Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Challenges in Ad Hoc Networking -

Challenges in Ad Hoc Networking (eBook)

Fourth Annual Mediterranean Ad Hoc Networking Workshop, June 21-24, 2005, Ile de Porquerolles, France
eBook Download: PDF
2006 | 1. Auflage
440 Seiten
Springer US (Verlag)
978-0-387-31173-9 (ISBN)
128,35 € (CHF 125,40)
Systemvoraussetzungen
115,15 € (CHF 112,50)
Systemvoraussetzungen
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Computer Communication Networks - Short description currently not available.
This book contains the refereed proceedings of the Fourth Annual Mediterranean Ad Hoc Networking Workshop, Med-Hoc-Net 2005. After Sardinia (Italy), Mahdia (Tunisia), Bodrum (Turkey), the workshop took place this year on the beautiful island, fle de Porquerolles (France). The Med-Hoc-Net 2005 event consolidates the success of the previous editions of the workshop series. It aims to serve as a platform for researchers from academia, research, laboratories and industry from all over the world to share their ideas, views, results and experiences in the field of ad hoc networking. This year, 73 papers were submitted. We accepted 39 papers as full papers and 10 papers as short papers. Each full paper consists in 10 pages in these proceedings and was presented orally at the workshop whereas each short paper consists in 5 pages in these proceedings and was presented as a poster at the workshop. The selected papers were grouped according to the following topics: Physical and MAC layers, Power Consumption, Quality of Service, Routing, Connectivity, Optimization and Testbeds, Multicast and Broadcast, Clustering, Sensor networks, Auto-organization and Adaptation, Security and Evolution and finally Analysis. The accepted papers came from all over the world, mainly from diverse countries in Europe, but also from USA, Brazil, Tunisia, China and Taiiwan. We thank all authors for submitting their papers to Med-Hoc-Net 2005. For each paper, we provided two reviews (sometimes three reviews).

Contents 6
Preface 11
WIRELESS TRANSMISSIONS WITH COMBINED GAIN RELAYS OVER FADING CHANNELS 13
1. Introduction 14
2. The Combined Gain Relay (CGR) Scheme 15
3. Performance Analysis 16
4. Average Power Consumption 18
5. Numerical Results 19
6. Conclusion 21
References 22
ADAPTIVE PROBABILISTIC NAV TO INCREASE FAIRNESS IN AD HOC 802.11 MAC LAYER 23
1. Introduction 23
2. Probabilistic NAV 24
3. Evaluations 27
4. Performance evaluation 28
5. Conclusion 30
References 32
A LINK LAYER PROTOCOL FOR SELF- ORGANIZING ULTRA WIDE BAND IMPULSE RADIO NETWORKS 33
1. INTRODUCTION 33
2. DESIGN ISSUES OF UWB-IR BASED NETWORKS 34
3. OPERATIONS OF THE SDD PROTOCOL 36
4. PERFORMANCE EVALUATION 38
5. SIMULATION RESULTS 39
6. CONCLUSION 42
REFERENCES 42
POWER CONTROL AND CLUSTERING IN WIRELESS SENSOR NETWORKS 43
1. INTRODUCTION 43
2. ENERGY CONSUMPTION MODEL IN WSNS 44
3. CLUSTERING PROTOCOLS USED IN WSNS 45
4. THE UNSUPERVISED CONNECTIONIST LEARNING AND THE SOM 46
5. LEAZC: A NEW ROUTINGAPPROACH IN WSNS 49
6. SIMULATIONS RESULTS 50
7. CONCLUSION AND PROSPECTS 52
8. REFERENCES 52
PROTECTING TRANSMISSIONS WHEN USING POWER CONTROL ON 802.11 AD HOC NETWORKS 53
Introduction 53
