scispace - formally typeset
Open AccessBook

Ad Hoc Networking

Reads0
Chats0
TLDR
In this article, the authors present a series of technical papers about ad hoc networks from a variety of laboratories and experts, and explain the latest thinking on how mobile devices can best discover, identify, and communicate with other devices in the vicinity.
Abstract
Ad hoc networks are to computing devices what Yahoo Personals are to single people: both help individuals communicate productively with strangers while maintaining security. Under the rules of ad hoc networking--which continue to evolve--your mobile phone can, when placed in proximity to your handheld address book, establish a little network on its own and enable data sharing between the two devices. In Ad Hoc Networking, Charles Perkins has compiled a series of technical papers about networking on the fly from a variety of laboratories and experts. The collection explains the latest thinking on how mobile devices can best discover, identify, and communicate with other devices in the vicinity. In this treatment, ad hoc networking covers a broad swath of situations. An ad hoc network might consist of several home-computing devices, plus a notebook computer that must exist on home and office networks without extra administrative work. Such a network might also need to exist when the people and equipment in normally unrelated military units need to work together in combat. Though the papers in this book are much more descriptive of protocols and algorithms than of their implementations, they aim individually and collectively at commercialization and popularization of mobile devices that make use of ad hoc networking. You'll enjoy this book if you're involved in researching or implementing ad hoc networking capabilities for mobile devices. --David Wall Topics covered: The state-of-the-art in protocols and algorithms to be used in ad hoc networks of mobile devices that move in and out of proximity to one another, to fixed resources like printers, and to Internet connectivity. Routing with Destination-Sequenced Distance Vector (DSDV), Dynamic Source Routing (DSR), Ad hoc On-Demand Distance Vector (AODV), and other resource-discovery and routing protocols; the effects of ad hoc networking on bandwidth consumption; and battery life.

read more

Citations
More filters
Proceedings ArticleDOI

Simulation-Based Performance Comparison of VANETs Backbone Formation Algorithms

TL;DR: A simulation-based comparison between the performance of these algorithms is conducted using the ns2 network simulator, and the effect of mobility rate and network size on theperformance of each algorithm is investigated.
Proceedings ArticleDOI

An empirical review on the spray and wait based algorithms for controlled replication forwarding in delay tolerant networks

TL;DR: An empirical analysis was performed to compare and evaluate the basic Spray and Wait algorithms with some major improvements and shows that in terms of delivery ratio and average delay `Composite Methods to improve spray and Wait' outperforms all the other variants compared.
Posted Content

A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense Mobile Ad Hoc Networks

TL;DR: In this paper, a novel Grid Based Dynamic Energy Efficient Routing (GBDEER) approach is proposed to construct an energy efficient path from source to destination based on grid area, where each grid will have three different levels of transmission power.
Proceedings ArticleDOI

A High Capacity Scalable Routing Protocol for VoIP in Wireless Ad Hoc Networks

TL;DR: A new routing protocol for Wireless Ad hoc Networks specifically designed for VoIP, designed to deliver two key attributes that hitherto are not simultaneously present in any other single ad hoc routing protocol, which maximizes VoIP capacity whilst remaining scalable.
Book ChapterDOI

Security Assessment of SAODV Protocols in Mobile Ad hoc Networks

TL;DR: This paper assess and compare the security of Ad hoc on demand Distance Vector routing protocol and Secure Ad hoc On demand Distance vector routing protocol under different types of routing attack like blackhole and Replay attack.