Download File - Computer Networks & Information Security
Download File - Computer Networks & Information Security Download File - Computer Networks & Information Security
DAWN Features Topology control by transmit power control To avoid topologies that are too sparse or too dense To extend battery life Scalable link state routing: Link state updates with small TTL (time-to-live) sent more often, than those with greater TTL As a packet gets closer to the destination, more accurate info is used for next hop determination Elastic Virtual Circuits (VC): Label switching through the DAWN nodes (label = VC id) Path repaired transparent to the endpoints when hosts along the path move away 414
Link layer Implementation Issues: Where to Implement Ad Hoc Routing Network layer Application layer 415
- Page 363 and 364: This Tutorial This tutorial consid
- Page 365 and 366: Mobile Ad Hoc Networks Mobility ca
- Page 367 and 368: Impact of Multi-Hop Wireless Paths
- Page 369 and 370: Ideal Throughput f(i) = fraction o
- Page 371 and 372: Impact of Mobility 20 m/s 30 m/s Id
- Page 373 and 374: Actual throughput But not always
- Page 375 and 376: mobility causes link breakage, resu
- Page 377 and 378: B C A Why Does Throughput Improve?
- Page 379 and 380: Network feedback How to Improve Thr
- Page 381 and 382: Actual throughput Performance Impro
- Page 383 and 384: Issues Network Feedback Network kn
- Page 385 and 386: To Cache or Not to Cache Average sp
- Page 387 and 388: Issues To Cache or Not to Cache Ca
- Page 389 and 390: TCP Performance Two factors result
- Page 391 and 392: Issues RTO After Route Repair Same
- Page 393 and 394: Impact of Acknowledgements TCP Ack
- Page 395 and 396: Security Issues 395
- Page 397 and 398: Security Issues in Mobile Ad Hoc Ne
- Page 399 and 400: Resurrecting Duckling [Stajano99]
- Page 401 and 402: Secure Routing Establishing a Cert
- Page 403 and 404: Techniques for Intrusion-Resistant
- Page 405 and 406: Intrusion Detection [Zhang00Mobicom
- Page 407 and 408: Packet Purse Model [Byttayn00MobiHo
- Page 409 and 410: Existing Implementations Several i
- Page 411 and 412: CMU Implementation: Lessons Learned
- Page 413: BBN Implementation [Ramanathan00Wcn
- Page 417 and 418: Implementation Issues: Address Assi
- Page 419 and 420: Implementation Issues: Security Ho
- Page 421 and 422: Implementation Issues Only some is
- Page 423 and 424: Distributed Algorithms for Mobile A
- Page 425 and 426: Distributed Algorithms There is al
- Page 427 and 428: Related Standards Activities 427
- Page 429 and 430: Internet Engineering Task Force (IE
- Page 431 and 432: Bluetooth [Haartsen98,Bhagawat00Tut
- Page 433 and 434: Bluetooth: Piconet A channel is ch
- Page 435 and 436: Bluetooth: Scatternet Several pico
- Page 437 and 438: Open Issues in Mobile Ad Hoc Networ
- Page 439 and 440: Related Research Areas Algorithms
- Page 441: Thank you !! For more information,
DAWN Features<br />
Topology control by transmit power control<br />
To avoid topologies that are too sparse or too dense<br />
To extend battery life<br />
Scalable link state routing: Link state updates with<br />
small TTL (time-to-live) sent more often, than those<br />
with greater TTL<br />
As a packet gets closer to the destination, more accurate<br />
info is used for next hop determination<br />
Elastic Virtual Circuits (VC):<br />
Label switching through the DAWN nodes (label = VC id)<br />
Path repaired transparent to the endpoints when hosts along<br />
the path move away<br />
414