scispace - formally typeset
Search or ask a question

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

Content maybe subject to copyright    Report

Citations
More filters
01 Jan 2009
TL;DR: It is suggested that AODV routing protocol can be used under high mobility since it outperforms DSDV, TORA and DSR protocols.
Abstract: ††† Summary Ad Hoc Networks are multi - hop wireless networks with dynamically changing network connectivity owing to mobility. The protocol suite includes several routing protocols specifically designed for ad-hoc routing. The conventional routing protocols such as shortest-path routing algorithms are not particularly well suited for operation in ad-hoc networking environment. The most widely used ad hoc routing protocols are Ad-hoc On-Demand Distance Vector Routing (AODV), Destination Sequenced Distance Vector (DSDV), Dynamic Source Routing (DSR) and Temporally - Ordered Routing Algorithm (TORA). In this paper, the three random based mobility models such as Random waypoint, Random walk and Random Directions were implemented. The two different parameter constraints like packet-delivery fraction and End-toend packet delivery delay are compared with respect to mobility speed, Traffic and Network size. The simulation results shows that the AODV protocols in Random Waypoint mobility model performs better than DSDV, TORA and DSR in Random walk and random Direction mobility model. . Based on the observations, it is to suggest that AODV routing protocol can be used under high mobility since it outperforms DSDV, TORA and DSR protocols.

105 citations


Cites background or methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...Also the usage of fresh route information and quickly adapting nature of AODV are reasons for better results produced by AODV....

    [...]

  • ...Th is concept was proposed by Perkins & Royer [4], Nesargi & Prakash [11]....

    [...]

  • ...Th is concept was proposed by Perkins & Royer [4], Nesargi & Prakash [11]....

    [...]

  • ...We have compared AODV and DSDV against four different mobility models....

    [...]

  • ...Index Terms— MANETs, Mobility Models, AODV, DSDV I. Introduction A mobile ad hoc network is a co llect ion of wireless stations called nodes which are free to move and communicate with each other in the absence of any fixed infrastructure [1, 33]....

    [...]

Book ChapterDOI
01 Jan 2003
TL;DR: In this study, the virtual backbone is approximated by a minimum connected dominating set (MCDS) and a distributed algorithm which computes a small CDS is proposed which performs well in simulation results and theoretical analysis.
Abstract: Ad hoc wireless network is featured by a dynamic topology There is no fixed infrastructure as compared with wired network Every host can move to any direction at any speed This characteristic puts special challenges in routing protocol design Most existing well-known routing protocols use flooding for route construction But, flooding suffers from the notorious broadcast storm problem which causes excessive redundancy, contention and collision in the network One solution to overcome this problem is to compute a virtual backbone based on the physical topology, and run any existing routing protocol over the virtual backbone In our study, the virtual backbone is approximated by a minimum connected dominating set (MCDS) We propose a distributed algorithm which computes a small CDS The performance of our algorithm is witnessed by simulation results and theoretical analysis

105 citations

Proceedings ArticleDOI
01 Oct 2007
TL;DR: Preliminary results that show that the DTN approach outperforms traditional end-to-end approaches across a wide range of network disruption are presented.
Abstract: DARPA's Disruption-Tolerant Networking (DTN) program is developing technologies that enable access to information when stable end-to-end paths do not exist and network infrastructure access cannot be assured. DTN technology makes use of persistence within network nodes, along with the opportunistic use of mobility, to overcome disruptions to connectivity. In this paper, we describe the SPINDLE Disruption-Tolerant Networking system and related technology being developed at BBN under the DTN program. Using an open-source, standards-based core with a plugin architecture and well-specified interfaces, we enable independent development and insertion of innovative DoD-relevant technology while allowing the core system to be refined and engineered within a COTS context. SPINDLE technology innovations include: (i) routing algorithms that work efficiently across a wide range of network disruption, (ii) a name-management architecture for DTNs that supports progressive resolution of intentional name attributes within the network (not at the source), including support for "queries as names" and name-scheme translation, (iii) distributed caching, indexing, and retrieval approaches for disruption-tolerant content-based (rather than locator-based) access to information, and (iv) a declarative knowledge-based approach that integrates routing, intentional naming, policy-based resource management, and content-based access to information. We present preliminary results that show that the DTN approach outperforms traditional end-to-end approaches across a wide range of network disruption.

