Filters








81,499 Hits in 7.6 sec

Accelerating Service Discovery in Ad-Hoc Zero Configuration Networking

Se Gi Hong, Suman Srinivasan, Henning Schulzrinne
2007 IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference  
In highly mobile networks, Zeroconf causes network overhead while discovering new services. In this paper, we propose an algorithm to accelerate service discovery for mobile ad-hoc networks.  ...  Zeroconf can be used in wireless mobile ad-hoc networks which are based on IEEE 802.11 and IP.  ...  For these reasons, mobile ad-hoc networks require Zero Configuration Networking (Zeroconf) [1] .  ... 
doi:10.1109/glocom.2007.185 dblp:conf/globecom/HongSS07 fatcat:qtwoifxxuncnlpgc7o7a7jyp4u

Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment

Dewan Tanvir Ahmed, Shervin Shirmohammadi
2007 Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)  
In this paper, we address these issues and propose a peer-to-peer system for wireless ad-hoc networks using multi-level hashing to reduce routing overhead.  ...  Peer-to-peer is a popular distributed system. With the advancement in mobile technologies, mobile p2p has revealed its attraction.  ...  There are many routing algorithms for mobile ad hoc networks.  ... 
doi:10.1109/percomw.2007.82 dblp:conf/percom/AhmedS07 fatcat:huxjlavnmfdktivhewazhmp3sa

Security for QoS assured wireless and mobile networks

M. Cesana, A. Boukerche, A. Zomaya
2010 Security and Communication Networks  
The first two papers in the batch focus on security solutions for Wireless Mesh Networks (WMNs); namely, the first one, DSA-Mesh: a Distributed Security Architecture for WMNs, proposes a fully distributed  ...  wireless ad hoc networks, by analyzing the network-wide impact of greedy behaviors of single wireless nodes.  ...  He served as a guest edi-tor for the Journal of Parallel and Distributed Computing (JPDC) (Special Issue for routing for mobile ad hoc, Special Issue for wireless communication and mobile computing, Special  ... 
doi:10.1002/sec.201 fatcat:nlt4di4iv5e43izj4nnty4f7bq

Design and implementation of a single system image operating system for ad hoc networks

Hongzhou Liu, Tom Roeder, Kevin Walsh, Rimon Barr, Emin Gün Sirer
2005 Proceedings of the 3rd international conference on Mobile systems, applications, and services - MobiSys '05  
In this paper, we describe the design and implementation of a distributed operating system for ad hoc networks.  ...  Efficiency: The system should execute distributed ad hoc network applications in a manner that conserves power and extends system lifetime.  ...  This distributed system defines a convenient programming model for ad hoc networks.  ... 
doi:10.1145/1067170.1067187 dblp:conf/mobisys/LiuRWBS05 fatcat:louevdu2abfynipeepflrjt63i

Power Control in Ad Hoc Networks [chapter]

Muhammad Mazhar, Hasan Mahmoo
2011 Mobile Ad-Hoc Networks: Applications  
Networks Mobile Ad-Hoc Networks: Applicationswww.intechopen.comPower Control in Ad Hoc Networks  ...  Power Control in Ad Hoc Networkswww.intechopen.com 497 Power Control in Ad Hoc Networkswww.intechopen.com 507 Mobile Ad-Hoc Networks: Applicationswww.intechopen.comPower Control in Ad Hoc  ...  Power Control in Ad Hoc Networks, Mobile Ad-Hoc Networks: Applications, Prof.  ... 
doi:10.5772/13074 fatcat:rybys547g5exrlylbh3jnl3bga

On Demand Network Level Service Deployment in Ad Hoc Networks [chapter]

Daniel Prince, Andrew Scott, W. D. Shepherd
2003 Lecture Notes in Computer Science  
Many network level services such as routing, auto-addressing and, security have been proposed for ad hoc networks.  ...  Furthermore, since ad hoc network groups may be mobile it is probable that networks operating different or varying service implementations will interact.  ...  Introduction The demand for ad hoc network technology is growing as computing becomes increasingly pervasive and mobile.  ... 
doi:10.1007/978-3-540-39867-7_74 fatcat:4ot3x3ywv5cvbas673zhneev2u

MAGNET: ad hoc network system based on mobile agents

N Kawaguchi, K Toyama, Y Inagaki
2000 Computer Communications  
This paper proposes an ad-hoc network system based on mobile agents. We regard some special mobile agent as an implementation of the network protocol.  ...  We also describe the implementation of the ad hoc network protocol DSR using our prototype system MAGNET which is based on the framework.  ...  We had tried to develop a distributed communication protocol for infrared ad hoc networks [12] .  ... 
doi:10.1016/s0140-3664(99)00236-4 fatcat:5bsmyop76rayjclifvtvl2t65a

MONET Special Issue on Towards Future Ad Hoc Networks: Technologies and Applications (I)

Jun Zheng, Wei Xiang, Pascal Lorenz, Shiwen Mao
2020 Journal on spesial topics in mobile networks and applications  
However, the distributed and multi-hop nature of ad hoc networking as well as the highly dynamic topology of ad hoc networks due to node mobility have presented many formidable technical challenges, such  ...  Ad hoc networks cover a variety of paradigms such as mobile ad hoc networks (MANETs), wireless sensor networks (WSNs), vehicular ad hoc networks (VANETs), underwater networks, airborne networks, underground  ...  However, the distributed and multi-hop nature of ad hoc networking as well as the highly dynamic topology of ad hoc networks due to node mobility have presented many formidable technical challenges, such  ... 
doi:10.1007/s11036-019-01494-2 fatcat:s2umjt23tfdgtphi7unaqfhzsi

