scispace - formally typeset
Search or ask a question

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI
22 Mar 2013
TL;DR: A new scheme consist of a smart city framework that transmit information about traffic conditions that will help the driver to take appropriate decisions is introduced, which consists of a warning message module composed of Intelligent Traffic Lights (ITLs) which provides information to the driver about current traffic conditions.
Abstract: The total number of vehicles in the world has experienced a remarkable growth, increasing traffic density which results in more and more accidents. Therefore the manufactures, researchers and government is shifting focus towards improving the on road safety rather than improving the quality of the roads. The good development in the wireless technologies emerged various new type of networks, such as Vehicular Ad Hoc Network (VANET), which provides communication between vehicles themselves and between vehicles and road side units. Various new concepts such as smart cities and living labs [1] are introduced in the recent years where VANETs plays an important role. A survey of various Intelligent Traffic Systems (ITS) and various routing protocols with respect to our proposed scheme is described in this paper. It also introduces a new scheme consist of a smart city framework that transmit information about traffic conditions that will help the driver to take appropriate decisions. It consists of a warning message module composed of Intelligent Traffic Lights (ITLs) which provides information to the driver about current traffic conditions.

84 citations

Journal ArticleDOI
TL;DR: A brief overview of different routing algorithms in VANET along with major classifications is given and the protocols are compared based on their essential characteristics and tabulated.
Abstract: Vehicular ad-hoc networks (VANETs) offer a vast number of applications without any support from fixed infrastructure. These applications forward messages in a multi-hop fashion. Designing an efficient routing protocol for all VANET applications is very hard. Hence a survey on routing protocols based on various parameters of VANET is a necessary issue in vehicle-tovehicle (V2V) and infrastructure-tovehicle (IVC) communication. This paper gives a brief overview of different routing algorithms in VANET along with major classifications. The protocols are also compared based on their essential characteristics and tabulated.

84 citations


Cites methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...Parameters Protocols Forwarding Strategy Routing Maintenance Scenario Recovery strategy Infrastructure Require-ment Digital map Control Packet overhead No of retransmis sion FSR Multi hop Proactive Urban Multi hop No No High Less OLSR Multi hop Proactive Urban Multi hop No No High Less TBRPF Multi hop Proactive Urban Multi hop No No High Less AODV Multi hop Reactive Urban Store and Forward No No Low Less DSR Multi hop Reactive Urban Store and forward No No Low Less TORA Multi hop Reactive Urban Store and forward No No Low Less ZRP Multi hop Hybrid Urban Multi hop No No Moderate Less HARP Multi hop Hybrid Urban Multi hop No No Moderate Less GPSR Greedy forwarding Reactive Urban Store and forward No Yes Moderate Less VGPR Greedy forwarding Reactive Urban Store and forward No Yes Moderate Less GPCR Greedy Forwarding Reactive Urban Store and forward No Yes Moderate Less MIBR Bus first Reactive Urban Store and forward No Yes Low Moderate GYTAR Greedy forwarding Reactive Urban Store and forward No Yes Moderate Less ROVER Multi hop Reactive Urban Flooding No No High High TZDP Multi hop Reactive Urban Flooding No No Low High DTSG Multi hop Reactive Urban Flooding No No Moderate High HCB Multi hop Reactive Urban Store and forward No Yes Moderate High CBLR Multi hop Reactive Urban Flooding No Yes Less High CBR Multi hop Reactive Urban Store and forward No Yes Moderate High CBDRP Multi hop Reactive Urban Store and No Yes Moderate High forward EAEP Multi hop Reactive High way Store and forward No No High Moderate DV-CAST Multi hop Proactive High way Store and forward No No High Moderate SRB Multi hop Reactive High way Store and forward No No High Moderate PBSM Multi hop Reactive High way Store and forward No No High Moderate ACKPBSM Multi hop Reactive High way Store and forward No No High Moderate SADV Store and forward Reactive Urban Multi hop yes No Low Low RAR Store and forward Reactive Urban Multi hop Yes No Low Low...

