Applications and Future Trends in Mobile Ad Hoc Networks

Applications and Future Trends in Mobile Ad Hoc Networks

Subhankar Dhar (San Jose University, USA)
DOI: 10.4018/978-1-59904-274-9.ch011
OnDemand PDF Download:
$37.50

Abstract

This chapter presents the current state of the art of mobile ad hoc network and some important problems and challenges related to routing, power management, location management, security as well as multimedia over ad hoc networks. A mobile ad hoc network (MANET) is a temporary, self-organizing network of wireless mobile nodes without the support of any existing infrastructure that may be readily available on the conventional networks. Since there is no fixed infrastructure available for MANET with nodes being mobile, routing becomes a very important issue. In addition, we also explain the various emerging applications and future trends of MANET.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Preface
Jairo Gutierrez
Chapter 1
Varadharajan Sridhar, June Park
Survivability, also known as terminal reliability, refers to keeping at least one path between specified network nodes so that some or all of... Sample PDF
Design of High Capacity Survivable Networks
$37.50
Chapter 2
Mohamed Hammami, Youssef Chahir, Liming Chen
Along with the ever growing Web is the proliferation of objectionable content, such as sex, violence, racism, and so forth. We need efficient tools... Sample PDF
A Data Mining Driven Approach for Web Classification and Filtering Based on Multimodal Content Analysis
$37.50
Chapter 3
Bryan Houliston, Nurul Sarkar
Wi-Fi (also known as IEEE 802.11b) networks are gaining widespread popularity as wireless local area networks (WLANs) due to their simplicity in... Sample PDF
Wi-Fi Deployment in Large New Zealand Organizations: A Survey
$37.50
Chapter 4
Kevin Curran, Noel Broderick
Over the years the number of Web users has increased dramatically unfortunately leading to the inherent problem of congestion. This can affect each... Sample PDF
Prevalent Factors Involved in Delays Associated with Page Downloads
$37.50
Chapter 5
Ted Chia-Han Lo, Jairo Gutiérrez
The research reported in this chapter studied the relevance of the application of network quality of service (QoS) technologies for modern... Sample PDF
Network Quality of Service for Enterprise Resource Planning Systems: A Case Study Approach
$37.50
Chapter 6
César García-Díaz, Fernando Beltrán
Congestion effects are the negative externalities or social costs that users generate on each other when using a shared network resource. Under a... Sample PDF
Cost-Based Congestion Pricing in Network Priority Models Using Axiomatic Cost Allocation Methods
$37.50
Chapter 7
Ismail Khalil Ibrahim, Ashraf Ahmad, David Taniar
Mobile multimedia, referring to multimedia information exchange over wireless networks or wireless Internet, is made possible due to the popularity... Sample PDF
Mobile Multimedia: Communication Technologies, Business Drivers, Service and Applications
$37.50
Chapter 8
Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan
The emerging of wireless computing motivates radical changes of how information is obtained. Our paper discusses a practical realisation of an... Sample PDF
Mobile Information Systems in a Hospital Organization Setting
$37.50
Chapter 9
Say Ying Lim, David Taniar, Bala Srinivasan
In this chapter, we present an extensive study of the available types of data caching in a mobile database environment. We explore the different... Sample PDF
Data Caching in a Mobile Database Environment
$37.50
Chapter 10
John Goh, David Taniar
Mining walking pattern from mobile users represents an interesting research area in the field of data mining which is about extracting patterns and... Sample PDF
Mining Walking Pattern from Mobile Users
$37.50
Chapter 11
Subhankar Dhar
This chapter presents the current state of the art of mobile ad hoc network and some important problems and challenges related to routing, power... Sample PDF
Applications and Future Trends in Mobile Ad Hoc Networks
$37.50
Chapter 12
Kevin Curran, Elaine Smyth
Signal leakage means that wireless network communications can be picked up outside the physical boundaries of the building in which they are being... Sample PDF
Addressing WiFi Security Concerns
$37.50
Chapter 13
Byung Kwan Lee, Seung Hae Yang, Tai-Chi Lee
Unlike SET (secure electronic transaction) protocol. This chapter proposes a SEEP (highly secure electronic payment) protocol, which uses ECC... Sample PDF
A SEEP Protocol Design Using 3BC, ECC(F2m) and HECC Algorithm
$37.50
Chapter 14
Kevin Curran, John Honan
This chapter investigates the problem of e-mail spam, and identifies methods to minimize the volumes. The analysis focuses on the hashcash... Sample PDF
Fighting the Problem of Unsolicited E-Mail Using a Hashcash Proof-of-Work Approach
$37.50
About the Authors