Skip to Content
Wireless Sensor Networks
book

Wireless Sensor Networks

by Feng Zhao, Leonidas Guibas
July 2004
Intermediate to advanced
376 pages
9h 12m
English
Morgan Kaufmann
Content preview from Wireless Sensor Networks
90 Chapter 3 Networking Sensors
b
c
d
s
Figure 3.8 A routing example for the GEAR protocol. Node s wishes to route a packet to node d,
but there is a network hole in between.
to d is
5. In the process, b will also update its learned cost to d to
be 1 +
5, which is larger than that of c. Thus when s wishes to send
another packet to d, it will choose neighbor c over neighbor b. The
completeness of LRTA
implies that when a valid path from s to d
exists, it will always be found eventually in this fashion. However,
no performance guarantees on the quality of the actual path used or
the convergence rate can be given.
Even though there are no theoretical optimality ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless Sensor Networks

Wireless Sensor Networks

Mohamed Ibnkahla
Wireless Sensor Networks

Wireless Sensor Networks

Shafiullah Khan, Al-Sakib Khan Pathan, Nabil Ali Alrajeh

Publisher Resources

ISBN: 9781558609143