    [...]

  • ...[2] C. Perkins, E. Belding-Royer, and S. Das, “Ad Hoc On- Demand Distance Vector (AODV) Routing”, RFC 3561, Network Working Group, 2003....

    [...]

  • ...AODV [2]: Is a source initiated routing protocol and uses HELLO messages to identify its neighbors....

    [...]

  • ...39 AODV [2]: Is a source initiated routing protocol and uses HELLO messages to identify its neighbors....

    [...]

Journal ArticleDOI
01 Jul 2003
TL;DR: Each of these well known contemporary protocols aimed at securing routing in mobile wireless ad hoc networks is analyzed against requirements of ad hoc routing and in some cases identify fallibilities and make recommendations to overcome these problems.
Abstract: We discuss several well known contemporary protocols aimed at securing routing in mobile wireless ad hoc networks. We analyze each of these protocols against requirements of ad hoc routing and in some cases identify fallibilities and make recommendations to overcome these problems so as to improve the overall efficacy of these protocols in securing ad hoc routing, without adding any significant computational or communication overhead.

84 citations

Journal ArticleDOI
01 Apr 2007
TL;DR: A two-phase detection procedure of nodes that are not authorized for specific services and nodes that have been compromised during their operation in MANET is proposed, based on zero knowledge techniques.
Abstract: Security of mobile ad hoc networks (MANET) has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. In this paper, the security challenges in intrusion detection and authentication are identified and the different types of attacks are discussed. We propose a two-phase detection procedure of nodes that are not authorized for specific services and nodes that have been compromised during their operation in MANET. The detection framework is enabled with the main operations of ad hoc networking, which are found at the link and network layers. The proposed framework is based on zero knowledge techniques, which are presented through proofs.

84 citations

Journal ArticleDOI
TL;DR: It is shown that the new approach improves the network throughput, reduces unnecessary packet transmissions and therefore reduces packets lost and there is a close match between the analytical and the simulation results which confirms the validity of the analytical models.
Abstract: We propose a new cross-layer design employing the predictability of Rayleigh channels to improve the performance of ad hoc networks. In addition, we propose a Markov model for Rayleigh channels and an innovative Markov model for IEEE 802.11 distributed coordination function. By combining these two models, we derive the theoretical expressions for network throughput, packet processing rate, packet loss probability, and average packet delay under Rayleigh channels. The simulation of the proposed cross-layer design is also carried out. It is shown that the new approach improves the network throughput, reduces unnecessary packet transmissions and therefore reduces packets lost. We also show that there is a close match between the analytical and the simulation results which confirms the validity of the analytical models.

84 citations


Cites methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...Finally, we use ad hoc on-demand distance vector (AODV) as the routing protocol [ 19 ]....

    [...]

References
More filters
01 Mar 1997
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Abstract: In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:

3,501 citations

12 Nov 2001
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument. The radiation detectors are gated differently from each other to provide an indication of formation porosity which is substantially independent of the formation salinity. In the preferred embodiment, the electrical signals indicative of radiation detected by the long-spaced detector are gated for almost the entire interval between neutron pulses and the short-spaced signals are gated for a significantly smaller time interval which commences soon after the termination of a given neutron burst. The signals from the two detectors are combined in a ratio circuit for determination of porosity.

574 citations

01 Jan 1998
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA). In order for the IANA to manage a given name space prudently, it needs guidelines describing the conditions under which new values can be assigned. If the IANA is expected to play a role in the management of a name space, the IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a name space and provides guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

536 citations

01 Oct 1998
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).

334 citations

01 Jun 2004
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.
Abstract: There is a need for common definitions of terminology in the work to be done around IP mobility. This document defines terms for mobility related terminology. The document originated out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks. Other working groups dealing with mobility may want to take advantage of this terminology. This memo provides information for the Internet community.

207 citations


"Ad hoc On-Demand Distance Vector (A..." refers methods in this paper

  • ...This section defines other terminology used with AODV that is not already defined in [3]....

    [...]