Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 30 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
30
Dung lượng
392,35 KB
Nội dung
[...]... Approaches TCP-ELFN (1 Flow) Atra (1 Flow) ATP (1 Flow) Key Elements in Approaches Node power level is less than node and communication is not possible Node CTS does not silence node and so node k can interfere with node since node power level is higher 83 92 98 10 0 10 0 10 1 10 2 10 4 10 7 11 1 12 6 12 8 13 0 13 3 13 6 13 9 14 5 14 9 15 0 16 0 16 0 List of Figures 6.3 6.4 6.5 6.6 6.7 6.8 6.9 6 .10 6 .11 6 .12 6 .13 6 .14 COMPOW computes... intervals Nodes each choose one row and one column (i.e.‚ node chooses row and column and node chooses row and column Node chooses row 0 and column 1 and node chooses row 2 and column 2 Both stay awake during intervals 2 and 9 xiii 16 3 16 6 16 8 17 0 17 0 17 8 18 0 18 1 18 1 18 3 18 3 18 3 List of Figure xiv 6 .15 6 .16 6 .17 6 .18 7 .1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 7.9 7 .10 7 .11 8 .1 8.2 8.3 8.4 8.5 8.6 Slot allocations... Proposed in D-MAC 18 4 18 4 18 8 18 9 200 202 204 206 A Scenario to Understand the Problems with DMAC The MMAC Protocol 209 211 The Circular RTS message The Multi-Beam Antenna Array Impact of omni-directional route requests The Selective Forwarding Optimization Route Coupling 214 215 219 2 21 222 Wireless LAN 2 31 2 31 235 236 237 Ad- hoc Network IEEE 802.1l DCF Packet formats for basic 802 .11 Point Coordination... applications and wireless devices may further add to the need for and the usage of ad hoc networks During the last few years‚ numerous papers and reports have been published on various issues on mobile ad hoc networks Several tutorials and survey reports have been also published on specific aspects of the mobile ad hoc networks In fact‚ conferences and symposiums that are dedicated to ad hoc networking... power level of 10 0mW for the network‚ which shows that a common power level is not appropriate for non-homogeneous networks With CLUSTERPOW‚ the network has three clusters corresponding to 1mW‚ 10 mW and 10 0mW The 10 0 mW cluster is the whole network A 10 mW -10 0mW -10 mW1mW route is used for node to reach node Enclosure of node Node computes the relay regions of nodes and Relay Regions 1 2 and 3 (corresponding...This page intentionally left blank List of Figures 1. 1 1. 2 1. 3 2 .1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 2 .10 2 .11 2 .12 2 .13 2 .14 3 .1 3.2 3.3 Internet in the sky architecture designed as part of the ONR supported Minuteman project at UCLA An example opportunistic ad hoc network An example of LANMAR implementation Markov chain model for the channel around a node... multimedia traffic and the emergency nature of the applications).In the following section we review the characteristics of ad hoc networks in more detail 1. 1.2 Ad hoc Networks Characteristics Mobility: the fact that nodes can be rapidly repositioned and/ or move is the raison d’etre of ad hoc networks Rapid deployment in areas with no infrastructure often implies that the users must explore an area and perhaps... access point but also vehicles and pedestrians, and; in Campus environments to interconnect groups of roaming students and researchers via the Internet It appear thus that after more than 30 years of independent evolution, ad hoc networking will get a new spin and wired Internet and ad hoc networks will finally come together to produce viable commercial applications 1. 1 .1 Wireless Evolution We begin... logical 1- hop and 2-hop neighborhood respectively Comparison of search regions using expanding ring search and query localization Dotted circles in each figure indicate the search regions Restricted directional flooding in LAR and DREAM 8 11 14 28 31 32 36 37 39 40 42 45 46 47 51 54 55 68 76 82 List of Figure xii 3.4 4 .1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 4.9 5 .1 5.2 5.3 5.4 5.5 5.6 5.7 5.8 5.9 6 .1 6.2 Illustration... discusses the evolution of these networks and projects future directions and challenges The second chapter primarily looks at contention based medium access control in ad hoc networks Most of the research in ad hoc networks assume the use of either the IEEE MAC protocol or variants thereof and this chapter enuniciates by means of both discussion and analyses the nuances of such MAC protocols The third chapter . Protocol in Brief 12 4 12 5 12 6 12 7 12 9 13 1 13 2 13 2 13 4 13 5 13 7 14 0 14 6 15 0 15 1 15 3 15 5 15 5 15 7 15 7 15 8 15 8 15 8 16 1 17 2 17 6 17 6 18 6 19 0 19 0 19 7 19 7 19 8 19 9 200 2 01 2 01 202 5.2 .1 5.2.2 5.2.3 5.2.4 5.2.5 5.2.6 5.2.7 viii AD. Das 63 3 .1. 3.2. Introduction Flooding 63 65 66 68 69 70 71 72 72 75 77 77 79 80 81 84 84 86 91 91 94 94 95 96 97 99 10 3 10 5 10 6 10 8 10 8 10 9 11 2 11 2 11 3 11 4 11 4 11 4 11 5 11 7 11 8 3.2 .1 Efficient Flooding Techniques 3.3. Proactive Routing 3.3 .1 3.3.2 3.3.3 Distance Vector Protocols Link. Gerla 1 1 .1. Introduction and Definitions 1. 1 .1 1 .1. 2 1. 1.3 Wireless Evolution Ad hoc Networks Characteristics Wireless Network Taxonomy 1. 2. Ad Hoc Network Applications 1 3 4 5 6 7 1. 2 .1 1.2.2 The