• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Highly dynamic destination-sequenced distance-vector (DSDV) routing for mobile computers (1994)

by C E Perkins, P Bhagwat
Venue:In “Proc. of ACM SIGCOMM
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 2,078
Next 10 →

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

by Josh Broch, David A. Maltz, David B. Johnson, Yih-chun Hu, Jorjeta Jetcheva , 1998
"... An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Due to the limited transmission range of wireless network interfaces, multiple network "hops " ma ..."
Abstract - Cited by 1819 (25 self) - Add to MetaCart
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Due to the limited transmission range of wireless network interfaces, multiple network "hops " may be needed for one node to exchange data with another across the network. In recent years, a variety of new routing protocols targeted specifically at this environment have been developed, but little performance information on each protocol and no realistic performance comparison between them is available. This paper presents the results of a detailed packet-level simulation comparing four multi-hop wireless ad hoc network routing protocols that cover a range of design choices: DSDV, TORA, DSR, and AODV. We have extended the ns-2 network simulator to accurately model the MAC and physical-layer behavior of the IEEE 802.11 wireless LAN standard, including a realistic wireless transmission channel model, and present the results of simulations of networks of 50 mobile nodes. 1
(Show Context)

Citation Context

... a variety of multi-hop wireless ad hoc network routing protocols. We present results of detailed simulations showing the relative performance of four recently proposed ad hoc routing protocols: DSDV =-=[18]-=-, TORA [14, 15], DSR [9, 10, 2], and AODV [17]. To enable these simulations, we extended the ns-2 network simulator [6] to include: Node mobility. A realistic physical layer including a radio propagat...

A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks

by Elizabeth M. Royer, Chai-Keong Toh
"... An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. In order to facilitate communication within the network, a routing protocol is used to discove ..."
Abstract - Cited by 1311 (3 self) - Add to MetaCart
An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an ad-hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines routing protocols for ad-hoc networks and evaluates these protocols based on a given set of parameters. The paper provides an overview of eight different protocols by presenting their characteristics and functionality, and then provides a comparison and discussion of their respective merits and drawbacks.
(Show Context)

Citation Context

...s some of the existing table-driven ad-hoc routing protocols. 2.1.1 Destination-Sequenced Distance-Vector Routing (DSDV) The Destination-Sequenced Distance-Vector Routing protocol (DSDV) described in =-=[17]-=- is a tabledriven algorithm based on the classical Bellman-Ford routing mechanism [7]. The improvements made to the Bellman-Ford algorithm include freedom from loops in routing tables. Every mobile no...

An application-specific protocol architecture for wireless networks

by Wendi Beth Heinzelman , 2000
"... ..."
Abstract - Cited by 1288 (19 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...roaches have been incorporated into wireless networks using minor modi cations, resulting in destination-sequenced distance vector (DSDV) and ad hoc on-demand distance vector (AODV) routing protocols =-=[72, 71]-=-. However, there are problems with using these routing approaches in wireless networks. The periodic messages needed to maintain valid routes may not only congest the network, they may also drain the ...

Next century challenges: Scalable coordination in sensor networks

by Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar , 1999
"... Networked sensors-those that coordinate amongst them-selves to achieve a larger sensing task-will revolutionize information gathering and processing both in urban environments and in inhospitable terrain. The sheer numbers of these sensors and the expected dynamics in these environments present uniq ..."
Abstract - Cited by 1116 (37 self) - Add to MetaCart
Networked sensors-those that coordinate amongst them-selves to achieve a larger sensing task-will revolutionize information gathering and processing both in urban environments and in inhospitable terrain. The sheer numbers of these sensors and the expected dynamics in these environments present unique challenges in the design of unattended autonomous sensor networks. These challenges lead us to hypothesize that sensor network coordination applications may need to be structured differently from traditional net-work applications. In particular, we believe that localized algorithms (in which simple local node behavior achieves a desired global objective) may be necessary for sensor net-work coordination. In this paper, we describe localized algorithms, and then discuss directed diffusion, a simple com-unication model for describing localized algorithms.
(Show Context)

Citation Context

...d in today's Internet. Instead, we expect the routing function in a sensor network to be tightly integrated with the application. Applications will use a combination of proactive and reactive schemes =-=[9, 10, 11, 12, 13, 14]-=- to achieve energy-efficient communication. 5 Related Work Several projects have already demonstrated the feasibility of low power integrated sensors [1, 15, 16, 17] and MEMSbased microsensors [18]. D...

A High-Throughput Path Metric for Multi-Hop Wireless Routing

by Douglas S. J. De Couto, Daniel Aguayo, John Bicket, Robert Morris , 2003
"... This paper presents the expected transmission count metric (ETX), which finds high-throughput paths on multi-hop wireless networks. ETX minimizes the expected total number of packet transmissions (including retransmissions) required to successfully deliver a packet to the ultimate destination. The E ..."
Abstract - Cited by 1108 (5 self) - Add to MetaCart
This paper presents the expected transmission count metric (ETX), which finds high-throughput paths on multi-hop wireless networks. ETX minimizes the expected total number of packet transmissions (including retransmissions) required to successfully deliver a packet to the ultimate destination. The ETX metric incorporates the effects of link loss ratios, asymmetry in the loss ratios between the two directions of each link, and interference among the successive links of a path. In contrast, the minimum hop-count metric chooses arbitrarily among the different paths of the same minimum length, regardless of the often large differences in throughput among those paths, and ignoring the possibility that a longer path might offer higher throughput. This
(Show Context)

Citation Context

...-hop wireless networks, Ad hoc networks, rooftop networks, wireless routing, route metrics, 802.11, DSR, DSDV 1. Introduction Much of the recent work in ad hoc routing protocols for wireless networks =-=[24,14,25]-=- has focused on coping with mobile nodes, rapidly changing topologies, and scalability. Less attention has been paid to finding high-quality paths in the face of lossy wireless links. This paper prese...

A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks

by Vincent D. Park, M. Scott Corson , 1997
"... We present a new distributed routing protocol for mobile, multihop, wireless networks. The protocol is one of a family of protocols which we term "link reversal" algorithms. The protocol's reaction is structured as a temporally-ordered sequence of diffusing computations; each computat ..."
Abstract - Cited by 1100 (6 self) - Add to MetaCart
We present a new distributed routing protocol for mobile, multihop, wireless networks. The protocol is one of a family of protocols which we term "link reversal" algorithms. The protocol's reaction is structured as a temporally-ordered sequence of diffusing computations; each computation consisting of a sequence of directed l i nk reversals. The protocol is highly adaptive, efficient and scalable; being best-suited for use in large, dense, mobile networks. In these networks, the protocol's reaction to link failures typically involves only a localized "single pass" of the distributed algorithm. This capability is unique among protocols which are stable in the face of network partitions, and results in the protocol's high degree of adaptivity. This desirable behavior is achieved through the novel use of a "physical or logical clock" to establish the "temporal order" of topological change events which is used to structure (or order) the algorithm's reaction to topological changes. We refer to the protocol as the Temporally-Ordered Routing Algorithm (TORA).
(Show Context)

Citation Context

... this environment include the following: the GafniBertsekas (GB) algorithms [10], the Lightweight Mobile Routing (LMR) protocol [11], the Destination-Sequenced Distance Vector (DSDV) routing protocol =-=[12]-=-, the Wireless Routing Protocol (WRP) [13], and the Dynamic Source Routing (DSR) protocol [14]. While these algorithms are better suited for this environment, each has its drawbacks. The GB algorithms...

SPINS: Security Protocols for Sensor Networks

by Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar , 2001
"... As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. We design a suite of security building blocks that are optimized ..."
Abstract - Cited by 1094 (30 self) - Add to MetaCart
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. We design a suite of security building blocks that are optimized for resource-constrained environments and wireless communication. SPINS has two secure building blocks: SNEP and TESLA. SNEP provides the following important baseline security primitives: Data con£dentiality, two-party data authentication, and data freshness. A particularly hard problem is to provide efficient broad-cast authentication, which is an important mechanism for sensor networks. TESLA is a new protocol which provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimalistic hardware: The performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.

