Open Access
Ad hoc On-Demand Distance Vector (AODV) Routing
Charles E. Perkins,Elizabeth M. Belding-Royer,Samir R. Das +2 more
- Vol. 3561, pp 1-37
TLDR
A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.Abstract:
The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.read more
Citations
More filters
Journal ArticleDOI
The IEEE 802.11s Extended Service Set Mesh Networking Standard
Joseph Camp,Edward W. Knightly +1 more
TL;DR: How the initial 802.11s standard addresses key factors for standardization of two-tier wireless mesh networks is described and discussed, including efficient allocation of mesh resources at the routing and MAC layers.
Journal ArticleDOI
In-Network Outlier Detection in Wireless Sensor Networks
TL;DR: This work develops an approach that is flexible with respect to the outlier definition, computes the result in-network to reduce both bandwidth and energy consumption, uses only single-hop communication, thus permitting very simple node failure detection and message reliability assurance mechanisms, and seamlessly accommodates dynamic updates to data.
Proceedings ArticleDOI
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
Peng Ning,Kun Sun +1 more
TL;DR: A systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example, identifies a number of attack goals and studies how to achieve these goals through misuses of the routing messages.
Proceedings ArticleDOI
Exploiting path diversity in the link layer in wireless ad hoc networks
Shweta Jain,Samir R. Das +1 more
TL;DR: An anycast mechanism at the link layer for wireless ad hoc networks that chooses the best next hop to forward packets when multiple next hop choices are available and performs significantly better than 802.11 in terms of packet delivery.
Journal ArticleDOI
DCAR: Distributed Coding-Aware Routing in Wireless Networks
TL;DR: DCAR, the distributed coding-aware routing mechanism which enables the discovery for available paths between a given source and destination and the detection for potential network coding opportunities over much wider network region, is proposed and implemented.
References
More filters
Key words for use in RFCs to Indicate Requirement Levels
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Ad hoc On-Demand Distance Vector (AODV) Routing for IP version 6
E.M. Royer,Charles E. Perkins +1 more
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Guidelines for Writing an IANA Considerations Section in RFCs Status of this Memo This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements. Distribution of this memo is unlimited.
T. Narten,H. Alvestrand +1 more
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Guidelines for Writing an IANA Considerations Section in RFCs
Thomas Narten,H. Alvestrand +1 more
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Mobility Related Terminology
Markku Kojo,Jukka Manner +1 more
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.