scispace - formally typeset
Search or ask a question

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

Content maybe subject to copyright    Report

Citations
More filters
Journal Article•DOI•
TL;DR: This work proposes a proactive topology-aware scheme to track the network topology change and confirmed that the proposed scheme reduces the average delay and improves routing performance significantly.
Abstract: Swarm unmanned aerial vehicles (UAVs) is an approach to the coordination of multiple UAVs as a system, which has huge advantages on mission capabilities, such as cooperative search, border surveillance, and situation awareness. For better swarm coordination, a robust inter-UAV network, especially in ad hoc mode, is needed. Due to the dynamic nature of UAV networks owing to mobility and topology change, adapting routing quickly to topology changes is one of the key components of UAV networks. Based on investigating the relationship between the swarm formation control and the network topology, we propose a proactive topology-aware scheme to track the network topology change. Through simulations on Qualnet and real-world experiments with five quadrotors, the results confirmed that the proposed scheme reduces the average delay and improves routing performance significantly.

59 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...a HELLO message before it detects loss of connectivity with its neighbors [36]....

    [...]

Journal Article•DOI•
01 Jul 2016
TL;DR: This paper compares the performance for Normal, Uniform, Exponential and Weibull distributions of mesh clients by sending multiple constant bit rate flows in the network and shows that for HWM protocol the throughput of Uniform distribution is higher than other distributions, however, for OLSR protocol,The throughput of Exponential distribution is better than other distribution.
Abstract: Wireless mesh networks (WMNs) are attracting a lot of attention from wireless network researchers. Node placement problems have been investigated for a long time in the optimization field due to numerous applications in location science. In our previous work, we evaluated WMN-GA system which is based on genetic algorithms (GAs) to find an optimal location assignment for mesh routers. In this paper, we evaluate the performance of four different distributions of mesh clients for two WMN architectures considering throughput, delay and energy metrics. For simulations, we used ns-3, optimized link state routing (OLSR) and hybrid wireless mesh protocols (HWMP). We compare the performance for Normal, Uniform, Exponential and Weibull distributions of mesh clients by sending multiple constant bit rate flows in the network. The simulation results show that for HWM protocol the throughput of Uniform distribution is higher than other distributions. However, for OLSR protocol, the throughput of Exponential distribution is better than other distributions. For both protocols, the delay and remaining energy are better for Weibull distribution.

58 citations


Cites methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...It is based on AODV Perkins et al. (2003) and tree-based routing....

    [...]

Proceedings Article•DOI•
04 Oct 2004
TL;DR: This work contributes mechanisms that maintain cache consistency and shows that explicitly removing cache entries on existing neighboring providers is well invested effort, and provides a general architectural framework for enabling lightweight service discovery on top of most reactive routing protocols.
Abstract: Emerging "urban" ad hoc networks resulting from a large number of individual WLAN users challenge the way users could explore and interact with their physical surroundings. Robust and efficient service discovery and routing protocols in such networks are a necessary ingredient. Although a lightweight service discovery proposal integrated with ad hoc routing exists, an implementation and performance evaluation with respect to overhead and correctness have so far been missing.Moreover, the different service providers in an urban scenario, which (more or less) frequently and actively change their status, demand more flexible handling of cached information on neighboring providers than what is currently proposed. We therefore contribute mechanisms that maintain cache consistency and show that explicitly removing cache entries on existing neighboring providers is well invested effort. We finally evaluate whether ad hoc network latency can implicitly help our protocol in retrieving the physically closest provider, using an 802.11 model. Additionally, we provide a general architectural framework for enabling lightweight service discovery on top of most reactive routing protocols.

58 citations

Proceedings Article•DOI•
01 Nov 2011
TL;DR: A 3-dimensional Gauss-Markov mobility model in ns-3 is implemented that appears to be more realistic than memoryless models such as random waypoint and random walk and is able to simulate the airborne networking environment with greater realism than was previously possible.
Abstract: Emerging airborne networks require domainspecific routing protocols to cope with the challenges faced by the highly-dynamic aeronautical environment. We present an ns-3 based performance comparison of the AeroRP protocol with conventional MANET routing protocols. To simulate a highly-dynamic airborne network, accurate mobility models are needed for the physical movement of nodes. The fundamental problem with many synthetic mobility models is their random, memoryless behavior. Airborne ad hoc networks require a flexible memory-based 3-dimensional mobility model. Therefore, we have implemented a 3-dimensional Gauss-Markov mobility model in ns-3 that appears to be more realistic than memoryless models such as random waypoint and random walk. Using this model, we are able to simulate the airborne networking environment with greater realism than was previously possible and show that AeroRP has several advantages over other MANET routing protocols.

58 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...There are a few routing protocols specifically for aeronautical environments....

    [...]

Proceedings Article•DOI•
04 Jun 2007
TL;DR: The main issues and challenges to implement a Delay Tolerant Network (DTN) to allow multi-hop Car2Car (C2C) and car2I communications are identified and discussed.
Abstract: In this paper we identify and discuss the main issues and challenges to implement a Delay Tolerant Network (DTN) to allow multi-hop Car2Car (C2C) -also known as Vehicle2Vehicle (V2V)- and car2infrastructure (C2I) communications. C2C communications are designed to increase automobile security and comfort, but a single hop is not enough [1]. Efficient network layers are necessary to overcome these limitations.

58 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...Indeed, it is likely that the performance of a routing protocol such as Ad-hoc On-demand Distance Vector (AODV) [13] would have been poor considering the possible network partitions....

    [...]

References
More filters
01 Mar 1997
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Abstract: In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:

3,501 citations

12 Nov 2001
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument. The radiation detectors are gated differently from each other to provide an indication of formation porosity which is substantially independent of the formation salinity. In the preferred embodiment, the electrical signals indicative of radiation detected by the long-spaced detector are gated for almost the entire interval between neutron pulses and the short-spaced signals are gated for a significantly smaller time interval which commences soon after the termination of a given neutron burst. The signals from the two detectors are combined in a ratio circuit for determination of porosity.

574 citations

01 Jan 1998
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA). In order for the IANA to manage a given name space prudently, it needs guidelines describing the conditions under which new values can be assigned. If the IANA is expected to play a role in the management of a name space, the IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a name space and provides guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

536 citations

01 Oct 1998
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).

334 citations

01 Jun 2004
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.
Abstract: There is a need for common definitions of terminology in the work to be done around IP mobility. This document defines terms for mobility related terminology. The document originated out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks. Other working groups dealing with mobility may want to take advantage of this terminology. This memo provides information for the Internet community.

207 citations


"Ad hoc On-Demand Distance Vector (A..." refers methods in this paper

  • ...This section defines other terminology used with AODV that is not already defined in [3]....

    [...]