through the use of traversing tokens.  ...  A study and framework are proposed here for various token traversal strategies on tree-based backbones.  ...  Mobile Ad Hoc -Delay Tolerant Networks (mobile ad hoc DTNs) Mobile Ad Hoc -Delay Tolerant Networks (mobile ad hoc DTNs) are fluctuating networks populated by a set of moving materials equipped with wireless  ... 
doi:10.1109/icumt.2009.5345496 dblp:conf/icumt/PiyatumrongBGL09 fatcat:6e7qoic52fd4jccwcksjtbjdv4

A hybrid token-based distributed mutual exclusion algorithm using wraparound two-dimensional array logical topology

Hoda Taheri, Peyman Neamatollahi, Mahmoud Naghibzadeh
2011 Information Processing Letters  
For the movement of the token within the computer network, two possible methods can be considered: perpetual mobility of the token and token-asking method.  ...  This paper presents a distributed token-based algorithm scheduling mutually exclusive access to a critical resource by the processes in a distributed network.  ...  For the future works, we will focus on DME in mobile ad hoc networks. Fig. 1 . 1 A proposed network of 25 nodes. Fig. 2 . 2 Total messages exchanged between processes in the algorithm.  ... 
doi:10.1016/j.ipl.2011.05.021 fatcat:lrkkoti3zbhbrfwjvi6ehoz6bq

A Hierarchical Leader Election Protocol for Mobile Ad Hoc Networks [chapter]

Orhan Dagdeviren, Kayhan Erciyes
2008 Lecture Notes in Computer Science  
Leader Election is an important problem in mobile ad hoc networks and in distributed computing systems.  ...  In this study, we propose a hierarchical, cluster based protocol to elect a leader in a mobile ad hoc network.  ...  Mobile Ad hoc NETworks (MANETs) are a class of distributed networks which do not have a fixed topology and where the nodes communicate using temporary connections with their neighbors.  ... 
doi:10.1007/978-3-540-69384-0_56 fatcat:knoubt5ewbcx3frhth6nzqdmyq
« Previous Showing results 1 — 15 out of 2,779 results