Results 1 - 10
of
8,829
An Enhanced Inter-Access Point Protocol for Uniform Intra and Intersubnet Handoffs
- IEEE Transactions on Mobile Computing
, 2005
"... Abstract—An enhanced IEEE 802.11 Inter-Access Point Protocol (IAPP) is proposed to provide a unified solution for both intra and intersubnet handoff processes. The proposed enhancement relies on the access point’s (AP’s) interoperability with other APs, provided by the IP-based IAPP, so as to enable ..."
Abstract
-
Cited by 15 (1 self)
- Add to MetaCart
Abstract—An enhanced IEEE 802.11 Inter-Access Point Protocol (IAPP) is proposed to provide a unified solution for both intra and intersubnet handoff processes. The proposed enhancement relies on the access point’s (AP’s) interoperability with other APs, provided by the IP-based IAPP, so
Implementation Options for the Distribution System in the 802.11 Wireless LAN Infrastructure Network
- in the 802.11 Wireless LAN Infrastructure Network", IEEE International Conference on Communications - ICC 2000
, 2000
"... The IEEE 802.11 wireless LAN standard specifies which messages shall be exchanged between an access point and a station to support mobility. However, the implementation of mobility in the wired part of the network, i.e. the distribution system or inter-access point protocol, is not specified. This p ..."
Abstract
-
Cited by 9 (1 self)
- Add to MetaCart
The IEEE 802.11 wireless LAN standard specifies which messages shall be exchanged between an access point and a station to support mobility. However, the implementation of mobility in the wired part of the network, i.e. the distribution system or inter-access point protocol, is not specified
On the Security of Public Key Protocols
, 1983
"... Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an impr ..."
Abstract
-
Cited by 1383 (0 self)
- Add to MetaCart
Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however
A logic of authentication
- ACM TRANSACTIONS ON COMPUTER SYSTEMS
, 1990
"... Questions of belief are essential in analyzing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required ..."
Abstract
-
Cited by 1332 (22 self)
- Add to MetaCart
Questions of belief are essential in analyzing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
, 2003
"... An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance vec ..."
Abstract
-
Cited by 534 (8 self)
- Add to MetaCart
An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance
Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment
- In IEEE Infocom
, 2001
"... Energy-aware design and evaluation of network protocols requires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of well-known wireless network interfaces and device specifications do not ..."
Abstract
-
Cited by 669 (3 self)
- Add to MetaCart
collection of linear equations for calculating the energy consumed in sending, receiving and discarding broadcast and pointto -point data packets of various sizes. Some implications for protocol design and evaluation in ad hoc networks are discussed. Keywords---energy consumption, IEEE 802.11, ad hoc
A Survey on Sensor Networks
, 2002
"... Recent advancement in wireless communica- tions and electronics has enabled the develop- ment of low-cost sensor networks. The sensor networks can be used for various application areas (e.g., health, military, home). For different application areas, there are different technical issues that research ..."
Abstract
-
Cited by 2002 (1 self)
- Add to MetaCart
that researchers are currently resolving. The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections. This article also points out the open research issues and intends to spark new interests and developments
Routing with Guaranteed Delivery in ad hoc Wireless Networks
, 2001
"... We consider routing problems in ad hoc wireless networks modeled as unit graphs in which nodes are points in the plane and two nodes can communicate if the distance between them is less than some fixed unit. We describe the first distributed algorithms for routing that do not require duplication of ..."
Abstract
-
Cited by 849 (80 self)
- Add to MetaCart
We consider routing problems in ad hoc wireless networks modeled as unit graphs in which nodes are points in the plane and two nodes can communicate if the distance between them is less than some fixed unit. We describe the first distributed algorithms for routing that do not require duplication
Ad-hoc On-Demand Distance Vector Routing
- IN PROCEEDINGS OF THE 2ND IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS
, 1997
"... An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. In this paper we present Ad-hoc On Demand Distance Vector Routing (AODV), a novel algorithm for the operation of such ad-hoc n ..."
Abstract
-
Cited by 3240 (14 self)
- Add to MetaCart
An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. In this paper we present Ad-hoc On Demand Distance Vector Routing (AODV), a novel algorithm for the operation of such ad
Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers
, 1994
"... An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. In this paper we present an innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host as a ..."
Abstract
-
Cited by 2076 (8 self)
- Add to MetaCart
An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. In this paper we present an innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host
Results 1 - 10
of
8,829