• Aucun résultat trouvé

CONCLUSIONS AND INTRODUCTION TO REMAINING CHAPTERS In coming years, it seems inevitable that mobile computing will flourish and evolve toward

Dans le document MOBILE AD HOC NETWORKING (Page 53-66)

integrated, converged fourth generation wireless technology. Ad hoc networking will play an important role in this evolution. Its intrinsic flexibility, ease of maintenance, lack of needed infrastructure, autoconfiguration, self-administration capabilities, and significant cost advantages make it a prime candidate for becoming the stalwart technology for per-sonal pervasive communication. The opportunities for and importance of ad hoc networks are being increasingly recognized by both the research and industry community, as evi-denced by the flood of research activities, strong industry interest, and almost exponential growth of the Wireless LAN and Bluetooth sectors. In moving forward and successfully ful-filling this opportunity, developing and seamlessly integrating MANET with other wireless networks and fixed internet infrastructures, the successful addressing of many of the open research and development issues discussed in this article will play a critical role.

The rest of the chapters in this book cover many important areas and design issues in mobile ad hoc networks that, due to space limitations, have been only touched upon in this overview chapter. Specifically, subsequent chapters focus on the following areas:

Chapter 2, entitled “Off-the-Shelf Enablers of Ad Hoc Networks,” by Gergely V. Záru-ba and Sajal K. Das, discusses the WPAN and WLAN technologies as a Záru-basis for ad hoc networks. Specifically, the chapter analyzes the IEEE 802.11 family, Hiper-LAN, and Bluetooth.

Chapter 3, entitled “IEEE 802.11 in Ad Hoc Networks: Protocols, Performance and Open Issues,” by Giuseppe Anastasi, Marco Conti, and Enrico Gregori, presents the IEEE 801.11 technology and discusses its utilization for constructing ad hoc net-works. Special attention is devoted to the interaction between the TCP protocol and IEEE 802.11-based ad hoc networks. The aim is to analyze the performance of In-ternet applications such as Web browsing and file transfer in such environments.

Chapter 4, entitled “Bluetooth Scatternet Formation in Bluetooth Networks,” by Ste-fano Basagni, Raffaele Bruno, and Chiara Petrioli, describes the state of the art in scatternet formation using Bluetooth technology, that is, formation of multihop ad hoc nets of Bluetooth devices.

Chapter 5, entitled “Antenna Beamforming and Power Control for Ad Hoc Networks,”

by Ram Ramanathan, discusses the techniques to guarantee an efficient utilization of channel capacity. These techniques include: (1) utilizing directional antennas in ad hoc networks to increase effective capacity, increase connectivity, and lower probability of detection/interference, and (2) controlling the topology of an ad hoc network by changing the transmitting power.

Chapter 6, entitled “Topology Control in Wireless Ad Hoc Networks,” by Xiang-Yang Li, discusses methods for designing and maintaining network topology to enable network scalability, such as how to decide transmission radius to reduce interfer-ence and conserve energy while enabling good network connectivity, topology up-dates, and neighbor discovery.

Chapter 7, entitled “Broadcasting and Activity-Scheduling in Ad Hoc Networks,” by Ivan Stojmenovic and Jie Wu, surveys existing methods for broadcasting in a wire-less network intelligently (using omnidirectional or directional antennas, with equal or adjusted transmission radii) and for scheduling node activities to ensure both re-liability and power and bandwidth efficiency.

Chapter 8, entitled “Location Discovery,” by Andreas Savvides and Mani B. Srivastava, surveys the requirements and broad applications that can supported by location dis-covery, as well as technologies and algorithms that have been developed in this do-main, with an emphasis on the application and usage in wireless systems for routing calls to mobile users.

Chapter 9, entitled “Mobile Ad hoc Networks (MANETs): Routing technology for dy-namic, wireless networking,” by Joseph P. Macker and M. Scott Corson, provides specific insights into standardization activities and efforts involved in mobile ad hoc networking.

Chapter 10, entitled “Routing Approaches in Mobile Ad Hoc Networks,” by Elizabeth M. Belding-Royer, presents a comprehensive set of techniques used for routing in ad hoc networks.

Chapter 11, entitled “Energy Efficient Communication in Ad Hoc Wireless Networks,”

by Laura M. Feeney, summarizes the evaluation of energy consumption in medium-access control, routing, and transport protocols, including metrics and protocols used to prolong network life, and design of localized algorithms that avoid commu-nication overhead for updating network information. Power-efficient medium ac-cess and the use of geographic position for power optimization are also discussed.

Chapter 12, entitled “Ad Hoc Network Security,” by Pietro Michiardi and Refik Molva, presents recent research in the security area, including recent advances in providing

1.6. CONCLUSIONS AND INTRODUCTION TO REMAINING CHAPTERS 35

an automated key management scheme that does not require the presence of an ex-ternal infrastructure or bootstrap phase in which keys are distributed, as well as cur-rently available security mechanisms implemented in the data-link layer.

Chapter 13, entitled “Self-Organized and Cooperative Ad Hoc Networking by Silvia Giordano and Alessandro Urpi, presents methods for exploiting certain characteris-tics of ad hoc networks (e.g., cooperation and the relationship among nodes) based on community and social network concepts.

Chapter 14, entitled “Simulation and Modeling of Wireless, Mobile, and Ad Hoc Net-works,” by Azzedine Boukerche and Luciano Bononi, focuses on the use of simula-tion methods and tools used in the performance analysis of ad hoc network architec-ture and protocols, including synthetic models for describing the users’ mobility and the pros and cons of various available simulation tools (NS-2, Glomosim, etc.).

Chapter 15, entitled “Modeling Cross-Layering Interaction Using Inverse Optimiza-tion,” by Violet R. Syrotiuk and Amaresh Bikki, discusses modeling protocol inter-action at different layers of a networking system.

Chapter 16, entitled “Algorithmic Challanges in Ad Hoc Networks,” by Andras Farago, describes solved and open algorithmic problems that form the basis for many of the fundamental solutions and protocols in ad hoc networking.

REFERENCES

1. S. Hara and R. Prasad, “Overview of Multicarrier CDMA,” IEEE Communications Magazine, Dec. 1997, pp. 126–133.

2. Y. Bing Lin and I. Chlamtac, Wireless and Mobile Network Architectures, Wiley, 2000.

3. D-Link WLAN Access Point User Manaul and On-line Help, 2002.

4. H. Harada and R. Prasad, “A New Multi-carrier CDMA/TDD Transmission Scheme Based on Cyclic Extended Spread Code for 4th Generation Mobile Communication System,” in Pro-ceedings of the IEEE International Conference on Personal Wireless Communication Confer-ence, pp. 319–323, 1997.

5. R. G. T. Anderson, B. Bershad, and D. Wetherall, “A System Architecture for Pervasive Com-puting,” In Proceedings of the 9th ACM SIGOPS European Workshop, pp. 177–182, Kolding, Denmark, September 2000.

6. Wireless World Research Forum (WWRF): http://www.ist-wsi.org.

7. I. Chlamtac and M. El-Zarki, “Introduction to Computer Networks,” in Encyclopedia of Telecommunications, Vol. 9, 1994, Marcel Dekker.

8. S. Giordano, “Mobile Ad-hoc Networks,” in XXX XXX,Wiley, 2000.

9. C. E. Perkins (Ed.),Ad Hoc Networking, Addison-Wesley Longman, 2000.

10. The official Bluetooth web site: http://www.bluetooth.com/.

11. IBM Zurich Research Laboratory web site: http://www.zurich.ibm.com/cs/wireless/blue-tooth.html.

12. I. Chlamtac and J. Redi, “Mobile Computing: Challenges and Opportunities,” in Encyclopedia of Computer Science, 4th Edition, edited by D. Hemmendinger, A. Ralston, and E. Reilly, In-ternational Thomson Publishing, 1998.

13. D. L. Lough, T. K. Blankenship, K. J. Krizman, Tutorial on Wireless LANs and IEEE 802. 11, Virginia Polytechnic Institute and State University, http://computer.org/students/looking/sum-mer97/ieee802.htm.

14. L. Goldberg, “Wireless LANs: Mobile Computing’s Second Wave,” Electronic Design, 26, June 1995.

15. Y. Bing Lin, Y. R. Huang, A. Pang, and I. Chlamtac, “All-IP Approach for Third Generation Mobile Networks,” IEEE Network Magazine,in press.

16. J. A. Freebersyser and B. Leiner, A DoD Perspective on Mobile Ad Hoc Networks, Ad Hoc Net-working, Addison Wesley, 2001.

17. W. Fifer and F. Bruno, “The Low-Cost Packet Radio,”Proceedings of the IEEE, 75(1), 33–42, January 1987.

18. N. Shacham and J. Westcott, “Future Directions in Packet Radio Architectures and Protocols,”

Proceedings of the IEEE 75(1), 83–99, January 1987.

