Saturday, 28 May 2011

Routing Issues in Opportunistic Networks

Routing Issues in Opportunistic Networks
Author: Muhammad Arshad Islam
Edition:
Binding: Paperback
ISBN: 3659105058



Routing Issues in Opportunistic Networks: Evolution of Delay Tolerant Networks from Mobile Ad-hoc Networks to Opportunistic Networks


The presence of an increasing number of mobile devices has prompted the demand to use them for information dispersion through opportunistic networks, which they form coincidently due to their geographic location. Get Routing Issues in Opportunistic Networks computer books for free.
Opportunistic networks pose several new challenges to the current transmission protocols as they are not only capable of store and forward routing, but also lack the offline routing capability, i.e. source and destination must be connected to the network simultaneously. We can find several opportunistic network protocols in literature, but neither a solid comparison nor a trusted baseline has been presented. In this book, we have analyzed and evaluated eight existing routing algorithms on a common basis in an effort to grasp the strong Check Routing Issues in Opportunistic Networks our best computer books for 2013. All books are available in pdf format and downloadable from rapidshare, 4shared, and mediafire.

download

Routing Issues in Opportunistic Networks Free


Opportunistic networks pose several new challenges to the current transmission protocols as they are not only capable of store and forward routing, but also lack the offline routing capability, i.e. source and destination must be connected to the network simultaneously. We can find several opportunistic network protocols in literature, but neither a solid comparison nor a trusted baseline has been presented pportunistic networks pose several new challenges to the current transmission protocols as they are not only capable of store and forward routing, but also lack the offline routing capability, i.e. source and destination must be connected to the network simultaneously. We can find several opportunistic network protocols in literature, but neither a solid comparison nor a trusted baseline has been presented. In this book, we have analyzed and evaluated eight existing routing algorithms on a common basis in an effort to grasp the strong

Related Computer Books


No comments:

Post a Comment