• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks (2003)

Cached

  • Download as a PDF

Download Links

  • [www.cs.berkeley.edu]
  • [www.comet.columbia.edu]
  • [www.eecs.harvard.edu]
  • [cs.ucsb.edu]
  • [webs.cs.berkeley.edu]
  • [theory.csail.mit.edu]
  • [www.cs.berkeley.edu]
  • [pdos.lcs.mit.edu]
  • [now.cs.berkeley.edu]
  • [www.eecs.harvard.edu]
  • [www.cs.berkeley.edu]
  • [www.stanford.edu]
  • [web.eecs.umich.edu]
  • [www.ics.uci.edu]
  • [web.eecs.umich.edu]
  • [www.ocf.berkeley.edu]
  • [www.stanford.edu]
  • [galaxy.cs.lamar.edu]
  • [courses.csail.mit.edu]
  • [www.stanford.edu]
  • [www.ocf.berkeley.edu]
  • [pdos.csail.mit.edu]
  • [nest.cs.berkeley.edu]
  • [www.cs.berkeley.edu]
  • [www.eecs.harvard.edu]
  • [www.eecs.harvard.edu]
  • [www.ocf.berkeley.edu]
  • [web.eecs.umich.edu]
  • [wiki.cs.dartmouth.edu]
  • [web.eecs.umich.edu]
  • [www.ics.uci.edu]
  • [www.comp.nus.edu.sg]
  • [www.cs.berkeley.edu]
  • [www.cs.berkeley.edu]
  • [www.cens.ucla.edu]
  • [galaxy.cs.lamar.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Alec Woo , Terence Tong , David Culler
Venue:In SenSys
Citations:766 - 20 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

Citations

3013 Dynamic source routing in ad hoc wireless networks,” Springer Mobile Computing - Johnson, Maltz - 1996 (Show Context)

Citation Context

...es for routing protocols that exploit connectivity determined by lower level link estimations to form a routing topology. Many wireless routing protocols assume connectivity by hearing certain packets=-=[2, 16, 17, 18, 19]-=-. For example, ROUTE REQUEST and ROUTE REPLY messages are often building blocks for creating a routing structure. However, Figure 1(a) suggest that long unreliable links are likely to influence these ...

2281 Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks - Intanagonwiwat, Govindan, et al. - 2000 (Show Context)

Citation Context

...es for routing protocols that exploit connectivity determined by lower level link estimations to form a routing topology. Many wireless routing protocols assume connectivity by hearing certain packets=-=[2, 16, 17, 18, 19]-=-. For example, ROUTE REQUEST and ROUTE REPLY messages are often building blocks for creating a routing structure. However, Figure 1(a) suggest that long unreliable links are likely to influence these ...

2004 Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers - Perkins, Bhagwat - 1994 (Show Context)

Citation Context

...es for routing protocols that exploit connectivity determined by lower level link estimations to form a routing topology. Many wireless routing protocols assume connectivity by hearing certain packets=-=[2, 16, 17, 18, 19]-=-. For example, ROUTE REQUEST and ROUTE REPLY messages are often building blocks for creating a routing structure. However, Figure 1(a) suggest that long unreliable links are likely to influence these ...

1763 System architecture directions for networked sensors - Hill, Szewczyk, et al. - 2000 (Show Context)

Citation Context

...00 being the minimum. A node can be configured as a base station to route over standard serial port interface by attaching an extra hardware board. The base station serves as the traffic sink. TinyOS =-=[15]-=- provides a programming environment and a complete network stack on this platform. Its active message layer provides a connectionless packet abstraction, with a normal packet size being about 30 bytes...

928 Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance - Chen, Jamieson, et al. - 2001 (Show Context)

Citation Context

...es for routing protocols that exploit connectivity determined by lower level link estimations to form a routing topology. Many wireless routing protocols assume connectivity by hearing certain packets=-=[2, 16, 17, 18, 19]-=-. For example, ROUTE REQUEST and ROUTE REPLY messages are often building blocks for creating a routing structure. However, Figure 1(a) suggest that long unreliable links are likely to influence these ...

673 Topology Control of Multihop Wireless Networks using Transmit Power Adjustment - Ramanathan, Rosales-Hain - 2000 (Show Context)

Citation Context

...st cell density is often an application-specific or deployment parameter since it affects overall network hop count, latency, channel utilization, network lifetime, and quality of links. For example, =-=[20]-=- adjusts the transmit power to control the topology and minimize energy required to transport data. Neighborhood management essentially has three components: insertion, eviction, and reinforcement. Fo...

475 A transmission control scheme for media access in sensor networks - Woo, Culler - 2001 (Show Context)

Citation Context

...ted over the entire packet to determine successful packet reception. A link-level acknowledgment can be sent by the receiver for each packet successfully received. A simple CSMA-based MAC is employed =-=[22]-=-; it adds a random delay before listening for an idle channel and backs off with a random delay over a predefined window when the channel is busy. 2.2 Empirical Observations To characterize the empiri...

417 Mica: A Wireless Platform for Deeply Embedded Neteworks - Hill, Culler (Show Context)

Citation Context

...be one directed diffusion flow along a simple gradient or a single selection query. To ground the hardware and physical configuration factors, we focus on large sensor fields of Berkeley TinyOS motes =-=[13]-=- spread roughly as a uniform grid over a large, essentially unobstructed, indoor space. Our study is conducted in four stages. Section 2 presents an empirical characterization of the links experienced...

403 Approximate Frequency Counts Over Data Streams - Manku, Motwani - 2002 (Show Context)

Citation Context

...ams using memory much smaller than the number of distinct classes of packets. Heuristics are used in [7] to identify a set of most frequently occurring packet classes. Two algorithms are presented in =-=[10]-=- to identify all values with frequency of occurrence exceeding a user specified threshold. A sliding window approach is used in [5] that can be generalized to estimate statistical information of a dat...

355 New directions in traffic measurement and accounting - Estan, Varghese - 2002 (Show Context)

Citation Context

...iques in databases. There is a growing body of work in gathering statistics on Internet packet streams using memory much smaller than the number of distinct classes of packets. Heuristics are used in =-=[7]-=- to identify a set of most frequently occurring packet classes. Two algorithms are presented in [10] to identify all values with frequency of occurrence exceeding a user specified threshold. A sliding...

303 Complex behavior at scale: An experimental study of low-power wireless sensor networks - GANESAN, KRISHNAMACHARI, et al. - 2002 (Show Context)

Citation Context

...ariance in quality are asfunction of distance. For large collections of nodes, this simple model exhibits qualitatively the irregular connectivity patterns that have been observed in real deployments =-=[8]-=-. Section 3 investigates simple, efficient estimators for determining these link probabilities. Here, a node can estimate the quality of the link from other nodes passively by collecting statistics on...

287 Wake on Wireless: An Event Driven Energy Saving Strategy for Battery Operated Devices - Shih, Bahl, et al. - 2002 (Show Context)

Citation Context

...snooping comes at a cost, since the node listens for packets that are not necessarily addressed to it, but in many cases the packets are received anyways. Various low-power listening mechanisms exist =-=[21]-=- that would enable snooping at a much lower cost. An alternative approach is to use received signal strength as an indication of link quality. However, the use of forward error correction and uncertai...

266 Maintaining stream statistics over sliding windows - Datar, Gionis, et al. - 2002 (Show Context)

Citation Context

...requently occurring packet classes. Two algorithms are presented in [10] to identify all values with frequency of occurrence exceeding a user specified threshold. A sliding window approach is used in =-=[5]-=- that can be generalized to estimate statistical information of a data stream. Finally, [6] showed a simple FREQUENCY algorithm that estimates frequency of Internet packet streams with limited space. ...

255 Routing information protocol - Hedrick - 1988 (Show Context)

Citation Context

...le networks, but it requires sequence number propagation and sequence number settling time tuning, which may differ in each deployment. We rely on techniques similar to poison-reverse or splithorizon =-=[11]. -=-By monitoring forwarding traffic and snooping on the parent address in each neighbor’s messages, neighboring child nodes can be identified and will not be considered as potential parents. We only ne...

166 Frequency estimation of internet packet streams with limited space - Demaine, López-Ortiz, et al. - 2002 (Show Context)

Citation Context

...lues with frequency of occurrence exceeding a user specified threshold. A sliding window approach is used in [5] that can be generalized to estimate statistical information of a data stream. Finally, =-=[6]-=- showed a simple FREQUENCY algorithm that estimates frequency of Internet packet streams with limited space. We first consider table management that seeks to retain a stable subset of high-quality lin...

77 Real-world experience with an interactive ad hoc sensor network - Yarvis, Conner, et al. - 2002 (Show Context)

Citation Context

... for MT a substantial noise margin should be used in parent selection to enhance stability. Another cost metric is path reliability, which is a product of link qualities along the path. It is used in =-=[24]-=- to optimize end-to-end success rate without link retransmission. It has a tendency to yield long paths. We do not study this metric as our protocols take advantage of link retransmissions. 6. EVALUAT...

75 Evaluation of Efficient Link Reliability Estimators for Low-Power Wireless Networks - Woo, Culler - 2003 (Show Context)

Citation Context

...d packets can be damaged or totally missed by the receiver. Furthermore, the link error dynamics are expected to be very different for low power wireless radios. Many link estimation techniques exist =-=[23]-=-, so we desired to test many of the established candidates under conditions similar to our sensor network. The resource constraints significantly limit the amount of processing and storage that can be...

36 EIGRP–A fast routing protocol based on distance vectors - Albrightson, Garcia-Luna-Aceves, et al. - 1994 (Show Context)

Citation Context

...ty for wired and power-rich wireless networks is well established. It is widely deployed over the Internet in protocols such as Internal Gateway Routing Protocol (IGRP) [12] and Enhanced IGRP (EIGRP) =-=[1]-=-. Link quality is measured as the percent of packets that arrived undamaged on a link. It is reported by the network interface hardware or firmware, and is calculated as a moving average. In IGRP, pac...

25 EIGRP – a fast routing protocol based on distance vectors - Albrightson, Garcia-Luna-Aceves, et al. - 1994 (Show Context)

Citation Context

...ty for wired and power-rich wireless networks is well established. It is widely deployed over the Internet in protocols such as Internal Gateway Routing Protocol (IGRP) [12] and Enhanced IGRP (EIGRP) =-=[1]-=-. Link quality is measured as the percent of packets that arrived undamaged on a link. It is reported by the network interface hardware or firmware, and is calculated as a moving average. In IGRP, pac...

24 An introduction to IGRP - Hedrick - 1991 (Show Context)

Citation Context

... probing to estimate link quality for wired and power-rich wireless networks is well established. It is widely deployed over the Internet in protocols such as Internal Gateway Routing Protocol (IGRP) =-=[12]-=- and Enhanced IGRP (EIGRP) [1]. Link quality is measured as the percent of packets that arrived undamaged on a link. It is reported by the network interface hardware or firmware, and is calculated as ...

16 The mote connectivity protocol - Gouda, Choi, et al. - 2003 (Show Context)

Citation Context

...lgorithm is an understanding of the loss behavior of the link under various circumstances. Previous studies have indicated that radio connectivity is imperfect and non-uniform, even in ideal settings =-=[3, 4, 8]-=-. Rather than carry along a detailed model of the platform or the propagation physics, we seek a simple characterization of the channel that can be used in topology formation. 2.1 Hardware Platform Th...

7 Ad hoc On–demand Distance–vector (AODV) routing - Perkins, Royer - 1999 (Show Context)

Citation Context

...es for routing protocols that exploit connectivity determined by lower level link estimations to form a routing topology. Many wireless routing protocols assume connectivity by hearing certain packets=-=[2, 16, 17, 18, 19]-=-. For example, ROUTE REQUEST and ROUTE REPLY messages are often building blocks for creating a routing structure. However, Figure 1(a) suggest that long unreliable links are likely to influence these ...

6 A wireless-embedded architecture for systemleveloptimization - Hill, Culler - 2001 (Show Context)

Citation Context

...ory and 4kB of data memory. The network device is a RF Monolithics 916MHz, amplitude shift keying (ASK) RF transceiver, capable of delivering up to 40 kbps; it emits less than a milliwatt of RF power =-=[14]-=-. The RF transmit power can be tuned in software, with 0 being the maximum and 100 being the minimum. A node can be configured as a base station to route over standard serial port interface by attachi...

5 New sampling based summary statistics for improving approximate query answers - Matias, Gibbons - 1998 (Show Context)

Citation Context

...sages received, giving all nodes a chance to get established. To estimate N, there exists much prior work in the database literature to estimate the number of distinct values over a continuous stream =-=[9]-=-. However, in the case when periodic beacons are present, we simply count the average number of beacons received between beacons from a particular node. The insertion policy should reinforce good neig...

4 Performance of Multihop Wireless - Couto, Aguayo, et al. - 2003 (Show Context)

Citation Context

...lgorithm is an understanding of the loss behavior of the link under various circumstances. Previous studies have indicated that radio connectivity is imperfect and non-uniform, even in ideal settings =-=[3, 4, 8]-=-. Rather than carry along a detailed model of the platform or the propagation physics, we seek a simple characterization of the channel that can be used in topology formation. 2.1 Hardware Platform Th...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University