• Aucun résultat trouvé

[PDF] Top 20 Performance Evaluation of Packet Relaying in Ad Hoc Networks

Has 10000 "Performance Evaluation of Packet Relaying in Ad Hoc Networks" found on our website. Below are the top 20 most common "Performance Evaluation of Packet Relaying in Ad Hoc Networks".

Performance Evaluation of Packet Relaying in Ad Hoc Networks

Performance Evaluation of Packet Relaying in Ad Hoc Networks

... most of the studies of scaling laws of delay and throughput in wireless MANETs assume a uniform spatial distribution of nodes, which is the case, for example, when the nodes perform a ... Voir le document complet

28

Authentication and consensus overhead in vehicular ad hoc networks

Authentication and consensus overhead in vehicular ad hoc networks

... vehicular ad hoc networks is based on the ECDSA algorithm for supporting authentication mecha- ...the performance of the V2V communications, and hence that of the safety ... Voir le document complet

15

A Cross-layer Framework for Multiobjective Performance Evaluation of Wireless Ad Hoc Networks

A Cross-layer Framework for Multiobjective Performance Evaluation of Wireless Ad Hoc Networks

... relevant in the context of a practical two dimensional ...mance evaluation of multiple ...approach in the context of routing design for wireless sensor networks has been ... Voir le document complet

27

Cooperative Communications in Ad Hoc Networks

Cooperative Communications in Ad Hoc Networks

... Issues in Cooperative Protocols The first challenge concerns the medium access method in distributed ...the performance of the whole distributed network (the packet delivery rations, ... Voir le document complet

185

Simulation and Performance Analysis of MP-OLSR for Mobile Ad hoc Networks

Simulation and Performance Analysis of MP-OLSR for Mobile Ad hoc Networks

... Because of the overlapping radio-coverage of neighbor nodes and that the limitation of the MAC protocol can result in strong interdependence between multi-routes, the multipath protocol ... Voir le document complet

7

Global visualization of experiments in ad hoc networks

Global visualization of experiments in ad hoc networks

... works of [8, 9, 13] aim at depicting the behaviour of some particular routing (DSR for [8, 9] and ABR for ...deployment of scenarios on real ad hoc ...the evaluation of ... Voir le document complet

18

Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks

Authentication protocol runtime evaluation in distributed AAA framework for mobile ad-hoc networks

... ORKS In this paper, we analyzed the runtime resulting from the authentication of a joining node by a distributed AAA framework within a mobile ad-hoc ...number of servers rises and as ... Voir le document complet

6

Proximity aware routing in ad hoc networks

Proximity aware routing in ad hoc networks

... Most of the existing routing protocols for ad hoc networks are designed to scale in networks of a few hundred ...links of the network or links on the route between ... Voir le document complet

8

Performance Study of an Overlay Approach to Active Routing in Ad Hoc Networks

Performance Study of an Overlay Approach to Active Routing in Ad Hoc Networks

... goals: In our reactive approach of active routing, there is no neighbour probe before a route is ...probability of finding a route composed uniquely of active nodes is high, it is sufficient ... Voir le document complet

12

Congestion Control in Vehicular Ad Hoc Networks

Congestion Control in Vehicular Ad Hoc Networks

... Department of Computer Engineering, Polytechnique de Montréal, Montreal, Canada Abstract Vehicular Ad Hoc Networks (VANets) is considered as a technology which can increase safety and ... Voir le document complet

173

Authentication services in mobile ad hoc networks

Authentication services in mobile ad hoc networks

... vulnerabilities of the package to use in order to implement basic security mechanism that can ensure the isolation and protection of the host environment and guest ...machines. In the case ... Voir le document complet

42

Routing and Broadcasting in Hybrid Ad Hoc Networks

Routing and Broadcasting in Hybrid Ad Hoc Networks

... Hybrid ad hoc networks consist of two kinds of nodes, regular nodes and nodes with additional ...Internet networks consist of static or mobile nodes and access points to a ... Voir le document complet

18

Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network

Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network

... RREQ packet. All nodes receiving this packet update their information for the source node and maintain only the next hop’s address in a routing ...RREQ packet contains the source node’s ... Voir le document complet

11

Performance Evaluation of Broadcasting Protocols for Ad Hoc and Sensor Networks

Performance Evaluation of Broadcasting Protocols for Ad Hoc and Sensor Networks

... neighbor of u. The rule 1 becomes: if it has the smallest id in its neighborhood and it has at least 2 unconnected ...neighbors. In [2], Basagni et al. proposed a performance comparison ... Voir le document complet

18

Efficient packet transmission in wireless ad hoc networks with partially informed nodes

Efficient packet transmission in wireless ad hoc networks with partially informed nodes

... lie in discrete sets (of states): H i = H  i = H = {h min , ...izations of each channel gain will be assumed to be ...done in the information theory literature for estab- lishing coding ... Voir le document complet

20

A Cross-layer Framework for Multiobjective Performance Evaluation of Wireless Ad Hoc Networks

A Cross-layer Framework for Multiobjective Performance Evaluation of Wireless Ad Hoc Networks

... global performance mapping’’ for practical rout- ing protocol ...identification of Pareto optimal solutions provides not only achievable performance bounds, but also specific solution sets for the ... Voir le document complet

26

Authentication and consensus overhead in vehicular ad hoc networks

Authentication and consensus overhead in vehicular ad hoc networks

... vehicular ad hoc networks is based on the ECDSA algorithm for supporting authentication mecha- ...the performance of the V2V communications, and hence that of the safety ... Voir le document complet

16

CONNECTION TIMES IN LARGE AD-HOC MOBILE NETWORKS

CONNECTION TIMES IN LARGE AD-HOC MOBILE NETWORKS

... one of the most decisive quantities in such a system, since it measures the quality of the entire system by means of two sample ...regime in which we will be working is the limit ... Voir le document complet

28

Service Provision in Disconnected Mobile Ad Hoc Networks

Service Provision in Disconnected Mobile Ad Hoc Networks

... sum of the content, is expected to help node in the content-based ...management. In both service response and service advertisement, the md5 sum of the request as- sociated with the response ... Voir le document complet

7

Ad Hoc Mobility Notification in Wireless Infrastructure Networks

Ad Hoc Mobility Notification in Wireless Infrastructure Networks

... and ad hoc networking have been recently increasing [ 5 , 26 , 6 , 13 , 2 , 23 , 7 ...Hybrid networks, the extension of cellular network using ad hoc connectivity, offer obvious ... Voir le document complet

32

Show all 10000 documents...