• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 98,193
Next 10 →

Table 4. Key management schemes for mobile ad hoc networks.

in Abstract
by Patroklos G. Argyroudis
"... In PAGE 31: ... By fabricating and forwarding route error messages an attacker can try to disrupt the operation of existing routes, not only breaking connectivity but also creating additional routing overhead in the network as a result of legitimate nodes trying to establish alternative paths. In Table4 we present the route maintenance characteristics of the protocols we have analyzed. The solution adopted by most of the analyzed protocols requires the signing of the complete error message by the node that generates or forwards it.... In PAGE 33: ... In this section we will present several key management solutions that have been specifically proposed to address the challenges of mobile ad hoc networks and discuss their behavior in respect to mobility patterns and operational requirements. Table4 summarizes the results of our analysis. Table 4.... ..."

Table 3. Comparison of multicast routing protocols for mobile ad hoc netowrks

in unknown title
by unknown authors 2005
"... In PAGE 31: ... Table3 gives comparison of typical multicast routing protocols for mobile ad hoc networks. Metrics used for comparison are the multicast delivery structure, how to acquire and maintain routing information, whether they are loop-free, the dependency on underlying unicast routing protocol, is the control packet flooding being used, the requirement for periodic control messages, the routing hierarchy and their scalability.... ..."

Table 2. System parameters in ad hoc networks

in MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance
by unknown authors
"... In PAGE 5: ...oss factor is 2:5. The coverage range is 200m. The average SNR on the boundary for the single antenna case is 0 dB, and multi-rate transmission is used. The common parameters used in both cases are summarized in Table2 (see also, [1]). Using the practical parameters from D-Link, the information-bearing data rate and the SNR (after the processing of spatial diversity) satisfy the relationship as in Table 3.... In PAGE 7: ... We also study the impact of SD-MAC, rate adaptation strategies, and contention on the hop distance. The parameters used in the following examples are the same as in Table2 . We assume that the total transmission power of each node is 20dBm and the path loss factor is 2.... ..."

Table 1: Possible characteristics of simulation environments for mobile ad hoc networks and their common implementation. These characteristics are considered in Section 6 to score the different network simulators.

in Analysis of simulation environments for mobile ad hoc networks
by Gianni A. Di Caro
Cited by 3

Table 1: Comparison of several routing protocols for ad hoc networks.

in Power-Aware Routing in Mobile Ad Hoc Networks
by Mike Woo, Suresh Singh, C. S. Raghavendra
"... In PAGE 3: ... Of course, the routes are not necessarily the shortest. The salient features of these protocols is summarized in Table1 . In this table, we have classi ed the protocols according to the metrics used for route optimization, the message overhead in determining routes, the type of protocol used and its convergence goals (active refers to a protocol that runs until all routing tables are consistent while passive refers to an algorithm that determines routes based on an as-needed basis).... ..."

Table 2 summarises characteristics of the five service discovery protocols presented above. Their suitability for mobile ad-hoc networks will be discussed subsequently.

in Peer2peer Network Service
by Michael Dyrna 2003
"... In PAGE 10: ... Table2... ..."

Table 1: Parameters for authentification between the network provider and the mobile endpoint.

in Protocol for Tetherless Computing
by Keshav Darragh Seth, S. Keshav, P. Darragh, A. Seth, S. Fung
"... In PAGE 10: ... These old custodians send any stored bundles to the mobile according to its new route mappings. Here are the contents of the control bundles: MessageType Fields Sender Receiver Callback Control Bundle DTN tuple (endpoint), DTN tuple (new custody node) CM Mobile Contact - gt; DTN DHT Update Control Bundle GUID, DTN node ID CM Mobile Contact - gt; Regional Gateway for Routing to Internet Table1 0: Contents of control bundles for updating router and custody information of endpoint engaging in near mobility. 5.... In PAGE 11: ....7.2 The DHT looks up the given GUID and responds with a control bundle containing the region information of the endpoint in question. Here are the contents of these control bundles: MessageType Fields Sender Receiver DTH Look-Up Control Bundle GUID (query), GUID (sender) DHT-AM DHT DHT Response Control Bundle GUID, DTN Region ID DHT DHT-AM Table1 1: Contents of control bundles for querying a GUID in global DHT. 5.... In PAGE 13: ....10.4 The mobile contact delivers all bundles addressed to the endpoint, terminates the connection, and replies to the custody DTN node with the state of the delivery. The parameters involved in the interactions are described below: MessageType Fields Sender Receiver Proxy Bundle Delivery (security), lt;num bundles gt;, lt;bundle size gt; lt;bundle gt; DTN Mobile Contact DTN Bundle Request (security), DTN tuple CL Mobile Contact DTN Bundle Delivery lt;num bundles gt;, lt;bundle size gt; lt;bundle gt; Mobile Contact DTN CL Table1 2: Parameters for endpoint to receive bundles from custody DTN node by proxy through a mobile contact. 5.... In PAGE 13: .... lt;contact flight path info gt; APS CM Table1... ..."

Table 9: Multi-hop Ad-Hoc Network Model with Energy-Efficient Routing Link Met- rics

in Energy-Efficient MAC in Ad Hoc Networks Inspired by Conflict Resolution Concepts
by Yalin Evren Sagduyu, Anthony Ephremides

Table 1: Applications of ad hoc networks

in Models of authentication in ad hoc networks and their related network properties
by Katrin Hoeper, Guang Gong
"... In PAGE 2: ... 1.1 Applications We summarize some current and future applications of ad hoc networks in Table1 . The applications listed in the table are sorted by their area of use, network devices, and communication model.... ..."
Cited by 1

Table 12: Properties of ad hoc networking

in unknown title
by unknown authors
"... In PAGE 10: ...able 11. Challenges in concurrent engineering.................................................................... 59 Table12 .... In PAGE 75: ... The union of these forms an arbitrary topology, which may change rapidly and unpredictably. Table12 shows the properties of ad hoc networking, adapted from (Thonet, 2004). 1.... ..."
Next 10 →
Results 1 - 10 of 98,193
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University