scispace - formally typeset
Search or ask a question

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

Content maybe subject to copyright    Report

Citations
More filters
Journal Article•DOI•
TL;DR: The need for further research for effective utilization of WSN technique and application of new advanced techniques for efficient monitoring of underground coal mines are explored in this paper.

131 citations

01 Jan 2002
TL;DR: In this paper, the authors proposed a new model to calculate interference levels in wireless multi-hop ad-hoc networks, which uses a regular lattice for possible locations of mobile nodes, without having detailed information about movement patterns and exact location of all nodes at any moment.
Abstract: In this paper we propose a new model to calculate interference levels in wireless multi-hop ad-hoc networks. This model computes the expected value of Carrier to Interference ratio (C/I) by taking into account the number of nodes, density of nodes, radio propagation aspects, multi-hop characteristics of the network, and the amount of relay traffic. Our model uses a regular lattice for possible locations of mobile nodes. This enables us to calculate the expected values of C/I , without having detailed information about movement patterns and exact location of all nodes at any moment. Based on this model we have evaluated effects of variations in the network size, network density and traffic load on C/I , and consequently throughput of the network. Our calculations suggest that interference is upper-bounded in wireless ad-hoc networks that use carrier sensing for medium access. Further, our calculations indicate that in large networks traffic increase due to routing overhead does not have a significant impact on network throughput.

131 citations

Journal Article•DOI•
TL;DR: The authors discuss several issues related to integrating the mobile Internet protocol with Manets, including how to incorporate the flexibility of mobile ad hoc networks into traditional IEEE 802.11-based access points.
Abstract: Extending traditional IEEE 802.11-based access points to incorporate the flexibility of mobile ad hoc networks would help make the dream of ubiquitous broadband wireless access a reality. The authors discuss several issues related to integrating the mobile Internet protocol with Manets.

131 citations

Proceedings Article•DOI•
09 Oct 2006
TL;DR: A quorum-based location service provides position of mobile destination to source node to enable geo-routing and both search and update quorums are extended by face routing which traverses outer network boundary.
Abstract: Location service provides position of mobile destination to source node to enable geo-routing. Previous location service protocols suffer from partial flooding overhead, and/or location failures in group movement scenarios. To overcome those deficiencies, we propose a quorum-based location service. The basic idea is that destination node registers its location along a `column' to form an update quorum. Source node makes a query along a `row' to form a search quorum. The destination location is found at the intersection between the update and search quorums. Four strategies are proposed to adjust the quorum system. To guarantee the success of location retrieval, both search and update quorums are extended by face routing which traverses outer network boundary.

131 citations

Journal Article•DOI•
TL;DR: This paper presents UAV classification, communication and application architectures, and an exhaustive survey of the existing routing protocols for flying ad hoc networks, and highlights the key features, strengths and weaknesses, and different mobility models used for the performance evaluation of theexisting FANET routing protocols.
Abstract: The use of unmanned aerial vehicles (UAVs) is attracting considerable interest in academic research, commercial, and military applications. Multi-UAV systems organized in an ad hoc fashion called a flying ad hoc network (FANET) can cooperatively and collaboratively accomplish complex missions more efficiently compared to single large UAV systems. However, the unique features of FANETs such as high mobility, low node density, and high frequency of topology changes introduce challenges to the communication design, especially routing. Thus, the routing requirements of FANETs surpass those of MANETs or VANETs. In this paper, we present UAV classification, communication and application architectures, and an exhaustive survey of the existing routing protocols for flying ad hoc networks. Furthermore, we highlight the key features, strengths and weaknesses, and different mobility models used for the performance evaluation of the existing FANET routing protocols. More importantly, a proposed taxonomy and a review on the existing FANET routing protocols are presented. Finally, we highlight the existing challenges and open research issues.

130 citations


Cites methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...used in DOLSR can decrease the MPR sets and consequently lower the end-to-end delay compared to ad hoc on demand distance vector (AODV) [110] and OLSR....

    [...]

References
More filters
01 Mar 1997
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Abstract: In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:

3,501 citations

12 Nov 2001
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument. The radiation detectors are gated differently from each other to provide an indication of formation porosity which is substantially independent of the formation salinity. In the preferred embodiment, the electrical signals indicative of radiation detected by the long-spaced detector are gated for almost the entire interval between neutron pulses and the short-spaced signals are gated for a significantly smaller time interval which commences soon after the termination of a given neutron burst. The signals from the two detectors are combined in a ratio circuit for determination of porosity.

574 citations

01 Jan 1998
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA). In order for the IANA to manage a given name space prudently, it needs guidelines describing the conditions under which new values can be assigned. If the IANA is expected to play a role in the management of a name space, the IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a name space and provides guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

536 citations

01 Oct 1998
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).

334 citations

01 Jun 2004
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.
Abstract: There is a need for common definitions of terminology in the work to be done around IP mobility. This document defines terms for mobility related terminology. The document originated out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks. Other working groups dealing with mobility may want to take advantage of this terminology. This memo provides information for the Internet community.

207 citations


"Ad hoc On-Demand Distance Vector (A..." refers methods in this paper

  • ...This section defines other terminology used with AODV that is not already defined in [3]....

    [...]