Download File - Computer Networks & Information Security
Download File - Computer Networks & Information Security Download File - Computer Networks & Information Security
TORA Design Decision One proposal for modifying TORA optionally allowed a more proactive behavior, such that a DAG would be maintained even if no node is attempting to transmit to the destination Moral of the story: The link reversal algorithm in [Gafni81] does not dictate a proactive or reactive response to link failure/repair Decision on reactive/proactive behavior should be made based on environment under consideration 148
So far ... All nodes had identical responsibilities Some schemes propose giving special responsibilities to a subset of nodes Even if all nodes are physically identical Core-based schemes are examples of such schemes 149
- Page 97 and 98: A Reverse Path Setup in AODV B H S
- Page 99 and 100: A B Route Reply in AODV H S E C I G
- Page 101 and 102: A Forward Path Setup in AODV B H S
- Page 103 and 104: Timeouts A routing table entry mai
- Page 105 and 106: Route Error When node X is unable
- Page 107 and 108: Link Failure Detection Hello messa
- Page 109 and 110: Why Sequence Numbers in AODV A B C
- Page 111 and 112: Summary: AODV Routes need not be i
- Page 113 and 114: Link Reversal Algorithm [Gafni81] A
- Page 115 and 116: Link Reversal Algorithm A B F C E G
- Page 117 and 118: Link Reversal Algorithm A B F C E G
- Page 119 and 120: Link Reversal Algorithm A B F C E G
- Page 121 and 122: Link Reversal Algorithm Attempts t
- Page 123 and 124: Partial Reversal Method A B F C E G
- Page 125 and 126: Partial Reversal Method A B F C E G
- Page 127 and 128: Partial Reversal Method A B F C E G
- Page 129 and 130: Link Reversal Methods: Advantages
- Page 131 and 132: Link Reversal in a Partitioned Netw
- Page 133 and 134: Full Reversal in a Partitioned Netw
- Page 135 and 136: Full Reversal in a Partitioned Netw
- Page 137 and 138: Temporally-Ordered Routing Algorith
- Page 139 and 140: E D Partition Detection in TORA A N
- Page 141 and 142: E D Partition Detection in TORA A N
- Page 143 and 144: E D Partition Detection in TORA A F
- Page 145 and 146: E D Partition Detection in TORA A F
- Page 147: TORA Design Decision TORA performs
- Page 151 and 152: Core-Extraction Distributed Ad Hoc
- Page 153 and 154: Link State Propagation in CEDAR Th
- Page 155 and 156: H G B CEDAR: Core Maintenance A C E
- Page 157 and 158: H G B CEDAR Route Discovery A C E S
- Page 159 and 160: Advantages CEDAR Route discovery/ma
- Page 161 and 162: Proactive Protocols Most of the sc
- Page 163 and 164: Optimized Link State Routing (OLSR)
- Page 165 and 166: Optimized Link State Routing (OLSR)
- Page 167 and 168: OLSR OLSR floods information throu
- Page 169 and 170: Destination-Sequenced Distance-Vect
- Page 171 and 172: Hybrid Protocols 171
- Page 173 and 174: ZRP All nodes within hop distance
- Page 175 and 176: B F ZRP: Example with Zone Radius =
- Page 177 and 178: B F ZRP: Example with d = 2 A S C D
- Page 179 and 180: LANMAR Routing to Nodes Within Scop
- Page 181 and 182: LANMAR Routing to Nodes Outside Sco
- Page 183 and 184: Geodesic Routing Without Anchors [B
- Page 185 and 186: Routing Protocols discussed so far
- Page 187 and 188: Other Routing Protocols Plenty of
- Page 189 and 190: Power-Aware Routing [Singh98Mobicom
- Page 191 and 192: Power-Aware Routing Possible modifi
- Page 193 and 194: Associativity-Based Routing (ABR) [
- Page 195 and 196: Preemptive Routing [Goff01MobiCom]
- Page 197 and 198: Quality-of-Service Several proposa
So far ...<br />
All nodes had identical responsibilities<br />
Some schemes propose giving special<br />
responsibilities to a subset of nodes<br />
Even if all nodes are physically identical<br />
Core-based schemes are examples of such schemes<br />
149