Mobile ad hoc networks
read more
Citations
Performance comparison of two on-demand routing protocols for ad hoc networks
Performance comparison of two on-demand routing protocols for ad hoc networks
Mobile ad hoc networking: imperatives and challenges
Loop-free hybrid single-path/flooding routing algorithms with guaranteed delivery for wireless networks
Mobile ad hoc networking: milestones, challenges, and new research directions
References
Ad hoc On-Demand Distance Vector (AODV) Routing
Low-power CMOS digital design
Securing ad hoc networks
Business Models for Electronic Markets
Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations
Related Papers (5)
Frequently Asked Questions (17)
Q2. What have the authors stated for future works in "[book title], edited by [editor’s name]" ?
For example, applications devoted to study and enhance the social interaction among people, and facilitate their daily life ; as well as applications based on models similar to the business model of citizen band, amateur radio, and talkie-walkie systems, where multi-hop wireless communications allow voice and data messaging among all users.
Q3. What is the solution space for mobile ad-hoc networks?
The solution space ranges from hierarchical cell structures (a selforganized pendant of cellular networks) to completely ad-hoc, stochastic allocations.
Q4. What is the common type of Bluetooth technology?
The Bluetooth technology that is designed to support delay sensitive applications (such as voice traffic) beyond data traffic adopts a (implicit) tokenbased access method.
Q5. What is the prominent example of a system enabling federations of services and clients?
Current schemes on the network layer are incorporated in Bluetooth and related technologies [8], whereas on the services layer Jini [31] is the most prominent example of a system enabling federations of services and clients.
Q6. What is the main issue in cluster-based algorithms?
In cluster-based algorithms, one of the main issues is the determination of the clusters and, consequently, of the clusterheads in such a way that the reconfigurations of the network topology are minimized.
Q7. What is the widely accepted solution for the public key management problem?
The most widely accepted solution for the public key management problem is based on public key certificates that are issued by (online) certification authorities and distributed via (online) key distribution servers.
Q8. What is the function of a unit that can listen to a channel to find a?
A unit can periodically listen to the channel to find a page message, by tuning its receiver on to the frequencies of the paging hopping sequence.
Q9. What are some possible commercial examples of ad-hoc networks?
Applications such as rescue missions in times of natural disasters, law enforcement operation, commercial and educational use, and sensor networks are just few possible commercial examples.
Q10. What is the main reason why mobile ad-hoc networks are affected by higher loss rates?
Mobile ad-hoc networks are affected by higher loss rates, and can present higherdelays and jitter than fixed networks due to the wireless transmission.
Q11. What is the importance of a well-designed architecture for mobile ad-hoc networks?
A well-designed architecture for mobile ad-hoc networks involves all networking layers, ranging from the physical to the application layer.
Q12. What is the basic access method in the IEEE 802.11 MAC protocol?
The basic access method in the IEEE 802.11 MAC protocol is the Distributed Coordination Function (DCF) which is a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) MAC protocol.802.11 can be used to implement either an infrastructure-based W-LAN architecture or an ad-hoc W-LAN architecture (see Figure 3).
Q13. What is the advantage of combining both proactive and reactive approaches?
As previously stated, some protocols can combine both proactive and reactive characteristics, in order to benefit from the short response time provided by the proactive approach under route request and to limit the control overhead as in reactive protocols.
Q14. What are the challenges of extending IP internetworking for seamless operation over wireless communication technologies?
Extending IP internetworking for seamless operation over wireless communication technologies challenges present performance requirements of network protocols and applications, especially if wireless technologies evolve to become a significant part of the infrastructure [47].
Q15. What are the main challenges of designing a wide-area mobile ad-hoc network?
Designing protocols that scale to very large wireless networks remains among the main challenges of research in this field, and there are several factors that distinguish protocols for realizing a wide-area mobile ad-hoc network with different peculiarities, as explained in Section 4.
Q16. What is the definition of ad-hoc networks?
As stated above, ad-hoc networks can be considered small networks (up to hundreds of routers [40]), where the nodes are typically IP routers with a large computing capacity.
Q17. What are some of the technologies that can be used for ad-hoc networks?
The authors presented an overview of some MAC layer technologies that can be used for ad-hoc networks, as well as the Internet-based approach and a human-based approach to routing.