A comparison based overview of destination distance sequence vector

advertisement
A comparison based overview of destination distance sequence vector routing (DSDV) and mobile ad
hoc on demand data delivery protocol (MAODDP)
Humayun Bakht
School of Computing and Mathematical Sciences
Liverpool John Moores University
Byrom Street, Liverpool L3 3AF, UK
Email: humayunbakht@yahoo.co.uk
Abstract
Mobile ad hoc network is an autonomous system
of mobile nodes establishing ad hoc or short live
network without the intervention of any fixed
infrastructure. Routing in these types of network
is an unresolved issue. Effort is going on to
establish an effective routing mechanism for
mobile ad hoc networks. Proposed protocols for
mobile ad hoc network can be categorized into
two types i.e. table’s driven and on-demand
routing protocols.
Destination sequence distance vector routing is
one of tables driven earliest proposed algorithms.
DSDV maintains the consistent overview of the
network. DSDV requires participating nodes
broadcast updates after a regular interval of time.
Most of the tables driven type protocol is either a
extension or modified form of DSDV.
Mobile ad-hoc on demand data delivery protocol
follows an intermediate approach in compression
with tables driven and on demand routing
protocols. The key feature of MAODDP is to
establish the route and deliver the data
simultaneously at the same time one after the
other.
This paper is an effort to describe the detail
functioning of these protocols. This paper also
covers an analytical and discussion section to
compare the various aspects of these protocols
with each other.
1. Introduction
With the advancement in radio technologies like
Bluetooth[1], IEEE 802.11 or Hiperlan, a new
concept of networking has emerged which make
wireless networks increasingly popular in the
computing industry[1, 2]. This is particularly
true within the past decade which has seen
wireless networks being adapted to enable
mobility. There are currently two variations of
wireless networks[3]. The first is known as
Infrastructure networks i.e. those networks with
fixed and wired gateways. The bridges for these
networks are known as base stations. As the
mobile travels out of range of one base station
and into the range of another, a “handoff” occurs
from the old base station to the new, and the
mobile is able to continue communication
seamlessly throughout the network. Typical
applications of this type of network include
office wireless local area networks (WLAN).
The second type of mobile wireless network is
mobile ad-hoc network or infrastructure-less
mobile networks. A mobile ad-hoc network is a
collection of wireless mobile nodes dynamically
forming a temporary network without the use of
any existing network infrastructure or centralized
administration[4, 5]. Mobile ad-hoc networks are
deployed in applications such as disaster
recovery and distributed collaborative computing
where routes are mostly multi-hop and network
hosts communicate via packet radios[6].
Examples include infrared, wireless RF,
Bluetooth, ad-hoc sensor networks[7] or even
wired based transceivers used when emulating ad
hoc networks. There is current and future need
for dynamic ad hoc networking technology [8].
The emerging field of mobile and nomadic
computing, with its current emphasis on mobile
IP operations should gradually broaden and
require highly-adaptive mobile networking
technology to effectively manage multi-hop,
mobile ad-hoc network clusters which can
operate autonomously or, more than likely, be
attached at some point to the bigger network
such as the Internet.
Most of the existing Internet protocols were
designed to aid routing in a network with fixed
infrastructure. These protocols therefore are not
considered good enough to support routing in an
ad-hoc networking environment[9]. One of the
first routing solutions was based on the idea of
considering each mobile nodes of an ad hoc
network as a router and running some
conventional routing protocol[10]. However This
scheme was not very successful as mobile ad-hoc
network suffers from frequent topology changes
which results a large number of packets to be
dropped or lost[11]. Later on numbers of
different protocols have been proposed as a
routing solution for mobile ad hoc networks.
These can be classified as either tables
driven[12] or on-demand protocol[13] types.
