B.A.T.M.A.N._v1.5

download B.A.T.M.A.N._v1.5

of 8

Transcript of B.A.T.M.A.N._v1.5

  • 8/6/2019 B.A.T.M.A.N._v1.5

    1/8

    B.A.T.M.A.N.: Better Approach To Mobile AD-HOC Networks.

    Mr. Abhijeet Khandagale#1, Mr. Gaurav Gupta#2#1MechanicalEngg., #2 Electronics & Telecom Engg

    G. H. Raisoni College Of Engineering,

    CRPF Gate, Digdoh Hills, Nagpur, Maharastra, [email protected]

    [email protected]

    +91-97660723081+91-94221767742

    ABSTRACT

    In the next generation of wireless

    communication systems, there will be a need

    for the rapid deployment of independent

    mobile users. Significant examples include

    establishing survivable, efficient, dynamic

    communication for emergency/rescue

    operations, disaster relief efforts, and

    military networks. Such network scenarios

    cannot rely on centralized and organized

    connectivity, and can be conceived as

    applications of Mobile Ad Hoc Networks.

    In B.A.T.M.A.N. we bring forth the newarenas of applied MANETs, i.e. Mobile Ad-

    Hoc Networks. The smart technologies

    intertwined with the existing, but unknown

    wireless networks, has been tapped to

    produce a new approach towards these Ad-

    Hoc networks. The factors affecting them are

    discussed as well as the futuristic

    applications, which is a part of a hands-on

    project.

    MANET is an autonomous collection ofmobile users that communicate over

    relatively bandwidth constrained wireless

    links. The set of applications for MANETs is

    diverse, ranging from small, static networks

    that are constrained by power sources, to

    large-scale, mobile, highly dynamic

    networks. The design of network protocols

    for these networks is a complex issue.

    Factors such as variable wireless link

    quality, propagation path loss, fading,multiuser interference, power expended, and

    topological changes, become relevant issues.

    The network is able to adaptively alter the

    routing paths to alleviate any of these effects.

    Military networks are designed to maintain a

    low probability of intercept and/or a lowprobability of detection.

    The Better Approach To Mobile Ad-Hoc

    Networking, or B.A.T.M.A.N., is a routing

    protocol which is currently under

    development by the Freifunk-Community.

    B.A.T.M.A.N.'s crucial point is the

    decentralization of the knowledge about the

    best route through the network.

    B.A.T.M.A.N. has been shown to exhibit high

    levels of stability but slightly slow

    convergence times in real-world conditions;

    this is confirmed by theoretical analysis.

    Using this technique in our ongoing research

    on Communicating Robots or as we call

    them - COMBOTS; we attempt to

    demonstrate techniques which allow realistic

    explorations concerning the evolution of

    robot intelligence to respond to realworld entities.

    Our knowledge about the scope of MANETs

    has been applied to incorporate the current

    traffic control system with the applications of

    Ad-Hoc Networks using trans-receiver sets.

    The current traffic system works on timed

    coding which needs to be altered if a

    situation arises, which is not viable every

    time. Hence we propose to switch to a more

    lexible method using B.A.T.M.A.N.

  • 8/6/2019 B.A.T.M.A.N._v1.5

    2/8

    The age of the smart tech is in. So this

    scenario can be applied virtually as well

    physically in any environment. The range

    though contained for a device has a limit,

    this concept has limitless possibilities. Here

    dawns the age of the B.A.T.M.A.N.!!

    I.Introduction

    With recent performance advancements incomputer and wireless communicationstechnologies, advanced mobile wirelesscomputing is expected to see increasinglywidespread use and application, much ofwhich will involve the use of the Internet

    Protocol (IP) suite. Such networks areenvisioned to have dynamic, sometimesrapidly-changing, random, multihoptopologies which are likely composed ofrelatively bandwidth-constrained wirelesslinks. A mobile ad-hoc network is acollection of mobile nodes forming an ad-hoc network without the assistance of anycentralized structures. These networksintroduced a new art of networkestablishment and can be well suited for anenvironment where either the infrastructureis lost or where deploy an infrastructure isnot very cost effective. The whole life-cycleof ad-hoc networks could be categorized intothe first, second, and the third generation ad-hoc networks systems. Present ad-hocnetworks systems are considered the thirdgeneration.

    II.History

    The task was to create a protocol which wasto be as easy, as small and as fast as possible.It seemed therefore sensible to split thedevelopment in several phases andimplement complex functions using aniterative process:

    The first generation goes back to 1972. Atthe time, they were called PRNET (PacketRadio Networks). In conjunction with

    ALOHA (Areal Locations of HazardousAtmospheres) and CSMA (Carrier Sense

    Medium Access), approaches for mediumaccess control and a kind of distance-vectorrouting PRNET were used on a trial basis toprovide different networking capabilities in acombat environment.

    The second generation of ad-hoc networksemerged in 1980s, when the ad-hoc networksystems were further enhanced andimplemented as a part of the SURAN(Survivable Adaptive Radio Networks)program. This provided a packet-switchednetwork to the mobile battlefield in anenvironment without infrastructure. Thisprogram proved to be beneficial inimproving the radios' performance by

    making them smaller, cheaper, and resilientto electronic attacks.

    In the 1990s, the concept of commercial ad-hoc networks arrived with notebookcomputers and other viable communicationsequipment. At the same time, the idea of acollection of mobile nodes was proposed atseveral research conferences. The IEEE802.11 subcommittee had adopted the term"ad-hoc networks" and the researchcommunity had started to look into thepossibility of deploying ad-hoc networks inother areas of application.

    III. Operation

    B.A.T.M.A.N. does have elements ofclassical routing protocols: It detects otherB.A.T.M.A.N. nodes and finds the best way(route) to these. It also keeps track of new

    nodes and informs its neighbours about theirexistence.

    In static networks, network administrators ortechnicians decide which computer isreached via which way or cable. As radionetworks undergo constant changes and lowparticipation-thresholds are a vital part of theFreifunk-networks' foundation this taskhas to be automated as far as possible.

    On a regular basis, every node sends out a socalled broadcast (a general message to all)

    http://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Network_administratorhttp://en.wikipedia.org/wiki/Radio_networkhttp://en.wikipedia.org/wiki/Radio_networkhttp://en.wikipedia.org/wiki/Radio_networkhttp://en.wikipedia.org/wiki/Radio_networkhttp://en.wikipedia.org/wiki/Radio_networkhttp://en.wikipedia.org/wiki/Network_administratorhttp://en.wikipedia.org/wiki/Network_protocol
  • 8/6/2019 B.A.T.M.A.N._v1.5

    3/8

    thereby informing all its neighbours about itsexistence. The neighbours then relay thismessage to their neighbours and so on and soforth. This carries the information to everynode in the network. In order to find the best

    way to a certain node, B.A.T.M.A.N countsthe originator-messages received and logswhich neighbour the message came inthrough.

    Like distance-vector protocols, but unlikelink-state protocols, B.A.T.M.A.N does nottry to determine the whole way, but, by usingthe originator-messages, only the package'sfirst step in the right direction. The data ishanded over to the next neighbour in that

    direction, who in turn uses the samemechanism. This process is repeated until thedata reaches its destination.

    Besides for radio networks, B.A.T.M.A.Ncan also be used with common cableconnections, such as Ethernet.

    i. Version oneIn the first phase, the routing algorithm wasimplemented and tested for its practicalityand suitability for the task at hand. For thesending and receiving of originator-messages(information about existence) the UDP port1966 was chosen.

    ii. Version twoThe version one algorithm made a significantassumption: As soon as a node receives

    existence data from another node, it assumesit can also send data back. In radio networkshowever, it may very well be that only one-way communication is possible. Amechanism was incorporated into theprotocol to allow for this and to solve thearising problems. The mechanism enablesthe node to determine whether aneighbouring node provides bidirectionalcommunication, only bidirectional nodesbeing considered part of the network, one-

    way nodes are no longer fully included.

    iii. Version threeThe greatest innovation in this version isB.A.T.M.A.N's support of multiple networkdevices. Now a computer or router running

    B.A.T.M.A.N can be deployed on a centralpoint, like a church or another high building,and have several wired or wireless networkinterfaces attached to it. When so deployed,B.A.T.M.A.N can relay network data inmore than one direction without anyretransmission delay.

    Certain unusual phenomena and specialcircumstances could appear during thedetermination of the best route through the

    network. These have been tackled andcounteracted to prevent circular routing(which can prevent data reaching itsdestination) from occurring.

    A node can now inform the network that itprovides access to the Internet. Other nodesuse that information to evaluate whetherthere is a connection to the Internet close tothem and what bandwidth is available. Theycan either use a specific gateway or allowB.A.T.M.A.N to determine which gateway touse, based on criteria such as connectionspeed.

    Announcing devices not runningB.A.T.M.A.N themselves was also includedin this version. Usually this method is usedto connect house-networks to mesh-networks. An antenna installation on the roofwill connect to the wireless network through

    B.A.T.M.A.N and the rest of the house willsimply be announced thus also be reachable.

    IV.Application

    At present, as wireless-communicationtechnology for intelligent transport systems(ITS), various techniques are being activelyresearched. "Vehicle-to-vehiclecommunication" (i.e., between similar car-mounted devices fitted with wireless-

    communication functions such as wirelessLAN and mobile phones in cars) and "road-

    http://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Algorithmhttp://en.wikipedia.org/wiki/User_Datagram_Protocolhttp://en.wikipedia.org/wiki/Network_hardwarehttp://en.wikipedia.org/wiki/Network_hardwarehttp://en.wikipedia.org/wiki/Bandwidth_%28computing%29http://en.wikipedia.org/wiki/Gatewayhttp://en.wikipedia.org/wiki/Gatewayhttp://en.wikipedia.org/wiki/Bandwidth_%28computing%29http://en.wikipedia.org/wiki/Network_hardwarehttp://en.wikipedia.org/wiki/Network_hardwarehttp://en.wikipedia.org/wiki/Network_hardwarehttp://en.wikipedia.org/wiki/User_Datagram_Protocolhttp://en.wikipedia.org/wiki/Algorithmhttp://en.wikipedia.org/wiki/Ethernet
  • 8/6/2019 B.A.T.M.A.N._v1.5

    4/8

    to-vehicle communication" (i.e., fromservice-centre servers connected through theinternet via base stations located along theroadside to provide information delivery andremote-diagnosis services for cars) are being

    demanded (see Figure 1).

    These Vehicle to vehicle communication

    better can be defined as P2P Communicationranges from cars to aircrafts. The MANETshave applications in our household, offices,roads and every single place we can think of,which has multiple things or networksaround it. Households and offices usecordless phones, intranet, LAN, etc. Roadsuse smart driving techniques and navigationsystems.

    V.B.A.T.M.A.N. Overview

    The problem with classical routing protocolsis that they are typically not well suited forwireless ad-hoc networks. This is becausesuch networks are unstructured, dynamicallychange their topology, and are based on aninherently unreliable medium.

    OLSR, the currently most employed protocolfor such scenarios, has undergone a numberof changes from its original specification inorder to deal with the challenges imposed bycity-wide wireless mesh networks. Whilesome of its components proved to beunsuitable in practice (like MPR andHysterese) new mechanisms have beenadded (like Fish-eye and ETX). However,due to the constant growth of existing

    community mesh networks and because ofthe inherent requirement of a link-state

    algorithm to recalculate the whole topology-graph (a particularly challenging task for thelimited capabilities of embedded routerHW), the limits of this algorithm havebecome a challenge. Recalculating the whole

    topology graph once in an actual mesh with450 nodes takes several seconds on a smallembedded CPU.

    The approach of the B.A.T.M.A.N algorithmis to divide the knowledge about the bestend-to-end paths between nodes in the meshto all participating nodes. Each nodeperceives and maintains only the informationabout the best next hop towards all othernodes. Thereby the need for a global

    knowledge about local topology changesbecomes unnecessary. Additionally, anevent-based but timelessfootnote{timeless inthe sense that B.A.T.M.A.N never schedulesnor timeouts topology information foroptimising it's routing decisions} floodingmechanism prevents the accruement ofcontradicting topology information (theusual reason for the existence of routingloops) and limits the amount of topologymessages flooding the mesh (thus avoidingoverly overhead of control-traffic). Thealgorithm is designed to deal with networksthat are based on unreliable links.

    The protocol algorithm of B.A.T.M.A.N canbe described (simplified) as follows. Eachnode transmits broadcast messages (we callthem originator messages or OGMs) toinform the neighbouring nodes about itsexistence. These neighbours are re-

    broadcasting the OGMs According tospecific rules to inform their neighboursabout the existence of the original initiator ofthis message and so on and so forth. Thus thenetwork is flooded with originator messages.OGMs are small; the typical raw packet sizeis 52 byte including IP and UDP overhead.OGMs contain at least the address of theoriginator, the address of the nodetransmitting the packet, a TTL and asequence number.

  • 8/6/2019 B.A.T.M.A.N._v1.5

    5/8

    OGMs that follow a path where the qualityof wireless links is poor or saturated willsuffer from packetloss or delay on their waythrough the mesh. Therefore OGMs thattravel on good routes will propagate faster

    and more reliable.

    In order to tell if an OGM has been receivedonce or more than once it contains asequence number, given by the originator ofthe OGM. Each node re-broadcasts eachreceived OGM at most once and only thosereceived from the neighbour which has beenidentified as the currently best next hop (bestranking neighbour) towards the originalinitiator of the OGM.

    This way the OGMs are flooded selectivelythrough the mesh and inform the receivingnodes about other node's existence. A nodeX will learn about the existence of a node Yin the distance by receiving it's OGMs?,when OGMs of node Y are rebroadcasted byits single hop neighbours. If node X hasmore than one neighbour, it can tell by thenumber of originator messages it receivesquicker and more reliable via one of itssingle hop neighbours, which neighbour ithas to choose to send data to the distantnode.

    The algorithm then selects this neighbour asthe currently best next hop to the originatorof the message and configures its routingtable respectively.

    VI.The B.A.T.M.A.N.

    The applications of these networks areseemingly unlimited. From householdappliances to offices and from the trafficscenario to battlefields these networks proveto be a boon. A sensor network iscollaborated with the Ad-Hoc network tosimplify human effort providing securityfactor inbuilt. Household appliances anddevices can be connected using any type ofwired or unwired network. Say, Bluetooth or

    for larger areas; Wi-Fi. These networks canbe programmed to identify a master switch

    which can be a mobile phone, wristwatch ora chip inserted in the human body via asimple surgery. The on identifying themaster switch in the vicinity of their networkcan be used to perform tasks in a pre-

    programmed fashion.

    Our current innovation is using this networkin the traffic scenario. Using simple sensorslike photodiode, photo transistor, L.D.R.,ultrasonic and IRs etc. The distance betweentwo vehicles is to be measured. The criticaldistance is to be pre-programmed, which canbe a length of 1m-3m as a standard. If thecritical level is crossed, an override is

    functioned along with connection from alocal server. On examining the completescenario, either of the cars is made to recedeor speed up until the critical levels arecrossed back. Using further research, thevehicles can be made to communicatebetween themselves and resolve these issues.

    VII. The Gizmo

    With a smart home, you could quiet all of

    these worries with a quick trip online. Whenyou're home, the house takes care of you byplaying your favourite song whenever youwalk in or instantaneously dimming thelights for a movie. Is it magic? No, it's homeautomation. Smart homes connect all thedevices and appliances in your home so theycan communicate with each other and withyou.

    Anything in your home that uses electricity

    can be put on the home networkand at yourcommand. Whether you give that command

    http://science.howstuffworks.com/electricity.htmhttp://computer.howstuffworks.com/home-network.htmhttp://computer.howstuffworks.com/home-network.htmhttp://science.howstuffworks.com/electricity.htm
  • 8/6/2019 B.A.T.M.A.N._v1.5

    6/8

    by voice, remote control or computer, thehome reacts. Most applications relate tolighting, home security, home theatre andentertainment and thermostat regulation.

