(495) 109 08 40
|Локальные и корпоративные сети Автор Supeng L. Издательство Книга по Требованию|
ImaHima Press Releases, s html» (1 March 2002). 34. Deborah Mendez-Wilson, «Users Turned to Pagers When Phone Lines Went Down in Crisis», Wireless Week, 24 September 2001, «http:// www.wirelessweek.com/index.asp?layout=story amp;articleId=CAl60205» (1 March 2002). 35. John Geirland, «Mobile Community», TheFeature.com, 24 September 2001, « (1 March 2002). 36. ENGwear: Wearable Wireless Systems for Electronic News Gathering, « (1 March 2002). 37. Mann and Niedzviecki, Cyborg, 175-176. 38. Hall, «Mobile Reporting». 39. Henry Jenkins, «Digital Renaissance», Technology Review, March 2002, « (24 February 2002). 40. Gerd Kortuem et al., «When Peer-to-Peer Comes Face-to-Face: Collaborative Peer-to-Peer Computing in Mobile Ad Hoc Networks», 2001 International Conference on Peer-to-Peer Computing (P2P2001), 27-29 August 2001, Linkoping, Sweden, « research/wearables/Papers/p2p2001.pdf» (6 March 2002). 41. T. G. Zimmerman, «Personal Area Networks: Near-Field In-trabody Communication», IBM Systems Journal 35, 3 amp;4 (1996), «http:// www.research.ibm.com/journal/sj/mit/sectione/zimmerman.html» (6 March 2002). 42. Kortuem et al., «When Peer-to-Peer Comes». 43 ...
|Investigating TCP Performance in Mobile Ad Hoc Networks|
This work proposes techniques to improve the performance of the most widely deployed TCP agents (i. e. the Reno, NewReno and SACK variants), ensures that all changes are implementable at the transport layer, and offers interoperability with traditional implementations.
|Performance Analysis of Mobile Ad Hoc Networks Security. Ad hoc, Performance, Security|
The performance of the standard and modified AODV protocol also studied in this work by considering some parameters that affect ad hoc network performance, which are mobility and number of nodes while communication process.
|Modeling and Performance Analysis of Mobile Ad Hoc Networks. Modeling and Simulation|
Since the release of the IEEE 802. 11 specification, many research efforts have been devoted to modeling the performance of this protocol.
|Broadcast Protocols in Mobile Ad Hoc Networks. A Generalized Technique|
Therefore, a generalized solution for broadcasting that accounts for the requirements of the various applications and adapts to the heterogeneous and evolving node spatial distribution and mobility is a major contribution.
|TCP Performance. in hybrid Mobile Ad Hoc Networks|
Internet connectivity situation and to evaluate TCP performance in a hybrid MANET where mobile nodes connect to a wired network through a gateway.
|Virtual Backbone Formation Algorithms for Mobile ad hoc Networks. Simulation-based Performance Evaluation|
Mobile ad hoc networks (MANETs) are created by the mobile computing devices on an ad hoc basis without any support provided by a pre-installed communications infrastructure.
|CLUSTER BASED PROTOCOLS FOR DISTRIBUTED APPLICATIONS A COMMUNICATION ARCHITECTURE FOR MOBILE AD HOC NETWORKS.|
Finally, an example resource management protocol which is a modified and scaled version of the Ricart-Agrawala algorithm implemented using the virtual ring structure is presented with the performance results.
|Security Protocols for Mobile Ad Hoc Networks|
|Energy-Efficient Multicast for Mobile Ad Hoc Networks. A research on developing a protocol to conserve energy in MANETs|
When we combine MANET and multicasting, we get a network, where each mobile node is connected in an ad hoc fashion and some of the mobile nodes form a cohesive group.
|Using Dominating Sets to Improve the Performance of ad hoc Networks. Enhancing Basic Communication Mechanisms in Mobile Ad Hoc Networks|
A Mobile ad hoc network (MANET) is a wireless network that does not rely on any fixed infrastructure (i. e. , routing facilities, such as wired networks and access points), and whose nodes must coordinate among themselves to determine connectivity and routing.
|Understanding and Improving Network Performance Through MAC Layer Design and MIMO Techniques Performance of Wireless Ad Hoc Networks.|
Approaching the design of these networks through the medium access control (MAC) layer, analytical expressions are derived for the outage probability, which is defined as the probability of receiving messages erroneously.
|PERFORMANCE OF WIRELESS AD HOC NETWORKS. WITH MULTI USER DETECTION AND ENERGY CONSERVATION|
In ad hoc networks messages are often relayed from source nodes to destination nodes along multi hops.
|RELIABLE MULTICASTING FOR MOBILE AD-HOC NETWORKS: Reliability over unreliable networks A NEW DIRECTION.|
The backbone infrastructure is constructed by using an algorithm that extract a d-hop dominating set and interconnect them to form a backbone.
|Video over Mobile Ad Hoc Networks. Power-Aware Routing in Wireless Ad Hoc Networks for Video Traffic|
While analyzing the performance of the WEAC protocol for video traffic, we find that the protocol can support upto 2 hops if H. 263 is used for video data compression and the number of hops reaches 4 H. 264 is used. Maximum power saving is achieved if the relaying node lies in the middle of source and destination node for HCB model.
|Fundamental Properties and Services Mobile Ad Hoc Networks from Theory to Practice.|
One example is wireless media access.
|Security in Mobile Ad Hoc Networks. Trust Establishment for Reliable Data Packet Delivery in Mobile Ad Hoc Networks|
This book introduces a trust establishment framework for MANETs, called Hermes, which aims to improve the reliability of packet forwarding over multi-hop routes in the presence of malicious nodes and to discourage selfish node behavior.
|Denial-Of-Service Resistant Quality-Of-Service Provisioning for Mobile Ad hoc Networks Quality-of-Service and Security in Mobile Ad hoc Networks.|
Mobile ad hoc networks (MANETs) are especially susceptible to a large class of denial-of-service (DoS) attacks due to the limitations of mobile devices and the wireless medium.
|Media Handling for Conferencing in Mobile Ad Hoc Networks. Media handling architectures for multimedia conferencing applications in Mobile Ad hoc NETworks (MANETs) and Multihop Cellular Networks (MCNs)|
We propose a self-organizing media handling architecture based on two overlay networks: one for mixing and one for control.
|Security in Mobile Ad hoc Networks Distributed Data Collection.|
Every node is running an own local IDS that provides data for the reputation calculation that is exchanged subsequently.
|Security and Privacy in Mobile Ad Hoc Networks. Key management and anonymous secure routing in large ad hoc networks|
More specifically, in terms of key management, the author investigates scalable key management protocols for large ad hoc networks by exploiting hierarchical network structures and cryptographical techniques.