Results 11 to 20 of about 623,699 (281)

Securing ad hoc networks [PDF]

open access: yesIEEE Network, 1999
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Military tactical and other security-sensitive operations are still the main applications of ad hoc networks ...
Lidong Zhou, Zygmunt J. Haas
openaire   +1 more source

Multimedia Content Distribution in Hybrid Wireless Networks using Weighted Clustering [PDF]

open access: yes, 2006
Fixed infrastructured networks naturally support centralized approaches for group management and information provisioning. Contrary to infrastructured networks, in multi-hop ad-hoc networks each node acts as a router as well as sender and receiver.
Andronache, Adrian   +2 more
core   +2 more sources

Security in Ad Hoc Networks [PDF]

open access: yes, 2003
In wirelesss ad hoc networks basic network operations are carried out through the cooperation of all available nodes. Due to the inherent lack of a managed infrastructure the nodes of an ad hoc network cannot be considered as trustworthy as in a dedicated infrastructure.
Refik Molva, Pietro Michiardi
openaire   +1 more source

Realize Node Localization Based on OLSR Protocol in Ad Hoc Networks [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2013
In wireless Ad Hoc network's many applications, learning accurately the position of the node is one of its important conditions. Node walks randomly in wireless Ad Hoc network, thus it causes the position of the nodes are stochastic; Therefore, the node ...
Anbao Wang, Bin Zhu
doaj   +1 more source

A survey of performance enhancement of transmission control protocol (TCP) in wireless ad hoc networks [PDF]

open access: yes, 2011
This Article is provided by the Brunel Open Access Publishing Fund - Copyright @ 2011 Springer OpenTransmission control protocol (TCP), which provides reliable end-to-end data delivery, performs well in traditional wired network environments, while in ...
A Gupta   +61 more
core   +1 more source

Localized Support for Injection Point Election in Hybrid Networks [PDF]

open access: yes, 2007
Ad-hoc networks, a promising trend in wireless technology, fail to work properly in a global setting. In most cases, self-organization and cost-free local communication cannot compensate the need for being connected, gathering urgent information just-in ...
Brust, Matthias R., Rothkugel, Steffen
core   +2 more sources

Predictive geographic multicast routing protocol in flying ad hoc networks

open access: yesInternational Journal of Distributed Sensor Networks, 2019
In the past decades, the unmanned aerial systems have been utilized only for military operations. However, recently, the potential uses and applicability of unmanned aerial vehicles (commonly known as drones) in civilian application domains are becoming ...
Hassen Redwan Hussen   +3 more
doaj   +1 more source

Two Algorithms for Network Size Estimation for Master/Slave Ad Hoc Networks [PDF]

open access: yes, 2009
This paper proposes an adaptation of two network size estimation methods: random tour and gossip-based aggregation to suit master/slave mobile ad hoc networks.
Ali, Redouane   +2 more
core   +1 more source

Information density–based energy-limited capacity of ad hoc networks

open access: yesInternational Journal of Distributed Sensor Networks, 2018
In this article, the inhomogeneous energy consumption is characterized by the concept of information density, which is defined as the number of bits per unit time passing through a specific region.
Zhiqing Wei   +4 more
doaj   +1 more source

Reducing Broadcasting Route Request Packet through LF-AODC

open access: yesJournal of ICT in Education, 2017
Ad hoc on-demand distance vector (AODV) is one of the commonly used reactive routing protocols in mobile ad hoc network (MANET) as it can achieve relatively better communication performance. However, AODV can lead to heavy routing overhead and additional
Roswan Ismail   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy