Dynamic Path construction in Multi-Hop Wireless Networks
نویسندگان
چکیده
منابع مشابه
Opportunistic Any-Path Forwarding in Multi-Hop Wireless Mesh Networks
Routing protocols for multi-hop wireless networks have traditionally focused on finding the best path for forwarding packets between a pair of nodes. While such single-path forwarding is suitable for wired networks with relatively stable point-topoint links, it is not an ideal approach for wireless networks with broadcast links of time varying qualities. Opportunistic routing schemes, which exp...
متن کاملDynamic Multi-Frequency, Multi-Hop Wireless Cellular Networks
Multi-hop relaying in cellular networks can greatly increase capacity and performance by exploiting the best available relay links to a base station. We envision an environment in which relay networks are dynamically formed when performance on the radio access network is degraded and then dissolved when the performance improves or the radio spectrum on which the relay network is operating is re...
متن کاملChannelization for dynamic multi-frequency, multi-hop wireless cellular networks
Multi-hop relaying in cellular networks can greatly increase capacity and performance by exploiting the best available links to a base station. We envision an environment in which relay networks are dynamically formed when performance on the radio access network is degraded and then dissolved when the performance improves or the radio spectrum on which the relay network is operating is reclaime...
متن کاملDynamic Join Optimization in Multi-Hop Wireless Sensor Networks
To enable smart environments and self-tuning data centers, we are developing the Aspen system for integrating physical sensor data, as well as stream data coming from machine logical state, and database or Web data from the Internet. A key component of this system is a query processor optimized for limitedbandwidth, possibly battery-powered devices with multiple hop wireless radio communication...
متن کاملA multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks
0140-3664/$ see front matter 2010 Elsevier B.V. A doi:10.1016/j.comcom.2010.03.006 * Corresponding author. Tel.: +82 31 290 7221; fax E-mail addresses: [email protected] (T.P. Ng (T.H. Cho). A compromised node can generate a fabricated report, which results in false alarms, information loss, and a waste of precious network energy. An interleaved hop-by-hop authentication (IHA) scheme has be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Asia-pacific Journal of Convergent Research Interchange
سال: 2016
ISSN: 2508-9080
DOI: 10.21742/apjcri.2016.06.03