A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET

R. Arunkumar, A. Annalakshmi
2014 International Journal of Computer Applications  
A Mobile Ad-hoc Network (MANET) is a mobile and multihop autonomous operation of wireless network.  ...  General Terms Enhanced Adaptive ACKnowledgment; Vehicular Ad-hoc Network; k-Nearest Neighbors.  ...  Acknowledgments I am indebted to my (PhD) guide Mrs.A.Annalakshmi for giving me an insight on intrusion detection systems.  ... 
doi:10.5120/14859-3230 fatcat:fngee26phfeo7dmxbnu24mouli

Mobile Ad Hoc Network Security Issues

Tejashree Kokate, Ram Joshi
2014 International Journal of Computer Applications  
General Terms Network security, security issues in mobile ad hoc network, securing MANETs, vehicular communication system, vehicle to vehicle communication using MANETs, dynamic network security Keywords  ...  This paper studies mobile Ad hoc network technology uses and how it can be used in real life applications.  ...  Challenges for MANETs Mobile ad hoc networks face challenges when compared to wireless networks due following reasons [9] : 1.  ... 
doi:10.5120/18993-0447 fatcat:zzropb2y6zhz3hacwugsmkoq7e

TMACS: Type-based Distributed Middleware for Mobile Ad-hoc Networks

Jinsong Lin, Eusden Shing, Wing-Kai Chan, Rajive Bagrodia
2008 Proceedings of the 5th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services  
This paper presents the design and implementation of TMACS -a distributed middleware framework for Mobile Ad-hoc Network (MANETs).  ...  We present results from a selected set of applications and services that include an ad-hoc distributed caching service and an ad-hoc marketplace application.  ...  Intentional Naming[1] is a naming system targeted for mobile systems.  ... 
doi:10.4108/icst.mobiquitous2008.3512 dblp:conf/mobiquitous/LinSCB08 fatcat:j5ju2z2j35ffpapuaubftbekum

Improvement of Service Discovery Algorithm Using Tree-based Architecture in Ad-hoc Grid Environment

Maysam Hedayati
2013 Advances in Networks  
Grid computing is a new technology that using communication infrastructure facilities of computer networks and distributed systems features are able to connect to heterogeneous computing resources, so  ...  We'll show that having a directory in ad hoc gird network isn't useful, so we need to have a set of directories.  ...  Intentional Naming System is a resource discovery and service location technology developed by the MIT Laboratory of Computer Sciences [12] , suitable for mobile devices and ad-hoc networks.  ... 
doi:10.11648/j.net.20130101.12 fatcat:fjm76yhqe5godd47spri5uerru

Intelligent agents based trusted revocation for securing clustering MANETS

A. Aranganathan, C.D. Suriyakala
2018 APTIKOM Journal on Computer Science and Information Technologies  
To avoid this problem of entering malicious node in networks and non-secured data, agents based trusted revocation in clustering mobile ad-hoc network for improving security with Certificate Authority  ...  Mobile Ad-hoc Network is a non-secure wireless network which has no infrastructure, dynamical topology in which the nodes can move anywhere, may join or leave the network through multi-hop communication  ...  Acknoledgements The researchers are grateful to SATHYABAMA UNIVERSITY for supporting this work.  ... 
doi:10.11591/aptikom.j.csit.79 fatcat:rgwudma3rfegzkqxdhmfx64nq4

TOWARD A NEW AD HOC NODE DESIGN FOR SECURE SERVICE DEPLOYMENT OVER AD HOC NETWORK

HAKIMA CHAOUCHI, MARYLINE LAURENT-MAKNAVICIUS
2008 Mobile and Wireless Networks Security  
In this paper, we propose a secured architecture over ad hoc network based on the AAA concept (Authentication, Authorisation, Accounting), and a new ad hoc nodes design for any kind of ad hoc nodes to  ...  Security in ad hoc networks is a major issue when it comes to real deployment of services over this sort of networks.  ...  AAAARCH is also trying to build a general architecture for AAA systems. Mobile Ad Hoc networking (MANET) brings new challenges to providing the AAA functionality.  ... 
doi:10.1142/9789812833266_0001 fatcat:adfx25p4rjcyjem5ts36xykbvi

A Novel Approach of Service Discovery Based on Tree Di-Rectory Architecture in Ad-Hoc Grid

Maysam Hedayati
2013 Advances in Networks  
Grid computing is a new technology that using communication infrastructure facilities of computer networks and distributed systems features are able to connect to heterogeneous computing resources, so  ...  We'll show that having a directory in ad hoc gird network isn't useful, so we need to have a set of directories.  ...  Intentional Naming System is a resource discovery and service location technology developed by the MIT Laboratory of Computer Sciences [12] , suitable for mobile devices and ad-hoc networks.  ... 
doi:10.11648/j.net.20130101.11 fatcat:4mpfylcq6zctnopd32ug6pjl54
« Previous Showing results 1 — 15 out of 81,499 results