19. R. Kahn et al. “Advances in Packet Radio Technology,” Proceedings of the IEEE 66, 1468–1496, November 1978.

20. B. Leiner, R. Ruth, and A. R. Sastry, “Goals and Challenges of the DARPA GloMo Program,”

IEEE Personal Communications, 34–43, December 1996.

21. J. Strater and B. Wollman, “OSPF Modeling and Test Results and Recommendations,” Mitre technical report 96W0000017, Xerox Office Products Division, March 1996.

22. C. F. Chiasserini, I. Chlamtac, P. Monti, and A. Nucci, “Optimal Energy Design of Wireless Ad Hoc Networks,”Lecture Notes in Computer Science (LNCS),No. 2345, E. Gregori, M.

Conti, A. T. Campbell, G. Omidyar, and M. Zukerman, (Eds.), 2002.

23. C.-K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems, Prentice Hall PTR, 2002.

24. L. M. Feeney and M. Nilsson, Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment, Swedish Institute of Computer Science, Kista, Sweden.

25. I. Chlamtac, “Issues in Mobile Computing,” Plenary Address, Seventh IEEE International Conference on Personal, Indoor, and Mobile Radio Communications (PIMRC’96), Taiwan, October 1996.

26. J.-C. Chen, K. M. Sivalingam, P. Agrawal, and S. Kishore, “A Comparison of MAC Protocols for Wireless Local Networks Based on Battery Power Consumption,” in Proceedings of IEEE Infocom 1998, San Francisco, CA, March, 1998.

27. L. M. Feeney, “An Energy-consumption Model for Performance Analysis of Routing Proto-cols for Mobile Ad Hoc Networks,” Journal of Mobile Networks and Applications,2001.

28. J.-H. Chang and L. Tassiulas, “Energy Conserving Routing in Wireless Ad-hoc Networks,” in Proceedings of IEEE Infocom 2000,Tel Aviv, Israel, March 2000.

29. P. Gauthier, D. Harada, and M. Stemm, “Reducing Power Consumption for the Next Genera-tion of PDAs: It’s in the Network Interface,” in Proceedings of MoMuC’96,September 1996.

30. I. Chlamtac, C. Petrioli, and J. Redi, “Energy-Conserving Access Protocols for Identification Networks,”IEEE/ACM Transactions on Networking, 7, 1, February 1999.

31. R. Kravets and P. Krishnan, “Power Management Techniques for Mobile Communication,” in Proceedings of MobiCom’98,Dallas, TX, October 1998.

32. P. Krishna, N. H. Vaidya, M. Chatterjee, and D. K. Pradhan, “A Cluster-Based Approach for Routing in Dynamic Networks,” ACM SIGCOMM Computer Communications Review,1997.

33. M. Jiang, J. Li, and Y. C. Tay. “Cluster Based Routing Protocol Functional Specification.” In-ternet Draft, draft-ietf-manet-cbrp-spec.txt. Work-in-progress.

34. I. Chlamtac, C. Petrioli, and J. Redi, “An Energy-Conserving Access Protocol for Wireless Communications,” inIEEE International Conference on Communications, ICC’97,Montreal, Quebec, Canada, June 1997.

35. C.-K. Toh, “Associativity-Based Routing For Ad-Hoc Mobile Networks,” Journal on Wireless Personal Communications, 4, First Quarter, 1997.

REFERENCES 37

36. N. H. Vaidya,Mobile Ad Hoc Networks: Routing, MAC and Transport Issues, Texas A&M University, 2000.

37. I. Chlamtac and S. Pinter, “Distributed Nodes Organization Algorithm for Channel Access in a Multi-Hop Dynamic Radio Network,” IEEE Transactions on Computers, C-36, 6, June 1987.

38. S.-L. Wu, Y.-C. Tseng, and J.-P. Sheu, “Intelligent Medium Access for Mobile Ad Hoc Net-works with Busy Tones and Power Control,” Department of Computer Science and Informa-tion Engineering, NaInforma-tional Central University, Chung-Li, 32054, Taiwan.

39. P. Karn, “MACA—A New Channel Access Method for Packet Radio,” in ARRL/CRRL Ama-teur Radio 9th Computer Networking Conference, pp. 134–140, 1990.

40. V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, “MACAW: A Medium Access Protocol for Wireless LANs,” in Proceedings of SIGCOMM ‘94, pp. 212–225, 1994.

