Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

1. Abstract
1.1. Structure of this thesis
2. Introduction
3. Wireless technology
3.1. The IEEE 802 family
3.2. The IEEE 802.11
3.3. The Mac Layer
3.4. The PHY Layer
3.5. Antennas
3.7. Which to take, 802.11a or 802.11g
3.8. Characteristics of available hardware
3.9. IEEE 802.11 Security
4. Ad hoc On demand Distance Vector routing protocol (AODV)
4.1. Mobile ad hoc routing protocols
4.2. Introduction
4.3. Unicast routing
4.4. Multicast routing
4.5. Security
4.6. Implementations
5. Network Simulator – NS-2
5.1. About NS-2
5.2. NS-2, implementing languages
5.3. Architecture of ns-2
5.4. Usage of ns-2
5.5. TCL simulation scripts
5.6. Wireless simulations based on 802.11
5.7. Trace files
5.8. Limitations of ns-2
5.9. Extensions to ns-2
5.10. Utilities
5.11. Used machine for simulations
6. Car traffic simulator
6.1. Multi-agent traffic simulator
7. Connectivity in vehicular ad hoc networks
7.1. Simulation setup
7.2. Metrics
7.3. Results
7.4. Conclusions
7.5. Summary
8. Secure ring broadcasting
8.1. Broadcasting in ad hoc networks
8.2. Secure Ring Broadcasting (SRB)
8.3. Metrics
8.4. Simulation setup
8.5. Results
8.6. Conclusions
8.7. Verification under random interference
8.8. Summary
9. Directed route node selection
9.1. Directed Route Node Selection (DRNS)
9.2. Metrics
9.3. Simulation setup
9.4. Results
9.5. Conclusions
9.6. Summary
9.7. Comparison and combination of SRB and DRNS
10. Hybrid internet access
10.1. Hybrid ad hoc networks
10.2. The Hybrid Internet Access extension (HIA)
10.3. Simulation setup
10.4. Metrics
10.5. Results
11.5. Results
11.6. Conclusion
11.7. Summary
Appendix A - Master’s thesis description
A.1. Introduction
A.2. Tasks
A.3. Remarks
Appendix B - List of figures
Appendix C - List of tables
Appendix D - List of equations
Appendix E - References
E.1. Books
E.2. Papers
E.3. Company publications
E.4. Standards and drafts
E.5. Lecture Notes
E.6. Talks
E.7. Websites
Appendix F - Source codes
F.1. Used TCL script
G.1. Connectivity in vehicle ad hoc networks (Chapter 7)
G.2. Secure ring broadcasting (Chapter 8)
G.3. SRB verification under random interference
G.4. Directed route node selection (Chapter 9)
G.5. SRB-DRNS combination
G.6. Hybrid Internet Access (Chapter 10)
G.7. ARP a relict? (Chapter 11)
0 of .
Results for:
No results containing your search query
P. 1


Ratings: (0)|Views: 15|Likes:
Published by Nemaraj Raj

More info:

Published by: Nemaraj Raj on Nov 15, 2012
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 4 to 85 are not shown in this preview.
You're Reading a Free Preview
Pages 90 to 104 are not shown in this preview.
You're Reading a Free Preview
Pages 108 to 128 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->