237:
417:
ad hoc networks can take the form of a mesh networks or others. A wireless ad hoc network does not have fixed topology, and its connectivity among nodes is totally dependent on the behavior of the devices, their mobility patterns, distance with each other, etc. Hence, wireless mesh networks are a particular type of wireless ad hoc networks, with special emphasis on the resultant network topology. While some wireless mesh networks (particularly those within a home) have relatively infrequent mobility and thus infrequent link breaks, other more mobile mesh networks require frequent routing adjustments to account for lost links.
951:. Early work included simulating ad hoc mobile networks on sparse and densely connected topologies. Nodes are firstly scattered in a constrained physical space randomly. Each node then has a predefined fixed cell size (radio range). A node is said to be connected to another node if this neighbor is within its radio range. Nodes are then moved (migrated away) based on a random model, using random walk or brownian motion. Different mobility and number of nodes present yield different route length and hence different number of multi-hops.
578:
single point of failure in a MANET is reduced significantly since the data can take multiple paths. Since the MANET architecture evolves with time it has the potential to resolve issues such as isolation/disconnection from the network. Further advantages of MANETS over networks with a fixed topology include flexibility (an ad hoc network can be created anywhere with mobile devices), scalability (you can easily add more nodes to the network) and lower administration costs (no need to build an infrastructure first).
955:
430:, Silvus Technologies MN-MIMO Waveform (Mobile Networked MIMO), and Codan DTC MeshUltra Waveform. Ad hoc mobile communications come in well to fulfill this need, especially its infrastructureless nature, fast deployment and operation. Military MANETs are used by military units with an emphasis on rapid deployment, infrastructureless, all-wireless networks (no fixed radio towers), robustness (link breaks are no problem), security, range, and instant operation.
217:
587:
performance, possibly resulting in data having to be resent a lot of times (increased delay) and finally allocation of network resources such as power remains unclear. Finally, finding a model that accurately represents human mobility whilst remaining mathematically tractable remains an open problem due to the large range of factors that influence it. Some typical models used include the random walk, random waypoint and levy flight models.
25:
918:. A comparative study of various simulators for VANETs reveal that factors such as constrained road topology, multi-path fading and roadside obstacles, traffic flow models, trip models, varying vehicular speed and mobility, traffic lights, traffic congestion, drivers' behavior, etc., have to be taken into consideration in the simulation process to reflect realistic conditions.
456:
complete a task and mission. If a UAV is destroyed by an enemy, its data can be quickly offloaded wirelessly to other neighboring UAVs. The UAV ad hoc communication network is also sometimes referred to UAV instant sky network. More generally, aerial MANET in UAVs are now (as of 2021) successfully implemented and operational as mini tactical reconnaissance ISR UAVs like the
370:(InVANETs) are a kind of artificial intelligence that helps vehicles to behave in intelligent manners during vehicle-to-vehicle collisions, accidents. Vehicles are using radio waves to communicate with each other, creating communication networks instantly on-the-fly while vehicles move along roads. VANET needs to be secured with lightweight protocols.
469:
sea, enabling high-speed wireless communications among ships, enhancing their sharing of imaging and multimedia data, and better co-ordination in battlefield operations. Some defense companies (such as
Rockwell Collins, Silvus Technologies and Rohde & Schwartz) have produced products that enhance ship-to-ship and ship-to-shore communications.
622:, there is less bandwidth available at lower frequencies. Processing many radio channels requires many resources. Given the need for mobility, small size and lower power consumption are very important. Picking a MANET radio and modulation has many trade-offs; many start with the specific frequency and bandwidth they are allowed to use.
291:. Current wireless ad hoc networks are designed primarily for military utility. Problems with packet radios are: (1) bulky elements, (2) slow data rate, (3) unable to maintain links if mobility is high. The project did not proceed much further until the early 1990s when wireless ad hoc networks were born.
496:
communication network on-the-fly, i.e., robots can now "talk" to each other and collaborate in a distributed fashion. With a network of robots, the robots can communicate among themselves, share local information, and distributively decide how to resolve a task in the most effective and efficient way.
1073:
Trust establishment and management in MANETs face challenges due to resource constraints and the complex interdependency of networks. Managing trust in a MANET needs to consider the interactions between the composite cognitive, social, information and communication networks, and take into account the
656:
provides low delay, high capacity (up to 10 Gbit/s) and low packet loss rate, offering 12 streams โ 8 streams at 5 GHz and 4 streams at 2.4 GHz. IEEE 802.11ax uses 8x8 MU-MIMO, OFDMA, and 80 MHz channels. Hence, 802.11ax has the ability to form high capacity Wi-Fi ad hoc networks.
586:
With a time evolving network it is clear we should expect variations in network performance due to no fixed architecture (no fixed connections). Furthermore, since network topology determines interference and thus connectivity, the mobility pattern of devices within the network will impact on network
577:
One main advantage to a decentralised network is that they are typically more robust than centralised networks due to the multi-hop fashion in which information is relayed. For example, in the cellular network setting, a drop in coverage occurs if a base station stops working, however the chance of a
416:
Mesh networks take their name from the topology of the resultant network. In a fully connected mesh, each node is connected to every other node, forming a "mesh". A partial mesh, by contrast, has a topology in which some nodes are not connected to others, although this term is seldom in use. Wireless
617:
of radio frequencies. Given the need to move large amounts of information quickly over long distances, a MANET radio channel ideally has large bandwidth (e.g. amount of radio spectrum), lower frequencies, and higher power. Given the desire to communicate with many other nodes ideally simultaneously,
704:
approach in which each layer of the stack would be made to operate independently. The modified transmission power will help that node to dynamically vary its propagation range at the physical layer. This is because the propagation distance is always directly proportional to transmission power. This
696:
A major limitation with mobile nodes is that they have high mobility, causing links to be frequently broken and reestablished. Moreover, the bandwidth of a wireless channel is also limited, and nodes operate on limited battery power, which will eventually be exhausted. These factors make the design
543:
between sensor observations inspires the techniques for in-network data aggregation and mining. By measuring the spatial correlation between data sampled by different sensors, a wide class of specialized algorithms can be developed to develop more efficient spatial data mining algorithms as well as
1033:
To thwart or prevent such attacks, it was necessary to employ authentication mechanisms that ensure that only authorized nodes can inject traffic into the network. Even with authentication, these networks are vulnerable to packet dropping or delaying attacks, whereby an intermediate node drops the
504:
Another civilian use of wireless ad hoc network is for public safety. At times of disasters (floods, storms, earthquakes, fires, etc.), a quick and instant wireless communication network is necessary. Especially at times of earthquakes when radio towers had collapsed or were destroyed, wireless ad
482:
rely on the principles behind wireless ad hoc networks, since sensors can now be deploy without any fixed radio towers, and they can now form networks on-the-fly. "Smart Dust" was one of the early projects done at U C Berkeley, where tiny radios were used to interconnect smart dust. More recently,
332:
as RFCs. ABR was implemented successfully into Linux OS on Lucent WaveLAN 802.11a enabled laptops and a practical ad hoc mobile network was therefore proven to be possible in 1999. Another routing protocol known as AODV was subsequently introduced and later proven and implemented in 2005. In 2007,
751:
As in a fix net nodes maintain routing tables. Distance-vector protocols are based on calculating the direction and distance to any link in a network. "Direction" usually means the next hop address and the exit interface. "Distance" is a measure of the cost to reach a certain node. The least cost
477:
Sensors are useful devices that collect information related to a specific parameter, such as noise, temperature, humidity, pressure, etc. Sensors are increasingly connected via wireless to allow large-scale collection of sensor data. With a large sample of sensor data, analytics processing can be
468:
Navy ships traditionally use satellite communications and other maritime radios to communicate with each other or with ground station back on land. However, such communications are restricted by delays and limited bandwidth. Wireless ad hoc networks enable ship-area-networks to be formed while at
822:. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice of one or the other method requires predetermination for typical cases. The main disadvantages of such algorithms are:
692:
stack. The media access layer (MAC) has to be improved to resolve collisions and hidden terminal problems. The network layer routing protocol has to be improved to resolve dynamically changing network topologies and broken routes. The transport layer protocol has to be improved to handle lost or
455:
UAVs have also been used by US Air Force for data collection and situation sensing, without risking the pilot in a foreign unfriendly environment. With wireless ad hoc network technology embedded into the UAVs, multiple UAVs can communicate with each other and work as a team, collaboratively to
345:
The decentralized nature of wireless ad hoc networks makes them suitable for a variety of applications where central nodes can't be relied on and may improve the scalability of networks compared to wireless managed networks, though theoretical and practical limits to the overall capacity of such
867:
Links are influenced by the node's resources (e.g., transmitter power, computing power and memory) and behavioral properties (e.g., reliability), as well as link properties (e.g. length-of-link and signal loss, interference and noise). Since links can be connected or disconnected at any time, a
513:
Wireless ad hoc networks allow sensors, videos, instruments, and other devices to be deployed and interconnected wirelessly for clinic and hospital patient monitoring, doctor and nurses alert notification, and also making senses of such data quickly at fusion points, so that lives can be saved.
495:
Efforts have been made to co-ordinate and control a group of robots to undertake collaborative work to complete a task. Centralized control is often based on a "star" approach, where robots take turns to talk to the controller station. However, with wireless ad hoc networks, robots can form a
272:. Similar experiments took place in the amateur radio community with the x25 protocol. These early packet radio systems predated the Internet, and indeed were part of the motivation of the original Internet Protocol suite. Later DARPA experiments included the Survivable Radio Network (
712:, i.e., with the nodes embedded in their physical environment and without needing to bring the nodes back into the lab facility. Such software updating relied on epidemic mode of dissemination of information and had to be done both efficiently (few network transmissions) and fast.
328:. Perkins eventually proposed DSDV โ Destination Sequence Distance Vector routing, which was based on distributed distance vector routing. Toh's proposal was an on-demand based routing, i.e. routes are discovered on-the-fly in real-time as and when needed. ABR was submitted to
871:
The network must allow any two nodes to communicate by relaying the information via other nodes. A "path" is a series of links that connects two nodes. Various routing methods use one or two paths between any two nodes; flooding methods use all or most of the available paths.
346:
networks have been identified. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like natural disasters or military conflicts. The presence of dynamic and adaptive routing protocols enables ad hoc networks to be formed quickly.
1029:
Most wireless ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal of depleting the resources of the nodes relaying the packets.
705:
information is passed from the physical layer to the network layer so that it can take optimal decisions in routing protocols. A major advantage of this protocol is that it allows access of information between physical layer and top layers (MAC and network layer).
574:, disaster relief and military communications. Since the early 2000s, interest in MANETs has greatly increased which, in part, is due to the fact mobility can improve network capacity, shown by Grossglauser and Tse along with the introduction of new technologies.
1077:
Researchers of trust management in MANET suggested that such complex interactions require a composite trust metric that captures aspects of communications and social networks, and corresponding trust measurement, trust distribution, and trust management schemes.
648:
to provide a variety of communication modes. At the 800, 900, 1200, 1800 MHz range, cellular radios are predominant. Some cellular radios use ad hoc communications to extend cellular range to areas and devices not reachable by the cellular base station.
448:, is an aircraft with no pilot on board. UAVs can be remotely controlled (i.e., flown by a pilot at a ground control station) or can fly autonomously based on pre-programmed flight plans. Civilian usage of UAV include modeling 3D terrains, package delivery (
425:
Military or tactical MANETs are used by military units with emphasis on data rate, real-time requirement, fast re-routing during mobility, data security, radio range, and integration with existing systems. Common radio waveforms include the US Army's JTRS
1732:"#StreamCaster radios have received the Joint Electronics Type Designation: AN/PRC-169. AN/PRC-169 radios connect the dismounted soldier, deployed command posts, ISR sensors, and unmanned vehicles via an Electronic Attack resistant #MANET"
534:
monitoring and different types of architectures can be used for such applications. A key characteristic of such applications is that nearby sensor nodes monitoring an environmental feature typically register similar values. This kind of
390:) and software (protocols) in commercially available smartphones to create peer-to-peer networks without relying on cellular carrier networks, wireless access points, or traditional network infrastructure. SPANs differ from traditional
1061:. With this method, every properly formatted packet received is authenticated then passed along for decryption or dropped. It also means the key(s) in each node must be changed more often and simultaneously (e.g. to avoid reusing an
176:. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. This becomes harder as the scale of the MANET increases due to 1) the desire to route
354:
A mobile ad hoc network (MANET) is a continuously self-configuring, self-organizing, infrastructure-less network of mobile devices connected without wires. It is sometimes known as "on-the-fly" networks or "spontaneous networks".
323:
from
Cambridge University separately started to work on a different Internet, that of a wireless ad hoc network. Perkins was working on the dynamic addressing issues. Toh worked on a new routing protocol, which was known as ABR โ
569:
The obvious appeal of MANETs is that the network is decentralised and nodes/devices are mobile, that is to say there is no fixed infrastructure which provides the possibility for numerous applications in different areas such as
2002:
938:
testbed, where algorithms and applications were subjected to representative wireless network conditions. The testbed was based on a version of the "MANE" (Mobile Ad hoc
Network Emulator) software originally developed by NRL.
315:
of each other. Different protocols are then evaluated based on measures such as the packet drop rate, the overhead introduced by the routing protocol, end-to-end packet delays, network throughput, ability to scale, etc.
752:
route between any two nodes is the route with minimum distance. Each node maintains a vector (table) of minimum distance to every node. The cost of reaching a destination is calculated using various route metrics.
556:
Several books and works have revealed the technical and research challenges facing wireless ad hoc networks or MANETs. The advantages for users, the technical difficulties in implementation, and the side effect on
505:
hoc networks can be formed independently. Firefighters and rescue workers can use ad hoc networks to communicate and rescue those injured. Commercial radios with such capability are available on the market.
171:
Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a
660:
At 60 GHz, there is another form of Wi-Fi known as WiGi โ wireless gigabit. This has the ability to offer up to 7 Gbit/s throughput. Currently, WiGi is targeted to work with 5G cellular networks.
1084:
of every node within a MANET is necessary for trust and reliability but difficult because it by definition is dis-continuous, 2) it requires input from the node itself and 3) from its 'nearby' peers.
644:
The higher the frequency, such as those of 300 GHz, absorption of the signal will be more predominant. Army tactical radios usually employ a variety of UHF and SHF radios, including those of
3465:
Cano, Jose; Cano, Juan-Carlos; Toh, Chai-Keong; Calafate, Carlos T.; Manzoni, Pietro (2010). "EasyMANET: an extensible and configurable platform for service provisioning in MANET environments".
728:
This type of protocols maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network. The main disadvantages of such algorithms are:
794:
Is a simple routing algorithm in which every incoming packet is sent through every outgoing link except the one it arrived on. Flooding is used in bridging and in systems such as Usenet and
1800:
779:
However, clustering can be used to limit flooding. The latency incurred during route discovery is not significant compared to periodic route update exchanges by all nodes in the network.
2013:
1764:
910:(M&S) using extensive parameter sweeping and what-if analysis becomes an extremely important paradigm for use in ad hoc networks. One solution is the use of simulation tools like
768:
This type of protocol finds a route based on user and traffic demand by flooding the network with Route
Request or Discovery packets. The main disadvantages of such algorithms are:
2030:
2824:
Royer, E.M.; Chai-Keong Toh (1999). "A review of current routing protocols for ad hoc mobile wireless networks by EM Royer, CK Toh in IEEE Personal
Communications, 1999".
1074:
resource constraints (e.g., computing power, energy, bandwidth, time), and dynamics (e.g., topology changes, node mobility, node failure, propagation channel conditions).
853:
1712:
2058:
3881:
3848:
1533:
3871:
398:, in that they support multi-hop relays and there is no notion of a group leader so peers can join and leave at will without destroying the network. Apple's
1589:
Martinez; Toh; Cano; Calafate; Manzoni (2010). "Emergency
Services in Future Intelligent Transportation Systems Based on Vehicular Communication Networks".
1049:, etc. at the transport layer). Instead, a common solution is to use pre-shared keys for symmetric, authenticated encryption at the link layer, for example
1416:"Experimenting with an Ad Hoc Wireless Network on Campus: Insights & Experiences", ACM SIGMETRICS Performance Evaluation Review, Vol. 28, No. 3, 2001"
2310:
Kleinrock, Leonard (1975). "Packet
Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics".
868:
functioning network must be able to cope with this dynamic restructuring, preferably in a way that is timely, efficient, reliable, robust, and scalable.
2092:
1679:
2106:
Bader, Roland; Pinto, Michele; Spenrath, Felix; Wollmann, Philipp; Kargl, Frank (2006). "BigNurse: A Wireless Ad Hoc
Network for Patient Monitoring".
720:
Routing in wireless ad hoc networks or MANETs generally falls into three categories, namely: proactive routing, reactive routing, and hybrid routing.
276:) project, which took place in the 1980s. A successor to these systems was fielded in the mid-1990s for the US Army, and later other nations, as the
1910:
Antonio
Guillen-Perez; Ramon Sanchez-Iborra; Maria-Dolores Cano; Juan Carlos Sanchez-Aarnoutse; Joan Garcia-Haro (2016). "WiFi networks on drones".
168:
Such wireless networks lack the complexities of infrastructure setup and administration, enabling devices to create and join networks "on the fly".
3621:
3187:
The
Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks by Stajano and Anderson, International Workshop on Security Protocols, 1999
1811:
3287:
Cho, Jin-Hee; Swami, Ananthram; Chen, Ing-Ray (2011). "A Survey on Trust Management for Mobile Ad Hoc Networks - IEEE Journals & Magazine".
1836:
3701:
3664:
1971:
1985:
1775:
3706:
2257:
Ma, Y.; Guo, Y.; Tian, X.; Ghanem, M. (2011). "Distributed Clustering-Based Aggregation Algorithm for Spatial Correlated Sensor Networks".
3749:
2462:. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Vol. 3. IEEE Proceedings. pp. 1360โ1369.
180:
to/through every other node, 2) the percentage of overhead traffic needed to maintain real-time routing status, 3) each node has its own
1001:). The connections between nodes may have different weights to model the difference in channel attenuations. One can then study network
199:
between nodes. This results in a highly dynamic, autonomous topology. MANETs usually have a routable networking environment on top of a
2632:
Bettstetter, C; Resta, G; Santi, P (2003). "The node distribution of the random waypoint mobility model for wireless ad hoc networks".
1731:
803:
665:
3987:
89:
2781:
Panta, Rajesh Krishna; Bagchi, Saurabh; Midkiff, Samuel P. (February 2011). "Efficient Incremental Code Update for Sensor Networks".
257:
161:
data for other nodes. The determination of which nodes forward data is made dynamically on the basis of network connectivity and the
61:
3866:
2767:
845:
Position-based routing methods use information on the exact locations of the nodes. This information is obtained for example via a
783:
42:
3982:
931:
898:
by having the destination node combine self-interference and other-node interference to improve decoding of the desired signals.
2677:
Hyytia, E; Lassila, P; Virtamo, J (2006). "Spatial node distribution of the random waypoint mobility model with applications".
927:
68:
3777:
3260:
3212:
3150:
3054:
2372:
2174:
2133:
1927:
1641:
740:
236:
3614:
3436:
Djenouri, D.; Kheladi, L.; Badache, N. (October 2005). "A Survey of Security Issues in Mobile Ad hoc and Sensor Networks".
1093:
367:
906:
One key problem in wireless ad hoc networks is foreseeing the variety of possible situations that can occur. As a result,
3681:
2510:
Gonzalez, Marta C; Hidalgo, Cesar A; Barabasi, Albert-Laszlo (2008). "Understanding individual human mobility patterns".
1624:
I. Z., Ahmed; T. M. Mohamed; R. A. Sadek (2017). "A low computation message delivery and authentication VANET protocol".
1257:
891:
890:(interference). Collisions can be handled using centralized scheduling or distributed contention access protocols. Using
391:
75:
3405:
Mauve, M.; Widmer, J.; Hartenstein, H. (December 2001). "A Survey on Position-Based Routing in Mobile Ad Hoc Networks".
1909:
3651:
2978:
987:
664:
Circa 2020, the general consensus finds the 'best' modulation for moving information over higher frequency waves to be
311:
and their abilities, assuming varying degrees of mobility within a bounded space, usually with all nodes within a few
3886:
3744:
2939:
2408:
1440:
1233:
1180:
757:
108:
3896:
57:
3676:
1109:
3185:
Stajano, Frank; Anderson, Ross (2000). "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks".
264:(BBN) and SRI International designed, built, and experimented with these earliest systems. Experimenters included
3858:
3820:
3739:
3659:
3607:
2868:
1502:
1401:
307:
wireless networking have made MANETs a popular research topic since the mid-1990s. Many academic papers evaluate
1021:
perspective. One can further study network protocols and algorithms to improve network throughput and fairness.
3759:
1114:
887:
484:
46:
2157:
Toshiyo Tamura; Takahiro Kawada; Masaki Sekine (2007). "The home health care with the ad-hoc network system".
3876:
3792:
3716:
3693:
1103:
886:
In most wireless ad hoc networks, the nodes compete for access to shared wireless medium, often resulting in
614:
283:
Another third wave of academic and research activity started in the mid-1990s with the advent of inexpensive
3551:
Schacham, N.; Westcott, J. (January 1987). "Future directions in packet radio architectures and protocols".
3123:
A.P. Giles; O. Georgiou; C.P. Dettmann (2015). "Betweenness centrality in dense random geometric networks".
1457:
1415:
849:
receiver. Based on the exact location the best path between source and destination nodes can be determined.
4008:
1276:
1202:. 27th International Conference on Advanced Information Networking and Applications Workshops. WAINA 2013.
1054:
895:
753:
3337:"Article: Heterogeneous Approaches for Cluster based Routing Protocol in Vehicular Ad Hoc Network (VANET)"
2900:
544:
more efficient routing strategies. Also, researchers have developed performance models for MANET to apply
3974:
3891:
1006:
701:
427:
325:
1303:
Beyer, Dave (October 1990). "Accomplishments of the DARPA SURAN Program - IEEE Conference Publication".
2970:
1135:
3027:
Ivanic, Natalie; Rivera, Brian; Adamson, Brian (2009). "Mobile Ad Hoc Network emulation environment".
3955:
2355:
Shi, Zhefu; Beard, Cory; Mitchell, Ken (2008). "Tunable traffic control for multihop CSMA networks".
1886:
1098:
1038:
990:
846:
795:
379:
82:
3301:
3037:
2744:
2646:
2324:
2279:
2116:
1957:
1575:
1553:
1481:
1337:
3950:
3419:
3388:
3243:
3195:
2838:
2691:
2075:
799:
693:
broken connections. The session layer protocol has to deal with discovery of servers and services.
634:
597:
571:
558:
3599:
2424:
641:
ad hoc uses the unlicensed ISM 2.4 GHz radios. They can also be used on 5.8 GHz radios.
1145:
907:
669:
479:
445:
439:
277:
241:
35:
3960:
3414:
3383:
3296:
3238:
3190:
3032:
2833:
2739:
2686:
2641:
2473:
Helen, D; Arivazhagan, D (2014). "Applications, advantages and challenges of ad hoc networks".
2319:
2274:
2111:
1752:
Image shows " SC4400E AN/PRC-169(V)1 5820-01-691-2906 SC4200EP AN/PRC-169(V)2 5820-01-691-2880"
1548:
948:
334:
1665:
184:
to route independent and unaware of others needs, and 4) all must share limited communication
3945:
3634:
3630:
1562:
1468:
1324:
1140:
1119:
1081:
1062:
1014:
834:
619:
411:
185:
150:
2722:
Figueiredo, A; Gleria, I; Matsushita, R (2003). "On the origins of truncated Lรฉvy flights".
1739:
3929:
3560:
3523:
3374:(April 1999). "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks".
3348:
3231:
23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings
2882:
2731:
2590:
2529:
2266:
2211:
1516:
1037:
In a multicast and dynamic environment, establishing temporary 1:1 secure 'sessions' using
994:
881:
630:
2571:
Brockmann, Dirk; Hufnagel, Lars; Geisel, Theo (2006). "The scaling laws of human travel".
8:
3669:
2059:"Protocols and Applications of Ad-hoc Robot Wireless Communication Networks: An Overview"
2031:"The first fully mobile, cross-platform ad hoc IP network utilizing legacy radio systems"
1249:
1058:
967:
540:
3564:
3527:
3352:
2735:
2594:
2533:
2270:
2215:
3576:
3539:
3482:
3453:
3314:
3266:
3156:
3128:
3105:
3087:
3060:
2806:
2704:
2659:
2614:
2580:
2553:
2519:
2378:
2337:
2292:
2234:
2199:
2180:
2139:
2044:
2009:
1986:"U.S. Air Force Chief Scientist: Stealth Drones and Killer Swarms Could Be Coming Soon"
1945:
1933:
1647:
1606:
1382:
1312:
173:
146:
3828:
3497:(January 1977). "The Organization of Computer Resources into a Packet Radio Network".
2753:
3924:
3838:
3642:
3514:
Jubin, J.; Tornow, J. D. (January 1987). "The DARPA Packet Radio Network Protocols".
3256:
3208:
3146:
3050:
2996:"A survey and comparative study of simulators for vehicular ad hoc networks (VANETs)"
2974:
2935:
2798:
2606:
2545:
2404:
2368:
2239:
2170:
2129:
2093:"GoTenna Pro meshing radio aspires to deploy next to rescue, fire and security teams"
1923:
1862:
1694:
1637:
1610:
1436:
1229:
1197:
1176:
935:
308:
288:
221:
162:
158:
154:
3543:
3486:
3457:
3318:
3109:
3064:
2663:
2425:"Research Challenges for Ad hoc mobile wireless networks, University of Essex, 2005"
2184:
2143:
1937:
1651:
1386:
1316:
609:
Wireless ad hoc networks can operate over different types of radios. All radios use
3911:
3811:
3580:
3568:
3531:
3502:
3474:
3445:
3424:
3393:
3356:
3310:
3306:
3270:
3248:
3200:
3138:
3097:
3042:
3007:
2912:
2872:
2843:
2810:
2790:
2749:
2708:
2696:
2651:
2618:
2598:
2557:
2537:
2382:
2360:
2341:
2329:
2296:
2284:
2229:
2219:
2162:
2121:
2076:"Ad-hoc Wireless Network Coverage with Networked Robots that cannot Localize, 2009"
1915:
1629:
1598:
1506:
1402:"IETF MANET DRAFT: Long-lived Ad Hoc Routing based on the Concept of Associativity"
1374:
1304:
1285:
1203:
979:
312:
261:
225:
138:
3160:
2125:
1365:
Toh, Chai Keong (1997). "Associativity-Based Routing for Ad Hoc Mobile Networks".
2916:
2492:
1680:""Everyone is a node: How Wi-Fi Mesh Networking Works by Jerry Hildenbrand, 2016"
1430:
1170:
998:
760:
takes into account other information such as node delay and available bandwidth.
545:
536:
402:
with iOS version 7.0 and higher is capable of multi-peer ad hoc mesh networking.
229:
3252:
3227:
3046:
2885:
2862:
2364:
1919:
1519:
1496:
3594:
3449:
3371:
2438:
1633:
1308:
915:
320:
177:
3506:
3478:
2333:
2288:
2166:
1626:
2017 12th International Conference on Computer Engineering and Systems (ICCES)
1378:
4002:
3142:
2802:
2655:
1602:
1498:
The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4
1272:
971:
531:
269:
3572:
3535:
2794:
1713:"U.S. Army Adopts Silvus for Integrated Tactical Network Capability Set '21"
1289:
1195:
3361:
3336:
2962:
2610:
2549:
2243:
1207:
1130:
1050:
1018:
983:
963:
689:
457:
395:
253:
2156:
1429:
Toh, Chai K. (2001-12-03). "7: Implementation of Ad Hoc Mobile Networks".
191:
Such networks may operate by themselves or may be connected to the larger
3229:
3029:
Mobile Ad Hoc Network emulation environment - IEEE Conference Publication
2585:
1125:
954:
708:
Some elements of the software stack were developed to allow code updates
527:
304:
196:
3204:
3174:
M.D. Penrose (2003). "Random Geometric Graphs". Oxford University Press.
2700:
2602:
2541:
3919:
3189:. Lecture Notes in Computer Science. Vol. 1796. pp. 172โ182.
3101:
1010:
1002:
864:
An ad hoc network is made up of multiple "nodes" connected by "links."
610:
216:
200:
3428:
3397:
2847:
1034:
packet or delays it, rather than promptly sending it to the next hop.
442:, allowing great mobility and providing connectivity to remote areas.
3901:
3078:
M.D. Penrose (2016). "Connectivity of Soft Random Geometric Graphs".
2877:
2224:
1547:"Spontaneous Networking by Laura Feeney, IEEE Communications, 2001".
1511:
449:
387:
3012:
2995:
2439:"An Overview of Mobile Ad Hoc Networks: Applications and Challenges"
2200:"Air Pollution Monitoring and Mining Based on Sensor Grid in London"
366:
are used for communication between vehicles and roadside equipment.
24:
3833:
3734:
3629:
3494:
653:
319:
In the early 1990s, Charles Perkins from SUN Microsystems USA, and
265:
192:
145:
because it does not rely on a pre-existing infrastructure, such as
3133:
3122:
3092:
2524:
1887:"S. Korean Army Receives First Manet Tactical Communication Radio"
3729:
1284:. National Computer Conference and Exhibition. pp. 245โ251.
1270:
829:
Reaction to traffic demand depends on gradient of traffic volume.
181:
688:
The challenges affecting MANETs span from various layers of the
3767:
3724:
3228:
Sencun Zhu; Shouhuai Xu; Sanjeev Setia; Sushil Jajodia (2003).
2198:
Ma, Y.; Richards, M.; Ghanem, M.; Guo, Y.; Hassard, J. (2008).
975:
523:
399:
300:
284:
142:
3843:
3335:
Satyajeet, D.; Deshmukh, A. R.; Dorle, S. S. (January 2016).
1623:
1534:"Ad Hoc Mobile Wireless Networks:Protocols and Systems, 2001"
1199:
ANCH: A New Clustering Algorithm for Wireless Sensor Networks
1042:
911:
852:
Example: "Location-Aided Routing in mobile ad hoc networks" (
677:
638:
618:
many channels are needed. Given radio spectrum is shared and
383:
363:
273:
249:
2045:"A Study on Smart Dust Networks, Linkoping University, 2011"
1912:
2016 ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT)
1837:"DTC Mesh Radios Integrated onto U.S. Army Tactical Network"
958:
A randomly constructed geometric graph drawn inside a square
859:
2460:
Mobility increases the capacity of ad-hoc wireless networks
1793:
1046:
329:
3125:
2015 IEEE International Conference on Communications (ICC)
2721:
2357:
MILCOM 2008 - 2008 IEEE Military Communications Conference
2105:
1695:"Next Generation Tactical Ad Hoc Mobile Wireless Networks"
478:
used to make sense out of these data. The connectivity of
1972:"The future is here: Five applications of UAV technology"
1196:
Morteza M. Zanjireh; Ali Shahrabi; Hadi Larijani (2013).
1041:
with every other node is not feasible (like is done with
645:
626:
2961:
1757:
2570:
2509:
1588:
1458:"AODV Implementation Design and Performance Evaluation"
673:
3435:
3404:
3334:
596:
Use of unlicensed frequency spectrum, contributing to
522:
MANETS can be used for facilitating the collection of
2967:
Energy and spectrum efficient wireless network design
2631:
2401:
Ad hoc Wireless Networks: Protocols and Architectures
826:
Advantage depends on number of other nodes activated.
700:
The cross-layer design deviates from the traditional
373:
358:
2676:
3464:
3369:
3026:
2823:
2197:
1729:
49:. Unsourced material may be challenged and removed.
2780:
2497:Handbook of wireless networks and mobile computing
1354:. American Radio Relay League. 2008. pp. 1โ2.
349:
1278:Functions and structure of a packet radio station
814:This type of protocol combines the advantages of
798:and as part of some routing protocols, including
195:. They may contain one or multiple and different
4000:
3550:
2472:
2394:
2392:
2354:
1997:
1995:
1801:"StreamCaster 4200 Enhanced Plus 2x2 MIMO Radio"
1591:IEEE Intelligent Transportation Systems Magazine
1495:Johnson, D.; Hu, Y.; Maltz, D. (February 2007).
775:Excessive flooding can lead to network clogging.
438:Flying ad hoc networks (FANETs) are composed of
433:
3184:
2993:
2864:Ad hoc On-demand Distance Vector (AODV) Routing
2457:
2256:
487:have also become an area of academic interest.
3341:International Journal of Computer Applications
2399:Murthy, C. Siva Ram; Manoj, B. S. (May 2004).
2108:2006 Pervasive Health Conference and Workshops
1494:
806:, and those used in wireless ad hoc networks.
756:uses the hop count of the destination whereas
581:
248:The earliest wireless data network was called
3615:
2389:
1992:
517:
3286:
3173:
3077:
1863:"DTC Offers Enhanced MANET Mesh Networkings"
735:Slow reaction on restructuring and failures.
333:David Johnson and Dave Maltz proposed DSR โ
3513:
3289:IEEE Communications Surveys & Tutorials
3167:
2901:"Algorithms for ad hoc and sensor networks"
2898:
2860:
2768:"Making Sense on what's happening on Wi-Fi"
2398:
1765:"STREAMCASTER 4400 Enhanced 4x4 MIMO Radio"
1692:
3622:
3608:
746:
732:Respective amount of data for maintenance.
666:orthogonal frequency-division multiplexing
508:
3438:IEEE Communications Surveys and Tutorials
3418:
3387:
3360:
3300:
3242:
3194:
3132:
3091:
3036:
3011:
2994:Martinez; Toh; Cano; et al. (2009).
2876:
2837:
2743:
2690:
2645:
2584:
2523:
2323:
2309:
2278:
2233:
2223:
2115:
1552:
1510:
860:Technical requirements for implementation
840:
405:
258:Defense Advanced Research Projects Agency
109:Learn how and when to remove this message
2491:
2453:
2451:
953:
875:
784:Ad hoc On-Demand Distance Vector Routing
697:of a mobile ad hoc network challenging.
604:
235:
215:
2957:
2955:
2953:
2951:
2929:
1723:
564:
485:mobile wireless sensor networks (MWSNs)
463:
420:
382:leverages existing hardware (primarily
4001:
1219:
1217:
942:
530:for a variety of applications such as
294:
16:Decentralized type of wireless network
3603:
3282:
3280:
2679:IEEE Transactions on Mobile Computing
2634:IEEE Transactions on Mobile Computing
2448:
1302:
1164:
1162:
1160:
741:Optimized Link State Routing Protocol
368:Intelligent vehicular ad hoc networks
188:, such as a slice of radio spectrum.
3493:
3116:
2948:
2899:Wattenhofer, Roger (2 August 2005).
1455:
1094:Ad hoc wireless distribution service
921:
723:
499:
47:adding citations to reliable sources
18:
3499:IEEE Transactions on Communications
3071:
3020:
2783:ACM Transactions on Sensor Networks
2312:IEEE Transactions on Communications
1730:Silvus Technologies (24 May 2022).
1428:
1399:
1364:
1258:Association for Computing Machinery
1223:
1214:
1168:
1068:
892:cooperative wireless communications
772:High latency time in route finding.
763:
613:to move information over a certain
240:Initial, large-scale trials of the
13:
3328:
3277:
2774:
2495:(2002). "Mobile ad hoc networks".
1666:"MultipeerConnectivity from Apple"
1172:Wireless ATM & Ad Hoc Networks
1157:
472:
374:Smartphone ad hoc networks (SPANs)
359:Vehicular ad hoc networks (VANETs)
14:
4020:
3588:
3080:The Annals of Applied Probability
1400:Toh, Chai Keong (31 March 1999).
809:
683:
561:can be briefly summarized below:
2861:Perkins, C.; Royer, E.; Das, S.
2458:Grossglauser, M; Tse, D (2001).
1367:Wireless Personal Communications
1110:List of ad hoc routing protocols
934:(NRL) developed a Mobile Ad-Hoc
23:
3221:
3178:
3000:Wireless Communications Journal
2987:
2923:
2892:
2854:
2817:
2760:
2715:
2670:
2625:
2564:
2503:
2485:
2466:
2431:
2417:
2348:
2303:
2250:
2191:
2150:
2099:
2085:
2068:
2051:
2037:
2023:
1978:
1964:
1903:
1879:
1855:
1829:
1705:
1686:
1672:
1658:
1617:
1582:
1540:
1526:
1488:
1449:
1432:Ad Hoc Mobile Wireless Networks
1422:
1408:
1226:Ad Hoc Mobile Wireless Networks
652:Next generation Wi-Fi known as
590:
350:Mobile ad hoc networks (MANETs)
340:
211:
34:needs additional citations for
3311:10.1109/SURV.2011.092110.00088
2930:Wu, S.L.; Tseng, Y.C. (2007).
2003:"We connect your naval forces"
1699:TRW Systems Technology Journal
1393:
1358:
1344:
1296:
1264:
1242:
1189:
1115:Mobile wireless sensor network
256:network, and was sponsored by
228:, site of the first three-way
1:
3939:Delay and disruption tolerant
2754:10.1016/s0375-9601(03)00976-9
2126:10.1109/PCTHEALTH.2006.361691
1151:
1104:Independent basic service set
947:The traditional model is the
928:U.S. Army Research Laboratory
901:
551:
434:Air Force UAV ad hoc networks
262:Bolt, Beranek and Newman Inc.
137:) is a decentralized type of
3467:IEEE Communications Magazine
3376:IEEE Personal Communications
2917:10.1016/j.comcom.2004.12.037
2826:IEEE Personal Communications
1810:. April 2021. Archived from
1774:. April 2021. Archived from
1250:"Robert ("Bob") Elliot Kahn"
1228:. Prentice Hall Publishers.
260:(DARPA) in the early 1970s.
7:
3253:10.1109/ICDCSW.2003.1203642
3047:10.1109/MILCOM.2009.5379781
2365:10.1109/MILCOM.2008.4753376
2159:SICE Annual Conference 2007
1920:10.1109/ITU-WT.2016.7805730
1841:Unmanned Systems Technology
1352:ARRL's VHF Digital Handbook
1087:
1024:
789:
582:Implementation difficulties
490:
326:associativity-based routing
222:Stanford Research Institute
157:participates in routing by
10:
4025:
3450:10.1109/COMST.2005.1593277
2971:Cambridge University Press
2932:Wireless Ad Hoc Networking
1634:10.1109/ICCES.2017.8275303
1309:10.1109/MILCOM.1990.117536
1136:Wireless community network
879:
715:
518:Data monitoring and mining
409:
206:
3973:
3938:
3910:
3857:
3819:
3810:
3791:
3776:
3758:
3715:
3692:
3650:
3641:
3507:10.1109/tcom.1977.1093714
3479:10.1109/mcom.2010.5673087
2934:. Auerbach Publications.
2334:10.1109/TCOM.1975.1092768
2289:10.1109/JSEN.2010.2056916
2167:10.1109/SICE.2007.4420997
1099:Delay-tolerant networking
991:probability mass function
932:Naval Research Laboratory
796:peer-to-peer file sharing
58:"Wireless ad hoc network"
3143:10.1109/ICC.2015.7249352
2656:10.1109/tmc.2003.1233531
1693:Toh; Lee; Ramos (2002).
1603:10.1109/MITS.2010.938166
1275:; M. Beeler (May 1975).
1224:Toh, Chai Keong (2002).
974:in some usually bounded
598:radio spectrum pollution
572:environmental monitoring
559:radio spectrum pollution
480:wireless sensor networks
440:unmanned aerial vehicles
3573:10.1109/PROC.1987.13707
3553:Proceedings of the IEEE
3536:10.1109/proc.1987.13702
3516:Proceedings of the IEEE
3501:. COM-25 (1): 169โ178.
2965:; Guocong Song (2014).
2905:Computer Communications
2795:10.1145/1921621.1921624
1379:10.1023/A:1008812928561
1290:10.1145/1499949.1499989
1146:Wireless sensor network
966:consisting of a set of
908:modeling and simulation
747:Distance vector routing
633:(3 โ 30 GHz), and
629:(300 โ 3000 MHz),
509:Hospital ad hoc network
446:Unmanned aerial vehicle
278:Near-term digital radio
268:, Jerry Burchfiel, and
242:Near-term digital radio
123:wireless ad hoc network
3961:Dynamic Source Routing
3631:Channel access methods
3362:10.5120/ijca2016908080
3127:. pp. 6450โ6455.
1891:www.thedefensepost.com
1570:Cite journal requires
1476:Cite journal requires
1332:Cite journal requires
1208:10.1109/WAINA.2013.242
970:placed according to a
959:
949:random geometric graph
841:Position-based routing
406:Wireless mesh networks
335:Dynamic Source Routing
245:
233:
151:wireless access points
2403:. Prentice Hall PTR.
1141:Wireless mesh network
1120:Personal area network
1082:Continuous monitoring
957:
894:improves immunity to
876:Medium-access control
835:Zone Routing Protocol
637:(30 โ 300 GHz).
605:Radios and modulation
412:Wireless mesh network
239:
219:
131:mobile ad hoc network
3635:media access control
3237:. pp. 749โ755.
2259:IEEE Sensors Journal
2161:. pp. 307โ310.
1628:. pp. 204โ211.
882:Media access control
565:Advantages for users
464:Navy ad hoc networks
421:Army tactical MANETs
43:improve this article
4009:Wireless networking
3859:Collision avoidance
3565:1987IEEEP..75...83S
3528:1987IEEEP..75...21J
3353:2016IJCA..134l...1S
3205:10.1007/10720107_24
2736:2003PhLA..315...51F
2701:10.1109/tmc.2006.86
2603:10.1038/nature04292
2595:2006Natur.439..462B
2542:10.1038/nature06958
2534:2008Natur.453..779G
2499:. pp. 325โ346.
2271:2011ISenJ..11..641M
2216:2008Senso...8.3601M
2010:Rohde & Schwarz
1808:Silvus Technologies
1772:Silvus Technologies
1169:Toh, C. K. (1997).
1015:degree distribution
980:n-dimensional plane
943:Mathematical models
541:spatial correlation
295:Early work on MANET
3821:Collision recovery
3102:10.1214/15-AAP1110
1867:www.soldiermod.com
1817:on 21 January 2022
1781:on 21 January 2022
995:spatial separation
960:
394:networks, such as
289:personal computers
246:
234:
3996:
3995:
3975:Duplexing methods
3969:
3968:
3806:
3805:
3429:10.1109/65.967595
3398:10.1109/98.760423
3262:978-0-7695-1921-0
3214:978-3-540-67381-1
3152:978-1-4673-6432-4
3056:978-1-4244-5238-5
2911:(13): 1498โ1504.
2848:10.1109/98.760423
2789:(4): 30:1โ30:32.
2724:Physics Letters A
2579:(7075): 462โ465.
2518:(7196): 779โ782.
2374:978-1-4244-2676-8
2318:(12): 1400โ1416.
2176:978-4-907764-27-2
2135:978-1-4244-1085-9
1929:978-9-2612-0451-8
1643:978-1-5386-1191-3
1456:Chakeres, Ian D.
1435:. Prentice Hall.
1254:A.M. Turing Award
936:Network emulation
922:Emulation testbed
724:Proactive routing
500:Disaster response
163:routing algorithm
141:. The network is
119:
118:
111:
93:
4016:
3817:
3816:
3648:
3647:
3624:
3617:
3610:
3601:
3600:
3595:IETF MANET group
3584:
3547:
3510:
3490:
3461:
3432:
3422:
3401:
3391:
3366:
3364:
3323:
3322:
3304:
3284:
3275:
3274:
3246:
3236:
3225:
3219:
3218:
3198:
3182:
3176:
3175:
3171:
3165:
3164:
3136:
3120:
3114:
3113:
3095:
3075:
3069:
3068:
3040:
3031:. pp. 1โ6.
3024:
3018:
3017:
3015:
2991:
2985:
2984:
2959:
2946:
2945:
2927:
2921:
2920:
2896:
2890:
2889:
2880:
2878:10.17487/RFC3561
2858:
2852:
2851:
2841:
2821:
2815:
2814:
2778:
2772:
2771:
2764:
2758:
2757:
2747:
2719:
2713:
2712:
2694:
2674:
2668:
2667:
2649:
2629:
2623:
2622:
2588:
2586:cond-mat/0605511
2568:
2562:
2561:
2527:
2507:
2501:
2500:
2489:
2483:
2482:
2470:
2464:
2463:
2455:
2446:
2445:
2443:
2435:
2429:
2428:
2421:
2415:
2414:
2396:
2387:
2386:
2359:. pp. 1โ7.
2352:
2346:
2345:
2327:
2307:
2301:
2300:
2282:
2254:
2248:
2247:
2237:
2227:
2225:10.3390/s8063601
2210:(6): 3601โ3623.
2195:
2189:
2188:
2154:
2148:
2147:
2119:
2110:. pp. 1โ4.
2103:
2097:
2096:
2095:. 27 March 2017.
2089:
2083:
2082:
2080:
2072:
2066:
2065:
2063:
2055:
2049:
2048:
2041:
2035:
2034:
2027:
2021:
2020:
2018:
2012:. Archived from
2007:
1999:
1990:
1989:
1982:
1976:
1975:
1968:
1962:
1961:
1955:
1951:
1949:
1941:
1914:. pp. 1โ8.
1907:
1901:
1900:
1898:
1897:
1883:
1877:
1876:
1874:
1873:
1859:
1853:
1852:
1850:
1848:
1833:
1827:
1826:
1824:
1822:
1816:
1805:
1797:
1791:
1790:
1788:
1786:
1780:
1769:
1761:
1755:
1754:
1749:
1747:
1738:. Archived from
1727:
1721:
1720:
1709:
1703:
1702:
1690:
1684:
1683:
1676:
1670:
1669:
1662:
1656:
1655:
1621:
1615:
1614:
1586:
1580:
1579:
1573:
1568:
1566:
1558:
1556:
1544:
1538:
1537:
1530:
1524:
1523:
1514:
1512:10.17487/RFC4728
1492:
1486:
1485:
1479:
1474:
1472:
1464:
1462:
1453:
1447:
1446:
1426:
1420:
1419:
1412:
1406:
1405:
1397:
1391:
1390:
1362:
1356:
1355:
1348:
1342:
1341:
1335:
1330:
1328:
1320:
1300:
1294:
1293:
1283:
1268:
1262:
1261:
1246:
1240:
1239:
1221:
1212:
1211:
1193:
1187:
1186:
1166:
1069:Trust management
999:unit disk graphs
820:reactive routing
764:Reactive routing
287:radio cards for
244:, February 1998.
226:Packet Radio Van
203:ad hoc network.
153:. Instead, each
139:wireless network
114:
107:
103:
100:
94:
92:
51:
27:
19:
4024:
4023:
4019:
4018:
4017:
4015:
4014:
4013:
3999:
3998:
3997:
3992:
3965:
3934:
3906:
3853:
3802:
3787:
3772:
3754:
3711:
3688:
3637:
3628:
3591:
3495:Kahn, Robert E.
3473:(12): 159โ167.
3331:
3329:Further reading
3326:
3302:10.1.1.409.2078
3285:
3278:
3263:
3234:
3226:
3222:
3215:
3183:
3179:
3172:
3168:
3153:
3121:
3117:
3086:(2): 986โ1028.
3076:
3072:
3057:
3038:10.1.1.414.4950
3025:
3021:
3013:10.1002/wcm.859
2992:
2988:
2981:
2960:
2949:
2942:
2928:
2924:
2897:
2893:
2859:
2855:
2822:
2818:
2779:
2775:
2770:. 11 June 2016.
2766:
2765:
2761:
2745:10.1.1.563.4078
2720:
2716:
2675:
2671:
2647:10.1.1.576.3842
2630:
2626:
2569:
2565:
2508:
2504:
2490:
2486:
2471:
2467:
2456:
2449:
2441:
2437:
2436:
2432:
2423:
2422:
2418:
2411:
2397:
2390:
2375:
2353:
2349:
2325:10.1.1.475.2016
2308:
2304:
2280:10.1.1.724.1158
2255:
2251:
2196:
2192:
2177:
2155:
2151:
2136:
2117:10.1.1.397.7540
2104:
2100:
2091:
2090:
2086:
2078:
2074:
2073:
2069:
2061:
2057:
2056:
2052:
2043:
2042:
2038:
2029:
2028:
2024:
2016:
2005:
2001:
2000:
1993:
1984:
1983:
1979:
1970:
1969:
1965:
1953:
1952:
1943:
1942:
1930:
1908:
1904:
1895:
1893:
1885:
1884:
1880:
1871:
1869:
1861:
1860:
1856:
1846:
1844:
1835:
1834:
1830:
1820:
1818:
1814:
1803:
1799:
1798:
1794:
1784:
1782:
1778:
1767:
1763:
1762:
1758:
1745:
1743:
1728:
1724:
1711:
1710:
1706:
1691:
1687:
1678:
1677:
1673:
1664:
1663:
1659:
1644:
1622:
1618:
1587:
1583:
1571:
1569:
1560:
1559:
1554:10.1.1.960.8621
1546:
1545:
1541:
1532:
1531:
1527:
1493:
1489:
1477:
1475:
1466:
1465:
1460:
1454:
1450:
1443:
1427:
1423:
1414:
1413:
1409:
1398:
1394:
1363:
1359:
1350:
1349:
1345:
1333:
1331:
1322:
1321:
1301:
1297:
1281:
1269:
1265:
1248:
1247:
1243:
1236:
1222:
1215:
1194:
1190:
1183:
1175:. Springer US.
1167:
1158:
1154:
1090:
1071:
1027:
1019:graph-theoretic
986:according to a
945:
924:
904:
884:
878:
862:
843:
812:
792:
766:
749:
726:
718:
686:
607:
593:
584:
567:
554:
546:queueing theory
537:data redundancy
520:
511:
502:
493:
475:
473:Sensor networks
466:
460:from Slovenia.
436:
423:
414:
408:
376:
361:
352:
343:
297:
214:
209:
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
4022:
4012:
4011:
3994:
3993:
3991:
3990:
3985:
3979:
3977:
3971:
3970:
3967:
3966:
3964:
3963:
3958:
3953:
3948:
3942:
3940:
3936:
3935:
3933:
3932:
3927:
3922:
3916:
3914:
3912:Collision-free
3908:
3907:
3905:
3904:
3899:
3894:
3889:
3884:
3879:
3874:
3869:
3863:
3861:
3855:
3854:
3852:
3851:
3846:
3841:
3836:
3831:
3825:
3823:
3814:
3808:
3807:
3804:
3803:
3801:
3800:
3797:
3795:
3789:
3788:
3786:
3785:
3782:
3780:
3774:
3773:
3771:
3770:
3764:
3762:
3756:
3755:
3753:
3752:
3747:
3742:
3737:
3732:
3727:
3721:
3719:
3713:
3712:
3710:
3709:
3704:
3698:
3696:
3690:
3689:
3687:
3686:
3685:
3684:
3674:
3673:
3672:
3667:
3656:
3654:
3645:
3639:
3638:
3627:
3626:
3619:
3612:
3604:
3598:
3597:
3590:
3589:External links
3587:
3586:
3585:
3548:
3511:
3491:
3462:
3433:
3420:10.1.1.25.2774
3402:
3389:10.1.1.11.8637
3372:Chai Keong Toh
3367:
3330:
3327:
3325:
3324:
3295:(4): 562โ583.
3276:
3261:
3244:10.1.1.11.4621
3220:
3213:
3196:10.1.1.13.1450
3177:
3166:
3151:
3115:
3070:
3055:
3019:
3006:(7): 813โ828.
2986:
2980:978-1107039889
2979:
2947:
2940:
2922:
2891:
2853:
2839:10.1.1.11.8637
2816:
2773:
2759:
2714:
2692:10.1.1.59.3414
2685:(6): 680โ694.
2669:
2640:(3): 257โ269.
2624:
2563:
2502:
2484:
2465:
2447:
2430:
2416:
2409:
2388:
2373:
2347:
2302:
2249:
2190:
2175:
2149:
2134:
2098:
2084:
2067:
2050:
2036:
2022:
2019:on 2017-08-01.
1991:
1977:
1963:
1954:|journal=
1928:
1902:
1878:
1854:
1828:
1792:
1756:
1742:on 24 May 2022
1722:
1704:
1685:
1671:
1657:
1642:
1616:
1581:
1572:|journal=
1539:
1525:
1487:
1478:|journal=
1448:
1441:
1421:
1407:
1392:
1373:(2): 103โ139.
1357:
1343:
1334:|journal=
1295:
1271:J. Burchfiel;
1263:
1241:
1234:
1213:
1188:
1181:
1155:
1153:
1150:
1149:
1148:
1143:
1138:
1133:
1128:
1123:
1117:
1112:
1107:
1101:
1096:
1089:
1086:
1070:
1067:
1026:
1023:
944:
941:
923:
920:
903:
900:
880:Main article:
877:
874:
861:
858:
842:
839:
831:
830:
827:
811:
810:Hybrid routing
808:
791:
788:
777:
776:
773:
765:
762:
748:
745:
737:
736:
733:
725:
722:
717:
714:
702:network design
685:
684:Protocol stack
682:
625:Radios can be
606:
603:
602:
601:
592:
589:
583:
580:
566:
563:
553:
550:
519:
516:
510:
507:
501:
498:
492:
489:
474:
471:
465:
462:
435:
432:
422:
419:
410:Main article:
407:
404:
375:
372:
360:
357:
351:
348:
342:
339:
321:Chai Keong Toh
299:The growth of
296:
293:
230:internetworked
213:
210:
208:
205:
117:
116:
31:
29:
22:
15:
9:
6:
4:
3:
2:
4021:
4010:
4007:
4006:
4004:
3989:
3986:
3984:
3981:
3980:
3978:
3976:
3972:
3962:
3959:
3957:
3954:
3952:
3949:
3947:
3944:
3943:
3941:
3937:
3931:
3928:
3926:
3923:
3921:
3918:
3917:
3915:
3913:
3909:
3903:
3900:
3898:
3895:
3893:
3890:
3888:
3885:
3883:
3880:
3878:
3875:
3873:
3870:
3868:
3865:
3864:
3862:
3860:
3856:
3850:
3847:
3845:
3842:
3840:
3837:
3835:
3834:Slotted ALOHA
3832:
3830:
3827:
3826:
3824:
3822:
3818:
3815:
3813:
3809:
3799:
3798:
3796:
3794:
3790:
3784:
3783:
3781:
3779:
3775:
3769:
3766:
3765:
3763:
3761:
3757:
3751:
3748:
3746:
3743:
3741:
3738:
3736:
3733:
3731:
3728:
3726:
3723:
3722:
3720:
3718:
3714:
3708:
3705:
3703:
3700:
3699:
3697:
3695:
3691:
3683:
3680:
3679:
3678:
3675:
3671:
3668:
3666:
3663:
3662:
3661:
3658:
3657:
3655:
3653:
3649:
3646:
3644:
3643:Channel-based
3640:
3636:
3632:
3625:
3620:
3618:
3613:
3611:
3606:
3605:
3602:
3596:
3593:
3592:
3582:
3578:
3574:
3570:
3566:
3562:
3558:
3554:
3549:
3545:
3541:
3537:
3533:
3529:
3525:
3521:
3517:
3512:
3508:
3504:
3500:
3496:
3492:
3488:
3484:
3480:
3476:
3472:
3468:
3463:
3459:
3455:
3451:
3447:
3443:
3439:
3434:
3430:
3426:
3421:
3416:
3412:
3408:
3403:
3399:
3395:
3390:
3385:
3381:
3377:
3373:
3368:
3363:
3358:
3354:
3350:
3346:
3342:
3338:
3333:
3332:
3320:
3316:
3312:
3308:
3303:
3298:
3294:
3290:
3283:
3281:
3272:
3268:
3264:
3258:
3254:
3250:
3245:
3240:
3233:
3232:
3224:
3216:
3210:
3206:
3202:
3197:
3192:
3188:
3181:
3170:
3162:
3158:
3154:
3148:
3144:
3140:
3135:
3130:
3126:
3119:
3111:
3107:
3103:
3099:
3094:
3089:
3085:
3081:
3074:
3066:
3062:
3058:
3052:
3048:
3044:
3039:
3034:
3030:
3023:
3014:
3009:
3005:
3001:
2997:
2990:
2982:
2976:
2972:
2968:
2964:
2958:
2956:
2954:
2952:
2943:
2941:9780849392542
2937:
2933:
2926:
2918:
2914:
2910:
2906:
2902:
2895:
2887:
2884:
2879:
2874:
2870:
2866:
2865:
2857:
2849:
2845:
2840:
2835:
2831:
2827:
2820:
2812:
2808:
2804:
2800:
2796:
2792:
2788:
2784:
2777:
2769:
2763:
2755:
2751:
2746:
2741:
2737:
2733:
2729:
2725:
2718:
2710:
2706:
2702:
2698:
2693:
2688:
2684:
2680:
2673:
2665:
2661:
2657:
2653:
2648:
2643:
2639:
2635:
2628:
2620:
2616:
2612:
2608:
2604:
2600:
2596:
2592:
2587:
2582:
2578:
2574:
2567:
2559:
2555:
2551:
2547:
2543:
2539:
2535:
2531:
2526:
2521:
2517:
2513:
2506:
2498:
2494:
2488:
2481:(8): 453โ457.
2480:
2476:
2469:
2461:
2454:
2452:
2440:
2434:
2426:
2420:
2412:
2410:9780133007060
2406:
2402:
2395:
2393:
2384:
2380:
2376:
2370:
2366:
2362:
2358:
2351:
2343:
2339:
2335:
2331:
2326:
2321:
2317:
2313:
2306:
2298:
2294:
2290:
2286:
2281:
2276:
2272:
2268:
2264:
2260:
2253:
2245:
2241:
2236:
2231:
2226:
2221:
2217:
2213:
2209:
2205:
2201:
2194:
2186:
2182:
2178:
2172:
2168:
2164:
2160:
2153:
2145:
2141:
2137:
2131:
2127:
2123:
2118:
2113:
2109:
2102:
2094:
2088:
2077:
2071:
2060:
2054:
2046:
2040:
2032:
2026:
2015:
2011:
2004:
1998:
1996:
1988:. 2017-02-23.
1987:
1981:
1974:. 2013-12-06.
1973:
1967:
1959:
1947:
1939:
1935:
1931:
1925:
1921:
1917:
1913:
1906:
1892:
1888:
1882:
1868:
1864:
1858:
1843:. 31 Aug 2020
1842:
1838:
1832:
1813:
1809:
1802:
1796:
1777:
1773:
1766:
1760:
1753:
1741:
1737:
1733:
1726:
1718:
1714:
1708:
1700:
1696:
1689:
1682:. 2016-10-13.
1681:
1675:
1667:
1661:
1653:
1649:
1645:
1639:
1635:
1631:
1627:
1620:
1612:
1608:
1604:
1600:
1596:
1592:
1585:
1577:
1564:
1555:
1550:
1543:
1535:
1529:
1521:
1518:
1513:
1508:
1504:
1500:
1499:
1491:
1483:
1470:
1459:
1452:
1444:
1442:9780132442046
1438:
1434:
1433:
1425:
1417:
1411:
1403:
1396:
1388:
1384:
1380:
1376:
1372:
1368:
1361:
1353:
1347:
1339:
1326:
1318:
1314:
1310:
1306:
1299:
1291:
1287:
1280:
1279:
1274:
1267:
1259:
1255:
1251:
1245:
1237:
1235:9780130078179
1231:
1227:
1220:
1218:
1209:
1205:
1201:
1200:
1192:
1184:
1182:9780792398226
1178:
1174:
1173:
1165:
1163:
1161:
1156:
1147:
1144:
1142:
1139:
1137:
1134:
1132:
1129:
1127:
1124:
1121:
1118:
1116:
1113:
1111:
1108:
1105:
1102:
1100:
1097:
1095:
1092:
1091:
1085:
1083:
1079:
1075:
1066:
1064:
1060:
1056:
1052:
1048:
1044:
1040:
1035:
1031:
1022:
1020:
1016:
1012:
1008:
1004:
1000:
996:
992:
989:
985:
981:
977:
973:
972:point process
969:
965:
956:
952:
950:
940:
937:
933:
929:
926:In 2009, the
919:
917:
913:
909:
899:
897:
893:
889:
883:
873:
869:
865:
857:
855:
850:
848:
838:
836:
828:
825:
824:
823:
821:
817:
807:
805:
801:
797:
787:
785:
780:
774:
771:
770:
769:
761:
759:
755:
744:
742:
734:
731:
730:
729:
721:
713:
711:
706:
703:
698:
694:
691:
681:
679:
675:
671:
668:, as used in
667:
662:
658:
655:
650:
647:
642:
640:
636:
632:
628:
623:
621:
616:
612:
599:
595:
594:
588:
579:
575:
573:
562:
560:
549:
547:
542:
538:
533:
532:air pollution
529:
525:
515:
506:
497:
488:
486:
481:
470:
461:
459:
453:
451:
447:
443:
441:
431:
429:
418:
413:
403:
401:
397:
393:
392:hub and spoke
389:
385:
381:
371:
369:
365:
356:
347:
338:
336:
331:
327:
322:
317:
314:
310:
306:
302:
292:
290:
286:
281:
279:
275:
271:
270:Ray Tomlinson
267:
263:
259:
255:
251:
243:
238:
232:transmission.
231:
227:
223:
218:
204:
202:
198:
194:
189:
187:
183:
179:
175:
169:
166:
164:
160:
156:
152:
148:
144:
140:
136:
132:
128:
124:
113:
110:
102:
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: โ
59:
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
3812:Packet-based
3559:(1): 83โ99.
3556:
3552:
3522:(1): 21โ32.
3519:
3515:
3498:
3470:
3466:
3441:
3437:
3413:(6): 30โ39.
3410:
3407:IEEE Network
3406:
3382:(2): 46โ55.
3379:
3375:
3344:
3340:
3292:
3288:
3230:
3223:
3186:
3180:
3169:
3124:
3118:
3083:
3079:
3073:
3028:
3022:
3003:
2999:
2989:
2966:
2963:Guowang Miao
2931:
2925:
2908:
2904:
2894:
2863:
2856:
2832:(2): 46โ55.
2829:
2825:
2819:
2786:
2782:
2776:
2762:
2730:(1): 51โ60.
2727:
2723:
2717:
2682:
2678:
2672:
2637:
2633:
2627:
2576:
2572:
2566:
2515:
2511:
2505:
2496:
2487:
2478:
2474:
2468:
2459:
2433:
2419:
2400:
2356:
2350:
2315:
2311:
2305:
2262:
2258:
2252:
2207:
2203:
2193:
2158:
2152:
2107:
2101:
2087:
2070:
2053:
2039:
2025:
2014:the original
1980:
1966:
1911:
1905:
1894:. Retrieved
1890:
1881:
1870:. Retrieved
1866:
1857:
1845:. Retrieved
1840:
1831:
1819:. Retrieved
1812:the original
1807:
1795:
1783:. Retrieved
1776:the original
1771:
1759:
1751:
1744:. Retrieved
1740:the original
1735:
1725:
1716:
1707:
1698:
1688:
1674:
1660:
1625:
1619:
1594:
1590:
1584:
1563:cite journal
1542:
1528:
1497:
1490:
1469:cite journal
1451:
1431:
1424:
1410:
1395:
1370:
1366:
1360:
1351:
1346:
1325:cite journal
1298:
1277:
1273:R. Tomlinson
1266:
1253:
1244:
1225:
1198:
1191:
1171:
1131:Wi-Fi Direct
1080:
1076:
1072:
1036:
1032:
1028:
1007:connectivity
961:
946:
925:
914:, NetSim or
905:
896:interference
885:
870:
866:
863:
851:
844:
832:
819:
815:
813:
793:
781:
778:
767:
750:
738:
727:
719:
709:
707:
699:
695:
690:OSI protocol
687:
663:
659:
651:
643:
624:
608:
591:Side effects
585:
576:
568:
555:
521:
512:
503:
494:
476:
467:
458:BRAMOR C4EYE
454:
444:
437:
424:
415:
396:Wi-Fi Direct
377:
362:
353:
344:
341:Applications
318:
305:802.11/Wi-Fi
298:
282:
254:packet radio
247:
212:Packet radio
197:transceivers
190:
170:
167:
134:
130:
126:
122:
120:
105:
99:January 2024
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
3444:(4): 2โ28.
3370:Royer, E.;
3347:(12): 1โ8.
2493:Giordano, S
1597:(2): 6โ20.
1126:Smart meter
1003:observables
982:, mutually
539:due to the
528:data mining
266:Robert Kahn
3920:Token Ring
2265:(3): 641.
1896:2024-09-01
1872:2024-09-01
1717:Prnewswire
1152:References
1011:centrality
997:(see e.g.