    VIII. Smart Home Software andTechnology

    Smart home technology was developed in1975, when a company in Scotlanddeveloped X10. X10 allows compatibleproducts to talk to each other over thealready existing electrical wires of a home.All the appliances and devices are receivers,and the means of controlling the system,such as remote controls or keypads, are

    transmitters. If you want to turn off a lamp inanother room, the transmitter will issue amessage in numerical code that includes thefollowing:

    An alert to the system that it's issuinga command,

    An identifying unit number for thedevice that should receive thecommand and

    A code that contains the actualcommand, such as "turn off."

    All of this is designed to happen in less thana second, but X10 does have somelimitations. Communicating over electricallines is not always reliable because the linesget "noisy" from powering other devices. AnX10 device could interpret electronicinterference as a command and react, or itmight not receive the command at all. While

    X10 devices are still around, othertechnologies have emerged to compete foryour home networking dollar.

    Instead of going through the power lines,some systems use radio waves tocommunicate, which is also how WiFi andcell phone signals operate. However, homeautomation networks don't need all the juiceof a WiFi network because automationcommands are short messages. The two most

    prominent radio networks in homeautomation are ZigBee and Z-Wave. Both of

    meaning there's more than one way for themessage to get to its destination.

    The green and red dots represent devices thatcould be connected to your smart home

    network.

    Z-Wave uses a Source Routing Algorithm todetermine the fastest route for messages.Each Z-Wave device is embedded with acode, and when the device is plugged intothe system, the network controller recognizesthe code, determines its location and adds itto the network. When a command comesthrough, the controller uses the algorithm todetermine how the message should be sent.

    Because this routing can take up a lot ofmemory on a network, Z-Wave hasdeveloped a hierarchy between devices:Some controllers initiate messages, and someare "slaves," which means they can onlycarry and respond to messages.

    ZigBee's name illustrates the meshnetworking concept because messages fromthe transmitter zigzag like bees, looking forthe best path to the receiver. While Z-Waveuses a proprietary technology for operatingits system, ZigBee's platform is based on thestandard set by the Institute for Electrical andElectronics Engineers (IEEE) for wirelesspersonal networks. This means any companycan build a ZigBee-compatible productwithout paying licensing fees for thetechnology behind it, which may eventuallygive ZigBee an advantage in themarketplace. Like Z-Wave, ZigBee has fully

    functional devices (or those that route themessage) and reduced function devices (orthose that don't).

    Using a wireless network provides moreflexibility for placing devices, but likeelectrical lines, they might have interference.Insteon offers a way for your home networkto communicate over both electrical wiresand radio waves, making it a dual meshnetwork. If the message isn't getting through

    on one platform, it will try the other. Insteadof routing the message, an Insteon device

    http://computer.howstuffworks.com/pc.htmhttp://home.howstuffworks.com/home-thermostat.htmhttp://computer.howstuffworks.com/home-network.htmhttp://electronics.howstuffworks.com/radio.htmhttp://electronics.howstuffworks.com/cell-phone.htmhttp://computer.howstuffworks.com/wireless-network.htmhttp://computer.howstuffworks.com/wireless-network.htmhttp://electronics.howstuffworks.com/cell-phone.htmhttp://electronics.howstuffworks.com/radio.htmhttp://computer.howstuffworks.com/home-network.htmhttp://home.howstuffworks.com/home-thermostat.htmhttp://computer.howstuffworks.com/pc.htm
  • 8/6/2019 B.A.T.M.A.N._v1.5

    7/8

    will broadcast the message, and all devicespick up the message and broadcast it untilthe command is performed. The devices actlike peers, as opposed to one serving as aninstigator and another as a receptor. This

    means that the more Insteon devices that areinstalled on a network, the stronger themessage will be.

    IX. Smart Traffic, Smart Planet

    In 2007, the world crossed an epochalthreshold. For the first time in history, themajority of the human population lived incities. And this urbanisation is accelerating.By 2010, there will be 59 metropolitan areas

    with populations greater than five millionup 50% from 2001.

    Many of those new city dwellers will bedriving cars, and the products they consumewill be arriving in trucks. So if you thinkyour day is plagued by gridlock now, what

    might the future hold?

