scispace - formally typeset
Search or ask a question

Showing papers on "Wireless ad hoc network published in 2000"


Amin Vahdat1
01 Jan 2000
TL;DR: This work introduces Epidemic Routing, where random pair-wise exchanges of messages among mobile hosts ensure eventual message delivery and achieves eventual delivery of 100% of messages with reasonable aggregate resource consumption in a number of interesting scenarios.
Abstract: Mobile ad hoc routing protocols allow nodes with wireless adaptors to communicate with one another without any pre-existing network infrastructure. Existing ad hoc routing protocols, while robust to rapidly changing network topology, assume the presence of a connected path from source to destination. Given power limitations, the advent of short-range wireless networks, and the wide physical conditions over which ad hoc networks must be deployed, in some scenarios it is likely that this assumption is invalid. In this work, we develop techniques to deliver messages in the case where there is never a connected path from source to destination or when a network partition exists at the time a message is originated. To this end, we introduce Epidemic Routing, where random pair-wise exchanges of messages among mobile hosts ensure eventual message delivery. The goals of Epidemic Routing are to: i) maximize message delivery rate, ii) minimize message latency, and iii) minimize the total resources consumed in message delivery. Through an implementation in the Monarch simulator, we show that Epidemic Routing achieves eventual delivery of 100% of messages with reasonable aggregate resource consumption in a number of interesting scenarios.

4,355 citations


Proceedings ArticleDOI
01 Aug 2000
TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Abstract: This paper describes two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this problem, we propose categorizing nodes based upon their dynamically measured behavior. We use a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes. Through simulation we evaluate watchdog and pathrater using packet throughput, percentage of overhead (routing) transmissions, and the accuracy of misbehaving node detection. When used together in a network with moderate mobility, the two techniques increase throughput by 17% in the presence of 40% misbehaving nodes, while increasing the percentage of overhead transmissions from the standard routing protocol's 9% to 17%. During extreme mobility, watchdog and pathrater can increase network throughput by 27%, while increasing the overhead transmissions from the standard routing protocol's 12% to 24%.

3,747 citations


Journal ArticleDOI
TL;DR: This work reviews localization techniques and evaluates the effectiveness of a very simple connectivity metric method for localization in outdoor environments that makes use of the inherent RF communications capabilities of these devices.
Abstract: Instrumenting the physical world through large networks of wireless sensor nodes, particularly for applications like environmental monitoring of water and soil, requires that these nodes be very small, lightweight, untethered, and unobtrusive. The problem of localization, that is, determining where a given node is physically located in a network, is a challenging one, and yet extremely crucial for many of these applications. Practical considerations such as the small size, form factor, cost and power constraints of nodes preclude the reliance on GPS of all nodes in these networks. We review localization techniques and evaluate the effectiveness of a very simple connectivity metric method for localization in outdoor environments that makes use of the inherent RF communications capabilities of these devices. A fixed number of reference points in the network with overlapping regions of coverage transmit periodic beacon signals. Nodes use a simple connectivity metric, which is more robust to environmental vagaries, to infer proximity to a given subset of these reference points. Nodes localize themselves to the centroid of their proximate reference points. The accuracy of localization is then dependent on the separation distance between two-adjacent reference points and the transmission range of these reference points. Initial experimental results show that the accuracy for 90 percent of our data points is within one-third of the separation distance. However, future work is needed to extend the technique to more cluttered environments.

3,723 citations


Journal ArticleDOI
TL;DR: A suite of algorithms for self-organization of wireless sensor networks in which there is a scalably large number of mainly static nodes with highly constrained energy resources and support slow mobility by a subset of the nodes, energy-efficient routing, and formation of ad hoc subnetworks.
Abstract: We present a suite of algorithms for self-organization of wireless sensor networks in which there is a scalably large number of mainly static nodes with highly constrained energy resources. The protocols further support slow mobility by a subset of the nodes, energy-efficient routing, and formation of ad hoc subnetworks for carrying out cooperative signal processing functions among a set of the nodes.