Pro-active protocols follow an approach similar
to the one used in wired routing protocols. By
continuously evaluating the known route and
attempting to discover new routes, they try to
maintain the most up-to-date map of the
network. This allows them to efficiently forward
packets as the route is known at the time when
the packet arrives at the node. Pro-active or
table-driven protocols, in order to maintain the
constantly changing network graph due to new
moving or failing nodes require continuous
updates which may consume large amounts of
bandwidth. In contrast, reactive protocols
determine the proper route only when required.
Therefore, when a packet needs to be forwarded
In this instance the node floods the network with
a route-request and builds the route on demand
from the responses it receives. This technique
does not require constant broadcasts and
discovery, but on the other hand causes delays
since the routes are not already available.
Additionally, the flooding of the network may
lead to additional control traffic, again putting
strain on the limited bandwidth.
Mobile ad-hoc on Demand Data Delivery
protocol (MAODDP) follows a centralized
approached figure 1 is based on the idea of
accomplishing route discovery and data delivery
simultaneously at the same time one after the
other. It is an on-demand routing protocol type it
builds routes between nodes only as desired by
source nodes. MAODDP offers loop-free routing
with the help of sequence number, self-starting.
MAODDP offers quick adaptation to dynamic
link conditions, low processing and memory
overhead, low network utilization, and
determines routes to destinations within the
mobile ad-hoc network.
Mobile ad-hoc on demand data delivery
protocol
Bandwidth
Constraint
Security
Routing
Multicasting
Battery Life
Figure 1 Model of MAODDP
MAODDP uses destination sequence numbers to
ensure loop free routing. The primary concerns
in mobile ad-hoc networks are bandwidth
limitations and unpredictable topology changes.
Thus, efficient utilization of routing packets and
immediate recovery of route breaks are critical in
routing and multicasting protocols. MAODDP
intial specification taken into account these two
factors besides number of other factors.
MAODDP could proved to be an effective
solution particularly in terms of minimizing
bandwidth consumption and maximizing battery
life of the mobile nodes in an ad hoc network.
Rest of the paper is organized as follows in
section 2 we discuss routing problems in mobile
ad hoc networks, section 3 and 4 covers details
functioning of destination sequence distance
vector routing and mobile ad hoc on demand on
demand data delivery protocol, analysis and
discussion is given in section 5 while references
are listed in section 6.
2. Routing in mobile ad hoc network
Despite the numerous advantages and potential
application possibilities[8], ad-hoc networks are
yet far from being deployed on large-scale
commercial basis. To enable communication
within a MANET, a routing protocol is required
to establish routes between participating nodes.
Because of limited transmission range, multiple
network hops may be needed to enable data
communication between two nodes in the
network. Since MANET is an infrastructure less
network, each mobile node operates not only as a
host but also as a router, forwarding packets for
other mobile nodes in the network.
There are frequent unpredictable topological
changes in these networks, which makes the task
of finding and maintaining routes are
difficult[14-16]. Conventional routing protocols
based on distance vector algorithms are not very
suitable for such situations as the amount of
routing related traffic would consume a large
portion of the wireless bandwidth, and such
discovered routes would soon become crucial
due to mobility of nodes. Although good
numbers of routing protocols are suggested and
tested for mobile ad-hoc networks. Research
shows performance metrics like throughput,
delay and protocol overhead in relation to
successfully transmitted data still need better
optimization.
These all problems make efficient dynamic
routing an important research challenge in ad hoc
networks. Here new protocols especially reactive
types could be considered as very useful because
they often generate much lower routing
overheads in comparison with proactive routing
protocols[17].
Thus from the above discussion we concluded a
clear need of developing more efficient strategies
for routing in mobile ad-hoc network. Based on
carried research the proposed scheme should be
capable of delivering an effective routing
solution while addressing other routing related
issues along with routing. In this context the
some of the desirable characteristics of the
proposed algorithm are bandwidth efficient,
consume less battery power and be able or can be
extended to support both uni-cast and multicast
routing.
3. Destination sequence
routing protocol
distance
vector
Based on conventional routing protocol, RIP
adapted for use in ad-hoc network, the
destination sequenced distance vector routing
protocol[18] is an extension of classical bellman
ford routing mechanism. In DSDV[19] routing is
achieved by using routing tables maintained by
each node. The main complexity in DSDV is in
generating and maintaining these routing tables.
DSDV requires nodes to periodically transmit
routing table updates packets, regardless of
network traffic. These update packets are
broadcast throughout the network so every node
in the network knows how to reach every other
node. As the number of nodes in the network
grows, the size of the routing tables and the
bandwidth required to update them also grows.
This overhead is considered to be the main
weakness of DSDV.
3.1 Overview
Every mobile node in the network maintains a
routing table, as shown in figure 1 in which all of
the possible destinations within the network and
the number of hops to each destination are
recorded. Each entry is marked with a sequence
number assigned by the destination node. The
sequence numbers enable the mobile nodes to
distinguish stale routes from new ones, thereby
avoiding the formation of routing loops. Routing
tables updates are periodically transmitted
throughout the network in order to maintain table
consistency.
New route broadcasts contain the address of the
destination, the number of hops to reach the
destination, the sequence number of the
destination as well as a new sequence number
unique to broadcast. The route labelled with the
most recent sequence number is always used. In
the event that two updates have the same
sequence number, the route with the smaller
metric is used in order to optimise the path.
Routing is achieved by using routing tables
maintained by each node.
3.2) DSDV Route Advertisement
DSDV requires nodes to periodically transmit
routing table update packets, regardless of
network traffic. These update packets are
broadcast throughout the network. Therefore,
every node in the network knows how to reach
every other node. However due to the
dynamically varying topology, the entries in this
list may change quite frequently over time, thus
requires, route advertisement to be made quite
often . This is to ensure that every mobile node
can almost locate every other node in the
network. In addition each mobile node agrees to
relay data packets to other nodes upon requests.
In this way even though a node does not have a
direct link with a particular node in the network,
it will still be able to exchange data with that
node.
Whenever a node broadcast data, a sequence
number is generated. In addition to data the
broadcast contains other useful information such
as destination ID, number of hops to the
destination and destination sequence number.
Receiver on receiving this data make sure that
the received sequence number is less the
previously recorded sequence number in receiver
routing table. Example of a route advertised table
is shown is figure 1.
Destination
Sequence
Metric
number
F
0
F-670
G
1
G-780
H
3
H-890
Figure 2 Route advertisement in DSDV
The receiver also advertises route received in
broadcast its routing information. The receivers
also add an increment to the metric before
advertising the route since further incoming
packets will require one more hop to reach the
destination.
The settling time is calculated by maintaining a
running over the most recent updates of the
routes for each destination. The most recent
measurement of the settling time is calculated by
maintaining weighted average over the most
recent updates of the route for each destination.
A parameter also selected to indicate how long a
route has to remain stable before it is counted as
truly stable. Any route more stable then this
parameter will cause a triggered update if it is
ever replaced by another route with different
next hop or metric.
3.3) Sequence Number
Broken link, which is mainly due to topology
changes is described by ∞ metric which could be
any value greater then the maximum allowed
metric. Whenever a link to next hop is broken,
any route through the next hop is assigned ∞
metric and an updated sequence number.
Therefore the only situation when mobile node
other then destination node generates sequence
number is when there is a broken link.
In summary there are two conditions when the
sequence number could be generated.
 Whenever a new broadcast is issued.
 When a broken link is found
3.4) Route selection
Any mobile node receiving new broadcast can
find the fresh route by comparing receiving
information with those that are previously
recorded in its routing table. Route with recent
sequence number is considered as fresh route
while the older sequence number one’s are
discarded.
If the sequence number found to be same, then
the route with better metric will be selected.
4. Mobile ad hoc on demand data delivery
protocol
4.1) Introduction
MAODDP stands for mobile on-demand data
delivery protocol. It was first proposed
pproceedings of the 3rd Annual Post-Graduate
Symposium
on
the
Convergence
of
Telecommunications,
Networking
and
Broadcasting[20]. Since then the protocols has
gone through a series of modifications[2, 5].
Several functions to support both multicasting
and unicasting routing and to secure data
transmission have been added in the initial
specification of MAODDP.
 On demand routing
 Loop free routing with the use of sequence
numbers
 Saving battery power of the participating
nodes
 Faster network converge
 Guaranteed data delivery to the destination.
In general, whenever a source node requires a
route to deliver data packets to the destination
for which it does not have any recorded route in
its routing tables. It initiates route discovery and
data delivery process by broadcasting ROUTE
DISCOVERY AND DATA DELIVERY
PACKET (RREQD). There are three possibilities
when this packet reaches to the intermediate
node. The first one if the node has a suitable path
for the destination, as enclosed in the header of
RREQD packet then its forward the packet to the
intended destination. The second possibility
when node does not have any direct path for the
destination node but have idea about the closest
neighbours, in this case, node forward this
packet to that node. The final possibility nodes
have no information whatsoever about the
destination node as specified in the RREQD, in
this case the node forward this packet to its next
hop neighbours. This process is repeated until
the packet reach to the destination. Once the
packet has reached to the destination node It
broadcasts an acknowledge packet (ACK) back
to the source node. This acknowledge packet
confirm the source node that the previous
transmission was successful. It also help the
intermediate node and the source nodes to
updates their routing information about all the
nodes in the path from source to the destination..
However if the nodes do not hear any thing back
from the destination node before the expiry time
of RREQD packet. It will consider the previous
attempt as unsuccessful.

Immediately before a node broadcast a
RREQD, it increments its own
sequence number.
This prevents
problems with deleted reverse routes to
the source of a RREQD.

Immediately before a destination node
broadcast an acknowledged (ACK)
message in response to a route request
and data delivery packet (RRQED), it
updates its own sequence number to
the maximum of its current sequence
number and the destination sequence
number in the acknowledged packet
(ACK).
4.1) Generating Route Request and data
delivery packet (RREQD)
A node floods a RREQD when it determines that
it needs a route to deliver data to a destination
and does not have one available in its routing
table. This can happen if the destination is
previously unknown to the node, or if a
previously valid route to the destination expires
or is broken. The destination sequence number
field in the RREQD is considered as the last
known destination sequence number for this
destination and is copied from the destination
sequence number field in the routing table. If no
sequence number is known, a sequence number
of zero is used. The source sequence number in
the RREQD is the node's own sequence number.
The Flooding ID field is incremented by one
from the last Flooding ID used by the current
node. Each node maintains only one Flooding
ID. The Hop Count field is set to zero.
A source node often expects to have bidirectional
communications with a destination node. In
such cases, it is not sufficient for the source node
to have a route to the destination node; the
destination must also have a route back to the
source node. In order for this to happen as
efficiently as possible, any generation of an
acknowledge packet by the destination node for
delivery to the source node, should be
accompanied by some action which notifies the
destination about a route back to the source node.
4.5) Maintaining Sequence number
MAODDP depends on each node in the network
to own and maintain a sequence number to
guarantee the loop-freedom of all the routes
towards that node. MAODDP uses combination
of sequence number and broadcast ID as a
precaution to avoid message looping. The
sequence number is incremented in one of two
circumstances
Every route table entry at every node MUST
include the latest information available about the
sequence number for the IP address of the
destination node for which the route table entry
is maintained. This sequence number is called
the "destination sequence number". It is updated
whenever a node receives new information about
the sequence number from RREQD packet, ACK
packet, or RERR messages that may be received
related to that destination.
In summary, a node may change the sequence
number for a particular destination only if:



It is itself the destination node, and
offers a new route to itself
It receives an MAODDP messages i.e.
