Handbook of Wireless Networks and Mobile Computing 2002
DOI: 10.1002/0471224561.ch17
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Ad Hoc Networks and Routing Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2003
2003
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(9 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…When the expected data rate cannot be compromised any more, traffic of Node 2 is stopped at once. Behalf of this case, we can see that the E-AODV achieves the benefits of ensuring the QoS not only at route discovery stage, but also during the transmission process [8,9].…”
Section: Proposed Methodologymentioning
confidence: 80%
“…When the expected data rate cannot be compromised any more, traffic of Node 2 is stopped at once. Behalf of this case, we can see that the E-AODV achieves the benefits of ensuring the QoS not only at route discovery stage, but also during the transmission process [8,9].…”
Section: Proposed Methodologymentioning
confidence: 80%
“…When performing admission control in an intermediate node not only we calculate required bandwidth in that node which is on the path, but also we should consider the available bandwidth of its neighbor nodes, because as mentioned before 1 On-demand Multicast Routing Protocol 2 route request packet accepting traffic in the neighbor nodes of intermediate node, will affect on its available bandwidth. Therefore one step of admission control in each active node in routing process is checking the available bandwidth of its one-hop neighbor nodes.…”
Section: B Admission Control and Bandwidth Estimation Methods In Propmentioning
confidence: 99%
“…In this case, a multi-hop scenario occurs, in which the packets sent by the source host must be relayed by several intermediate hosts before reaching the destination host. Thus, each mobile host in a MANET must serve as a router [1].…”
mentioning
confidence: 99%
“…2) Routing Implementation: We use DSR [20] as our base routing protocol. During the path set up, the end user specifies an initial offer.…”
Section: Simulation Evaluationmentioning
confidence: 99%