Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Ad-hoc networks

Keywords chemical sensors biosensors CWA BWA sensor nets wireless ad-hoc networks. [Pg.121]

Keywords Mobile ad-hoc networks Distributed sensor networks Secure routing Vulnerability Embedded systems Low-power design... [Pg.177]

The transition from desktop computing to embedded systems is associated with price, power and timing constrains. A special class embedded systems, termed distributed sensor networks (DSN), are characterized by extra requirements small size and sufficient battery lifetime. Distributed sensor networks can be alternatively labeled mobile ad-hoc networks (MANET). While the term DSN is associated with data acquisition applications, MANET emphasizes mobility and the lack of infrastructure. Distributed sensor networks can be scalable to thousands of nodes that cooperatively perform complex tasks. The interaction between the nodes is based on wireless communication [Kah 00, War 01, Hil 02], Wireless sensor networks (WSN) is yet another synonym. [Pg.177]

The table-driven protocols are alternatively labeled proactive [Mau 01]. The main idea behind the table-driven routing protocols is to create a clear picture of all available routes from each node to every other node in the network. As a result, each node has to maintain tables with routing information. Due to the dynamic nature of the wireless ad hoc networks, updates travel over the network to maintain a consistent topology scheme. [Pg.181]

The capacity of a wireless ad-hoc network for corrective actions in face of malicious attacks is defined by its energy signature. The energy spent for communication has a significant impact on the overall energy budget. Multihop communication not only brings down the power consumption, but... [Pg.189]

Den 02] Deng, Hongmei, Wei Li, and Dharma P. Agrawal, Routing security in wireless ad hoc networks, IEEE Communications Magazine, October, 2002, pp. 70-75. [Pg.190]

Hon 02] Hong, Xiaoyan, Kaixin Xu, and Mario Gerla, Scalable routing protocols for mobile ad hoc networks, IEEE Network, July/August, 2002, pp. 11-21. [Pg.191]

Mau 01] Mauve, Martin and Jorg Widmer, A survey on position-based routing in mobile ad hoc networks, IEEE Network, November/December, 2001, pp. 30-39. [Pg.191]

Fig. 3. Migration activity of a GA through a simple ad hoc network. Numbers represent Jumps value. Arrows with an X at the end mean the GA is killed. Fig. 3. Migration activity of a GA through a simple ad hoc network. Numbers represent Jumps value. Arrows with an X at the end mean the GA is killed.
Di Caro, G., Ducatelle, F., GambaxdeUa, L. AntHocNet an adaptive nature-inspired algorithm for routing in mobile ad hoc networks. Eur. Trans. Telecommun. 16, 443-455 (2005)... [Pg.143]

Ziane, S., Melouk, A. A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks. In Proceedings of the Q2SWinet, New York, pp. 55-62 (2005)... [Pg.144]

In 2003, Dr. Hasna joined the Department of Electrical Engineering at Qatar University as an assistant professor. Currently, he serves as the vice president and chief academic ofScer of Qatar University. His research interests span the general area of digital communication theory and its application to performance evaluation of wireless communication systems over fading channels. His current specific research interests include cooperative communications, ad hoc networks, cognitive radio, and network coding. [Pg.446]

Yu J, Pingyi Fan and Kai Cai, Capacity analysis of maximal flow in ad hoc networks. Proceedings of the IWCMC 06, July 3-6, Vancouver (2006). [Pg.125]

Jae-Joon Lee, Bhaskar Krishnamachari and C.-C Jay Kuo. (2007). Aging analysis in large-scale wireless sensor netwodts. Ad Hoc Networks, vol.6,no.7,p 1117-1133. [Pg.1568]

Jason L. Cook and Jose Emmanuel Ramirez-Marquez (2008). Reliability analysis of cluster-based ad-hoc networks. Reliability Engineering System Safety, vol. 93, issue 10, p 1512-1522. [Pg.1568]

An ad hoc network is a wireless network that is established without the aid of infrastructure or centralized... [Pg.2097]

Medium access control (MAC) for wireless ad hoc networks is currently a very active research topic. The characteristics of the network, the diverse physical-layer technologies available, and the range of services envisioned render a difficult task the design of an algorithm to disciphne the access to the shared medium that results efficient, fair, power consumption sensitive, and delay bound. A number of issues distinguish wireless MAC protocols from those used in wireline networks (Chandra, 2002), as quoted next. [Pg.2102]

From the above considerations, it is promptly inferred that the design of a MAC protocol for ad hoc networks requires a different set of parameters must be considered as compared with those of the wirehne... [Pg.2103]

Jurdak et al. (Jurdak, 2004), after conducting a survey and analysis of a number of current MAC protocol proposals, offer a set of key features that may be used in order to classify MAC protocols for ad hoc networks. [Pg.2103]

RTS/CTS handshake. Many MAC protocols for ad hoc networks use variants of the RTS/CTS handshake. The original three-way handshake minimizes both the hidden and exposed terminal problems. A terminal wishing to send data first senses the channel. If the channel is idle for the appropriate amount of time, the terminal sends a short request-to-send (RTS) packet. All terminals on hearing the RTS defer their transmissions. The destination responds with a clear-to-send (CTS) packet. All terminals on hearing the CTS also defer their transmissions. The sender, on receiving the CTS assumes the channel is acquired and initiates the data transmission. [Pg.2104]

Traffic load and scalability. Protocols are usually optimized for the worst expected scenario. Sparse node distribution and Hght traffic conditions do not pose a challenge for the implementation of ad hoc networks. The protocols are optimized for high traffic load, high node density, and/or real-time traffic, depending on the intended use. Protocols that offer the possibiHty of channel reservation are those with... [Pg.2104]

TCP is the prevalent transport protocol in the Internet today and its use over ad hoc networks is a certainty. This has motivated a great deal of research efforts aiming not only at evaluating TCP performance over ad hoc networks, but also at proposing appropriate TCP schemes for this kind of networks. TCP was originally... [Pg.2109]


See other pages where Ad-hoc networks is mentioned: [Pg.57]    [Pg.96]    [Pg.135]    [Pg.181]    [Pg.181]    [Pg.128]    [Pg.129]    [Pg.143]    [Pg.143]    [Pg.144]    [Pg.2]    [Pg.12]    [Pg.101]    [Pg.702]    [Pg.137]    [Pg.2005]    [Pg.2005]    [Pg.2097]    [Pg.2098]    [Pg.2098]    [Pg.2104]    [Pg.2109]    [Pg.2110]    [Pg.2110]    [Pg.2111]    [Pg.2112]    [Pg.2112]   
See also in sourсe #XX -- [ Pg.121 ]




SEARCH



Mobile Ad hoc NETwork

© 2024 chempedia.info