scispace - formally typeset
Open Access

Ad hoc On-Demand Distance Vector (AODV) Routing

TLDR
A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract
The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks

TL;DR: This paper develops an effective method called wormhole attack prevention (WAP) without using specialized hardware that not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during the route discovery phase.
Book

Wireless Mesh Networks: Architectures and Protocols

TL;DR: This paper presents end-to-End Design Principles for Broadband Cellular Mesh Networks and multiple Antenna Techniques for Wireless Mesh Networks, as well as some of the challenges faced in designing these systems.
Proceedings ArticleDOI

Performance Analysis of MANET Routing Protocols in the Presence of Self-Similar Traffic

TL;DR: Evaluating the performance of three well-known and widely investigated MANET routing protocols in the presence of bursty self-similar traffic indicates that DSR routing protocol performs well with bursty traffic models compared to AODV and OLSR in terms of delivery ratio, throughput and end-to-end delay.
Proceedings ArticleDOI

Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach

TL;DR: The performance of multi-path routing under wormhole attack is studied in detail and a simple scheme based on statistical analysis (called SAM) is proposed to detect such attacks and to identify malicious nodes.
Journal ArticleDOI

A survey of routing and data dissemination in Delay Tolerant Networks

TL;DR: The relation between message replication and individual or group communication semantics of DTN routing protocols considering both social-based and opportunistic message forwarding techniques are studied and an in-depth coverage of data dissemination protocols in DTN is introduced which can be adapted to content-centric networking domains.
References
More filters

Key words for use in RFCs to Indicate Requirement Levels

S. Bradner
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.

Ad hoc On-Demand Distance Vector (AODV) Routing for IP version 6

TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.

Guidelines for Writing an IANA Considerations Section in RFCs Status of this Memo This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements. Distribution of this memo is unlimited.

T. Narten, +1 more
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

Guidelines for Writing an IANA Considerations Section in RFCs

TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.

Mobility Related Terminology

Markku Kojo, +1 more
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.