skip to main content
RFC2501: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations1999 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 January 1999
Bibliometrics
Skip Abstract Section
Abstract

This memo first describes the characteristics of Mobile Ad hoc Networks (MANETs), and their idiosyncrasies with respect to traditional, hardwired packet networks. It then discusses the effect these differences have on the design and evaluation of network control protocols with an emphasis on routing performance evaluation considerations.

RFC Downloads

Cited By

  1. Joshua C and Varadarajan V (2021). An optimization framework for routing protocols in VANETs: a multi-objective firefly algorithm approach, Wireless Networks, 27:8, (5567-5576), Online publication date: 1-Nov-2021.
  2. Yamazaki S, Abiko Y, Mizuno H and Lim Y (2020). A Simple and Energy-Efficient Flooding Scheme for Wireless Routing, Wireless Communications & Mobile Computing, 2020, Online publication date: 1-Jan-2020.
  3. Bouchama N, Aïssani D, Djellab N and Nouali-Taboudjemat N (2019). A critical review of quality of service models pin mobile ad hoc networks, International Journal of Ad Hoc and Ubiquitous Computing, 31:1, (49-70), Online publication date: 1-Jan-2019.
  4. Sufian A, Banerjee A and Dutta P (2019). Energy and Velocity Based Tree Multicast Routing in Mobile Ad-Hoc Networks, Wireless Personal Communications: An International Journal, 107:4, (2191-2209), Online publication date: 1-Aug-2019.
  5. Reynaud L and Guérin-Lassous I (2018). Improving the Performance of Challenged Networks with Controlled Mobility, Mobile Networks and Applications, 23:5, (1270-1279), Online publication date: 1-Oct-2018.
  6. Kwon H, Kim D, Hahn C and Hur J (2017). Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks, Multimedia Tools and Applications, 76:19, (19507-19521), Online publication date: 1-Oct-2017.
  7. Jayabarathan J, Sivanantharaja A and Robinson S (2017). Quality of Service Enhancement of Mobile Adhoc Networks Using Priority Aware Mechanism in AODV Protocol, Wireless Personal Communications: An International Journal, 96:4, (5897-5909), Online publication date: 1-Oct-2017.
  8. Kaur P, Kaur D and Mahajan R (2017). Wormhole Attack Detection Technique in Mobile Ad Hoc Networks, Wireless Personal Communications: An International Journal, 97:2, (2939-2950), Online publication date: 1-Nov-2017.
  9. ACM
    Kamboj P, Raw R and Gautam A Evaluation of Link Lifetime based Routing Protocol for Vehicular Ad-hoc Networks Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, (1-5)
  10. ACM
    Sathiaseelan A, Lertsinsrubtavee A, Jagan A, Baskaran P and Crowcroft J Cloudrone Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, (41-44)
  11. Liu X and Trappe W (2016). Overlay tunneling as a policy tool for defending mobile ad hoc networks, Security and Communication Networks, 9:17, (4482-4494), Online publication date: 25-Nov-2016.
  12. ACM
    Macker J and Taylor I Orchestrating workflows over heterogeneous networking infrastructures Proceedings of the 10th Workshop on Workflows in Support of Large-Scale Science, (1-10)
  13. Jabbar W, Ismail M and Nordin R (2015). Multi-criteria based multipath OLSR for battery and queue-aware routing in multi-hop ad hoc wireless networks, Wireless Networks, 21:4, (1309-1326), Online publication date: 1-May-2015.
  14. Chan K, Cho J, Trout T, Wampler J, Toth A and Rivera B trustd: Trust daemon experimental testbed for network emulation MILCOM 2015 - 2015 IEEE Military Communications Conference, (641-646)
  15. Subramaniam M and Ramasamy S (2014). A survey on performance analysis of energy aware multicast routing protocols in mobile ad hoc network, International Journal of Networking and Virtual Organisations, 14:4, (340-354), Online publication date: 1-Mar-2014.
  16. Moussaoui A, Semchedine F and Boukerram A (2014). A link-state QoS routing protocol based on link stability for Mobile Ad hoc Networks, Journal of Network and Computer Applications, 39:C, (117-125), Online publication date: 1-Mar-2014.
  17. Sondi P, Gantsou D and Lecomte S (2013). Design guidelines for quality of service support in Optimized Link State Routing-based mobile ad hoc networks, Ad Hoc Networks, 11:1, (298-323), Online publication date: 1-Jan-2013.
  18. ACM
    Ahmad I, Ayaz S, Arafat S, Riaz F and Jabeen H QoS routing for real time traffic in mobile ad hoc network Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, (1-6)
  19. ACM
    Vijayalayan K, Harwood A and Karunasekera S (2013). Distributed scheduling schemes for wireless mesh networks, ACM Computing Surveys, 46:1, (1-34), Online publication date: 1-Oct-2013.
  20. Macone D, Oddi G and Pietrabissa A (2013). MQ-Routing, Ad Hoc Networks, 11:3, (861-878), Online publication date: 1-May-2013.
  21. ACM
    McNerney P and Zhang N A 2-dimensional approach to QoS provisioning in adversarial mobile ad hoc network environments Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, (143-150)
  22. Omar M, Challal Y and Bouabdallah A (2012). Review, Journal of Network and Computer Applications, 35:1, (268-286), Online publication date: 1-Jan-2012.
  23. Rodríguez-Covili J, Ochoa S and Pino J (2012). High level MANET protocol, Journal of Network and Computer Applications, 35:1, (145-155), Online publication date: 1-Jan-2012.
  24. ACM
    Thompson M, MacKenzie A and DaSilva L A method of proactive MANET routing protocol evaluation applied to the OLSR protocol Proceedings of the 6th ACM international workshop on Wireless network testbeds, experimental evaluation and characterization, (27-34)
  25. ACM
    Gaur M, Laxmi V, Kumar M and Kaur R Detour attack in OLSR Proceedings of the 4th international conference on Security of information and networks, (137-142)
  26. RodríGuez-Covili J, Ochoa S, Pino J, Messeguer R, Medina E and Royo D (2011). A communication infrastructure to ease the development of mobile collaborative applications, Journal of Network and Computer Applications, 34:6, (1883-1893), Online publication date: 1-Nov-2011.
  27. ACM
    Poonam , Garg K and Misra M Trust based security in MANET routing protocols Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, (1-7)
  28. ACM
    Woo H, Lee D and Lee C An enhanced OLSR protocol based on link reliability Proceedings of the 4th International Conference on Uniquitous Information Management and Communication, (1-6)
  29. Kwak H and Borghetti B Reducing communication detection and eavesdropping using mobile agent relay networks Proceedings of the Winter Simulation Conference, (2832-2841)
  30. Seredynski M and Bouvry P Perspectives of selfish behaviour in mobile ad hoc networks Proceedings of the 7th international conference on Numerical methods and applications, (297-304)
  31. ACM
    Triviño A, Ruiz-Villalobos B, Casilari E and Yuste-Delgado A Study on the need for adaptive gateway discovery in MANETs Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (1091-1095)
  32. ACM
    Mehler J and Meyer auf der Heide F Power-aware online file allocation in mobile ad hoc networks Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures, (347-356)
  33. Masoudifar M (2009). A review and performance comparison of QoS multicast routing protocols for MANETs, Ad Hoc Networks, 7:6, (1150-1155), Online publication date: 1-Aug-2009.
  34. ACM
    Holanda M, Brayner A and Fialho S Introducing self-adaptability into transaction processing Proceedings of the 2008 ACM symposium on Applied computing, (992-997)
  35. ACM
    Jhong J, Chang C and Chao H Cross-layer ant based algorithm routing for MANETs Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-6)
  36. ACM
    Lass R, Sultanik E and Regli W Measurement techniques for multiagent systems Proceedings of the 8th Workshop on Performance Metrics for Intelligent Systems, (135-142)
  37. Gao F and Hope M (2008). Collaborative middleware on Symbian OS via Bluetooth MANET, WSEAS TRANSACTIONS on COMMUNICATIONS, 7:4, (300-310), Online publication date: 1-Apr-2008.
  38. Ding S (2008). A survey on integrating MANETs with the Internet, Computer Communications, 31:14, (3537-3551), Online publication date: 1-Sep-2008.
  39. Oh S, Park J and Gerla M (2008). E-ODMRP, Journal of Parallel and Distributed Computing, 68:8, (1044-1053), Online publication date: 1-Aug-2008.
  40. Yang C and Tseng L (2007). Fisheye zone routing protocol, Computer Communications, 30:2, (261-268), Online publication date: 1-Jan-2007.
  41. ACM
    Choi J, Won Y and Jung J TATR Proceedings of the 2007 international conference on Wireless communications and mobile computing, (260-265)
  42. ACM
    Daly E and Haahr M Social network analysis for routing in disconnected delay-tolerant MANETs Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, (32-40)
  43. ACM
    Ramírez C, Umaña S and Veiga M QoS and multipath routing in vehicular network Proceedings of the 2007 Euro American conference on Telematics and information systems, (1-7)
  44. ACM
    Abdullah J and Parish D Node connectivity index as mobility metric for GA based QoS routing in MANET Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology, (104-111)
  45. Lertvorratham S and Hiranvanichchakorn P Path selection strategies for multipath ad hoc network Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks, (164-170)
  46. Lai W, Hsiao S and Lin Y (2007). Adaptive backup routing for ad-hoc networks, Computer Communications, 30:2, (453-464), Online publication date: 1-Jan-2007.
