This book introduces opportunistic networking by combining fundamental mathematical models, system architecture/ protocols, and practical applications. The book summarizes the main outcomes and investigation of opportunistic networks and provides the overview picture and system training for newcomers to this promising area
This book introduces opportunistic networking by combining fundamental mathematical models, system architecture/ protocols, and practical applications. The book summarizes the main outcomes and investigation of opportunistic networks and provides the overview picture and system training for newcomers to this promising area
Introduction and Methodology. Modeling Opportunistic Networks. Mobility Models. Contact Models. Physical-MAC Layer Enabling Technology. Routing Protocol and Algorithms. Social-Aware Protocols and Evaluations. Security Mechanism and Considerations. Application 1: Mobile Data Offloading. Application 2: Vehicular Data Dissemination. Other Killer Applications.
Introduction and Methodology. Modeling Opportunistic Networks. Mobility Models. Contact Models. Physical-MAC Layer Enabling Technology. Routing Protocol and Algorithms. Social-Aware Protocols and Evaluations. Security Mechanism and Considerations. Application 1: Mobile Data Offloading. Application 2: Vehicular Data Dissemination. Other Killer Applications.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309