نتایج جستجو برای: hoc networks
تعداد نتایج: 460314 فیلتر نتایج به سال:
Design of a suitable routing protocol is difficult for mobile ad hoc networks due to its inherent dynamism and frequent topology change. Multicasting is even more complex because it requires transmission of an information to various destinations at approximately same time, if possible. Active research work in this field has resulted in a variety of proposals based on tree or mesh structures. Th...
Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of indepth protection for wired networks. However, relatively little r...
Caching of frequently accessed data in ad hoc networks is a potential technique that can improve the data access, performance and availability. A cooperative cache-based data access framework lets mobile node cache the data or the path to the data to reduce query delays and improve data accessibility. Due to mobility and resource constraints of ad hoc networks, cooperative caching techniques de...
With the encouragement from success of P2P systems in real world application, recently we have seen active research on synergy of P2P systems and mobile ad hoc networks. The paper proposes a solution for mobility disturbance problem in initialization of ring-based P2P systems over ad hoc networks. It is a decentralized ring construction protocol in presence of mobility. A Mobile Ring Ad-hoc Net...
This paper intends to give an introduction to ad hoc networks in general. The following topics will be discussed: The definition of ad hoc networks and its applications, moreover the paper dives a bit deeper into how routing is handled in ad hoc networks and describes a couple of different routing methods. The paper discusses routing methods from two different perspectives position based and ad...
This is a survey on application of Identity-Based Cryptography in mobile ad hoc networks. In this survey, we review all papers that are available in the literature on security schemes on mobile ad hoc networks using Identity-Based Cryptography during years 2001 to 2007. To introduce the topic, we first review most important developments on general Identity-Based Cryptography. The survey introdu...
background: this study aimed to evaluated trends for iron and manganese concentrations in wells, reservoirs, and water distribution networks in qom city during the summer of 2012. methods: this was a cross-sectional study. the studied scopes consisted of groundwater (60 wells), reservoirs (10 tanks), and water distribution network (33 points). one sample was taken from each source monthly. stat...
Over the next couple of years the use of ad hoc networks especially for telematics applications will increase a lot to provide new types of services to passengers within the vehicle. Since the ad hoc environment is very vulnerable to a multitude of different attacks, new methods of securing these network environments have to be developed. In this paper the vulnerabilities of ad hoc networks are...
Mobile ad hoc networks (MANETs) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence, routing paths in mobile ad hoc...
Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the performance of three routing protocols for mobile ad hoc networks: Dynamic Source Routing (DSR), Ad Hoc On-Demand Distance Vector Routing (AODV), location-aided routing (LAR1).Our evaluation is based on energy consumption ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید