{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T09:22:58Z","timestamp":1648632178925},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T00:00:00Z","timestamp":1350000000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2012,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:sec>\n            <jats:title>Abstract<\/jats:title>\n            <jats:p>In this article, we study the asymptotic behavior of flooding in large scale wireless networks. Specifically, we derive an upper bound on the coverage of flooding when the number of nodes <jats:italic>n<\/jats:italic> in the network goes to infinity. We consider two different regimes of transmission radii: first, the case of constant transmission radius <jats:italic>r<\/jats:italic> where the percentage of covered nodes scales as<jats:inline-formula>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mfenced>\n                    <mml:mrow>\n                      <mml:mtext>O<\/mml:mtext>\n                      <mml:mo>(<\/mml:mo>\n                      <mml:mi>n<\/mml:mi>\n                      <mml:msup>\n                        <mml:mrow>\n                          <mml:mi>r<\/mml:mi>\n                        <\/mml:mrow>\n                        <mml:mrow>\n                          <mml:mn>2<\/mml:mn>\n                        <\/mml:mrow>\n                      <\/mml:msup>\n                      <mml:msup>\n                        <mml:mrow>\n                          <mml:mi>e<\/mml:mi>\n                        <\/mml:mrow>\n                        <mml:mrow>\n                          <mml:mo>\u2212<\/mml:mo>\n                          <mml:msub>\n                            <mml:mrow>\n                              <mml:mi>K<\/mml:mi>\n                            <\/mml:mrow>\n                            <mml:mrow>\n                              <mml:mi>S<\/mml:mi>\n                            <\/mml:mrow>\n                          <\/mml:msub>\n                          <mml:mi>n<\/mml:mi>\n                          <mml:msup>\n                            <mml:mrow>\n                              <mml:mi>r<\/mml:mi>\n                            <\/mml:mrow>\n                            <mml:mrow>\n                              <mml:mn>2<\/mml:mn>\n                            <\/mml:mrow>\n                          <\/mml:msup>\n                        <\/mml:mrow>\n                      <\/mml:msup>\n                      <mml:mo>)<\/mml:mo>\n                    <\/mml:mrow>\n                  <\/mml:mfenced>\n                <\/mml:math>\n              <\/jats:inline-formula> for a constant <jats:italic>K<\/jats:italic>\n              <jats:sub>\n                <jats:italic>S<\/jats:italic>\n              <\/jats:sub>&gt; 0. In this case, as an important result, we observe that the percentage of covered nodes is upper bounded by a decreasing function, vanishing as the network size grows. Second, the case of vanishing <jats:italic>r<\/jats:italic>\n              <jats:sub>\n                <jats:italic>n<\/jats:italic>\n              <\/jats:sub>(i.e., <jats:italic>r<\/jats:italic> decreases as <jats:italic>n<\/jats:italic> increases) is considered where it is shown in the literature that the minimum value of <jats:italic>r<\/jats:italic>\n              <jats:sub>\n                <jats:italic>n<\/jats:italic>\n              <\/jats:sub>which maintains connectivity is<jats:inline-formula>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mfenced>\n                    <mml:mrow>\n                      <mml:msqrt>\n                        <mml:mrow>\n                          <mml:mo>log<\/mml:mo>\n                          <mml:mi>n<\/mml:mi>\n                          <mml:mo>\/<\/mml:mo>\n                          <mml:mi>\u03a0<\/mml:mi>\n                          <mml:mi>n<\/mml:mi>\n                        <\/mml:mrow>\n                      <\/mml:msqrt>\n                    <\/mml:mrow>\n                  <\/mml:mfenced>\n                <\/mml:math>\n              <\/jats:inline-formula>. In this case, a coverage percentage of at most<jats:inline-formula>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mfenced>\n                    <mml:mrow>\n                      <mml:mtext>O<\/mml:mtext>\n                      <mml:mo>(<\/mml:mo>\n                      <mml:msup>\n                        <mml:mrow>\n                          <mml:mi>n<\/mml:mi>\n                        <\/mml:mrow>\n                        <mml:mrow>\n                          <mml:mo>\u2212<\/mml:mo>\n                          <mml:msubsup>\n                            <mml:mrow>\n                              <mml:mi>K<\/mml:mi>\n                            <\/mml:mrow>\n                            <mml:mrow>\n                              <mml:mi>S<\/mml:mi>\n                            <\/mml:mrow>\n                            <mml:mrow>\n                              <mml:mi>\u2032<\/mml:mi>\n                            <\/mml:mrow>\n                          <\/mml:msubsup>\n                        <\/mml:mrow>\n                      <\/mml:msup>\n                      <mml:mo>log<\/mml:mo>\n                      <mml:mi>n<\/mml:mi>\n                      <mml:mo>)<\/mml:mo>\n                    <\/mml:mrow>\n                  <\/mml:mfenced>\n                <\/mml:math>\n              <\/jats:inline-formula> is expected for a constant value of<jats:inline-formula>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mfenced>\n                    <mml:mrow>\n                      <mml:msubsup>\n                        <mml:mrow>\n                          <mml:mi>K<\/mml:mi>\n                        <\/mml:mrow>\n                        <mml:mrow>\n                          <mml:mi>S<\/mml:mi>\n                        <\/mml:mrow>\n                        <mml:mrow>\n                          <mml:mi>\u2032<\/mml:mi>\n                        <\/mml:mrow>\n                      <\/mml:msubsup>\n                      <mml:mo>&gt;<\/mml:mo>\n                      <mml:mn>0<\/mml:mn>\n                    <\/mml:mrow>\n                  <\/mml:mfenced>\n                <\/mml:math>\n              <\/jats:inline-formula>, leading to an infinite number of covered nodes. In such case, the rate at which the network coverage is decreased can be controlled and be considerably reduced by a proper choice of network parameters (<jats:inline-formula>\n                <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mfenced>\n                    <mml:mrow>\n                      <mml:msubsup>\n                        <mml:mrow>\n                          <mml:mi>K<\/mml:mi>\n                        <\/mml:mrow>\n                        <mml:mrow>\n                          <mml:mi>S<\/mml:mi>\n                        <\/mml:mrow>\n                        <mml:mrow>\n                          <mml:mi>\u2032<\/mml:mi>\n                        <\/mml:mrow>\n                      <\/mml:msubsup>\n                    <\/mml:mrow>\n                  <\/mml:mfenced>\n                <\/mml:math>\n              <\/jats:inline-formula>). Consequently, this result shows that flooding is a suitable strategy even for large networks.<\/jats:p>\n          <\/jats:sec>","DOI":"10.1186\/1687-1499-2012-312","type":"journal-article","created":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T16:14:15Z","timestamp":1350058455000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Asymptotic analysis of flooding in CSMA-based large scale ad-hoc wireless networks"],"prefix":"10.1186","volume":"2012","author":[{"given":"Hamed","family":"Shah-Mansouri","sequence":"first","affiliation":[]},{"given":"Babak Hossein","family":"Khalaj","sequence":"additional","affiliation":[]},{"given":"Seyed Pooya","family":"Shariatpanahi","sequence":"additional","affiliation":[]},{"given":"Javier Del","family":"Ser","sequence":"additional","affiliation":[]},{"given":"Susana","family":"P\u00e9rez-S\u00e1nchez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,10,12]]},"reference":[{"key":"511_CR1","volume-title":"ACM MOBICOM conference","author":"S Ni","year":"1999","unstructured":"Ni S, Tseng Y, Chen Y, Sheu J: The broadcast storm problem in a mobile ad hoc network, vol. 1. In ACM MOBICOM conference. Washington; 1999."},{"issue":"3-4","key":"511_CR2","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/S0140-3664(00)00233-4","volume":"24","author":"H Lim","year":"2001","unstructured":"Lim H, Kim C: Flooding in wireless ad hoc networks. Comput. Commun 2001, 24(3-4):353-363. 10.1016\/S0140-3664(00)00233-4","journal-title":"Comput. Commun"},{"key":"511_CR3","doi-asserted-by":"crossref","unstructured":"Perkins C, Belding-Royer E, Das S: Ad hoc on-demand distance vector (AODV) routing. IETF RFC 3561. Retrieved on 2010-06-18 (2003)","DOI":"10.17487\/rfc3561"},{"key":"511_CR4","volume-title":"IEEE Workshop on Mobile Computing Systems and Applications","author":"DB Johnson","year":"1994","unstructured":"Johnson DB: Routing in ad hoc networks of mobile hosts, vol. 1. In IEEE Workshop on Mobile Computing Systems and Applications. Santa Cruz, CA; 1994."},{"key":"511_CR5","volume-title":"Ad Hoc Networking","author":"DB Johnson","year":"2001","unstructured":"Johnson DB, Maltz DA, Broch J: DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. In Ad Hoc Networking. Edited by: Perkins CE. Addison-Wesley, Boston, MA; 2001."},{"key":"511_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S1570-8705(03)00043-X","volume":"2","author":"M Abolhasan","year":"2004","unstructured":"Abolhasan M, Wysocki T, Dutkiewicz E: A review of routing protocols for mobile ad hoc networks. Elsevier Ad Hoc Netws 2004, 2: 1-22. 10.1016\/S1570-8705(03)00043-X","journal-title":"Elsevier Ad Hoc Netws"},{"key":"511_CR7","volume-title":"IEEE WCNC conference","author":"Y Sasson","year":"2003","unstructured":"Sasson Y, Cavin D, Schiper A: Probabilistic Broadcast for Flooding in Wireless Mobile Ad Hoc Networks, vol. 2. In IEEE WCNC conference. New Orleans, LA; 2003."},{"issue":"2","key":"511_CR8","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1109\/18.825799","volume":"46","author":"P Gupta","year":"2000","unstructured":"Gupta P, Kumar PR: The capacity of wireless networks. IEEE Trans. Inf. Theory 2000, 46(2):388-404. 10.1109\/18.825799","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"511_CR9","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1109\/TVT.2010.2093548","volume":"60","author":"H Shah-Mansouri","year":"2011","unstructured":"Shah-Mansouri H, Pakravan MR, Khalaj BH: Analytical modeling and performance analysis of flooding in CSMA-based wireless networks. IEEE Trans. Veh. Technol 2011, 60(2):664-679.","journal-title":"IEEE Trans. Veh. Technol"},{"key":"511_CR10","volume-title":"IEEE ICC conference","author":"H Shah-Mansouri","year":"2009","unstructured":"Shah-Mansouri H, Pakravan MR: An upper bound on the performance of non-repetitive flooding over CSMA in wireless ad-hoc networks. In IEEE ICC conference. Dresden, Germany; 2009."},{"key":"511_CR11","volume-title":"paper presented at the IEEE PIMRC conference","author":"H Shah-Mansouri","year":"2008","unstructured":"Shah-Mansouri H, Pakravan MR: Performance analysis of flooding over CSMA in wireless ad-hoc networks. In paper presented at the IEEE PIMRC conference. Cannes, France; 2008."},{"key":"511_CR12","volume-title":"the 35th Annual Hawaii International Conference on System Sciences, HICSS","author":"A Qayyum","year":"2002","unstructured":"Qayyum A, Viennot L, Laouiti A: Multipoint relaying for flooding broadcast messages in mobile wireless networks. In the 35th Annual Hawaii International Conference on System Sciences, HICSS. Island of Hawaii, USA; 2002."},{"issue":"3","key":"511_CR13","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1109\/TIT.2006.890720","volume":"53","author":"J Mammen","year":"2007","unstructured":"Mammen J, Shah D: Throughput and delay in random wireless networks with restricted mobility. IEEE Trans. Inf. Theory 2007, 53(3):1108-1116.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"14","key":"511_CR14","first-page":"159","volume":"120","author":"L Wu","year":"1999","unstructured":"Wu L, Varshney P: Performance analysis of CSMA and BTMA protocols in multi-hop networks: part 1-single channel case. Inf. Sci. Int. J. Inf. Comput. Sci 1999, 120(14):159-177.","journal-title":"Inf. Sci. Int. J. Inf. Comput. Sci"},{"key":"511_CR15","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/1008328.1008329","volume":"8","author":"DE Knuth","year":"1976","unstructured":"Knuth DE: Big omicron and big omega and big theta. ACM SIGACT News 1976, 8: 18-24. 10.1145\/1008328.1008329","journal-title":"ACM SIGACT News"},{"key":"511_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0779-5","volume-title":"Measure Theory and Probability","author":"M Adams","year":"1996","unstructured":"Adams M, Guillemin V: Measure Theory and Probability. Cambridge, Birkh\u00e4user, MA; 1996."},{"issue":"1","key":"511_CR17","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/TWC.2008.060474","volume":"7","author":"R Zheng","year":"2008","unstructured":"Zheng R: Asymptotic bounds of information dissemination in power-constrained wireless networks. IEEE Trans. Wirel. Commun 2008, 7(1):251-260.","journal-title":"IEEE Trans. Wirel. Commun"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2012-312.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2012-312\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2012-312.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T22:12:48Z","timestamp":1630534368000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2012-312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,12]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["511"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2012-312","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,10,12]]},"assertion":[{"value":"16 March 2012","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2012","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2012","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"312"}}