Mitigating routing misbehavior in mobile ad hoc networks

by Sergio Marti, T. J. Giuli, Kevin Lai, Mary Baker - Proc. ACM/IEEE MOBICOM , 2000
"... This paper describes two techniques that improve through-put in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this prob-lem, we propose categorizing nodes based upon their dynam-ically measured behavior. We use a watchdog that identifies misb ..."
Abstract - Cited by 1090 (4 self) - Add to MetaCart
This paper describes two techniques that improve through-put in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this prob-lem, we propose categorizing nodes based upon their dynam-ically measured behavior. We use a watchdog that identifies misbehaving nodes and a patl~rater that helps routing pro-tocols avoid these nodes. Through simulation we evaluate watchdog and pathrater using packet throughput, percent-age of overhead (routing) transmissions, and the accuracy of misbehaving node detection. When used together in a net-work with moderate mobility, the two techniques increase throughput by 17 % in the presence of 40 % misbehaving nodes, while increasing the percentage ofoverhead transmis-sions from the standard routing protocol's 9 % to 17%. Dur-ing extreme mobility, watchdog and pathrater can increase network throughput by 27%, while increasing the overhead transmissions from the standard routing protocol's 12 % to 24%. 1.
(Show Context)

Citation Context

...his would add signi- cant complexity to protocols whose behavior must be very well dened. In fact, current versions of mature ad hoc routing algorithms, including DSR [12], AODV [7], TORA [5], DSDV [1=-=9]-=-, STAR [9], and others [16] only detect if the receiver's network interface is accepting packets, but they otherwise assume that routing nodes do not misbehave. Although trusting all nodes to be well ...

Geography-informed Energy Conservation for Ad Hoc Routing

by Ya Xu, John Heidemann, Deborah Estrin - ACM MOBICOM , 2001
"... We introduce a geographical adaptive fidelity (GAF) algorithm that reduces energy consumption in ad hoc wireless networks. GAF conserves energy by identifying nodes that are equivalent from a routing perspective and then turning off unnecessary nodes, keeping a constant level of routing fidelity. GA ..."
Abstract - Cited by 1045 (21 self) - Add to MetaCart
We introduce a geographical adaptive fidelity (GAF) algorithm that reduces energy consumption in ad hoc wireless networks. GAF conserves energy by identifying nodes that are equivalent from a routing perspective and then turning off unnecessary nodes, keeping a constant level of routing fidelity. GAF moderates this policy using application- and system-level information; nodes that source or sink data remain on and intermediate nodes monitor and balance energy use. GAF is independent of the underlying ad hoc routing protocol; we simulate GAF over unmodified AODV and DSR. Analysis and simulation studies of GAF show that it can consume 40% to 60% less energy than an unmodified ad hoc routing protocol. Moreover, simulations of GAF suggest that network lifetime increases proportionally to node density; in one example, a four-fold increase in node density leads to network lifetime increase for 3 to 6 times (depending on the mobility pattern). More generally, GAF is an example of adaptive fidelity, a technique proposed for extending the lifetime of self-configuring systems by exploiting redundancy to conserve energy while maintaining application fidelity.
(Show Context)

Citation Context

...r DARPA contract DABT63-99-1-0011. To appear in the Proceedings of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking(ACM Mobicom), July 16-21, 2001, Rome, Italy. =-=[22, 4, 23, 21]-=-. Traditionally these protocol are evaluated in terms of packet loss rates, routing message overhead, and route length [5, 15, 10]. Since ad hoc networks will often be deployed using battery-powered n...

Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks

by Benjie Chen, Kyle Jamieson, Hari Balakrishnan, Robert Morris - ACM Wireless Networks Journal , 2001
"... ..."
Abstract - Cited by 950 (9 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...d its current neighbors. These HELLO messages, and consequently the states maintained by Span, are similar to those of proactive ad hoc routing protocols (e.g., geographic routing [8, 14, 12] or DSDV =-=[18]-=-). Each node maintains only a small amount of additional state|its coordinators and coordinators of neighbors|in addition to a list of neighbors normally found in the routing table. As shown in Figure...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University