𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Ad Hoc Wireless Networking

✍ Scribed by Javed Aslam, Qun Li, Daniela Rus (auth.), Xiuzhen Cheng, Xiao Huang, Ding-Zhu Du (eds.)


Publisher
Springer US
Year
2004
Tongue
English
Leaves
622
Series
Network Theory and Applications 14
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Wireless networking enables two or more computers to communicate using standard network protocols without network cables. Since their emergence in the 1970s, wireless networks have become increasingly popΒ­ ular in the computing industry. In the past decade, wireless networks have enabled true mobility. There are currently two versions of mobile wireless networks. An infrastructure network contains a wired backbone with the last hop being wireless. The cellular phone system is an examΒ­ ple of an infrastructure network. A multihop ad hoc wireless network has no infrastructure and is thus entirely wireless. A wireless sensor network is an example of a multihop ad hoc wireless network. Ad hoc wireless networking is a technique to support robust and efΒ­ ficient operation in mobile wireless networks by incorporating routing functionality into mobile hosts. This technique will be used to realize the dream of "anywhere and anytime computing", which is termed moΒ­ bile computing. Mobile computing is a new paradigm of computing in which users carrying portable devices have access to shared infrastrucΒ­ ture in any location at any time. Mobile computing is a very challenging topic for scientists in computer science and electrical engineering. The representative system for ad hoc wireless networking is called MANET, an acronym for "Mobile Ad hoc NETworks". MANET is an autonomous system consisting of mobile hosts connected by wireless links which can be quickly deployed.

✦ Table of Contents


Front Matter....Pages i-viii
A Lifetime-Optimizing Approach to Routing Messages in Ad-hoc Networks....Pages 1-43
Improving TCP Performance in Mobile Ad hoc Networks....Pages 45-86
Energy Efficient Approaches in Wireless Networking....Pages 87-101
Position Based Routing Algorithms for Ad Hoc Networks: A Taxonomy....Pages 103-136
Location Discovery in Ad-hoc Wireless Sensor Networks....Pages 137-173
Ad Hoc Wireless Networks: From Theory to Protocols....Pages 175-195
Applications of Computational Geometry in Wireless Networks....Pages 197-264
Channel-Adaptive Ad Hoc Routing....Pages 265-317
A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions....Pages 319-364
Location Related Issues in Mobile Network Systems....Pages 365-381
Power-Conserving Algorithms and Protocols in Ad Hoc Networks....Pages 383-446
Secure Communication in Adverse Mobile Ad Hoc Networks....Pages 447-485
The Role of Proactivity in Wireless and Ad Hoc Networks....Pages 487-527
Hybrid Routing: The Pursuit of an Adaptable and Scalable Routing Framework for Ad Hoc Networks....Pages 529-560
Scalability of Routing in Ad Hoc Networks: Principles and Practice....Pages 561-621

✦ Subjects


The Computing Profession; Computer Communication Networks; Algorithms; Computer-Aided Engineering (CAD, CAE) and Design; Management of Computing and Information Systems


πŸ“œ SIMILAR VOLUMES


Guide to Wireless Ad Hoc Networks
✍ Sudip Misra, Isaac Woungang, Subhas Chandra Misra πŸ“‚ Library πŸ“… 2009 πŸ› Springer 🌐 English

<P>Wireless ad-hoc network communication technologies have experienced a steep growth in research and significant advancements in recent times due to their important advantages. These benefits help to set-up a network fast in situations where there is no existing network set-up, or when setting up a

Security for Wireless Ad Hoc Networks
✍ Farooq Anjum, Petros Mouchtaris πŸ“‚ Library πŸ“… 2007 πŸ› Wiley-Interscience 🌐 English

Security has always been a one of the biggest challenges for wireless local area networks (WLAN) ever since its inception. Plenty of studies have been done on the wireless network security in recent years, but they are mostly focused on the infrastructure based WLAN. The security requirements of wir

Security for wireless ad hoc networks
✍ Farooq Anjum, Petros Mouchtaris πŸ“‚ Library πŸ“… 2007 πŸ› Wiley-Interscience 🌐 English

This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments.An Instructor Support

Security for Wireless Ad Hoc Networks
✍ Farooq Anjum, Petros Mouchtaris πŸ“‚ Library πŸ“… 2007 πŸ› Wiley-Interscience 🌐 English

This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments.<br>An Instructor Sup