Ad Hoc Wireless Networking
β Scribed by Javed Aslam, Qun Li, Daniela Rus (auth.), Xiuzhen Cheng, Xiao Huang, Ding-Zhu Du (eds.)
- Publisher
- Springer US
- Year
- 2004
- Tongue
- English
- Leaves
- 622
- Series
- Network Theory and Applications 14
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Wireless networking enables two or more computers to communicate using standard network protocols without network cables. Since their emergence in the 1970s, wireless networks have become increasingly popΒ ular in the computing industry. In the past decade, wireless networks have enabled true mobility. There are currently two versions of mobile wireless networks. An infrastructure network contains a wired backbone with the last hop being wireless. The cellular phone system is an examΒ ple of an infrastructure network. A multihop ad hoc wireless network has no infrastructure and is thus entirely wireless. A wireless sensor network is an example of a multihop ad hoc wireless network. Ad hoc wireless networking is a technique to support robust and efΒ ficient operation in mobile wireless networks by incorporating routing functionality into mobile hosts. This technique will be used to realize the dream of "anywhere and anytime computing", which is termed moΒ bile computing. Mobile computing is a new paradigm of computing in which users carrying portable devices have access to shared infrastrucΒ ture in any location at any time. Mobile computing is a very challenging topic for scientists in computer science and electrical engineering. The representative system for ad hoc wireless networking is called MANET, an acronym for "Mobile Ad hoc NETworks". MANET is an autonomous system consisting of mobile hosts connected by wireless links which can be quickly deployed.
β¦ Table of Contents
Front Matter....Pages i-viii
A Lifetime-Optimizing Approach to Routing Messages in Ad-hoc Networks....Pages 1-43
Improving TCP Performance in Mobile Ad hoc Networks....Pages 45-86
Energy Efficient Approaches in Wireless Networking....Pages 87-101
Position Based Routing Algorithms for Ad Hoc Networks: A Taxonomy....Pages 103-136
Location Discovery in Ad-hoc Wireless Sensor Networks....Pages 137-173
Ad Hoc Wireless Networks: From Theory to Protocols....Pages 175-195
Applications of Computational Geometry in Wireless Networks....Pages 197-264
Channel-Adaptive Ad Hoc Routing....Pages 265-317
A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions....Pages 319-364
Location Related Issues in Mobile Network Systems....Pages 365-381
Power-Conserving Algorithms and Protocols in Ad Hoc Networks....Pages 383-446
Secure Communication in Adverse Mobile Ad Hoc Networks....Pages 447-485
The Role of Proactivity in Wireless and Ad Hoc Networks....Pages 487-527
Hybrid Routing: The Pursuit of an Adaptable and Scalable Routing Framework for Ad Hoc Networks....Pages 529-560
Scalability of Routing in Ad Hoc Networks: Principles and Practice....Pages 561-621
β¦ Subjects
The Computing Profession; Computer Communication Networks; Algorithms; Computer-Aided Engineering (CAD, CAE) and Design; Management of Computing and Information Systems
π SIMILAR VOLUMES
<P>Wireless ad-hoc network communication technologies have experienced a steep growth in research and significant advancements in recent times due to their important advantages. These benefits help to set-up a network fast in situations where there is no existing network set-up, or when setting up a
Security has always been a one of the biggest challenges for wireless local area networks (WLAN) ever since its inception. Plenty of studies have been done on the wireless network security in recent years, but they are mostly focused on the infrastructure based WLAN. The security requirements of wir
This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments.An Instructor Support
This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments.<br>An Instructor Sup