Exploiting opportunistic overhearing to improve performance of mutual exclusion in wireless ad hoc networks

Ghazale Hosseinabadi, Nitin H. Vaidya

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We design two mutual exclusion algorithms for wireless networks. Our mutual exclusion algorithms are distributed token based algorithms which exploit the opportunistic message overhearing in wireless networks. One of the algorithms is based on overhearing of token transmission. In the other algorithm, overhearing of both token and request messages is exploited. The design goal is to decrease the number of transmitted messages and delay per critical section entry using the information obtained from overheard messages.

Original languageEnglish (US)
Title of host publicationWired/Wireless Internet Communication - 10th International Conference, WWIC 2012, Proceedings
Pages162-173
Number of pages12
DOIs
StatePublished - Jun 5 2012
Event10th International Conference on Wired / Wireless Internet Communications, WWIC 2012 - Santorini, Greece
Duration: Jun 6 2012Jun 8 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7277 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other10th International Conference on Wired / Wireless Internet Communications, WWIC 2012
CountryGreece
CitySantorini
Period6/6/126/8/12

Keywords

  • Wireless networks
  • mutual exclusion
  • opportunistic overhearing

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Exploiting opportunistic overhearing to improve performance of mutual exclusion in wireless ad hoc networks'. Together they form a unique fingerprint.

Cite this