  47. Younghwan Choi , Euisin Lee , Donghun Lee , Soochang Park , Fucai Yu and Sang-Ha Kim An Implicit Cluster-Based Overlay Multicast Protocol for Mobile Ad Hoc Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3507-3512)
  48. Jie Xiang , Samba Sesay , Yiming Wang and Jianhua He Ad Hoc Network State Aware Routing Protocol Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3746-3751)
  49. Akhlaq M, Jafri M, Khan M and Aslam B Data security key establishment in AODV Proceedings of the 6th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications, (181-186)
  50. Akhlaq M, Jafri M, Khan M and Aslam B Data security key establishment in AODV Proceedings of the 6th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications, (181-186)
  51. Shin K, Park K, Chung M and Choo H Energy efficient route discovery for mobile HCI in ad-hoc networks Proceedings of the 2007 conference on Human interface: Part II, (635-644)
  52. Shaukat K and Syrotiuk V Statistical monitoring to control a proactive routing protocol Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks, (46-58)
  53. Wang X, Tagashira S and Fujita S FDAR Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks, (186-197)
  54. Datcu D, Yang Z and Rothkrantz L A system for adaptive multimodal interaction in crisis environments Proceedings of the 2nd international conference on Usability and internationalization, (334-343)
  55. Kim M, Lee D and Eom Y Enhanced non-disjoint multi-path source routing protocol for wireless ad-hoc networks Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III, (1187-1196)
  56. Lee S and Kim K An effective local repair scheme using candidate node and hello message in AODV Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking, (105-114)
  57. Pirzada A, Datta A and McDonald C (2006). Incorporating trust and reputation in the DSR protocol for dependable routing, Computer Communications, 29:15, (2806-2821), Online publication date: 1-Sep-2006.
  58. ACM
    Wang Y, Chao C, Lin S and Chen W A distributed data caching framework for mobile ad hoc networks Proceedings of the 2006 international conference on Wireless communications and mobile computing, (1357-1362)
  59. ACM
    Peiyan Y and Layuan L Performance evaluation and simulations of routing protocols in ad hoc networks Proceedings of the 2006 workshop on Broadband wireless access for ubiquitous networking, (2-es)
  60. ACM
    Löffler J, Schon J and Köhler J SHARE Proceedings of the 2nd international conference on Mobile multimedia communications, (1-6)
  61. Pirzada A, McDonald C and Datta A (2006). Performance Comparison of Trust-Based Reactive Routing Protocols, IEEE Transactions on Mobile Computing, 5:6, (695-710), Online publication date: 1-Jun-2006.
  62. Shahbazi S, Ghassem-Sani G, Rabiee H, Ghanbari M and Dehghan M ADIAN Proceedings of the 8th international conference on Distributed Computing and Networking, (27-39)
  63. Osipov E and Tschudin C Evaluating the effect of ad hoc routing on TCP performance in IEEE 802.11 based MANETs Proceedings of the 6th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, (298-312)
  64. Pandey A, Ahmed M, Kumar N and Gupta P A hybrid routing scheme for mobile ad hoc networks with mobile backbones Proceedings of the 13th international conference on High Performance Computing, (411-423)
  65. Lee D and Kim K Fast IPv6 address auto-configuration using proxy for mobile environment Proceedings of the Third international conference on Ubiquitous Computing Systems, (414-427)
  66. ACM
    Leguay J, Friedman T and Conan V DTN routing in a mobility pattern space Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, (276-283)
  67. ACM
    Totaro M and Perkins D Using statistical design of experiments for analyzing mobile ad hoc networks Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, (159-168)
  68. ACM
    Ziane S and Melouk A A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, (55-62)
  69. Rrushi J Securing IPv6-Based mobile ad hoc networks through an artificial immune system Proceedings of the 16th Italian conference on Neural Nets, (346-354)
  70. Yu S and Zhou W A mesh based anycast routing protocol for ad hoc networks Proceedings of the Third international conference on Parallel and Distributed Processing and Applications, (927-932)
  71. Fourati A, Agha K and Claveirole T Securing OLSR routes Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks, (183-194)
  72. del Valle G and Gómez Cárdenas R Overview the key management in ad hoc networks Proceedings of the 5th international conference on Advanced Distributed Systems, (397-406)
  73. Shin S and Kwon T Efficient key agreement for merging clusters in ad-hoc networking environments Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (996-1005)
  74. Arias-Torres D and García-Macías J Performance analysis of two approaches to service discovery in mobile ad hoc networks Proceedings of the 5th international conference on Advanced Distributed Systems, (368-376)
  75. Chelius G, Jelger C, Fleury É and Noël T IPv6 addressing scheme and self-configuration for multi-hops wireless ad hoc network Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking, (489-498)
  76. Badonnel R, State R and Festor O Monitoring end-to-end connectivity in mobile ad-hoc networks Proceedings of the 4th international conference on Networking - Volume Part II, (83-90)
  77. Chen Y, Guo X, Zeng Q and Chen G An adaptive routing strategy based on dynamic cache in mobile ad hoc networks Proceedings of the Second international conference on Parallel and Distributed Processing and Applications, (357-366)
  78. ACM
    Untz V, Heusse M, Rousseau F and Duda A On demand label switching for spontaneous edge networks Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (35-42)
  79. ACM
    Theodorakopoulos G and Baras J Trust evaluation in ad-hoc networks Proceedings of the 3rd ACM workshop on Wireless security, (1-10)
  80. ACM
    Lin C, Dong H, Madhow U and Gersho A Supporting real-time speech on wireless ad hoc networks Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots, (11-20)
  81. ACM
    Gada D, Gogri R, Rathod P, Dedhia Z, Mody N, Sanyal S and Abraham A (2004). A distributed security scheme for ad hoc networks, XRDS: Crossroads, The ACM Magazine for Students, 11:1, (5-5), Online publication date: 1-Sep-2004.
  82. ACM
    Ping Y, Yan Y, Yafei H, Yiping Z and Shiyong Z Securing ad hoc networks through mobile agent Proceedings of the 3rd international conference on Information security, (125-129)
  83. ACM
    Al-Shurman M, Yoo S and Park S A performance simulation for route maintenance in wireless ad hoc networks Proceedings of the 42nd annual Southeast regional conference, (25-30)
  84. Yoneki E and Bacon J Content-Based Routing with On-Demand Multicast Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7, (788-793)
  85. Choudhary S, Gore M and Vyas O Path stability based adaptation of MANET routing protocols Proceedings of the 6th international conference on Distributed Computing, (198-203)
  86. Yang C and Chen C (2003). Reduction of the broadcast redundancy by location awareness in mobile ad hoc networks, Computer Communications, 26:18, (2082-2089), Online publication date: 1-Dec-2003.
  87. ACM
    Prigent N, Bidan C, Andreaux J and Heen O Secure long term communities in ad hoc networks Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, (115-124)
  88. Puttini R, Percher J, Mé L, Camp O, De Sousa R, Abbas C and García-Villalba L A modular architecture for distributed IDS in MANET Proceedings of the 2003 international conference on Computational science and its applications: PartIII, (91-113)
  89. Lu Y, Wang W, Zhong Y and Bhargava B Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
  90. Nagi K, Elghandour I and König-Ries B Mobile agents for locating documents in ad hoc networks Proceedings of the Second international conference on Agents and Peer-to-Peer Computing, (198-204)
  91. ACM
    Lau W, Kumar M and Venkatesh S A cooperative cache architecture in support of caching multimedia objects in MANETs Proceedings of the 5th ACM international workshop on Wireless mobile multimedia, (56-63)
  92. Pascoe J, Sunderam V, Loader R and Sibley G Towards Mobile Computational Application Steering Proceedings of the International Conference on Computational Science-Part II, (665-670)
  93. Zomaya A Mobile Computing Proceedings of the 16th International Parallel and Distributed Processing Symposium
  94. Kunz T Multicasting Handbook of wireless networks and mobile computing, (495-507)
  95. ACM
    Faragó A and Syrotiuk V Merit Proceedings of the 7th annual international conference on Mobile computing and networking, (53-60)
  96. Adaptive Approaches to Relieving Broadcast Storms in a Wireless Multihop Mobile Ad Hoc Network Proceedings of the The 21st International Conference on Distributed Computing Systems
  97. Lee S and Kim C Neighbor supporting ad hoc multicast routing protocol Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing, (37-44)
  98. Chang Y and Hsu C Connection-Oriented Routing in Ad Hoc Networks Based on Dynamic Group Infrastructure Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
  99. ACM
    Macker J and Corson M (1999). Mobile ad hoc networking and the IETF, ACM SIGMOBILE Mobile Computing and Communications Review, 3:1, (11-13), Online publication date: 1-Jan-1999.
  100. ACM
    Macker J and Corson M (1999). Mobile ad hoc networking and the IETF, ACM SIGMOBILE Mobile Computing and Communications Review, 3:3, (32-33), Online publication date: 1-Jul-1999.
  101. ACM
    Macker J and Corson M (1998). Mobile ad hoc networking and the IETF, ACM SIGMOBILE Mobile Computing and Communications Review, 2:4, (9-13), Online publication date: 1-Oct-1998.
  102. ACM
    Ko Y and Vaidya N Location-aided routing (LAR) in mobile ad hoc networks Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, (66-75)
Contributors

Recommendations