Dissertations / Theses on the topic 'Ad-hoc network'

To see the other types of publications on this topic, follow the link: Ad-hoc network.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Ad-hoc network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Suh, Kyungjoo. "CRYPTO-AD-HOC network an ad hoc network protocol embedded cryptography /." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000164.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2002.
Title from title page of source document. Document formatted into pages; contains x, 80 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
2

Han, Seon Yeong. "Shadowing effect on ad hoc network." Diss., Online access via UMI:, 2004. http://wwwlib.umi.com/dissertations/fullcit/1422359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mak, Wai Y. "Ad Hoc Network Architecture for Multi-Media Networks." Thesis, Monterey California. Naval Postgraduate School, 2007. http://hdl.handle.net/10945/2988.

Full text
Abstract:
The desire for more intelligence in the battlefield has given rise to the idea of routing video images over wireless sensor networks. This would apprise combat decision makers with actual images of battlefield developments and allow them to make sound decisions. To achieve this objective, the characteristics of video traffic must be studied and understood. This thesis focuses on evaluating the possibility of routing video images over a wireless sensor network. Video traffic is modeled and simulations are performed via the use of the Sun Small Programmable Object Technology (Sun SPOT) Java development kits configured in three different network topologies: the star topology, binary tree topology and chain topology. It is known that video traffic is self similar and can be obtained by aggregating a large number of On-Off message sources. Hence, an On-Off model using Pareto distribution function is used to model video traffic over the network. In this thesis four self-similar shaping parameters, i.e., alpha(On) = 1.2, 1.4, 1.7 and 1.9 are used in the simulations. The performance of each topology is evaluated based on parameters like mean throughput, mean interarrival time, mean packet drop, and mean delay.
Singapore Armed Forces author.
APA, Harvard, Vancouver, ISO, and other styles
4

ISHII, Yoji, Koichi ASAKURA, and Toyohide WATANABE. "Information Services with Ad-hoc Network." INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2005. http://hdl.handle.net/2237/10433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Graarud, Espen Grannes. "Implementing a Secure Ad Hoc Network." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-14474.

Full text
Abstract:
In emergency situations such as natural disasters the emergency personell shouldbe able to establish communication fast and reliably. Depending on the nature ofthe disaster one cannot rely on existing communication infrastructure, or accessto centralized administration. Additionally the established communication needsauthentication in order to handle access control so only trusted parties canpartake. A suitable medium for such communication is wireless ad hoc networks,but their flat structure make authentication a very challenging task.In this thesis a system design for an ad hoc routing protocol combined withaccess control is proposed, and implemented extending a popular routing protocolcalled BATMAN. The proposed authentication scheme relies on special public keycertificates called proxy certificates, and combined with a neighbor trustmechanism both authentication and access control are managed in a secure manner.Tests using mobile nodes running this implementation shows that the performanceof the proposed design is comparable to the original routing protocol (BATMAN)used, and that the authentication process is manageable even for mobile ad hocnetworks.
APA, Harvard, Vancouver, ISO, and other styles
6

Giang, Anh Tuan. "Capacity of vehicular Ad-hoc NETwork." Phd thesis, Université Paris Sud - Paris XI, 2014. http://tel.archives-ouvertes.fr/tel-00989836.

Full text
Abstract:
In recent years, Inter Vehicle Communication (IVC) has become an intensive research area, as part of Intelligent Transportation Systems. It supposes that all, or a subset of the vehicles is equipped with radio devices, enabling communication between them. IEEE 802.11p (standardized for vehicular communication) shows a great deal of promise. By using ad hoc mode, this radio technology allows vehicles to extend their scopes of communication and thus forming a Multi-hop wireless Ad-hoc NETwork, also called Vehicular Ad-hoc NETwork (VANET). This thesis addresses a fundamental problem of VANET: the network capacity. Two simple theoretical models to estimate this capacity have been proposed: a packing model and a Markovian point process model. They offer simple and closed formulae on the maximum number of simultaneous transmitters, and on the distribution of the distance between them. An accurate upper bound on the maximum capacity had been derived. An analytical formula on distribution of the transmitters had been presented. This distribution allows us to optimize Clear Channel Assessment (CCA) parameters that leads to an optimization of the network capacity.In order to validate the approach of this thesis, results from the analytical models are compared to simulations performed with the network simulator NS-3. Simulation parameters was estimated from real experimentation. Impact of different traffic distributions (traffic of vehicles) on the network capacity is also studied. This thesis also focuses on extended perception map applications, which use information from local and distant sensors to offer driving assistance (autonomous driving, collision warning, etc.). Extended perception requires a high bandwidth that might not be available in practice in classical IEEE 802.11p ad hoc networks. Therefore, this thesis proposes an adaptive power control algorithm optimized for this particular application. It shows through an analytical model and a large set of simulations that the network capacity is then significantly increased.
APA, Harvard, Vancouver, ISO, and other styles
7

Sundaresan, Karthikeyan. "Network Protocols for Ad-Hoc Networks with Smart Antennas." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14122.

Full text
Abstract:
Multi-hop wireless networks or ad-hoc networks face several limiting characteristics that make it difficult to support a multitude of applications. It is in this context that we find smart antennas to find significant applications in these networks, owing to their ability to alleviate most of these limitations. The focus of my research is thus to investigate the use of smart antennas in ad-hoc networks and hence efficiently design network protocols that best leverage their capabilities in communication. There are two parts to the proposed objective of designing efficient network protocols that pertain to the nature of the smart antenna network considered, namely, homogeneous and heterogeneous smart antenna networks. Unlike heterogeneous smart antenna networks, where different devices in the network employ different antenna technologies, homogeneous smart antenna networks consist of devices employing the same antenna technology. Further, in homogeneous smart antenna networks, different antenna technologies operating in different strategies tend to perform the best in different network architectures, conditions and application requirements. This motivates the need for developing a {em unified} framework for designing efficient communication (medium access control and routing) protocols for homogeneous smart antenna networks in general. With the objective of designing such a unified framework, we start by designing efficient MAC and routing protocols for the most sophisticated of the smart antenna technologies, namely multiple-input multiple-output (MIMO) links. The capabilities of MIMO links form a super-set of those possible with other antenna technologies. Hence, the insights gained from the design of communication protocols for MIMO links are then used to develop unified MAC and routing frameworks for smart antennas in general. For heterogeneous smart antenna networks, we develop theoretical performance bounds by studying the impact of increasing degree of heterogeneity on network throughput performance. Given that the antenna technologies are already unified in the network, unified solutions are not required. However, we do develop efficient MAC and routing protocols to best leverage the available heterogeneous capabilities present in the network. We also design efficient cooperation strategies that will further help the communication protocols in exploiting the available heterogeneous capabilities in the network to the best possible extent.
APA, Harvard, Vancouver, ISO, and other styles
8