RREQD OR ACK, with new
information about the sequence number
for some other destination node
The path towards the destination node
expires or breaks.
4.3) Generating acknowledge message (ACK)
If a RREQD is successfully deliver to the
destined destination. It is the responsibility of the
destination node to issue acknowledge packet
(ACK) back to the source node. Destination node
MUST update its own sequence number to the
maximum of its current sequence number and the
destination sequence number in the RREQD
packet. The destination node places the value
zero in the Hop Count field of the ACK message.
5. Analysis and discussion
Mobile ad hoc networks suffer with high
mobility, frequent topology changes, bandwidth
constraints, limited power and hidden terminal
problem. Our research concluded[21] that almost
all of these issues are interrelated with the over
all routing mechanism. Therefore for a routing
mechanism to be good enough for such an
environment, it should be able to address some
or all of these issues at a certain level.
Most of the tables driven protocols address
routing without addressing the side effects on the
other related issues such as limited bandwidth
and battery power of ad-hoc networks. Like
other tables driven protocols, DSDV maintain a
consistent overview of the network by forcing
each mobile nodes to broadcast continuous
updates after a regular interval of time. This
approach clearly not very feasible for ad hoc
networking environment. Apart from bandwidth
and battery power it could also create
unnecessary network head and could also a mean
of slowing down the over all routing operation.
In [22] DSDV perform well for fairly static
topologies but become unreliable as node
mobility and the number of traffic sources
increase. Besides number of disadvantages, loop
free routing is considered to be one of the main
benefits of DSDV. In DSDV Optimal values for
parameters like settling time is not easy to
determine. This might result in unnecessary
bandwidth consumption. Moreover, use of
continuous updates could trigger network
overhead. Further more the protocol is not
capable of supporting multicast routing. The size
of the routing table is also a problem as all nodes
are required to maintain location information of
the other nodes in the network, regardless
weather or not this information is required.
Effective support of multicast or group
communication is essential for most ad-hoc
network applications. There are many
applications[23] where group communication is
a crucial task. Group communication, both oneto-many and many-to-many, has become
increasingly important in mobile ad-hoc
networks. In mobile ad-hoc network group
communications, issues differ from those in
wired networks because of the variable and
unpredictable nature of the wireless medium,
where the signal strength and propagation varies
with the time and the environment. Moreover,
node mobility causes continuously changing
topology in which routes break unpredictably
and new routes form dynamically.
In mobile ad-hoc network, an efficient group
communication model can ease effective
communication among various groups in the
network. At present, multicasting routing in
mobile ad-hoc networks is gained by adopting
one of two approaches: flooding and tree-based
routing. Flooding offers the lowest control
overheads with very high data traffic, while treebased routing reduces data traffic in the network
but requires many control data exchanges.
Studies show less efficient performance of these
techniques on mobile ad-hoc network. Like most
of the other tables driven protocols DSDV in its
present form does not address multicast routing.
Security is one of the important aspects of this
technology and it needs some serious
attention[24, 25]. Users within the network want
their communication to be secure. As current
mobile ad-hoc networks do not have any stick
security policy, this could possibly lead active
attackers to easily exploit or possibly disable the
mobile ad-hoc network. Security goals in mobile
ad-hoc
networks are
reached
through
cryptographic mechanisms such as public key
encryption or digital signature. These
mechanisms are backed by centralized key
management where a trusted Certificate
Authority (CA) provides public key certificate to
mobile nodes in order to develop mutual trust
between nodes. Any disturbance with the
Certificate Authority can easily affect the
security of the entire network.
Security therefore, is one of the important aspect
in ad-hoc networking environment[26]. A
routing protocol which offers a secure routing
mechanism could be considered as one of the
efficient solution. DSDV however does not
address security along with routing. However,
besides number of disadvantages, loop free
routing is considered to be one of the main
benefits of DSDV
MAODDP is one of the reactive or on-demand
protocol which offers better route utilization,
faster network coverage by establishing route
and delivering data simultaneously same time
one after the other. This approach is very feasible
specially to maximize the battery life of the
participating nodes. Unlike other on-demand
routing protocols MAODDP reduces the number
of broadcasted packet by integrating the route
discovery and data packets together in a single
packet format i.e. route request and data delivery
packet (RREQD). Some of the unique features of
MAODDP are as follows.
