scispace - formally typeset
Search or ask a question

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

Content maybe subject to copyright    Report

Citations
More filters
Proceedings Article•DOI•
29 Jul 2007
TL;DR: By using the proposed GroupCaching, the caching space in MHs can be efficiently utilized and thus the redundancy of cached data is decreased and the average access latency is reduced.
Abstract: In the mobile ad hoc network, a mobile host can communicate with others anywhere and anytime. Cooperative caching scheme can improve the accessibility of data objects. However, the cache hit ratio is reduced and access latency becomes longer significantly due to the mobility of MHs, energy consumption in battery, and limited wireless bandwidth. In this paper, we propose a novel cooperative caching scheme called GroupCaching (GC) which allows each MH and its 1-hop neighbors form a group. The caching status is exchanged and maintained periodically in a group. By using the proposed GroupCaching, the caching space in MHs can be efficiently utilized and thus the redundancy of cached data is decreased and the average access latency is reduced. We evaluate the performance of the GroupCaching by using NS2 and compare it with the existing schemes such as CacheData and ZoneCooperative. The experimental results show that the cache hit ratio is increased by about 3%~30% and the average latency is reduced by about 5%~25% compared with other schemes.

79 citations

01 Jan 2006
TL;DR: Solutions for the medium access contol and the network layer are analyzed and discussed and well-known methods in ad hoc networks are classified and some case studies are provided.
Abstract: Self-organization is a great concept for building scalable systems consisting of huge numbers of subsystems. The primary objectives are coordination and collaboration on a global goal. Until now, many self-organization methods have been developed for communication networks in general and ad hoc networks in particular. Nevertheless, the term self-organization is still often misunderstood or misused. This paper contributes to the ad hoc community by providing a better understanding of self-organization in ad hoc networks. Primarily, solutions for the medium access contol and the network layer are analyzed and discussed. The main contribution of this paper is a categorization of self-organization methodologies. Additionally, well-known methods in ad hoc networks are classified and some case studies are provided.

79 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...Well-known examples are AODV (Ad-Hoc On Demand Distance Vector Routing) [55], [56] and its successor DYMO (Dynamic MANET On Demand) [57]....

    [...]

Journal Article•DOI•
TL;DR: A flexible WSS framework has been developed for full-scale, autonomous structural health monitoring (SHM) that integrates the necessary software and hardware elements, while addressing key implementation requirements for civil infrastructure.
Abstract: While much of the technology associated with wireless smart sensors (WSS) has been available for over a decade, only a limited number of full-scale implementations have been realized for civil infrastructure, primarily due to the lack of critical hardware and software elements. Using the Imote2, a flexible WSS framework has been developed for full-scale, autonomous structural health monitoring (SHM) that integrates the necessary software and hardware elements, while addressing key implementation requirements for civil infrastructure. This paper discusses the recent advances in the development of this WSS framework and extensions to structural control. Their successful implementations at full-scale for SHM of the 2nd Jindo Bridge in South Korea and the Government Bridge at the Rock Island Arsenal in Illinois, USA, as well as for wireless control of a lab-scale structure are presented.

79 citations

Proceedings Article•DOI•
04 Apr 2001
TL;DR: This work focuses upon routing protocols for ad hoc networks, study and compare the performance of several routing protocols, and a variety of workload and scenarios using a range of mobility, load and size of the ad hoc network were simulated.
Abstract: A mobile ad-hoc network (Manet) is a system of wireless mobile nodes dynamically self-organizing in arbitrary and temporary network topologies. People and vehicles can thus be internetworked in areas without a pre-existing communication infrastructure, or when the use of such infrastructure requires wireless extension. Therefore, such networks are designed to operate in widely varying environments, from military networks to low-power sensor networks and other embedded systems. Frequent topology changes caused by node mobility make routing in ad hoc wireless networks a challenging problem. We focus upon routing protocols for ad hoc networks. We study and compare the performance of several routing protocols. A variety of workload and scenarios using a variety of mobility, load and size of the ad hoc network were simulated.

79 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...AODV [6] shares the same on-demand characteristics as DSR, but adopts a very different mechanism to maintain routing information....

    [...]

  • ...Therefore, a number of routing protocols have been proposed for ad hoc wireless networks [l], [5] [7], [6], [14] derived from distance-vector [12] or link-state [13] routing algorithms....

    [...]

Patent•
Fan Yang1, Junfeng Zhou1, Kun Tan1, Qian Zhang1•
01 Feb 2006
TL;DR: In this paper, a technique for automatic neighbor/service discovery using special beacons transmitted from wireless devices is presented, which improves a user's experience when setting-up the wireless network and using one or more services.
Abstract: The present technique for automating service discovery and the set-up of a wireless network improves a user's experience when setting-up the wireless network and using one or more services. The technique includes automatic neighbor/service discovery using special beacons transmitted from wireless devices. Each special beacon identifies the wireless device (i.e., host) that transmitted the beacon along with the services provided by the device. For each special beacon that is received, a corresponding host name and the service provided by it are displayed in a graphical user interface. A user may select one or more of the host names and initiate a transmission of a network set-up and service request. The network set-up and service request identifies the selected host names and invites each selected host name to become a member of a wireless network. After the network has been set up, the service may be invoked automatically.

79 citations

References
More filters
01 Mar 1997
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Abstract: In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:

3,501 citations

12 Nov 2001
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument. The radiation detectors are gated differently from each other to provide an indication of formation porosity which is substantially independent of the formation salinity. In the preferred embodiment, the electrical signals indicative of radiation detected by the long-spaced detector are gated for almost the entire interval between neutron pulses and the short-spaced signals are gated for a significantly smaller time interval which commences soon after the termination of a given neutron burst. The signals from the two detectors are combined in a ratio circuit for determination of porosity.

574 citations

01 Jan 1998
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA). In order for the IANA to manage a given name space prudently, it needs guidelines describing the conditions under which new values can be assigned. If the IANA is expected to play a role in the management of a name space, the IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a name space and provides guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

536 citations

01 Oct 1998
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).

334 citations

01 Jun 2004
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.
Abstract: There is a need for common definitions of terminology in the work to be done around IP mobility. This document defines terms for mobility related terminology. The document originated out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks. Other working groups dealing with mobility may want to take advantage of this terminology. This memo provides information for the Internet community.

207 citations


"Ad hoc On-Demand Distance Vector (A..." refers methods in this paper

  • ...This section defines other terminology used with AODV that is not already defined in [3]....

    [...]