Efficient Peer-to-Peer Data Dissemination in Mobile Ad-Hoc Networks
ICPPW '02 Proceedings of the 2002 International Conference on Parallel Processing Workshops
Convoy Driving through Ad-Hoc Coalition Formation
RTAS '05 Proceedings of the 11th IEEE Real Time on Embedded Technology and Applications Symposium
Dissemination asynchrone d'information en mode peer-to-peer dans les réseaux ad-hoc
UbiMob '04 Proceedings of the 1st French-speaking conference on Mobility and ubiquity computing
CenWits: a sensor-based loosely coupled search and rescue system using witnesses
Proceedings of the 3rd international conference on Embedded networked sensor systems
MANET Protocol for Information Gathering from Disaster Victims
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
CTS '06 Proceedings of the International Symposium on Collaborative Technologies and Systems
Hi-index | 0.00 |
Operation fields often give rise to situations where communication has to be carried out without any infrastructure. One of the solutions that can be used to support this context is based on mobile ad hoc networks (MANets). We believe that when this kind of versatile architecture is considered it is necessary to have dedicated services that take their context into account and still work in case the network is slow or even broken, instead of relying on a routing layer. Situation management and more precisely battlefield situation management can thus still be supported in spite of poor communication conditions. The application that we present in this paper illustrates this approach. It makes it possible to share a map of the battlefield between soldiers. Its major originalities are that it is totally decentralized and that it handles what we call active information. Active information are information that are updated by the different entities of the network. Applications that use active information have never been experimented in a military context. Two major difficulties when designing such applications are to clearly define their context of use and the associated limitations, and to provide a significant evaluation. We address these problems in this paper, based on our prototype implementation.