Knowledge

Wireless ad hoc network

Source ๐Ÿ“

237: 417:
ad hoc networks can take the form of a mesh networks or others. A wireless ad hoc network does not have fixed topology, and its connectivity among nodes is totally dependent on the behavior of the devices, their mobility patterns, distance with each other, etc. Hence, wireless mesh networks are a particular type of wireless ad hoc networks, with special emphasis on the resultant network topology. While some wireless mesh networks (particularly those within a home) have relatively infrequent mobility and thus infrequent link breaks, other more mobile mesh networks require frequent routing adjustments to account for lost links.
951:. Early work included simulating ad hoc mobile networks on sparse and densely connected topologies. Nodes are firstly scattered in a constrained physical space randomly. Each node then has a predefined fixed cell size (radio range). A node is said to be connected to another node if this neighbor is within its radio range. Nodes are then moved (migrated away) based on a random model, using random walk or brownian motion. Different mobility and number of nodes present yield different route length and hence different number of multi-hops. 578:
single point of failure in a MANET is reduced significantly since the data can take multiple paths. Since the MANET architecture evolves with time it has the potential to resolve issues such as isolation/disconnection from the network. Further advantages of MANETS over networks with a fixed topology include flexibility (an ad hoc network can be created anywhere with mobile devices), scalability (you can easily add more nodes to the network) and lower administration costs (no need to build an infrastructure first).
955: 430:, Silvus Technologies MN-MIMO Waveform (Mobile Networked MIMO), and Codan DTC MeshUltra Waveform. Ad hoc mobile communications come in well to fulfill this need, especially its infrastructureless nature, fast deployment and operation. Military MANETs are used by military units with an emphasis on rapid deployment, infrastructureless, all-wireless networks (no fixed radio towers), robustness (link breaks are no problem), security, range, and instant operation. 217: 587:
performance, possibly resulting in data having to be resent a lot of times (increased delay) and finally allocation of network resources such as power remains unclear. Finally, finding a model that accurately represents human mobility whilst remaining mathematically tractable remains an open problem due to the large range of factors that influence it. Some typical models used include the random walk, random waypoint and levy flight models.
25: 918:. A comparative study of various simulators for VANETs reveal that factors such as constrained road topology, multi-path fading and roadside obstacles, traffic flow models, trip models, varying vehicular speed and mobility, traffic lights, traffic congestion, drivers' behavior, etc., have to be taken into consideration in the simulation process to reflect realistic conditions. 456:
complete a task and mission. If a UAV is destroyed by an enemy, its data can be quickly offloaded wirelessly to other neighboring UAVs. The UAV ad hoc communication network is also sometimes referred to UAV instant sky network. More generally, aerial MANET in UAVs are now (as of 2021) successfully implemented and operational as mini tactical reconnaissance ISR UAVs like the
370:(InVANETs) are a kind of artificial intelligence that helps vehicles to behave in intelligent manners during vehicle-to-vehicle collisions, accidents. Vehicles are using radio waves to communicate with each other, creating communication networks instantly on-the-fly while vehicles move along roads. VANET needs to be secured with lightweight protocols. 469:
sea, enabling high-speed wireless communications among ships, enhancing their sharing of imaging and multimedia data, and better co-ordination in battlefield operations. Some defense companies (such as Rockwell Collins, Silvus Technologies and Rohde & Schwartz) have produced products that enhance ship-to-ship and ship-to-shore communications.
622:, there is less bandwidth available at lower frequencies. Processing many radio channels requires many resources. Given the need for mobility, small size and lower power consumption are very important. Picking a MANET radio and modulation has many trade-offs; many start with the specific frequency and bandwidth they are allowed to use. 291:. Current wireless ad hoc networks are designed primarily for military utility. Problems with packet radios are: (1) bulky elements, (2) slow data rate, (3) unable to maintain links if mobility is high. The project did not proceed much further until the early 1990s when wireless ad hoc networks were born. 496:
communication network on-the-fly, i.e., robots can now "talk" to each other and collaborate in a distributed fashion. With a network of robots, the robots can communicate among themselves, share local information, and distributively decide how to resolve a task in the most effective and efficient way.
1073:
Trust establishment and management in MANETs face challenges due to resource constraints and the complex interdependency of networks. Managing trust in a MANET needs to consider the interactions between the composite cognitive, social, information and communication networks, and take into account the
656:
provides low delay, high capacity (up to 10 Gbit/s) and low packet loss rate, offering 12 streams โ€“ 8 streams at 5 GHz and 4 streams at 2.4 GHz. IEEE 802.11ax uses 8x8 MU-MIMO, OFDMA, and 80 MHz channels. Hence, 802.11ax has the ability to form high capacity Wi-Fi ad hoc networks.
586:
With a time evolving network it is clear we should expect variations in network performance due to no fixed architecture (no fixed connections). Furthermore, since network topology determines interference and thus connectivity, the mobility pattern of devices within the network will impact on network
577:
One main advantage to a decentralised network is that they are typically more robust than centralised networks due to the multi-hop fashion in which information is relayed. For example, in the cellular network setting, a drop in coverage occurs if a base station stops working, however the chance of a
416:
Mesh networks take their name from the topology of the resultant network. In a fully connected mesh, each node is connected to every other node, forming a "mesh". A partial mesh, by contrast, has a topology in which some nodes are not connected to others, although this term is seldom in use. Wireless
617:
of radio frequencies. Given the need to move large amounts of information quickly over long distances, a MANET radio channel ideally has large bandwidth (e.g. amount of radio spectrum), lower frequencies, and higher power. Given the desire to communicate with many other nodes ideally simultaneously,
704:
approach in which each layer of the stack would be made to operate independently. The modified transmission power will help that node to dynamically vary its propagation range at the physical layer. This is because the propagation distance is always directly proportional to transmission power. This
696:
A major limitation with mobile nodes is that they have high mobility, causing links to be frequently broken and reestablished. Moreover, the bandwidth of a wireless channel is also limited, and nodes operate on limited battery power, which will eventually be exhausted. These factors make the design
543:
between sensor observations inspires the techniques for in-network data aggregation and mining. By measuring the spatial correlation between data sampled by different sensors, a wide class of specialized algorithms can be developed to develop more efficient spatial data mining algorithms as well as
1033:
To thwart or prevent such attacks, it was necessary to employ authentication mechanisms that ensure that only authorized nodes can inject traffic into the network. Even with authentication, these networks are vulnerable to packet dropping or delaying attacks, whereby an intermediate node drops the
504:
Another civilian use of wireless ad hoc network is for public safety. At times of disasters (floods, storms, earthquakes, fires, etc.), a quick and instant wireless communication network is necessary. Especially at times of earthquakes when radio towers had collapsed or were destroyed, wireless ad
482:
rely on the principles behind wireless ad hoc networks, since sensors can now be deploy without any fixed radio towers, and they can now form networks on-the-fly. "Smart Dust" was one of the early projects done at U C Berkeley, where tiny radios were used to interconnect smart dust. More recently,
332:
as RFCs. ABR was implemented successfully into Linux OS on Lucent WaveLAN 802.11a enabled laptops and a practical ad hoc mobile network was therefore proven to be possible in 1999. Another routing protocol known as AODV was subsequently introduced and later proven and implemented in 2005. In 2007,
751:
As in a fix net nodes maintain routing tables. Distance-vector protocols are based on calculating the direction and distance to any link in a network. "Direction" usually means the next hop address and the exit interface. "Distance" is a measure of the cost to reach a certain node. The least cost
477:
Sensors are useful devices that collect information related to a specific parameter, such as noise, temperature, humidity, pressure, etc. Sensors are increasingly connected via wireless to allow large-scale collection of sensor data. With a large sample of sensor data, analytics processing can be
468:
Navy ships traditionally use satellite communications and other maritime radios to communicate with each other or with ground station back on land. However, such communications are restricted by delays and limited bandwidth. Wireless ad hoc networks enable ship-area-networks to be formed while at
822:. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice of one or the other method requires predetermination for typical cases. The main disadvantages of such algorithms are: 692:
stack. The media access layer (MAC) has to be improved to resolve collisions and hidden terminal problems. The network layer routing protocol has to be improved to resolve dynamically changing network topologies and broken routes. The transport layer protocol has to be improved to handle lost or
455:
UAVs have also been used by US Air Force for data collection and situation sensing, without risking the pilot in a foreign unfriendly environment. With wireless ad hoc network technology embedded into the UAVs, multiple UAVs can communicate with each other and work as a team, collaboratively to
345:
The decentralized nature of wireless ad hoc networks makes them suitable for a variety of applications where central nodes can't be relied on and may improve the scalability of networks compared to wireless managed networks, though theoretical and practical limits to the overall capacity of such
867:
Links are influenced by the node's resources (e.g., transmitter power, computing power and memory) and behavioral properties (e.g., reliability), as well as link properties (e.g. length-of-link and signal loss, interference and noise). Since links can be connected or disconnected at any time, a
513:
Wireless ad hoc networks allow sensors, videos, instruments, and other devices to be deployed and interconnected wirelessly for clinic and hospital patient monitoring, doctor and nurses alert notification, and also making senses of such data quickly at fusion points, so that lives can be saved.
495:
Efforts have been made to co-ordinate and control a group of robots to undertake collaborative work to complete a task. Centralized control is often based on a "star" approach, where robots take turns to talk to the controller station. However, with wireless ad hoc networks, robots can form a
272:. Similar experiments took place in the amateur radio community with the x25 protocol. These early packet radio systems predated the Internet, and indeed were part of the motivation of the original Internet Protocol suite. Later DARPA experiments included the Survivable Radio Network ( 712:, i.e., with the nodes embedded in their physical environment and without needing to bring the nodes back into the lab facility. Such software updating relied on epidemic mode of dissemination of information and had to be done both efficiently (few network transmissions) and fast. 328:. Perkins eventually proposed DSDV โ€“ Destination Sequence Distance Vector routing, which was based on distributed distance vector routing. Toh's proposal was an on-demand based routing, i.e. routes are discovered on-the-fly in real-time as and when needed. ABR was submitted to 871:
The network must allow any two nodes to communicate by relaying the information via other nodes. A "path" is a series of links that connects two nodes. Various routing methods use one or two paths between any two nodes; flooding methods use all or most of the available paths.
346:
networks have been identified. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like natural disasters or military conflicts. The presence of dynamic and adaptive routing protocols enables ad hoc networks to be formed quickly.
1029:
Most wireless ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal of depleting the resources of the nodes relaying the packets.
705:
information is passed from the physical layer to the network layer so that it can take optimal decisions in routing protocols. A major advantage of this protocol is that it allows access of information between physical layer and top layers (MAC and network layer).
574:, disaster relief and military communications. Since the early 2000s, interest in MANETs has greatly increased which, in part, is due to the fact mobility can improve network capacity, shown by Grossglauser and Tse along with the introduction of new technologies. 1077:
Researchers of trust management in MANET suggested that such complex interactions require a composite trust metric that captures aspects of communications and social networks, and corresponding trust measurement, trust distribution, and trust management schemes.
648:
to provide a variety of communication modes. At the 800, 900, 1200, 1800 MHz range, cellular radios are predominant. Some cellular radios use ad hoc communications to extend cellular range to areas and devices not reachable by the cellular base station.
448:, is an aircraft with no pilot on board. UAVs can be remotely controlled (i.e., flown by a pilot at a ground control station) or can fly autonomously based on pre-programmed flight plans. Civilian usage of UAV include modeling 3D terrains, package delivery ( 425:
Military or tactical MANETs are used by military units with emphasis on data rate, real-time requirement, fast re-routing during mobility, data security, radio range, and integration with existing systems. Common radio waveforms include the US Army's JTRS
1732:"#StreamCaster radios have received the Joint Electronics Type Designation: AN/PRC-169. AN/PRC-169 radios connect the dismounted soldier, deployed command posts, ISR sensors, and unmanned vehicles via an Electronic Attack resistant #MANET" 534:
monitoring and different types of architectures can be used for such applications. A key characteristic of such applications is that nearby sensor nodes monitoring an environmental feature typically register similar values. This kind of
390:) and software (protocols) in commercially available smartphones to create peer-to-peer networks without relying on cellular carrier networks, wireless access points, or traditional network infrastructure. SPANs differ from traditional 1061:. With this method, every properly formatted packet received is authenticated then passed along for decryption or dropped. It also means the key(s) in each node must be changed more often and simultaneously (e.g. to avoid reusing an 176:. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. This becomes harder as the scale of the MANET increases due to 1) the desire to route 354:
A mobile ad hoc network (MANET) is a continuously self-configuring, self-organizing, infrastructure-less network of mobile devices connected without wires. It is sometimes known as "on-the-fly" networks or "spontaneous networks".
323:
from Cambridge University separately started to work on a different Internet, that of a wireless ad hoc network. Perkins was working on the dynamic addressing issues. Toh worked on a new routing protocol, which was known as ABR โ€“
569:
The obvious appeal of MANETs is that the network is decentralised and nodes/devices are mobile, that is to say there is no fixed infrastructure which provides the possibility for numerous applications in different areas such as
2002: 938:
testbed, where algorithms and applications were subjected to representative wireless network conditions. The testbed was based on a version of the "MANE" (Mobile Ad hoc Network Emulator) software originally developed by NRL.
315:
of each other. Different protocols are then evaluated based on measures such as the packet drop rate, the overhead introduced by the routing protocol, end-to-end packet delays, network throughput, ability to scale, etc.
752:
route between any two nodes is the route with minimum distance. Each node maintains a vector (table) of minimum distance to every node. The cost of reaching a destination is calculated using various route metrics.
556:
Several books and works have revealed the technical and research challenges facing wireless ad hoc networks or MANETs. The advantages for users, the technical difficulties in implementation, and the side effect on
505:
hoc networks can be formed independently. Firefighters and rescue workers can use ad hoc networks to communicate and rescue those injured. Commercial radios with such capability are available on the market.
171:
Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a
660:
At 60 GHz, there is another form of Wi-Fi known as WiGi โ€“ wireless gigabit. This has the ability to offer up to 7 Gbit/s throughput. Currently, WiGi is targeted to work with 5G cellular networks.
1084:
of every node within a MANET is necessary for trust and reliability but difficult because it by definition is dis-continuous, 2) it requires input from the node itself and 3) from its 'nearby' peers.
644:
The higher the frequency, such as those of 300 GHz, absorption of the signal will be more predominant. Army tactical radios usually employ a variety of UHF and SHF radios, including those of
3465:
Cano, Jose; Cano, Juan-Carlos; Toh, Chai-Keong; Calafate, Carlos T.; Manzoni, Pietro (2010). "EasyMANET: an extensible and configurable platform for service provisioning in MANET environments".
728:
This type of protocols maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network. The main disadvantages of such algorithms are:
794:
Is a simple routing algorithm in which every incoming packet is sent through every outgoing link except the one it arrived on. Flooding is used in bridging and in systems such as Usenet and
1800: 779:
However, clustering can be used to limit flooding. The latency incurred during route discovery is not significant compared to periodic route update exchanges by all nodes in the network.
2013: 1764: 910:(M&S) using extensive parameter sweeping and what-if analysis becomes an extremely important paradigm for use in ad hoc networks. One solution is the use of simulation tools like 768:
This type of protocol finds a route based on user and traffic demand by flooding the network with Route Request or Discovery packets. The main disadvantages of such algorithms are:
2030: 2824:
Royer, E.M.; Chai-Keong Toh (1999). "A review of current routing protocols for ad hoc mobile wireless networks by EM Royer, CK Toh in IEEE Personal Communications, 1999".
1074:
resource constraints (e.g., computing power, energy, bandwidth, time), and dynamics (e.g., topology changes, node mobility, node failure, propagation channel conditions).
853: 1712: 2058: 3881: 3848: 1533: 3871: 398:, in that they support multi-hop relays and there is no notion of a group leader so peers can join and leave at will without destroying the network. Apple's 1589:
Martinez; Toh; Cano; Calafate; Manzoni (2010). "Emergency Services in Future Intelligent Transportation Systems Based on Vehicular Communication Networks".
1049:, etc. at the transport layer). Instead, a common solution is to use pre-shared keys for symmetric, authenticated encryption at the link layer, for example 1416:"Experimenting with an Ad Hoc Wireless Network on Campus: Insights & Experiences", ACM SIGMETRICS Performance Evaluation Review, Vol. 28, No. 3, 2001" 2310:
Kleinrock, Leonard (1975). "Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics".
868:
functioning network must be able to cope with this dynamic restructuring, preferably in a way that is timely, efficient, reliable, robust, and scalable.
2092: 1679: 2106:
Bader, Roland; Pinto, Michele; Spenrath, Felix; Wollmann, Philipp; Kargl, Frank (2006). "BigNurse: A Wireless Ad Hoc Network for Patient Monitoring".
720:
Routing in wireless ad hoc networks or MANETs generally falls into three categories, namely: proactive routing, reactive routing, and hybrid routing.
276:) project, which took place in the 1980s. A successor to these systems was fielded in the mid-1990s for the US Army, and later other nations, as the 1910:
Antonio Guillen-Perez; Ramon Sanchez-Iborra; Maria-Dolores Cano; Juan Carlos Sanchez-Aarnoutse; Joan Garcia-Haro (2016). "WiFi networks on drones".
168:
Such wireless networks lack the complexities of infrastructure setup and administration, enabling devices to create and join networks "on the fly".
3621: 3187:
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks by Stajano and Anderson, International Workshop on Security Protocols, 1999
1811: 3287:
Cho, Jin-Hee; Swami, Ananthram; Chen, Ing-Ray (2011). "A Survey on Trust Management for Mobile Ad Hoc Networks - IEEE Journals & Magazine".
1836: 3701: 3664: 1971: 1985: 1775: 3706: 2257:
Ma, Y.; Guo, Y.; Tian, X.; Ghanem, M. (2011). "Distributed Clustering-Based Aggregation Algorithm for Spatial Correlated Sensor Networks".
3749: 2462:. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Vol. 3. IEEE Proceedings. pp. 1360โ€“1369. 180:
to/through every other node, 2) the percentage of overhead traffic needed to maintain real-time routing status, 3) each node has its own
1001:). The connections between nodes may have different weights to model the difference in channel attenuations. One can then study network 199:
between nodes. This results in a highly dynamic, autonomous topology. MANETs usually have a routable networking environment on top of a
2632:
Bettstetter, C; Resta, G; Santi, P (2003). "The node distribution of the random waypoint mobility model for wireless ad hoc networks".
1731: 803: 665: 3987: 89: 2781:
Panta, Rajesh Krishna; Bagchi, Saurabh; Midkiff, Samuel P. (February 2011). "Efficient Incremental Code Update for Sensor Networks".
257: 161:
data for other nodes. The determination of which nodes forward data is made dynamically on the basis of network connectivity and the
61: 3866: 2767: 845:
Position-based routing methods use information on the exact locations of the nodes. This information is obtained for example via a
783: 42: 3982: 931: 898:
by having the destination node combine self-interference and other-node interference to improve decoding of the desired signals.
2677:
Hyytia, E; Lassila, P; Virtamo, J (2006). "Spatial node distribution of the random waypoint mobility model with applications".
927: 68: 3777: 3260: 3212: 3150: 3054: 2372: 2174: 2133: 1927: 1641: 740: 236: 3614: 3436:
Djenouri, D.; Kheladi, L.; Badache, N. (October 2005). "A Survey of Security Issues in Mobile Ad hoc and Sensor Networks".
1093: 367: 906:
One key problem in wireless ad hoc networks is foreseeing the variety of possible situations that can occur. As a result,
3681: 2510:
Gonzalez, Marta C; Hidalgo, Cesar A; Barabasi, Albert-Laszlo (2008). "Understanding individual human mobility patterns".
1624:
I. Z., Ahmed; T. M. Mohamed; R. A. Sadek (2017). "A low computation message delivery and authentication VANET protocol".
1257: 891: 890:(interference). Collisions can be handled using centralized scheduling or distributed contention access protocols. Using 391: 75: 3405:
Mauve, M.; Widmer, J.; Hartenstein, H. (December 2001). "A Survey on Position-Based Routing in Mobile Ad Hoc Networks".
1909: 3651: 2978: 987: 664:
Circa 2020, the general consensus finds the 'best' modulation for moving information over higher frequency waves to be
311:
and their abilities, assuming varying degrees of mobility within a bounded space, usually with all nodes within a few
3886: 3744: 2939: 2408: 1440: 1233: 1180: 757: 108: 3896: 57: 3676: 1109: 3185:
Stajano, Frank; Anderson, Ross (2000). "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks".
264:(BBN) and SRI International designed, built, and experimented with these earliest systems. Experimenters included 3858: 3820: 3739: 3659: 3607: 2868: 1502: 1401: 307:
wireless networking have made MANETs a popular research topic since the mid-1990s. Many academic papers evaluate
1021:
perspective. One can further study network protocols and algorithms to improve network throughput and fairness.
3759: 1114: 887: 484: 46: 2157:
Toshiyo Tamura; Takahiro Kawada; Masaki Sekine (2007). "The home health care with the ad-hoc network system".
3876: 3792: 3716: 3693: 1103: 886:
In most wireless ad hoc networks, the nodes compete for access to shared wireless medium, often resulting in
614: 283:
Another third wave of academic and research activity started in the mid-1990s with the advent of inexpensive
3551:
Schacham, N.; Westcott, J. (January 1987). "Future directions in packet radio architectures and protocols".
3123:
A.P. Giles; O. Georgiou; C.P. Dettmann (2015). "Betweenness centrality in dense random geometric networks".
1457: 1415: 849:
receiver. Based on the exact location the best path between source and destination nodes can be determined.
4008: 1276: 1202:. 27th International Conference on Advanced Information Networking and Applications Workshops. WAINA 2013. 1054: 895: 753: 3337:"Article: Heterogeneous Approaches for Cluster based Routing Protocol in Vehicular Ad Hoc Network (VANET)" 2900: 544:
more efficient routing strategies. Also, researchers have developed performance models for MANET to apply
3974: 3891: 1006: 701: 427: 325: 1303:
Beyer, Dave (October 1990). "Accomplishments of the DARPA SURAN Program - IEEE Conference Publication".
2970: 1135: 3027:
Ivanic, Natalie; Rivera, Brian; Adamson, Brian (2009). "Mobile Ad Hoc Network emulation environment".
3955: 2355:
Shi, Zhefu; Beard, Cory; Mitchell, Ken (2008). "Tunable traffic control for multihop CSMA networks".
1886: 1098: 1038: 990: 846: 795: 379: 82: 3301: 3037: 2744: 2646: 2324: 2279: 2116: 1957: 1575: 1553: 1481: 1337: 3950: 3419: 3388: 3243: 3195: 2838: 2691: 2075: 799: 693:
broken connections. The session layer protocol has to deal with discovery of servers and services.
634: 597: 571: 558: 3599: 2424: 641:
ad hoc uses the unlicensed ISM 2.4 GHz radios. They can also be used on 5.8 GHz radios.
1145: 907: 669: 479: 445: 439: 277: 241: 35: 3960: 3414: 3383: 3296: 3238: 3190: 3032: 2833: 2739: 2686: 2641: 2473:
Helen, D; Arivazhagan, D (2014). "Applications, advantages and challenges of ad hoc networks".
2319: 2274: 2111: 1752:
Image shows " SC4400E AN/PRC-169(V)1 5820-01-691-2906 SC4200EP AN/PRC-169(V)2 5820-01-691-2880"
1548: 948: 334: 1665: 184:
to route independent and unaware of others needs, and 4) all must share limited communication
3945: 3634: 3630: 1562: 1468: 1324: 1140: 1119: 1081: 1062: 1014: 834: 619: 411: 185: 150: 2722:
Figueiredo, A; Gleria, I; Matsushita, R (2003). "On the origins of truncated Lรฉvy flights".
1739: 3929: 3560: 3523: 3374:(April 1999). "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks". 3348: 3231:
23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings
2882: 2731: 2590: 2529: 2266: 2211: 1516: 1037:
In a multicast and dynamic environment, establishing temporary 1:1 secure 'sessions' using
994: 881: 630: 2571:
Brockmann, Dirk; Hufnagel, Lars; Geisel, Theo (2006). "The scaling laws of human travel".
8: 3669: 2059:"Protocols and Applications of Ad-hoc Robot Wireless Communication Networks: An Overview" 2031:"The first fully mobile, cross-platform ad hoc IP network utilizing legacy radio systems" 1249: 1058: 967: 540: 3564: 3527: 3352: 2735: 2594: 2533: 2270: 2215: 3576: 3539: 3482: 3453: 3314: 3266: 3156: 3128: 3105: 3087: 3060: 2806: 2704: 2659: 2614: 2580: 2553: 2519: 2378: 2337: 2292: 2234: 2199: 2180: 2139: 2044: 2009: 1986:"U.S. Air Force Chief Scientist: Stealth Drones and Killer Swarms Could Be Coming Soon" 1945: 1933: 1647: 1606: 1382: 1312: 173: 146: 3828: 3497:(January 1977). "The Organization of Computer Resources into a Packet Radio Network". 2753: 3924: 3838: 3642: 3514:
Jubin, J.; Tornow, J. D. (January 1987). "The DARPA Packet Radio Network Protocols".
3256: 3208: 3146: 3050: 2996:"A survey and comparative study of simulators for vehicular ad hoc networks (VANETs)" 2974: 2935: 2798: 2606: 2545: 2404: 2368: 2239: 2170: 2129: 2093:"GoTenna Pro meshing radio aspires to deploy next to rescue, fire and security teams" 1923: 1862: 1694: 1637: 1610: 1436: 1229: 1197: 1176: 935: 308: 288: 221: 162: 158: 154: 3543: 3486: 3457: 3318: 3109: 3064: 2663: 2425:"Research Challenges for Ad hoc mobile wireless networks, University of Essex, 2005" 2184: 2143: 1937: 1651: 1386: 1316: 609:
Wireless ad hoc networks can operate over different types of radios. All radios use
3911: 3811: 3580: 3568: 3531: 3502: 3474: 3445: 3424: 3393: 3356: 3310: 3306: 3270: 3248: 3200: 3138: 3097: 3042: 3007: 2912: 2872: 2843: 2810: 2790: 2749: 2708: 2696: 2651: 2618: 2598: 2557: 2537: 2382: 2360: 2341: 2329: 2296: 2284: 2229: 2219: 2162: 2121: 2076:"Ad-hoc Wireless Network Coverage with Networked Robots that cannot Localize, 2009" 1915: 1629: 1598: 1506: 1402:"IETF MANET DRAFT: Long-lived Ad Hoc Routing based on the Concept of Associativity" 1374: 1304: 1285: 1203: 979: 312: 261: 225: 138: 3160: 2125: 1365:
Toh, Chai Keong (1997). "Associativity-Based Routing for Ad Hoc Mobile Networks".
2916: 2492: 1680:""Everyone is a node: How Wi-Fi Mesh Networking Works by Jerry Hildenbrand, 2016" 1430: 1170: 998: 760:
takes into account other information such as node delay and available bandwidth.
545: 536: 402:
with iOS version 7.0 and higher is capable of multi-peer ad hoc mesh networking.
229: 3252: 3227: 3046: 2885: 2862: 2364: 1919: 1519: 1496: 3594: 3449: 3371: 2438: 1633: 1308: 915: 320: 177: 3506: 3478: 2333: 2288: 2166: 1626:
2017 12th International Conference on Computer Engineering and Systems (ICCES)
1378: 4002: 3142: 2802: 2655: 1602: 1498:
The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4
1272: 971: 531: 269: 3572: 3535: 2794: 1713:"U.S. Army Adopts Silvus for Integrated Tactical Network Capability Set '21" 1289: 1195: 3361: 3336: 2962: 2610: 2549: 2243: 1207: 1130: 1050: 1018: 983: 963: 689: 457: 395: 253: 2156: 1429:
Toh, Chai K. (2001-12-03). "7: Implementation of Ad Hoc Mobile Networks".
191:
Such networks may operate by themselves or may be connected to the larger
3229: 3029:
Mobile Ad Hoc Network emulation environment - IEEE Conference Publication
2585: 1125: 954: 708:
Some elements of the software stack were developed to allow code updates
527: 304: 196: 3204: 3174:
M.D. Penrose (2003). "Random Geometric Graphs". Oxford University Press.
2700: 2602: 2541: 3919: 3189:. Lecture Notes in Computer Science. Vol. 1796. pp. 172โ€“182. 3101: 1010: 1002: 864:
An ad hoc network is made up of multiple "nodes" connected by "links."
610: 216: 200: 3428: 3397: 2847: 1034:
packet or delays it, rather than promptly sending it to the next hop.
442:, allowing great mobility and providing connectivity to remote areas. 3901: 3078:
M.D. Penrose (2016). "Connectivity of Soft Random Geometric Graphs".
2877: 2224: 1547:"Spontaneous Networking by Laura Feeney, IEEE Communications, 2001". 1511: 449: 387: 3012: 2995: 2439:"An Overview of Mobile Ad Hoc Networks: Applications and Challenges" 2200:"Air Pollution Monitoring and Mining Based on Sensor Grid in London" 366:
are used for communication between vehicles and roadside equipment.
24: 3833: 3734: 3629: 3494: 653: 319:
In the early 1990s, Charles Perkins from SUN Microsystems USA, and
265: 192: 145:
because it does not rely on a pre-existing infrastructure, such as
3133: 3122: 3092: 2524: 1887:"S. Korean Army Receives First Manet Tactical Communication Radio" 3729: 1284:. National Computer Conference and Exhibition. pp. 245โ€“251. 1270: 829:
Reaction to traffic demand depends on gradient of traffic volume.
181: 688:
The challenges affecting MANETs span from various layers of the
3767: 3724: 3228:
Sencun Zhu; Shouhuai Xu; Sanjeev Setia; Sushil Jajodia (2003).
2198:
Ma, Y.; Richards, M.; Ghanem, M.; Guo, Y.; Hassard, J. (2008).
975: 523: 399: 300: 284: 142: 3843: 3335:
Satyajeet, D.; Deshmukh, A. R.; Dorle, S. S. (January 2016).
1623: 1534:"Ad Hoc Mobile Wireless Networks:Protocols and Systems, 2001" 1199:
ANCH: A New Clustering Algorithm for Wireless Sensor Networks
1042: 911: 852:
Example: "Location-Aided Routing in mobile ad hoc networks" (
677: 638: 618:
many channels are needed. Given radio spectrum is shared and
383: 363: 273: 249: 2045:"A Study on Smart Dust Networks, Linkoping University, 2011" 1912:
2016 ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT)
1837:"DTC Mesh Radios Integrated onto U.S. Army Tactical Network" 958:
A randomly constructed geometric graph drawn inside a square
859: 2460:
Mobility increases the capacity of ad-hoc wireless networks
1793: 1046: 329: 3125:
2015 IEEE International Conference on Communications (ICC)
2721: 2357:
MILCOM 2008 - 2008 IEEE Military Communications Conference
2105: 1695:"Next Generation Tactical Ad Hoc Mobile Wireless Networks" 478:
used to make sense out of these data. The connectivity of
1972:"The future is here: Five applications of UAV technology" 1196:
Morteza M. Zanjireh; Ali Shahrabi; Hadi Larijani (2013).
1041:
with every other node is not feasible (like is done with
645: 626: 2961: 1757: 2570: 2509: 1588: 1458:"AODV Implementation Design and Performance Evaluation" 673: 3435: 3404: 3334: 596:
Use of unlicensed frequency spectrum, contributing to
522:
MANETS can be used for facilitating the collection of
2967:
Energy and spectrum efficient wireless network design
2631: 2401:
Ad hoc Wireless Networks: Protocols and Architectures
826:
Advantage depends on number of other nodes activated.
700:
The cross-layer design deviates from the traditional
373: 358: 2676: 3464: 3369: 3026: 2823: 2197: 1729: 49:. Unsourced material may be challenged and removed. 2780: 2497:Handbook of wireless networks and mobile computing 1354:. American Radio Relay League. 2008. pp. 1โ€“2. 349: 1278:Functions and structure of a packet radio station 814:This type of protocol combines the advantages of 798:and as part of some routing protocols, including 195:. They may contain one or multiple and different 4000: 3550: 2472: 2394: 2392: 2354: 1997: 1995: 1801:"StreamCaster 4200 Enhanced Plus 2x2 MIMO Radio" 1591:IEEE Intelligent Transportation Systems Magazine 1495:Johnson, D.; Hu, Y.; Maltz, D. (February 2007). 775:Excessive flooding can lead to network clogging. 438:Flying ad hoc networks (FANETs) are composed of 433: 3184: 2993: 2864:Ad hoc On-demand Distance Vector (AODV) Routing 2457: 2256: 487:have also become an area of academic interest. 3341:International Journal of Computer Applications 2399:Murthy, C. Siva Ram; Manoj, B. S. (May 2004). 2108:2006 Pervasive Health Conference and Workshops 1494: 806:, and those used in wireless ad hoc networks. 756:uses the hop count of the destination whereas 581: 248:The earliest wireless data network was called 3615: 2389: 1992: 517: 3286: 3173: 3077: 1863:"DTC Offers Enhanced MANET Mesh Networkings" 735:Slow reaction on restructuring and failures. 333:David Johnson and Dave Maltz proposed DSR โ€“ 3513: 3289:IEEE Communications Surveys & Tutorials 3167: 2901:"Algorithms for ad hoc and sensor networks" 2898: 2860: 2768:"Making Sense on what's happening on Wi-Fi" 2398: 1765:"STREAMCASTER 4400 Enhanced 4x4 MIMO Radio" 1692: 3622: 3608: 746: 732:Respective amount of data for maintenance. 666:orthogonal frequency-division multiplexing 508: 3438:IEEE Communications Surveys and Tutorials 3418: 3387: 3360: 3300: 3242: 3194: 3132: 3091: 3036: 3011: 2994:Martinez; Toh; Cano; et al. (2009). 2876: 2837: 2743: 2690: 2645: 2584: 2523: 2323: 2309: 2278: 2233: 2223: 2115: 1552: 1510: 860:Technical requirements for implementation 840: 405: 258:Defense Advanced Research Projects Agency 109:Learn how and when to remove this message 2491: 2453: 2451: 953: 875: 784:Ad hoc On-Demand Distance Vector Routing 697:of a mobile ad hoc network challenging. 604: 235: 215: 2957: 2955: 2953: 2951: 2929: 1723: 564: 485:mobile wireless sensor networks (MWSNs) 463: 420: 382:leverages existing hardware (primarily 4001: 1219: 1217: 942: 530:for a variety of applications such as 294: 16:Decentralized type of wireless network 3603: 3282: 3280: 2679:IEEE Transactions on Mobile Computing 2634:IEEE Transactions on Mobile Computing 2448: 1302: 1164: 1162: 1160: 741:Optimized Link State Routing Protocol 368:Intelligent vehicular ad hoc networks 188:, such as a slice of radio spectrum. 3493: 3116: 2948: 2899:Wattenhofer, Roger (2 August 2005). 1455: 1094:Ad hoc wireless distribution service 921: 723: 499: 47:adding citations to reliable sources 18: 3499:IEEE Transactions on Communications 3071: 3020: 2783:ACM Transactions on Sensor Networks 2312:IEEE Transactions on Communications 1730:Silvus Technologies (24 May 2022). 1428: 1399: 1364: 1258:Association for Computing Machinery 1223: 1214: 1168: 1068: 892:cooperative wireless communications 772:High latency time in route finding. 763: 613:to move information over a certain 240:Initial, large-scale trials of the 13: 3328: 3277: 2774: 2495:(2002). "Mobile ad hoc networks". 1666:"MultipeerConnectivity from Apple" 1172:Wireless ATM & Ad Hoc Networks 1157: 472: 374:Smartphone ad hoc networks (SPANs) 359:Vehicular ad hoc networks (VANETs) 14: 4020: 3588: 3080:The Annals of Applied Probability 1400:Toh, Chai Keong (31 March 1999). 809: 683: 561:can be briefly summarized below: 2861:Perkins, C.; Royer, E.; Das, S. 2458:Grossglauser, M; Tse, D (2001). 