Mobile ad hoc network

Last updated

A mobile ad hoc network (MANET), also known as wireless ad hoc network [1] or ad hoc wireless network, is a continuously self-configuring, infrastructure-less network of mobile devices connected wirelessly. [2] [3]

A wireless ad hoc network (WANET) or MANET is a decentralised type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, so the determination of which nodes forward data is made dynamically on the basis of network connectivity and the routing algorithm in use.

Computer network collection of autonomous computers interconnected by a single technology

A computer network is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections between nodes. These data links are established over cable media such as wires or optic cables, or wireless media such as Wi-Fi.

Contents

Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. [4] Such networks may operate by themselves or may be connected to the larger Internet. They may contain one or multiple and different transceivers between nodes. This results in a highly dynamic, autonomous topology. [4]

Router (computing) Device that forwards data packets between computer networks, creating an overlay internetwork

A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. Data sent through the internet, such as a web page or email, is in the form of data packets. A packet is typically forwarded from one router to another router through the networks that constitute an internetwork until it reaches its destination node.

Internet Global system of connected computer networks

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing.

MANETs are a kind of wireless ad hoc network (WANET) that usually has a routable networking environment on top of a Link Layer ad hoc network. MANETs consist of a peer-to-peer, self-forming, self-healing network. MANETs circa 2000–2015 typically communicate at radio frequencies (30 MHz – 5 GHz).

History

A Stanford Research Institute's Packet Radio Van, site of the first three-way internetworked transmission. SRI Packet Radio Van.jpg
A Stanford Research Institute's Packet Radio Van, site of the first three-way internetworked transmission.

The Packet Radio Network (PRNET) was a set of early, experimental mobile ad hoc networks whose technologies evolved over time. It was funded by the Advanced Research Projects Agency (ARPA). Major participants in the project included BBN Technologies, Hazeltine Corporation, Rockwell International's Collins division, and SRI International.

A mobile ad hoc network (MANET), also known as wireless ad hoc network or ad hoc wireless network, is a continuously self-configuring, infrastructure-less network of mobile devices connected wirelessly.

BBN Technologies is an American research and development company, based next to Fresh Pond in Cambridge, Massachusetts, United States.

Hazeltine Corporation company which marketed the Neutrodyne and other electronic equipment

Hazeltine Corporation was a defense electronics company which is now part of BAE Systems Inc.

Initial, large-scale trials of the Near-term digital radio, February 1998. Near-Term Digital Radio (NTDR) trials at Fort Huachuca - February 1998 - 2.jpg
Initial, large-scale trials of the Near-term digital radio, February 1998.

The earliest MANET was called PRNET, the "packet radio" network, and was sponsored by Defense Advanced Research Projects Agency (DARPA) in the early 1970s. Bolt, Beranek and Newman Inc. (BBN) and SRI International designed, built, and experimented with these earliest systems. Experimenters included Robert Kahn, [5] Jerry Burchfiel, and Ray Tomlinson. [6] Similar experiments took place in the amateur radio community with the x25 protocol. These early packet radio systems predated the Internet, and indeed were part of the motivation of the original Internet Protocol suite. Later DARPA experiments included the Survivable Radio Network (SURAN) project, [7] which took place in the 1980s, and the Wireless Network after Next (WNaN) circa 2007-2014. The Near-term digital radio performed trials of networks including over 70 nodes in the late 1990s, and was later fielded in the United States Army.

PRNET

The Packet Radio Network (PRNET) was a set of early, experimental mobile ad hoc networks whose technologies evolved over time. It was funded by the Advanced Research Projects Agency (ARPA). Major participants in the project included BBN Technologies, Hazeltine Corporation, Rockwell International's Collins division, and SRI International.

Bob Kahn American Internet pioneer, engineer and computer scientist

Robert Elliot Kahn is an American electrical engineer, who, along with Vint Cerf, invented the Transmission Control Protocol (TCP) and the Internet Protocol (IP), the fundamental communication protocols at the heart of the Internet.

Ray Tomlinson American computer programmer

Raymond Samuel Tomlinson was a pioneering American computer programmer who implemented the first email program on the ARPANET system, the precursor to the Internet, in 1971; he is internationally known and credited as the inventor of email. It was the first system able to send mail between users on different hosts connected to ARPANET. Previously, mail could be sent only to others who used the same computer. To achieve this, he used the @ sign to separate the user name from the name of their machine, a scheme which has been used in email addresses ever since. The Internet Hall of Fame in its account of his work commented "Tomlinson's email program brought about a complete revolution, fundamentally changing the way people communicate".

The growth of laptops and 802.11/Wi-Fi wireless networking have made MANETs a popular research topic since the mid-1990s. Many academic papers evaluate protocols and their abilities, assuming varying degrees of mobility within a bounded space, usually with all nodes within a few hops of each other. Different protocols are then evaluated based on measures such as the packet drop rate, the overhead introduced by the routing protocol, end-to-end packet delays, network throughput, ability to scale, etc.

Laptop Personal computer for mobile use

A laptop computer is a small, portable personal computer (PC) with a "clamshell" form factor, typically having a thin LCD or LED computer screen mounted on the inside of the upper lid of the clamshell and an alphanumeric keyboard on the inside of the lower lid. The clamshell is opened up to use the computer. Laptops are folded shut for transportation, and thus are suitable for mobile use. Its name comes from lap, as it was deemed to be placed on a person's lap when being used. Although originally there was a distinction between laptops and notebooks, as of 2014, there is often no longer any difference. Laptops are commonly used in a variety of settings, such as at work, in education, for playing games, Internet surfing, for personal multimedia, and general home computer use.

IEEE 802.11 set of media access control (MAC) and physical layer (PHY) specifications

IEEE 802.11 is part of the IEEE 802 set of LAN protocols, and specifies the set of media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) Wi-Fi computer communication in various frequencies, including but not limited to 2.4, 5, and 60 GHz frequency bands.

In computer networking, including the Internet, a hop occurs when a packet is passed from one network segment to the next. Data packets pass through routers as they travel between source and destination. The hop count refers to the number of intermediate devices through which data must pass between source and destination.

Types

Advantages and disadvantages in wireless communication networks

The obvious appeal of MANETs is that the network is decentralised and nodes/devices are mobile, that is to say there is no fixed infrastructure which provides the possibility for numerous applications in different areas such as environmental monitoring [1], [2], disaster relief [3]–[5] and military communications [3]. Since the early 2000s interest in MANETs has greatly increased which, in part, is due to the fact mobility can improve network capacity, shown by Grossglauser and Tse along with the introduction of new technologies. [11]

One main advantage to a decentralised network is that they are typically more robust than centralised networks due to the multi-hop fashion in which information is relayed. For example, in the cellular network setting, a drop in coverage occurs if a base station stops working, however the chance of a single point of failure in a MANET is reduced significantly since the data can take multiple paths. Since the MANET architecture evolves with time it has the potential to resolve issues such as isolation/disconnection from the network. Further advantages of MANETS over networks with a fixed topology include flexibility (an ad hoc network can be created anywhere with mobile devices), scalability (you can easily add more nodes to the network) and lower administration costs (no need to build an infrastructure first). [12] [13]

With these positives follow some obvious draw backs in network performance. With a time evolving network it is clear we should expect variations in network performance due to no fixed architecture (no fixed connections). Furthermore, since network topology determines interference and thus connectivity, the mobility pattern of devices within the network will impact on network performance, possibly resulting in data having to be resent a lot of times (increased delay) and finally allocation of network resources such as power remains unclear. [11] Finally, finding a model that accurately represents human mobility whilst remaining mathematically tractable remains an open problem due to the large range of factors that influence it. [14] Some typical models used include the random walk, random waypoint and levy flight models. [15] [16] [17] [18]

Applications

Mobile ad hoc networks can be used in many applications, ranging from sensors for environment, vehicular ad hoc communications, road safety, health, home, peer-to-peer messaging, disaster rescue operations, air/land/navy defense, weapons, robots, etc. See the application section in wireless ad hoc networks.

Simulations

There are several ways to study MANETs. One solution is the use of simulation tools like OPNET, NetSim or ns2. A comparative study of various simulators for VANETs reveal that factors such as constrained road topology, multi-path fading and roadside obstacles, traffic flow models, trip models, varying vehicular speed and mobility, traffic lights, traffic congestion, drivers' behavior, etc., have to be taken into consideration in the simulation process to reflect realistic conditions. [19]

Emulation testbed

In 2009, the U.S. Army Research Laboratory (ARL) and Naval Research Laboratory (NRL) developed a Mobile Ad-Hoc Network emulation testbed, where algorithms and applications were subjected to representative wireless network conditions. The testbed was based on a version of the "MANE" (Mobile Ad hoc Network Emulator) software originally developed by NRL. [20]

ARL, NRL and Consulting & Engineering Next Generation Networks (CENGN) later expanded the original testbed to form eMANE, which provided a system capable of modeling network systems with complex, heterogeneous connectivity (i.e. multiple, different radio interfaces). [20]

Data monitoring and mining

MANETS can be used for facilitating the collection of sensor data for data mining for a variety of applications such as air pollution monitoring and different types of architectures can be used for such applications. [21] A key characteristic of such applications is that nearby sensor nodes monitoring an environmental feature typically register similar values. This kind of data redundancy due to the spatial correlation between sensor observations inspires the techniques for in-network data aggregation and mining. By measuring the spatial correlation between data sampled by different sensors, a wide class of specialized algorithms can be developed to develop more efficient spatial data mining algorithms as well as more efficient routing strategies. [22] Also, researchers have developed performance models for MANET to apply queueing theory. [23] [24]

Trust management

Trust establishment and management in MANETs face challenges due to resource constraints and the complex interdependency of networks. Managing trust in a MANET needs to consider the interactions between the composite cognitive, social, information and communication networks, and take into account the resource constraints (e.g., computing power, energy, bandwidth, time), and dynamics (e.g., topology changes, node mobility, node failure, propagation channel conditions). [25]

Researchers of trust management in MANET suggested that such complex interactions require a composite trust metric that captures aspects of communications and social networks, and corresponding trust measurement, trust distribution, and trust management schemes. [25]

See also

Related Research Articles

Wireless mesh network Network topology

A wireless mesh network (WMN) is a communications network made up of radio nodes organized in a mesh topology. It is also a form of wireless ad hoc network.

Wireless sensor network (WSN) refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment and organizing the collected data at a central location. WSNs measure environmental conditions like temperature, sound, pollution levels, humidity, wind, and so on.

In computer network research, network simulation is a technique whereby a software program models the behavior of a network by calculating the interaction between the different network entities. Most simulators use discrete event simulation - the modeling of systems in which state variables change at discrete points in time. The behavior of the network and the various applications and services it supports can then be observed in a test lab; various attributes of the environment can also be modified in a controlled manner to assess how the network / protocols would behave under different conditions.

Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. Examples of such networks are those operating in mobile or extreme terrestrial environments, or planned networks in space.

Vehicular ad-hoc networks (VANETs) are created by applying the principles of mobile ad hoc networks (MANETs) – the spontaneous creation of a wireless network of mobile devices – to the domain of vehicles. VANETs were first mentioned and introduced in 2001 under "car-to-car ad-hoc mobile communication and networking" applications, where networks can be formed and information can be relayed among cars. It was shown that vehicle-to-vehicle and vehicle-to-roadside communications architectures will co-exist in VANETs to provide road safety, navigation, and other roadside services. VANETs are a key part of the intelligent transportation systems (ITS) framework. Sometimes, VANETs are referred as Intelligent Transportation Networks

B.A.T.M.A.N. routing protocol

The Better Approach To Mobile Adhoc Networking (B.A.T.M.A.N.) is a routing protocol for multi-hop mobile ad hoc networks which is under development by the German "Freifunk" community and intended to replace the Optimized Link State Routing Protocol (OLSR).

Geographic routing routing methodology for wireless networks

Geographic routing is a routing principle that relies on geographic position information. It is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address. In the area of packet radio networks, the idea of using position information for routing was first proposed in the 1980s. and interconnection networks. Geographic routing requires that each node can determine its own location and that the source is aware of the location of the destination. With this information a message can be routed to the destination without knowledge of the network topology or a prior route discovery.

Intelligent vehicular ad hoc networks (InVANETs) use WiFi IEEE 802.11p and WiMAX IEEE 802.16 for easy and effective communication between vehicles with dynamic mobility. Effective measures such as media communication between vehicles can be enabled as well methods to track automotive vehicles. InVANET is not foreseen to replace current mobile communication standards.

Augmented tree-based routing (ATR) protocol, first proposed in 2007, is a multi-path DHT-based routing protocol for scalable networks. ATR resorts to an augmented tree-based address space structure and a hierarchical multi-path routing protocol in order to gain scalability and good resilience against node failure/mobility and link congestion/instability.

Mobility models characterize the movements of mobile users with respect to their location, velocity and direction over a period of time. These models play an vital role in the design of Mobile Ad Hoc Networks(MANET). Most of the times simulators play a significant role in testing the features of mobile ad hoc networks. Simulators like allow the users to choose the mobility models as these models represent the movements of nodes or users. As the mobile nodes move in different directions, it becomes imperative to characterize their movements vis-à-vis to standard models. The mobility models proposed in literature have varying degrees of realism i.e. from random patterns to realistic patterns. Thus these models contribute significantly while testing the protocols for mobile ad hoc networks.

In mobility management, the random waypoint model is a random model for the movement of mobile users, and how their location, velocity and acceleration change over time. Mobility models are used for simulation purposes when new network protocols are evaluated. The random waypoint model was first proposed by Johnson and Maltz. It is one of the most popular mobility models to evaluate mobile ad hoc network (MANET) routing protocols, because of its simplicity and wide availability.

EraMobile -Epidemic-based Reliable and Adaptive Multicast for Mobile ad hoc networks is a bio-inspired reliable multicast protocol targeting mission critical ad hoc networks. EraMobile supports group applications that require high reliability and low overhead with loose delivery time constraints. The protocol aims to deliver multicast data with maximum reliability and minimal network overhead under adverse network conditions. EraMobile adopts an epidemic-based approach, which uses gossip messages, to cope with dynamic topology changes due to the mobility of network nodes. EraMobile's epidemic mechanism does not require maintaining any tree- or mesh-like structure for multicast operation. It requires neither a global nor a partial view of the network, nor does it require information about neighboring nodes and group members. The lack of a central structure for multicast lowers the network overhead by eliminating redundant data transmissions. EraMobile contains a simple adaptivity mechanism which tunes the frequency of control packages based on the node density in the network. This adaptivity mechanism helps the delivery of data reliably in both sparse networks -in which network connectivity is prone to interruptions- and dense networks -in which congestion is likely because of shared wireless medium-.

A mobile wireless sensor network (MWSN) can simply be defined as a wireless sensor network (WSN) in which the sensor nodes are mobile. MWSNs are a smaller, emerging field of research in contrast to their well-established predecessor. MWSNs are much more versatile than static sensor networks as they can be deployed in any scenario and cope with rapid topology changes. However, many of their applications are similar, such as environment monitoring or surveillance. Commonly, the nodes consist of a radio transceiver and a microcontroller powered by a battery, as well as some kind of sensor for detecting light, heat, humidity, temperature, etc.

Chai Keong Toh academic

Chai Keong "C.K." Toh is a Singapore-born computer scientist, engineer, professor, and chief technology officer. He has performed research on wireless ad hoc networks, mobile computing, Internet Protocols, and multimedia for over two decades.

Opportunistic mobile social networks are a form of mobile ad hoc networks that exploit the human social characteristics, such as similarities, daily routines, mobility patterns, and interests to perform the message routing and data sharing. In such networks, the users with mobile devices are able to form on-the-fly social networks to communicate with each other and share data objects.