41. C. L. Fullmer and J. Garcia-Luna-Aceves, “Floor Acquisition Multiple Access (FAMA) for Packet-Radio Networks,” in Proceedings of SIGCOMM’95, Nov. 1995.

42. C. R. Lin and M. Gerla, “MACA/PR: An Asynchronous Multimedia Multihop Wireless Net-work,” in Proceedings of IEEE INFOCOM ’97, Apr. 1997.

43. F. Talucci and M. Gerla, “MACA-BI (MACA By Invitation) A Wireless MAC Protocol for High Speed ad hoc Networking,” in Proceedings of ICUPC’97, Nov. 1997.

44. I. Chlamtac and A. Farago, “Making Transmission Schedules Immune to Topology Changes in Multi-Hop Packet Radio Networks,”IEEE/ACM Transactions on Networking, 2, 1, February 1994.

45. Z. J. Hass and J. Deng, “Dual Busy Tone Multiple Access (DBTMA): Performance Evalua-tion,” in49th Annual International Vehicular Technology Conference, Oct. 1998.

46. J. Deng and Z. J. Hass, “Dual Busy Tone Multiple Access (DBTMA): A New Medium Access Control for Packet Radio Networks,” in Proceedings of the IEEE International Conference on Universal Personal Communications, pp. 314–319, 1998.

47. IEEE Std. 802.11-1997: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. Institute of Electrical and Electronics Engineers, Inc., New York, 1997.

48. C. L. Fullmer and J. J. Garcia-Luna-Aceves, “Floor Acquisition Multiple Access for Packet Radio Networks,” inSIGCOMM’95, pp. 262–273, ACM, 1995.

49. J. J. Garcia and C. L. Fullmer, “Performance of Floor Acquisition Multiple Access in Ad-hoc Networks,” in Proceedings of the Third IEEE Symposium on Computers and Communications, pp. 63–68, 1998.

50. S. Khanna, S. Sarkar, I. Shin, An Energy Measurement Based Collision Resolution Protocol, University of Pennsylvania.

51. F. A. Tobagi and L. Kleinrock, “Packet Switching in Radio Channels: Part II—The Hidden Terminal Problem in Carrier Sense Multiple Access Modes and the Busy Tone Solution,”

IEEE Transactions in Communications, 23(12), 1417–1433, 1975.

52. S. Singh and C. S. Raghavendra, “Power Efficient MAC Protocol for Multihop Radio Net-works,” in International Symposium on Personal, Indoor and Mobile Communications, 1998.

53. E. K. Wesel,Wireless Multimedia Communicaions: Networking Video, Voice, and Data, Addi-son-Wesley, 1998.

54. S.-L. Wu, Y.-C. Tseng, and J.-P. Sheu,Intelligent Medium Access for Mobile Ad Hoc Networks with Busy Tones and Power Control, Technical Report NCU-HSCCL-1999-02, Department of Computer Science and Information Engineering, National Central University, May 1999.

55. E. D. Kaplan (Ed.),Understanding GPS: Principles and Applications,Artech House, 1996.

56. J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, “A Performance Comparison of Multihop Wireless Ad Hoc Network Routing Protocols,” inProceedings of the Fourth An-nual ACM/IEEE International Conference on Mobile Computing and Networking (Mobi-Com’98), pp. 85–97, 1998.

57. E. M. Royer and C.-K. Toh, “A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks,”IEEE Personal Communications, April 1999

58. V. D. Park and M. S. Corson, “A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks,” in Proceedings of INFOCOM ‘97, April 1997.

59. C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Computer Communications Review, 234–244, Octo-ber 1994.

60. C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc on-demand distance vector (AODV) rout-ing,” IETF Internet draft, draft-ietf-manet-aodv-11. txt, June 2002.

61. C. E. Perkins and E. M. Royer, “Ad-hoc On-Demand Distance Vector Routing,” in Proceed-ings of 2nd IEEE Workshop on Mobile Computing Systems and Applications, February 1999.

62. L. R. Ford Jr. and D. R. Fulkerson, Flows in Networks,Princeton University Press, 1962.

63. C. -C. Chiang, H. K. Wu, W. Liu, and M. Gerla, “Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel,” in Proceedings of IEEE SICON’97, pp. 197–211, April 1997.

64. S. Murthy and J. J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Net-works,”ACM Mobile Networks and Applications Journal, Special Issue on Routing in Mobile Communication Networks, pp. 183–197, October 1996.

65. D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad-Hoc Wireless Networks, Mo-bile Computing, edited by T. Imielinski and H. Korth, Kluwer Academic Publishers, pp.

