Book description
From fundamentals to advanced concepts, this book provides comprehensive technical coverage of this rapidly emerging communications technology.
Table of contents
- Front Cover
- Contents
- Preface
- About the Editor
- Chapter 1: Routing in Mobile Opportunistic Networks (1/5)
- Chapter 1: Routing in Mobile Opportunistic Networks (2/5)
- Chapter 1: Routing in Mobile Opportunistic Networks (3/5)
- Chapter 1: Routing in Mobile Opportunistic Networks (4/5)
- Chapter 1: Routing in Mobile Opportunistic Networks (5/5)
- Chapter 2: State of the Art in Modeling Opportunistic Networks (1/6)
- Chapter 2: State of the Art in Modeling Opportunistic Networks (2/6)
- Chapter 2: State of the Art in Modeling Opportunistic Networks (3/6)
- Chapter 2: State of the Art in Modeling Opportunistic Networks (4/6)
- Chapter 2: State of the Art in Modeling Opportunistic Networks (5/6)
- Chapter 2: State of the Art in Modeling Opportunistic Networks (6/6)
- Chapter 3: Credit-Based Cooperation Enforcement Schemes Tailored to Opportunistic Networks (1/7)
- Chapter 3: Credit-Based Cooperation Enforcement Schemes Tailored to Opportunistic Networks (2/7)
- Chapter 3: Credit-Based Cooperation Enforcement Schemes Tailored to Opportunistic Networks (3/7)
- Chapter 3: Credit-Based Cooperation Enforcement Schemes Tailored to Opportunistic Networks (4/7)
- Chapter 3: Credit-Based Cooperation Enforcement Schemes Tailored to Opportunistic Networks (5/7)
- Chapter 3: Credit-Based Cooperation Enforcement Schemes Tailored to Opportunistic Networks (6/7)
- Chapter 3: Credit-Based Cooperation Enforcement Schemes Tailored to Opportunistic Networks (7/7)
- Chapter 4: Opportunism in Mobile Ad Hoc Networking (1/7)
- Chapter 4: Opportunism in Mobile Ad Hoc Networking (2/7)
- Chapter 4: Opportunism in Mobile Ad Hoc Networking (3/7)
- Chapter 4: Opportunism in Mobile Ad Hoc Networking (4/7)
- Chapter 4: Opportunism in Mobile Ad Hoc Networking (5/7)
- Chapter 4: Opportunism in Mobile Ad Hoc Networking (6/7)
- Chapter 4: Opportunism in Mobile Ad Hoc Networking (7/7)
- Chapter 5: Opportunistic Routing for Load Balancing and Reliable Data Dissemination in Wireless Sensor Networks (1/5)
- Chapter 5: Opportunistic Routing for Load Balancing and Reliable Data Dissemination in Wireless Sensor Networks (2/5)
- Chapter 5: Opportunistic Routing for Load Balancing and Reliable Data Dissemination in Wireless Sensor Networks (3/5)
- Chapter 5: Opportunistic Routing for Load Balancing and Reliable Data Dissemination in Wireless Sensor Networks (4/5)
- Chapter 5: Opportunistic Routing for Load Balancing and Reliable Data Dissemination in Wireless Sensor Networks (5/5)
- Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (1/8)
- Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (2/8)
- Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (3/8)
- Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (4/8)
- Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (5/8)
- Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (6/8)
- Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (7/8)
- Chapter 6: Trace-Based Analysis of Mobile User Behaviors for Opportunistic Networks (8/8)
- Chapter 7: Quality of Service in an Opportunistic Capability Utilization Network (1/7)
- Chapter 7: Quality of Service in an Opportunistic Capability Utilization Network (2/7)
- Chapter 7: Quality of Service in an Opportunistic Capability Utilization Network (3/7)
- Chapter 7: Quality of Service in an Opportunistic Capability Utilization Network (4/7)
- Chapter 7: Quality of Service in an Opportunistic Capability Utilization Network (5/7)
- Chapter 7: Quality of Service in an Opportunistic Capability Utilization Network (6/7)
- Chapter 7: Quality of Service in an Opportunistic Capability Utilization Network (7/7)
- Chapter 8: Effective File Transfer in Mobile Opportunistic Networks (1/5)
- Chapter 8: Effective File Transfer in Mobile Opportunistic Networks (2/5)
- Chapter 8: Effective File Transfer in Mobile Opportunistic Networks (3/5)
- Chapter 8: Effective File Transfer in Mobile Opportunistic Networks (4/5)
- Chapter 8: Effective File Transfer in Mobile Opportunistic Networks (5/5)
- Chapter 9: Stationary Relay Nodes Deployment on Vehicular Opportunistic Networks (1/4)
- Chapter 9: Stationary Relay Nodes Deployment on Vehicular Opportunistic Networks (2/4)
- Chapter 9: Stationary Relay Nodes Deployment on Vehicular Opportunistic Networks (3/4)
- Chapter 9: Stationary Relay Nodes Deployment on Vehicular Opportunistic Networks (4/4)
- Chapter 10: Connection Enhancement for Mobile Opportunistic Networks (1/6)
- Chapter 10: Connection Enhancement for Mobile Opportunistic Networks (2/6)
- Chapter 10: Connection Enhancement for Mobile Opportunistic Networks (3/6)
- Chapter 10: Connection Enhancement for Mobile Opportunistic Networks (4/6)
- Chapter 10: Connection Enhancement for Mobile Opportunistic Networks (5/6)
- Chapter 10: Connection Enhancement for Mobile Opportunistic Networks (6/6)
- Back Cover
Product information
- Title: Mobile Opportunistic Networks
- Author(s):
- Release date: April 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781420088137
You might also like
book
Mobile Ad Hoc Networks
Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future …
book
Radio Resource Management in Multi-Tier Cellular Wireless Networks
Providing an extensive overview of the radio resource management problem in femtocell networks, this invaluable book …
book
Smart Phone and Next Generation Mobile Computing
This in-depth technical guide is an essential resource for anyone involved in the development of “smart …
book
Software Defined Mobile Networks (SDMN)
This book describes the concept of a Software Defined Mobile Network (SDMN), which will impact the …