 Centralized approached
MAODDP addresses address issues security,
bandwidth constraints and battery power along
with the routing mechanism..
 Security
MAODDP offer secure routing by introducing its
own security mechanism.
 Multicasting
MAODDP support both types of routing i.e.
unicast and multicast routing figure 3.
Sender
would prefer not to cooperate. When nodes do
cooperate they established the necessary ad-hoc
structure
that
can
makes
multi-hop
communication possible by allowing traffic flow
from a node to reach those destinations that
would either require a significant amount of
transmission energy using single
hop
communication or simply not be possible
without routing the traffic through other nodes.
This further means that nodes must be willing to
forward traffic for other nodes, and in this way
spend energy without receiving any direct
benefit. Thus the concept of introducing measure
which can force participation nodes for
collaboration into the architecture of mobile adhoc networks becomes one of the important
issues.
Unlike most of the existing routing solution
MAODDP address this issue by introducing its
own unique mechanism to identify ‘selfish’
nodes and thus could be used to make network
more reliable and secure.
6. Conclusion and future work
Figure3 Multicasting in mobile ad-hoc
network
 Battery power
MAODDP does not require mobile nodes to be
awake all the time. A node can go into sleep
mode if it is not involved in an active
transmission. Thus save considerable battery
power of the mobile nodes.

Automatic mechanism to find out if the
transmission being failed
MAODDP introduces a status time in the packet
header of RREQD to find out the status of the
previous transmission i.e. if the node does not
receive an acknowledge message before the
expiry of status time (st) it will regard the
previous transmission as unsuccessful.
In this paper, we have presented a study based
comparison of destination sequence distance
vector routing and mobile ad hoc on demand
data delivery protocol. We highlighted different
aspects of these two techniques and presented a
brief description of their applicability,
operational details, suitability under different
environments and their effects on the over all
network performance. Our future work extends
this study based comparison into a simulation
based comparison which will be contributed to
research community as a part of ongoing effort
in this area.
7. References
[1].
[2].

Systematic procedure for corroboration
of mobile devices
In mobile ad-hoc networks each nodes relies on
others to forward data packets to the other nodes
in the network. There are good numbers of
reasons why mobile nodes in ad-hoc networks
[3].
Humayun
Bakht,
Bluetooth
a
commercial application of mobile ad
hoc
networks,
in
Computing
Unplugged. November 2004. p. 2.
Humayun Bakht, et al. Multicasting in
mobile ad hoc networks. in 9th CDMA
International
Conference.
25-28
October 2004. Seoul , Korea.
Humayun Bakht, Internet Mobile Ad
hoc
networks,
in
Computing
Unplugged. April 2005. p. 2.
[4].
[5].
[6].
[7].
[8].
[9].
[10].
[11].
[12].
[13].
[14].
[15].
Humayun Bakht, Understanding mobile
ad hoc network, in Computing
Unplugged. June 2004. p. 2.
Humayun Bakht, Madjid Merabti, and
Robert Askwith. A routing protocol for
mobile ad hoc networks. in 1st
International Computer Engineering
Conference. 27-30 December. Cairo ,
Egypt.
Humayun Bakht, Some applications of
mobile
ad-hoc
network,
in
ComputingUnplugged. September 2004.
p. 1.
Humayun Bakht, Sensor networks and
ad hoc networking, in Computing
Unplugged. Oct 2004. p. 1.
Humayun Bakht, Future of mobile ad
hoc
networks,
in
Computing
Unplugged. October 2004. p. 1.
