B.A.T.M.A.N._v1.5
-
Upload
abhijeet-khandagale -
Category
Documents
-
view
219 -
download
0
Transcript of B.A.T.M.A.N._v1.5
-
8/6/2019 B.A.T.M.A.N._v1.5
1/8
B.A.T.M.A.N.: Better Approach To Mobile AD-HOC Networks.
Mr. Abhijeet Khandagale#1, Mr. Gaurav Gupta#2#1MechanicalEngg., #2 Electronics & Telecom Engg
G. H. Raisoni College Of Engineering,
CRPF Gate, Digdoh Hills, Nagpur, Maharastra, [email protected]
+91-97660723081+91-94221767742
ABSTRACT
In the next generation of wireless
communication systems, there will be a need
for the rapid deployment of independent
mobile users. Significant examples include
establishing survivable, efficient, dynamic
communication for emergency/rescue
operations, disaster relief efforts, and
military networks. Such network scenarios
cannot rely on centralized and organized
connectivity, and can be conceived as
applications of Mobile Ad Hoc Networks.
In B.A.T.M.A.N. we bring forth the newarenas of applied MANETs, i.e. Mobile Ad-
Hoc Networks. The smart technologies
intertwined with the existing, but unknown
wireless networks, has been tapped to
produce a new approach towards these Ad-
Hoc networks. The factors affecting them are
discussed as well as the futuristic
applications, which is a part of a hands-on
project.
MANET is an autonomous collection ofmobile users that communicate over
relatively bandwidth constrained wireless
links. The set of applications for MANETs is
diverse, ranging from small, static networks
that are constrained by power sources, to
large-scale, mobile, highly dynamic
networks. The design of network protocols
for these networks is a complex issue.
Factors such as variable wireless link
quality, propagation path loss, fading,multiuser interference, power expended, and
topological changes, become relevant issues.
The network is able to adaptively alter the
routing paths to alleviate any of these effects.
Military networks are designed to maintain a
low probability of intercept and/or a lowprobability of detection.
The Better Approach To Mobile Ad-Hoc
Networking, or B.A.T.M.A.N., is a routing
protocol which is currently under
development by the Freifunk-Community.
B.A.T.M.A.N.'s crucial point is the
decentralization of the knowledge about the
best route through the network.
B.A.T.M.A.N. has been shown to exhibit high
levels of stability but slightly slow
convergence times in real-world conditions;
this is confirmed by theoretical analysis.
Using this technique in our ongoing research
on Communicating Robots or as we call
them - COMBOTS; we attempt to
demonstrate techniques which allow realistic
explorations concerning the evolution of
robot intelligence to respond to realworld entities.
Our knowledge about the scope of MANETs
has been applied to incorporate the current
traffic control system with the applications of
Ad-Hoc Networks using trans-receiver sets.
The current traffic system works on timed
coding which needs to be altered if a
situation arises, which is not viable every
time. Hence we propose to switch to a more
lexible method using B.A.T.M.A.N.
-
8/6/2019 B.A.T.M.A.N._v1.5
2/8
The age of the smart tech is in. So this
scenario can be applied virtually as well
physically in any environment. The range
though contained for a device has a limit,
this concept has limitless possibilities. Here
dawns the age of the B.A.T.M.A.N.!!
I.Introduction
With recent performance advancements incomputer and wireless communicationstechnologies, advanced mobile wirelesscomputing is expected to see increasinglywidespread use and application, much ofwhich will involve the use of the Internet
Protocol (IP) suite. Such networks areenvisioned to have dynamic, sometimesrapidly-changing, random, multihoptopologies which are likely composed ofrelatively bandwidth-constrained wirelesslinks. A mobile ad-hoc network is acollection of mobile nodes forming an ad-hoc network without the assistance of anycentralized structures. These networksintroduced a new art of networkestablishment and can be well suited for anenvironment where either the infrastructureis lost or where deploy an infrastructure isnot very cost effective. The whole life-cycleof ad-hoc networks could be categorized intothe first, second, and the third generation ad-hoc networks systems. Present ad-hocnetworks systems are considered the thirdgeneration.