153–181, 1996.

66. C.-K. Toh, “A Novel Distributed Routing Protocol to Support Ad-Hoc Mobile Computing,” in Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Com-puters and Communication,pp. 480–486, March 1996.

67. H. Hassanein, Load-Aware Routing in Wireless Ad Hoc Networks, Department of Computing and Information Science, Queens University.

68. R. Droms, “Dynamic host configuration protocol, RFC 2131,” http://www.ietf.org/rfc/

rfc2131.txt, Mar 1997.

69. M. Günes and J. Reibel, “An ip address configuration algorithm for zeroconf. mobile multi-hop ad-hoc networks,” in Proceedings of the International Worksmulti-hop on Broadband Wireless Ad-Hoc Networks and Services, Sophia Antipolis, France, September 2002. ETSI.

70. C. Petrioli, S. Basagni, and I. Chlamtac “Configuring BlueStars: Multihop Scatternet Forma-tion for Bluetooth Networks,” IEEE TransacForma-tions on Computers,(to be published in the June 2003 issue).

71. S. Thomson and T. Narten, “Ipv6 stateless address autoconfiguration,” rfc 2462.

http://www.ietf.org/rfc/rfc2462.txt, December 1998.

72. K. Fall and K. Varadhan. The ns Manual,Nov 2000.

73. M. Günes and O. Spaniol, Routing Algorithms for Mobile Multi-Hop Ad-Hoc Networks, 74. P. Jacquet, P. Muhlethaler, and A. Qayyum, “Optimized Link State Routing Protocol,” Internet

Draft, draft-ietf-manet-olsr-00.txt, November 1998.

75. G. Pei, M. Gerla, and T.-W. Chen. “Fisheye State Routing in Mobile Ad Hoc Networks,” in Proceedings of the 2000 ICDCS Workshops,pp. D71–D78, Taipei, Taiwan, April 2000.

76. L. Kleinrock and K. Stevens, “Fisheye: A Lenslike Computer Display Transformation,” Tech-nical Report, UCLA, Computer Science Department, 1971.

77. G. Pei, M. Gerla, and X. Hong, “LANMAR: Landmark Routing for Large Scale Wireless Ad Hoc Networks with Group Mobility,” in Proceedings of IEEE/ACM MobiHOC 2000, pp.

11–18, Boston, MA, August 2000.

78. P. F. Tsuchiya, “The Landmark Hierarchy: A New Hierarchy for Routing in Very Large Net-works,” Computer Communications Review, 18, 4, 35–42, August 1988.

REFERENCES 39

79. T.-W. Chen and M. Gerla, “Global State Routing: A New Routing Scheme for Ad-hoc Wire-less Networks,” in Proceedings of IEEE ICC’98, http://www.ics.uci.edu/~atm/adhoc/paper-collection/gerla-gsr-icc98.pdf.

80. Z. J. Haas and M. R. Pearlman, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks,”

November 1997.

81. M. Joa-Ng and I.-T. Lu, “A Peer-to-Peer Zone-Based Two-Level Link State Routing for Mo-bile Ad Hoc Networks,” IEEE Journal on Selected Areas in Communications, Special Issue on Ad-Hoc Networks, Aug. 1999, 1415–1425.

82. A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, and T.-W. Chen, “Scalable Routing Strategies for Ad Hoc Wireless Networks,” IEEE Journal on Selected Areas in Communications, Special Issue on Ad-Hoc Networks, Aug. 1999, 1369–1379.

83. Mingliang J. and Jinyang Li, Y. C. Tay, “Cluster Based Routing Protocol,” August 1999, IETF Draft, http://www.ietf.org/internet-drafts/draft-ietf-manet-cbrp-spec-01.txt

84. R. Dube et al., “Signal Stability Based Adaptive routing for Ad Hoc Mobile Networks,” IEEE Personal Communications, Feb. 1997, pp. 36–45.

85. V. D. Park and M. S. Corson, “A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks,” in Proceedings of INFOCOM’97,Apr. 1997.

86. P. Kuosmanen, “Classification of Ad Hoc Routing Protocols,” Finnish Defence Forces, Naval Academy, Finland, petteri.kuosmanen@mil.fi.

87. S. Basagni, I. Chlamtac, V. R. Syrotiuk, and B. A. Woodward, “A Distance Routing Effect Al-gorithm for Mobility (DREAM),” in Proceedings of the Fourth Annual ACM/IEEE Interna-tional Conference on Mobile Computing and Networking, MobiC’98,Dallas, TX, October, 1998.