962:These are
930:(ARL) and
902:Simulation
888:collisions
611:modulation
552:Challenges
201:link layer
159:forwarding
69:newspapers
3925:Token bus
3902:CSMA/CARP
3415:CiteSeerX
3384:CiteSeerX
3297:CiteSeerX
3239:CiteSeerX
3191:CiteSeerX
3134:1410.8521
3093:1311.3897
3033:CiteSeerX
2834:CiteSeerX
2803:1550-4859
2740:CiteSeerX
2687:CiteSeerX
2642:CiteSeerX
2525:0806.1256
2320:CiteSeerX
2275:CiteSeerX
2112:CiteSeerX
1956:ignored (
1946:cite book
1611:206470694
1549:CiteSeerX
1017:) from a
1005:(such as
993:of their
833:Example:
816:proactive
782:Example:
739:Example:
620:regulated
615:bandwidth
526:data for
450:Logistics
388:Bluetooth
309:protocols
186:bandwidth
4003:Category
3930:MS-ALOHA
3735:TD-SCDMA
3544:13345464
3487:20381835
3458:11135536
3319:14849884
3110:54549743
3065:14810551
2664:15031580
2611:16437114
2550:18528393
2244:27879895
2185:35790010
2144:14208144
1938:43655770
1652:25800906
1387:14335563
1317:57373343
1088:See also
1025:Security
790:Flooding
654:802.11ax
491:Robotics
452:), etc.
193:Internet
165:in use.
3882:CSMA/CA
3849:CSMA/CD
3839:R-ALOHA
3768:HC-SDMA
3750:MC-CDMA
3745:FH-CDMA
3740:DS-CDMA
3730:TD-CDMA
3702:MF-TDMA
3670:SC-FDMA
3581:1779198
3561:Bibcode
3524:Bibcode
3349:Bibcode
3271:7082229
2811:8240984
2732:Bibcode
2709:6352586
2619:4330122
2591:Bibcode
2558:4419468
2530:Bibcode
2383:9755353
2342:5879608
2297:1639100
2267:Bibcode
2235:3714656
2212:Bibcode
2204:Sensors
1821:10 June
1785:10 June
1746:10 June
1736:Twitter
1719:. 2021.
1045:, most
1013:or the
988:Boolean
984:coupled
978:of the
786:(AODV)
743:(OLSR)
716:Routing
710:in situ
301:laptops
207:History
182:goodput
178:packets
147:routers
83:scholar
3725:W-CDMA
3579:
3542:
3485:
3456:
3417:
3386:
3317:
3299:
3269:
3259:
3241:
3211:
3193:
3161:928409
3159:
3149:
3108:
3063:
3053:
3035:
2977:
2938:
2836:
2809:
2801:
2742:
2707:
2689:
2662:
2644:
2617:
2609:
2573:Nature
2556:
2548:
2512:Nature
2407:
2381:
2371:
2340:
2322:
2295:
2277:
2242:
2232:
2183:
2173:
2142:
2132:
2114:
1936:
1926:
1650:
1640:
1609:
1551:
1439:
1385:
1315:
1232:
1179:
1106:(IBSS)
1053:using
1051:MACsec
976:subset
964:graphs
837:(ZRP)
676:, and
670:4G LTE
524:sensor
400:iPhone
364:VANETs
285:802.11
252:, the
174:router
143:ad hoc
85:
78:
71:
64:
56:
3951:VANET
3946:MANET
3872:MACAW
3844:AX.25
3829:ALOHA
3707:STDMA
3665:OFDMA
3577:S2CID
3540:S2CID
3483:S2CID
3454:S2CID
3315:S2CID
3267:S2CID
3235:(PDF)
3157:S2CID
3129:arXiv
3106:S2CID
3088:arXiv
3061:S2CID
2807:S2CID
2705:S2CID
2660:S2CID
2615:S2CID
2581:arXiv
2554:S2CID
2520:arXiv
2442:(PDF)
2379:S2CID
2338:S2CID
2293:S2CID
2181:S2CID
2140:S2CID
2079:(PDF)
2062:(PDF)
2017:(PDF)
2006:(PDF)
1934:S2CID
1847:1 Sep
1815:(PDF)
1804:(PDF)
1779:(PDF)
1768:(PDF)
1648:S2CID
1607:S2CID
1461:(PDF)
1383:S2CID
1313:S2CID
1282:(PDF)
1122:(PAN)
1057:-256-
1043:HTTPS
968:nodes
912:OPNET
804:DVMRP
678:Wi-Fi
639:Wi-Fi
384:Wi-Fi
274:SURAN
250:PRNET
135:MANET
129:) or
127:WANET
90:JSTOR
76:books
3877:CSMA
3867:MACA
3793:PAMA
3778:PDMA
3760:SDMA
3717:CDMA
3694:TDMA
3682:WDMA
3652:FDMA
3633:and
3257:ISBN
3209:ISBN
3147:ISBN
3051:ISBN
2975:ISBN
2936:ISBN
2886:3561
2869:IETF
2799:ISSN
2607:PMID
2546:PMID
2475:JAIR
2405:ISBN
2369:ISBN
2240:PMID
2171:ISBN
2130:ISBN
1958:help
1924:ISBN
1849:2024
1823:2022
1787:2022
1748:2022
1638:ISBN
1576:help
1520:4728
1503:IETF
1482:help
1437:ISBN
1338:help
1230:ISBN
1177:ISBN
1047:VPNs
818:and
800:OSPF
758:IGRP
386:and
380:SPAN
330:IETF
313:hops
303:and
155:node
62:news
3988:FDD
3983:TDD
3956:DTN
3897:HCF
3892:PCF
3887:DCF
3677:WDM
3660:FDM
3569:doi
3532:doi
3503:doi
3475:doi
3446:doi
3425:doi
3394:doi
3357:doi
3345:134
3307:doi
3249:doi
3201:doi
3139:doi
3098:doi
3043:doi
3008:doi
2913:doi
2883:RFC
2873:doi
2844:doi
2791:doi
2750:doi
2728:315
2697:doi
2652:doi
2599:doi
2577:439
2538:doi
2516:453
2361:doi
2330:doi
2285:doi
2230:PMC
2220:doi
2163:doi
2122:doi
1916:doi
1630:doi
1599:doi
1517:RFC
1507:doi
1375:doi
1305:doi
1286:doi
1204:doi
1065:).
1059:GCM
1055:AES
1039:PKI
916:ns2
854:LAR
847:GPS
754:RIP
646:VHF
635:EHF
631:SHF
627:UHF
428:SRW
224:'s
149:or
45:by
4005::
3575:.
3567:.
3557:75
3555:.
3538:.
3530:.
3520:75
3518:.
3481:.
3471:48
3469:.
3452:.
3440:.
3423:.
3409:.
3392:.
3378:.
3355:.
3343:.
3339:.
3313:.
3305:.
3293:13
3291:.
3279:^
3265:.
3255:.
3247:.
3207:.
3199:.
3155:.
3145:.
3137:.
3104:.
3096:.
3084:26
3082:.
3059:.
3049:.
3041:.
3004:11
3002:.
2998:.
2973:.
2969:.
2950:^
2909:28
2907:.
2903:.
2881:.
2871:.
2867:.
2842:.
2828:.
2805:.
2797:.
2785:.
2748:.
2738:.
2726:.
2703:.
2695:.
2681:.
2658:.
2650:.
2636:.
2613:.
2605:.
2597:.
2589:.
2575:.
2552:.
2544:.
2536:.
2528:.
2514:.
2477:.
2450:^
2391:^
2377:.
2367:.
2336:.
2328:.
2316:23
2314:.
2291:.
2283:.
2273:.
2263:11
2261:.
2238:.
2228:.
2218:.
2206:.
2202:.
2179:.
2169:.
2138:.
2128:.
2120:.
2008:.
1994:^
1950::
1948:}}
1944:{{
1932:.
1922:.
1889:.
1865:.
1839:.
1806:.
1770:.
1750:.
1734:.
1715:.
1697:.
1646:.
1636:.
1605:.
1593:.
1567::
1565:}}
1561:{{
1515:.
1505:.
1501:.
1473::
1471:}}
1467:{{
1381:.
1369:.
1329::
1327:}}
1323:{{
1311:.
1256:.
1252:.
1216:^
1159:^
1063:IV
1009:,
856:)
802:,
680:.
674:5G
672:,
548:.
378:A
337:.
280:.
220:A
121:A
3623:e
3616:t
3609:v
3583:.
3571::
3563::
3546:.
3534::
3526::
3509:.
3505::
3489:.
3477::
3460:.
3448::
3442:7
3431:.
3427::
3411:1
3400:.
3396::
3380:6
3365:.
3359::
3351::
3321:.
3309::
3273:.
3251::
3217:.
3203::
3163:.
3141::
3131::
3112:.
3100::
3090::
3067:.
3045::
3016:.
3010::
2983:.
2944:.
2919:.
2915::
2888:.
2875::
2850:.
2846::
2830:6
2813:.
2793::
2787:7
2756:.
2752::
2734::
2711:.
2699::
2683:5
2666:.
2654::
2638:2
2621:.
2601::
2593::
2583::
2560:.
2540::
2532::
2522::
2479:2
2444:.
2427:.
2413:.
2385:.
2363::
2344:.
2332::
2299:.
2287::
2269::
2246:.
2222::
2214::
2208:8
2187:.
2165::
2146:.
2124::
2081:.
2064:.
2047:.
2033:.
1960:)
1940:.
1918::
1899:.
1875:.
1851:.
1825:.
1789:.
1701:.
1668:.
1654:.
1632::
1613:.
1601::
1595:2
1578:)
1574:(
1557:.
1536:.
1522:.
1509::
1484:)
1480:(
1463:.
1445:.
1418:.
1404:.
1389:.
1377::
1371:4
1340:)
1336:(
1319:.
1307::
1292:.
1288::
1260:.
1238:.
1210:.
1206::
1185:.
600:.
133:(
125:(
112:)
106:(
101:)
97:(
87:ยท
80:ยท
73:ยท
66:ยท
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.