scispace - formally typeset
Open Access

The dynamic source routing protocol for mobile ad-hoc networks

J. Broach
Reads0
Chats0
About
The article was published on 1998-01-01 and is currently open access. It has received 1501 citations till now. The article focuses on the topics: Optimized Link State Routing Protocol & Ad hoc wireless distribution service.

read more

Citations
More filters
Journal ArticleDOI

Performance evaluation of a discovery and scheduling protocol for multihop ad hoc mobile grids

TL;DR: This paper proposes the integration of resource discovery and scheduling for mobile ad hoc grids into a single protocol called DICHOTOMY (Discovery and sCHeduling prOTOcol for MobilitY), which allows computational tasks to be distributed appropriately in a mobile ad ad hoc grid, while mitigating the overhead of discovery messages exchanged among the nodes.

Relying on Safe Distance to Ensure Consistent Group Membership in Ad Hoc Networks

TL;DR: This paper proposes a protocol that allows hosts within communication range to maintain a consistent view of the group membership despite movement and frequent disconnections and relies on location information and a conservative notion of logical connectivity that creates the illusion of announced disconnection.
Proceedings ArticleDOI

Investigating Power Aware AODV for Efficient Power Routing in MANETs

TL;DR: This paper proposes and investigates a power-aware ad hoc on-demand distance vector routing protocol (PAW-AODV) for efficient power routing in a mobile ad hoc network.
Proceedings ArticleDOI

Characteristics of mobility models for mobile ad hoc networks

TL;DR: This research points out most of the characteristic that could differentiate those mobility models that could be used in the simulation of mobile ad hoc network protocol.
Proceedings ArticleDOI

A Security Architecture for Multihop Mobile Ad hoc Networks With Mobile Agents

TL;DR: This work is an attempt to resolve two fundamental and flaming security vulnerabilities in these multihop MANETs: the identification of a malicious node(s) and design of a robust security model that could be implemented, even in a hostile environment in the presence of a number of non-colluding nodes.