scispace - formally typeset
Search or ask a question

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: This paper presents a comprehensive comparative study in a city environment of eight representative routing protocols for wireless mobile ad hoc networks and inter-vehicular networks developed in recent years, and discusses the strengths and weaknesses of these techniques with regard to their support for highly mobile nodes.

56 citations

Proceedings ArticleDOI
27 Mar 2014
TL;DR: An anomaly based fuzzy intrusion detection system to detect the packet dropping attack from mobile ad hoc networks and this proposed solution also save the resources of mobile nodes in respect to remove the malicious nodes.
Abstract: Due to the advancement in communication technologies, mobile ad hoc network increases the ability in terms of ad hoc communication between the mobile nodes. Mobile ad hoc networks do not use any predefined infrastructure during the communication so that all the present mobile nodes which are want to communicate with each other immediately form the topology and initiates the request for data packets to send or receive. In terms of security perspectives, communication via wireless links makes mobile ad hoc networks more vulnerable to attacks because any one can join and move the networks at any time. Particularly, in mobile ad hoc networks one of very common attack is packet dropping attack through the malicious node (s). This paper developed an anomaly based fuzzy intrusion detection system to detect the packet dropping attack from mobile ad hoc networks and this proposed solution also save the resources of mobile nodes in respect to remove the malicious nodes. For implementation point of view, qualnet simulator 6.1 and sugeno-type fuzzy inference system are used to make the fuzzy rule base for analyzing the results. From the simulation results it's proved that proposed system is more capable to detect the packet dropping attack with high positive rate and low false positive under each level (low, medium and high) of speed of mobile nodes.

56 citations

Journal ArticleDOI
TL;DR: The challenges with distributed testbed management, nonintrusive and distributed monitoring, and node status visualization are discussed, vital components in a sustainable wireless mesh testbed, but at the same time nontrivial to design and.
Abstract: In this article we report on our effort and experience in designing, deploying, and using our 30-node wireless mesh testbed, the University of California at Santa Barbara (UCSB) MeshNet. Compared to simulation, the construction and utilization of a wireless mesh testbed poses many new challenges. We discuss the challenges with distributed testbed management, nonintrusive and distributed monitoring, and node status visualization. These are vital components in a sustainable wireless mesh testbed, but at the same time nontrivial to design and. realize. As a case study, we present the UCSB MeshNet architecture, including its management, monitoring, and visualization systems. We share our lessons learned from this effort and believe that they are valuable to other researchers who develop experimental wireless mesh networks

56 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...Design, deployment, administration, and operation of a mesh network are challenging tasks....

    [...]

Journal ArticleDOI
TL;DR: ZRDM aims to control the flooding of route requests, and LFPM aims to avoid route breakages caused by node mobility, and the experimental results showed that the proposed mechanisms outperform well-known mechanisms such as the dynamic source routing (DSR) protocol, reliable DSR, and zone-based and segment-based DSR.
Abstract: The rapid advances in the wireless communication industry have paved the way for the enhancement of wireless mobile ad-hoc networks (MANETs) to support various domains including civilian environments, emergency operations, and military affairs. Source routing in MANETs is subject to some issues such as changes in the network topology, which lead to frequent link breakages that may increase the requests of route discoveries. Thus, this paper aims to enhance on-demand source routing protocols by proposing two mechanisms, a zone-based route discovery mechanism (ZRDM) and a link failure prediction mechanism (LFPM). ZRDM aims to control the flooding of route requests, and LFPM aims to avoid route breakages caused by node mobility. The performance of the proposed mechanisms was evaluated using network simulator 3 in terms of normalized routing load, average end-to-end delay, and packet delivery ratio. The experimental results showed that the proposed mechanisms outperform well-known mechanisms such as the dynamic source routing (DSR) protocol, reliable DSR, and zone-based DSR and segment-based DSR.

55 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...(ii) Reactive routing (ondemand) protocols [27]–[30]; here, a route to a destination is only searched when it is required by a source [7], [17]....

    [...]

Journal ArticleDOI
TL;DR: This paper discusses the challenges of routing in VANETs based on the data acquired from real-world experiments and proposes a routing protocol that is able to learn the best transmission parameters by interacting with the environment and takes into account multiple metrics.
Abstract: Apart from vehicle mobility, data rate (bit rate) and multihop data transmission efficiency (including route length) have a significant impact on the performance of a routing protocol for vehicular ad hoc networks (VANETs). Existing routing protocols do not seriously address all these issues and are not evaluated for a real VANET environment. Therefore, it is difficult for these protocols to attain a high performance and to work properly under various scenarios. In this paper, we first discuss the challenges of routing in VANETs based on the data acquired from real-world experiments and then propose a routing protocol that is able to learn the best transmission parameters by interacting with the environment. The protocol takes into account multiple metrics, specifically data transmission rate, vehicle movement, and route length. We use both real-world experiments and computer simulations to evaluate the proposed protocol.

55 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...“AODV-ETX (unicast probe)” shows the results when unicast probe packets are used....

    [...]

  • ...If the RREP is not received in the predefined time interval (the same as AODV) due to route breakage, RREQ will be retransmitted (up to three times), as shown in Fig....

    [...]

  • ...In the following results, “AODV-ETX (broadcast probe)” shows the result when the broadcast probe packets are used....

    [...]

  • ...The proposed protocol was compared with AODVETX (AODV with ETX [11]) and HLAR [5]....

    [...]

  • ...3 shows the process for route establishment (without specific explanations, the parameters used for the route discovery process are the same as AODV)....

    [...]

References
More filters
01 Mar 1997
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Abstract: In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:

3,501 citations

12 Nov 2001
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument. The radiation detectors are gated differently from each other to provide an indication of formation porosity which is substantially independent of the formation salinity. In the preferred embodiment, the electrical signals indicative of radiation detected by the long-spaced detector are gated for almost the entire interval between neutron pulses and the short-spaced signals are gated for a significantly smaller time interval which commences soon after the termination of a given neutron burst. The signals from the two detectors are combined in a ratio circuit for determination of porosity.

574 citations

01 Jan 1998
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA). In order for the IANA to manage a given name space prudently, it needs guidelines describing the conditions under which new values can be assigned. If the IANA is expected to play a role in the management of a name space, the IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a name space and provides guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

536 citations

01 Oct 1998
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).

334 citations

01 Jun 2004
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.
Abstract: There is a need for common definitions of terminology in the work to be done around IP mobility. This document defines terms for mobility related terminology. The document originated out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks. Other working groups dealing with mobility may want to take advantage of this terminology. This memo provides information for the Internet community.

207 citations


"Ad hoc On-Demand Distance Vector (A..." refers methods in this paper

  • ...This section defines other terminology used with AODV that is not already defined in [3]....

    [...]