Vehicular Ad hoc Networks (VANETs) is a network protocol designed for traffic safety applications. As other computer network protocols, it is also subject to several attacks that can have fatal consequences due to the VANET's intended usage. One of these possible attacks is location spoofing where the attacker is lying about a vehicle's position to disrupt VANET safety application. This attack can be performed either through existent vehicles or forging new identities by a Sybil attack. There are several publications that propose mechanisms to detect and correct malicious location advertisements. This article presents an overview of some of these verification mechanisms proposed in the literature.

Associativity-based routing is a mobile routing protocol invented for wireless ad hoc networks, also known as mobile ad hoc networks (MANETs) and wireless mesh networks. ABR was invented in 1993, filed for a U.S. patent in 1996, and granted the patent in 1999. ABR was invented by Chai Keong Toh while doing his Ph.D. at Cambridge University.

CBRP, or Cluster Based Routing Protocol, is a routing protocol for wireless mesh networks. CBRP was originally designed in mid 1998 by the National University of Singapore and subsequently published as an Internet Draft in August 1998. CBRP is one of the earlier hierarchical ad-hoc routing protocols. In CBRP, nodes dynamically form clusters to maintain structural routing support and to minimize excessive discovery traffic typical for ad-hoc routing.

References

  1. Wireless ATM & Ad Hoc Networks. Kluwer Academic Press. 1997. ISBN   9780792398226.
  2. Morteza M. Zanjireh; Hadi Larijani (May 2015). A Survey on Centralised and Distributed Clustering Routing Algorithms for WSNs (PDF). Conference: IEEE 81st Vehicular Technology Conference: VTC2015-Spring. Glasgow, Scotland. pp. 1–6. doi:10.1109/VTCSpring.2015.7145650.
  3. Chai Keong Toh (2002). Ad Hoc Mobile Wireless Networks: Protocols and Systems 1st Edition. Prentice Hall PTR. ISBN   978-0130078179.
  4. 1 2 Zanjireh, M. M.; Shahrabi, A.; Larijani, H. (1 March 2013). 2013 27th International Conference on Advanced Information Networking and Applications Workshops. pp. 450–455. doi:10.1109/WAINA.2013.242. ISBN   978-1-4673-6239-9.
  5. "Robert ("Bob") Elliot Kahn". A.M. Turing Award. Association for Computing Machinery.
  6. J. Burchfiel; R. Tomlinson; M. Beeler (May 1975). Functions and structure of a packet radio station (PDF). National Computer Conference and Exhibition. pp. 245–251. doi:10.1145/1499949.1499989.
  7. Beyer, Dave (October 1990). "Accomplishments of the DARPA SURAN Program - IEEE Conference Publication". ieeexplore.ieee.org. Retrieved 2017-10-15.
  8. Martinez; Toh; Cano; Calafate; Manzoni (2010). "Emergency Services in Future Intelligent Transportation Systems Based on Vehicular Communication Networks". IEEE Intelligent Transportation Systems Magazine. 2 (2): 6–20. doi:10.1109/MITS.2010.938166.
  9. Toh; Lee; Ramos (2002). "Next Generation Tactical Ad Hoc Mobile Wireless Networks". TRW Systems Technology Journal.
  10. Antonio Guillen-Perez; Ramon Sanchez-Iborra; Maria-Dolores Cano; Juan Carlos Sanchez-Aarnoutse; Joan Garcia-Haro (2016). WiFi networks on drones. ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT). pp. 1–8. doi:10.1109/ITU-WT.2016.7805730. ISBN   978-9-2612-0451-8.
