Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Location-aided routing (LAR) in mobile ad hoc networks
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Geocasting in Mobile Ad Hoc Networks: Location-Based Multicast Algorithms
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Routing in Ad Hoc Networks of Mobile Hosts
WMCSA '94 Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications
A Message Proliferation System Using Short-Range Wireless Devices
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Hi-index | 0.00 |
In ad-hoc networks, packet flooding is used to discover a destination terminal of communication. However, since, in ad-hoc networks, disconnection and reconnection of terminals frequently occur, it often occurs that the destination terminal cannot often be discovered. Moreover, since the route from a source terminal to a destination terminal frequently changes, the route information obtained by packet flooding may become unavailable in a short period of time. In this paper, to solve these problems, we propose the store-and-flood protocol to improve the packet reachability in ad-hoc networks. In this protocol, the source terminal does not flood route request packets to discover destination mobile terminal but blindly floods data packets. Then, terminals which relay the flooded packets store the packets and later flood the packets when new other terminals connect to them. We show the protocol behavior and the packet format of our proposed protocol. Moreover, the performance and the overhead of the proposed protocol are shown by simulation experiments.