2,227 citations


Proceedings ArticleDOI
26 Mar 2000
TL;DR: An ad-hoc network of wireless static nodes is considered as it arises in a rapidly deployed, sensor-based, monitoring system and algorithms to select the routes and the corresponding power levels such that the time until the batteries of the nodes drain-out is maximized are proposed.
Abstract: An ad-hoc network of wireless static nodes is considered as it arises in a rapidly deployed, sensor-based, monitoring system. Information is generated in certain nodes and needs to reach a set of designated gateway nodes. Each node may adjust its power within a certain range that determines the set of possible one hop away neighbors. Traffic forwarding through multiple hops is employed when the intended destination is not within immediate reach. The nodes have limited initial amounts of energy that is consumed at different rates depending on the power level and the intended receiver. We propose algorithms to select the routes and the corresponding power levels such that the time until the batteries of the nodes drain-out is maximized. The algorithms are local and amenable to distributed implementation. When there is a single power level, the problem is reduced to a maximum flow problem with node capacities and the algorithms converge to the optimal solution. When there are multiple power levels then the achievable lifetime is close to the optimal (that is computed by linear programming) most of the time. It turns out that in order to maximize the lifetime, the traffic should be routed such that the energy consumption is balanced among the nodes in proportion to their energy reserves, instead of routing to minimize the absolute consumed power.

1,830 citations


Proceedings ArticleDOI
26 Mar 2000
TL;DR: This work considers the problem of adjusting the transmit powers of nodes in a multihop wireless network as a constrained optimization problem with two constraints-connectivity and biconnectivity, and one optimization objective-maximum power used.
Abstract: We consider the problem of adjusting the transmit powers of nodes in a multihop wireless network (also called an ad hoc network) to create a desired topology. We formulate it as a constrained optimization problem with two constraints-connectivity and biconnectivity, and one optimization objective-maximum power used. We present two centralized algorithms for use in static networks, and prove their optimality. For mobile networks, we present two distributed heuristics that adaptively adjust node transmit powers in response to topological changes and attempt to maintain a connected topology using minimum power. We analyze the throughput, delay, and power consumption of our algorithms using a prototype software implementation, an emulation of a power-controllable radio, and a detailed channel model. Our results show that the performance of multihop wireless networks in practice can be substantially increased with topology control.

1,728 citations


Proceedings ArticleDOI
26 Mar 2000
TL;DR: It is demonstrated that even though DSR and AODV share a similar on-demand behavior the differences in the protocol mechanics can lead to significant performance differentials.
Abstract: Ad hoc networks are characterized by multi-hop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the performance of two prominent on-demand routing protocols for mobile ad hoc networks - dynamic source routing (DSR) and ad hoc on-demand distance vector routing (AODV). A detailed simulation model with MAC and physical layer models is used to study inter-layer interactions and their performance implications. We demonstrate that even though DSR and AODV share a similar on-demand behavior the differences in the protocol mechanics can lead to significant performance differentials. The performance differentials are analyzed using varying network load, mobility and network size. Based on the observations, we make recommendations about how the performance of either protocol can be improved.

1,629 citations


Journal ArticleDOI
TL;DR: This paper suggests an approach to utilize location information (for instance, obtained using the global positioning system) to improve performance of routing protocols for ad hoc networks by using location information and presents two algorithms to determine the request zone.
Abstract: A mobile ad hoc network consists of wireless hosts that may move often. Movement of hosts results in a change in routes, requiring some mechanism for determining new routes. Several routing protocols have already been proposed for ad hoc networks. This paper suggests an approach to utilize location information (for instance, obtained using the global positioning system) to improve performance of routing protocols for ad hoc networks. By using location information, the proposed Location‐Aided Routing (LAR) protocols limit the search for a new route to a smaller “request zone” of the ad hoc network. This results in a significant reduction in the number of routing messages. We present two algorithms to determine the request zone, and also suggest potential optimizations to our algorithms.