    Quite simply, our transportationinfrastructure and management approachescan't handle the world's traffic. In the U.S.alone, 3.7 billion hours are lost to peoplesitting in traffic every year, and 2.3 billiongallons of fuel - enough to fill 58supertankersburn needlessly, at a cost of$78 billion per year.

    This isn't smartbut it can become so. Thesystemic nature of urban transportation is

    also the key to its solution. We need to stopfocusing only on pieces of the problem:adding a new bridge, widening a road,putting up signs, establishing commuterlanes, encouraging carpooling or deploying

    traffic copters.

    Instead, we need to look at relationshipsacross the entire system - and all the othersystems that are touched by it: our supplychains, our environment, our companies...theway people and cities live and work. Trafficisn't just a line of cars: it's a web ofconnections.

    "Smart traffic" isn't yet the normbut it's

    not some far-off vision of tomorrow. Inmany places, IBM is helping to make ithappen today.

    In Stockholm, a dynamic toll system basedon the flow of vehicles into and out of thecity has reduced traffic by 20%, decreasedwait time by 25% and cut emissions by 12%.In Singapore, controllers receive real-timedata through sensors to model and predicttraffic scenarios with 90% accuracy. And inKyoto, city planners simulate large-scaletraffic situations involving millions ofvehicles to analyse urban impact.

    All of this is possible because cities caninfuse intelligence into their entiretransportation systemstreets, bridges,intersections, signs, signals and tolls, whichcan all be interconnected and made smarter.Smarter traffic systems can improve drivers'

    commutes, give better information to cityplanners, increase the productivity ofbusinesses and raise citizens' quality of life.They can reduce congestion, shrink fuel useand cut CO2 emissions.

    Our rapidly urbanising planet depends ongetting people and things from here to there.In the 20th century, that meant freewaysfrom state to state and nation to nation. In the21st century, "smart" traffic systems can be

    the new milestone of progress.

  • 8/6/2019 B.A.T.M.A.N._v1.5

    8/8

    X. Conclusions

    We have used a simple RF module workingat 434MHz for point to point as well as pointto multi-point communication. Using a

    motor driver in the circuit helps to controlany type of motor at its optimum value. Thetransmitter contains the RF chip, IC-Multiplexer. The receiver end has thereceiver and two ICs, demultiplexer and themotor driver IC. The multiplexer acts as theencoder and demux acts as the decoder. Theencoder sends in encrypted signals to thedecoder via the RF. These signals are thenappropriately processed by the decoder.Using simple circuits, it is thus possible to

    provide robotic artificial intelligence to thesecircuits which have limitless uses. We areusing two frequencies 434MHz and312MHz. Efforts are on to take this to2.4GHz. This will induce security featureand transmission can be encrypted.

    XI. References

    www.antd.nist.gov http://www.open-mesh.net/ http://www.pcmag.com/encyclopedia

    _term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htm

    M. Abolhasan, B. Hagelstein, J. C.-P.Wang (2009). Real-world

    performance of current proactive

    multi-hop mesh protocols.http://ro.uow.edu.au/infopapers/736/.

    J. Chroboczek. "A few comments onthe BATMAN routing protocol".http://lists.alioth.debian.org/pipermail

    /babel-users/2008-August/000151.html.

    Chapters 8-11, F. Adelstein, S.K.S.Gupta, G.G. Richard III and L.Schwiebert, Fundamentals of Mobile

    and Pervasive. Cti M G Hill 2005Computing, McGraw Hill, 2005.

    Tomas Krag and Sebastian Bettrich(2004-01-24). "Wireless Mesh

    Networking". O'Reilly Wireless DevCenter.http://www.oreillynet.com/pub/a/wireless/2004/01/22/wirelessmesh.html.Retrieved 2009-01-20.

    M. Abolhasan, B. Hagelstein, J. C.-P.Wang (2009). Real-world

    performance of current proactive

    multi-hop mesh protocols.http://ro.uow.edu.au/infopapers/736/.

    J. Chroboczek. "A few comments onthe BATMAN routing protocol".http://lists.alioth.debian.org/pipermail

    /babel-users/2008-August/000151.html.

    http://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.html

    http://www.antd.nist.gov/http://www.open-mesh.net/http://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://www.open-mesh.net/http://www.antd.nist.gov/