1. Power Control on IEEE 802.11 Networks 54
2. ALCA: Asymmetric Link Collision Avoidance 57
3. Simulation Results 58
4. Conclusions 61
References 62
A POWER-SAVING ALGORITHM AND A POWER-AWARE ROUTING SCHEME FOR IEEE 802.11 AD HOC NETWORKS 63
1. INTRODUCTION 63
2. LOW POWER MODE ALGORITHM 64
3. POWER AWARE ROUTING 68
4. SIMULATION STUDY 70
5. CONCLUSIONS 71
REFERENCES 72
OPTIMIZED FLOODING AND INTERFERENCE-AWARE QOS ROUTING IN OLSR* 73
1. Introduction 73
2. Interference aware QoS OLSR 74
3. Performance evaluation 76
4. Conclusion 77
References 77
OLSR AND MPR: MUTUAL DEPENDENCES AND PERFORMANCES 78
1. Introduction 78
2. Mutual Dependences of MPR and OLSR 79
3. Convergence Issues in MPR 80
4. Conclusion and Clues for Improving OLSR 82
References 82
OLSR IMPROVEMENT FOR DISTRIBUTED TRAFFIC APPLICATIONS 83
1. Wireless communication in transportation 83
2. Ad hoc communication in transportation 84
3. The OLSR protocol 84
4. Conclusion 87
References 87
MULTILEVEL NETWORK MODELING TO ACHIEVE CROSS LAYER MECHANISMS 88
1. INTRODUCTION 88
2. CROSS-LAYER DESIGN METHOD 89
3. APPLICATION OF THE METHOD 91
3.6 Interactions description arrays 96
5. REFERENCES 97
BANDWIDTH MEASUREMENT IN WIRELESS NETWORKS 98
1. Introduction 98
2. Experimental setup 100
3. Experimental results 102
4. Conclusion 106
References 107
PERFORMANCE EVALUATION STUDY OF AN AVAILABLE BANDWIDTH MEASUREMENT TECHNIQUE IN MULTI-HOP WIRELESS AD HOC NETWORKS 108
1 Introduction 108
2. Related work 109
3. Simulation study 110
4. Simulation results 112
5. Conclusions 116
References 117
UNIFIED SUPPORT FOR QUALITY OF SERVICE METRICS MANAGEMENT IN MOBILE AD HOC NETWORKS USING OLSR 118
1. INTRODUCTION 118
2. MOTIVATIONS 120
3. OUR APPROACH 120
4. EXPERIMENTATION 124
5. CONCLUSION 127
REFERENCES 127
A FRAMEWORK FOR ROUTING IN LARGE AD-HOC NETWORKS WITH IRREGULAR TOPOLOGIES 128
Introduction 128
1. The Ants-based Mobile Routing Architecture 130
2. Evaluation 133
3. Conclusion 136
References 137
ROUTING IN EXTREMELY MOBILE NETWORKS 138
1. Introduction 138
2. Simple Routing Strategies 140
3. Forward to Best Gateway 141
4. Models and parameters of interests 142
5. Simplification and improvement 143
6. The road model 144
7. Simulations 144
References 147
MORHE: A TRANSPARENT MULTI-LEVEL ROUTING SCHEME FOR AD HOC NETWORKS 148
Introduction 149
1. A Transparent Multi-level Routing Scheme 150
2. Simulation Study 153
3. Simulation Results 155
4. Conclusion 156
5. Future Work 157
References 157
VIRTUAL TRELLIS ROUTING 158
1. Introduction 158
2. VRS based on Trellis Graphs 160
3. Evaluation and Simulations 165
4. Conclusions 167
References 167
CONNECTIVITY PROPERTIES OF RANDOM WAYPOINT MOBILITY MODEL FOR AD HOC NETWORKS 168
1. Introduction 168
2. Preliminaries 170
3. Analytical Approximations for Connectivity 171
4. Numerical Examples 174
5. Conclusions 176
References 177
ON IMPROVING CONNECTIVITY OF STATIC AD-HOC NETWORKS BY ADDING NODES 178
1. Introduction 178
2. Problem Statements 179
3. Minimum Spanning Tree Algorithm 180
4. Greedy Tessellation Algorithm 181
5. Greedy Triangle Algorithm 183
6. Performance Analysis 185
7. Discussion 187
References 187
THE CRITICAL NEIGHBOURHOOD RANGE FOR ASYMPTOTIC OVERLAY CONNECTIVITY IN DENSE AD HOC NETWORKS 188
