MANET: Materials


Text book
  • Charles E. Perkins, Ad Hoc Networking, Addison-Wesley, 2002

Lecture

  Survey papers by topic
  1. Overview
    • Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu, Mobile Ad Hoc Networking: Imperatives and Challenges, in Ad Hoc Networks 1(1):13-64, 2003 [pdf]
  2. Routing protocols
    • Mehran Abolhasan, Tadeusz Wysocki and Eryk Dutkiewicz, A Review of Routing Protocols for Mobile Ad Hoc Networks, in Ad Hoc Networks, 2(1):1-22, 2004 [pdf]
    • Erik Nordström, Richard Gold and Per Gunningberg, Mythbusters: Whatever You Thought About MANET Routing, Think Again. . ., Department of Information Technology, Uppsala University, Report 2005-039, 2005 [pdf]
  3. Mobility models
    • Christian Schindelhauer, Mobility in Wireless Networks, SOFSEM 2006, 32nd International Conference on Current Trends in Theory and Practice of Computer Science, 2006, p. 100-116 [pdf]
    • F. Bai, A. Helmy, A Survey of Mobility Modeling and Analysis in Wireles Adhoc Networks, Book Chapter in the book on Wireless Ad Hoc and Sensor Networks, Kluwer Academic Publishers, 2004 [pdf]
  4. Transport protocols
    • Feng Wang and Yongguang Zhang, A Survey on TCP over Mobile Ad-Hoc Networks, in Y. Xiao and Y. Pan (Ed.) Ad Hoc and Sensor Networks, Nova Science Publishers, 2005 [pdf]
  5. Energy efficiency
    • Christine E. Jones, Krishna M. Sivalingam, Prathima Agrawal, Jyh-Cheng Chen, A Survey of Energy Efficient Network Protocols for Wireless Networks, WiNet 2001, p. 343-358 [ps]
  6. Real world implementation
    • Wolfgang Kiess, Martin Mauve, A Survey on Real-World Implementions of Mobile Ad-Hoc Networks, in Ad Hoc Networks 5 (3), pp. 324-339, April 2007 [pdf]
  7. Reliability, security and trustwortiness
    • H. Yang, H. Y. Luo, F. Ye, S W. Lu, and L. Zhang, Security in Mobile Ad Hoc Networks: Challenges and Solutions, in IEEE Wireless Communications 11 (1), 2004, pp, 38-47 [pdf]
    • P. Yau and C. J. Mitchell, Security vulnerabilities in ad hoc networks, 7th Intern. Symp. Communication Theory and Applications, 2003 [pdf]
  8. Cross layer design
    • M. Conti, G. Maselli, G. Turi, and S. Giordano, Cross-Layering in Mobile Ad Hoc Network Design, in IEEE Computer Vol. 37, Num. 2, pg 48-51, Feb. 2004 [pdf]
    • A.J. Goldsmith and S.B. Wicker, Design Challenges for Energy-Constrained Ad Hoc Wireless Networks, in IEEE Wireless Comm., vol. 9, no. 4, 2002, pp. 8-27 [pdf]
    • Kawadia, V., Kumar, P.R., A cautionary perspective on cross-layer design, in IEEE Wireless Communications, Volume 12, Issue 1, Feb. 2005 Page(s):3 -11 [pdf]

Useful links

Linux documentation

Miscellaneous


The real danger is not that computers will begin to think like men, but that men will begin to think like computers.

-Sydney J. Harris