CiComm: A Communication Protocol to Facilitate Ad Hoc Context Resources and Services Discovery
|
|
- Justina Jefferson
- 5 years ago
- Views:
Transcription
1 CiComm: A Communication Protocol to Facilitate Ad Hoc Context Resources and Services Discovery Qi Liu and Nigel Linge Q.Liu@pgr.salford.ac.uk, N.Linge@salford.ac.uk Informatics Research Institute, University of Salford Abstract In this paper, a novel context communication protocol (CiComm) is presented in order for each device within an ad hoc network to exchange context information stored within a Context information Database (CiB). The CiComm separates the process of communication into two phases such that context attributes and service parameters can be advertised proactively and retrieved on demand. A platform containing both CiB and CiComm is constructed in the NS2 environment; the simulation results of a particular scenario are analysed demonstrating the functionality of the CiComm. The CiComm, working with/underneath the CiB module offers a new approach to the discovery of context information in an ad hoc network. Index Terms Context Awareness, Services Discovery Protocol, Mobile Ad Hoc Networks C I. INTRODUCTION ONTEXT awareness has been under development since 1990s and applied in computer science relevant research areas, e.g. Human Computing Interface (HCI), Guidance applications, Pervasive Network Computing [1 4], etc. Different approaches are presented to recognise and represent context information including profiles [3], structured tuples [5], web semantic languages such as XML, OWL and RDF [6], abstract ontology representation [7,8], etc. Ad hoc networks have identical characters to traditional wireless networks (e.g. infrastructure-less), and therefore require specific needs on context storage, maintenance and exchange; these include a generic definition and a common model for context information in each node of an ad hoc network, as well as a protocol for the communication between these nodes. In this paper, a Context Communication Protocol (CiComm) is introduced along with the context information base (CiB) module [7, 8] to construct a platform for managing and sharing of context information in an ad hoc network. The next section of this paper reviews related literature relevant to the proposed protocol. In section 3, the details of the CiComm protocol are discussed, followed by the experimental results produced using the simulation tool, NS2 [12] in section 4. A conclusion and areas of further work are presented at the end. A. Context information Base II. RELATED WORK Context information Base (CiB) is an information base designed for the containment and management of context information in Mobile Ad Hoc Networks (MANET). The concept of CiB was first presented in [7] where a CiB retrieves, maintains and provides both local context information and remote information obtained from its direct neighbours. The introduction of CiB aims to offer rich information to nodes in an ad hoc network such that more appropriate decisions can be made under certain circumstances. Figure 1 supposes that two nodes in an ad hoc network have the same applications loaded. Their behaviour will be exactly the same in response to a common event. However, based on their own CiB, these nodes can now make their own independent decisions depending upon the context in which they are operating. Applications CiB x Figure 1: Nodes with CiBs integrated [7]. CiB y Direct calls CiB-referred calls Ad Hoc Environment Within a CiB, a generic table is designed where context information is defined as parameters and organised using reference numbers. Equally, every context parameter is indexed using more than one digit separated by one or more dot marks, e.g. the parameter Time has the reference number 2.1. In this way, all context parameters will be unique from others and together form a hierarchical tree to make grouping and tracing the context information convenient. The single-table design, however, suffers from disadvantages with regard to the redundancy of the table, the size of ISBN: PGNet
2 transmitted context information, and the complexity of maintenance of the table. Two Tables are therefore designed in a refined CiB model, CiSchma and CiData [8]. The former is used to maintain the structure of the context information; while the latter is used to store particular values of the context information. The separation of values of context information from their syntax and relations reduces the seriousness of the weaknesses in the single-table design. The schemas of the two tables are shown in Table 1. TABLE I SCHEMAS OF CIDATA AND CISCHEMA Tables Fields Description CiSchema CiData Refno (PK) Name Syntax Refno (PK) Value Reference number of the context information; the primary key of the table; Name of the context information; Data type of the context information; Same as in CiSchema; Actual values of the context information; B. Services Discovery Architecture and Protocols The development of the Internet has motivated the progress of conventional network services, which now focus on the provision of shared resources from a server, involving identification (allocation of IP addresses in DHCP servers, for example), authentication, services, etc. Additionally, with the emergence of wireless networks, new network protocols, technologies and architectures on services discovery and provision have been introduced to concentrate on the relationship between services and clients, and on the process of services sharing. Jini Network Technology [9] is a representation of network technologies that provide an open network environment for creating distributed services and/or components based on JAVA and JVM environments. As one of the core services, Lookup Service is designed in the Jini technology as the registrar of other services. It gets the proxies from Jini service providers and stores them in an internal directory. When a client requires a particular service, it seeks it in all connected Lookup Services. The Lookup Service that maintains the registration of the service will reply to the client. The process of the Lookup Service is shown in the Figure 2. The service proxy (Marked as P ) in this figure represents an instance of a network service, which contains the service s attributes, its communication parameters, methods, etc. A Look-up Service is designed as a network service directory or a service proxy table, where service proxies of network services can be registered and categorised. Once a client finds the preferred service proxy in the Look-up Service, he/she downloads this proxy and communicates with the original service directly. 4 Network Service 1 P Network Client Look-up Service Figure 2: The work flow diagram of Jini Lookup Service (source: Jini [9]) A Distributed Service Discovery Protocol (DSDV) is proposed in [12] to simulate a service discovery architecture in an ad hoc network. Two phases are designed involving Backbone Management phase (BBM) and Distributed Service Discovery phase (DSD). In the BBM phase, some of the ad hoc network nodes are selected as backbone nodes which have responsibilities to maintenance of topology changes, relationship with other backbone nodes, as well as the management of a Neighbourhood information Table (NIT) and a routing table. The definition of backbone nodes designates directories for other nodes so they can register their services (as servers) or request services (as clients) during the DSD phase. Other network technologies or models for services provision being researched include an Agent Network for Bluetooth Devices (ANBD) system, which has been built, where services are regarded as the smallest entities within an ANBD framework [10]. E-government services are also adapted in an ad-hoc manner [11], through which three-tier views have been designed to separate the existing e-government services and adapt the ubiquitous government services. III. CICOMM: THE CONTEXT COMMUNICATION PROTOCOL A. Protocol Position and its Relationship to others The CiComm protocol provides a new approach to communication of context information between nodes in an ad hoc network. As shown in Figure 3, it resides in the upper data link layer providing interfaces to the CiB module and the Logic Link Control (LLC) layer only. P 3 1. Register services 2. Look-up services 3. Download proxy 4. Communication 2
3 Figure 3: position of CiB and CiComm and relation to other protocols B. Packet Format Every packet transmitted in CiComm can be divided into a packet header and packet body. The length of a packet header is fixed to 13 bytes; its structure is shown as Figure bytes IP LL CiB_src CiB_dst Flag Figure 4: Packet header of CiComm UPPER APP MAC PHY CiB CiComm Packet Body cctype bctype cftype bits CiB_src and CiB_dst are 6 bytes respectively; they are the source and destination address of the device which initially sends and receives CiComm packets. In the implementation of CiB and CiComm in NS2, MAC addresses are employed as appropriate CiB addresses; therefore both addresses, though they are in different packet headers, match to each other in certain cases. Yet, CiB addresses differ from MAC addresses. First of all, CiB addresses are the identifier of context which is integrated within ad-hoc network nodes, so any form of addressing schemes, as well as MAC addressing, can be manipulated. Furthermore, the CiB address of a particular packet does not always match to the MAC one. If a CiComm packet is forwarded, its MAC source address will be replaced with the intermediate node s, whereas the CiB source will be kept the same. Also, if context information of a neighbour in a node is distributed through UPGRADE packets, the MAC source address is taken from the node, while the CiB source address is from the neighbour. The Flag field is a byte to carry necessary attributes of a CiComm packet, shown in Table 2. Full functionalities of each type of packets will be discussed in the Operation section. - cctype: identify the frame type of CiComm packets set by 4 bits; - bctype: identify the beacon type of CiComm packets, i.e. the Beacon_HeartBeat and the Beacon_Request; - cftype: identify if a packet is directly sent by the original node, or forwarded through an intermediate node. Flag Type cctype bctype cftype C. Operations TABLE II FLAG OF CICOMM PACKETS Packets Type Hexadecimal Value BEACON 0x1000 SHARE 0x0001 REQUEST 0x0010 REPLY 0x0011 UPGRADE 0x0100 Beacon_Heart_Beat 0x01 Beacon_Request 0x10 Direct 0x01 Forward 0x10 The process of communication of context information using the CiComm protocol has two phases; the Deployment Phase and the Retrieval Phase. No strict dependencies are set on either of the phases; that is either of two phases can be started without the completion of the other one. However, partial completion of the Deployment Phase in a node can cause its neighbours to fail to retrieve values of the node because of insufficient provision of the context information. The, Beacon_RQ and SHARE packets are transmitted in the Deployment Phase. A has no packet body and is generated periodically (e.g. the interval is set to once per second in NS2). When a is received, the host checks if the transmitter has been recorded in the local CiB; a Beacon_RQ will be replied if it has not. Once a Beacon_RQ packet is received, a SHARE packet containing all local context information and those of registered neighbours will be sent. By the end of Deployment Phase, each node will receive its active neighbour s sharing information. The Retrieval Phase aims to get exact values of particular context information from specified nodes and to then distribute this to other nodes. A REQUEST packet is generated to acquire detailed context information. In NS2, this enquiry can be raised by a Tcl script, an upper application or a random code based on the content of the local CiB. A REPLY packet is then generated with the requested value. The reception of the REPLY packet will update the CiB and generate UPGRADE packets to the nodes other neighbours. Figure 5 depicts a scenario in which two nodes have their context information deployed, retrieved and upgraded by a third node. Although the nodes are started and prepared at different times, the timeout interval ensures neighbours can hear from the host in time so as to start the Deployment Phase. In the Retrieval Phase, node A s context is requested and its value is returned to node B. This information is not only recorded in the CiData and CiSchema of node B, but sent to the third node as well.
4 Preparation Timeout Interval :: B :: {B} DEPLOYMENT RETRIEVAL CiB A A Beacon_RQ SHARE ({B} 3.1.1) Beacon_RQ SHARE ({A} 1.1.1, ) REQUEST ({A} ) CiB B B Preparation Beacon_RQ SHARE ({B} 3.1.1) :: A :: {A} 1.1.1, rd Device Preparation :: B :: {B} REPLY ({A} :75) CiSchema Upgraded: 1.3.1:: A :: A :: {A} 1.1.1, :: 75 UPGRADE ({A} ) :: B :: {B} 3.1.1, {A} Figure 5: CiComm Packets and the process of communication D. Platform Construction in NS-2 The CiB and CiComm protocol are simulated using NS2 [12]. A schematic of mobile nodes in an ad hoc network environment with the CMU monarch s wireless extensions is shown in Figure 6, where the platform of CiB and CiComm (though it s shown as CiB only) is integrated. As the figure demonstrates, the platform offers its interface (cib_) to the Logic Link only; meanwhile it gets instances from the Mobile Node, the Logic Link and the Mac for the purposes of context collection and addressing resolution. The platform applies the full features of CiB and CiComm to NS2 involving the construction of CiB in each node and both Deployment and Retrieval phases of CiComm. Additionally, more configuration settings are performed by the platform for the better integration to the NS2 environment; these include construction of the CiComm packet header, registration of the CiComm packet type, and initial parameters in CiB and CiComm. IV. EXPERIMENT RESULTS AND ANALYSIS A. Randomness in CiB & CiComm Simulations To present a fair simulation pattern and prevent simulation results from certain circumstance settings, randomness is employed in CiB and CiComm simulations; it includes: - random position and movement of nodes The positions of all nodes are designated randomly within a given area. Their movements during the simulation time also follow no order and are unpredictable. - random CiB loading and releasing time
5 Upper Apps Routing Model Entry_ Mobile Node target_ mhost_ Logic ll CiB mac_ Link cib_ Upper Apps Routing Model Entry_ Mobile Node target_ mhost_ ll Logic CiB cib_ Link mac_ IFq mac_ mac_ IFq MAC NetIF The CiB in each node is loaded and stopped at a different time. This exposes the potential problem that later switched/joined nodes may find it difficult or unable to share and request context information. - random selection of local context information and requirement of remote context information This setting prevents simulations on narrow scenarios (e.g. same context information requested, etc.). Furthermore, choosing the local context information by chance reduces the complexity in the process of preparing distinct information for every single node. B. Particular Scenario Simulation Radio Propagation Model Figure 6: Implementation of CiB and CiComm in NS2 Channel In this section, a CiB-integrated ad hoc network is simulated where 11 nodes are randomly placed in a 20 X 20 metre area. All nodes have the same communication range of 10 metres. Ten of them (numbered 1 to 10) are static at their initial positions; while Node 0 ([17.22, 19.62]) acts as a visitor getting through the network to the specified destination ([1.59, 1.35]) with continuous requirement of its neighbours positions (reference number 3.1.1). Figure 7 depicts the movement of Node 0 and the consequence changes in its CiB. In (a), the initial topology of the network is shown. Curved circles are drawn to show nodes communication range. The dashed line with an arrow at the end illustrates the moving trace of Node 0 and its destination. Six critical points are selected from the simulation based on the movement of Node 0; the alteration of the network topology and content of CiSchema in Node 0 at these moments is shown in Figure 7 (b) and (c). MAC Radio Propagation NetIF Model (a) (6.3s) (7.1s) (10.2s)
6 (12.5s) (14.1s) (16.1s) (b) (6.3s) (10.2s) (7.1s) (12.5s) (14.1s) (16.1s) (c) Figure 7: Simulation on a particular scenario with one wandering node. (a) initial topology; (b) changes at critical points; (c) changes of CiSchema in Node 0 at critical points. Through these snapshots, the process of Deployment and Retrieval Phase, as well as the removal of context information in Node 0 is demonstrated. At 6.3s, 7.1s and 10.2s, Node 0 enters the range of Node 3, Node 8, and Node 9 and 10 respectively, so their relevant context information is added correspondingly. Then at the moment of 12.5s, Node 6 and 7 are out of the range of Node 0 and therefore removed from the CiSchema of Node 0. After that, at 14.1s and 161s, Node 8 and Node 5 are removed from Node 0 since it leaves from them respectively. The context of Node 0 has been updated with its movement and the consequent change of its neighbours. V. CONCLUSION In this paper, a context information communication (CiComm) protocol is presented realising context discovery/provision in a CiB-based ad hoc network. As a protocol located in the Logic Link Control Layer, the CiComm has a common packet header through which key attributes of a packet are identified, including the source and destination address at CiB level, the type of a packet, etc. Two processing phases, Deployment Phase and Retrieval Phase, are defined for the communication of context information. The CiComm provides similar functionalities to a service discovery protocol (e.g. Jini). Both protocols focus at the information/data processing and aim to adapt to changes within a dynamic networking environment. However, they are also contrasted with each other. Jini has an infrastructure supported architecture (Lookup Service) and therefore is centralised. The CiComm on the other hand is infrastructure-less and purely distributed. The CiComm protocol, together with the CiB model is implemented in the NS2 simulation environment. According to the simulation results, the platform of CiComm and CiB offers the abilities of maintaining, advertising and acquiring context information. The completion of the simulation and its results also proves that the CiComm can provide an alternative way to share context information. The performance of the platform in terms of its response times and consumption of network bandwidth will be measured and evaluated as the next task. REFERENCES [1] Dey A., Understanding and Using Context, Personal Ubiquitous Comput. Vol 5, Issue 1, pp 4-7, [2] Abowd, G., et. al., Cyberguide: A mobile context-aware tool guide, ACM Wireless Networks, Vol 3, Issue 5, pp , [3] Battazzi, D., et al, Context Aware Middleware Solutions for Anytime and Anywhere Emergency assistance to elderly people. Communications Magazine, IEEE,Vol 44, Issue 4, pp 82-90, [4] Anind K. Dey, Masayasu Futakawa, Daniel Salber, and Gregory D. Abowd. The Conference Assistant: Combining Context-Awareness with Wearable Computing. In Proceedings of the 3 rd International Symposium on Wearable Computers (ISWC '99), pages 21-28, San Francisco, CA, October [5] Julien, C. and Roman, G., EgoSpaces: Facilitating Rapid Development of Context Aware Mobile Applications, Software Engineering, IEEE, Transactions on, Vol 32, Issue 5, pp , [6] Gold, R. and C. Mascolo. Use of context-awareness in mobile peer-to-peer networks. in Distributed Computing Systems, FTDCS Proceedings. The Eighth IEEE Workshop on Future Trends of [7] Liu, Q. and Prof. Linge, N., Context-Driven Ad-Hoc Networks, doctoral consortium of the 12th international Conference on Natural Language Applications to Information Systems, [8] Liu, Q. and Prof. Linge, N., Context-Driven Ad-Hoc Networks, PGNET 2007, 8 th Postgraduate Symposium on the Convergence of Telecommunication, Networking and Broadcasting, June [9] Jini Network Technology, last access: 20 April [10] Chiu, D. K. W., et al., Towards Ubiquitous Government Services through Adaptations with Context and Views in a Three-Tier Architecture, in the System Sciences, HICSS th Annual Hawaii International Conference on, p94, [11] Yu, Z., et al., Supporting Context-Aware Media Recommendations for Smart Phones, Pervasive Computing, IEEE, Vol 5, Issue 3, pp68 75, [12] The Network Simulator 2, last access: 21 April 2008.
A novel platform for context maintenance and discovery in a ubiquitous environment
A novel platform for context maintenance and discovery in a ubiquitous environment Liu, Q and Linge, N http://dx.doi.org/10.1109/euc.2008.100 Title Authors Type URL Published Date 2008 A novel platform
More informationA Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols
International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao
More informationAnalysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network
Analysis and Comparison of and Protocol in Wireless Sensor Network C.K.Brindha PG Scholar, Department of ECE, Rajalakshmi Engineering College, Chennai, Tamilnadu, India, brindhack@gmail.com. ABSTRACT Wireless
More informationSIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks
SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationAdvanced Network Approaches for Wireless Environment
Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk
More informationSTUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 155-158 STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS Monika ABSTRACT: In Many wireless
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationAnalysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group
More informationPerformance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationA COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE
More informationA Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks
A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,
More informationAN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS Ge Ma and Dongyu Qiu Department of Electrical and Computer Engineering Concordia University, Montreal, QC, Canada tina0702@gmail.com,
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationA Comparative Analysis of Pro-active Routing Protocols in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.144
More informationA deployment procedure for wireless sensor networks
A deployment procedure for wireless sensor networks Tzu-Che Huang, Hung-Ren Lai and Cheng-Hsien Ku Networks and Multimedia Institute, Institute for Information Industry tzuche@nmi.iii.org.tw Abstract Since
More informationSome Ad Hoc Network Characteristics Effects on the Performance of On-Demand Routing Protocols
Inf. Sci. Lett. 2, No. 2, 69-75 (2013) 69 Information Sciences Letters An International Journal http://dx.doi.org/10.12785/isl/020204 Some Ad Hoc Network Characteristics Effects on the Performance On-Demand
More informationSTUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK
STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationPerformance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks
, pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh
More informationAnalysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator
Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Ashika R. Naik Department of Electronics & Tele-communication, Goa College of Engineering (India) ABSTRACT Wireless
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationGeospatial Information Service Based on Ad Hoc Network
I. J. Communications, Network and System Sciences, 2009, 2, 91-168 Published Online May 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Geospatial Information Service Based on Ad Hoc Network Fuling
More informationPerformance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols
Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.
