mobile ad hoc networking (cutting edge directions) || frontmatter

Download Mobile Ad Hoc Networking (Cutting Edge Directions) || Frontmatter

Post on 15-Dec-2016

216 views

Category:

Documents

3 download

Embed Size (px)

TRANSCRIPT

  • MOBILE AD HOCNETWORKING

  • IEEE Press445 Hoes Lane

    Piscataway, NJ 08854

    IEEE Press Editorial Board 2013John Anderson, Editor in Chief

    Linda Shafer Saeid Nahavandi George ZobristGeorge W. Arnold David Jacobson Tariq SamadEkram Hossain Mary Lanzerotti Dmitry GoldgofOm P. Malik

    Kenneth Moore, Director of IEEE Book and Information Services (BIS)

    ieee ed board_grid.qxd 1/8/2013 7:52 AM Page 1

  • MOBILE AD HOCNETWORKINGCutting Edge Directions

    Second Edition

    Edited by

    STEFANO BASAGNIMARCO CONTISILVIA GIORDANOIVAN STOJMENOVIC

  • Cover Design: John Wiley & Sons, Inc.Cover Photographs: Top inset photo: John Wiley & SonsBottom inset photo: merrymoonmary/iStockphoto

    Copyright 2013 by The Institute of Electrical and Electronics Engineers, Inc.

    Published by John Wiley & Sons, Inc., Hoboken, New Jersey. All rights reserved

    Published simultaneously in Canada

    No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any formor by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except aspermitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the priorwritten permission of the Publisher, or authorization through payment of the appropriate per-copy feeto the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400,fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permissionshould be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken,NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission.

    Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best effortsin preparing this book, they make no representations or warranties with respect to the accuracy orcompleteness of the contents of this book and specifically disclaim any implied warranties ofmerchantability or fitness for a particular purpose. No warranty may be created or extended by salesrepresentatives or written sales materials. The advice and strategies contained herein may not be suitablefor your situation. You should consult with a professional where appropriate. Neither the publisher norauthor shall be liable for any loss of profit or any other commercial damages, including but not limited tospecial, incidental, consequential, or other damages.

    For general information on our other products and services or for technical support, please contact ourCustomer Care Department within the United States at (800) 762-2974, outside the United States at(317) 572-3993 or fax (317) 572-4002.

    Wiley also publishes its books in a variety of electronic formats. Some content that appears in print maynot be available in electronic formats. For more information about Wiley products, visit our web site atwww.wiley.com.

    Library of Congress Cataloging-in-Publication Data:Mobile ad hoc networking : the cutting edge directions / edited by StefanoBasagni, Marco Conti, Silvia Giordano, Ivan Stojmenovic. Second edition.

    pages cm.ISBN 978-1-118-08728-2 (hardback)

    1. Ad hoc networks (Computer networks) 2. Wireless LANs. 3. Mobilecomputing. I. Basagni, Stefano, 1965- editor of compilation.

    TK5105.78.M63 2012004.6167dc23

    2012031683

    Printed in the United States of America

    10 9 8 7 6 5 4 3 2 1

  • CONTENTS

    PREFACE xiii

    ACKNOWLEDGMENTS xv

    CONTRIBUTORS xvii

    PART I GENERAL ISSUES

    1 Multihop Ad Hoc Networking: The Evolutionary Path 3Marco Conti and Silvia Giordano

    1.1 Introduction, 31.2 MANET Research: Major Achievements and Lessons Learned, 51.3 Multihop Ad Hoc Networks: From Theory to Reality, 161.4 Summary and Conclusions, 25References, 26

    2 Enabling Technologies and Standards for Mobile MultihopWireless Networking 34Enzo Mingozzi and Claudio Cicconetti

    2.1 Introduction, 352.2 Broadband Wireless Access Technologies, 372.3 Wireless Local Area Networks Technologies, 432.4 Personal Area Networks Technologies, 53

    v

  • vi CONTENTS

    2.5 Mobility Support in Heterogeneous Scenarios, 652.6 Conclusions, 67References, 69

    3 Application Scenarios 77Ilias Leontiadis, Ettore Ferranti, Cecilia Mascolo, Liam McNamara,Bence Pasztor, Niki Trigoni, and Sonia Waharte

    3.1 Introduction, 783.2 Military Applications, 793.3 Network Connectivity, 813.4 Wireless Sensor Networks, 843.5 Search and Rescue, 893.6 Vehicular Networks, 933.7 Personal Content Dissemination, 963.8 Conclusions, 98References, 98

    4 Security in Wireless Ad Hoc Networks 106Roberto Di Pietro and Josep Domingo-Ferrer

    4.1 Introduction, 1064.2 Wireless Sensor Networks, 1104.3 Unattended WSN, 1254.4 Wireless Mesh Networks, 1304.5 Delay-Tolerant Networks, 1344.6 Vehicular Ad Hoc Networks (VANETs), 1374.7 Conclusions and Open Research Issues, 144References, 144

    5 Architectural Solutions for End-User Mobility 154Salvatore Vanini and Anna Forster

    5.1 Introduction, 1545.2 Mesh Networks, 1555.3 Wireless Sensor Networks, 1825.4 Conclusion, 188References, 188

    6 Experimental Work Versus Simulation in the Studyof Mobile Ad Hoc Networks 191Carlo Vallati, Victor Omwando, and Prasant Mohapatra

