نتایج جستجو برای: glomosim

تعداد نتایج: 124  

Journal: :Electr. Notes Theor. Comput. Sci. 2006
Luc Hogie Pascal Bouvry Frédéric Guinand

Mobile Ad hoc NETworks (MANETs) are dynamic networks populated by mobile stations. Stations in MANETs are usually laptops, PDAs or mobile phones. These devices feature Bluetooth and/or IEEE 802.11 (WiFi) network interfaces and communicate in a decentralized manner. Mobility is a key feature of MANETs. Because of their high cost and their lack of flexibility of such networks, experimentation is ...

2005
C. Venkatesh N. Yadaiah A. M. Natarajan

DYNAMIC SOURCE ROUTING PROTOCOL USING FUZZY LOGIC CONCEPTS FOR AD HOC NETWORKS C. Venkatesh , N. Yadaiah and A.M. Natarajan Kongu Engineering College, Perundurai, Tamil Nadu – 638052, [email protected] # Dept. of EEE, Jawaharlal Nehru Technological University, Hyderabad-500 072, [email protected] Abstract This paper presents a Dynamic Source Routing Protocol using Self Healing and Optimizing ...

2011
Ahmed A. Radwan Tarek M. Mahmoud Essam H. Houssein

A mobile ad hoc network (MANET) is a wireless network that uses multi-hop peer to peer routing. A user can move anytime in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can adopt dynamically changing topology. To accomplish this, a number of ad hoc routing protocols have been proposed and implemented such as, Ad hoc On-Demand Distance Vector routing (...

2012
R. Alageswaran S. Selvakumar P. Neelamegam

Abstract—Wireless Sensor Networks (WSN) are emerging because of the developments in wireless communication technology and miniaturization of the hardware. WSN consists of a large number of low-cost, low-power, multifunctional sensor nodes to monitor physical conditions, such as temperature, sound, vibration, pressure, motion, etc. The MAC protocol to be used in the sensor networks must be energ...

Journal: :CoRR 2012
Sanjoy Das D. K. Lobiyal

In this paper, performance analysis of Location Aided Routing (LAR) protocol in different city scenarios has been done. The mobility model considered is Manhattan model. This mobility model used to emulate the movement pattern of nodes i.e., vehicles on streets defined by maps. Our objective is to provide a qualitative analysis of the LAR protocol in different city scenarios in Vehicular Ad hoc...

Journal: :Computer and Information Science 2012
Ahmad Khader Haboush Mohammad Al Nabhan Motassem Al-Tarazi Mohammad Al-Rawajbeh

This paper discusses the multiple node disjoint paths protocol (MNDP) for mobile ad hoc networks. A mobile ad hoc network is a collection of mobile nodes that cooperate without networking infrastructure so as to form a temporary network that meets some immediate needs. The MNDP protocol detects multiple paths and distributes transmitted packets over these paths. Such distribution reduces conges...

Journal: :Journal Comp. Netw. and Communic. 2012
Ganesh Subramanian

Advances in wireless sensor network (WSN) technology have provided the availability of small and low-cost sensor with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited...

Journal: :Wireless Sensor Network 2010
Ehsan Ahvar Mahmood Fathy

Energy aware routing protocols can be classified into energy saver and energy manager. Energy saver protocols decrease energy consumption totally. Most of them try to find the shortest path between source and destination to reduce energy consumption. But energy manager protocols balance energy consumption in network to avoid network partitioning. Finding best route only based on energy balancin...

2002
Sonja Buchegger Jean-Yves Le Boudec

Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate. We propose a protocol, called CONFIDANT, for making misbehavior unattractive; it is based on selective altruism and utilitarianism. It aims at detecting and isolating misbehaving nodes, thus making it unattractive to ...

2008
Sheetal Gupta Anupam Joshi Tim Finin

A feature common to many pervasive computing scenarios is that devices acquire information about their environment from peers through short-range ad-hoc wireless connections and use it to maintain a model of their current context. A fundamental issue in such situations, is that knowledge obtained from peer devices may vary in reliability with devices providing incorrect data either inadvertentl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید