Context-Based Routing in Dynamic Networks by Bernd-Ludwig Wenning

By Bernd-Ludwig Wenning

Show description

Read Online or Download Context-Based Routing in Dynamic Networks PDF

Best networking books

802.1X Port-Based Network Access Authentification

Written to entice a wide viewers, 802. 1X Port-Based Authentication seeks to outline this complicated notion in available phrases and to discover its a variety of purposes to contemporary desktop networks utilizing this actual community protocol. this article assumes that the reader could have very little previous wisdom and just a basic knowing of desktop networking, proposing an introductory evaluation in addition to a topic review in every one bankruptcy.

Extra resources for Context-Based Routing in Dynamic Networks

Example text

Location-based routing can be considered as a special case of context-aware routing, with the location being the context information that is used. Therefore, the categorisation given in [AKK04] can be modified to label the third category as context-aware routing. Generally, if a routing algorithm is context-aware, this does not mean that it is not flat or hierarchical. In fact, it can be either of those. For example, an algorithm that contains a location-based clustering method, performs a hierarchical routing that utilises the context information about the nodes’ locations.

If the destination or a node that knows a route to the destination receives the route request, a route reply is created. This route reply is sent back to the source on the reverse path, according to the reverse route entries at the intermediate nodes. The intermediate nodes update their routing tables again when they forward a route reply, creating or updating a forward route entry. As all nodes have their routing tables, the source does not need to specify the route in each data packet that it sends when it has received the route reply.

E. one of the threshold values is exceeded), a transmission is triggered irrespective of when the next regular transmission is scheduled. This enables APTEEN to quickly respond to critical situations. The time count and the threshold values in APTEEN have to be chosen according to the three target constraints reactivity, energy consumption and up-to-dateness of monitoring information. Another cluster-based routing approach that is using energy consumption as its main criterion is the Hybrid Energy-Efficient Distributed routing (HEED) [YF04].

Download PDF sample

Rated 4.15 of 5 – based on 41 votes