88. E. L. Madruga, J. J. Garcia-Luna-Aceves, “Scalable Multicasting: The Core-Assisted Mesh Protocol,” 1999.

89. M. W. Subbarao, “Dynamic Power-Conscious Routing for MANETs: An Initial Approach,” in Proceedings of IEEE VTC Fall 1999, Amsterdam, The Netherlands, 1999.

90. I. Chlamtac and O. Weinstein, “The Wave Expansion Approach to Broadcasting in Multi-Hop Radio Networks,” in Proceedings of IEEE INFOCOM, San Francisco, California, April 1987.

91. M. W. Subbarao, “Mobile Ad Hoc Data Networks for Emergency Preparedness Telecommuni-cations—Dynamic Power-Conscious Routing Concepts,” 2000.

92. Chlamtac and S. Kutten, “On Broadcasting in Radio Networks—Problem Analysis and Proto-col Design,” IEEE Transactions on Communications, COM-33, 12, December 1985.

93. R. Sivakumar, P. Sinha, and V. Bharghavan, “CEDAR: a Core-Extraction Distributed Ad hoc Routing Algorithm,” IEEE Journal on Selected Areas in Communications, 17, 8, August 1999.

94. S. Basagni, I. Chlamtac, and A. V. R. Syrotiuk, “Location Aware One-to-Many Communica-tion in Mobile Multi-hop Wireless Networks,” in Proceedings of IEEE Vehicular Technology Conference (VTC), Tokyo, Japan, May 2000.

95. L. M. Feeney, “A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks,” SICS Tech-nical Report T99/07, October 1999, http://www.sics.se/~lmfeeney/research.html.

96. M. W. Subbarao, Ad Hoc Networking Critical Features and Performance Metrics,” 1999.

97. M. S. Corson and J. Macker, “Mobile Ad Hoc Networking (MANET): Routing Protocol Per-formance Issues and Evaluation Considerations,” RFC 2501, IETF,January 1999.

98. R. de Oliveira and O. Braun, “TCP in Wireless Mobile Ad Hoc Networks,” Technical Report, IAM-02-003, July 2002

99. N. H. Vaidya, “TCP for Wireless and Mobile Hosts,”MobiCom’99 Tutorial,Texas A&M Uni-versity, 1999

100. H. Balakrishnan, V. Padmanabhan, and R. Katz, “The Effects of Asymmetry on TCP

Perfor-mance,” in Proceedings of Third ACM/IEEE Mobicom Conference, Budapest, Hungary, Sep-tember 1997.

101. D. Sun and H. Man, “Performance Comparison of Transport Control Protocols over Mobile Ad Hoc Networks.”

102. G. Holland and N. H. Vaidya, “Analysis of TCP performance over Mobile Ad Hoc Networks,”

in International Conference on Mobile Computing and Networking (MOBICOM), August 1999.

103. F. Wang and Y. Zhang, “Improving TCP Performance over Mobile Ad-Hoc Networks with Out-of-Order Detection and Response.”

104. M. Gerla, K. Tang, and R. Bagrodia, “TCP Performance in Wireless Multi-Hop Networks,” in Proceedings of IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 41–50, February 1999.

105. M. Gerla, R. Bagrodia, L. Zhang, K. Tang, and L. Wang, TCP over Wireless Multi-Hop Proto-cols: Simulation and Experiments,Computer Science Department, University of California at Los Angeles

106. Z. Fu, P. Zerfos, K. Xu, H. Luo, S. Lu, L. Zhang, and M. Gerla, “On TCP Performance in Mul-tihop Wireless Networks,” in Proceedings of InfoCom, 2003.

107. N. Vaidya, M. Mehta, C. Perkins, and G. Montenegro, “Delayed Duplicate Acknowledge-ments: A TCP-Unaware Approach to Improve Performance of TCP Over Wireless,” Tech. Rep.

99-003, Computer Science Department, Texas A&M University, February 1999.

108. A. Bakre and B. Badrinath, “I-TCP: Indirect TCP for Mobile Hosts,” in Proceedings of 15th International Conference on Distributed Computing Systems (ICDCS), pp. 136–143, May

108. A. Bakre and B. Badrinath, “I-TCP: Indirect TCP for Mobile Hosts,” in Proceedings of 15th International Conference on Distributed Computing Systems (ICDCS), pp. 136–143, May

Dans le document MOBILE AD HOC NETWORKING (Page 53-66)