2007
DOI: 10.3844/jcssp.2007.218.222
|View full text |Cite
|
Sign up to set email alerts
|

Utilization of AODV in Wireless Ad Hoc Networks

Abstract: AODV is a mature and widely accepted routing protocol for Mobile Ad hoc Networks (MANET), it has low processing and memory overhead and low network utilization, and works well even in high mobility situation. We modified AODV to use these dominating sets, resulting in the AODV-DS protocol. Our contribution in addressing the fragility of a minimum connected dominating set in the presence of mobility and cross-traffic. We develop three heuristics to fortify the dominating set process against loss by re-introduci… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…To check the links state, AODV uses control messages (Hello) between direct neighbours. Besides, AODV utilizes a sequence number to avoid a round trip and to ensure using the most recent routes (Alfawaer and Hua, 2007).…”
Section: Dynamic Source Routing (Dsr)mentioning
confidence: 99%
“…To check the links state, AODV uses control messages (Hello) between direct neighbours. Besides, AODV utilizes a sequence number to avoid a round trip and to ensure using the most recent routes (Alfawaer and Hua, 2007).…”
Section: Dynamic Source Routing (Dsr)mentioning
confidence: 99%
“…Ondemand routing protocols are efficient for routing in large ad hoc networks (Hanapi et al, 2009) because they maintain the routes that are currently needed, initiating a path discovery process whenever a route is needed for message transfer. AODV (Pirzada et al, 2006;Alfawaer et al, 2007b) and DSR (Pirzada et al, 2006;Koul et al, 2008) are two prominent ad hoc routing protocols that have used this approach. In DSR, the routing table at the nodes caches the next hop router information for a destination and use it as long as the next hop router remains active (originates or relays at least one packet for that destination within a specified time-out period).…”
Section: Double Hash Algorithmmentioning
confidence: 99%
“…This may occur in deployments in which sensors in one area of interest are requested to gather and transmit data at a higher rate than In this case, routing dynamics can lead to congestion on specific paths. These paths are usually close to each other, which lead to an entire zone in the network facing congestion (Alfawaer et al, 2007;Hull et al, 2004;Sharieh et al, 2008). We refer to this zone, essentially an extended hotspot, as the congestion zone.…”
Section: Introductionmentioning
confidence: 99%