  11. 1 2 Grossglauser, M; Tse, D (2001). Mobility increases the capacity of ad-hoc wireless networks. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. 3. IEEE Proceedings. pp. 1360–1369.
  12. Helen, D; Arivazhagan, D (2014). "Applications, advantages and challenges of ad hoc networks". JAIR. 2 (8): 453–457.
  13. Giordano, S (2002). "Mobile ad hoc networks". Handbook of wireless networks and mobile computing. pp. 325–346.
  14. Gonzalez, Marta C; Hidalgo, Cesar A; Barabasi, Albert-Laszlo (2008). "Understanding individual human mobility patterns". Nature. 453 (7196): 779–782. arXiv: 0806.1256 . Bibcode:2008Natur.453..779G. doi:10.1038/nature06958. PMID   18528393.
  15. Brockmann, Dirk; Hufnagel, Lars; Geisel, Theo (2006). "The scaling laws of human travel". Nature. 439 (7075): 462–465. arXiv: cond-mat/0605511 . Bibcode:2006Natur.439..462B. doi:10.1038/nature04292. PMID   16437114.
  16. Bettstetter, C; Resta, G; Santi, P (2003). "The node distribution of the random waypoint mobility model for wireless ad hoc networks". IEEE Transactions on Mobile Computing. 2 (3): 257–269. CiteSeerX   10.1.1.576.3842 . doi:10.1109/tmc.2003.1233531.
  17. Hyytia, E; Lassila, P; Virtamo, J (2006). "Spatial node distribution of the random waypoint mobility model with applications". IEEE Transactions on Mobile Computing. 5 (6): 680–694. CiteSeerX   10.1.1.59.3414 . doi:10.1109/tmc.2006.86.
  18. Figueiredo, A; Gleria, I; Matsushita, R (2003). "On the origins of truncated Lévy flights". Physics Letters A. 315 (1): 51–60. Bibcode:2003PhLA..315...51F. CiteSeerX   10.1.1.563.4078 . doi:10.1016/s0375-9601(03)00976-9.
  19. Martinez; Toh; Cano; et al. (2009). "A survey and comparative study of simulators for vehicular ad hoc networks (VANETs)". Wireless Communications Journal. 11 (7): 813–828. doi:10.1002/wcm.859.
  20. 1 2 Ivanic, Natalie; Rivera, Brian; Adamson, Brian (2009). "Mobile Ad Hoc Network emulation environment". Mobile Ad Hoc Network emulation environment - IEEE Conference Publication. pp. 1–6. CiteSeerX   10.1.1.414.4950 . doi:10.1109/MILCOM.2009.5379781. ISBN   978-1-4244-5238-5.
  21. Ma, Y.; Richards, M.; Ghanem, M.; Guo, Y.; Hassard, J. (2008). "Air Pollution Monitoring and Mining Based on Sensor Grid in London". Sensors. 8 (6): 3601. doi:10.3390/s8063601. PMC   3714656 .
  22. Ma, Y.; Guo, Y.; Tian, X.; Ghanem, M. (2011). "Distributed Clustering-Based Aggregation Algorithm for Spatial Correlated Sensor Networks". IEEE Sensors Journal. 11 (3): 641. Bibcode:2011ISenJ..11..641M. CiteSeerX   10.1.1.724.1158 . doi:10.1109/JSEN.2010.2056916.
  23. Kleinrock, Leonard (1975). "Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics". IEEE Transactions on Communications. 23 (12): 1400–1416. CiteSeerX   10.1.1.475.2016 . doi:10.1109/TCOM.1975.1092768.
  24. Shi, Zhefu; Beard, Cory; Mitchell, Ken (2008). "Tunable traffic control for multihop CSMA networks". MILCOM 2008 - 2008 IEEE Military Communications Conference. pp. 1–7. doi:10.1109/MILCOM.2008.4753376. ISBN   978-1-4244-2676-8.
  25. 1 2 Cho, Jin-Hee; Swami, Ananthram; Chen, Ing-Ray (2011). "A Survey on Trust Management for Mobile Ad Hoc Networks - IEEE Journals & Magazine". IEEE Communications Surveys & Tutorials. 13 (4): 562–583. CiteSeerX   10.1.1.409.2078 . doi:10.1109/SURV.2011.092110.00088.

Further reading

Kahn, Robert E. (January 1977). "The Organization of Computer Resources into a Packet Radio Network". IEEE Transactions on Communications. COM-25 (1): 169–178. doi:10.1109/tcom.1977.1093714.