1367:Wireless Personal Communications 1110:List of ad hoc routing protocols 934:(NRL) developed a Mobile Ad-Hoc 23: 3221: 3178: 3000:Wireless Communications Journal 2987: 2923: 2892: 2854: 2817: 2760: 2715: 2670: 2625: 2564: 2503: 2485: 2466: 2431: 2417: 2348: 2303: 2250: 2191: 2150: 2099: 2085: 2068: 2051: 2037: 2023: 1978: 1964: 1903: 1879: 1855: 1829: 1705: 1686: 1672: 1658: 1617: 1582: 1540: 1526: 1488: 1449: 1432:Ad Hoc Mobile Wireless Networks 1422: 1408: 1226:Ad Hoc Mobile Wireless Networks 652:Next generation Wi-Fi known as 590: 350:Mobile ad hoc networks (MANETs) 340: 211: 34:needs additional citations for 3311:10.1109/SURV.2011.092110.00088 2930:Wu, S.L.; Tseng, Y.C. (2007). 2003:"We connect your naval forces" 1699:TRW Systems Technology Journal 1393: 1358: 1344: 1296: 1264: 1242: 1189: 1115:Mobile wireless sensor network 256:network, and was sponsored by 228:, site of the first three-way 1: 3939:Delay and disruption tolerant 2754:10.1016/s0375-9601(03)00976-9 2126:10.1109/PCTHEALTH.2006.361691 1151: 1104:Independent basic service set 947:The traditional model is the 928:U.S. Army Research Laboratory 901: 551: 434:Air Force UAV ad hoc networks 262:Bolt, Beranek and Newman Inc. 137:) is a decentralized type of 3467:IEEE Communications Magazine 3376:IEEE Personal Communications 2917:10.1016/j.comcom.2004.12.037 2826:IEEE Personal Communications 1810:. April 2021. Archived from 1774:. April 2021. Archived from 1250:"Robert ("Bob") Elliot Kahn" 1228:. Prentice Hall Publishers. 260:(DARPA) in the early 1970s. 7: 3253:10.1109/ICDCSW.2003.1203642 3047:10.1109/MILCOM.2009.5379781 2365:10.1109/MILCOM.2008.4753376 2159:SICE Annual Conference 2007 1920:10.1109/ITU-WT.2016.7805730 1841:Unmanned Systems Technology 1352:ARRL's VHF Digital Handbook 1087: 1024: 789: 582:Implementation difficulties 490: 326:associativity-based routing 222:Stanford Research Institute 157:participates in routing by 10: 4025: 3450:10.1109/COMST.2005.1593277 2971:Cambridge University Press 2932:Wireless Ad Hoc Networking 1634:10.1109/ICCES.2017.8275303 1309:10.1109/MILCOM.1990.117536 1136:Wireless community network 879: 715: 518:Data monitoring and mining 409: 206: 3973: 3938: 3910: 3857: 3819: 3810: 3791: 3776: 3758: 3715: 3692: 3650: 3641: 3507:10.1109/tcom.1977.1093714 3479:10.1109/mcom.2010.5673087 2934:. Auerbach Publications. 2334:10.1109/TCOM.1975.1092768 2289:10.1109/JSEN.2010.2056916 2167:10.1109/SICE.2007.4420997 1099:Delay-tolerant networking 991:probability mass function 932:Naval Research Laboratory 796:peer-to-peer file sharing 58:"Wireless ad hoc network" 3143:10.1109/ICC.2015.7249352 2656:10.1109/tmc.2003.1233531 1693:Toh; Lee; Ramos (2002). 1603:10.1109/MITS.2010.938166 1275:; M. Beeler (May 1975). 1224:Toh, Chai Keong (2002). 974:in some usually bounded 598:radio spectrum pollution 572:environmental monitoring 559:radio spectrum pollution 480:wireless sensor networks 440:unmanned aerial vehicles 3573:10.1109/PROC.1987.13707 3553:Proceedings of the IEEE 3536:10.1109/proc.1987.13702 3516:Proceedings of the IEEE 3501:. COM-25 (1): 169โ€“178. 2965:; Guocong Song (2014). 2905:Computer Communications 2795:10.1145/1921621.1921624 1379:10.1023/A:1008812928561 1290:10.1145/1499949.1499989 1146:Wireless sensor network 966:consisting of a set of 908:modeling and simulation 747:Distance vector routing 633:(3 โ€“ 30 GHz), and 629:(300 โ€“ 3000 MHz), 509:Hospital ad hoc network 446:Unmanned aerial vehicle 278:Near-term digital radio 268:, Jerry Burchfiel, and 242:Near-term digital radio 123:wireless ad hoc network 3961:Dynamic Source Routing 3631:Channel access methods 3362:10.5120/ijca2016908080 3127:. pp. 6450โ€“6455. 1891:www.thedefensepost.com 1570:Cite journal requires 1476:Cite journal requires 1332:Cite journal requires 1208:10.1109/WAINA.2013.242 970:placed according to a 959: 949:random geometric graph 841:Position-based routing 406:Wireless mesh networks 335:Dynamic Source Routing 245: 233: 151:wireless access points 2403:. Prentice Hall PTR. 1141:Wireless mesh network 1120:Personal area network 1082:Continuous monitoring 957: 894:improves immunity to 876:Medium-access control 835:Zone Routing Protocol 637:(30 โ€“ 300 GHz). 605:Radios and modulation 412:Wireless mesh network 239: 219: 131:mobile ad hoc network 3635:media access control 3237:. pp. 749โ€“755. 2259:IEEE Sensors Journal 2161:. pp. 307โ€“310. 1628:. pp. 204โ€“211. 882:Media access control 565:Advantages for users 464:Navy ad hoc networks 421:Army tactical MANETs 43:improve this article 4009:Wireless networking 3859:Collision avoidance 3565:1987IEEEP..75...83S 3528:1987IEEEP..75...21J 3353:2016IJCA..134l...1S 3205:10.1007/10720107_24 2736:2003PhLA..315...51F 2701:10.1109/tmc.2006.86 2603:10.1038/nature04292 2595:2006Natur.439..462B 2542:10.1038/nature06958 2534:2008Natur.453..779G 2499:. pp. 325โ€“346. 2271:2011ISenJ..11..641M 2216:2008Senso...8.3601M 2010:Rohde & Schwarz 1808:Silvus Technologies 1772:Silvus Technologies 1169:Toh, C. K. (1997). 1015:degree distribution 980:n-dimensional plane 943:Mathematical models 541:spatial correlation 295:Early work on MANET 3821:Collision recovery 3102:10.1214/15-AAP1110 1867:www.soldiermod.com 1817:on 21 January 2022 1781:on 21 January 2022 995:spatial separation 960: 394:networks, such as 289:personal computers 246: 234: 3996: 3995: 3975:Duplexing methods 3969: 3968: 3806: 3805: 3429:10.1109/65.967595 3398:10.1109/98.760423 3262:978-0-7695-1921-0 3214:978-3-540-67381-1 3152:978-1-4673-6432-4 3056:978-1-4244-5238-5 2911:(13): 1498โ€“1504. 2848:10.1109/98.760423 2789:(4): 30:1โ€“30:32. 2724:Physics Letters A 2579:(7075): 462โ€“465. 2518:(7196): 779โ€“782. 2374:978-1-4244-2676-8 2318:(12): 1400โ€“1416. 2176:978-4-907764-27-2 2135:978-1-4244-1085-9 1929:978-9-2612-0451-8 1643:978-1-5386-1191-3 1456:Chakeres, Ian D. 1435:. Prentice Hall. 1254:A.M. Turing Award 936:Network emulation 922:Emulation testbed 724:Proactive routing 500:Disaster response 163:routing algorithm 141:. The network is 119: 118: 111: 93: 4016: 3817: 3816: 3648: 3647: 3624: 3617: 3610: 3601: 3600: 3595:IETF MANET group 3584: 3547: 3510: 3490: 3461: 3432: 3422: 3401: 3391: 3366: 3364: 3323: 3322: 3304: 3284: 3275: 3274: 3246: 3236: 3225: 3219: 3218: 3198: 3182: 3176: 3175: 3171: 3165: 3164: 3136: 3120: 3114: 3113: 3095: 3075: 3069: 3068: 3040: 3031:. pp. 1โ€“6. 3024: 3018: 3017: 3015: 2991: 2985: 2984: 2959: 2946: 2945: 2927: 2921: 2920: 2896: 2890: 2889: 2880: 2878:10.17487/RFC3561 2858: 2852: 2851: 2841: 2821: 2815: 2814: 2778: 2772: 2771: 2764: 2758: 2757: 2747: 2719: 2713: 2712: 2694: 2674: 2668: 2667: 2649: 2629: 2623: 2622: 2588: 2586:cond-mat/0605511 2568: 2562: 2561: 2527: 2507: 2501: 2500: 2489: 2483: 2482: 2470: 2464: 2463: 2455: 2446: 2445: 2443: 2435: 2429: 2428: 2421: 2415: 2414: 2396: 2387: 2386: 2359:. pp. 1โ€“7. 2352: 2346: 2345: 2327: 2307: 2301: 2300: 2282: 2254: 2248: 2247: 2237: 2227: 2225:10.3390/s8063601 2210:(6): 3601โ€“3623. 2195: 2189: 2188: 2154: 2148: 2147: 2119: 2110:. pp. 1โ€“4. 2103: 2097: 2096: 2095:. 27 March 2017. 2089: 2083: 2082: 2080: 2072: 2066: 2065: 2063: 2055: 2049: 2048: 2041: 2035: 2034: 2027: 2021: 2020: 2018: 2012:. Archived from 2007: 1999: 1990: 1989: 1982: 1976: 1975: 1968: 1962: 1961: 1955: 1951: 1949: 1941: 1914:. pp. 1โ€“8. 1907: 1901: 1900: 1898: 1897: 1883: 1877: 1876: 1874: 1873: 1859: 1853: 1852: 1850: 1848: 1833: 1827: 1826: 1824: 1822: 1816: 1805: 1797: 1791: 1790: 1788: 1786: 1780: 1769: 1761: 1755: 1754: 1749: 1747: 1738:. Archived from 1727: 1721: 1720: 1709: 1703: 1702: 1690: 1684: 1683: 1676: 1670: 1669: 1662: 1656: 1655: 1621: 1615: 1614: 1586: 1580: 1579: 1573: 1568: 1566: 1558: 1556: 1544: 1538: 1537: 1530: 1524: 1523: 1514: 1512:10.17487/RFC4728 1492: 1486: 1485: 1479: 1474: 1472: 1464: 1462: 1453: 1447: 1446: 1426: 1420: 1419: 1412: 1406: 1405: 1397: 1391: 1390: 1362: 1356: 1355: 1348: 1342: 1341: 1335: 1330: 1328: 1320: 1300: 1294: 1293: 1283: 1268: 1262: 1261: 1246: 1240: 1239: 1221: 1212: 1211: 1193: 1187: 1186: 1166: 1069:Trust management 999:unit disk graphs 820:reactive routing 764:Reactive routing 287:radio cards for 244:, February 1998. 226:Packet Radio Van 203:ad hoc network. 153:. Instead, each 139:wireless network 114: 107: 103: 100: 94: 92: 51: 27: 19: 4024: 4023: 4019: 4018: 4017: 4015: 4014: 4013: 3999: 3998: 3997: 3992: 3965: 3934: 3906: 3853: 3802: 3787: 3772: 3754: 3711: 3688: 3637: 3628: 3591: 3495:Kahn, Robert E. 3473:(12): 159โ€“167. 3331: 3329:Further reading 3326: 3302:10.1.1.409.2078 3285: 3278: 3263: 3234: 3226: 3222: 3215: 3183: 3179: 3172: 3168: 3153: 3121: 3117: 3086:(2): 986โ€“1028. 3076: 3072: 3057: 3038:10.1.1.414.4950 3025: 3021: 3013:10.1002/wcm.859 2992: 2988: 2981: 2960: 2949: 2942: 2928: 2924: 2897: 2893: 2859: 2855: 2822: 2818: 2779: 2775: 2770:. 11 June 2016. 2766: 2765: 2761: 2745:10.1.1.563.4078 2720: 2716: 2675: 2671: 2647:10.1.1.576.3842 2630: 2626: 2569: 2565: 2508: 2504: 2490: 2486: 2471: 2467: 2456: 2449: 2441: 2437: 2436: 2432: 2423: 2422: 2418: 2411: 2397: 2390: 2375: 2353: 2349: 2325:10.1.1.475.2016 2308: 2304: 2280:10.1.1.724.1158 2255: 2251: 2196: 2192: 2177: 2155: 2151: 2136: 2117:10.1.1.397.7540 2104: 2100: 2091: 2090: 2086: 2078: 2074: 2073: 2069: 2061: 2057: 2056: 2052: 2043: 2042: 2038: 2029: 2028: 2024: 2016: 2005: 2001: 2000: 1993: 1984: 1983: 1979: 1970: 1969: 1965: 1953: 1952: 1943: 1942: 1930: 1908: 1904: 1895: 1893: 1885: 1884: 1880: 1871: 1869: 1861: 1860: 1856: 1846: 1844: 1835: 1834: 1830: 1820: 1818: 1814: 1803: 1799: 1798: 1794: 1784: 1782: 1778: 1767: 1763: 1762: 1758: 1745: 1743: 1728: 1724: 1711: 1710: 1706: 1691: 1687: 1678: 1677: 1673: 1664: 1663: 1659: 1644: 1622: 1618: 1587: 1583: 1571: 1569: 1560: 1559: 1554:10.1.1.960.8621 1546: 1545: 1541: 1532: 1531: 1527: 1493: 1489: 1477: 1475: 1466: 1465: 1460: 1454: 1450: 1443: 1427: 1423: 1414: 1413: 1409: 1398: 1394: 1363: 1359: 1350: 1349: 1345: 1333: 1331: 1322: 1321: 1301: 1297: 1281: 1269: 1265: 1248: 1247: 1243: 1236: 1222: 1215: 1194: 1190: 1183: 1175:. Springer US. 1167: 1158: 1154: 1090: 1071: 1027: 1019:graph-theoretic 986:according to a 945: 924: 904: 884: 878: 862: 843: 812: 792: 766: 749: 726: 718: 686: 607: 593: 584: 567: 554: 546:queueing theory 537:data redundancy 520: 511: 502: 493: 475: 473:Sensor networks 466: 460:from Slovenia. 436: 423: 414: 408: 376: 361: 352: 343: 297: 214: 209: 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 4022: 4012: 4011: 3994: 3993: 3991: 3990: 3985: 3979: 3977: 3971: 3970: 3967: 3966: 3964: 3963: 3958: 3953: 3948: 3942: 3940: 3936: 3935: 3933: 3932: 3927: 3922: 3916: 3914: 3912:Collision-free 3908: 3907: 3905: 3904: 3899: 3894: 3889: 3884: 3879: 3874: 3869: 3863: 3861: 3855: 3854: 3852: 3851: 3846: 3841: 3836: 3831: 3825: 3823: 3814: 3808: 3807: 3804: 3803: 3801: 3800: 3797: 3795: 3789: 3788: 3786: 3785: 3782: 3780: 3774: 3773: 3771: 3770: 3764: 3762: 3756: 3755: 3753: 3752: 3747: 3742: 3737: 3732: 3727: 3721: 3719: 3713: 3712: 3710: 3709: 3704: 3698: 3696: 3690: 3689: 3687: 3686: 3685: 3684: 3674: 3673: 3672: 3667: 3656: 3654: 3645: 3639: 3638: 3627: 3626: 3619: 3612: 3604: 3598: 3597: 3590: 3589:External links 3587: 3586: 3585: 3548: 3511: 3491: 3462: 3433: 3420:10.1.1.25.2774 3402: 3389:10.1.1.11.8637 3372:Chai Keong Toh 3367: 3330: 3327: 3325: 3324: 3295:(4): 562โ€“583. 3276: 3261: 3244:10.1.1.11.4621 3220: 3213: 3196:10.1.1.13.1450 3177: 3166: 3151: 3115: 3070: 3055: 3019: 3006:(7): 813โ€“828. 2986: 2980:978-1107039889 2979: 2947: 2940: 2922: 2891: 2853: 2839:10.1.1.11.8637 2816: 2773: 2759: 2714: 2692:10.1.1.59.3414 2685:(6): 680โ€“694. 2669: 2640:(3): 257โ€“269. 2624: 2563: 2502: 2484: 2465: 2447: 2430: 2416: 2409: 2388: 2373: 2347: 2302: 2249: 2190: 2175: 2149: 2134: 2098: 2084: 2067: 2050: 2036: 2022: 2019:on 2017-08-01. 1991: 1977: 1963: 1954:|journal= 1928: 1902: 1878: 1854: 1828: 1792: 1756: 1742:on 24 May 2022 1722: 1704: 1685: 1671: 1657: 1642: 1616: 1581: 1572:|journal= 1539: 1525: 1487: 1478:|journal= 1448: 1441: 1421: 1407: 1392: 1373:(2): 103โ€“139. 1357: 1343: 1334:|journal= 1295: 1271:J. Burchfiel; 1263: 1241: 1234: 1213: 1188: 1181: 1155: 1153: 1150: 1149: 1148: 1143: 1138: 1133: 1128: 1123: 1117: 1112: 1107: 1101: 1096: 1089: 1086: 1070: 1067: 1026: 1023: 944: 941: 923: 920: 903: 900: 880:Main article: 877: 874: 861: 858: 842: 839: 831: 830: 827: 811: 810:Hybrid routing 808: 791: 788: 777: 776: 773: 765: 762: 748: 745: 737: 736: 733: 725: 722: 717: 714: 702:network design 685: 684:Protocol stack 682: 625:Radios can be 606: 603: 602: 601: 592: 589: 583: 580: 566: 563: 553: 550: 519: 516: 510: 507: 501: 498: 492: 489: 474: 471: 465: 462: 435: 432: 422: 419: 410:Main article: 407: 404: 375: 372: 360: 357: 351: 348: 342: 339: 321:Chai Keong Toh 299:The growth of 296: 293: 230:internetworked 213: 210: 208: 205: 117: 116: 31: 29: 22: 15: 9: 6: 4: 3: 2: 4021: 4010: 4007: 4006: 4004: 3989: 3986: 3984: 3981: 3980: 3978: 3976: 3972: 3962: 3959: 3957: 3954: 3952: 3949: 3947: 3944: 3943: 3941: 3937: 3931: 3928: 3926: 3923: 3921: 3918: 3917: 3915: 3913: 3909: 3903: 3900: 3898: 3895: 3893: 3890: 3888: 3885: 3883: 3880: 3878: 3875: 3873: 3870: 3868: 3865: 3864: 3862: 3860: 3856: 3850: 3847: 3845: 3842: 3840: 3837: 3835: 3834:Slotted ALOHA 3832: 3830: 3827: 3826: 3824: 3822: 3818: 3815: 3813: 3809: 3799: 3798: 3796: 3794: 3790: 3784: 3783: 3781: 3779: 3775: 3769: 3766: 3765: 3763: 3761: 3757: 3751: 3748: 3746: 3743: 3741: 3738: 3736: 3733: 3731: 3728: 3726: 