scispace - formally typeset
Search or ask a question

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

Content maybe subject to copyright    Report

Citations
More filters
Patent
31 Dec 2007
TL;DR: In this paper, the authors propose a link quality and node health aware routing protocol on the network that considers a combination of link quality, node health/residual lifetime metrics in the calculation of the desirability of nodes and links between nodes as parts of an overall route.
Abstract: Method and apparatus for optimizing mesh routing for stability and system lifetime maximization in networks, for example in wireless networks. A routing module may be instantiated in nodes on the network. The routing module may implement a link quality and node health aware routing protocol on the network that considers a combination of link quality and node health/residual lifetime metrics in the calculation of the desirability of nodes and links between nodes as parts of an overall route. A route selection metric for each route may be determined from routing cost metrics for the nodes on the route and the number of hops on the route. A node may then select a best route according to the determined route selection metrics for the routes.

54 citations

Proceedings ArticleDOI
01 Nov 2010
TL;DR: An Intrusion Detection System (IDS), which is able to protect a CI from attacks directed to its WSN-based parts, and demonstrates the effectiveness of the proposed approach in protecting the system against two very serious attacks to WSNs.
Abstract: Wireless Sensor Network (WSN) technology is being increasingly used for data collection in Critical Infrastructures (CIs). The paper presents an Intrusion Detection System (IDS), which is able to protect a CI from attacks directed to its WSN-based parts. By providing accurate and timely detection of malicious activities, the proposed IDS solution ultimately results in a dramatic improvement in terms of protection, since opportunities are given for performing proper remediation/reconfiguration actions, which counter the attack and/or allow the system to tolerate it. We present the basic ideas, discuss the main implementation issues, and perform a preliminary experimental campaign. Not only have experiments demonstrated the effectiveness of the proposed approach in protecting the system against two very serious attacks to WSNs (namely: sinkhole, and bogus packet), but they have also proved that the stringent requirements (in terms of limited availability of resources) which are typical of current state-of-the-art WSN technologies, are met.

54 citations

Proceedings ArticleDOI
06 Nov 2002
TL;DR: This work describes a simplified scenario with two stationary terminals and one terminal in motion, which allows a statistical derivation to forecast the average distance the moving relay is within the scope of the two other nodes.
Abstract: Mobile ad hoc networks are self configuring wireless networks without any fixed infrastructure. The members within such a network move independently from each other and their movements are not restricted in any case (in car to car ad-hoc networks nodes partly drive in the same direction). Hence, it is impossible to predict routes, link expiration or link failure times. We describe a simplified scenario with two stationary terminals and one terminal in motion. This simple approach allows a statistical derivation to forecast the average distance the moving relay is within the scope of the two other nodes. With these statistical calculations, predictions about the average link expiration times and deviations for different node velocities are possible, independent from the nodes' radio transmission ranges and the distances between each other.

54 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...[7] or [8], create routes to distant communication partners over other nodes, using these nodes as connection relays....

    [...]

Proceedings ArticleDOI
04 Oct 2011
TL;DR: A targeted, in-depth investigation of the current state of the BATMAN Advanced (batman-adv) protocol in a realistic office environment, using the thoroughly studied AODV protocol as a baseline, to study the reachability, packet loss, delay and throughput of the network.
Abstract: The performance of Wireless Mesh Networks under realistic conditions is not well understood. Given the huge design and parameter space for these networks, all-encompassing performance evaluations are unfeasible. We follow a practical approach and perform a targeted, in-depth investigation of the current state of the BATMAN Advanced (batman-adv) protocol in a realistic office environment, using the thoroughly studied AODV protocol as a baseline. In particular, we study the reachability, packet loss, delay and throughput of the network. We identify the main parameters influencing the routing performance and demonstrate failure modes of the studied protocols.

54 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...Ad hoc On-Demand Distance Vector Routing (AODV [3]) adapts the well known principle of distance vector routing to the short-lived topology of mobile networks....

    [...]

Journal ArticleDOI
TL;DR: An overarching view of the complete domain of vehicular cloud computing is provided to identify areas for future research directions and highlight the design issues and research challenges.
Abstract: Vehicular cloud is getting significant research attention due to the technological advancements in smart vehicles. In near future, vehicles are envisioned to become part of a grid network providing cloud services, such as computing, storage, network, and application as a service. Vehicular cloud computing is an emerging area, designed to support delay-sensitive applications. However, this integration of vehicular network and cloud computing introduces new challenges for the research community. New frameworks have been proposed to assimilate and efficiently manage this merger. In this survey paper, we present the recent advancements in vehicular cloud computing domain. The review is primarily focused on two areas. First, we discuss the frameworks designed to utilize the vehicles’ onboard resources to provide cloud services and highlight the design issues and research challenges. Secondly, we focus on a detailed study of mobility generators, network, and vehicular ad hoc network simulators, as well as the available vehicular data sets. We thus provide an overarching view of the complete domain of vehicular cloud computing and identify areas for future research directions.

54 citations


Cites methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...The proposed technique is based on a virtualized version of AODVprotocol....

    [...]

  • ...Endnotes 1An architectural element of fog computing (defined later) that sits between the mobile users and the traditional cloud 2 https://aws.amazon.com/s3/ Abbreviations AODV: Ad hoc on-demand distance vector; ARQ: Automatic repeat reQuest; AVE: Autonomous vehicular edge; ITS: Intelligent transportation systems; LTE: Long-term evolution; MAC: Media access control; OBU: On board unit; QoE: Quality of experience; QoS: vuality of service; RSU: Road side unit; V2D: Vehicle to device; V2G: Vehicle to grid; V2H: Vehicle to home; V2I: Vehicle to infrastructure; V2P: Vehicle to pedestrian; V2V: Vehicle to vehicle; V2X: Vehicle to everything; VANET: Vehicular ad hoc networks; VCC: Vehicular cloud computing; VFC: Vehicular fog computing; VM: Virtual machine; WAN: Wide area network Funding Not applicable....

    [...]

  • ...A modified version of Ad hoc On-Demand Distance Vector (AODV) [20] is used to support the routing within a region....

    [...]

References
More filters
01 Mar 1997
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Abstract: In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:

3,501 citations

12 Nov 2001
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument. The radiation detectors are gated differently from each other to provide an indication of formation porosity which is substantially independent of the formation salinity. In the preferred embodiment, the electrical signals indicative of radiation detected by the long-spaced detector are gated for almost the entire interval between neutron pulses and the short-spaced signals are gated for a significantly smaller time interval which commences soon after the termination of a given neutron burst. The signals from the two detectors are combined in a ratio circuit for determination of porosity.

574 citations

01 Jan 1998
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA). In order for the IANA to manage a given name space prudently, it needs guidelines describing the conditions under which new values can be assigned. If the IANA is expected to play a role in the management of a name space, the IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a name space and provides guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

536 citations

01 Oct 1998
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).

334 citations

01 Jun 2004
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.
Abstract: There is a need for common definitions of terminology in the work to be done around IP mobility. This document defines terms for mobility related terminology. The document originated out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks. Other working groups dealing with mobility may want to take advantage of this terminology. This memo provides information for the Internet community.

207 citations


"Ad hoc On-Demand Distance Vector (A..." refers methods in this paper

  • ...This section defines other terminology used with AODV that is not already defined in [3]....

    [...]