scispace - formally typeset
Search or ask a question

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

Content maybe subject to copyright    Report

Citations
More filters
Proceedings Article•DOI•
04 Apr 2005
TL;DR: The authors presented a modeling and simulation framework for WSNs in J-Sim - an open-source, component-based compositional network simulation environment that is developed entirely in Java that provides an object-oriented definition of target, sensor and sink nodes and physical media.
Abstract: Wireless sensor networks (WSNs) have gained considerable attention in the past few years. As such, there has been an increasing need for defining and developing simulation frameworks for carrying out high-fidelity WSN simulation. In this paper, the authors presented a modeling and simulation framework for WSNs in J-Sim - an open-source, component-based compositional network simulation environment that is developed entirely in Java. This framework is built upon the autonomous component architecture (ACA) and the extensible internetworking framework (INET) of J-Sim, and provides an object-oriented definition of (i) target, sensor and sink nodes, (ii) sensor and wireless communication channels, and (iii) physical media such as seismic channels, mobility model and power model (both energy-producing and energy-consuming components). Application-specific models can be defined by sub-classing classes in the simulation framework and customizing their behaviors. The use of the proposed WSN simulation framework was demonstrated by implementing several well-known localization, geographic routing, and directed diffusion protocols. In addition, performance comparisons were performed (in terms of execution time incurred, and the memory used) in simulating several typical WSN scenarios in J-Sim and ns-2. The simulation study indicates that the proposed WSN simulation framework in J-Sim is much more scalable than ns-2 (especially in memory usage).

149 citations

Proceedings Article•DOI•
Lei Wang1, Yantai Shu1, Miao Dong1, Lianfang Zhang1, Oliver W. W. Yang2 •
11 Jun 2001
TL;DR: The simulation results show that the proposed multipath routing protocol, MSR, improves the packet delivery ratio and the throughput of TCP and UDP, and reduces the end-to-end delay and the average queue size, while adding little overhead.
Abstract: In this paper, we propose a new multipath routing protocol for ad hoc wireless networks-multipath source routing (MSR), which is an extension of DSR (dynamic source routing). Based on the measurement of RTT, we propose a scheme to distribute load among multiple paths. The simulation results show that our approach improves the packet delivery ratio and the throughput of TCP and UDP, and reduces the end-to-end delay and the average queue size, while adding little overhead. As a result, MSR decreases the network congestion and increases the path fault tolerance quite well.

148 citations

Proceedings Article•DOI•
01 Sep 2008
TL;DR: A directional flooding-based routing protocol, called DFR, which relies on a packet flooding technique to increase the reliability and addresses a well-known void problem by allowing at least one node to participate in forwarding a packet.
Abstract: Unlike terrestrial sensor networks, underwater sensor networks (UWSNs) have different characteristics such as a long propagation delay, a narrow bandwidth and high packet loss. Hence, existing path setup-based routing protocols proposed for terrestrial sensor networks are not applicable in the underwater environment. For example, they take much time when establishing a path between source and destination nodes due to the long propagation delay. In addition, the path establishment requires much overhead of control messages. Moreover, the dynamic and high packet loss degrades reliability, which invokes more retransmissions. Even though exiting routing protocols such as VBF were proposed to improve the reliability, they did not take into account the link quality. That is, there is no guarantee that packets reach the sink safely especially when a link is error-prone. In this paper, we therefore propose a directional flooding-based routing protocol, called DFR. Basically, DFR relies on a packet flooding technique to increase the reliability. However, the number of nodes which flood a packet is controlled in order to prevent a packet from flooding over the whole network and the nodes to forward the packet are decided according to the link quality. In addition, DFR also addresses a well-known void problem by allowing at least one node to participate in forwarding a packet. Our simulation study using ns-2 proves that DFR is more suitable for UWSNs especially when links are prone to packet loss.

148 citations

Journal Article•DOI•
TL;DR: The paper discuses a broad range of research issues such as Routing, Medium Access, Multicasting, Quality of service, TCP performance, Energy, Security and Bluetooth, outlining the major challenges which have to be solved before widespread deployment of the technology is possible.
Abstract: This paper presents a coherent survey on ad hoc wireless networks, with the intent of serving as a quick reference to the current research issues in ad hoc networking. It starts with a background on the origin and development stages of ad hoc network, then summaries the characteristics, capabilities, applications and design constraints of ad hoc network fully distinguishing it from traditional networks. The paper discuses a broad range of research issues such as Routing, Medium Access, Multicasting, Quality of service, TCP performance, Energy, Security and Bluetooth, outlining the major challenges which have to be solved before widespread deployment of the technology is possible. Through this survey it would be seen that Ad ho c Networking presence an interesting research area inheriting the problems of wireless and mobile communications in their most difficult form.

146 citations

Proceedings Article•DOI•
06 Jun 2005
TL;DR: The design and the implementation of an Overlay MAC Layer (OML), that works on top of the 802.11 MAC layer, are presented and it is shown that OML can not only provide better flexibility but also improve the fairness, throughput and predictability of802.11 networks.
Abstract: The widespread availability of 802.11-based hardware has made it the premier choice of both researchers and practitioners for developing new wireless networks and applications. However, the ever increasing set of demands posed by these applications is stretching the 802.11 MAC protocol beyond its intended capabilities. For example, 802.11 provides no control over allocation of resources, and the default allocation policy is ill-suited for heterogeneous environments and multi-hop networks. Fairness problems are further exacerbated in multi-hop networks due to link asymmetry and hidden terminals. In this paper, we take a first step towards addressing these problems without replacing the MAC layer by presenting the design and the implementation of an Overlay MAC Layer (OML), that works on top of the 802.11 MAC layer. OML uses loosely-synchronized clocks to divide the time in to equal size slots, and employs a distributed algorithm to allocate these slots among competing nodes. We have implemented OML in both a simulator and on a wireless testbed using the Click modular router. Our evaluation shows that OML can not only provide better flexibility but also improve the fairness, throughput and predictability of 802.11 networks.

146 citations

References
More filters
01 Mar 1997
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Abstract: In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:

3,501 citations

12 Nov 2001
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument. The radiation detectors are gated differently from each other to provide an indication of formation porosity which is substantially independent of the formation salinity. In the preferred embodiment, the electrical signals indicative of radiation detected by the long-spaced detector are gated for almost the entire interval between neutron pulses and the short-spaced signals are gated for a significantly smaller time interval which commences soon after the termination of a given neutron burst. The signals from the two detectors are combined in a ratio circuit for determination of porosity.

574 citations

01 Jan 1998
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA). In order for the IANA to manage a given name space prudently, it needs guidelines describing the conditions under which new values can be assigned. If the IANA is expected to play a role in the management of a name space, the IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a name space and provides guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

536 citations

01 Oct 1998
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).

334 citations

01 Jun 2004
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.
Abstract: There is a need for common definitions of terminology in the work to be done around IP mobility. This document defines terms for mobility related terminology. The document originated out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks. Other working groups dealing with mobility may want to take advantage of this terminology. This memo provides information for the Internet community.

207 citations


"Ad hoc On-Demand Distance Vector (A..." refers methods in this paper

  • ...This section defines other terminology used with AODV that is not already defined in [3]....

    [...]