scispace - formally typeset
Open AccessBook

Ad Hoc Networking

TLDR
In this article, the authors present a series of technical papers about ad hoc networks from a variety of laboratories and experts, and explain the latest thinking on how mobile devices can best discover, identify, and communicate with other devices in the vicinity.
Abstract
Ad hoc networks are to computing devices what Yahoo Personals are to single people: both help individuals communicate productively with strangers while maintaining security. Under the rules of ad hoc networking--which continue to evolve--your mobile phone can, when placed in proximity to your handheld address book, establish a little network on its own and enable data sharing between the two devices. In Ad Hoc Networking, Charles Perkins has compiled a series of technical papers about networking on the fly from a variety of laboratories and experts. The collection explains the latest thinking on how mobile devices can best discover, identify, and communicate with other devices in the vicinity. In this treatment, ad hoc networking covers a broad swath of situations. An ad hoc network might consist of several home-computing devices, plus a notebook computer that must exist on home and office networks without extra administrative work. Such a network might also need to exist when the people and equipment in normally unrelated military units need to work together in combat. Though the papers in this book are much more descriptive of protocols and algorithms than of their implementations, they aim individually and collectively at commercialization and popularization of mobile devices that make use of ad hoc networking. You'll enjoy this book if you're involved in researching or implementing ad hoc networking capabilities for mobile devices. --David Wall Topics covered: The state-of-the-art in protocols and algorithms to be used in ad hoc networks of mobile devices that move in and out of proximity to one another, to fixed resources like printers, and to Internet connectivity. Routing with Destination-Sequenced Distance Vector (DSDV), Dynamic Source Routing (DSR), Ad hoc On-Demand Distance Vector (AODV), and other resource-discovery and routing protocols; the effects of ad hoc networking on bandwidth consumption; and battery life.

read more

Citations
More filters
Journal ArticleDOI

Self-configurable fault monitoring in ad-hoc networks

TL;DR: This paper proposes a fault monitoring approach for ad-hoc networks which takes into account this constraint, and defines a distributed monitoring scheme with several collaborative detection methods and detail a self-configuration mechanism based on the K-means classification algorithm.
Journal ArticleDOI

Quality of Service and Capacity in Constrained Intermittent-Connectivity Networks

TL;DR: This paper quantifies the resource-delay trade-off and the throughput capacity for intermittent-connectivity networks with quality of service restrictions such as limited communication bandwidth and uses the shared wireless infostation model as an example strategy.
Proceedings ArticleDOI

Time and message complexities of the generalized distributed mobility-adaptive clustering (GDMAC) algorithm in wireless multihop networks

TL;DR: The results show how many time steps and signaling messages are typically needed after a single topology change to re-achieve a stable and valid cluster structure and show that tuning the density of clusterheads and employing a hysteresis parameter for cluster changes can significantly improve the performance.
Journal ArticleDOI

MAC-SCC: a medium access control protocol with separate control channel for reconfigurable multi-hop wireless networks

TL;DR: The results show that MAC-SCC can effectively reduce the link failure probability, achieve fair medium access when running multiple TCP sessions, and yield a throughput gain up to 60% under high traffic load.
Journal ArticleDOI

Congestion control performance of R-DSDV protocol in multihop wireless ad hoc networks

TL;DR: The results demonstrate that a probabilistic control on message traffic based on local tuning of protocol parameters is feasible, and that R-DSDV outperforms the basic DSDV protocol by significantly reducing the average queue size associated with each mobile node and hence the average packet delay.