SlideShare a Scribd company logo
Wireless Ad-Hoc Networks
                                     (Half-day Tutorial)


A wireless ad-hoc network is a decentralized wireless network that does not rely on a
preexisting infrastructure. A principal property of wireless ad hoc networks is the use of wireless
nodes to produce, consume, and relay data on a flexible, as-needed basis appropriate for the
intended application. The research area of wireless ad-hoc networks now includes Mobile Ad-
Hoc Networks (MANETs), Wireless Mesh Networks (WMNs), Vehicle Ad-Hoc Networks
(VANETs), and Wireless Sensor Networks (WSNs), as well as innovative extensions in areas
such as 3G and 4G cellular networks. Additionally, wireless ad-hoc networking and embedded
computing and sensing are providing novel solutions to long-standing challenges in other
application areas.

Specific topics to be covered in this tutorial include mobility, security, power conservation,
wireless medium access, routing, and specific performance issues such as TCP over wireless.
Each of these issues will be tied to ongoing work in corresponding wireless standards.

This application dependent nature of wireless ad-hoc networks is the motivation for examining a
wide variety of system implementations in this tutorial. For example, WSNs have proven most
suitable in situations where environmental monitoring is required across a spatially distributed
area over an extended period of time. Thus examples from the military, agricultural,
infrastructure and health monitoring predominate. Similar types of applications will be examined
for each class of wireless ad-hoc network such as vehicular networks, multimedia networks,
delay tolerant networks, etc. In summary, the primary objective with this tutorial is to reach out
to researchers from a breadth of research communities to show them the advantages Wireless
Ad-Hoc Network implementations can bring to their specific problems of interest.

With new coverage of Wireless Ad-Hoc Networks, this tutorial represents an expansion of the
successful HICSS 2011 tutorial. We will explore a diverse range of wireless ad-hoc network
applications and introduce the attendee to potential research areas of common interest.
Wireless ad-hoc networks have seen increasingly widespread use in recent years due to
significant technological advancements in a confluence of areas including radio transceivers,
MEMS, microprocessors and flash memory. The research area of wireless ad-hoc networks
now includes Mobile Ad-Hoc Networks (MANETs), Wireless Mesh Networks (WMNs), Vehicle
Ad-Hoc Networks (VANETs), Delay Tolerant Networks (DNT) and Wireless Sensor Networks
(WSNs), as well as innovative extensions in areas such as 3G and 4G cellular networks. The
tutorial is intended to compliment the Wireless Networking minitrack – within the Software
Technology track – by exposing the attendee to general wireless networking issues which may
be addressed in more detail in the main conference sessions.
Tutorial Leaders
John McEachen (Primary Contact)
833 Dyer Road, Room 437
Code EC/Mj
Department of Electrical and Computer Engineering
Naval Postgraduate School
Monterey, California 93943
Direct: (831)656-3652
Department: (831)656-2081
Fax: (831)656-2760
Email: mceachen@nps.edu

John McEachen is a Professor in the Department of Electrical and Computer Engineering of the
Naval Postgraduate School, Monterey, California. He received the Ph.D. and M.Phil. degrees
from Yale University, the M.E.E.E. degree from the University of Virginia and the B.S.E.E. from
the University of Notre Dame.

Murali Tummala
833 Dyer Road, Room 437
Code EC/Tu
Department of Electrical and Computer Engineering
Naval Postgraduate School
Monterey, California 93943
Direct: (831)656-2645
Department: (831)656-2081
Fax: (831)656-2760
Email: mtummala@nps.edu

Weilian Su
833 Dyer Road, Room 437
Code EC/Su
Department of Electrical and Computer Engineering
Naval Postgraduate School
Monterey, California 93943
Direct: (831)656-3217
Department: (831)656-2081
Fax: (831)656-2760
Email: weilian@nps.edu

Commander Owens Walker, USN
Maury Hall room 327, Mail Stop 14B
105 Maryland Avenue
Department of Electrical and Computer Engineering
United States Naval Academy
Annapolis, MD 21402-5025
Direct: (831)747-7509
Department: (410) 293-6150
Fax: (410) 293-3493
Email: towalker@nps.edu

Edoardo Biagioni
Dept of Information and Computer Science
University of Hawaii at Manoa
Honolulu, HI 96822
Email: esb@hawaii.edu

More Related Content

What's hot

An overview on application of machine learning techniques in optical networks
An overview on application of machine learning techniques in optical networksAn overview on application of machine learning techniques in optical networks
An overview on application of machine learning techniques in optical networks
Khaleda Ali
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areas
Iaetsd Iaetsd
 
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
IJCSIS Research Publications
 
Monet cf ps-5_g networks_final(1)
Monet cf ps-5_g networks_final(1)Monet cf ps-5_g networks_final(1)
Monet cf ps-5_g networks_final(1)
Fahmi Yasser
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
eSAT Journals
 
AODV information
AODV informationAODV information
AODV informationanilds02
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
Thesis Scientist Private Limited
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol in
eSAT Publishing House
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...
IJCNCJournal
 
Link & Match Program
Link & Match ProgramLink & Match Program
Link & Match Program
indonesiabelajar
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEEMEMTECHSTUDENTPROJECTS
 
Tutorial PIMRC 2015 [T8]
Tutorial PIMRC 2015 [T8]Tutorial PIMRC 2015 [T8]
Tutorial PIMRC 2015 [T8]
T. E. BOGALE
 
Millimeter wave channel modelıng via generatıve neural network ppt
Millimeter wave channel modelıng via generatıve neural network pptMillimeter wave channel modelıng via generatıve neural network ppt
Millimeter wave channel modelıng via generatıve neural network ppt
Mirza Baig
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
ijsrd.com
 
Lh3420492054
Lh3420492054Lh3420492054
Lh3420492054
IJERA Editor
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
CSCJournals
 

What's hot (19)

An overview on application of machine learning techniques in optical networks
An overview on application of machine learning techniques in optical networksAn overview on application of machine learning techniques in optical networks
An overview on application of machine learning techniques in optical networks
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areas
 
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
 
Monet cf ps-5_g networks_final(1)
Monet cf ps-5_g networks_final(1)Monet cf ps-5_g networks_final(1)
Monet cf ps-5_g networks_final(1)
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
 
AODV information
AODV informationAODV information
AODV information
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol in
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...
 
Link & Match Program
Link & Match ProgramLink & Match Program
Link & Match Program
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
 
Tutorial PIMRC 2015 [T8]
Tutorial PIMRC 2015 [T8]Tutorial PIMRC 2015 [T8]
Tutorial PIMRC 2015 [T8]
 
Millimeter wave channel modelıng via generatıve neural network ppt
Millimeter wave channel modelıng via generatıve neural network pptMillimeter wave channel modelıng via generatıve neural network ppt
Millimeter wave channel modelıng via generatıve neural network ppt
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
 
UCLA_08.01.16-R.-Shubair-MJ-08.10.16
UCLA_08.01.16-R.-Shubair-MJ-08.10.16UCLA_08.01.16-R.-Shubair-MJ-08.10.16
UCLA_08.01.16-R.-Shubair-MJ-08.10.16
 
Lh3420492054
Lh3420492054Lh3420492054
Lh3420492054
 
wireless
wirelesswireless
wireless
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
 

Similar to Wireless ad hoc

REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES
REVIEW ON MANET: EVOLUTION, CHALLENGES AND USESREVIEW ON MANET: EVOLUTION, CHALLENGES AND USES
REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES
International Journal of Technical Research & Application
 
biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdf
JOMan21
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
ijwmn
 
Secure communications over wireless broadcast networks
Secure communications over wireless broadcast networksSecure communications over wireless broadcast networks
Secure communications over wireless broadcast networkspraveen369
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
chris zlatis
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET Journal
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
ijcsa
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
ijsrd.com
 
[email protected]Received December 4, 2019, accepted Janua
[email protected]Received December 4, 2019, accepted Janua[email protected]Received December 4, 2019, accepted Janua
[email protected]Received December 4, 2019, accepted Janua
TatianaMajor22
 
Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...
Karen Gilchrist
 
Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...
FaizanMahmood28
 
Wireless sensor Networks.ppt
Wireless sensor Networks.pptWireless sensor Networks.ppt
Wireless sensor Networks.ppt
MATRUSRI ENGINEERING COLLEGE
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security system
IJAEMSJORNAL
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
AM Publications
 
O4101101103
O4101101103O4101101103
O4101101103
IJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
10.1109@maes.2020.2970262
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262
MKEERTHIKA1
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
ijtsrd
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
abdullah roomi
 
Manet overview
Manet overviewManet overview
Manet overview
Amalia Nurani
 

Similar to Wireless ad hoc (20)

REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES
REVIEW ON MANET: EVOLUTION, CHALLENGES AND USESREVIEW ON MANET: EVOLUTION, CHALLENGES AND USES
REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES
 
biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdf
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
 
Secure communications over wireless broadcast networks
Secure communications over wireless broadcast networksSecure communications over wireless broadcast networks
Secure communications over wireless broadcast networks
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
[email protected]Received December 4, 2019, accepted Janua
[email protected]Received December 4, 2019, accepted Janua[email protected]Received December 4, 2019, accepted Janua
[email protected]Received December 4, 2019, accepted Janua
 
Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...
 
Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...
 
Wireless sensor Networks.ppt
Wireless sensor Networks.pptWireless sensor Networks.ppt
Wireless sensor Networks.ppt
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security system
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
O4101101103
O4101101103O4101101103
O4101101103
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
10.1109@maes.2020.2970262
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Manet overview
Manet overviewManet overview
Manet overview
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

Wireless ad hoc

  • 1. Wireless Ad-Hoc Networks (Half-day Tutorial) A wireless ad-hoc network is a decentralized wireless network that does not rely on a preexisting infrastructure. A principal property of wireless ad hoc networks is the use of wireless nodes to produce, consume, and relay data on a flexible, as-needed basis appropriate for the intended application. The research area of wireless ad-hoc networks now includes Mobile Ad- Hoc Networks (MANETs), Wireless Mesh Networks (WMNs), Vehicle Ad-Hoc Networks (VANETs), and Wireless Sensor Networks (WSNs), as well as innovative extensions in areas such as 3G and 4G cellular networks. Additionally, wireless ad-hoc networking and embedded computing and sensing are providing novel solutions to long-standing challenges in other application areas. Specific topics to be covered in this tutorial include mobility, security, power conservation, wireless medium access, routing, and specific performance issues such as TCP over wireless. Each of these issues will be tied to ongoing work in corresponding wireless standards. This application dependent nature of wireless ad-hoc networks is the motivation for examining a wide variety of system implementations in this tutorial. For example, WSNs have proven most suitable in situations where environmental monitoring is required across a spatially distributed area over an extended period of time. Thus examples from the military, agricultural, infrastructure and health monitoring predominate. Similar types of applications will be examined for each class of wireless ad-hoc network such as vehicular networks, multimedia networks, delay tolerant networks, etc. In summary, the primary objective with this tutorial is to reach out to researchers from a breadth of research communities to show them the advantages Wireless Ad-Hoc Network implementations can bring to their specific problems of interest. With new coverage of Wireless Ad-Hoc Networks, this tutorial represents an expansion of the successful HICSS 2011 tutorial. We will explore a diverse range of wireless ad-hoc network applications and introduce the attendee to potential research areas of common interest. Wireless ad-hoc networks have seen increasingly widespread use in recent years due to significant technological advancements in a confluence of areas including radio transceivers, MEMS, microprocessors and flash memory. The research area of wireless ad-hoc networks now includes Mobile Ad-Hoc Networks (MANETs), Wireless Mesh Networks (WMNs), Vehicle Ad-Hoc Networks (VANETs), Delay Tolerant Networks (DNT) and Wireless Sensor Networks (WSNs), as well as innovative extensions in areas such as 3G and 4G cellular networks. The tutorial is intended to compliment the Wireless Networking minitrack – within the Software Technology track – by exposing the attendee to general wireless networking issues which may be addressed in more detail in the main conference sessions.
  • 2. Tutorial Leaders John McEachen (Primary Contact) 833 Dyer Road, Room 437 Code EC/Mj Department of Electrical and Computer Engineering Naval Postgraduate School Monterey, California 93943 Direct: (831)656-3652 Department: (831)656-2081 Fax: (831)656-2760 Email: mceachen@nps.edu John McEachen is a Professor in the Department of Electrical and Computer Engineering of the Naval Postgraduate School, Monterey, California. He received the Ph.D. and M.Phil. degrees from Yale University, the M.E.E.E. degree from the University of Virginia and the B.S.E.E. from the University of Notre Dame. Murali Tummala 833 Dyer Road, Room 437 Code EC/Tu Department of Electrical and Computer Engineering Naval Postgraduate School Monterey, California 93943 Direct: (831)656-2645 Department: (831)656-2081 Fax: (831)656-2760 Email: mtummala@nps.edu Weilian Su 833 Dyer Road, Room 437 Code EC/Su Department of Electrical and Computer Engineering Naval Postgraduate School Monterey, California 93943 Direct: (831)656-3217 Department: (831)656-2081 Fax: (831)656-2760 Email: weilian@nps.edu Commander Owens Walker, USN Maury Hall room 327, Mail Stop 14B 105 Maryland Avenue Department of Electrical and Computer Engineering
  • 3. United States Naval Academy Annapolis, MD 21402-5025 Direct: (831)747-7509 Department: (410) 293-6150 Fax: (410) 293-3493 Email: towalker@nps.edu Edoardo Biagioni Dept of Information and Computer Science University of Hawaii at Manoa Honolulu, HI 96822 Email: esb@hawaii.edu