scispace - formally typeset
Open AccessBook

Ad Hoc Networking

Reads0
Chats0
TLDR
In this article, the authors present a series of technical papers about ad hoc networks from a variety of laboratories and experts, and explain the latest thinking on how mobile devices can best discover, identify, and communicate with other devices in the vicinity.
Abstract
Ad hoc networks are to computing devices what Yahoo Personals are to single people: both help individuals communicate productively with strangers while maintaining security. Under the rules of ad hoc networking--which continue to evolve--your mobile phone can, when placed in proximity to your handheld address book, establish a little network on its own and enable data sharing between the two devices. In Ad Hoc Networking, Charles Perkins has compiled a series of technical papers about networking on the fly from a variety of laboratories and experts. The collection explains the latest thinking on how mobile devices can best discover, identify, and communicate with other devices in the vicinity. In this treatment, ad hoc networking covers a broad swath of situations. An ad hoc network might consist of several home-computing devices, plus a notebook computer that must exist on home and office networks without extra administrative work. Such a network might also need to exist when the people and equipment in normally unrelated military units need to work together in combat. Though the papers in this book are much more descriptive of protocols and algorithms than of their implementations, they aim individually and collectively at commercialization and popularization of mobile devices that make use of ad hoc networking. You'll enjoy this book if you're involved in researching or implementing ad hoc networking capabilities for mobile devices. --David Wall Topics covered: The state-of-the-art in protocols and algorithms to be used in ad hoc networks of mobile devices that move in and out of proximity to one another, to fixed resources like printers, and to Internet connectivity. Routing with Destination-Sequenced Distance Vector (DSDV), Dynamic Source Routing (DSR), Ad hoc On-Demand Distance Vector (AODV), and other resource-discovery and routing protocols; the effects of ad hoc networking on bandwidth consumption; and battery life.

read more

Citations
More filters
Journal ArticleDOI

Beyond ubiquitous computing: The Malaysian HoneyBee project for Innovative Digital Economy

TL;DR: The design of the target computational platform as well as the conceptual framework for the HoneyBee project are presented, which aims for the developed platform to act as the building block for an ensemble environment, upon which higher level applications could be built.
Proceedings ArticleDOI

WiMob Proactive and Reactive Routing Protocol Simulation Comparison

TL;DR: Simulation-based comparison of on-demand routing protocols in multi ad hoc networks shows that throughput for OLSR is 10% higher than AODV and delay in OLSS is 70% lower in a non-mobile environment, however, mobility impacts the link state routing protocol performance, it degrades the O LSR throughput and delay 5 times as compare to A ODV.
Proceedings ArticleDOI

Performance of Three Routing Protocols in UWB Ad Hoc Network Deployed in an Industrial Application

TL;DR: In this evaluation, the effects of multi-hop, data rate, and scalability on routing performance of AODV, DSR and OLSR are investigated and two basic approaches to design a routing protocol suitable to the proposed network scenario are specified.
Proceedings ArticleDOI

Randomized Initialization of a Wireless Multihop Network

TL;DR: In this paper, the authors considered a wireless multihop network where n nodes are randomly thrown in a square X, uniformly and independently, and designed a randomized protocol running in expected time O(n 3/2 + log 2 n) for the initialization problem.
Proceedings ArticleDOI

Multicast service discovery profiles for deployment within dynamic edge networks

TL;DR: This paper discusses the service discovery design extensions leveraging improved multicast capabilities in multi-hop, wireless networks, and indicates that a one-size-fits all profile is not practical and that a flexible means of deploying specific discovery profiles for different applications is needed to optimize performance.