1,181 citations


Proceedings ArticleDOI
01 Aug 2000
TL;DR: This paper examines the vulnerabilities of a wireless ad-hoc network, the reason why intrusion detection is needed, and the reasons why the current methods cannot be applied directly, and describes the new intrusion detection and response mechanisms that are developing for wirelessAd-Hoc networks.
Abstract: As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a fixed wired network are not applicable in this new environment. How to do it differently and effectively is a challenging research problem. In this paper, we first examine the vulnerabilities of a wireless ad-hoc network, the reason why we need intrusion detection, and the reason why the current methods cannot be applied directly. We then describe the new intrusion detection and response mechanisms that we are developing for wireless ad-hoc networks.

1,126 citations


Proceedings ArticleDOI
26 Mar 2000
TL;DR: A heuristic to form d-clusters in a wireless ad hoc network that tends to re-elect existing clusterheads even when the network configuration changes and has a tendency to evenly distribute the mobile nodes among the clusterheads, and evently distribute the responsibility of acting as clusterheads among all nodes.
Abstract: An ad hoc network may be logically represented as a set of clusters. The clusterheads form a d-hop dominating set. Each node is at most d hops from a clusterhead. Clusterheads form a virtual backbone and may be used to route packets for nodes in their cluster. Previous heuristics restricted themselves to 1-hop clusters. We show that the minimum d-hop dominating set problem is NP-complete. Then we present a heuristic to form d-clusters in a wireless ad hoc network. Nodes are assumed to have a non-deterministic mobility pattern. Clusters are formed by diffusing node identities along the wireless links. When the heuristic terminates, a node either becomes a clusterhead, or is at most d wireless hops away from its clusterhead. The value of d is a parameter of the heuristic. The heuristic can be run either at regular intervals, or whenever the network configuration changes. One of the features of the heuristic is that it tends to re-elect existing clusterheads even when the network configuration changes. This helps to reduce the communication overheads during transition from old clusterheads to new clusterheads. Also, there is a tendency to evenly distribute the mobile nodes among the clusterheads, and evently distribute the responsibility of acting as clusterheads among all nodes. Thus, the heuristic is fair and stable. Simulation experiments demonstrate that the proposed heuristic is better than the two earlier heuristics, namely the LCA and degree-based solutions.

1,029 citations


Proceedings ArticleDOI
26 Mar 2000
TL;DR: This paper attempts to design new MAC protocols suitable for ad hoc networks based on directional antennas, such as the IEEE 802.11 standard, which do not benefit when using directional antennas because they have been designed for omnidirectional antennas.
Abstract: Using directional antennas can be beneficial for wireless ad hoc networks consisting of a collection of wireless hosts. To best utilize directional antennas, a suitable medium access control (MAC) protocol must be designed. Current MAC protocols, such as the IEEE 802.11 standard, do not benefit when using directional antennas, because these protocols have been designed for omnidirectional antennas. In this paper, we attempt to design new MAC protocols suitable for ad hoc networks based on directional antennas.

Proceedings ArticleDOI
26 Mar 2000
TL;DR: A new architecture, multihop cellular network (MCN), for wireless communications that preserves the benefit of conventional single-hop cellular networks and incorporates the flexibility of ad-hoc networks, which can reduce the required number of bases or improve the throughput performance, while limiting path vulnerability encountered in ad-Hoc networks.
Abstract: This work presents a new architecture, multihop cellular network (MCN), for wireless communications. MCN preserves the benefit of conventional single-hop cellular networks (SCN) where the service infrastructure is constructed by fixed bases, and it also incorporates the flexibility of ad-hoc networks where wireless transmission through mobile stations in multiple hops is allowed. MCN can reduce the required number of bases or improve the throughput performance, while limiting path vulnerability encountered in ad-hoc networks. In addition, MCN and SCN are analyzed, in terms of mean hop count, hop-by-hop throughput, end-to-end throughput, and mean number of channels (i.e. simultaneous transmissions) under different traffic localities and transmission ranges. Numerical results demonstrate that the throughput of MCN exceeds that of SCN, the former also increases as the transmission range decreases. The above results can be accounted for by the different orders, linear and square, at which the mean hop count and mean number of channels increase, respectively.

