Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A survey on DHT-based routing for large-scale mobile ad hoc networks
Abid S., Othman M., Shah N. ACM Computing Surveys47 (2):1-46,2014.Type:Article
Date Reviewed: Dec 8 2014

Mobile ad hoc networks (MANETs) are critical in the mobile era. There are more and more people using mobile networks, meaning more and more nodes coexist in a MANET. Therefore, designing and evaluating scalable network routing protocols among these mobile nodes becomes extremely critical. This paper provides a survey for the current state of the art of one category of routing protocols in MANETs: distributed hash table-based routing.

The related works and introduction sections are tutorial-like and straightforward. The authors first introduce two different categories of routing protocols for MANETs: flat/hierarchical routing and geographic position-based routing. The authors then introduce the DHT-based routing protocols. In the past few years, distributed hash tables have become a popular underlying mechanism in the design of next-generation networks. Researchers have used DHTs in MANETs to realize more efficient and scalable routing protocols. The introduction part is satisfactory in the sense that it makes this work interesting even for non-experts in the field.

Because the design of DHT-based routing protocols in MANETs is a hot topic, there have already been some evaluations and surveys of it. However, this paper presents the fine-grained classification of DHT-based routing protocols. In each specific DHT-based routing protocol, the authors present detailed information on how the protocol uses DHT. Readers can find almost all of the DHT-based routing protocols for MANETs in the past ten years. The authors are able to summarize the contributions and limitations of each protocol discussed. For example, 3D-RP is “designed to address the mismatch problem” in MANETs. However, it is only “designed for networks with low mobility” because it “does not address the network partitioning and merging problem.”

The organization of the paper is somewhat flawed because section 2 is too long and not well sectioned. All DHT-based protocols are mixed together in a long section without sub-sections, making it hard for readers to read about each protocol clearly.

In summary, this paper is a good survey of the current state of the art. The authors show a good understanding of DHT-based protocols in MANETs, and they are able to comment accurately on the pros and cons of previous work.

Reviewer:  Lin Xue Review #: CR142990 (1503-0227)
Bookmark and Share
 
Network Protocols (C.2.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Network Protocols": Date
An implementation of an automated protocol synthesizer (APS) and its application to the X.21 protocol
Ramamoorthy C. (ed), Dong S., Usuda Y. IEEE Transactions on Software Engineering SE-11(9): 886-908, 1985. Type: Article
Apr 1 1986
From state machines to temporal logic: specification methods for protocol standards
Schwartz R., Melliar-Smith P.  The analysis of concurrent systems (, Cambridge,651985. Type: Proceedings
Aug 1 1986
Reaching approximate agreement in the presence of faults
Dolev D., Lynch N., Pinter S., Stark E., Weihl W. Journal of the ACM 33(3): 499-516, 1986. Type: Article
Aug 1 1988
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy