Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking 1998
DOI: 10.1145/288235.288256
|View full text |Cite
|
Sign up to set email alerts
|

A performance comparison of multi-hop wireless ad hoc network routing protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

17
2,087
3
19

Year Published

2002
2002
2006
2006

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 3,425 publications
(2,126 citation statements)
references
References 7 publications
17
2,087
3
19
Order By: Relevance
“…On-demand algorithms, such as Ad-Hoc On-Demand Distance Vector Routing (AODV) [37] and Dynamic Source Routing (DSR) [38], are purely reactive: nodes only gather routing information when a data session to a new destination starts, or when a route that is in use fails. Reactive algorithms are generally more scalable since they greatly reduce the overhead [39], but they can suffer from oscillations in performance because they are never prepared for disruptive events. In practice, many algorithms are hybrid algorithms (e.g.…”
Section: Manet Routingmentioning
confidence: 99%
“…On-demand algorithms, such as Ad-Hoc On-Demand Distance Vector Routing (AODV) [37] and Dynamic Source Routing (DSR) [38], are purely reactive: nodes only gather routing information when a data session to a new destination starts, or when a route that is in use fails. Reactive algorithms are generally more scalable since they greatly reduce the overhead [39], but they can suffer from oscillations in performance because they are never prepared for disruptive events. In practice, many algorithms are hybrid algorithms (e.g.…”
Section: Manet Routingmentioning
confidence: 99%
“…We choose an area that is three times larger [10,11] to avoid the formation of chain-like backbones, which would tend to favour backbone approaches. We verified that chain-like backbones were typically not created by evaluating the backbone topology produced when nodes are not mobile.…”
Section: Simulation Settings 41 the Scenariosmentioning
confidence: 99%
“…It is standard practice to evaluate these algorithms using long-term, constant-bit-rate traffic [4,5,8,[10][11][12]. A key characteristic of this workload is that route discovery is infrequent with its cost amortized over a large number of data packets sent using each route.…”
Section: Introductionmentioning
confidence: 99%
“…We used a real-world road map of a section Houston close to Rice University. 1 The area of the section is roughly a square with a side of length 1200 meters. The area of concern may be regarded residential with perpendicular street intersections and a low speed limit shown in Figure 3.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…It is important to use realistic mobility models so that the evaluation results will have a close correlation to the performance when actually deployed. However, the most commonly used mobility model is the Random Waypoint Mobility (RWM) [1], which though being simple and easy to simulate is not very realistic. Recently though, various mobility models have been proposed which attempt to better capture mobility traces than RWM.…”
Section: Introductionmentioning
confidence: 99%