Mobile Ad Hoc Networking 2004
DOI: 10.1002/0471656895.ch10
|View full text |Cite
|
Sign up to set email alerts
|

Routing Approaches in Mobile AD HOC Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0
1

Year Published

2009
2009
2015
2015

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 67 publications
(32 citation statements)
references
References 8 publications
0
31
0
1
Order By: Relevance
“…The source node through the route discovery process usually initiates the route requested. Once a route has been established, it is maintained until either the destination becomes inaccessible (along every path from the source), or until the route is no longer used, or expired [5,6 ]. REACTIVE ROUTING PROTOCOLS:-These protocols depart from the legacy Internet approach.…”
Section: IIImentioning
confidence: 99%
“…The source node through the route discovery process usually initiates the route requested. Once a route has been established, it is maintained until either the destination becomes inaccessible (along every path from the source), or until the route is no longer used, or expired [5,6 ]. REACTIVE ROUTING PROTOCOLS:-These protocols depart from the legacy Internet approach.…”
Section: IIImentioning
confidence: 99%
“…The AODV routing protocol belongs to the class of on-demand routing strategies [26,27]: a route is created at the time a source needs to reach a destination. In order to locate the destination node, the source broadcasts a route request (RREQ) message all over the network.…”
Section: Simulation-based Analysismentioning
confidence: 99%
“…It adopts a so-called ''store-carry-forward'' paradigm -a node receives a packet buffers and carries that packet as it moves, passing the packet on to new nodes that it encounters. Being analogous to the spread of infectious diseases, each time a packet-carrying node encounters a node that does not have a copy of that packet, the carrier is said to infect this new node by passing on a packet copy; newly infected nodes, in turn, behave similarly [10] [11].…”
Section: Introductionmentioning
confidence: 99%