Results 1 - 10
of
311,522
Table 1: Comparison of several routing protocols for ad hoc networks.
"... In PAGE 3: ... Of course, the routes are not necessarily the shortest. The salient features of these protocols is summarized in Table1 . In this table, we have classi ed the protocols according to the metrics used for route optimization, the message overhead in determining routes, the type of protocol used and its convergence goals (active refers to a protocol that runs until all routing tables are consistent while passive refers to an algorithm that determines routes based on an as-needed basis).... ..."
Table 1. Example information available from the ad hoc network.
2003
"... In PAGE 5: ....1.2 Information exchange. In Table1 we list a few selected pieces of information that are available from our networking protocols. The challenge from the networking perspective is to provide these in an accurate and timely way.... ..."
Cited by 3
Table 4. Key management schemes for mobile ad hoc networks.
in Abstract
"... In PAGE 31: ... By fabricating and forwarding route error messages an attacker can try to disrupt the operation of existing routes, not only breaking connectivity but also creating additional routing overhead in the network as a result of legitimate nodes trying to establish alternative paths. In Table4 we present the route maintenance characteristics of the protocols we have analyzed. The solution adopted by most of the analyzed protocols requires the signing of the complete error message by the node that generates or forwards it.... In PAGE 33: ... In this section we will present several key management solutions that have been specifically proposed to address the challenges of mobile ad hoc networks and discuss their behavior in respect to mobility patterns and operational requirements. Table4 summarizes the results of our analysis. Table 4.... ..."
TABLE I A REVIEW OVER SERVICE DISCOVERY PROTOCOLS IN AD HOC NETWORKS
Table 1: Applications of ad hoc networks
"... In PAGE 2: ... 1.1 Applications We summarize some current and future applications of ad hoc networks in Table1 . The applications listed in the table are sorted by their area of use, network devices, and communication model.... ..."
Cited by 1
TABLE VI CONTROL TRAFFIC OVERHEAD IN AD-HOC NETWORK PROTOCOLS.
2002
Cited by 2
Table 2.3: Classes of protocols for ad hoc networks
in The Witness Aided Routing Protocol -- A Scalable, Fault-Tolerant Solution For Mobile Ad Hoc Networks
Table 2. System parameters in ad hoc networks
"... In PAGE 5: ...oss factor is 2:5. The coverage range is 200m. The average SNR on the boundary for the single antenna case is 0 dB, and multi-rate transmission is used. The common parameters used in both cases are summarized in Table2 (see also, [1]). Using the practical parameters from D-Link, the information-bearing data rate and the SNR (after the processing of spatial diversity) satisfy the relationship as in Table 3.... In PAGE 7: ... We also study the impact of SD-MAC, rate adaptation strategies, and contention on the hop distance. The parameters used in the following examples are the same as in Table2 . We assume that the total transmission power of each node is 20dBm and the path loss factor is 2.... ..."
Table 1: Simulation settings In our evaluation, we compare the performance of seven different routing algorithms: AODV [17], DSR [10], GF [20], GPSR [12], SPEED, SPEED-S, SPEED-T. We adopt both ad hoc routing proto- cols (AODV and DSR) and sensor network protocols (GF, GPSR).
2005
"... In PAGE 20: ... This software provides a high fidelity simulation for wireless communication with detailed propaga- tion, radio and MAC layers. Table1 describes the detailed setup for our simulator. The communica- tion parameters are mostly chosen in reference to the Berkeley Telos mote specification.... ..."
Cited by 5
Table 1: DR-TDMA MACFrame Parameters
"... In PAGE 5: ...cknowledgments for all mobile stations are grouped in the same downlink control slots (i.e., eachdownlink control slot is not dedicated to a speci c mobile station). Table1 summarizes the DR-TDMA frame parameters. It should be noted that the only parameters that directly in uence the MAC protocol e ciency are: the frame duration, the number of control and data slots per frame and the data to control slot size ratio.... ..."
Results 1 - 10
of
311,522