3723: 3722: 3720: 3718: 3714: 3708: 3705: 3703: 3700: 3699: 3697: 3695: 3691: 3683: 3680: 3679: 3678: 3675: 3671: 3668: 3666: 3663: 3662: 3661: 3658: 3657: 3655: 3653: 3649: 3646: 3644: 3643:Channel-based 3640: 3636: 3632: 3625: 3620: 3618: 3613: 3611: 3606: 3605: 3602: 3596: 3593: 3592: 3582: 3578: 3574: 3570: 3566: 3562: 3558: 3554: 3549: 3545: 3541: 3537: 3533: 3529: 3525: 3521: 3517: 3512: 3508: 3504: 3500: 3496: 3492: 3488: 3484: 3480: 3476: 3472: 3468: 3463: 3459: 3455: 3451: 3447: 3443: 3439: 3434: 3430: 3426: 3421: 3416: 3412: 3408: 3403: 3399: 3395: 3390: 3385: 3381: 3377: 3373: 3368: 3363: 3358: 3354: 3350: 3346: 3342: 3338: 3333: 3332: 3320: 3316: 3312: 3308: 3303: 3298: 3294: 3290: 3283: 3281: 3272: 3268: 3264: 3258: 3254: 3250: 3245: 3240: 3233: 3232: 3224: 3216: 3210: 3206: 3202: 3197: 3192: 3188: 3181: 3170: 3162: 3158: 3154: 3148: 3144: 3140: 3135: 3130: 3126: 3119: 3111: 3107: 3103: 3099: 3094: 3089: 3085: 3081: 3074: 3066: 3062: 3058: 3052: 3048: 3044: 3039: 3034: 3030: 3023: 3014: 3009: 3005: 3001: 2997: 2990: 2982: 2976: 2972: 2968: 2964: 2958: 2956: 2954: 2952: 2943: 2941:9780849392542 2937: 2933: 2926: 2918: 2914: 2910: 2906: 2902: 2895: 2887: 2884: 2879: 2874: 2870: 2866: 2865: 2857: 2849: 2845: 2840: 2835: 2831: 2827: 2820: 2812: 2808: 2804: 2800: 2796: 2792: 2788: 2784: 2777: 2769: 2763: 2755: 2751: 2746: 2741: 2737: 2733: 2729: 2725: 2718: 2710: 2706: 2702: 2698: 2693: 2688: 2684: 2680: 2673: 2665: 2661: 2657: 2653: 2648: 2643: 2639: 2635: 2628: 2620: 2616: 2612: 2608: 2604: 2600: 2596: 2592: 2587: 2582: 2578: 2574: 2567: 2559: 2555: 2551: 2547: 2543: 2539: 2535: 2531: 2526: 2521: 2517: 2513: 2506: 2498: 2494: 2488: 2481:(8): 453โ€“457. 2480: 2476: 2469: 2461: 2454: 2452: 2440: 2434: 2426: 2420: 2412: 2410:9780133007060 2406: 2402: 2395: 2393: 2384: 2380: 2376: 2370: 2366: 2362: 2358: 2351: 2343: 2339: 2335: 2331: 2326: 2321: 2317: 2313: 2306: 2298: 2294: 2290: 2286: 2281: 2276: 2272: 2268: 2264: 2260: 2253: 2245: 2241: 2236: 2231: 2226: 2221: 2217: 2213: 2209: 2205: 2201: 2194: 2186: 2182: 2178: 2172: 2168: 2164: 2160: 2153: 2145: 2141: 2137: 2131: 2127: 2123: 2118: 2113: 2109: 2102: 2094: 2088: 2077: 2071: 2060: 2054: 2046: 2040: 2032: 2026: 2015: 2011: 2004: 1998: 1996: 1988:. 2017-02-23. 1987: 1981: 1974:. 2013-12-06. 1973: 1967: 1959: 1947: 1939: 1935: 1931: 1925: 1921: 1917: 1913: 1906: 1892: 1888: 1882: 1868: 1864: 1858: 1843:. 31 Aug 2020 1842: 1838: 1832: 1813: 1809: 1802: 1796: 1777: 1773: 1766: 1760: 1753: 1741: 1737: 1733: 1726: 1718: 1714: 1708: 1700: 1696: 1689: 1682:. 2016-10-13. 1681: 1675: 1667: 1661: 1653: 1649: 1645: 1639: 1635: 1631: 1627: 1620: 1612: 1608: 1604: 1600: 1596: 1592: 1585: 1577: 1564: 1555: 1550: 1543: 1535: 1529: 1521: 1518: 1513: 1508: 1504: 1500: 1499: 1491: 1483: 1470: 1459: 1452: 1444: 1442:9780132442046 1438: 1434: 1433: 1425: 1417: 1411: 1403: 1396: 1388: 1384: 1380: 1376: 1372: 1368: 1361: 1353: 1347: 1339: 1326: 1318: 1314: 1310: 1306: 1299: 1291: 1287: 1280: 1279: 1274: 1267: 1259: 1255: 1251: 1245: 1237: 1235:9780130078179 1231: 1227: 1220: 1218: 1209: 1205: 1201: 1200: 1192: 1184: 1182:9780792398226 1178: 1174: 1173: 1165: 1163: 1161: 1156: 1147: 1144: 1142: 1139: 1137: 1134: 1132: 1129: 1127: 1124: 1121: 1118: 1116: 1113: 1111: 1108: 1105: 1102: 1100: 1097: 1095: 1092: 1091: 1085: 1083: 1079: 1075: 1066: 1064: 1060: 1056: 1052: 1048: 1044: 1040: 1035: 1031: 1022: 1020: 1016: 1012: 1008: 1004: 1000: 996: 992: 989: 985: 981: 977: 973: 972:point process 969: 965: 956: 952: 950: 940: 937: 933: 929: 926:In 2009, the 919: 917: 913: 909: 899: 897: 893: 889: 883: 873: 869: 865: 857: 855: 850: 848: 838: 836: 828: 825: 824: 823: 821: 817: 807: 805: 801: 797: 787: 785: 780: 774: 771: 770: 769: 761: 759: 755: 744: 742: 734: 731: 730: 729: 721: 713: 711: 706: 703: 698: 694: 691: 681: 679: 675: 671: 668:, as used in 667: 662: 658: 655: 650: 647: 642: 640: 636: 632: 628: 623: 621: 616: 612: 599: 595: 594: 588: 579: 575: 573: 562: 560: 549: 547: 542: 538: 533: 532:air pollution 529: 525: 515: 506: 497: 488: 486: 481: 470: 461: 459: 453: 451: 447: 443: 441: 431: 429: 418: 413: 403: 401: 397: 393: 392:hub and spoke 389: 385: 381: 371: 369: 365: 356: 347: 338: 336: 331: 327: 322: 317: 314: 310: 306: 302: 292: 290: 286: 281: 279: 275: 271: 270:Ray Tomlinson 267: 263: 259: 255: 251: 243: 238: 232:transmission. 231: 227: 223: 218: 204: 202: 198: 194: 189: 187: 183: 179: 175: 169: 166: 164: 160: 156: 152: 148: 144: 140: 136: 132: 128: 124: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: โ€“  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 3812:Packet-based 3559:(1): 83โ€“99. 3556: 3552: 3522:(1): 21โ€“32. 3519: 3515: 3498: 3470: 3466: 3441: 3437: 3413:(6): 30โ€“39. 3410: 3407:IEEE Network 3406: 3382:(2): 46โ€“55. 3379: 3375: 3344: 3340: 3292: 3288: 3230: 3223: 3186: 3180: 3169: 3124: 3118: 3083: 3079: 3073: 3028: 3022: 3003: 2999: 2989: 2966: 2963:Guowang Miao 2931: 2925: 2908: 2904: 2894: 2863: 2856: 2832:(2): 46โ€“55. 2829: 2825: 2819: 2786: 2782: 2776: 2762: 2730:(1): 51โ€“60. 2727: 2723: 2717: 2682: 2678: 2672: 2637: 2633: 2627: 2576: 2572: 2566: 2515: 2511: 2505: 2496: 2487: 2478: 2474: 2468: 2459: 2433: 2419: 2400: 2356: 2350: 2315: 2311: 2305: 2262: 2258: 2252: 2207: 2203: 2193: 2158: 2152: 2107: 2101: 2087: 2070: 2053: 2039: 2025: 2014:the original 1980: 1966: 1911: 1905: 1894:. Retrieved 1890: 1881: 1870:. Retrieved 1866: 1857: 1845:. Retrieved 1840: 1831: 1819:. Retrieved 1812:the original 1807: 1795: 1783:. Retrieved 1776:the original 1771: 1759: 1751: 1744:. Retrieved 1740:the original 1735: 1725: 1716: 1707: 1698: 1688: 1674: 1660: 1625: 1619: 1594: 1590: 1584: 1563:cite journal 1542: 1528: 1497: 1490: 1469:cite journal 1451: 1431: 1424: 1410: 1395: 1370: 1366: 1360: 1351: 1346: 1325:cite journal 1298: 1277: 1273:R. Tomlinson 1266: 1253: 1244: 1225: 1198: 1191: 1171: 1131:Wi-Fi Direct 1080: 1076: 1072: 1036: 1032: 1028: 1007:connectivity 961: 946: 925: 914:, NetSim or 905: 896:interference 885: 870: 866: 863: 851: 844: 832: 819: 815: 813: 793: 781: 778: 767: 750: 738: 727: 719: 709: 707: 699: 695: 690:OSI protocol 687: 663: 659: 651: 643: 624: 608: 591:Side effects 585: 576: 568: 555: 521: 512: 503: 494: 476: 467: 458:BRAMOR C4EYE 454: 444: 437: 424: 415: 396:Wi-Fi Direct 377: 362: 353: 344: 341:Applications 318: 305:802.11/Wi-Fi 298: 282: 254:packet radio 247: 212:Packet radio 197:transceivers 190: 170: 167: 134: 130: 126: 122: 120: 105: 99:January 2024 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 3444:(4): 2โ€“28. 3370:Royer, E.; 3347:(12): 1โ€“8. 2493:Giordano, S 1597:(2): 6โ€“20. 1126:Smart meter 1003:observables 982:, mutually 539:due to the 528:data mining 266:Robert Kahn 3920:Token Ring 2265:(3): 641. 1896:2024-09-01 1872:2024-09-01 1717:Prnewswire 1152:References 1011:centrality 997:(see e.g. 962:These are 930:(ARL) and 902:Simulation 888:collisions 611:modulation 552:Challenges 201:link layer 159:forwarding 69:newspapers 3925:Token bus 3902:CSMA/CARP 3415:CiteSeerX 3384:CiteSeerX 3297:CiteSeerX 3239:CiteSeerX 3191:CiteSeerX 3134:1410.8521 3093:1311.3897 3033:CiteSeerX 2834:CiteSeerX 2803:1550-4859 2740:CiteSeerX 2687:CiteSeerX 2642:CiteSeerX 2525:0806.1256 2320:CiteSeerX 2275:CiteSeerX 2112:CiteSeerX 1956:ignored ( 1946:cite book 1611:206470694 1549:CiteSeerX 1017:) from a 1005:(such as 993:of their 833:Example: 816:proactive 782:Example: 739:Example: 620:regulated 615:bandwidth 526:data for 450:Logistics 388:Bluetooth 309:protocols 186:bandwidth 4003:Category 3930:MS-ALOHA 3735:TD-SCDMA 3544:13345464 3487:20381835 3458:11135536 3319:14849884 3110:54549743 3065:14810551 2664:15031580 2611:16437114 2550:18528393 2244:27879895 2185:35790010 2144:14208144 1938:43655770 1652:25800906 1387:14335563 1317:57373343 1088:See also 1025:Security 790:Flooding 654:802.11ax 491:Robotics 452:), etc. 193:Internet 165:in use. 3882:CSMA/CA 3849:CSMA/CD 3839:R-ALOHA 3768:HC-SDMA 3750:MC-CDMA 3745:FH-CDMA 3740:DS-CDMA 3730:TD-CDMA 3702:MF-TDMA 3670:SC-FDMA 3581:1779198 3561:Bibcode 3524:Bibcode 3349:Bibcode 3271:7082229 2811:8240984 2732:Bibcode 2709:6352586 2619:4330122 2591:Bibcode 2558:4419468 2530:Bibcode 2383:9755353 2342:5879608 2297:1639100 2267:Bibcode 2235:3714656 2212:Bibcode 2204:Sensors 1821:10 June 1785:10 June 1746:10 June 1736:Twitter 1719:. 2021. 1045:, most 1013:or the 988:Boolean 984:coupled 978:of the 786:(AODV) 743:(OLSR) 716:Routing 710:in situ 301:laptops 207:History 182:goodput 178:packets 147:routers 83:scholar 3725:W-CDMA 3579:  3542:  3485:  3456:  3417:  3386:  3317:  3299:  3269:  3259:  3241:  3211:  3193:  3161:928409 3159:  3149:  3108:  3063:  3053:  3035:  2977:  2938:  2836:  2809:  2801:  2742:  2707:  2689:  2662:  2644:  2617:  2609:  2573:Nature 2556:  2548:  2512:Nature 2407:  2381:  2371:  2340:  2322:  2295:  2277:  2242:  2232:  2183:  2173:  2142:  2132:  2114:  1936:  1926:  1650:  1640:  1609:  1551:  1439:  1385:  1315:  1232:  1179:  1106:(IBSS) 1053:using 1051:MACsec 976:subset 964:graphs 837:(ZRP) 676:, and 670:4G LTE 524:sensor 400:iPhone 364:VANETs 285:802.11 252:, the 174:router 143:ad hoc 85:  78:  71:  64:  56:  3951:VANET 3946:MANET 3872:MACAW 3844:AX.25 3829:ALOHA 3707:STDMA 3665:OFDMA 3577:S2CID 3540:S2CID 3483:S2CID 3454:S2CID 3315:S2CID 3267:S2CID 3235:(PDF) 3157:S2CID 3129:arXiv 3106:S2CID 3088:arXiv 3061:S2CID 2807:S2CID 2705:S2CID 2660:S2CID 2615:S2CID 2581:arXiv 2554:S2CID 2520:arXiv 2442:(PDF) 2379:S2CID 2338:S2CID 2293:S2CID 2181:S2CID 2140:S2CID 2079:(PDF) 2062:(PDF) 2017:(PDF) 2006:(PDF) 1934:S2CID 1847:1 Sep 1815:(PDF) 1804:(PDF) 1779:(PDF) 1768:(PDF) 1648:S2CID 1607:S2CID 1461:(PDF) 1383:S2CID 1313:S2CID 1282:(PDF) 1122:(PAN) 1057:-256- 1043:HTTPS 968:nodes 912:OPNET 804:DVMRP 678:Wi-Fi 639:Wi-Fi 384:Wi-Fi 274:SURAN 250:PRNET 135:MANET 129:) or 127:WANET 90:JSTOR 76:books 3877:CSMA 3867:MACA 3793:PAMA 3778:PDMA 3760:SDMA 3717:CDMA 3694:TDMA 3682:WDMA 3652:FDMA 3633:and 3257:ISBN 3209:ISBN 3147:ISBN 3051:ISBN 2975:ISBN 2936:ISBN 2886:3561 2869:IETF 2799:ISSN 2607:PMID 2546:PMID 2475:JAIR 2405:ISBN 2369:ISBN 2240:PMID 2171:ISBN 2130:ISBN 1958:help 1924:ISBN 1849:2024 1823:2022 1787:2022 1748:2022 1638:ISBN 1576:help 1520:4728 1503:IETF 1482:help 1437:ISBN 1338:help 1230:ISBN 1177:ISBN 1047:VPNs 818:and 800:OSPF 758:IGRP 386:and 380:SPAN 330:IETF 313:hops 303:and 155:node 62:news 3988:FDD 3983:TDD 3956:DTN 3897:HCF 3892:PCF 3887:DCF 3677:WDM 3660:FDM 3569:doi 3532:doi 3503:doi 3475:doi 3446:doi 3425:doi 3394:doi 3357:doi 3345:134 3307:doi 3249:doi 3201:doi 3139:doi 3098:doi 3043:doi 3008:doi 2913:doi 2883:RFC 2873:doi 2844:doi 2791:doi 2750:doi 2728:315 2697:doi 2652:doi 2599:doi 2577:439 2538:doi 2516:453 2361:doi 2330:doi 2285:doi 2230:PMC 2220:doi 2163:doi 2122:doi 1916:doi 1630:doi 1599:doi 1517:RFC 1507:doi 1375:doi 1305:doi 1286:doi 1204:doi 1065:). 1059:GCM 1055:AES 1039:PKI 916:ns2 854:LAR 847:GPS 754:RIP 646:VHF 635:EHF 631:SHF 627:UHF 428:SRW 224:'s 149:or 45:by 4005:: 3575:. 3567:. 3557:75 3555:. 3538:. 3530:. 3520:75 3518:. 3481:. 3471:48 3469:. 3452:. 3440:. 3423:. 3409:. 3392:. 3378:. 3355:. 3343:. 3339:. 3313:. 3305:. 3293:13 3291:. 3279:^ 3265:. 3255:. 3247:. 3207:. 3199:. 3155:. 3145:. 3137:. 3104:. 3096:. 3084:26 3082:. 3059:. 3049:. 3041:. 3004:11 3002:. 2998:. 2973:. 2969:. 2950:^ 2909:28 2907:. 2903:. 2881:. 2871:. 2867:. 2842:. 2828:. 2805:. 2797:. 2785:. 2748:. 2738:. 2726:. 2703:. 2695:. 2681:. 2658:. 2650:. 2636:. 2613:. 2605:. 2597:. 2589:. 2575:. 2552:. 2544:. 2536:. 2528:. 2514:. 2477:. 2450:^ 2391:^ 2377:. 2367:. 2336:. 2328:. 2316:23 2314:. 2291:. 2283:. 2273:. 2263:11 2261:. 2238:. 2228:. 2218:. 2206:. 2202:. 2179:. 2169:. 2138:. 2128:. 2120:. 2008:. 1994:^ 1950:: 1948:}} 1944:{{ 1932:. 1922:. 1889:. 1865:. 1839:. 1806:. 1770:. 1750:. 1734:. 1715:. 1697:. 1646:. 1636:. 1605:. 1593:. 1567:: 1565:}} 1561:{{ 1515:. 1505:. 1501:. 1473:: 1471:}} 1467:{{ 1381:. 1369:. 1329:: 1327:}} 1323:{{ 1311:. 1256:. 1252:. 1216:^ 1159:^ 1063:IV 1009:, 856:) 802:, 680:. 674:5G 672:, 548:. 378:A 337:. 280:. 220:A 121:A 3623:e 3616:t 3609:v 3583:. 3571:: 3563:: 3546:. 3534:: 3526:: 3509:. 3505:: 3489:. 3477:: 3460:. 3448:: 3442:7 3431:. 3427:: 3411:1 3400:. 3396:: 3380:6 3365:. 3359:: 3351:: 3321:. 3309:: 3273:. 3251:: 3217:. 3203:: 3163:. 3141:: 3131:: 3112:. 3100:: 3090:: 3067:. 3045:: 3016:. 3010:: 2983:. 2944:. 2919:. 2915:: 2888:. 2875:: 2850:. 2846:: 2830:6 2813:. 2793:: 2787:7 2756:. 2752:: 2734:: 2711:. 2699:: 2683:5 2666:. 2654:: 2638:2 2621:. 2601:: 2593:: 2583:: 2560:. 2540:: 2532:: 2522:: 2479:2 2444:. 2427:. 2413:. 2385:. 2363:: 2344:. 2332:: 2299:. 2287:: 2269:: 2246:. 2222:: 2214:: 2208:8 2187:. 2165:: 2146:. 2124:: 2081:. 2064:. 2047:. 2033:. 1960:) 1940:. 1918:: 1899:. 1875:. 1851:. 1825:. 1789:. 1701:. 1668:. 1654:. 1632:: 1613:. 1601:: 1595:2 1578:) 1574:( 1557:. 1536:. 1522:. 1509:: 1484:) 1480:( 1463:. 1445:. 1418:. 1404:. 1389:. 1377:: 1371:4 1340:) 1336:( 1319:. 1307:: 1292:. 1288:: 1260:. 1238:. 1210:. 1206:: 1185:. 600:. 133:( 125:( 112:) 106:( 101:) 97:( 87:ยท 80:ยท 73:ยท 66:ยท 39:.

Index


verification
improve this article
adding citations to reliable sources
"Wireless ad hoc network"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
wireless network
ad hoc
routers
wireless access points
node
forwarding
routing algorithm
router
packets
goodput
bandwidth
Internet
transceivers
link layer

Stanford Research Institute
Packet Radio Van
internetworked

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

โ†‘