Ad Hoc Mobile Wireless Networks Principles Protocols and Applications 2nd Edition by Subir Kumar Sarkar, TG Basavaraju, C Puttamadappa – Ebook PDF Instant Download/Delivery: 1466514469, 9781466514461
Full download Ad Hoc Mobile Wireless Networks Principles Protocols and Applications 2nd Edition after payment

Product details:
ISBN 10: 1466514469
ISBN 13: 9781466514461
Author: Subir Kumar Sarkar, TG Basavaraju, C Puttamadappa
The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems.
Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of service and energy management systems. Additional chapters cover mobility models for multi-hop ad hoc wireless networks as well as cross-layer design issues.
Exploring Bluetooth, IrDA (Infrared Data Association), HomeRF, WiFi, WiMax, Wireless Internet, and Mobile IP, the book contains appropriate examples and problems at the end of each chapter to illustrate each concept. This second edition has been completely updated with the latest technology and includes a new chapter on recent developments in the field, including sensor networks, personal area networks (PANs), smart dress, and vehicular ad hoc networks.
Self-organized, self-configured, and self-controlled, ad hoc mobile wireless networks will continue to be valued for a range of applications, as they can be set up and deployed anywhere and anytime. This volume captures the current state of the field as well as upcoming challenges awaiting researchers.
Ad Hoc Mobile Wireless Networks Principles Protocols and Applications 2nd Table of contents:
Chapter 1 Introduction
1.1 Fundamentals of Wireless Networks
1.1.1 Bluetooth
1.1.2 IrDA
1.1.2.1 Comparison of Bluetooth and IrDA
1.1.3 HomeRF
1.1.3.1 Comparison of Bluetooth with Shared Wireless Access Protocol (SWAP)
1.1.4 IEEE 802.11 (WiFi)
1.1.5 IEEE 802.16 (WiMAX)
1.1.6 Hotspots
1.1.6.1 Requirements to Use Wi-Fi Hotspots
1.1.6.2 Finding Wi-Fi Hotspots
1.1.6.3 Connection to Wi-Fi Hotspots
1.1.6.4 Dangers of Wi-Fi Hotspots
1.1.7 Mesh Networking
1.1.7.1 Limitation of Wireless Technology
1.2 Wireless Internet
1.2.1 IP Limitations
1.2.2 Mobile Internet Protocol (IP)
1.2.2.1 Working of Mobile IP
1.2.3 Discovering the Care-of Address
1.2.4 Registering the Care-of Address
1.2.5 Authentication
1.2.6 Automatic Home Agent Discovery
1.2.7 Tunneling to the Care-of Address
1.2.8 Issues in Mobile IP
1.2.8.1 Routing Inefficiencies
1.2.8.2 Security Issues
1.2.8.3 Ingress Filtering
1.2.8.4 User Perceptions of Reliability
1.2.8.5 Issues in IP Addressing
1.2.8.6 Slow Growth in the Wireless Local Area Network (WLAN) Market
1.2.8.7 Competition from Other Protocols
1.3 What Are Ad Hoc Networks?
1.3.1 Difference between Cellular and Ad Hoc Wireless Networks
1.3.2 Applications of Ad Hoc Wireless Networks
1.3.3 Technical and Research Challenges
1.3.3.1 Security Issues and Challenges
1.3.3.2 Different Types of Attacks on Multicast Routing Protocols
1.3.3.2.1 Rushing Attack
1.3.3.2.2 Black Hole Attack
1.3.3.2.3 Neighbor Attack
1.3.3.2.4 Jellyfish Attack
1.3.3.3 Interconnection of Mobile Ad Hoc Networks and the Internet
1.3.4 Issues in Ad Hoc Wireless Networks
1.3.4.1 Medium Access Control (MAC) Protocol Research Issues
1.3.4.2 Networking Issues
1.3.4.3 Ad Hoc Routing and Forwarding
1.3.4.4 Unicast Routing
1.3.4.4.1 Proactive Routing Protocols
1.3.4.4.2 Reactive Routing Protocols
1.3.4.4.3 Hybrid Protocols
1.3.4.4.4 Multicast Routing
1.3.4.5 Location-Aware Routing
1.3.4.6 Transmission Control Protocol (TCP) Issues
1.3.4.7 Network Security
1.3.4.8 Different Security Attacks
1.3.4.8.1 Attacks Using Fabrication
1.3.4.9 Security at Data-Link Layer
1.3.4.10 Secure Routing
1.3.4.11 Quality of Service (QoS)
1.3.4.12 Simulation of Wireless Ad Hoc Networks
Problems
Bibliography
Chapter 2 MAC Layer Protocols
2.1 Introduction
2.2 Important Issues and Need for Medium Access Control (MAC) Protocols
2.2.1 Need for Special MAC Protocols
2.3 Classification of MAC Protocols
2.3.1 Contention-Based MAC Protocols
2.3.2 Contention-Based MAC Protocols with Reservation Mechanisms
2.3.2.1 Multiple Access Collision Avoidance (MACA)
2.3.2.1.1 Applications for MACA
2.3.2.1.2 Weaknesses of MACA
2.3.2.1.3 Wireless (MACAW)
2.3.2.1.4 Floor Acquisition Multiple Access (FAMA)
2.3.2.2 IEEE 802.11 MAC Scheme
2.3.2.3 Multiple Access Collision Avoidance by Invitation (MACA-BI)
2.3.2.4 Group Allocation Multiple Access with Packet Sensing (GAMA-PS)
2.3.3 MAC Protocols Using Directional Antennas
2.3.4 Multiple-Channel MAC Protocols
2.3.4.1 Dual Busy Tone Multiple Access (DBTMA)
2.3.4.2 Multichannel Carrier Sense Multiple Access (CSMA) MAC Protocol
2.3.4.3 Hop-Reservation Multiple Access (HRMA)
2.3.4.4 Multichannel Medium Access Control (MMAC)
2.3.4.5 Dynamic Channel Assignment with Power Control (DCA-PC)
2.3.5 Power-Aware or Energy-Efficient MAC Protocols
2.3.5.1 Power-Aware Medium Access Control with Signaling (PAMAS)
2.3.5.2 Dynamic Power-Saving Mechanism (DPSM)
2.3.5.3 Power-Control Medium Access Control (PCM)
2.3.5.4 Power-Controlled Multiple Access (PCMA)
2.4 Summary
Problems
References
Bibliography
Chapter 3 Routing Protocols
3.1 Introduction
3.2 Design Issues of Routing Protocols for Ad Hoc Networks
3.2.1 Routing Architecture
3.2.2 Unidirectional Links Support
3.2.3 Usage of Superhosts
3.2.4 Quality of Service (QoS) Routing
3.2.5 Multicast Support
3.3 Classification of Routing Protocols
3.3.1 Proactive, Reactive, and Hybrid Routing
3.3.2 Structuring and Delegating the Routing Task
3.3.3 Exploiting Network Metrics for Routing
3.3.4 Evaluating Topology, Destination, and Location for Routing
3.4 Proactive Routing Protocols
3.4.1 Wireless Routing Protocol (WRP)
3.4.1.1 Overview
3.4.1.2 Information Maintained at Each Node
3.4.1.3 Information Exchanged among Nodes
3.4.1.4 Routing-Table Updating
3.4.2 Destination-Sequence Distance Vector (DSDV)
3.4.3 Fisheye State Routing (FSR)
3.4.4 Ad Hoc On-Demand Distance Vector (AODV)
3.4.4.1 Path Discovery
3.4.4.2 Reverse Path Setup
3.4.4.3 Forward Path Setup
3.4.4.4 Route Table Management
3.4.4.5 Path Maintenance
3.4.4.6 Local Connectivity Management
3.4.5 Dynamic Source Routing (DSR) Protocol
3.4.5.1 Overview and Important Properties of the Protocol
3.4.5.2 Basic DSR Route Discovery
3.4.5.3 Basic DSR Route Maintenance
3.4.6 Temporally Ordered Routing Algorithm (TORA)
3.4.7 Cluster-Based Routing Protocol (CBRP)
3.4.8 Location-Aided Routing (LAR)
3.4.8.1 Route Discovery Using Flooding
3.4.9 Ant-Colony-Based Routing Algorithm (ARA)
3.4.9.1 Basic Ant Algorithm
3.5 Hybrid Routing Protocols
3.5.1 Zone Routing Protocol (ZRP)
3.5.1.1 Motivation
3.5.1.2 Architecture
3.5.1.3 Routing
3.5.1.4 Route Maintenance
3.5.2 Zone-Based Hierarchical Link State (ZHLS)
3.5.2.1 Zone Map
3.5.2.2 Hierarchical Structure of ZHLS
3.5.3 Distributed Dynamic Routing (DDR) Protocol
3.6 Summary
Problems
Bibliography
Chapter 4 Multicast Routing Protocols
4.1 Introduction
4.2 Issues in Design of Multicast Routing Protocols
4.3 Classification of Multicast Routing Protocols
4.3.1 Tree-Based Multicast Routing Protocols
4.3.1.1 Source Tree-Based Multicast Protocols
4.3.1.2 Minimum Hop-Based Multicast Protocols
4.3.1.3 Minimum Link-Based Multicast Protocols
4.3.1.4 Stability-Based Multicast Protocols
4.3.1.5 Multicast Zone-Based Routing Protocol (MZRP)
4.3.1.5.1 Extension of the Multicast Tree to the Entire Network
4.3.1.5.2 Zone and Multicast Tree Maintenance
4.3.1.6 Shared Tree-Based Multicast Protocols
4.3.1.7 Session-Specific Ad Hoc Multicast Routing Protocol Utilizing Increasing ID Numbers (AMRIS
People also search for Ad Hoc Mobile Wireless Networks Principles Protocols and Applications 2nd:
ad hoc mobile wireless networks principles protocols and applications
ad hoc wireless network definition
ad hoc wireless
ad hoc mode wifi
ad hoc wireless lan
Tags: Subir Kumar Sarkar, TG Basavaraju, C Puttamadappa, Mobile Wireless


