Bypass routing: An on-demand local recovery protocol for ad hoc networks
read more
Citations
Survey Paper: Routing protocols in ad hoc networks: A survey
A secure ad-hoc routing approach using localized self-healing communities
Bypass AODV: improving performance of ad hoc on-demand distance vector (AODV) routing protocol in wireless ad hoc networks
A Review on Routing in Internet of Things
Survivability strategies in multihop wireless networks [Accepted From Open Call]
References
Ad hoc On-Demand Distance Vector (AODV) Routing
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
A performance comparison of multi-hop wireless ad hoc network routing protocols
A review of current routing protocols for ad hoc mobile wireless networks
Related Papers (5)
Frequently Asked Questions (15)
Q2. What is the purpose of bypass routing?
Bypass routing utilizes a local recovery strategy when caches contain obsolete information, which enables more effective route correction in caches as well as error recovery.
Q3. How do you recover routes from broken links?
Repair with cached routes when available Repair with local error recovery when cached routesare not available Repair all active routes affected by broken links Utilize bandwidth efficiently Utilization of both route caches and local error recovery mechanisms is essential for providing robust recovery in ad hoc networks.
Q4. What is the route recovery technique?
Local error recovery provides more robust route recovery during route failures in mobile environments by allowing a relay node to repair a broken route.
Q5. What is the underlying protocol for DSR?
SLR uses DSR as the underlying protocol, which is an on-demand routing protocol that only establishes routes to destinations for active flows.
Q6. What is the recent proposed protocol?
A recently proposed protocol, CHAMP (Caching and Multipath) [19], uses a salvaging algorithm where all nodes temporarily cache packets before forwarding.
Q7. What is the impact of caching on traffic load?
Although SLR (cache) is able to reduce the unfavorable effects of caching for low traffic loads, as the traffic load increases, there is a degradation in delivery ratio performance.
Q8. How does the node avoid query reply storms?
To avoid query reply storms, the nodes use a random backoff algorithm and send a query reply only if they have not overheard an identical query reply.
Q9. How does SLR perform in the presence of mobility?
As the mobility rate changes, SLR performs similar to first set of experiments with different traffic loads, which10indicates that SLR is successful in localizing the reaction to topological changes.
Q10. What is the effect of a large network on the probability that a route breaks?
in a large network with long routes, the probability that a route breaks increases, increasing the probability that a cached route is stale.
Q11. What is the purpose of MAC caches?
MAC caches are also essential during local recovery, where a node queries its neighbors to see if they have connectivity to any of the downstream nodes on the broken route to the destination.
Q12. How many runs of the same traffic model are used?
Their simulation results represent an average of five runs with identical traffic models, but different randomly generated network topologies.
Q13. What are the characteristics of SLR in the presence of mobility?
The evaluation of delivery ratio, routing overhead and hop length confirm their expectations of SLR’s performance in the presence of mobility.
Q14. What is the process of bypass recovery?
In bypass routing, error recovery proceeds in three stages : 1) salvaging using route caches, 2) bypass recovery, and 3) error reporting (see Figure 3).
Q15. What is the main reason for the low delay in recovery?
SLR reduces the delays due to route discovery while incurring little increased delay from the optimistic route recovery (see Figure 8).