AD Hoc Networking (Hardcover)
Charles E. Perkins
- 出版商: Addison Wesley
- 出版日期: 2001-01-08
- 定價: $1,800
- 售價: 6.0 折 $1,080
- 語言: 英文
- 頁數: 384
- 裝訂: Hardcover
- ISBN: 0201309769
- ISBN-13: 9780201309768
-
相關分類:
Wireless-networks
立即出貨(限量)
買這商品的人也買了...
-
$680$537 -
$2,640$2,508 -
$980$774 -
$970Introduction to Algorithms, 2/e
-
$1,150$1,127 -
$920$727 -
$880$695 -
$860$568 -
$1,920$1,824 -
$620$527 -
$780$741 -
$650$553 -
$590$466 -
$580$493 -
$690$538 -
$720$562 -
$880$792 -
$750$638 -
$800$760 -
$560$476 -
$850$723 -
$680$612 -
$480$379 -
$580$493 -
$480$408
相關主題
商品描述
Description
The complete guide to building ad hoc wireless networks that come together "on-the-fly"!
- Wireless communications without routers, base stations, or Internet Service Providers.
- Key applications: conferencing, home networking, emergency services, Personal Area Networks, Bluetooth, and more.
- Addressing the key challenges of ad hoc networking: Power management, scalability, and more.
Charles E. Perkins, editor, is at the Nokia Research Center, and a world-recognized authority on ad hoc networking. The ad hoc networking techniques presented here are written by their creators and inventors, including Scott Corson, Jim Freebersyser, J.J. Garcia-Luna-Aceves, Zygrnunt Haas, David B. Johnson, Barry M. Leiner and Martha Steenstrup.
Table Of Contents
1. Ad Hoc Networking: An Introduction. Model of Operation.
Commercial Applications of Ad Hoc Networking.
Technical and Market Factors Affecting Ad Hoc Networks.
General Comments on Routing Protocols.
Description of the Material Presented.
Symmetric Links.
Layer-2 Ad Hoc Solutions.
Proactive versus Reactive Protocols.
Multicast.
Layer-2 Ad Hoc Solutions.
Proactive versus Reactive Protocols.
Multicast.
Commercial Applications of Ad Hoc Networking.
Conferencing.
Home Networking.
Emergency Services.
Personal Area Networks and Bluetooth.
Embedded Computing Applications.
Sensor Dust.
Automotive/PC Interaction.
Other Envisioned Applications.
Home Networking.
Emergency Services.
Personal Area Networks and Bluetooth.
Embedded Computing Applications.
Sensor Dust.
Automotive/PC Interaction.
Other Envisioned Applications.
Technical and Market Factors Affecting Ad Hoc Networks.
Scalability.
Power Budget versus Latency.
Protocol Deployment and Incompatible Standards.
Wireless Data Rates.
User Education and Acculturation.
Additional Security Exposure.
Spotty Coverage.
Power Budget versus Latency.
Protocol Deployment and Incompatible Standards.
Wireless Data Rates.
User Education and Acculturation.
Additional Security Exposure.
Spotty Coverage.
General Comments on Routing Protocols.
Description of the Material Presented.
2. A DoD Perspective on Mobile Ad Hoc Networks.
Motivation.
The Past.
The Present.
The Future.
Conclusion.
The Past.
DARPA Packet Radio Network.
Survivable Radio Networks.
Other DoD Efforts in MANET.
Other Efforts in MANET.
Survivable Radio Networks.
Other DoD Efforts in MANET.
Other Efforts in MANET.
The Present.
Tactical Internet.
ELB.
GloMo.
IETF MANET Working Group.
ELB.
GloMo.
IETF MANET Working Group.
The Future.
Commercial Applications.
DoD.
Open Research Issues.
DoD.
Open Research Issues.
Conclusion.
3. DSDV: Routing over a Multihop Wireless Network of Mobile Computers.
Introduction.
Overview of Routing Methods.
Destination-Sequenced Distance Vector Protocol.
Examples of DSDV in Operation.
