Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2000
Performance aspects of Bluetooth scatternet formation
MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computingPages 147–148The emergence of Bluetooth as a default radio interface allows handheld electronic devices to be rapidly interconnected into ad hoc networks. Bluetooth allows large numbers of piconets to form a scatternet using designated nodes that participate in ...
- ArticleNovember 2000
A distributed mechanism for topology discovery in ad hoc wireless networks using mobile agents
MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computingPages 145–146The dynamics of wireless ad hoc networks as a consequence of mobility and disconnection of mobile hosts pose a number of problems in designing proper routing schemes for effective communication between any source and destination [1]. The conventional ...
- ArticleNovember 2000
Utility-based decision-making in wireless sensor networks
MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computingPages 143–144We consider challenges associated with application domains in which a large number of distributed, networked sensors must perform a sensing task repeatedly over time. We address issues such as resource constraints, utility associated with a sensing task,...
- ArticleNovember 2000
Proximity awareness and fast connection establishment in Bluetooth
MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computingPages 141–142Proximity awareness in Bluetooth technology is implemented via an asymmetric point to point "sender-receiver" protocol where "senders" are trying to discover "receivers" in the vicinity. This paper tries to shed some light on the link formation delay by ...
-
- ArticleNovember 2000
A simulation analysis on reactive route repair techniques for QoS sensitive applications in mobile ad hoc networks
MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computingPages 139–140One of the main challenges in mobile ad hoc networks (MANETs) is the routing of calls to mobile users moving frequently. The major tasks of routing are to find a route to a terminal quickly, a process often called ROUTE DISCOVERY, and to maintain and ...
- ArticleNovember 2000
Dynamic quality-of-service for mobile ad hoc networks
MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computingPages 137–138This paper presents an approach to supporting Quality of Service (QoS) in a dynamic network environment. With this approach, resource reservations represent ranges, and applications adapt to an allocated level of QoS provided by the network at some ...
- ArticleNovember 2000
Securing ad hoc services, a Jini view: extended abstract
MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computingPages 135–136Problems with securing ad hoc services are discussed. How authentication and key exchange for ad hoc services can be performed will be shown. We use a simple trust model for the participants in an ad hoc network. We show how to create an authenticated ...
- ArticleNovember 2000
Central controller handover procedure for ETSI-BRAN HiperLAN/2 ad hoc networks and clustering with quality of service guarantees
MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computingPages 131–132The European Telecommunications Standardisation Institute (ETSI) has almost completed standardisation of the HiperLAN/2 (HL/2) system.In this paper the HL/2 "Central Controller Handover" procedure is presented, which is on the basis of the ad hoc ...
- ArticleNovember 2000
On the reduction of broadcast redundancy in mobile ad hoc networks
MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computingPages 129–130Flooding in mobile ad hoc networks has poor scalability as it leads to serious redundancy, contention and collision. In this paper, we propose an efficient approach to reduce the broadcast redundancy. In our approach, local topology information and the ...
- ArticleNovember 2000
A speech-optimised multiple access scheme for a mobile ad hoc network
MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computingPages 127–128We propose a multiple access scheme based on Time Division Duplexing (TDD) for peer-to-peer speech communications in a short-range mobile ad hoc network of wireless nodes. This reservation-based packet-switched scheme aims to improve the utilisation of ...
- ArticleNovember 2000
Assignment methods for spatial reuse TDMA
MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computingPages 119–124Spatial reuse TDMA is an access scheme for multi-hop radio networks. The idea is to increase capacity by letting several radio terminals use the same time slot when possible. A time slot can be shared when the radio units are geographically separated ...
- ArticleNovember 2000
Low power rendezvous in embedded wireless networks
MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computingPages 107–118In the future, wireless networking will be embedded into a wide variety of common, everyday objects [1]. In many embedded networking situations, the communicating nodes will be very small and battery powered. For this reason, it is crucial that power ...
- ArticleNovember 2000
Fair medium access in 802.11 based wireless ad-hoc networks
MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computingPages 99–106The Medium Access Control (MAC) protocol through which mobile stations can share a common broadcast channel is essential in an ad-hoc network. Due to the existence of hidden terminal problem, partially-connected network topology and lack of central ...
- ArticleNovember 2000
Enforcing service availability in mobile ad-hoc WANs
In this paper, we address the problem of service availability in mobile ad-hoc WANs. We present a secure mechanism to stimulate end users to keep their devices turned on, to refrain from overloading the network, and to thwart tampering aimed at ...
- ArticleNovember 2000
MIPMANET: mobile IP for mobile ad hoc networks
Mobile ad hoc networking allows nodes to form temporary networks and communicate beyond transmitter range by supporting multihop communication through IP routing. Routing in such networks is often reactive, i.e., performed on-demand, as opposed to ...
- ArticleNovember 2000
An architecture for building self-configurable systems
Developing wireless sensor networks can enable information gathering, information processing and reliable monitoring of a variety of environments for both civil and military applications. It is however necessary to agree upon a basic architecture for ...
- ArticleNovember 2000
Content based multicast (CBM) in ad hoc networks
This paper presents a radically new multicast model for ad hoc wireless networks. In this model, the content of the multicast data determines the receiver set for the data and the receiver set changes dynamically as the content of the multicast changes. ...
- ArticleNovember 2000
Role-based multicast in highly mobile but sparsely connected ad hoc networks
We present an approach to multicasting messages among highly mobile hosts in ad hoc networks. We suggest a new definition of a role-based multicast that suits the special needs of inter-vehicle communication: Rather than by explicit identification, a ...
- ArticleNovember 2000
Neighbor supporting ad hoc multicast routing protocol
An ad hoc network is a multi-hop wireless network formed by a collection of mobile nodes without the intervention of fixed infrastructure. Limited bandwidth and a high degree of mobility require that routing protocols for ad hoc networks be robust, ...