Improvised tree selection algorithm in Greedy Distributed Spanning Tree Routing
Citations
References
17,936 citations
"Improvised tree selection algorithm..." refers background in this paper
...For this reason, Greedy Forwarding is very effective in dense wireless sensor networks [4], [13]....
[...]
...However it is difficult to obtain the static connected plain graph in wireless network [4]....
[...]
...The adaptability of these to mobility of wireless sensor [4], [13] nodes is done in the following sections....
[...]
7,384 citations
"Improvised tree selection algorithm..." refers background or methods in this paper
...This approach requires a heuristic [10] called the no-crossing heuristic to force the right-hand rule [9] to find perimeters that enclose voids in regions where edges of the graph cross....
[...]
...The Geographic Perimeter Stateless Routing(GPSR)[5], [6], [7], [8], [9], [17], [18], [19], [20] makes extensive use of geography to achieve scalability in wireless routing protocols....
[...]
...3 depicts the rule for constructing the RNG [9]....
[...]
...In GPSR [9], packets are marked by their originator with the location of their destinations....
[...]
...The Gabriel Graph(GG) planarization technique, An edge (u,v) exists between vertices u and v if no other vertex w is present within the circle whose diameter is (u,v) [9]...
[...]
328 citations
"Improvised tree selection algorithm..." refers background in this paper
...The Geographic Perimeter Stateless Routing(GPSR)[5], [6], [7], [8], [9], [17], [18], [19], [20] makes extensive use of geography to achieve scalability in wireless routing protocols....
[...]
276 citations
"Improvised tree selection algorithm..." refers background or methods in this paper
...For this reason, Greedy Forwarding is very effective in dense wireless sensor networks [4], [13]....
[...]
...The algorithm used to by pass the void [5] or the local maxima is called face routing [1], [13] or the perimeter routing....
[...]
...The adaptability of these to mobility of wireless sensor [4], [13] nodes is done in the following sections....
[...]
...The face routing or perimeter routing [1], [5], [11], [13] makes use of the Right Hand Rule [11]....
[...]
233 citations
"Improvised tree selection algorithm..." refers background or methods in this paper
...For this reason, Greedy Forwarding is very effective in dense wireless sensor networks [4], [13]....
[...]
...The Greedy Forwarding never fails if for every node, there is at least one neighbour in every 2*π/3 sector of its area....
[...]
...The sequence of edges covered is called the perimeter [5]....
[...]
...The Greedy Forwarding tries to bring the message closer to the destination in each step based on only local information....
[...]
...The Geographic Perimeter Stateless Routing(GPSR)[5], [6], [7], [8], [9], [17], [18], [19], [20] makes extensive use of geography to achieve scalability in wireless routing protocols....
[...]