Proceedings ArticleDOI
23 Sep 2000
TL;DR: This work proposes a scheme to improve existing on-demand routing protocols by creating a mesh and providing multiple alternate routes to the Ad-hoc On-Demand Distance Vector protocol and evaluates the performance improvements by simulation.
Abstract: Nodes in mobile ad hoc networks communicate with one another via packet radios on wireless multihop links. Because of node mobility and power limitations, the network topology changes frequently. Routing protocols therefore play an important role in mobile multihop network communications. A trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category, however, use a single route and do not utilize multiple alternate paths. We propose a scheme to improve existing on-demand routing protocols by creating a mesh and providing multiple alternate routes. Our algorithm establishes the mesh and multipaths without transmitting any extra control message. We apply our scheme to the Ad-hoc On-Demand Distance Vector (AODV) protocol and evaluate the performance improvements by simulation.

Proceedings ArticleDOI
18 Jun 2000
TL;DR: FSR introduces the notion of multi-level fisheye scope to reduce routing update overhead in large networks and is presented as a simple, efficient and scalable routing solution in a mobile, ad hoc environment.
Abstract: This paper presents a novel routing protocol for wireless ad hoc networks-fisheye state routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce routing update overhead in large networks. Nodes exchange link state entries with their neighbors with a frequency which depends on distance to destination. From link state entries, nodes construct the topology map of the entire network and compute optimal routes. Simulation experiments show that FSR is a simple, efficient and scalable routing solution in a mobile, ad hoc environment.

Proceedings ArticleDOI
20 Nov 2000
TL;DR: This work presents a secure mechanism to stimulate end users to keep their devices turned on, to refrain from overloading the network, and to thwart tampering aimed at converting the device into a "selfish" one.
Abstract: In this paper, we address the problem of service availability in mobile ad-hoc WANs. We present a secure mechanism to stimulate end users to keep their devices turned on, to refrain from overloading the network, and to thwart tampering aimed at converting the device into a "selfish" one. Our solution is based on the application of a tamper resistant security module in each device and cryptographic protection of messages.

Proceedings ArticleDOI
26 Mar 2000
TL;DR: This study simulates a set of representative wireless ad hoc multicast protocols and evaluates them in various network scenarios, finding the relative strengths, weaknesses, and applicability of each multicast protocol to diverse situations.
Abstract: In this paper we investigate the performance of multicast routing protocols in wireless mobile ad hoc networks. An ad hoc network is composed of mobile nodes without the presence of a wired support infrastructure. In this environment, routing/multicasting protocols are faced with the challenge of producing multihop routes under host mobility and bandwidth constraints. In recent years, a number of new multicast protocols of different styles have been proposed for ad hoc networks. However, systematic performance evaluations and comparative analysis of these protocols in a common realistic environment has not yet been performed. In this study, we simulate a set of representative wireless ad hoc multicast protocols and evaluate them in various network scenarios. The relative strengths, weaknesses, and applicability of each multicast protocol to diverse situations are studied and discussed.

Proceedings ArticleDOI
23 Sep 2000
TL;DR: A medium access control (MAC) protocol for an ad hoc network of mobile wireless terminals that are equipped with multiple directional antennas and results obtained from detailed computer simulations demonstrate the performance improvement obtained with the proposed scheme.
Abstract: We propose a medium access control (MAC) protocol for an ad hoc network of mobile wireless terminals that are equipped with multiple directional antennas. Use of directional antennas in ad hoc networks can largely reduce the radio interference, thereby improving the packet throughput. However, the main problem of using directional antennas in such networks is due to the dynamic nature of the network caused by frequent node movements. This gives rise to problems such as locating and tracking during random channel access. The MAC protocol presented in this paper proposes a solution to these problems without the help of additional hardware. Results obtained from detailed computer simulations demonstrate the performance improvement obtained with the proposed scheme.

