scispace - formally typeset
Search or ask a question

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI
21 Sep 2005
TL;DR: A novel position-based routing algorithm for vehicular ad hoc networks able to exploit both street topology information achieved from geographic information systems and information about vehicular traffic, in order to perform accurate routing decisions is proposed.
Abstract: In this paper, we propose a novel position-based routing algorithm for vehicular ad hoc networks able to exploit both street topology information achieved from geographic information systems and information about vehicular traffic, in order to perform accurate routing decisions. The algorithm was implemented in the NS-2 simulator and was compared with three other algorithms in the literature.

50 citations


Cites methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...The algorithms can be proactive such as DSDV [9], reactive such as AODV [10] and DSR [11], or hybrid such as ZRP [12]....

    [...]

  • ...[10] Perkins C., Belding-Royer E., Das S.,“Ad Hoc On-Demand Distance Vector (AODV) Routing”....

    [...]

Book ChapterDOI
01 Jan 2004
TL;DR: In this chapter, the recent research that has been done in order to come up with secure routing protocols for ad hoc networks that cope with threats that are specific to the ad hoc environment are presented.
Abstract: In this chapter, we present the recent research that has been done in order to come up with secure routing protocols for ad hoc networks that cope with threats that are specific to the ad hoc environment. Recent solutions to combat the lack of node cooperation are presented. Recent advances in order to provide an automated key management scheme that does not require the presence of any external infrastructure or bootstrap phase where keys are distributed are presented. Currently available security mechanisms implemented in the data link layer are detailed and analyzed.

50 citations

Journal ArticleDOI
TL;DR: An early congestion detection and adaptive routing in MANET called EDAPR, which improves performance in terms of reducing delay, routing overhead and increases packet delivery ratio without incurring any significant additional cost.

50 citations

Proceedings ArticleDOI
22 Apr 2003
TL;DR: The interactions between the TCP and 802.11b MAC protocols are studied, and the causes of performance degradation when TCP is used over 802.
Abstract: The IEEE 802.11x MAC protocol, the de facto standard for wireless LANs, includes a distributed coordination function (DCF) mode usable for ad hoc network architectures. The Transmission Control Protocol (TCP) is commonly used on top of this MAC for reliable transport. TCPs congestion control scheme assumes highly reliable frame transmission at the link layer Unfortunately, this assumption does not hold in multi-hop wireless network scenarios, leading to severe performance degradation. In this paper we study the interactions between the TCP and 802.11b MAC protocols, and examine the effects of different TCP and 802.11b parameters on the throughput achieved Using simulations and analysis, we highlight the causes of performance degradation when TCP is used over 802.11b MAC in a multi-hop wireless scenario.

50 citations


Cites methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...This inference in turn triggers a route failure at the network layer protocol (AODV)....

    [...]

  • ...The routing protocol used in the simulation is AODV [16]....

    [...]

Journal ArticleDOI
TL;DR: This work proposes a multipath routing scheme, referred to as shortest multipath source (SMS) routing based on dynamic source routing (DSR), which achieves shorter multiple partial-disjoint paths and allows more rapid recovery from route breaks.
Abstract: Multipath routing in mobile ad-hoc networks allows the establishment of multiple paths for routing between a source-destination pair. It exploits the resource redundancy and diversity in the underlying network to provide benefits such as fault tolerance, load balancing, bandwidth aggregation and the improvement in quality-of-service metrics such as delay. Previous work shows that on-demand multipath routing schemes achieve better performance under certain scenarios with respect to a number of key performance metrics when compared with traditional single-path routing mechanisms. A multipath routing scheme, referred to as shortest multipath source (SMS) routing based on dynamic source routing (DSR) is proposed here. The mechanism has two novel aspects compared with other on-demand multipath routing schemes: it achieves shorter multiple partial-disjoint paths and allows more rapid recovery from route breaks. The performance differentials are investigated using NS-2 under conditions of varying mobility, offered load and network size. Results reveal that SMS provides a better solution than existing source-based approaches in a truly mobile ad-hoc environment.

50 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...dynamic source routing (DSR) [2] and ad-hoc on-demand distance vector (AODV) [3]) use a single route for each session....

    [...]

  • ...[1] IETF: ‘Mobile ad-hoc networks (MANET) working group’, http://www.ietf.org/html.charters/manet-charter. html [2] JOHNSON D.B., HU Y., MALTZ D.A.: ‘Dynamic source routing in ad-hoc wireless networks’, IETF RFC 4728, February 2007, http://www.ietf.org/rfc/rfc4728.txt [3] PERKINS C.E., ROYER E.M., DAS S.: ‘Ad-hoc on-demand distance vector (AODV) routing’, IETF RFC 3561, July 2003, http://www.ietf.org/rfc/rfc3561.txt [4] BROCH J., MALTZ D.A., JOHNSON D.B., HU Y., JETCHEVA J.: ‘A performance comparison of multi-hop wireless ad-hoc network routing protocols’....

    [...]

  • ...Most proposed schemes of this type (e.g. dynamic source routing (DSR) [2] and ad-hoc on-demand distance vector (AODV) [3]) use a single route for each session....

    [...]

References
More filters
01 Mar 1997
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Abstract: In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:

3,501 citations

12 Nov 2001
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument. The radiation detectors are gated differently from each other to provide an indication of formation porosity which is substantially independent of the formation salinity. In the preferred embodiment, the electrical signals indicative of radiation detected by the long-spaced detector are gated for almost the entire interval between neutron pulses and the short-spaced signals are gated for a significantly smaller time interval which commences soon after the termination of a given neutron burst. The signals from the two detectors are combined in a ratio circuit for determination of porosity.

574 citations

01 Jan 1998
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA). In order for the IANA to manage a given name space prudently, it needs guidelines describing the conditions under which new values can be assigned. If the IANA is expected to play a role in the management of a name space, the IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a name space and provides guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

536 citations

01 Oct 1998
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).

334 citations

01 Jun 2004
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.
Abstract: There is a need for common definitions of terminology in the work to be done around IP mobility. This document defines terms for mobility related terminology. The document originated out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks. Other working groups dealing with mobility may want to take advantage of this terminology. This memo provides information for the Internet community.

207 citations


"Ad hoc On-Demand Distance Vector (A..." refers methods in this paper

  • ...This section defines other terminology used with AODV that is not already defined in [3]....

    [...]