نتایج جستجو برای: ad hoc network

تعداد نتایج: 755172  

Journal: :Journal of communications and information networks 2022

In this paper, we propose a preamble-based medium access control (P-MAC) mechanism in Ad-Hoc network. Different from traditional carrier sense multiple (CSMA) network, P-MAC uses much shorter preamble to establish the First, shorten time of establishing Based on P-MAC, more efficient way maintain Next, focusing power line communication (PLC) network which is kind frequency division (FD-PLC) arc...

2005
Nico Bayer Dmitry Sivchenko Bangnan Xu Veselin Rakocevic Sven Hischke Joachim Habermann

This paper describes a testbed realized at T-Systems in Darmstadt (Germany) that handles the integration of ad hoc networks with the Internet. The testbed contains a Mobile Gateway that connects an IPv6 based ad hoc network over a cellular network (e. g. GPRS or UMTS) with the Internet. The testbed is also able to handle multiple gateways within the same ad hoc domain. This paper describes seve...

2001
Aaron Striegel Ranga S. Ramanujan Jordan Bonney

An autonomous wireless local area network (AWLAN) is a collection of wireless computers that can be rapidly deployed as an ad hoc network without the aid of any established infrastructure or centralized administration. However, existing routing protocols for such networks neither scale nor function on the Internet. Therefore, a solution is required that provides a gateway between the ad hoc net...

Journal: :JCM 2010
Li-Ping Zhang Yi Wang

A mobile ad hoc network is a collection of autonomous nodes that communicate with each other by forming a multi-top wireless network. Different from conventional wireless networks, the resource of the nodes in ad hoc networks is limited and there may be tens of thousands of low-power energy constrained nodes in ad hoc networks. As such, the costs of the nodes resource and the network size shoul...

2015

Networks have become an integral part of all communications, associations, businesses, services, government/public organizations and human interactions around the globe. Emergence of technologies and dynamism of user needs & access pattern of network resources have shifted paradigm to wireless ad-hoc network infrastructure supporting mobile devices. Ad-hoc networking means building spontaneous ...

2012
Meeta Singh A. K. Yadav

An Ad hoc network is a short-live network in which two or more mobile devices connected to each other without the help of intervening infrastructure. The routing protocols designed for wired networks are different from Ad hoc networks protocols because wired network can't work efficiently in Ad hoc networks. This imposes different design constraints and requirement on routing protocols for...

2009
Jung-hee Ryu Dong-Ho Cho

Ab8tmct-A mobile ad-hoc network is composed of only mobile nodes, which are distributed dynamically, without any wired backbone or centralized entities. Each terminal in the mobile ad-hoc network also has the role of the router, but the frequent changes of the terminal positions induce the waste of time, energy and computing power for updating the routing table with the paging, and also may pro...

2004
André Weimerskirch

In the near future microprocessors will be found almost everywhere from cellular phones to washing machines and cars. Once these are connected via a (wireless) communication channel to each other and possibly to already existing static computers this could form an extremely dynamic wireless network which may not have access to an infrastructure or centralized administration. Such a network is o...

2017
Arjita Singh Sengar Pankaj Soni Zubair Md. Fadlullah Hiroki Nishiyama Mostafa M. Fouda S. Kurosawa H. Nakayama N. Kato A. Jamalipour Z. M. Fadlullah T. Taleb A. Vasilakos

Security is a major concern in wireless technology and this work deals with security in wireless mobile ad-hoc network by using Novel IDS in Open Shortest Path First (OSPF) routing protocol. We are bounding wireless mobile ad-hoc network nodes to getting updates from unknown or unwanted nodes on the same network through routing table; we are using a Novel intrusion detection technique with the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید