• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 311,522
Next 10 →

Table 1: Comparison of several routing protocols for ad hoc networks.

in Power-Aware Routing in Mobile Ad Hoc Networks
by Mike Woo, Suresh Singh, C. S. Raghavendra
"... In PAGE 3: ... Of course, the routes are not necessarily the shortest. The salient features of these protocols is summarized in Table1 . In this table, we have classi ed the protocols according to the metrics used for route optimization, the message overhead in determining routes, the type of protocol used and its convergence goals (active refers to a protocol that runs until all routing tables are consistent while passive refers to an algorithm that determines routes based on an as-needed basis).... ..."

Table 1. Example information available from the ad hoc network.

in Exploiting the Interactions Between Robotic Autonomy and Networks
by Jason Redi, Joshua Bers 2003
"... In PAGE 5: ....1.2 Information exchange. In Table1 we list a few selected pieces of information that are available from our networking protocols. The challenge from the networking perspective is to provide these in an accurate and timely way.... ..."
Cited by 3

Table 4. Key management schemes for mobile ad hoc networks.

in Abstract
by Patroklos G. Argyroudis
"... In PAGE 31: ... By fabricating and forwarding route error messages an attacker can try to disrupt the operation of existing routes, not only breaking connectivity but also creating additional routing overhead in the network as a result of legitimate nodes trying to establish alternative paths. In Table4 we present the route maintenance characteristics of the protocols we have analyzed. The solution adopted by most of the analyzed protocols requires the signing of the complete error message by the node that generates or forwards it.... In PAGE 33: ... In this section we will present several key management solutions that have been specifically proposed to address the challenges of mobile ad hoc networks and discuss their behavior in respect to mobility patterns and operational requirements. Table4 summarizes the results of our analysis. Table 4.... ..."

TABLE I A REVIEW OVER SERVICE DISCOVERY PROTOCOLS IN AD HOC NETWORKS

in Resource Discovery in Activity-Based Sensor Networks
by unknown authors

Table 1: Applications of ad hoc networks

in Models of authentication in ad hoc networks and their related network properties
by Katrin Hoeper, Guang Gong
"... In PAGE 2: ... 1.1 Applications We summarize some current and future applications of ad hoc networks in Table1 . The applications listed in the table are sorted by their area of use, network devices, and communication model.... ..."
Cited by 1

TABLE VI CONTROL TRAFFIC OVERHEAD IN AD-HOC NETWORK PROTOCOLS.

in Analyzing Control Traffic Overhead in Mobile Ad-hoc Network Protocols versus Mobility and Data Traffic Activity
by Laurent Viennot, Philippe Jacquet, Thomas Heide Clausen 2002
Cited by 2

Table 2.3: Classes of protocols for ad hoc networks

in The Witness Aided Routing Protocol -- A Scalable, Fault-Tolerant Solution For Mobile Ad Hoc Networks
by Ionut Dragos Aron

Table 2. System parameters in ad hoc networks

in MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance
by unknown authors
"... In PAGE 5: ...oss factor is 2:5. The coverage range is 200m. The average SNR on the boundary for the single antenna case is 0 dB, and multi-rate transmission is used. The common parameters used in both cases are summarized in Table2 (see also, [1]). Using the practical parameters from D-Link, the information-bearing data rate and the SNR (after the processing of spatial diversity) satisfy the relationship as in Table 3.... In PAGE 7: ... We also study the impact of SD-MAC, rate adaptation strategies, and contention on the hop distance. The parameters used in the following examples are the same as in Table2 . We assume that the total transmission power of each node is 20dBm and the path loss factor is 2.... ..."

Table 1: Simulation settings In our evaluation, we compare the performance of seven different routing algorithms: AODV [17], DSR [10], GF [20], GPSR [12], SPEED, SPEED-S, SPEED-T. We adopt both ad hoc routing proto- cols (AODV and DSR) and sensor network protocols (GF, GPSR).

in A Spatiotemporal Communication Protocol for Wireless Sensor Networks
by Tian He, John A Stankovic, Chenyang Lu, Tarek Abdelzaher 2005
"... In PAGE 20: ... This software provides a high fidelity simulation for wireless communication with detailed propaga- tion, radio and MAC layers. Table1 describes the detailed setup for our simulator. The communica- tion parameters are mostly chosen in reference to the Berkeley Telos mote specification.... ..."
Cited by 5

Table 1: DR-TDMA MACFrame Parameters

in Dynamic Reservation TDMA Protocol for Wireless ATM Networks
by Jean-François Frigon, Victor C. M. Leung, Henry C. B. Chan
"... In PAGE 5: ...cknowledgments for all mobile stations are grouped in the same downlink control slots (i.e., eachdownlink control slot is not dedicated to a speci c mobile station). Table1 summarizes the DR-TDMA frame parameters. It should be noted that the only parameters that directly in uence the MAC protocol e ciency are: the frame duration, the number of control and data slots per frame and the data to control slot size ratio.... ..."
Next 10 →
Results 1 - 10 of 311,522
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University