Brännström, Robert. "Network-layer mobility in wireless ad hoc access networks." Licentiate thesis, Luleå tekniska universitet, Datavetenskap, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-17093.

Full text
Abstract:
This thesis proposes and discusses solutions to enable network-layer mobility in wireless ad hoc access networks. The deployment of wireless access networks has made them ubiquitous and current research strives to make them pervasive. Users having wireless access to wired IP networks and the Internet are driving the demand for mobile and heterogeneous solutions. To enable all kinds of mobility in heterogeneous All-IP networks there are many issues to be solved. This thesis focuses on network-layer mobility and connectivity of wireless multi-hop ad hoc networks to the Internet. In a wireless environment with overlapping service areas, mobile hosts need to select which gateway(s) to use to access the wireless infrastructure. The signal-to-noise ratio of an access point, which is part of a wireless LAN, does not reflect the number of attached hosts or the traffic between them. The throughput of the access point could be low while the signal is strong. At the same time an access point with weaker signal could allow higher throughput. In ad hoc routing, hop count is the most common metric and the selection of a route to a gateway is affected by the same utilization problem. This could lead to a situation where a short route is used by more hosts and performing worse than a longer route serving fewer hosts. This thesis proposes and discusses solutions to calculating network-layer metrics and using them in gateway selection and handover decisions. To enable connectivity of a mobile ad hoc network (MANET) to the Internet, a gateway must support the wired single-hop and wireless multi-hop approaches. To deploy network-layer mobility in a MANET, the Mobile IP protocol needs to be adapted for the multi-hop environment. A MANET enables connectivity to more than one gateway at a time and combined with multihoming it provides seamless handover between subnets. The gateway selection and handover decisions are complicated by the multihoming capabilities. This thesis proposes and discusses solutions to deploying multihomed mobility into MANETs and thereby handling multi-hop gateway discovery, registration of multiple gateways and tunneling to selected gateway(s). Traffic patterns in wired LANs generally follow the 80/20 ratio of Internet destined vs. local traffic. The same traffic patterns generally hold true for wireless hosts. Therefore it is important to maintain the route to the gateway for the Internet destined traffic. This thesis proposes and discusses a solution to maintaining gateway connectivity in MANETs by installing routes to gateways using advertisements. Deciding the locality of a peer and setting up the forwarding route differs between single-hop and multi-hop networks. In single-hop networks a source matches the destination prefix with its own to decide what forwarding policy to use. Local traffic is sent directly to the destination with the link- layer protocol while global traffic is forwarded to a default gateway. In multi-hop networks the ad hoc routing protocol finds the route to a destination either proactively or on-demand. This thesis proposes and discusses a solution to deciding on the mobile host destination locality in a MANET.
Godkänd; 2005; 20060916 (ysko)
APA, Harvard, Vancouver, ISO, and other styles
9

Brännström, Robert. "Network-layer mobility in wireless ad hoc access networks/." Luleå : Luleå tekniska universitet, 2005. http://epubl.ltu.se/1402-1757/2005/68/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Duff, Kevin Craig. "Network-layer reservation TDM for ad-hoc 802.11 networks." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1146/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Spinden, David, Jeffrey Jasper, and Kurt Kosbar. "Comparison of Wireless Ad-Hoc Sensor Networks." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605786.

Full text
Abstract:
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California
There are a number of telemetry applications where it would be helpful to have networks of sensors that could autonomously discover their connectivity, and dynamically reconfigure themselves during use. A number of research groups have developed wireless ad-hoc sensor network systems. This paper reviews the state-of-the-art in wireless ad-hoc networks, examining the features, assumptions, limitations and unique attributes of some of the more popular solutions to this problem.
APA, Harvard, Vancouver, ISO, and other styles
12

Shah, Subodh. "CAD-HOC a CAD like tool for generating mobility benchmarks in ad-hoc networks /." [Gainesville, Fla.] : University of Florida, 2001. http://etd.fcla.edu/etd/uf/2001/anp1049/FinalETDCopy.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2001.
Title from first page of PDF file. Document formatted into pages; contains xiii, 90 p.; also contains graphics. Vita. Includes bibliographical references (p. 85-89).
APA, Harvard, Vancouver, ISO, and other styles
13

Al-Bayatti, Ali Hilal. "Security management for mobile ad hoc network of networks (MANoN)." Thesis, De Montfort University, 2009. http://hdl.handle.net/2086/2417.