Humayun Bakht, Madjid Merabti, and
Robert Askwith. Centralized frame for
routing in mobile ad-hoc networks. in
International Conference on Computer
Communication
(ICCC2004).
September, 2004. Beijing, China.
David B. Jhonson, Routing in Ad-Hoc
Networks of Mobile Hosts. Proceedings
of the IEEE Workshop on Mobile
Computing Systems and Applications,
Dec. 1994.
Humayun Bakht, Data Communication
in mobile ad-hoc networks, in
Computing Unplugged. September
2004. p. 2.
G. Pei, M. Gerla, and T.-W. Chen,
Fisheye State Routing in Mobile Ad Hoc
Networks. Proceedings of Workshop on
Wireless Networks
and
Mobile
Computing, 2000.
Charles E. Perkins and Elizabeth M.
Royer, Ad-hoc On-Demand Distance
Vector Routing. Proceedings of the 2nd
IEEE Workshop on Mobile Computing
Systems and Applications, February
1999: p. pp. 90-100.
M. Mosko and J.J. Garcia-LunaAceves. Performance of Group
Communications
over
Ad-Hoc
Networks. in The Seventh IEEE
Symposium
on
Computers
and
Communications (ISCC 02),. July 1 - 4,
2002. Taormina/Giardini Naxos, Italy,.
H. Rangarajan and J.J. Garcia-LunaAceves.
Achieving
Loop-Free
Incremental Routing in Ad Hoc
Networks. in Proc. 9th IEEE
[16].
[17].
[18].
[19].
[20].
[21].
[22].
[23].
[24].
[25].
Symposium
on
Computers
and
Communications (ISCC'2004),. June
29--July 1, 2004. Alexandria, Egypt.
H. Rangarajan and J.J. Garcia-LunaAceves. Using Labeled Paths for Loopfree On-Demand Routing in Ad Hoc
Networks. in ACM MobiHoc 2004. May
24--26, 2004. Tokyo, Japan.
Samir R. Das, Charles E. Perkins, and
Elizabeth M. Royer, On demand
multipath routing for mobile ad hoc
networks. Proceedings of the IEEE
International Conference on Computer
Communication and Networks, 1999.
S.Kannan, John E Mellor, and
D.D.Kouvatsos, Investigation of routing
in DSDV. 4th Annual Post-Graduate
Symposium on the Convergence of
Telecommunications, Networking and
Broadcasting, Liverpool UK, 2003.
C. E. Perkins and P. Bhagwat, Highly
dynamic
destination-sequenced
distance-vector routing (DSDV) for
mobile
computers.
Computer
Communications Review, 94. 24(4): p.
234- 244.
Humayun Bakht, Madjid Merabti, and
Robert Askwith. Mobile Adhoc OnDemand Data Delivery Protocol. in
Proceedings of the 3rd Annual PostGraduate
Symposium
on
the
Convergence of Telecommunications,
Networking and Broadcasting,. 2002.
Humayun Bakht, Madjid Merabti, and
Robert Askwith. Centralized frame for
routing in mobile ad-hoc networks. in
International Conference on Computer
Communication
(ICCC2004).
September, 2004. Beijing, China.
Josh Broch, et al., A performance
Comparsion of Multi-Hop Wireless Ad
Hoc Network Routing Protocols. Fourth
Annual
ACM/IEEE
International
Conference on Mobile Computing and
Networking (MobiCom '98), 1998.
Humayun
Bakht,
Group
communications in mobile ad hoc
networks, in Computing Unplugged.
November 2004. p. 1.
Humayun Bakht, Importance of secure
routing in mobile ad hoc networks, in
Computing Unplugged. August 2004. p.
2.
Humayun Bakht Bakht, Technical
aspects of mobile ad-hoc networks, in
Computing Unplugged. June 2004. p. 2.
[26].
Humayun Bakht, A focus on the
challenges of mobile ad hoc network, in
Computing Unplugged. August 2004. p.
2.
Download