scispace - formally typeset
Open Access

Ad hoc On-Demand Distance Vector (AODV) Routing

TLDR
A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract
The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems

TL;DR: This paper examines the contribution of the IDPSs in the SG paradigm, providing an analysis of 37 cases and identifies the limitations and the shortcomings of the current IDPS systems, whereas appropriate recommendations are provided for future research efforts.
Dissertation

Analysis and design of quality link metrics for routing protocols in Wireless Networks

Nadeem Javaid
TL;DR: A new quality link metric, Interference and Bandwidth Adjusted ETX (IBETX) is proposed and implemented, keeping in view the issues of WMhNs, increasing demands of users and capabilities of routing protocols, and it succeeds to reduce average end-to-end delay up to 16% less than Expected Link Performance (ELP) and 24% lessthan ETX.
Proceedings ArticleDOI

LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks

TL;DR: This paper presents LHAP a scalable and light-weight authentication protocol for ad hoc networks based on hop-by-hop authentication for verifying the authenticity of all the packets transmitted in the network and one-way key chain and TESLA for packet authentication and for reducing the overhead for establishing trust among nodes.
Proceedings Article

Connected Domination in Multihop Ad Hoc Wireless Networks

TL;DR: This study proposes a distributed approximation algorithm with performance ratio at most 8.5, which is the best (time and message efficient) distributed algorithm known so far.
Journal ArticleDOI

Hierarchical routing in ad hoc mobile networks

TL;DR: The Adaptive Routing using Clusters protocol is presented, a protocol that creates a cluster hierarchy composed of cluster leaders and gateway nodes to interconnect clusters and introduces a new algorithm for cluster leader revocation that eliminates the ripple effect caused by leadership changes.
References
More filters

Key words for use in RFCs to Indicate Requirement Levels

S. Bradner
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.

Ad hoc On-Demand Distance Vector (AODV) Routing for IP version 6

TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.

Guidelines for Writing an IANA Considerations Section in RFCs Status of this Memo This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements. Distribution of this memo is unlimited.

T. Narten, +1 more
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

Guidelines for Writing an IANA Considerations Section in RFCs

TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.

Mobility Related Terminology

Markku Kojo, +1 more
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.