Full text
Abstract:
Mobile Ad hoc Network of Networks (MANoN) are a group of large autonomous wireless nodes communicating on a peer-to-peer basis in a heterogeneous environment with no pre-defined infrastructure. In fact, each node by itself is an ad hoc network with its own management. MANoNs are evolvable systems, which mean each ad hoc network has the ability to perform separately under its own policies and management without affecting the main system; therefore, new ad hoc networks can emerge and disconnect from the MANoN without conflicting with the policies of other networks. The unique characteristics of MANoN makes such networks highly vulnerable to security attacks compared with wired networks or even normal mobile ad hoc networks. This thesis presents a novel security-management system based upon the Recommendation ITU-T M.3400, which is used to evaluate, report on the behaviour of our MANoN and then support complex services our system might need to accomplish. Our security management will concentrate on three essential components: Security Administration, Prevention and Detection and Containment and Recovery. In any system, providing one of those components is a problem; consequently, dealing with an infrastructure-less MANoN will be a dilemma, yet we approached each set group of these essentials independently, providing unusual solutions for each one of them but concentrating mainly on the prevention and detection category. The contributions of this research are threefold. First, we defined MANoN Security Architecture based upon the ITU-T Recommendations: X.800 and X.805. This security architecture provides a comprehensive, end-to-end security solution for MANoN that could be applied to every wireless network that satisfies a similar scenario, using such networks in order to predict, detect and correct security vulnerabilities. The security architecture identifies the security requirements needed, their objectives and the means by which they could be applied to every part of the MANoN, taking into consideration the different security attacks it could face. Second, realising the prevention component by implementing some of the security requirements identified in the Security Architecture, such as authentication, authorisation, availability, data confidentiality, data integrity and non-repudiation has been proposed by means of defining a novel Security Access Control Mechanism based on Threshold Cryptography Digital Certificates in MANoN. Network Simulator (NS-2) is a real network environment simulator, which is used to test the performance of the proposed security mechanism and demonstrate its effectiveness. Our ACM-MANoN results provide a fully distributed security protocol that provides a high level of secure, available, scalable, flexible and efficient management services for MANoN. The third contribution is realising the detection component, which is represented by providing a Behavioural Detection Mechanism based on nodes behavioural observation engaged with policies. This behaviour mechanism will be used to detect malicious nodes acting to bring the system down. This approach has been validated using an attacks case study in an unknown military environment to cope with misbehaving nodes.
APA, Harvard, Vancouver, ISO, and other styles
14

Kadi, Nour. "Optimized broadcasting in wireless ad-hoc networks using network coding." Paris 11, 2010. http://www.theses.fr/2010PA112380.

Full text
Abstract:
Le "Codage Réseau" (Network Coding) est une nouvelle technique qui permet aux routeurs de combiner les flux qu'ils reçoivent et à rediriger ces combinaisons vers les différentes routes. Il a été montré que le codage réseau, combinée avec la diffusion sans fil, peut potentiellement améliorer les performances en termes de débit, l'efficacité énergétique et l'utilisation de bande passante. Notre étude commence par l'intégration de codage réseaux avec la technique de relais multipoint (MPR). MPR est un mécanisme de diffusion efficace qui a été utilisé dans de nombreux protocoles sans fil. Nous montrons que la combinaison de deux techniques ensemble peut réduire le nombre de paquets transmis et augmenter le débit. Nous avons réduit la complexité en proposant un système de codage opportuniste qui effectue des opérations de codage sur le corps binaire. Au lieu de combiner les paquets reçus de manière linéaire, nous employons de sommation arithmétique modulo 2. A chaque transmission, un nœud choisit les paquets pour coder en utilisant les informations sur l'état de voisins tente de livrer un nombre maximum de paquets. Pour réduire Le surcoût (overhead), c'est-à-dire la quantité d'information de contrôle échangée, nous proposons un nouveau schéma de codage. Il utilise LT-code (un type de code fontaine) pour éliminer le besoin d'un feedback parfait entre les voisins. Ce système effectue le codage et le décodage avec une complexité logarithmique. Nous optimisons LT-code pour accélérer le processus de décodage. L'optimisation est réalisée en proposant une nouvelle distribution qui sera utilisés durant le processus d'encodage. Cette distribution permet aux nœuds intermédiaires de décoder même si peu de paquets codés sont reçus
Network coding is a novel technique which attracts the research interest since its emergence in 2000. It was shown that network coding, combined with wireless broadcasting, can potentially improve the performance in term of throughput, energy efficiency and bandwidth utilization. Our study begins with integrating network coding with multipoint relay (MPR) technique. MPR is an efficient broadcast mechanism which has been used in many wireless protocols. We show how combining the two techniques together can reduce the number of transmitted packets and increase the throughput. We further reduce the complexity by proposing an opportunistic coding scheme which performs coding operations on the binary field. Instead of linearly combining packets, we employ arithmetic summing packets in modulo 2, which simply corresponds to XOR the corresponding bits in each packet. These operations are computationally cheap. Using neighbors state information, a node in our scheme chooses packets to encode and transmit at each transmission trying to deliver a maximum number of packets. Therefore, an exchange of the reception information between the neighbors is required. To reduce the overhead of the required feedback, we propose a new coding scheme. It uses LT-code (a type of fountain code) to eliminate the need of a perfect feedback among neighbors. This scheme performs encoding and decoding with a logarithmic complexity. We optimize LT-code to speed up the decoding process. The optimization is achieved by proposing a new degree distribution to be used during the encoding process. This distribution allows intermediate nodes to decode more symbols even when few encoded packets are received
APA, Harvard, Vancouver, ISO, and other styles
15

Biswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. In this thesis, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. In our study, we have found that necessity of secure routing protocol is still a burning question. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack etc. In conclusion, we focus on the findings and future works which may be interesting for the researchers like robust key management, trust based systems, data security in different layer etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.
APA, Harvard, Vancouver, ISO, and other styles
16

Mehta, Amar Kailash 1979. "Ad hoc network formation using Bluetooth scatternets." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/8568.

Full text
Abstract:
Thesis (M.Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.
Includes bibliographical references (leaf 80).
by Amar Kailash Mehta.
M.Eng.and S.B.
APA, Harvard, Vancouver, ISO, and other styles
17

Sun, Min-Te. "Supporting communications in ad hoc network systems /." The Ohio State University, 2002. http://rave.ohiolink.edu/etdc/view?acc_num=osu1486462702466432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Vik, Knut-Helge. "Quality of service aware source initiated ad-hoc routing." Online access for everyone, 2004. http://www.dissertations.wsu.edu/thesis/Spring2004/K%5FVik%5F050704.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Besse, Frédéric. "Réseaux ad hoc aéronautiques." Thesis, Toulouse, ISAE, 2013. http://www.theses.fr/2013ESAE0006.

Full text
Abstract:
Dans un contexte de besoins croissants de moyens de communication pour augmenter la sécurité des vols et répondre aux attentes des compagnies et des passagers, le monde de l’aviation civile cherche de nouveaux systèmes de communication pouvant répondre à ces objectifs. Les systèmes de communication sol-bord existants, que ce soit les solutions par satellites en bande L (SATCOM, ...) ou les solutions cellulaires par liaison directe avec le sol (HF, VHF, ...), présentent des limites en terme de capacité, de couverture et de coût.La proposition avancée dans le cadre de cette thèse est d’utiliser les avions comme relais afin de propager les données jusqu’à une station sol. Ce système peut être vu comme un réseau ad hoc mobile dont les nœuds sont les avions civils en vol. Grâce à plusieurs sauts successifs au travers d’avions relais, chaque avion doit pouvoir joindre le sol sans être à portée directe d’une station. Le réseau ad hoc ainsi formé peut ensuite être utilisé pour différentes classes de communications : contrôle aérien, services pour les compagnies aériennes ou pour les passagers. Une telle solution permettrait d’améliorer la couverture des solutions cellulaires classiques en zone continentale. Elle est également applicable en zone océanique où les seuls moyens disponibles sont actuellement le satellite et la HF. On peut imaginer que les coûts de déploiement et de maintenance seraient relativement bas puisque l’infrastructure sol est limitée.Dans cette thèse, nous avons étudié la faisabilité puis les performances qui peuvent être attendues pour ce système de communication aéronautique innovant
In the current aeronautical communications context, there is an increasing interest in offering new services to civil aircraft. For instance, airlines are looking into new solutions to back up flight data and cockpit voice records during the flight, or to provide more accurate meteorological data to pilots. Being able to offer Internet access to passengers is also a major demand from these companies. All these services represent new types of air-ground communications that require newcommunication systems. Indeed, traditional datalink systems are based on a direct airground link (e.g. VDL Mode 2) or on a satellite link (e.g. L-Band Inmarsat satellites).They all have limits in terms of capacity, coverage and cost. In this thesis, we study aeronautical ad hoc networks. They have recently been proposedas a new solution for future air-ground communications. The idea of such networks is to introduce wireless links between aircraft. This system can be seen as a mobile ad hoc network whose nodes are civil aircraft in flight. Each aircraft is able to act as a router to send data hop-by-hop to the destination. Such a solution would improve the coverage of conventional cellular solutions in continental area. It is also applicable to oceanic areas, where the only available solutions are now satellite and HF. The costs of deployment and maintenance would be relatively low because the ground infrastructure is limited. In this thesis, the feasibility of this innovative aeronautical communication system is investigated. A simulation tool has been developed to study the network connectivity, based on actual aircraft positions data both in continental and oceanic airspace
APA, Harvard, Vancouver, ISO, and other styles
20

Puff, Chad J. "Network management system for tactical mobile ad hoc network segments." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5462.

Full text
Abstract:
Approved for public release; distribution is unlimited.
Mobile Ad Hoc Networking (MANET) technologies are highly desirable in tactical environments because they are able to communicate with neighboring devices over one or more hops in order to extend connectivity to areas where a fixed infrastructure is not available or is not possible. There are many factors which can influence the performance and reliability of a MANET. Communications links within the MANET are continuously fluctuating due to device location, power, or environmental factors. Devices within the MANET can enter the network and then disappear due to the devices losing connectivity because of their physical location relative to other nodes within the network. A network management system (NMS) that can provide for MANET administration in both simulation-based and real-time operational environments provides additional value for this network. The objectives for this network management system is to allow users to predict, monitor, and control network behavior, this specifically includes viewing and remotely managing variables such as node status, node location, attached equipment, channel selection, frequencies, error rates, and network utilization.
APA, Harvard, Vancouver, ISO, and other styles
21

Ahmed, Tarek Helmi Abd el-Nabi Ali. "Modeling and simulation of routing protocol for ad hoc networks combining queuing network analysis and ANT colony algorithms." [S.l. : s.n.], 2005. http://deposit.ddb.de/cgi-bin/dokserv?idn=974552534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Mehendale, Hrushikesh Sanjay. "Lifenet: a flexible ad hoc networking solution for transient environments." Thesis, Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42781.

Full text
Abstract:
In the wake of major disasters, the failure of existing communications infrastructure and the subsequent lack of an effective communication solution results in increased risks, inefficiencies, damage and casualties. Currently available options such as satellite communication are expensive and have limited functionality. A robust communication solution should be affordable, easy to deploy, require little infrastructure, consume little power and facilitate Internet access. Researchers have long proposed the use of ad hoc wireless networks for such scenarios. However such networks have so far failed to create any impact, primarily because they are unable to handle network transience and have usability constraints such as static topologies and dependence on specific platforms. LifeNet is a WiFi-based ad hoc data communication solution designed for use in highly transient environments. After presenting the motivation, design principles and key insights from prior literature, the dissertation introduces a new routing metric called Reachability and a new routing protocol based on it, called Flexible Routing. Roughly speaking, reachability measures the end-to-end multi-path probability that a packet transmitted by a source reaches its final destination. Using experimental results, it is shown that even with high transience, the reachability metric - (1) accurately captures the effects of transience (2) provides a compact and eventually consistent global network view at individual nodes, (3) is easy to calculate and maintain and (4) captures availability. Flexible Routing trades throughput for availability and fault-tolerance and ensures successful packet delivery under varying degrees of transience. With the intent of deploying LifeNet on field we have been continuously interacting with field partners, one of which is Tata Institute of Social Sciences India. We have refined LifeNet iteratively refined base on their feedback. I conclude the thesis with lessons learned from our field trips so far and deployment plans for the near future.
APA, Harvard, Vancouver, ISO, and other styles
23

Yang, Junmo Sun Min-Te. "Practical consideration of routing protocols in ad hoc networks." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Fall/Dissertations/YANG_JUNMO_37.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

GUPTA, RAHUL. "Experimental Study of Wireless Ad Hoc Networks." University of Cincinnati / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1039800405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Zhang, Xin. "Network Formation and Routing for Multi-hop Wireless Ad-Hoc Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11470.

Full text
Abstract:
An energy-aware on-demand Bluetooth scatternet formation and routing protocol taking into account network architecture and traffic pattern is proposed. The scatternet formation protocol is able to cope with multiple sources initiating traffic simultaneously as well as prolong network lifetime. A modified Inquiry scheme using extended ID packet is introduced for fast device discovery and power efficient propagation of route request messages with low delay. A mechanism employing POLL packets in Page processes is proposed to transfer scatternet formation and route reply information without extra overhead. In addition, the energy aware forwarding nodes selection scheme is based on local information and results in more uniform network resource utilization and improved network lifetime. Simulation results show that this protocol can provide scatternet formation with reasonable delay and with good load balance which results in prolonged network lifetime for Bluetooth-based wireless sensor networks. In this research, a metric-based scatternet formation algorithm for the Bluetooth-based sensor motes is presented. It optimizes the Bluetooth network formation from the hop distance and link quality perspectives. In addition, a smart repair mechanism is proposed to deal with link/node failure and recover the network connectivity promptly with low overhead. The experiments with the Intel Mote platform demonstrate the effectiveness of the optimizations. This research also investigates the scalability of ad hoc routing protocols in very large-scale wireless ad hoc networks. A comprehensive simulation study is conducted of the performance of an on-demand routing protocol on a very large-scale, with as many as 50,000 nodes in the network. The scalability analysis is addressed based on various network sizes, node density, traffic load, and mobility. The reasons for packet loss are analyzed and categorized at each network layer. Based on the observations, we observe the effect of the parameter selection and try to exhaust the scalability boundary of the on-demand routing protocol for wireless ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
26

Yao, Ye. "Ad Hoc Networks Measurement Model and Methods Based on Network Tomography." Phd thesis, Université de Technologie de Belfort-Montbeliard, 2011. http://tel.archives-ouvertes.fr/tel-00636282.

Full text
Abstract:
The measurability of Mobile ad hoc network (MANET) is the precondition of itsmanagement, performance optimization and network resources re-allocations. However, MANET is an infrastructure-free, multi-hop, andself-organized temporary network, comprised of a group of mobile nodes with wirelesscommunication devices. Not only does its topology structure vary with time going by, butalso the communication protocol used in its network layer or data link layer is diverse andnon-standard.In order to solve the problem of interior links performance (such as packet loss rate anddelay) measurement in MANET, this thesis has adopted an external measurement basedon network tomography (NT). To the best of our knowledge, NT technique is adaptable for Ad Hoc networkmeasurement.This thesis has deeply studied MANET measurement technique based on NT. The maincontributions are:(1) An analysis technique on MANET topology dynamic characteristic based onmobility model was proposed. At first, an Ad Hoc network mobility model formalizationis described. Then a MANET topology snapshots capturing method was proposed to findand verify that MANET topology varies in steady and non-steady state in turnperiodically. At the same time, it was proved that it was practicable in theory to introduceNT technique into Ad Hoc network measurement. The fitness hypothesis verification wasadopted to obtain the rule of Ad Hoc network topology dynamic characteristic parameters,and the Markov stochastic process was adopted to analyze MANET topology dynamiccharacteristic. The simulation results show that the method above not only is valid andgenerable to be used for all mobility models in NS-2 Tool, but also could obtain thetopology state keeping experimental formula and topology state varying probabilityformula.IV(2) An analysis technique for MANET topology dynamic characteristic based onmeasurement sample was proposed. When the scenario file of mobile models could notbe obtained beforehand, End-to-End measurement was used in MANET to obtain thepath delay time. Then topology steady period of MANET is inferred by judging whetherpath delay dithering is close to zero. At the same time, the MANET topology wasidentified by using hierarchical clustering method based on measurement sample of pathperformance during topology steady period in order to support the link performanceinference. The simulation result verified that the method above could not only detect themeasurement window time of MANET effectively, but also identify the MANETtopology architecture during measurement window time correctly.(3) A MANET link performance inference algorithm based on linear analysis modelwas proposed. The relation of inequality between link and path performance, such as lossrate of MANET, was deduced according to a linear model. The phenomena thatcommunication characteristic of packets, such as delay and loss rate, is more similarwhen the sub-paths has longer shared links was proved in the document. When the rankof the routing matrix is equal to that of its augmentation matrix, the linear model wasused to describe the Ad Hoc network link performance inference method. The simulationresults show that the algorithm not only is effective, but also has short computing time.(4) A Link performance inference algorithm based on multi-objectives optimizationwas proposed. When the rank of the routing matrix is not equal to that of its augmentationmatrix, the link performance inference was changed into multi-objectives optimizationand genetic algorithm is used to infer link performance. The probability distribution oflink performance in certain time t was obtained by performing more measurements andstatistically analyzing the hypo-solutions. Through the simulation, it can be safelyconcluded that the internal link performance, such as, link loss ratio and link delay, can beinferred correctly when the rank of the routing matrix is not equal to that of itsaugmentation matrix.
APA, Harvard, Vancouver, ISO, and other styles
27

Stieglitz, Stefan, Christoph Fuchß, Oliver Hillmann, and Christoph Lattemann. "Mobile learning by using ad hoc messaging network." Universität Potsdam, 2007. http://opus.kobv.de/ubp/volltexte/2008/1996/.

Full text
Abstract:
The requirements of modern e-learning techniques change. Aspects such as community interaction, flexibility, pervasive learning and increasing mobility in communication habits become more important. To meet these challenges e-learning platforms must provide support on mobile learning. Most approaches try to adopt centralised and static e-learning mechanisms to mobile devices. However, often technically it is not possible for all kinds of devices to be connected to a central server. Therefore we introduce an application of a mobile e-learning network which operates totally decentralised with the help of an underlying ad hoc network architecture. Furthermore the concept of ad hoc messaging network (AMNET) is used as basis system architecture for our approach to implement a platform for pervasive mobile e-learning.
APA, Harvard, Vancouver, ISO, and other styles
28

Stieglitz, Stefan, Christoph Fuchß, and Christoph Lattemann. "Mobile learning by using ad hoc messaging network." Universität Potsdam, 2007. http://opus.kobv.de/ubp/volltexte/2008/1997/.