More informationPerformance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationMulti-Tier Mobile Ad Hoc Routing
Multi-Tier Mobile Ad Hoc Routing Bo Ryu Tim Andersen Tamer Elbatt Network Analysis and Systems Dept. HRL Laboratories, LLC. Malibu, CA, USA. {ryu,cellotim,telbatt}@wins.hrl.com Abstract We present a new
More informationAppointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks
Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University
More informationPerformance analysis of aodv, dsdv and aomdv using wimax in NS-2
Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers
More informationAN EFFICIENT POWER CONTROLLED ROUTING IN MANETs
AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs R. Madhanmohan Assistant Professor, Department of Computer Science and Engineering, Annamalai University, Annamalai nagar, Tamilnadu, India ABSTRACT A MANET
More informationInvolving tourism domain experts in the development of context-aware mobile services
Involving tourism domain experts in the development of context-aware mobile services David Martín a, Diego López de Ipiña b, Carlos Lamsfus a and Aurkene Alzua a a Human Mobility and Technology CICtourGUNE
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationLow Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks
Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and
More informationMANET With ADMEN SIMULATION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationPerformance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela
Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,
More informationSIP-Based Multimedia Services Provision in Ad Hoc Networks
SIP-Based Multimedia Services Provision in Ad Hoc Networks Y. Rebahi, D. Sisalem, U. Depirianto Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 31 10589 Berlin, Germany {rebahi, sisalem, depirianto}@fokus.fraunhofer.de
More informationA Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks
A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,
More informationA STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS
A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS M.KRISHNAMOORTHI 1 Research Scholar in PG and Research Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India Krishnasmk004@hotmail.com
More informationPerformance of DSDV Protocol over Sensor Networks
Performance of DSDV Protocol over Sensor Networks Khushboo Tripathi, Tulika Agarwal and S. D. Dixit Department of Electronics and Communications University of Allahabad, Allahabad-211002, India Khushboo83@live.com
More informationPerformance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols
www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan
More informationEffect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols
Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy
More informationII. ROUTING CATEGORIES
ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses
More informationDynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet
African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing
More informationA New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm
A New Approach for Energy Efficient in MANETs Using Multi Objective Genetic Algorithm Neha Agarwal, Neeraj Manglani Abstract Mobile ad hoc networks (MANET) are selfcreating networks They contain short
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationSimulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
More informationArvind Krishnamurthy Fall 2003
Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems
More informationAWERProcedia Information Technology & Computer Science
AWERProcedia Information Technology & Computer Science Vol 03 (2013) 1424-1429 3 rd World Conference on Information Technology (WCIT-2012) Comparison of routing protocols in mobile ad-hoc wireless networks
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationAMRIS: A Multicast Protocol for Ad hoc Wireless Networks
of AMRIS: A Multicast Protocol for Ad hoc Wireless Networks C.W. Wu, Y.C. Tay National University of Singapore wuchunwei@alum.comp.nus.edu.sg,tay@acm.org Abstract This paper introduces AMRIS, a new multicast
More informationEFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN MULTICHANNEL MOBILE ADHOC NETWORKS
EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN Bhurewal, Prof. Ms. Sujata G. Tuppad, Journal Impact Factor (215): 8.9958 (Calculated by GISI) MULTICHANNEL MOBILE ADHOC NETWORKS Mayur N. Bhurewal 1, Prof.
More informationOPAX - An Open Peer-to-Peer Architecture for XML Message Exchange
OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange Bernhard Schandl, University of Vienna bernhard.schandl@univie.ac.at Users wishing to find multimedia material about interesting events
More informationAdaptive Data Dissemination in Mobile ad-hoc Networks
Adaptive Data Dissemination in Mobile ad-hoc Networks Joos-Hendrik Böse, Frank Bregulla, Katharina Hahn, Manuel Scholz Freie Universität Berlin, Institute of Computer Science, Takustr. 9, 14195 Berlin
More informationPerformance Evaluation of MANET through NS2 Simulation
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationRouting Protocols in Mobile Ad-Hoc Network
International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana
More informationAN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS
AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS Pardeep Saini* Computer sci. & engg. & YIET Ravinder Chouhan Computer sci.engg. & YIET Abstract - An adhoc network is a collection of
More informationLocation Awareness in Ad Hoc Wireless Mobile Neworks
Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,
More informationArchitecture of EHARP Routing Protocols in Ad Hoc Wireless Networks
2009 International Conference on Intelligent Networking and Collaborative Systems Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks Saud Al otaibi Software Technology Research Laboratory
More informationROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS
ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile
More informationMobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading
Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput
More informationEffects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks
Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi
More informationPerformance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack
Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Rozy Rana 1, Kanwal Preet Singh 2 1 Department of Computer Engineering, Master of Engineering, UCOE, Punjabi University
More informationConsiderable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)
Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationAshish Srivastava Information Technology, Rajkiya Engineering College, Azamgarh, India
Simulation based performance of AODV (Reactive) and DSDV (Proactive) routing protocol for MANET Ashish Srivastava Information Technology, Rajkiya Engineering College, Azamgarh, India Abstract Mobile Ad
More informationAd Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime
247 Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime acde b Graduate School of Informatics, Tokyo University of Information
More informationCOMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS
COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS Er. Upasana garg 1, Dr. Vikram Singh 2 1 Student, Computer Science and Application Deptt, CDLU, Sirsa, Haryana, India,upasna.garg44@gmail.com
More informationESAR: An Energy Saving Ad Hoc Routing Algorithm for MANET
: An Energy Saving Ad Hoc Routing Algorithm for MANET Utkarsh 1, Mukesh Mishra 2 and Suchismita Chinara 3 Department of Computer Science and Engineering, National Institute of Technology Rourkela, Rourkela,
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationPacket Routing using Optimal Flooding Protocol in Cluster based MANET
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 09 March 2016 ISSN (online): 2349-784X Packet Routing using Optimal Flooding Protocol in Cluster based MANET S.Bavani V.Aiswariya
More information1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks
More informationFigure 1: Ad-Hoc routing protocols.
Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca
More informationIssues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study
Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American
More informationPerformance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV
MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through
More informationGateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario
Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,
More informationMeasure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach
ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.
More informationMiddle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET
Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET 1 Prashant Dixit* Department of CSE FET, Manavrachna international institute of research
More informationPerformance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks
Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Dimitri Marandin 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" 27.-28. July 2004 www.ifn.et.tu-dresden.de/tk/
More informationIP Paging Considered Unnecessary:
IP Paging Considered Unnecessary: Mobile IPv6 and IP Paging for Dormant Mode Location Update in Macrocellular and Hotspot Networks James Kempf DoCoMo USA Communications Labs 181 Metro Drive, Suite 3 San
More informationGateway Discovery Algorithm for Ad-Hoc Networks Using HELLO Messages
Gateway Discovery Algorithm for Ad-Hoc Networks Using HELLO Messages Matthias Rosenschon a, Tilmann Mänz a, Joachim Habermann a, Veselin Rakocevic b a FH-Giessen-Friedberg, University of Applied Sciences,
More informationA Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network
A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationINTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH VOLUME 5, ISSUE 3, MARCH-2014 ISSN
657 Performance Evaluation of DDSR via NS- 3 Simulation using RSU s in Vehicular Network Abhay Deep Seth, Ankit Khare Abstract: - Mobile Ad hoc Networks (MANET) are wireless networks without an infrastructure,
More informationImproved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique
Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Vijay J Parmar Department of Computer Engineering,Sarvajanic College of Engineering and Technology Surat, Gujrat (India),E-mail
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN
International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob
More informationStudy on Ontology-based Multi-technologies Supported Service-Oriented Architecture
International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Study on Ontology-based Multi-technologies Supported Service-Oriented Architecture GaiHai Li a, Gang Huang
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationRelative Performance Analysis of Reactive (on-demand-driven) Routing Protocols
Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols Mukesh Kumar Garg, Dr. Ela Kumar Abstract A Mobile Ad Hoc Network (MANET) is a group of wireless mobile computers (or nodes);
More information2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationMobile host protocols support host
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2000; 10:191 214 Location update and routing scheme for a mobile computing environment By Anna Hać Ł and Yujing Huang We present a new hierarchical
More informationA Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:239-7242 Volume 4 Issue 7 July 205, Page No. 3422-3425 A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc
More informationANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET)
ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) DWEEPNA GARG 1 & PARTH GOHIL 2 1,2 Dept. Of Computer Science and Engineering, Babaria Institute of Technology, Varnama, Vadodara, India E-mail
More informationIEEE Assisted Network Layer Mobility Support
IEEE802.21 Assisted Network Layer Mobility Support Qazi Bouland Mussabbir *, Wenbing Yao ** and John Cosmas *** *School Of Engineering and Design, Brunel University Uxbridge, London, UB83PH, UK, qazi.mussabbir@brunel.ac.uk
More informationMobile Communications. Ad-hoc and Mesh Networks
Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between
More information