Combined TTL-based search algorithm

Simon Shamoun, Reuven Cohen, David Sarne, Gal Miller

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Expanding ring search and blocking expanding ring search are two prominent time-to-live value based search techniques for routes and resources in networks. Each uses a different technique to extend the search, with advantages in cost reduction that depend on the setting. In this paper, we introduce the Combined Expanding Ring Search which uses both techniques for extending the search in a way that guarantees expected costs at least as low as the lowest of the two. We show how to derive the search strategy with minimum expected costs in polynomial time, and in so doing introduce an important optimization to blocking expanding ring search. We further show how to derive the optimal sequence under delay constraints in polynomial time. In numerical evaluations of synthetic settings, we show that our optimization to blocking expanding ring search makes it far more efficient than previously considered, and consequently the combined search to be much more efficient than either technique.

Original languageEnglish
Title of host publicationProceedings of the 2015 14th Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467373067
DOIs
StatePublished - 30 Jul 2015
Event14th Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2015 - Vilamoura, Portugal
Duration: 17 Jun 201518 Jun 2015

Publication series

NameProceedings of the 2015 14th Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2015

Conference

Conference14th Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2015
Country/TerritoryPortugal
CityVilamoura
Period17/06/1518/06/15

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

Fingerprint

Dive into the research topics of 'Combined TTL-based search algorithm'. Together they form a unique fingerprint.

Cite this