1. Introduction 188
2. Related Work 190
3. Problem Definition and Discussion 190
4. Mat hemat ical analysis 193
5. Conclusions 196
References 197
DESIGN OF A FLEXIBLE CROSS-LAYER INTERFACE FOR AD HOC NETWORKS 198
1. Introduction 198
2. Architectural Functionalities 200
3. Designing the cross-layer interface 201
4. Using the cross-layer interface 202
5. Concluding Remarks 207
References 207
EMULATION ARCHITECTURE FOR AD HOC NETWORKS 208
1. Introduction 208
2. Emulator Architecture 210
3. Numerical Results 213
References 217
WIRELESS LOCAL AREA NETWORKS AND MOBILE DEVICES TO ACTUALIZE THE NOTION OF UBIQUITOUS COMPUTING IN LIVING CLASSROOMS 218
1 INTRODUCTION 219
2. BACKGROUND: THE "LEARNING FROM STARLIGHT" PROJECT 220
3. THE CASE STUDY: A WIRELESS NETWORK INFRASTRUCTURE FOR AN "EXTENDED" ELECTRONIC CLASSROOM 221
4. CONCLUSIONS 226
5. ACKNOLEDGMENTS 226
6. REFERENCES 226
THROUGHPUT ANALYSIS OF AN ALOHA-BASED MAC POLICY FOR AD HOC NETWORKS 228
1. Introduction 228
2. The Adaptive Policy (A-Policy) 229
3. Simulation Results 230
4. Conclusions 231
References 232
PERFORMANCE EVALUATION OF BROADCASTING PROTOCOLS FOR AD HOC AND SENSOR NETWORKS 233
1. Introduction 233
2. Preliminaries 234
3. Performances Evaluation 235
4. Conclusion 242
References 242
MOBILITY-AWARE ADAPTIVE COUNTER-BASED FORWARDING ELIMINATION TO REDUCE DATA OVERHEAD IN MULTICAST AD HOC ROUTING 243
1. Introduction and Motivation 243
2. Mobility-aware Counter Scheme 245
3. Simulation Results 247
4. Conclusions 250
References 252
SUPPORTING MULTICAST IN AD-HOC NETWORKS IN A HOTSPOT CONTEXT 253
1. INTRODUCTION 253
2. NETWORK ARCHITECTURE 254
3. IEEE 802.16 MULTICAST 255
4. AD-HOC MULTICAST INTEGRATION 256
5. EVALUATION OF ZMAODV AND ZODMRP 259
6. CONCLUSION 261
REFERENCES 262
A LIGHTWEIGHT CLUSTERING ALGORITHM UTILIZING CAPACITY HETEROGENEITY 263
1. INTRODUCTION 263
2. NETWORK MODEL 264
3. OBJECTIVE 265
4. CONTROL MESSAGES 267
5. CLUSTERING ALGORITHM 267
6. CONNECTING CLUSTERS 268
7. SIMULATION 269
8. CONCLUSIONS 272
REFERENCES 272
OLSR TREES: A SIMPLE CLUSTERING MECHANISM FOR OLSR 273
Introduction 273
1. OLSR Protocol Overview 274
2. OLSR Tree Formation and Maintenance 275
3. Hierarchical Routing with OLSR Trees 276
4. Conclusion and Future Work 281
References 282
ASYNCHRNOUS ARCHITECTURE FOR SENSOR NETWORK NODES 283
1. INTRODUCTION 283
2. CLASSICAL SENSOR NETWORK OS COMPARISON AND LIMITATION 285
3. SOFTWARE ARCHITECTURE 288
4. HARDWARE FEATURES 289
5. CONCLUSION AND FUTURE WORK 291
REFERENCES 291
EVALUATING FAULT TOLERANCE ASPECTS IN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS 293
1. Introduction 293
2. Related Work 294
3. Evaluated Protocols 295
4. Failure in WSNs 296
5. Evaluation 297
6. Conclusions and Future Work 301
References 301
SERVICE DISCOVERY PROTOCOL IN PROACTIVE MOBILE AD HOC NETWORKS 303
1. INTRODUCTION 303
2. SERVICE DISCOVERY MECHANISM 304
3. SIMULATION RESULTS 305
4. CONCLUSION AND FUTURE WORK 307
REFERENCES 307
AUTONOMOUS RECONFIGURATION BY INNOVATION OF DIFFUSIONS 308
Introduction 308
1. Network-Layer Reconfiguration 309
2. Decision-Making: Difficulties in Ad Hoc Networks 309
3. Diffusion of Innovations: Societal Reconfiguration 310
