An adaptive application flooding for efficient data dissemination in dense ad-hoc networks

Yuki Oyabu, Ryuji Wakikawa, Jun Murai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Recent years, trend of researches in ad-hoc networks are routing, multicasting and optimized flooding. Focusing on data flooding in ad-hoc networks, proposed scenarios of common researches are limited due to lack of scalability. If there are lots of communication originators, it is obvious that wireless resources are inapplicable. In this study, our typical scenario is that a mobile ad-hoc network is deployed in a city area and many shops, such as shopping malls and restaurants, disseminate their commercial advertisements to the network. This paper points out the lack of scalability issues considering existing IP flooding schemes and proposes a novel application flooding scheme supporting automatic data size adaptation. In this scheme, size of flooded data is dynamically sampled depending on network congestion level so that data can be delivered in a scalable manner to all nodes using MANET.

Original languageEnglish
Title of host publicationTechnologies for Advanced Heterogeneous Networks - First Asian Internet Engineering Conference, AINTEC 2005, Proceedings
Pages240-253
Number of pages14
DOIs
Publication statusPublished - 2005
Event1st Asian Internet Engineering Conference, AINTEC 2005 - Bangkok, Thailand
Duration: 2005 Dec 132005 Dec 15

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3837 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st Asian Internet Engineering Conference, AINTEC 2005
Country/TerritoryThailand
CityBangkok
Period05/12/1305/12/15

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'An adaptive application flooding for efficient data dissemination in dense ad-hoc networks'. Together they form a unique fingerprint.

Cite this