Loop-free routing using diffusing computations
IEEE/ACM Transactions on Networking (TON)
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
An efficient routing protocol for wireless networks
Mobile Networks and Applications - Special issue: routing in mobile communications networks
Associativity-Based Routing for Ad Hoc Mobile Networks
Wireless Personal Communications: An International Journal
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
ARA - The Ant-Colony Based Routing Algorithm for MANETs
ICPPW '02 Proceedings of the 2002 International Conference on Parallel Processing Workshops
EMS '08 Proceedings of the 2008 Second UKSIM European Symposium on Computer Modeling and Simulation
Hi-index | 0.00 |
Ad hoc networks are wireless networks without a fixed infrastructure, which are usually assembled on a temporary basis to serve a specific deployment such as emergency rescue or battlefield communication. The differentiating feature of an ad hoc network is that the functionality normally assigned to infrastructure components, such as access points, switches, and routers. For most cases, there is an assumption that the participating nodes are mobile, do not have a guaranteed uptime, and have limited energy resources. For wired domain trusted and reliable solutions exist. The infrastructure's topology, its bandwidth, and its routing are provisioned to provide a good fit with the expected traffic. In ad hoc networks, however, routing becomes a significant concern, because it needs to be handled by ordinary nodes that have neither specialized equipment nor a fixed, privileged position in the network. These challenges were answered with a large number of routing algorithms, but any protocol can not be used in any type of ad hoc networks. In this research we compare the reactive and proactive protocols and have discussed that which type of protocols are suitable for which type of networks.