scispace - formally typeset
Search or ask a question

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

Content maybe subject to copyright    Report

Citations
More filters
01 Jan 2002
TL;DR: In mobile ad-hoc networks, autonomous nodes with wireless communication equipment form a network without any pre-existing infrastructure, and the functionality of these networks heavily depends on so-called "smart grids" or "smart cities".
Abstract: In mobile ad-hoc networks, autonomous nodes with wireless communication equipment form a network without any pre-existing infrastructure. The functionality of these networks heavily depends on so c ...

48 citations

Proceedings ArticleDOI
07 Nov 2002
TL;DR: The proposed enhanced fuzzy-DSR protocol (EFDSR) supports priority differentiation through its fuzzy engine intake of three routing metrics and improves overall network performance through a special "link state predictive dynamic routing" (LSPDR) technique.
Abstract: A fuzzy-decision-based protocol developed on top of the classical dynamic source routing (DSR) protocol is proposed with support for prioritised service differentiated packet routing and treats all input routing metrics more fairly. The proposed enhanced fuzzy-DSR protocol (EFDSR) supports priority differentiation through its fuzzy engine intake of three routing metrics and improves overall network performance through a special "link state predictive dynamic routing" (LSPDR) technique.

48 citations

Proceedings ArticleDOI
Hai Liu1, Peng-Jun Wan1, Xiaohua Jia1, X. Liu1, F. Frances Yao1 
23 Apr 2006
TL;DR: An efficient flooding algorithm is proposed that achieves the local optimality in two senses: 1) the number of forwarding nodes in each step is the minimal; 2) the time complexity for computing forwarding nodes is the lowest, which is O(nlogn), where n is thenumber of neighbors of a node.
Abstract: Flooding is one of the most fundamental operations in mobile ad hoc networks. Traditional implementation of flooding suffers from the problems of excessive redundancy of messages, resource contention, and signal collision. This causes high protocol overhead and interference to the existing traffic in the networks. Some efficient flooding algorithms were proposed to avoid these problems. However, these algorithms either perform poorly in reducing redundant transmissions, or require each node to maintain 2-hop (or more) neighbors information. In the paper, we study the sufficient and necessary condition of 100% deliverability for flooding schemes that are based on only 1-hop neighbors information. We further propose an efficient flooding algorithm that achieves the local optimality in two senses: 1) the number of forwarding nodes in each step is the minimal; 2) the time complexity for computing forwarding nodes is the lowest, which is O(nlogn), where n is the number of neighbors of a node. Extensive simulations have been conducted and simulation results have shown that performance of our algorithm is significantly better than the existing message efficient flooding methods.

48 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...Most of the major routing protocols, such as DSR [1], AODV [2], ZRP [3], LAR [4], etc., rely on flooding for disseminating route discovery, route maintenance, or topology update packets....

    [...]

  • ...Most of the major routing protocols, such as DSR [1], AODV [2], ZRP [3], LAR [4], etc....

    [...]

Journal ArticleDOI
01 Aug 2012
TL;DR: This analysis shows how wireless channel errors can affect the performance of multimedia sensor networks and how different error control scenarios can be effective for those networks and provides the required insights for efficient design of error control protocols in multimedia communications over WSNs.
Abstract: The emerging multimedia applications of Wireless Sensor Network (WSNs) impose new challenges in design of algorithms and communication protocols for such networks. In the view of these challenges, error control is an important mechanism that enables us to provide robust multimedia communication and maintain Quality of Service (QoS). Despite the existence of some good research works on error control analysis in WSNs, none of them provides a thorough study of error control schemes for multimedia delivery. In this paper, a comprehensive performance evaluation of Automatic Repeat Request (ARQ), Forward Error Correction (FEC), Erasure Coding (EC), link-layer hybrid FEC/ARQ, and cross-layer hybrid error control schemes over Wireless Multimedia Sensor Network (WMSNs) is performed. Performance metrics such as energy efficiency, frame Peak Signal-to-Noise Ratio (PSNR), frame loss rate, cumulative jitter, and delay-constrained PSNR are investigated. The results of our analysis show how wireless channel errors can affect the performance of multimedia sensor networks and how different error control scenarios can be effective for those networks. The results also provide the required insights for efficient design of error control protocols in multimedia communications over WSNs.

48 citations


Cites methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...In our analysis, we study the performance of several error control scenarios in WMSNs, i.e., ARQ, link-layer FEC, erasure coding, link-layer hybrid FEC/ARQ, and cross-layer hybrid schemes....

    [...]

Proceedings ArticleDOI
02 Dec 2013
TL;DR: This paper proposes a mechanism that provides Secure Route Discovery for the AODV protocol (SRD-AODV) in order to prevent black hole attacks and demonstrates an improvement in the ratio of packet delivery for three different environments using the Network Simulator 2 (NS2).
Abstract: Mobile Ad-hoc Networks (MANETs) allow mobile hosts to initiate communications with each other over a network without an established infrastructure or a central network authority. Because of this, MANETs have dynamic topologies because nodes can easily join or leave the network at any time. From a security design perspective, MANETs are vulnerable to various types of malicious attacks. As are result, Ad-hoc On-demand Distance Vector (AODV), which is one of the standard MANET protocols, can be attacked by malicious nodes. A black hole attack is one type of malicious attack that can be easily employed against data routing in MANETs. A black hole node replies to route requests rapidly with the shortest path and the highest destination sequence number. The black hole node does not have an active route to a specified destination associated with it and it drops all of the data packets that it receives. This paper proposes a mechanism that provides Secure Route Discovery for the AODV protocol (SRD-AODV) in order to prevent black hole attacks. This mechanism requires the source node and the destination node to verify the sequence numbers in the Route Request (RREQ) and Route Reply (RREP) messages, respectively, based on defined thresholds before establishing a connection with a destination node for sending the data. The simulation results using the Network Simulator 2 (NS2) demonstrate an improvement in the ratio of packet delivery for three different environments using our mechanism as compared to the standard AODV protocol.

48 citations


Cites background or methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...AODV is a reactive routing protocol [7] that generates the route through a network when a communication begins....

    [...]

  • ...Defining Threshold In the documentation of the standard AODV protocol [7], the minimum (MIN) and maximum (MAX) values for the sequence numbers (SEQ) are based on signed 32-bit arithmetic (2(32))....

    [...]

References
More filters
01 Mar 1997
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Abstract: In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:

3,501 citations

12 Nov 2001
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument. The radiation detectors are gated differently from each other to provide an indication of formation porosity which is substantially independent of the formation salinity. In the preferred embodiment, the electrical signals indicative of radiation detected by the long-spaced detector are gated for almost the entire interval between neutron pulses and the short-spaced signals are gated for a significantly smaller time interval which commences soon after the termination of a given neutron burst. The signals from the two detectors are combined in a ratio circuit for determination of porosity.

574 citations

01 Jan 1998
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA). In order for the IANA to manage a given name space prudently, it needs guidelines describing the conditions under which new values can be assigned. If the IANA is expected to play a role in the management of a name space, the IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a name space and provides guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

536 citations

01 Oct 1998
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).

334 citations

01 Jun 2004
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.
Abstract: There is a need for common definitions of terminology in the work to be done around IP mobility. This document defines terms for mobility related terminology. The document originated out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks. Other working groups dealing with mobility may want to take advantage of this terminology. This memo provides information for the Internet community.

207 citations


"Ad hoc On-Demand Distance Vector (A..." refers methods in this paper

  • ...This section defines other terminology used with AODV that is not already defined in [3]....

    [...]