Properties of the DSDV Protocol.
Comparison with other Methods.
Future Work.
Summary.
Overview of Routing Methods.
Link-State.
Distance-Vector.
Distance-Vector.
Destination-Sequenced Distance Vector Protocol.
Protocol Overview.
Route Advertisements.
Route Table Entry Structure.
Responding to Topology Changes.
Route Selection Criteria.
Operating DSDV at Layer 2.
Extending Base Station Coverage.
Route Advertisements.
Route Table Entry Structure.
Responding to Topology Changes.
Route Selection Criteria.
Operating DSDV at Layer 2.
Extending Base Station Coverage.
Examples of DSDV in Operation.
Damping Fluctuations.
Properties of the DSDV Protocol.
Comparison with other Methods.
Future Work.
Summary.
4. Cluster-Based Networks.
Clustering for Transmission Management.
Clustering for Backbone Formation.
Clustering for Routing Efficiency.
Conclusion.
Link-Cluster Architecture.
Clustering for Backbone Formation.
Near-Term Digital Radio Network.
Virtual Subnet Architecture.
Virtual Subnet Architecture.
Clustering for Routing Efficiency.
Hierarchical Routing.
Clustering.
Clustering.
Conclusion.
5. DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks.
Assumptions.
DSR Protocol Description — Overview and Important Properties.
DSR Evaluation.
Related Work.
Conclusion.
DSR Protocol Description — Overview and Important Properties.
DSR Route Discovery.
DSR Route Maintenance.
Additional Route Discovery Features.
Additional Route Maintenance Features.
Support for Heterogeneous Networks and Mobile IP.
Multicast Routing with DSR.
Location of DSR Functions in the ISO Network Reference Model.
DSR Route Maintenance.
Additional Route Discovery Features.
Additional Route Maintenance Features.
Support for Heterogeneous Networks and Mobile IP.
Multicast Routing with DSR.
Location of DSR Functions in the ISO Network Reference Model.
DSR Evaluation.
Simulation Summary.
DSR Implementation and Testbed Summary.
DSR Implementation and Testbed Summary.
Related Work.
Conclusion.
6. The Ad Hoc On-Demand Distance-Vector Protocol.
AODV Properties.
Unicast Route Establishment.
Multicast Route Establishment.
Broadcast.
Simulations.
Optimizations and Enhancements.
Future Work.
Conclusion.
Appendix A: Message Formats.
Appendix B: Extension Formats.
Appendix C: Configuration Parameters.
Unicast Route Establishment.
Route Discovery.
Expanding Ring Search.
Forward Path Setup.
Route Maintenance.
Local Connectivity Management.
Actions after Reboot.
Expanding Ring Search.
Forward Path Setup.
Route Maintenance.
Local Connectivity Management.
Actions after Reboot.
Multicast Route Establishment.
Route Discovery.
Forward Path Setup.
Multicast Route Activation/Deactivation.
Multicast Tree Maintenance.
Actions after Reboot.
Forward Path Setup.
Multicast Route Activation/Deactivation.
Multicast Tree Maintenance.
Actions after Reboot.
Broadcast.
Simulations.
Unicast Simulations.
Multicast Simulations.
Multicast Simulations.
Optimizations and Enhancements.
Quality of Service.
Subnet Routing.
AODV and Mobile IP.
Subnet Routing.
AODV and Mobile IP.
Future Work.
Security.
Asymmetric Routing.
Asymmetric Routing.
Conclusion.
Appendix A: Message Formats.
Route Request.
Route Reply.
Route Error.
Multicast Activation.
Group Hello.
Route Reply.
Route Error.
Multicast Activation.
Group Hello.
Appendix B: Extension Formats.
Hello Interval.
Multicast Group Leader.
Multicast Group Rebuild.
Multicast Group Information.
Maximum Delay.
Minimum Bandwidth.
Multicast Group Leader.
Multicast Group Rebuild.
Multicast Group Information.
Maximum Delay.
Minimum Bandwidth.
Appendix C: Configuration Parameters.
7. ZRP: A Hybrid Framework for Routing in Ad Hoc Networks.
Reconfigurable Wireless Networks.
The Communication Environment and the RWN Model.
The Zone Routing Protocol.
ZRP — Formal Description.
Evaluation of ZRP.
Performance Results.
Conclusion.
Appendix.
The Communication Environment and the RWN Model.
The Zone Routing Protocol.
Reactive versus Proactive Routing.
Routing Zones and Intrazone Routing.
Interzone Routing and the Zone Routing Protocol.
Routing Zones and Intrazone Routing.
Interzone Routing and the Zone Routing Protocol.
ZRP — Formal Description.
Neighbor Discovery Protocol.
The Intrazone Routing Protocol.
The Interzone Routing Protocol.
The Intrazone Routing Protocol.
The Interzone Routing Protocol.
Evaluation of ZRP.
Performance Results.
Conclusion.
Appendix.
8. Link Reversal Routing.
General Approach.
The Gafni-Bertsekas Algorithm.
The Lightweight Mobile Routing Algorithm.
The Temporally Ordered Routing Algorithm.
Comparison of LRR Algorithms.
Conclusion.
The Gafni-Bertsekas Algorithm.
The Lightweight Mobile Routing Algorithm.
Protocol Description.
Properties of the Protocol.
Properties of the Protocol.
The Temporally Ordered Routing Algorithm.
Protocol Description.
Properties of the Protocol.
Properties of the Protocol.
Comparison of LRR Algorithms.
Conclusion.
9. The Effects of Beaconing on the Battery Life of Ad Hoc Mobile Computers.
Motivation.
Ad Hoc Wireless Networks.
Associativity Based Routing.
Effects of Beaconing on Battery Life.
Experimental Results and Observations.
Conclusion.
Ad Hoc Wireless Networks.
Power Issues.
Smart Batteries and Battery Characteristics.
Smart Batteries and Battery Characteristics.
Associativity Based Routing.
ABR Protocol Description.
ABR Route Discovery Phase.
Handling Mobility in ABR.
ABR Route Deletion Phase.
ABR Route Discovery Phase.
Handling Mobility in ABR.
ABR Route Deletion Phase.
Effects of Beaconing on Battery Life.
Experimental Hardware.
Experimental Software.
Experimental Software.
Experimental Results and Observations.
Standalone Beaconing at High Frequencies.
Standalone Beaconing at Low Frequencies.
Beaconing with Neighboring Nodes at High Frequencies.
Beaconing with Neighboring Nodes at Low Frequencies.
Deductions.
Standalone Beaconing at Low Frequencies.
Beaconing with Neighboring Nodes at High Frequencies.
Beaconing with Neighboring Nodes at Low Frequencies.
Deductions.
Conclusion.
10. Bandwidth-Efficient Link-State Routing in Wireless Networks.
Updating Routes in Wireless Networks.
STAR Description.
Conclusion.
STAR Description.
Information Stored and Exchanged.
Validating Updates.
Exchanging Update Messages.
Example.
Impact of the Link Layer.
Performance Evaluation.
Comparison with Table-Driven Protocols.
Comparison with On-Demand Routing Protocols.
Validating Updates.
Exchanging Update Messages.
Example.
Impact of the Link Layer.
Performance Evaluation.
Comparison with Table-Driven Protocols.
Comparison with On-Demand Routing Protocols.
Conclusion.
11. Summary and Future Work.
Future Work.
Other Approaches.
For More Information.
Scalability.
Quality of Service.
Is the Client — Server Model Viable?
Connecting to the Internet.
Security.
Power Control.
Quality of Service.
Is the Client — Server Model Viable?
Connecting to the Internet.
Security.
Power Control.
Other Approaches.
Location-Assisted Routing.
Fisheye Routing.
CEDAR.
A Possible Vision of the Future.
Fisheye Routing.
CEDAR.
A Possible Vision of the Future.
For More Information.
Index. 0201309769T04062001