II.History
The task was to create a protocol which wasto be as easy, as small and as fast as possible.It seemed therefore sensible to split thedevelopment in several phases andimplement complex functions using aniterative process:
The first generation goes back to 1972. Atthe time, they were called PRNET (PacketRadio Networks). In conjunction with
ALOHA (Areal Locations of HazardousAtmospheres) and CSMA (Carrier Sense
Medium Access), approaches for mediumaccess control and a kind of distance-vectorrouting PRNET were used on a trial basis toprovide different networking capabilities in acombat environment.
The second generation of ad-hoc networksemerged in 1980s, when the ad-hoc networksystems were further enhanced andimplemented as a part of the SURAN(Survivable Adaptive Radio Networks)program. This provided a packet-switchednetwork to the mobile battlefield in anenvironment without infrastructure. Thisprogram proved to be beneficial inimproving the radios' performance by
making them smaller, cheaper, and resilientto electronic attacks.
In the 1990s, the concept of commercial ad-hoc networks arrived with notebookcomputers and other viable communicationsequipment. At the same time, the idea of acollection of mobile nodes was proposed atseveral research conferences. The IEEE802.11 subcommittee had adopted the term"ad-hoc networks" and the researchcommunity had started to look into thepossibility of deploying ad-hoc networks inother areas of application.
III. Operation
B.A.T.M.A.N. does have elements ofclassical routing protocols: It detects otherB.A.T.M.A.N. nodes and finds the best way(route) to these. It also keeps track of new
nodes and informs its neighbours about theirexistence.
In static networks, network administrators ortechnicians decide which computer isreached via which way or cable. As radionetworks undergo constant changes and lowparticipation-thresholds are a vital part of theFreifunk-networks' foundation this taskhas to be automated as far as possible.
On a regular basis, every node sends out a socalled broadcast (a general message to all)
http://en.wikipedia.org/wiki/Network_protocolhttp://en.wikipedia.org/wiki/Network_administratorhttp://en.wikipedia.org/wiki/Radio_networkhttp://en.wikipedia.org/wiki/Radio_networkhttp://en.wikipedia.org/wiki/Radio_networkhttp://en.wikipedia.org/wiki/Radio_networkhttp://en.wikipedia.org/wiki/Radio_networkhttp://en.wikipedia.org/wiki/Network_administratorhttp://en.wikipedia.org/wiki/Network_protocol -
8/6/2019 B.A.T.M.A.N._v1.5
3/8
thereby informing all its neighbours about itsexistence. The neighbours then relay thismessage to their neighbours and so on and soforth. This carries the information to everynode in the network. In order to find the best
way to a certain node, B.A.T.M.A.N countsthe originator-messages received and logswhich neighbour the message came inthrough.
Like distance-vector protocols, but unlikelink-state protocols, B.A.T.M.A.N does nottry to determine the whole way, but, by usingthe originator-messages, only the package'sfirst step in the right direction. The data ishanded over to the next neighbour in that
direction, who in turn uses the samemechanism. This process is repeated until thedata reaches its destination.
Besides for radio networks, B.A.T.M.A.Ncan also be used with common cableconnections, such as Ethernet.
i. Version oneIn the first phase, the routing algorithm wasimplemented and tested for its practicalityand suitability for the task at hand. For thesending and receiving of originator-messages(information about existence) the UDP port1966 was chosen.
ii. Version twoThe version one algorithm made a significantassumption: As soon as a node receives
existence data from another node, it assumesit can also send data back. In radio networkshowever, it may very well be that only one-way communication is possible. Amechanism was incorporated into theprotocol to allow for this and to solve thearising problems. The mechanism enablesthe node to determine whether aneighbouring node provides bidirectionalcommunication, only bidirectional nodesbeing considered part of the network, one-
way nodes are no longer fully included.
iii. Version threeThe greatest innovation in this version isB.A.T.M.A.N's support of multiple networkdevices. Now a computer or router running
B.A.T.M.A.N can be deployed on a centralpoint, like a church or another high building,and have several wired or wireless networkinterfaces attached to it. When so deployed,B.A.T.M.A.N can relay network data inmore than one direction without anyretransmission delay.
Certain unusual phenomena and specialcircumstances could appear during thedetermination of the best route through the
network. These have been tackled andcounteracted to prevent circular routing(which can prevent data reaching itsdestination) from occurring.
A node can now inform the network that itprovides access to the Internet. Other nodesuse that information to evaluate whetherthere is a connection to the Internet close tothem and what bandwidth is available. Theycan either use a specific gateway or allowB.A.T.M.A.N to determine which gateway touse, based on criteria such as connectionspeed.
Announcing devices not runningB.A.T.M.A.N themselves was also includedin this version. Usually this method is usedto connect house-networks to mesh-networks. An antenna installation on the roofwill connect to the wireless network through
B.A.T.M.A.N and the rest of the house willsimply be announced thus also be reachable.
IV.Application
At present, as wireless-communicationtechnology for intelligent transport systems(ITS), various techniques are being activelyresearched. "Vehicle-to-vehiclecommunication" (i.e., between similar car-mounted devices fitted with wireless-
communication functions such as wirelessLAN and mobile phones in cars) and "road-
http://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Algorithmhttp://en.wikipedia.org/wiki/User_Datagram_Protocolhttp://en.wikipedia.org/wiki/Network_hardwarehttp://en.wikipedia.org/wiki/Network_hardwarehttp://en.wikipedia.org/wiki/Bandwidth_%28computing%29http://en.wikipedia.org/wiki/Gatewayhttp://en.wikipedia.org/wiki/Gatewayhttp://en.wikipedia.org/wiki/Bandwidth_%28computing%29http://en.wikipedia.org/wiki/Network_hardwarehttp://en.wikipedia.org/wiki/Network_hardwarehttp://en.wikipedia.org/wiki/Network_hardwarehttp://en.wikipedia.org/wiki/User_Datagram_Protocolhttp://en.wikipedia.org/wiki/Algorithmhttp://en.wikipedia.org/wiki/Ethernet -
8/6/2019 B.A.T.M.A.N._v1.5
4/8
to-vehicle communication" (i.e., fromservice-centre servers connected through theinternet via base stations located along theroadside to provide information delivery andremote-diagnosis services for cars) are being
demanded (see Figure 1).
These Vehicle to vehicle communication
better can be defined as P2P Communicationranges from cars to aircrafts. The MANETshave applications in our household, offices,roads and every single place we can think of,which has multiple things or networksaround it. Households and offices usecordless phones, intranet, LAN, etc. Roadsuse smart driving techniques and navigationsystems.
V.B.A.T.M.A.N. Overview
The problem with classical routing protocolsis that they are typically not well suited forwireless ad-hoc networks. This is becausesuch networks are unstructured, dynamicallychange their topology, and are based on aninherently unreliable medium.
OLSR, the currently most employed protocolfor such scenarios, has undergone a numberof changes from its original specification inorder to deal with the challenges imposed bycity-wide wireless mesh networks. Whilesome of its components proved to beunsuitable in practice (like MPR andHysterese) new mechanisms have beenadded (like Fish-eye and ETX). However,due to the constant growth of existing
community mesh networks and because ofthe inherent requirement of a link-state
algorithm to recalculate the whole topology-graph (a particularly challenging task for thelimited capabilities of embedded routerHW), the limits of this algorithm havebecome a challenge. Recalculating the whole
topology graph once in an actual mesh with450 nodes takes several seconds on a smallembedded CPU.
The approach of the B.A.T.M.A.N algorithmis to divide the knowledge about the bestend-to-end paths between nodes in the meshto all participating nodes. Each nodeperceives and maintains only the informationabout the best next hop towards all othernodes. Thereby the need for a global
knowledge about local topology changesbecomes unnecessary. Additionally, anevent-based but timelessfootnote{timeless inthe sense that B.A.T.M.A.N never schedulesnor timeouts topology information foroptimising it's routing decisions} floodingmechanism prevents the accruement ofcontradicting topology information (theusual reason for the existence of routingloops) and limits the amount of topologymessages flooding the mesh (thus avoidingoverly overhead of control-traffic). Thealgorithm is designed to deal with networksthat are based on unreliable links.
The protocol algorithm of B.A.T.M.A.N canbe described (simplified) as follows. Eachnode transmits broadcast messages (we callthem originator messages or OGMs) toinform the neighbouring nodes about itsexistence. These neighbours are re-
broadcasting the OGMs According tospecific rules to inform their neighboursabout the existence of the original initiator ofthis message and so on and so forth. Thus thenetwork is flooded with originator messages.OGMs are small; the typical raw packet sizeis 52 byte including IP and UDP overhead.OGMs contain at least the address of theoriginator, the address of the nodetransmitting the packet, a TTL and asequence number.
-
8/6/2019 B.A.T.M.A.N._v1.5
5/8
OGMs that follow a path where the qualityof wireless links is poor or saturated willsuffer from packetloss or delay on their waythrough the mesh. Therefore OGMs thattravel on good routes will propagate faster
and more reliable.
In order to tell if an OGM has been receivedonce or more than once it contains asequence number, given by the originator ofthe OGM. Each node re-broadcasts eachreceived OGM at most once and only thosereceived from the neighbour which has beenidentified as the currently best next hop (bestranking neighbour) towards the originalinitiator of the OGM.
This way the OGMs are flooded selectivelythrough the mesh and inform the receivingnodes about other node's existence. A nodeX will learn about the existence of a node Yin the distance by receiving it's OGMs?,when OGMs of node Y are rebroadcasted byits single hop neighbours. If node X hasmore than one neighbour, it can tell by thenumber of originator messages it receivesquicker and more reliable via one of itssingle hop neighbours, which neighbour ithas to choose to send data to the distantnode.
The algorithm then selects this neighbour asthe currently best next hop to the originatorof the message and configures its routingtable respectively.
VI.The B.A.T.M.A.N.
The applications of these networks areseemingly unlimited. From householdappliances to offices and from the trafficscenario to battlefields these networks proveto be a boon. A sensor network iscollaborated with the Ad-Hoc network tosimplify human effort providing securityfactor inbuilt. Household appliances anddevices can be connected using any type ofwired or unwired network. Say, Bluetooth or
for larger areas; Wi-Fi. These networks canbe programmed to identify a master switch
which can be a mobile phone, wristwatch ora chip inserted in the human body via asimple surgery. The on identifying themaster switch in the vicinity of their networkcan be used to perform tasks in a pre-
programmed fashion.
Our current innovation is using this networkin the traffic scenario. Using simple sensorslike photodiode, photo transistor, L.D.R.,ultrasonic and IRs etc. The distance betweentwo vehicles is to be measured. The criticaldistance is to be pre-programmed, which canbe a length of 1m-3m as a standard. If thecritical level is crossed, an override is
functioned along with connection from alocal server. On examining the completescenario, either of the cars is made to recedeor speed up until the critical levels arecrossed back. Using further research, thevehicles can be made to communicatebetween themselves and resolve these issues.
VII. The Gizmo
With a smart home, you could quiet all of
these worries with a quick trip online. Whenyou're home, the house takes care of you byplaying your favourite song whenever youwalk in or instantaneously dimming thelights for a movie. Is it magic? No, it's homeautomation. Smart homes connect all thedevices and appliances in your home so theycan communicate with each other and withyou.
Anything in your home that uses electricity
can be put on the home networkand at yourcommand. Whether you give that command
http://science.howstuffworks.com/electricity.htmhttp://computer.howstuffworks.com/home-network.htmhttp://computer.howstuffworks.com/home-network.htmhttp://science.howstuffworks.com/electricity.htm -
8/6/2019 B.A.T.M.A.N._v1.5
6/8
by voice, remote control or computer, thehome reacts. Most applications relate tolighting, home security, home theatre andentertainment and thermostat regulation.
VIII. Smart Home Software andTechnology
Smart home technology was developed in1975, when a company in Scotlanddeveloped X10. X10 allows compatibleproducts to talk to each other over thealready existing electrical wires of a home.All the appliances and devices are receivers,and the means of controlling the system,such as remote controls or keypads, are
transmitters. If you want to turn off a lamp inanother room, the transmitter will issue amessage in numerical code that includes thefollowing:
An alert to the system that it's issuinga command,
An identifying unit number for thedevice that should receive thecommand and
A code that contains the actualcommand, such as "turn off."
All of this is designed to happen in less thana second, but X10 does have somelimitations. Communicating over electricallines is not always reliable because the linesget "noisy" from powering other devices. AnX10 device could interpret electronicinterference as a command and react, or itmight not receive the command at all. While
X10 devices are still around, othertechnologies have emerged to compete foryour home networking dollar.
Instead of going through the power lines,some systems use radio waves tocommunicate, which is also how WiFi andcell phone signals operate. However, homeautomation networks don't need all the juiceof a WiFi network because automationcommands are short messages. The two most
prominent radio networks in homeautomation are ZigBee and Z-Wave. Both of
meaning there's more than one way for themessage to get to its destination.
The green and red dots represent devices thatcould be connected to your smart home
network.
Z-Wave uses a Source Routing Algorithm todetermine the fastest route for messages.Each Z-Wave device is embedded with acode, and when the device is plugged intothe system, the network controller recognizesthe code, determines its location and adds itto the network. When a command comesthrough, the controller uses the algorithm todetermine how the message should be sent.
Because this routing can take up a lot ofmemory on a network, Z-Wave hasdeveloped a hierarchy between devices:Some controllers initiate messages, and someare "slaves," which means they can onlycarry and respond to messages.
ZigBee's name illustrates the meshnetworking concept because messages fromthe transmitter zigzag like bees, looking forthe best path to the receiver. While Z-Waveuses a proprietary technology for operatingits system, ZigBee's platform is based on thestandard set by the Institute for Electrical andElectronics Engineers (IEEE) for wirelesspersonal networks. This means any companycan build a ZigBee-compatible productwithout paying licensing fees for thetechnology behind it, which may eventuallygive ZigBee an advantage in themarketplace. Like Z-Wave, ZigBee has fully
functional devices (or those that route themessage) and reduced function devices (orthose that don't).
Using a wireless network provides moreflexibility for placing devices, but likeelectrical lines, they might have interference.Insteon offers a way for your home networkto communicate over both electrical wiresand radio waves, making it a dual meshnetwork. If the message isn't getting through
on one platform, it will try the other. Insteadof routing the message, an Insteon device
http://computer.howstuffworks.com/pc.htmhttp://home.howstuffworks.com/home-thermostat.htmhttp://computer.howstuffworks.com/home-network.htmhttp://electronics.howstuffworks.com/radio.htmhttp://electronics.howstuffworks.com/cell-phone.htmhttp://computer.howstuffworks.com/wireless-network.htmhttp://computer.howstuffworks.com/wireless-network.htmhttp://electronics.howstuffworks.com/cell-phone.htmhttp://electronics.howstuffworks.com/radio.htmhttp://computer.howstuffworks.com/home-network.htmhttp://home.howstuffworks.com/home-thermostat.htmhttp://computer.howstuffworks.com/pc.htm -
8/6/2019 B.A.T.M.A.N._v1.5
7/8
will broadcast the message, and all devicespick up the message and broadcast it untilthe command is performed. The devices actlike peers, as opposed to one serving as aninstigator and another as a receptor. This
means that the more Insteon devices that areinstalled on a network, the stronger themessage will be.
IX. Smart Traffic, Smart Planet
In 2007, the world crossed an epochalthreshold. For the first time in history, themajority of the human population lived incities. And this urbanisation is accelerating.By 2010, there will be 59 metropolitan areas
with populations greater than five millionup 50% from 2001.
Many of those new city dwellers will bedriving cars, and the products they consumewill be arriving in trucks. So if you thinkyour day is plagued by gridlock now, what
might the future hold?
Quite simply, our transportationinfrastructure and management approachescan't handle the world's traffic. In the U.S.alone, 3.7 billion hours are lost to peoplesitting in traffic every year, and 2.3 billiongallons of fuel - enough to fill 58supertankersburn needlessly, at a cost of$78 billion per year.
This isn't smartbut it can become so. Thesystemic nature of urban transportation is
also the key to its solution. We need to stopfocusing only on pieces of the problem:adding a new bridge, widening a road,putting up signs, establishing commuterlanes, encouraging carpooling or deploying
traffic copters.