4. A Self-stabilizing Network-Layer 313
5. The Reconfiguration Framework 313
6. Conclusions 316
References 317
PREFIX CONTINUITY AND GLOBAL ADDRESS AUTOCONFIGURATION IN IPV6 AD HOC NETWORKS 318
1. Introduction 319
2. Related Work 319
3. Protocol Operation and Prefix Continuity 320
4. Upstream neighbor selection 325
5. Conclusions 327
References 327
ADAPTIVE REAL-TIME VBR VIDEO TRAFFIC PREDICTOR FOR IEEE 802.15.3 WIRELESS AD HOC NETWORKS 328
1. Introduction 328
2. Related Work 330
3. Proposed NLMS Adaptive Predictor 332
4. Analysis and Simulation Results 333
5. Conclusion 336
References 336
AN EFFICIENT PROACTIVE RSA SCHEME FOR LARGE-SCALE AD HOC NETWORKS 338
Introduction 338
1. Initial key distribution 339
2. Share refreshing 340
3. Share distribution 340
4. Signature generation 341
5. Discussions 342
References 342
HYBRID KEY MANAGEMENT FOR MOBILE AD HOC NETWORKS 343
1. INTRODUCTION AM) MOTIVATION 343
2. PUBLIC KEY INFRASTRUCTURES FOR MANET 344
3. HYBRID KEY MANAGEMENT 345
4. PERFORMANCE ANALYSIS 349
5. SECURITY ANALYSIS 351
6. CONCLUSIONS 351
REFERENCES 352
DESIGN AND OPTIMIZATION OF REPUTATION MECHANISMS FOR CENTRALIZED CLUSTERED AD HOC NETWORKS 353
1. INTRODUCTION 353
2. CENTRALIZED CLUSTERED MOBILE AD HOC NETWORKS 355
3. REPUTATION BASED COOPERATION REINFORCEMENT 356
4. CONCLUSIONS 361
5. REFERENCES 362
"DIRECTION" FORWARDING FOR HIGHLY MOBILE, LARGE SCALE AD HOC NETWORKS 363
1. INTRODUCTION 364
2. "DIRECTION" FORWARDING PROTOCOL 365
3. PERFORMANCE EVALUATION 369
4. CONCLUSIONS 372
REFERENCES 372
EXTENDING THE COVERAGE OF A 4G TELECOM NETWORK USING HYBRID AD-HOC NETWORKS: A CASE STUDY 373
1. Introduction 373
2. Goals, Requirements and Assumptions 374
3. Ad-Hoc Gateway Discovery Protocols 375
4. Proposed Solution 378
5. Implementation And Validation 379
6. Future Work 381
7. Conclusions 381
References 382
INTEGRATION OF MOBILE-IPV6 AND OLSR FOR INTER-MONET COMMUNICATIONS 383
1. Introduction 383
2. Mobile Network (MONET) 385
3. Proposed architecture for mobility management 385
4. Routing and addressing in OLSR-IP access network 386
5. Simulation results 390
6. Conclusions 391
References 392
ANALYSIS OF THE MULTI-POINT RELAY SELECTION IN OLSR AND IMPLICATIONS 393
1. Introduction 393
2. OLSR 394
3. Analysis 396
4. Numerical results and simulations 399
5. Consequences 399
6. Conclusion 401
References 402
SELECTION METRICS FOR COOPERATIVE MULTIHOP RELAYING 403
1 Introduction 403
2 An Overview of Best-Select Protocol (BSP) 405
3 Methodology 406
4 Selection Metrics 407
5 Conclusion 412
SERVICE DIFFERENTIATION MECHANISM VIA COOPERATIVE MEDIUM ACCESS CONTROL PROTOCOL 413
1. Introduction 413
2. Service Differentiation Mechanism 415
3. Reviews of the Static MAC and the Dynamic MAC Protocols 418
4. Comparison of the Service Differentiation Mechanisms 418
5. Conclusions 421
References 422

Erscheint lt. Verlag 7.7.2006
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Netzwerke
Mathematik / Informatik Informatik Theorie / Studium
Informatik Weitere Themen Hardware
ISBN-10 0-387-31173-4 / 0387311734
ISBN-13 978-0-387-31173-9 / 9780387311739
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 23,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich