scispace - formally typeset
Search or ask a question

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI
31 Mar 2008
TL;DR: A modification on AODV as MANET routing protocol to make it adaptive for VANET, which has used direction as most important parameter to select next hop during a route discovery phase.
Abstract: VANET is new generation of ad hoc networks that implement between vehicles on a road. Because of high mobility, routing in VANET has more problems than MANET. Thereby, in this paper we propose a modification on AODV as MANET routing protocol to make it adaptive for VANET. When a node is mobile, it has three mobility parameters: position, direction and speed. In our method, we have used direction as most important parameter to select next hop during a route discovery phase. With respect to mobility model, if nodes has same direction with source and/or destination nodes, our solution might selects them as a next hop. Position is another parameter that we used for next hop selection.

119 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...There are many routing protocols for ad hoc networks [9], [10], [11]....

    [...]

01 Jan 2003
TL;DR: This paper addresses the problem of routing in large-scale mobile ad-hoc networks (MANETs), both in terms of number of nodes and coverage area and proposes to run a routing protocol based on mobile agents and inspired from social insects behaviour.
Abstract: In this paper, we address the problem of routing in large-scale mobile ad-hoc networks (MANETs), both in terms of number of nodes and coverage area. Our approach aims at abstracting from the dynamic, irregular topology of a MANET to obtain a topology with “logical routers” and “logical links”, where logical router and logical links are just a collection of nodes and (multihop) paths between them, respectively. To “build” these logical routers, nodes geographically close to each other are grouped together. Logical links are established between selected logical routers. On top of this abstract topology, we propose to run a routing protocol based on mobile agents and inspired from social insects behaviour.

118 citations

Proceedings Article
01 Jan 2003
TL;DR: This work proposes cooperative tracking as a method for tracking moving objects and extrapolating their paths in the short term by combining data from neighboring sensors, and employs statistical estimation and approximation techniques to further increase the tracking precision.
Abstract: We present a novel method for tracking the movement of people or vehicles in open outdoor environments using sensor networks. Unlike other sensor network-based methods, which depend on determining distance to the target or the angle of arrival of the signal, our cooperative tracking approach requires only that a sensor be able to determine if an object is somewhere within the maximum detection range of the sensor. We propose cooperative tracking as a method for tracking moving objects and extrapolating their paths in the short term. By combining data from neighboring sensors, this approach enables tracking with a resolution higher than that of the individual sensors being used. We employ statistical estimation and approximation techniques to further increase the tracking precision, and to enable the system to exploit the tradeoff between accuracy and timeliness of the results. We analyze the behavior of the cooperative tracking algorithm through simulation, focusing on the effects of approximation techniques on the quality of estimates achieved. This work focuses on acoustic tracking, however the presented methodology is applicable to any sensing modality where the sensing range is relatively

118 citations


Cites methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...Several routing algorithms for ad hoc wireless networks have been developed, e.g. DSDV [10] and AODV [ 9 ]....

    [...]

  • ...We base our assumptions about the capabilities of networked sensors on the Mica mote hardware and the TinyOS software [ 3 ]....

    [...]

  • ...The TinyOS 0.6.1 operating system [ 3 ] provides the application programmer interface to the hardware....

    [...]

Journal ArticleDOI
TL;DR: This study surveys the existing position-based routing protocols and characterised the vehicular network environment, namely the urban and the highway environments, and characterises the main constrains to urban and highway environments.

117 citations


Cites methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...Contents lists available at SciVerse ScienceDirect Journal of Network and Computer Applications 1084-80 http://d n Corr E-m teresa.v Pleas Journ journal homepage: www.elsevier.com/locate/jnca Applicability of position-based routing for VANET in highways and urban environment António Fonseca n, Teresa Vaz~ao INESC-ID/Instituto Superior Técnico – Av. Prof. Dr. Anibal Cavaco Silva, 2744-016 Porto Salvo, Portugal a r t i c l e i n f o Article history: Received 13 July 2011 Received in revised form 20 February 2012 Accepted 14 March 2012 Keywords: Vehicular ad-hoc networks Position-based routing Urban Highway Survey 45/$ - see front matter & 2012 Elsevier Ltd....

    [...]

  • ...When there is no vehicle available in the selected road, it tries to select another vehicle outside that road using greedy forwarding instead of using Please cite this article as: Fonseca A, Vaz~ao T. Applicability of positio Journal of Network and Computer Applications (2012), http://dx.do one of the described recovery strategies....

