Ad hoc On-Demand Distance Vector Routing [AODV]:
- This protocol specification uses conventional meanings for capitalized words such as MUST, SHOULD, etc., to indicate requirement levels for various protocol features.
- A broadcast packet may not be blindly forwarded, but broadcasting is useful to enable dissemination of AODV messages throughout the ad hoc network.
- In AODV routing protocol messages, sequence number is used by other nodes to determine the freshness of the information contained from the originating node.
- AODV can handle low, moderate, and relatively high mobility rates, as well as a variety of data traffic levels.
- AODV is designed for use in networks where the nodes can all trust each other, either by use of preconfigured keys, or because it is known that there are no malicious intruder nodes.
- AODV has been designed to reduce the dissemination of control traffic and eliminate overhead on data traffic, in order to improve scalability and performance.
- AODV depends on each node in the network to own and maintain its destination sequence number to guarantee the loop-freedom of all routes towards that node.
- When a node receives an AODV control packet from a neighbor, or creates or updates a route for a particular destination or subnet, it checks its route table for an entry for the destination.
- In AODV, any node acts on only the first RREQ with the same RREQ ID and ignores any subsequent RREQs.
- Because AODV should operate smoothly over wired, as well as wireless, networks, and because it is likely that AODV will also be used with multiple wireless devices, the particular interface over which packets arrive must be known to AODV whenever a packet is received.
- In some configurations, an ad hoc network may be able to provide connectivity between external routing domains that do not use AODV.
- Performance of the AODV protocol is sensitive to the chosen values of these constants, which often depend on the characteristics of the underlying link layer protocol, radio technologies etc.
- AODV control messages must be protected by use of authentication techniques, such as those involving generation of un forgeable and cryptographically strong message digests or digital signatures.
- AODV control messages can have extensions.