Full text
Abstract:
The requirements of modern e-learning techniques change. Aspects such as community interaction, flexibility, pervasive learning and increasing mobility in communication habits become more important. To meet thesechallenges e-learning platforms must provide support on mobile learning. Most approaches try to adopt centralized and static elearning mechanisms to mobile devices. However, often technically it is not possible for all kinds of devices to be connected to a central server. Therefore we introduce an application of a mobile e-learning network which operates totally decentralized with the help of an underlying ad hoc network architecture. Furthermore the concept of ad hoc messaging network (AMNET) is used as basis system architecture for our approach to implement a platform for pervasive mobile elearning.
APA, Harvard, Vancouver, ISO, and other styles
29

Hasan, Mohammad Shahidul. "Application of control over Mobile Ad-hoc Network." Thesis, Staffordshire University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.522137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Jiang, Qi. "Nodes cooperation trust method over ad hoc network." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5042.

Full text
Abstract:
An ad hoc network consists of wireless nodes that communicate through cooperation with each other, and operate independently of additional network devices such as routers and switches. These networks are self-sufficient and distributed in nature which are most widely used in the areas where there is little or no infrastructure available, like battlefields, weather forecast applications, etc. Recently ad hoc networks have been deployed in many places and have become a part of everyone’s life. Devices such as laptops, smartphones, and netbooks are using it as one option for wireless networks. This emerging trend poses a serious security issue. As there is no centralized authority, establishing trust between devices in an ad hoc network is very important. Trust management among the nodes in an ad hoc network, or between the nodes of different networks, is a must and needs to be managed without compromising node functionality. In this thesis, a new trust method is proposed which manages directly and indirectly connected nodes, and is also able to resolve issues concerning the unfair trust value grading between neighbors and the destination node.
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
31

Yap, Jung Houn. "Locating services in hybrid ad hoc cellular network." Thesis, University of Surrey, 2003. http://epubs.surrey.ac.uk/623/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Li, Yan. "Mobile ad hoc network simulation : analysis and enhancements." Thesis, Heriot-Watt University, 2008. http://hdl.handle.net/10399/2161.

Full text
Abstract:
A Mobile Ad-Hoc Network (MANET) is a network consisting of mobile nodes communicating wirelessly. No infrastructure is required, so the nodes have to organise themselves into a network and establish routes in a distributed using distributed self organising algorithms. Routing protocols designed for wired networks are usually unsuitable for MANETs. Simulation has been the main tool for evaluating routing protocols, but differences in assumptions have made it difficult to compare results from different research groups. A characterisation ofMANETs based on quantifying the dynamic aspects of network topology is proposed and shown to be important for analysing performance. The popular random waypoint model (RWP) for node mobility is investigated. When the dynamic measures we propose are simulated, it is found that a very long warm-up period is required. Many published results are based on much shorter simulation experiments, causing us to doubt their validity. To overcome the long initial transient, we analyse the steady state distribution of node location when the RWP is used. A new network topology generation mechanism, the network reorganization model (NR), allows the creation of networks with the same dynamic characteristics as the RWP in a more controllable manner. A classification framework for routing protocols is proposed, based on the functions that a protocol must or may perform. Using this Functional Element Based Framework (FE~F), a large number of proposed and existing protocols from the literature are classified, giving clear insight into the relationships between different protocols.
APA, Harvard, Vancouver, ISO, and other styles
33

Liu, Kejun. "Detecting Routing Misbehavior In Mobile Ad Hoc Network." ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/1046.

Full text
Abstract:
Routing misbehavior in MANETs (Mobile Ad Hoc Networks) is studied in this thesis. In general, routing protocols for MANETs are designed based on the assumption that all par- ticipating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. Therefore, we propose the 2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their adverse effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. In order to reduce additional routing overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme. Analytical and simulation results are presented to evaluate the performance of the proposed scheme.
APA, Harvard, Vancouver, ISO, and other styles
34

Doshi, Abhay. "Fault/configuration management for wireless ad-hoc network." FIU Digital Commons, 2002. http://digitalcommons.fiu.edu/etd/3081.

Full text
Abstract:
An ad hoc network is maintained by the combined efforts of all the mobile nodes themselves, who often operate under severe constraints, such as limited battery power, variable link quality, and limited storage capacity. As a result, there is a growing need for enhanced fault and configuration management solutions to help in tracking problems as well as solving them. Viable network architecture for a wireless ad-hoc environment, which takes advantages of both hierarchical and distributed architectures, has been investigated. A complete design solution is proposed which makes ad-hoc environments less susceptible to faults. Results shows that by applying the proposed power saving technique, network load due to control traffic may be significantly reduced. Based on other gathered statistics, we can set the optimal value of maximum number of nodes allowed in a cluster for efficient performance to be 35 for a specific scenario.
APA, Harvard, Vancouver, ISO, and other styles
35

Baalaji, Venkateshwaraiyer S. "Collaborative services in an ad hoc wireless network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FBaalaji%5FITM.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, Sept. 2004.
Thesis advisor(s): Alex Bordetsky, Gurminder Singh. Includes bibliographical references (p. 71). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
36

Nowatkowski, Michael E. "Certificate revocation list distribution in vehicular ad hoc networks." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33971.

Full text
Abstract:
The objective of this research is to investigate improved methods for distributing certificate revocation lists (CRLs) in vehicular ad hoc networks (VANETs). VANETs are a subset of mobile ad hoc networks composed of network-equipped vehicles and infrastructure points, which will allow vehicles to communicate with other vehicles and with roadside infrastructure points. While sharing some of the same limitations of mobile ad hoc networks, such as lack of infrastructure and limited communications range, VANETs have several dissimilarities that make them a much different research area. The main differences include the size of the network, the speed of the vehicles, and the network security concerns. Confidentiality, authenticity, integrity, and availability are some of the standard goals of network security. While confidentiality and authenticity at times seem in opposition to each other, VANET researchers have developed many methods for enhancing confidentiality while at the same time providing authenticity. The method agreed upon for confidentiality and authenticity by most researchers and the IEEE 1609 working group is a public key infrastructure (PKI) system. An important part of any PKI system is the revocation of certificates. The revocation process, as well as the distribution of revocation information, is an open research problem for VANETs. This research develops new methods of CRL distribution and compares them to existing methods proposed by other researchers. The new methods show improved performance in various vehicle traffic densities.
APA, Harvard, Vancouver, ISO, and other styles
37

Fokine, Klas. "Key Management in Ad Hoc Networks." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1351.

Full text
Abstract:

This thesis covers the issue of securing ad hoc networks. Such networks exhibit a number of characteristics that make such a task challenging. One of the major challenges is that ad hoc networks typically lack a fixed infrastructure both in form of physical infrastructure such as routers, servers and stable communication links and in the form of an organizational or administrative infrastructure. Another difficulty lies in the highly dynamic nature of ad hoc networks since new nodes can join and leave the network at any time.

The major problem in providing security services in such infrastructure less networks is how to manage the cryptographic keys that are needed. In order to design practical and efficient key management systems it is necessary to understand the characteristics of ad hoc networks and why traditional key management systems cannot be used. These issues are covered and the thesis also provides a summary of those key management solutions that have been proposed in the research literature so far.

APA, Harvard, Vancouver, ISO, and other styles
38

Suh, Wonho. "Online ad hoc distributed traffic simulation with optimistic execution." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44853.

Full text
Abstract:
As roadside and in-vehicle sensors are deployed under the Connected Vehicle Research program (formerly known as Vehicle Infrastructure Integration initiative and Intellidrive), an increasing variety of traffic data is becoming available in real time. This real time traffic data is shared among vehicles and between vehicles and traffic management centers through wireless communication. This course of events creates an opportunity for mobile computing and online traffic simulations. However, online traffic simulations require faster than real time running speed with high simulation resolution, since the purpose of the simulations is to provide immediate future traffic forecast based on real time traffic data. However, simulating at high resolution is often too computationally intensive to process a large scale network on a single processor in real time. To mitigate this limitation an online ad hoc distributed simulation with optimistic execution is proposed in this study. The objective of this study is to develop an online traffic simulation system based on an ad hoc distributed simulation with optimistic execution. In this system, data collection, processing, and simulations are performed in a distributed fashion. Each individual simulator models the current traffic conditions of its local vicinity focusing only on its area of interest, without modeling other less relevant areas. Collectively, a central server coordinates the overall simulations with an optimistic execution technique and provides a predictive model of traffic conditions in large areas by combining simulations geographically spread over large areas. This distributed approach increases computing capacity of the entire system and speed of execution. The proposed model manages the distributed network, synchronizes the predictions among simulators, and resolves simulation output conflicts. Proper feedback allows each simulator to have accurate input data and eventually produce predictions close to reality. Such a system could provide both more up-to-date and robust predictions than that offered by centralized simulations within a single transportation management center. As these systems evolve, the online traffic predictions can be used in surface transportation management and travelers will benefit from more accurate and reliable traffic forecast.
APA, Harvard, Vancouver, ISO, and other styles
39

Gribben, Jeremy. "Localization and Coverage in Wireless Ad Hoc Networks." Thèse, Université d'Ottawa / University of Ottawa, 2011. http://hdl.handle.net/10393/20131.

Full text
Abstract:
Localization and coverage are two important and closely related problems in wireless ad hoc networks. Localization aims to determine the physical locations of devices in a network, while coverage determines if a region of interest is sufficiently monitored by devices. Localization systems require a high degree of coverage for correct functioning, while coverage schemes typically require accurate location information. This thesis investigates the relationship between localization and coverage such that new schemes can be devised which integrate approaches found in each of these well studied problems. This work begins with a thorough review of the current literature on the subjects of localization and coverage. The localization scheduling problem is then introduced with the goal to allow as many devices as possible to enter deep sleep states to conserve energy and reduce message overhead, while maintaining sufficient network coverage for high localization accuracy. Initially this sufficient coverage level for localization is simply a minimum connectivity condition. An analytical method is then proposed to estimate the amount of localization error within a certain probability based on the theoretical lower bounds of location estimation. Error estimates can then be integrated into location dependent schemes to improve on their robustness to localization error. Location error estimation is then used by an improved scheduling scheme to determine the minimum number of reference devices required for accurate localization. Finally, an optimal coverage preserving sleep scheduling scheme is proposed which is robust to localization error, a condition which is ignored by most existing solutions. Simulation results show that with localization scheduling network lifetimes can be increased by several times and message overhead is reduced while maintaining negligible differences in localization error. Furthermore, results show that the proposed coverage preserving sleep scheduling scheme results in fewer active devices and coverage holes under the presence of localization error.
APA, Harvard, Vancouver, ISO, and other styles
40

Srivastava, Gaurav. "Efficient topology control algorithms for ad hoc networks." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20080506.144718/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ho, Yao Hua. "Connectionless approach--a localized scheme to mobile ad hoc networks." Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Holland, Gavin Douglas. "Adaptive protocols for mobile ad hoc networks." Texas A&M University, 2004. http://hdl.handle.net/1969.1/1445.