    [...]

  • ...2 The cell is determined based on the wireless transmission range of vehicles. if ( n A N: Distance (n, D) r Distance (R, D) then {Greedy forwarding} nextHop¼Min_Distance(N, D) Forward (p, nextHop) Return else {Local-maximum occurs, use right-hand rule} nextHop¼Right_Hand_Rule(N) Forward (p, nextHop) Return end if Please cite this article as: Fonseca A, Vaz~ao T. Applicability of positio Journal of Network and Computer Applications (2012), http://dx.do...

    [...]

  • ...In this section we summarise them and evaluate their performance characteristics, considering the following metrics: Tab Per P P F R P Jo Overhead – that represents the amount of control information needed to support the strategy. le 2 formance comparison of the strategies. rotocol phase Strategy Overhead ath Selection No path selection None Full path using Dijkstra High Next junction Low orwarding Greedy forwarding Low Greedy along the path Low or High (path) Restricted greedy Low Improved greedy Low ecovery Right-hand rule Low Carry-and-forward None Path recalculation None lease cite this article as: Fonseca A, Vaz~ao T. Applicability of positio urnal of Network and Computer Applications (2012), http://dx.do Av Low Low Me Un Un Un Un Un Hig Low n-b i.or Availability – that states the amount of time the VANET is usable and assesses whether or not there are connectivity problems that are not properly addressed by the strategy....

    [...]

  • ...F azao@ist.utl.pt (T. Vaz~ao). e cite this article as: Fonseca A, Vaz~a al of Network and Computer Applic a b s t r a c t In the last years many routing protocols proposals have been made considering the particular VANET characteristics....

    [...]

Proceedings ArticleDOI
31 Jan 2005
TL;DR: The design and implementation of PEG is described, a networked system of distributed sensor nodes that detects an uncooperative agent called the evader and assists an autonomous robot called the pursuer in capturing the evaders.
Abstract: We describe the design and implementation of PEG, a networked system of distributed sensor nodes that detects an uncooperative agent called the evader and assists an autonomous robot called the pursuer in capturing the evader. PEG requires services such as leader election, routing, network aggregation, and closed loop control. Instead of using general purpose distributed system solutions for these services, we employ whole-system analysis and rely on spatial and physical properties to create simple and efficient mechanisms. We believe this approach advances sensor network design, yielding pragmatic solutions that leverage physical properties to simplify design of embedded distributed systems. We deployed PEG on a 400 square meter field using 100 sensor nodes, and successfully intercepted the evader in all runs. While implementing PEG, we confronted practical issues such as node breakage, packaging decisions, in situ debugging, network reprogramming, and system reconfiguration. We discuss the approaches we took to cope with these issues and share our experiences in deploying a large sensor network system.

117 citations


Cites methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...One design approach is to treat the entire network and the mobile pursuers as one ad-hoc mobile system, and deploy wellknown mobile routing algorithms such as DSR, AODV, and TORA [15, 23, 20] to provide an any-to-any routing service....

    [...]

  • ...This approach of flooding the network and routing using the reversed paths is used in adhoc routing algorithms such as AODV [23] and DSR [15] to build a topology quickly and trade off optimality for handling mobility....

    [...]

References
More filters
01 Mar 1997
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Abstract: In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:

3,501 citations

12 Nov 2001
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument. The radiation detectors are gated differently from each other to provide an indication of formation porosity which is substantially independent of the formation salinity. In the preferred embodiment, the electrical signals indicative of radiation detected by the long-spaced detector are gated for almost the entire interval between neutron pulses and the short-spaced signals are gated for a significantly smaller time interval which commences soon after the termination of a given neutron burst. The signals from the two detectors are combined in a ratio circuit for determination of porosity.

574 citations

01 Jan 1998
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA). In order for the IANA to manage a given name space prudently, it needs guidelines describing the conditions under which new values can be assigned. If the IANA is expected to play a role in the management of a name space, the IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a name space and provides guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

536 citations

01 Oct 1998
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).

334 citations

01 Jun 2004
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.
Abstract: There is a need for common definitions of terminology in the work to be done around IP mobility. This document defines terms for mobility related terminology. The document originated out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks. Other working groups dealing with mobility may want to take advantage of this terminology. This memo provides information for the Internet community.

207 citations


"Ad hoc On-Demand Distance Vector (A..." refers methods in this paper

  • ...This section defines other terminology used with AODV that is not already defined in [3]....

    [...]