Open Access
Ad hoc On-Demand Distance Vector (AODV) Routing
Charles E. Perkins,Elizabeth M. Belding-Royer,Samir R. Das +2 more
- Vol. 3561, pp 1-37
TLDR
A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.Abstract:
The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.read more
Citations
More filters
Proceedings ArticleDOI
WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks
TL;DR: This paper develops an effective method called wormhole attack prevention (WAP) without using specialized hardware that not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during the route discovery phase.
Book
Wireless Mesh Networks: Architectures and Protocols
Ekram Hossain,Kin K. Leung +1 more
TL;DR: This paper presents end-to-End Design Principles for Broadband Cellular Mesh Networks and multiple Antenna Techniques for Wireless Mesh Networks, as well as some of the challenges faced in designing these systems.
Proceedings ArticleDOI
Performance Analysis of MANET Routing Protocols in the Presence of Self-Similar Traffic
TL;DR: Evaluating the performance of three well-known and widely investigated MANET routing protocols in the presence of bursty self-similar traffic indicates that DSR routing protocol performs well with bursty traffic models compared to AODV and OLSR in terms of delivery ratio, throughput and end-to-end delay.
Proceedings ArticleDOI
Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach
N. Song,Lijun Qian,Xiangfang Li +2 more
TL;DR: The performance of multi-path routing under wormhole attack is studied in detail and a simple scheme based on statistical analysis (called SAM) is proposed to detect such attacks and to identify malicious nodes.
Journal ArticleDOI
A survey of routing and data dissemination in Delay Tolerant Networks
TL;DR: The relation between message replication and individual or group communication semantics of DTN routing protocols considering both social-based and opportunistic message forwarding techniques are studied and an in-depth coverage of data dissemination protocols in DTN is introduced which can be adapted to content-centric networking domains.
References
More filters
Key words for use in RFCs to Indicate Requirement Levels
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Ad hoc On-Demand Distance Vector (AODV) Routing for IP version 6
E.M. Royer,Charles E. Perkins +1 more
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Guidelines for Writing an IANA Considerations Section in RFCs Status of this Memo This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements. Distribution of this memo is unlimited.
T. Narten,H. Alvestrand +1 more
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Guidelines for Writing an IANA Considerations Section in RFCs
Thomas Narten,H. Alvestrand +1 more
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Mobility Related Terminology
Markku Kojo,Jukka Manner +1 more
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.