01 Jan 2000
TL;DR: The authors describe the concept of ad hoc networking by giving its background and presenting some of the technical challenges it poses, and point out some the applications that can bevisioned for ad hoc networks.
Abstract: Today, many people carry numerous portable devices, such as laptops,mobile phones, PDAs and mp3 players, for use in their professional andprivate lives. For the most part, these devices are used separatelyNthatis, their applications do not interact. Imagine, however, if they could inter-act directly: participants at a meeting could share documents or presenta-tions; business cards would automatically find their way into the addressregister on a laptop and the number register on a mobile phone; as com-muters exit a train, their laptops could remain online; likewise, incoming e-mail could now be diverted to their PDAs; finally, as they enter the office,all communication could automatically be routed through the wirelesscorporate campus network.These examples of spontaneous, ad hoc wireless communicationbetween devices might be loosely defined as a scheme, often referred toas ad hoc networking, which allows devices to establish communication,anytime and anywhere without the aid of a central infrastructure. Actually,ad hoc networking as such is not new, but the setting, usage and playersare. In the past, the notion of ad hoc networks was often associated withcommunication on combat fields and at the site of a disaster area; now,as novel technologies such as Bluetooth materialize, the scenario of adhoc networking is likely to change, as is its importance.In this article, the authors describe the concept of ad hoc networkingby giving its background and presenting some of the technical challengesit poses. The authors also point out some of the applications that can beenvisioned for ad hoc networking

Proceedings ArticleDOI
11 Aug 2000
TL;DR: After it is pointed out that constructing minimum cost multicast tree is hard, two new flooding methods are proposed, self pruning and dominant pruning, which utilize neighbor information to reduce redundant transmissions.
Abstract: In an ad hoc network, each host assumes the role of a router and relays packets toward final destinations. This paper studies efficient routing mechanisms for multicast and broadcast in ad hoc wireless networks. Because a packet is broadcast to all neighboring nodes, the optimality criteria of wireless network routing is different from that of wired network routing. In this paper, we point out that the number of packet forwarding is the more important cost factor than the number of links in the ad hoc network. After we show constructing minimum cost multicast tree is hard, we propose two new flooding methods, self pruning and dominant pruning. Both methods utilize neighbor information to reduce redundant transmissions. Performance analysis shows that both methods perform significantly better than blind flooding. Especially, dominant pruning performs close to the practically achievable best performance limit.

Proceedings ArticleDOI
20 Nov 2000
TL;DR: The impact of route coupling on APR's delay performance in ad-hoc networks is demonstrated and it is found that route coupling is so severe in single channel networks that APR provides only negligible improvements in quality of service.
Abstract: Alternate path routing (APR) can provide load balancing and route failure protection by distributing traffic among a set of diverse paths. These benefits make APR appear to be an ideal candidate for the bandwidth limited and mobile ad-hoc networks. However, we find that APR's potential is not fully realized in ad-hoc networks because of route coupling resulting from the geographic proximity of candidate paths between common endpoints. In multiple channel networks, coupling occurs when paths share common intermediate nodes. The coupling problem is much more serious in single channel networks, where coupling also occurs where one path crosses the radio coverage area of another path, The network's inherent route coupling is further aggravated by the routing protocol, which may provide an incomplete view of current network connectivity. Through analysis and simulation, we demonstrate the impact of route coupling on APR's delay performance in ad-hoc networks. In multiple channel environments, APR is able to provide a 20% reduction in end-to-end delay for bursty data streams. Though these gains are appreciable, they are about half what we would expect from APR with independently operating routes. Route coupling is so severe in single channel networks that APR provides only negligible improvements in quality of service.

Journal ArticleDOI
TL;DR: This paper considers a problem: a group of people in a meeting room do not have access to public key infrastructure or third party key management service, and they do not share any other prior electronic context, and how can they set up a secure session among their computers?

Proceedings ArticleDOI
01 Aug 2000
TL;DR: Two new leader election algorithms for mobile ad hoc networks that ensure that eventually each connected component of the topology graph has exactly one leader are presented.
Abstract: We present two new leader election algorithms for mobile ad hoc networks. The algorithms ensure that eventually each connected component of the topology graph has exactly one leader. The algorithms are based on a routing algorithm called TORA [5], which in turn is based on an algorithm by Gafni and Bertsekas [3]. The algorithm require nodes to communicate with only their current neighbors, making it well suited to the ad hoc environment. The first algorithm is for a single topology change and is provided with a proof of correctness. The second algorithm tolerates multiple concurrent topology changes.

Proceedings ArticleDOI
07 Nov 2000
TL;DR: This power management approach would help in reducing the system power consumption and hence prolonging the battery life of mobile nodes and improves the end-to-end network throughput as compared to other ad-hoc networks in which all mobile nodes use the same transmit power.
Abstract: We introduce the notion of power management within the context of wireless ad-hoc networks. More specifically, we investigate the effects of using different transmit powers on the average power consumption and end-to-end network throughput in a wireless ad-hoc environment. This power management approach would help in reducing the system power consumption and hence prolonging the battery life of mobile nodes. Furthermore, it improves the end-to-end network throughput as compared to other ad-hoc networks in which all mobile nodes use the same transmit power. The improvement is due to the achievement of a tradeoff between minimizing interference ranges, reduction in the average number of hops to reach a destination, reducing the probability of having isolated clusters, and reducing the average number of transmissions (including retransmissions due to collisions). The protocols would first dynamically determine an optimal connectivity range wherein they adapt their transmit powers so as to only reach a subset of the nodes in the network. The connectivity range would then be dynamically changed in a distributed manner so as to achieve the near optimal throughput. Minimal power routing is used to further enhance performance. Simulation studies are carried out in order to investigate these design approaches. It is seen a network with such a power managed scheme would achieve a better end-to-end throughput performance (about 10% improvement with a slotted aloha MAC protocol) and lower transmit power (about an 80% Improvement) than a network without such a scheme.

Proceedings ArticleDOI
01 Aug 2000
TL;DR: A set of new mobility metrics are defined that allow accurate characterization of the relative difficulty that a given movement scenario presents to an ad hoc network routing protocol, and each mobility metric's ability to predict the actual difficulty in terms of routing overhead experienced by the routing protocol across the scenarios in this study is analyzed.
Abstract: An on-demand routing protocol for wireless and hoc networks is one that searches for and attempts to discover a route to some destination node only when a sending node originates a data packet addressed to that node. In order to avoid the need for such a route discovery to be performed before each data packet is sent, such routing protocols must cache routes previously discovered. This paper presents an analysis of the effects of different design choices for this caching in on-demand routing protocols in wireless ad hoc networks, dividing the problem into choices of cache structure, cache capacity, and cache timeout. Our analysis is based on the Dynamic Source Routing protocol (DSR), which operates entirely on-demand. Using detailed simulations of wireless ad hoc networks of 50 mobile nodes, we studied a large number of different caching algorithms that utilize a range of design choices, and simulated each cache primarily over a set of 50 different movement scenarios drawn from 5 different types of mobility models. We also define a set of new mobility metrics that allow accurate characterization of the relative difficulty that a given movement scenario presents to an ad hoc network routing protocol, and we analyze each mobility metric's ability to predict the actual difficulty in terms of routing overhead experienced by the routing protocol across the scenarios in our study.



Proceedings ArticleDOI
Qun Li1, Daniela Rus1
01 Aug 2000
TL;DR: This paper develops algorithms that minimize the trajectory modifications under two different assumptions: (a) the movements of all the nodes in the system are known and (b) the Moves of the hosts in the System are not known.
Abstract: An ad-hoc network is formed by a group of mobile hosts upon a wireless network interface. Previous research in this area has concentrated on routing algorithms which are designed for fully connected networks. The usual way to deal with a disconnected ad-hoc network is to let the mobile computer wait for network reconnection passively, which may lead to unacceptable transmission delays. In this paper, we propose an approach that guarantees message transmission in minimal time. In this approach, mobile hosts actively modify their trajectories to transmit messages. We develop algorithms that minimize the trajectory modifications under two different assumptions: (a) the movements of all the nodes in the system are known and (b) the movements of the hosts in the system are not known.

Patent
01 Dec 2000
TL;DR: In this article, the reverse-path forwarding is used to broadcast each update along the minimum-hop-path tree rooted at the source of the update, where each path tree has the source node as a root node, a parent node and zero or more children nodes.
Abstract: Described is a link-state routing protocol used in a mobile ad hoc network or in an Internet for disseminating topology and link-state information throughout the network. Reverse-path forwarding is used to broadcast each update along the minimum-hop-path tree rooted at the source of the update. Each path tree has the source node as a root node, a parent node, and zero or more children nodes. Updates are received from the parent node in the path tree for the source node that originates the update. Each update includes information related to a link in the network. A determination is made whether to forward the update message to children nodes, if any, in the path tree maintained for the source node originating the update in response to information in the received update. This information itself can indicate whether the update is to be forwarded to other nodes.

Proceedings ArticleDOI
20 Nov 2000
TL;DR: MIPMANET provides Internet access by using mobile IP with foreign agent care-of addresses and reverse tunneling and shows that the ability to choose the closest access point to the Internet is worth extra work, as less traffic is generated in the network resulting in lower delays and fewer dropped packets.
Abstract: Mobile ad hoc networking allows nodes to form temporary networks and communicate beyond the transmitter range by supporting multihop communication through IP routing. Routing in such networks is often reactive, i.e., performed on-demand, as opposed to Internet routing that is proactive. As ad hoc networks are formed on a temporary basis, any IP address should be allowed to appear in an ad hoc network. This paper presents MIPMANET, a solution for connecting an ad hoc network, in which on-demand routing is used, to the Internet. MIPMANET provides Internet access by using mobile IP with foreign agent care-of addresses and reverse tunneling. This allows nodes to enjoy the mobility services of mobile IP while at the same time the requirements on the ad hoc routing protocol are kept to a minimum. Simulations of MIPMANET have been performed in the Network Simulator 2. The ad hoc on-demand distance vector (AODV) routing protocol has been used for routing within the ad hoc network. These simulations show that the ability to choose the closest access point to the Internet is worth extra work, as less traffic is generated in the network resulting in lower delays and fewer dropped packets.

Patent
01 Dec 2000
TL;DR: In this article, the authors describe an internetworking system having various mobile ad hoc extensions to the Internet that are particularly suited to the dynamic environment of mobile ad-hoc networks, including a queuing mechanism that can update information upon resuming interrupted communications between nodes, and dynamic network measurement techniques for adaptively using wireless bandwidth when establishing and maintaining connections between nodes and a server.
Abstract: Described is an internetworking system having various mobile ad hoc extensions to the Internet that are particularly suited to the dynamic environment of mobile ad hoc networks. The internetworking system includes any combination of a link-state routing protocol for disseminating topology and link-state information over a multi-hop network comprised of nodes, a neighbor discovery protocol that can detect the appearance and disappearance of new neighbor nodes, an address format that facilitates deployment of IPv6 nodes in a predominantly IPv4 network infrastructure, a queuing mechanism that can update information upon resuming interrupted communications between nodes, and dynamic network measurement techniques for adaptively using wireless bandwidth when establishing and maintaining connections between nodes and a server.