Results 321 to 330 of about 323,200 (377)
Some of the next articles are maybe not open access.
2010
A brief overview of mobility models, MAC , topology control , routing , QOS , energy management, security , and P2P applications of mobile ad hoc network s is provided. It is described how the random mobility patterns of each autonomous mobile node , broadcast nature of multihop wireless communications, and lack of fixed infrastructure are affecting ...
openaire +2 more sources
A brief overview of mobility models, MAC , topology control , routing , QOS , energy management, security , and P2P applications of mobile ad hoc network s is provided. It is described how the random mobility patterns of each autonomous mobile node , broadcast nature of multihop wireless communications, and lack of fixed infrastructure are affecting ...
openaire +2 more sources
Mobility Effects in Mobile Ad Hoc Networks
2009 2nd International Conference on Computer Science and its Applications, 2009In this paper, we present the implementation and analysis of our implemented testbed considering the Optimized Link State Routing (OLSR) protocol. We investigate the effect of mobility and topology changing in the throughput of a Mobile Ad hoc Network (MANET). The mobile nodes move toward the destination at a regular speed. When the mobile nodes arrive
Giuseppe De Marco+5 more
openaire +2 more sources
A mobility measure for mobile ad hoc networks
IEEE Communications Letters, 2003A mobility measure for mobile ad hoc networks is proposed that is flexible because one can customize the definition of mobility using a remoteness function. The proposed measure is consistent because it has a linear relationship to the rate at which links are established or broken for a wide range of mobility scenarios, where a scenario consists of the
Leonard E. Miller+2 more
openaire +2 more sources
Mobility Models in Mobile Ad Hoc Network
IETE Journal of Research, 2007In order to evaluate the performance of a protocol for an ad hoc network, the protocol should be tested under realistic conditions such as transmission range, buffer space, data traffic models, and realistic movements of the mobile users. This paper discusses the survey of mobility models that are used in the simulations of ad hoc networks. We describe
S. Radha, S. Shanmugavel
openaire +2 more sources
Mobile Ad Hoc and Cellular Networks
2018The impact of multiple-access interference in mobile ad hoc and cellular networks with direct-sequence code-division multiple access (DS-CDMA) and frequency-hopping code-division multiple access (FH-CDMA) systems is analyzed in this chapter. Phenomena and issues that become prominent in mobile networks using spread spectrum include exclusion zones ...
openaire +2 more sources
Security in Mobile Ad-Hoc Networks
2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12), 2012In this paper we present a Mobile Ad-Hoc Network (MANET) which securely transmits Audio data. Even though studies on network security has been done before, secure transmission of audio has not been given much importance since both audio and Ad-Hoc network are both complex to handle.
M. S. Athulya, V. S. Sheeba
openaire +2 more sources
Privacy in Mobile Ad Hoc Networks [PDF]
In mobile adhoc networks, generating and maintaining anonymity for any adhoc node is challenging because of the node mobility, dynamic network topology, cooperative nature of the network and broadcast nature of the communication media. Anonymity is provided to protect the communication, by hiding the participants as well as the message contents ...
B. Jhansi Vazram+2 more
openaire +1 more source
Trust in mobile Ad Hoc Networks
2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, 2007Securing a Wireless Ad Hoc Network is a major concern for researchers. Due to varied characteristics of Ad Hoc Networks, they are vulnerable to internal as well as external attacks. Many solutions have been proposed and currently being improved upon in this area. Most of these solutions involve encryption; secure routing, key management etc.
Vikram Limaye, Prakash Veeraraghavan
openaire +2 more sources
M R Palattella, S Scanzio
openaire +2 more sources
Control of mobile ad hoc networks
2006 IEEE Information Theory Workshop, 2006We show that the per node overhead of traffic control in a mobile ad hoc network with N nodes with density ν moving at average speed ν can be made proportional to √νNν). In this case route between source and destination has a bounded strectch factor compared to optimal route.
openaire +2 more sources