Full text
Abstract:
Recent advances in low-power technologies have resulted in the proliferation of inexpensive handheld mobile computing devices. Soon, just like the Internet empow- ered a whole new world of applications for personal computers, the development and deployment of robust ubiquitous wireless networks will enable many new and exciting futuristic applications. Certain to be an important part of this future is a class of networks known as "mobile ad hoc networks." Mobile ad hoc networks (or simply "ad hoc networks") are local-area networks formed "on the spot" between collocated wireless devices. These devices self-organize by sharing information with their neigh- bors to establish communication pathways whenever and wherever they are. For ad hoc networks to succeed, however, new protocols must be developed that are capable of adapting to their dynamic nature. In this dissertation, we present a number of adaptive protocols that are designed for this purpose. We investigate new link layer mechanisms that dynamically monitor and adapt to changes in link quality, including a protocol that uses common control messages to form a tight feedback control loop for adaptation of the link data rate to best match the channel conditions perceived by the receiver. We also investigate routing protocols that adapt route selection according to network characteristics. In particular, we present two on-demand routing protocols that are designed to take advantage of the presence of multirate links. We then investigate the performance of TCP, showing how communication outages caused by link failures and routing delays can be very detrimental to its performance. In response, we present a solution to this problem that uses explicit feedback messages from the link layer about link failures to adapt TCP's behavior. Finally, we show how link failures in heterogeneous networks containing links with widely varying bandwidth and delay can cause repeated "modal" changes in capacity that TCP is slow to detect. We then present a modifed version of TCP that is capable of more rapidly detecting and adapting to these changes.
APA, Harvard, Vancouver, ISO, and other styles
43

Zhao, Li. "Enhance communication security in wireless ad hoc networks through multipath routing." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Dissertations/Summer2007/L_Zhao_072407.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Gavini, Sireesh. "Detecting packet-dropping faults in mobile ad-hoc networks." Online access for everyone, 2004. http://www.dissertations.wsu.edu/Thesis/Fall2004/s%5Fgavini%5F121404.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

GRILLI, GIANLUCA. "Data dissemination in vehicular ad-hoc networks." Doctoral thesis, Università degli Studi di Roma "Tor Vergata", 2010. http://hdl.handle.net/2108/1434.

Full text
Abstract:
Il processo di "data dissemination" consiste nella diffusione dell'informazione attraverso i diversi nodi che costituiscono la rete e comprende una molteplicità di aspetti che destano interesse nella comunità scientifica. Lo sviluppo di sistemi efficienti per i processi di "data dissemination" nelle reti veicolari (VANET) è infatti argomento di ampio dibattito nelle maggiori conferenze in ambito automotive, a fronte delle problematiche di trasmissione legate essenzialmente alla natura broadcast delle comunicazioni e all'esigenza di pervenire ad una più efficiente gestione del canale trasmissivo, affrontando al contempo problemi di collisione e di interferenza dovuti all'ambiente circostante (urban landscape). L'obiettivo principale di questa tesi è stato quello di analizzare i principali processi di data dissemination nel mondo VANET e sviluppare, quindi, un nuovo protocollo che dimostri al tempo stesso: efficienza, bassa latenza, alta velocità di disseminazione e buon utilizzo del canale trasmissivo. L'idea chiave prevede l'impiego di tecniche di codifica con codici a fontana (Fountain Codes) sfruttando il paradigma di comunicazione I2V2V (infrastructure-to-vehicle-to-vehicle), in cui i veicoli e l'infrastruttura cooperano nello scambio dei dati. I risultati ottenuti sperimentalmente hanno mostrato una buona fattibilità della soluzione prospettata, che potrebbe pertanto essere implementata su reali schede di comunicazione installate on-board sui veicoli (in ottemperanza a quanto previsto dagli Intelligent Transportation Systems, ITS).
Data dissemination consists on spreading a large amount of information to all nodes belonging to a network and its peculiar characteristics make this goal particularly interesting and challenging. However, developing efficient data dissemination schemes for vehicular ad-hoc networks (VANETs) is still an open issue due to the broadcast nature of the channel and to the need of managing all data transmissions in a distributed way. The former leads to a lot of problems related to the channel contention, collisions and interference. The latter requires to define algorithms which exploit only local information of the network and which are scalable and robust to the node mobility. The focus of this thesis is to investigate the data dissemination process in VANETs by defining and developing a new communication protocol (CORP), efficient in terms of limited computational complexity, low latency, high speed of dissemination, high delivery ratio, better usage of the wireless channel and, consequently, better energy consumption. The basic idea relies on the the application of the fountain codes theory to vehicular networks in order to implement a true I2V2V (infrastructure-to-vehicle-to-vehicle ) communication paradigm. Results gathered from extensive simulation show the feasibility of such a solution, which could be implemented in real on-board communication devices for Intelligent Transportation Systems (ITS).
APA, Harvard, Vancouver, ISO, and other styles
46

Rogers, Paul Edward. "On robustness in high load mobile ad hoc networks." Diss., Online access via UMI:, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

GOYAL, DEVENDRA. "DELAYING OR AVOIDING PARTITIONING IN MOBILE AD HOC NETWORKS USING NETWORK SURVIVABILITY CONCEPTS." University of Cincinnati / OhioLINK, 2002. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1025619948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Lim, Kwang Yong. "A performance analysis of ad-hoc ocean sensor network." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FLim%5FKwang.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2006.
Thesis Advisor(s): John C. McEachen, Gurminder Singh. "December 2006." Includes bibliographical references (p. 103-106). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
49

INAGAKI, Yasuyoshi, Katsuhiko TOYAMA, and Nobuo KAWAGUCHI. "MAGNET: ad hoc network system based on mobile agents." Elsevier, 2000. http://hdl.handle.net/2237/15448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Bowitz, Anne Gabrielle. "Simulation of a Secure Ad Hoc Network Routing Protocol." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-14416.

Full text
Abstract:
Secure wireless ad hoc networks possess many properties that are highly valuable in e.g. emergency situations and military applications. By using X.509 certificates, the ad hoc routing protocol B.A.T.M.A.N. has been modified in order to support identification and authentication of mobile nodes trying to access a restricted ad hoc network.The new protocol design needs to be evaluated by performing tests under various conditions and environments. However, this might be a challenging and expensive task to do in a real-world system, thus it is recommended to simulate the routing protocol using a network simulator.ns-3 is an open source discrete-event network simulator for Internet systems. The goal of this thesis is to extend ns-3 to support simulation of both the original and modified B.A.T.M.A.N. protocol such that protocol design, interactions, and large-scale performance issues can be investigated and compared.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography