scispace - formally typeset
Search or ask a question

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

Content maybe subject to copyright    Report

Citations
More filters
01 Jan 2013
TL;DR: Simulation results shows position based routing protocols gives better performance than topology based routing Protocols in mobile network environment.
Abstract: Due to mobility constraints and high dynamics, routing in Mobile Ad-Hoc Network is a very challenging task. In this work, we evaluate the performance of the routing protocols in mobile network environment. The objective of this work is to assess the applicability of these protocols in different mobile traffic scenarios. Here we considered Topology based routing protocols. In Topology-based routing protocols, both proactive (DSDV) and reactive protocols (AODV, DSR) have been considered for the study. Performance metrics such as packet delivery ratio, throughput, and end-to-end delay are evaluated using NS-2. Simulation results shows position based routing protocols gives better performance than topology based routing protocols.

56 citations

Proceedings Article•DOI•
21 May 2012
TL;DR: This paper addresses the low-power mechanisms provided by the IEEE 802.15.4/ZigBee and 6LoWPAN protocols, providing comparative assessments through experimental measurements performed on a real testbed, highlighting the strengths and weaknesses of both protocols when working in low- power mode.
Abstract: This paper addresses the low-power mechanisms provided by the IEEE 802.15.4/ZigBee and 6LoWPAN protocols, providing comparative assessments through experimental measurements performed on a real testbed. For a fair performance comparison, a special effort has been made to both tune the parameters of each protocol so as to make it able to properly operate in low-power mode and make the measurement scenarios equivalent in terms of traffic and energy efficiency. After addressing this tuning phase, the paper compares the protocols performance obtained on the same network, under the same workload and while working with the same duty cycle. The comparison focuses on the impact of the low-power mechanisms on the network performance. The experimental assessments highlight the strengths and weaknesses of both protocols when working in low-power mode.

56 citations

Proceedings Article•DOI•
08 Mar 2005
TL;DR: A lightweight service discovery mechanism for the mobile ad hoc pervasive environment, applying cross-layer design to reduce the infrastructure and protocol overhead, and to improve service accessibility is presented.
Abstract: This paper presents a lightweight service discovery mechanism for the mobile ad hoc pervasive environment, applying cross-layer design to reduce the infrastructure and protocol overhead, and to improve service accessibility. Integrated with the network routing layer, the proposed mechanism automatically identifies the proper service discovery model for the current network configuration. The solution adapts to network expansion with enhanced scalability. Simulation studies of real-time service scenarios employing the proposed mechanism are presented, demonstrating the efficiency of the mechanism and the satisfactory service performance results.

56 citations

Proceedings Article•DOI•
04 Oct 2004
TL;DR: A novel bidirectional multi-channel MAC protocol designed to improve TCP performance over a multihop wireless network and fairness is improved, since contention is confined to a short handshake period on the control channel.
Abstract: The TCP protocol often suffers from performance problems in conventional single-channel multihop wireless ad hoc networks. The problems arise from hidden node and exposed node issues, which can lead to channel contention in the forward direction between TCP DATA packets that are part of the same TCP flow control window, as well as contention between TCP DATA and TCP ACK packets flowing in opposite directions. In this paper, we propose and evaluate a novel bidirectional multi-channel MAC protocol designed to improve TCP performance over a multihop wireless network. The protocol uses multiple transmission channels at the physical layer to reduce TCP DATA-DATA contention, and bidirectional RTS/CTS channel reservations to reduce TCP DATA-ACK collisions. With four channels, simulation results for static multihop networks show TCP throughput gains of 50% to 180%, compared to a conventional IEEE 802.11 MAC protocol. Fairness is also improved with our protocol, since contention is confined to a short handshake period on the control channel.

56 citations

Journal Article•DOI•
23 Dec 2009-Sensors
TL;DR: An algorithm that is able to structure the topology of different wireless sensor networks to coexist in the same environment is proposed and compared with other algorithms reported in the literature in terms of architecture and protocol measurements.
Abstract: A wireless sensor network is a self-configuring network of mobile nodes connected by wireless links where the nodes have limited capacity and energy. In many cases, the application environment requires the design of an exclusive network topology for a particular case. Cluster-based network developments and proposals in existence have been designed to build a network for just one type of node, where all nodes can communicate with any other nodes in their coverage area. Let us suppose a set of clusters of sensor nodes where each cluster is formed by different types of nodes (e.g., they could be classified by the sensed parameter using different transmitting interfaces, by the node profile or by the type of device: laptops, PDAs, sensor etc.) and exclusive networks, as virtual networks, are needed with the same type of sensed data, or the same type of devices, or even the same type of profiles. In this paper, we propose an algorithm that is able to structure the topology of different wireless sensor networks to coexist in the same environment. It allows control and management of the topology of each network. The architecture operation and the protocol messages will be described. Measurements from a real test-bench will show that the designed protocol has low bandwidth consumption and also demonstrates the viability and the scalability of the proposed architecture. Our ccluster-based algorithm is compared with other algorithms reported in the literature in terms of architecture and protocol measurements.

56 citations

References
More filters
01 Mar 1997
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Abstract: In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:

3,501 citations

12 Nov 2001
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument. The radiation detectors are gated differently from each other to provide an indication of formation porosity which is substantially independent of the formation salinity. In the preferred embodiment, the electrical signals indicative of radiation detected by the long-spaced detector are gated for almost the entire interval between neutron pulses and the short-spaced signals are gated for a significantly smaller time interval which commences soon after the termination of a given neutron burst. The signals from the two detectors are combined in a ratio circuit for determination of porosity.

574 citations

01 Jan 1998
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA). In order for the IANA to manage a given name space prudently, it needs guidelines describing the conditions under which new values can be assigned. If the IANA is expected to play a role in the management of a name space, the IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a name space and provides guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

536 citations

01 Oct 1998
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).

334 citations

01 Jun 2004
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.
Abstract: There is a need for common definitions of terminology in the work to be done around IP mobility. This document defines terms for mobility related terminology. The document originated out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks. Other working groups dealing with mobility may want to take advantage of this terminology. This memo provides information for the Internet community.

207 citations


"Ad hoc On-Demand Distance Vector (A..." refers methods in this paper

  • ...This section defines other terminology used with AODV that is not already defined in [3]....

    [...]