Instead, we need to look at relationshipsacross the entire system - and all the othersystems that are touched by it: our supplychains, our environment, our companies...theway people and cities live and work. Trafficisn't just a line of cars: it's a web ofconnections.
"Smart traffic" isn't yet the normbut it's
not some far-off vision of tomorrow. Inmany places, IBM is helping to make ithappen today.
In Stockholm, a dynamic toll system basedon the flow of vehicles into and out of thecity has reduced traffic by 20%, decreasedwait time by 25% and cut emissions by 12%.In Singapore, controllers receive real-timedata through sensors to model and predicttraffic scenarios with 90% accuracy. And inKyoto, city planners simulate large-scaletraffic situations involving millions ofvehicles to analyse urban impact.
All of this is possible because cities caninfuse intelligence into their entiretransportation systemstreets, bridges,intersections, signs, signals and tolls, whichcan all be interconnected and made smarter.Smarter traffic systems can improve drivers'
commutes, give better information to cityplanners, increase the productivity ofbusinesses and raise citizens' quality of life.They can reduce congestion, shrink fuel useand cut CO2 emissions.
Our rapidly urbanising planet depends ongetting people and things from here to there.In the 20th century, that meant freewaysfrom state to state and nation to nation. In the21st century, "smart" traffic systems can be
the new milestone of progress.
-
8/6/2019 B.A.T.M.A.N._v1.5
8/8
X. Conclusions
We have used a simple RF module workingat 434MHz for point to point as well as pointto multi-point communication. Using a
motor driver in the circuit helps to controlany type of motor at its optimum value. Thetransmitter contains the RF chip, IC-Multiplexer. The receiver end has thereceiver and two ICs, demultiplexer and themotor driver IC. The multiplexer acts as theencoder and demux acts as the decoder. Theencoder sends in encrypted signals to thedecoder via the RF. These signals are thenappropriately processed by the decoder.Using simple circuits, it is thus possible to
provide robotic artificial intelligence to thesecircuits which have limitless uses. We areusing two frequencies 434MHz and312MHz. Efforts are on to take this to2.4GHz. This will induce security featureand transmission can be encrypted.
XI. References
www.antd.nist.gov http://www.open-mesh.net/ http://www.pcmag.com/encyclopedia
_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htm
M. Abolhasan, B. Hagelstein, J. C.-P.Wang (2009). Real-world
performance of current proactive
multi-hop mesh protocols.http://ro.uow.edu.au/infopapers/736/.
J. Chroboczek. "A few comments onthe BATMAN routing protocol".http://lists.alioth.debian.org/pipermail
/babel-users/2008-August/000151.html.
Chapters 8-11, F. Adelstein, S.K.S.Gupta, G.G. Richard III and L.Schwiebert, Fundamentals of Mobile
and Pervasive. Cti M G Hill 2005Computing, McGraw Hill, 2005.
Tomas Krag and Sebastian Bettrich(2004-01-24). "Wireless Mesh
Networking". O'Reilly Wireless DevCenter.http://www.oreillynet.com/pub/a/wireless/2004/01/22/wirelessmesh.html.Retrieved 2009-01-20.
M. Abolhasan, B. Hagelstein, J. C.-P.Wang (2009). Real-world
performance of current proactive
multi-hop mesh protocols.http://ro.uow.edu.au/infopapers/736/.
J. Chroboczek. "A few comments onthe BATMAN routing protocol".http://lists.alioth.debian.org/pipermail
/babel-users/2008-August/000151.html.
http://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.html
http://www.antd.nist.gov/http://www.open-mesh.net/http://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://www-07.ibm.com/ibm/ideasfromibm/in/smarterplanet/opinions/opinion_20081201.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://lists.alioth.debian.org/pipermail/babel-users/2008-August/000151.htmlhttp://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://ro.uow.edu.au/infopapers/736/http://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://www.pcmag.com/encyclopedia_term/0,2542,t=mobile+ad+hoc+network&i=47135,00.asp.htmhttp://www.open-mesh.net/http://www.antd.nist.gov/