22.07.2013 Views

Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security

Download File - Computer Networks & Information Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Core-Extraction Distributed Ad Hoc Routing<br />

(CEDAR) [Sivakumar99]<br />

A subset of nodes in the network is identified as the<br />

core<br />

Each node in the network must be adjacent to at least<br />

one node in the core<br />

Each node picks one core node as its dominator (or leader)<br />

Core is determined by periodic message exchanges<br />

between each node and its neighbors<br />

attempt made to keep the number of nodes in the core small<br />

Each core node determines paths to nearby core<br />

nodes by means of a localized broadcast<br />

Each core node guaranteed to have a core node at

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!