    6.1 Introduction, 1916.2 Overview of Mobile Ad Hoc Network Simulation Tools

    and Experimental Platforms, 1926.3 Gap Between Simulations and Experiments: Issues

    and Factors, 199

  • CONTENTS vii

    6.4 Good Simulations: Validation, Verification, andCalibration, 220

    6.5 Simulators and Testbeds: Future Prospects, 2266.6 Conclusion, 228References, 228

    PART II MESH NETWORKING

    7 Resource Optimization in Multiradio MultichannelWireless Mesh Networks 241Antonio Capone, Ilario Filippini, Stefano Gualandi, and Di Yuan7.1 Introduction, 2427.2 Network and Interference Models, 2447.3 Maximum Link Activation Under the SINR Model, 2457.4 Optimal Link Scheduling, 2477.5 Joint Routing and Scheduling, 2547.6 Dealing with Channel Assignment and Directional

    Antennas, 2577.7 Cooperative Networking, 2637.8 Concluding Remarks and Future Issues, 269References, 271

    8 Quality of Service in Mesh Networks 275Raffaele Bruno8.1 Introduction, 2758.2 QoS Definition, 2778.3 A Taxonomy of Existing QoS Routing Approaches, 2788.4 Routing Protocols with Optimization-Based Path

    Selection, 2808.5 Routing Metrics for Minimum-Weight Path Selection, 2918.6 Feedback-Based Path Selection, 3078.7 Conclusions, 308References, 308

    PART III OPPORTUNISTIC NETWORKING

    9 Applications in Delay-Tolerant and Opportunistic Networks 317Teemu Karkkainen, Mikko Pitkanen, and Joerg Ott

    9.1 Application Scenarios, 3189.2 Challenges for Applications Over DTN, 3229.3 Critical Mechanisms for DTN Applications, 328

  • viii CONTENTS

    9.4 DTN Applications (Case Studies), 3369.5 Conclusion: Rethinking Applications for DTNs, 357References, 358

    10 Mobility Models in Opportunistic Networks 360Kyunghan Lee, Pan Hui, and Song Chong

    10.1 Introduction, 36010.2 Contact-Based Measurement, Analysis, and Modeling, 36110.3 Trajectory Models, 37610.4 Implications for Network Protocol Design, 39910.5 New Paradigm: Delay-Resource Tradeoffs, 406References, 414

    11 Opportunistic Routing 419Thrasyvoulos Spyropoulos and Andreea Picu

    11.1 Introduction, 42011.2 Cornerstones of Opportunistic Networks, 42211.3 Dealing with Uncertainty: Redundancy-Based Routing, 42811.4 Capitalizing on Structure: Utility-Based Forwarding, 43511.5 Hybrid Solutions: Combining Redundancy and Utility, 44411.6 Conclusion, 447References, 448

    12 Data Dissemination in Opportunistic Networks 453Chiara Boldrini and Andrea Passarella

    12.1 Introduction, 45412.2 Initial Ideas: PodNet, 45612.3 Social-Aware Schemes, 46012.4 Publish/Subscribe Schemes, 46412.5 Global Optimization, 46912.6 Infrastructure-Based Approaches, 47412.7 Approaches Inspired by Unstructured p2p Systems, 47812.8 Further Readings, 482References, 486

    13 Task Farming in Crowd Computing 491Derek G. Murray, Karthik Nilakant, J. Crowcroft, and E. Yoneki13.1 Introduction, 49113.2 Ideal Parallelism Model, 49413.3 Task Farming, 49813.4 Socially Aware Task Farming, 500

  • CONTENTS ix

    13.5 Related Work, 51013.6 Conclusions and Future Work, 510References, 512

    PART IV VANET

    14 A Taxonomy of Data Communication Protocols for VehicularAd Hoc Networks 517Yousef-Awwad Daraghmi, Ivan Stojmenovic, and Chih-Wei Yi14.1 Introduction, 51714.2 Taxonomy of VANET Communication Protocols, 52014.3 Reliability-Oriented Geocasting Protocols, 52514.4 Time-Critical Geocasting Protocols, 52714.5 Small-Scale Routing Protocols, 52914.6 Large-Scale Routing, 53414.7 Summary, 53914.8 Conclusion and Future Work, 539References, 542

    15 Mobility Models, Topology, and Simulations in VANET 545Francisco J. Ros, Juan A. Martinez, and Pedro M. Ruiz

    15.1 Introduction and Motivation, 54515.2 Mobility Models, 54715.3 Mobility Simulators, 55115.4 Integrated Simulators, 55715.5 Modeling Vehicular Communications, 56015.6 Analysis of Connectivity in Highways, 56515.7 Conclusion and Future Work, 572References, 573

    16 Experimental Work on VANET 577Minglu Li and Hongzi Zhu

    16.1 Introduction, 57716.2 MIT CarTel, 57916.3 UMass DieselNet, 58116.4 SJTU ShanghaiGrid, 58416.5 NCTU VANET Testbed, 58716.6 UCLA CVeT, 58916.7 GM DSRC Fleet, 59016.8 FleetNet Project, 59116.9 Network on Wheels (NOW) Project, 592

  • x CONTENTS

    16.10 Advanced Safety Vehicles (ASVs), 59316.11 Japan Automobile Research Institute (JARI), 594References, 595

    17 MAC Protocols for VANET 599Mohammad S. Almalag, Michele C. Weigle, and Stephan Olariu

    17.1 Introduction, 59917.2 MAC Metrics, 60217.3 IEEE Standards for M

Recommended

View more >