NOTE: This item is not available outside the Texas A&M University network. Texas A&M affiliated users who are off campus can access the item through NetID and password authentication or by using TAMU VPN. Non-affiliated individuals should request a copy through their local library's interlibrary loan service.
Distributed algorithms for mobile ad hoc networks
dc.creator | Malpani, Navneet | |
dc.date.accessioned | 2012-06-07T23:06:25Z | |
dc.date.available | 2012-06-07T23:06:25Z | |
dc.date.created | 2001 | |
dc.date.issued | 2001 | |
dc.identifier.uri | https://hdl.handle.net/1969.1/ETD-TAMU-2001-THESIS-M35 | |
dc.description | Due to the character of the original source materials and the nature of batch digitization, quality control issues may be present in this document. Please report any quality issues you encounter to digital@library.tamu.edu, referencing the URI of the item. | en |
dc.description | Includes bibliographical references (leaves 60-63). | en |
dc.description | Issued also on microfiche from Lange Micrographics. | en |
dc.description.abstract | We first present two new leader election algorithms for mobile ad hoc networks. The algorithms ensure that eventually each connected component of the topology graph has exactly one leader. The algorithms are based on a routing algorithm called TORA (Park and Corson, 1997), which in turn is based on an algorithm by Gafni and Bertsekas (1981). The algorithms require nodes to communicate only with their current neighbors, making them well suited to the ad hoc environment. The first algorithm is for a single topology change and is provided with a proof of correctness. The second algorithm tolerates multiple concurrent topology changes. Next we present several distributed algorithms that cause a token to continually circulate through all the nodes of a mobile ad hoc network. An important application of such algorithms is to ensure total order (Birman and Van Renesse, 1994) of message delivery in a group communication service. Some of the proposed algorithms are aware of, and adapt to, changes in the ad hoc network topology. When using a token circulation algorithm, a round is said to complete when every node has been visited at least once. Criteria for comparing the algorithms include the average time required to complete a round, number of bytes sent per round, and number of nodes visited per round. Comparison between the proposed algorithms is performed using simulation results obtained from a detailed simulation model (with ns-2 simulator). | en |
dc.format.medium | electronic | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | en_US | |
dc.publisher | Texas A&M University | |
dc.rights | This thesis was part of a retrospective digitization project authorized by the Texas A&M University Libraries in 2008. Copyright remains vested with the author(s). It is the user's responsibility to secure permission from the copyright holder(s) for re-use of the work beyond the provision of Fair Use. | en |
dc.subject | computer science. | en |
dc.subject | Major computer science. | en |
dc.title | Distributed algorithms for mobile ad hoc networks | en |
dc.type | Thesis | en |
thesis.degree.discipline | computer science | en |
thesis.degree.name | M.S. | en |
thesis.degree.level | Masters | en |
dc.type.genre | thesis | en |
dc.type.material | text | en |
dc.format.digitalOrigin | reformatted digital | en |
Files in this item
This item appears in the following Collection(s)
-
Digitized Theses and Dissertations (1922–2004)
Texas A&M University Theses and Dissertations (1922–2004)
Request Open Access
This item and its contents are restricted. If this is your thesis or dissertation, you can make it open-access. This will allow all visitors to view the contents of the thesis.