Home » , » Download PDF THE HANDBOOK OF AD HOC WIRELESS NETWORKS by Mohammad Ilyas

Download PDF THE HANDBOOK OF AD HOC WIRELESS NETWORKS by Mohammad Ilyas


Sinopsis

In recent years, the proliferation of mobile computing devices (e. g., laptops, handheld digital devices, personal digital assistants [P DAs], and wearable computers) has driven a revolutionary change in the computing world. As shown in Fig. 1.1, we are moving from the Personal Computer (PC) age (i.e., one computing device per person ) to the Ubiquitous Computing age in which individual users utilize, at the same time, several electroni c platforms through which they can access all the required information whenever and wherever they may be [47]. The nature of ubiquitous devices makes wireless networks the easiest solution for their inte rconnection. This has led to rapid growth in the use of wireless technologies for the Local Area Network (LAN) environment. Beyond supporting wireless connectivity for fixed, portable, and moving statio ns within a local area, wireless LAN (WLAN) technologies can provide a mobile and ubiquitous connection to Internet information services [10]. It is foreseeable that in the notso- distant future, WLAN technologies will be utilized largely as means to access the Internet.

WLAN products consum e too much power and have excessive range for many personal consumer electronic and computer devices [40]. A new class of networks is therefore emerging: Personal Area Networks. A Personal Area N etwork (PAN) allows the proximal devices to dynamically share information with minimum power consumption [49]. LANs and PANs do not m eet all the networking requirements of ubiquitous computing. Situations exist where carrying and ho lding a computer are not practical (e.g., assembly line work). A wearable computer solves these prob lems by distributing computer components (e.g., head-mounted displays, microphones, earphones, processors, and mass storage) on the body [21,49]. Users can thus receive jobcritical information and mai ntain control of their devices while their hands remain free for other work. A network with a transmission range of a human body, i.e., a Body Area Network (BAN), constitutes the best solution for connecting wearable devices. Wireless connectivity is envisaged as a natural solution for BANs.

Content

  1. Body, Personal, and Local Ad Hoc Wireless Networks
  2. Multicasting Techniques in Mobile Ad Hoc Networks
  3. Quality of Service in Mobile Ad Hoc Networks
  4. Power-Conservative Designs in Ad Hoc Wireless Networks
  5. Performance Analysis of Wireless Ad Hoc Networks
  6. Coding for the Wireless Channel
  7. Unicast Routing Techniques for Mobile Ad Hoc Networks
  8. Satellite Communications
  9. Wireless Communication Protocols
  10. An Integrated Platform for Ad Hoc GSM Cellular Communications
  11. IEEE 802.11 and Bluetooth: An Architectural Overview
  12. Position-Based Routing in Ad Hoc Wireless Networks
  13. Structured Proactive and Reactive Routing for Wireless Mobile Ad Hoc
  14. Hybrid Routing: The Pursuit of an Adaptable and Scalable Routing Framework for Ad Hoc Networks
  15. Adaptive Routing in Ad Hoc Networks
  16. Position-Based Ad Hoc Routes in Ad Hoc Networks
  17. Route Discovery Optimization Techniques in Ad Hoc Networks
  18. Location-Aware Routing and Applications of Mobile Ad Hoc Networks
  19. Mobility over Transport Control Protocol/Internet Protocol (TCP/IP)
  20. An Intelligent On-Demand Multicast Routing Protocol in Ad Hoc Networks
  21. GPS-Based Reliable Routing Algorithms for Ad Hoc Networks
  22. Power-Aware Wireless Mobile Ad Hoc Networks
  23. Energy Efficient Multicast in Ad Hoc Networks
  24. Energy-Conserving Grid Routing Protocol in Mobile Ad Hoc Networks
  25. Routing Algorithms for Balanced Energy Consumption in Ad Hoc Networks
  26. Resource Discovery in Mobile Ad Hoc Networks
  27. An Integrated Platform for Quality-of-Service Support in Mobile Multimedia Clustered Ad Hoc Networks
  28. Quality of Service Models for Ad Hoc Wireless Networks
  29. Scheduling of Broadcasts in Multihop Wireless Networks
  30. Security in Wireless Ad Hoc Networks — A Survey
  31. Securing Mobile Ad Hoc Networks
  32. Security Issues in Ad Hoc Networks



0 komentar:

Posting Komentar