105 citations


Cites methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...The implementation of these interfaces is now publicly available as part of the DTNRG reference implementation....

    [...]

Patent
04 Mar 2005
TL;DR: In this article, a TDMA based neighbor discovery protocol is proposed, where each network node is assigned a unique time slot to broadcast neighbor discovery packets or messages, and a primary controller node is dynamically designated to perform the time slot assignments.
Abstract: An Ad-Hoc wireless network according to the present invention employs a TDMA based neighbor discovery protocol, where each network node is assigned a unique time slot to broadcast neighbor discovery packets or messages A primary controller node is dynamically designated to perform the time slot assignments A dynamic selection of a secondary or backup controller node is further provided in case of failure of the primary controller node The present invention further includes flooding techniques based upon TDMA A TDMA HELLO flood is used to distribute a small number of common parameters to network nodes by placing or piggybacking the information within the neighbor discovery messages A CNR flood is based on the principles of a RAKE type receiver and used to distribute time slot assignments to the entire network

104 citations

Proceedings ArticleDOI
06 Nov 2002
TL;DR: The proposed MPR-HR protocol is based on the concept of multipoint relaying (MPR) to minimize flooding traffic and provides higher efficiency in terms of routing overhead compared to AODV one of the most efficient routing protocols released for mobile ad-hoc networks.
Abstract: This paper describes the design and performance of a routing protocol for mobile ad-hoc networks. Our routing protocol is named "hybrid routing" in that it attempts to take advantage of both proactive and reactive approaches. The protocol is based on the concept of multipoint relaying (MPR) to minimize flooding traffic. For most applications over mobile ad-hoc networks, it is expected that a major portion of communication will be done in the two-hop region. Therefore, when a node needs a route to a destination in the two-hop region, it consults with the routing table as the proactive approach to find the route directly. Outside this region, on the other hand, it discovers a route on demand as the reactive approach through the use of MPR flooding. The proposed protocol has been validated using the ns network simulator with wireless and mobility extensions. The simulation results show that our MPR-HR protocol provides higher efficiency in terms of routing overhead compared to AODV one of the most efficient routing protocols released for mobile ad-hoc networks.

104 citations


Cites background or methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...Figure 5 presents the routing overhead in packets as a function of mobility for our proposed MPR-HR protocol versus AODV....

    [...]

  • ...The ad-hoc on-demand distance vector (AODV) algorithm [10] is an improvement of DSDV in that it tries to minimize routing overhead by creating a route on demand as a reactive approach, as opposed to maintaining an entire list of routes for all nodes in the network as a proactive approach in DSDV....

    [...]

  • ...We measure the following four performance parameters to evaluate our MPR-HR protocol in comparison with AODV....

    [...]

  • ...In conclusion, AODV has been selected to be a final player for comparison study because it is known as one of efficient routing protocols, especially when the link-level feedback is used for link breakage detection instead of periodic hello messages [1]....

    [...]

  • ...The average Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 02) 0742-1303/02 $17.00 © 2002 IEEE end-to-end delay of MPR-HR is about 12 ms, a little less than 13 ms of AODV....

    [...]

References
More filters
01 Mar 1997
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Abstract: In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:

3,501 citations

12 Nov 2001
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument. The radiation detectors are gated differently from each other to provide an indication of formation porosity which is substantially independent of the formation salinity. In the preferred embodiment, the electrical signals indicative of radiation detected by the long-spaced detector are gated for almost the entire interval between neutron pulses and the short-spaced signals are gated for a significantly smaller time interval which commences soon after the termination of a given neutron burst. The signals from the two detectors are combined in a ratio circuit for determination of porosity.

574 citations

01 Jan 1998
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA). In order for the IANA to manage a given name space prudently, it needs guidelines describing the conditions under which new values can be assigned. If the IANA is expected to play a role in the management of a name space, the IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a name space and provides guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

536 citations

01 Oct 1998
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).

334 citations

01 Jun 2004
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.
Abstract: There is a need for common definitions of terminology in the work to be done around IP mobility. This document defines terms for mobility related terminology. The document originated out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks. Other working groups dealing with mobility may want to take advantage of this terminology. This memo provides information for the Internet community.

207 citations


"Ad hoc On-Demand Distance Vector (A..." refers methods in this paper

  • ...This section defines other terminology used with AODV that is not already defined in [3]....

    [...]