{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T20:40:02Z","timestamp":1746132002870,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_24","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"263-274","source":"Crossref","is-referenced-by-count":0,"title":["Warfare Message Communication in Tactical WMN Using HWMP"],"prefix":"10.1007","author":[{"given":"Jayalakshmi G.","family":"Naragund","sequence":"first","affiliation":[]},{"given":"R. M.","family":"Banakar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Nikolaidis, L.: The End of the Internet. IEEE Network (January\/February 2008), In EDITOR\u2019S NOTE","key":"24_CR1"},{"issue":"4","key":"24_CR2","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/j.comnet.2004.12.001","volume":"47","author":"I.F. Akyildiz","year":"2005","unstructured":"Akyildiz, I.F., Wang, X., Wangi, W.: Wireless mesh networks: a survey. Computer Networks and ISDN Systems\u00a047(4), 445\u2013487 (2005)","journal-title":"Computer Networks and ISDN Systems"},{"doi-asserted-by":"crossref","unstructured":"Kim, B., et al.: Tactical network design and simulator with wireless mesh network-based backbone architecture. In: Applications and Technology Conference (LISAT), pp. 1\u20135 (May 2010)","key":"24_CR3","DOI":"10.1109\/LISAT.2010.5478270"},{"unstructured":"ANSI\/IEEE Std 802.11: IEEE Standard for Local and Metropolitan area networks Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. 1999 edition (r2003) edn. (2003)","key":"24_CR4"},{"unstructured":"IEEE Std 802.16-2004 (Revision of IEEE Std 802.16-2001): IEEE. IEEE Standard for Local and Metropolitan area networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems (2004)","key":"24_CR5"},{"issue":"1","key":"24_CR6","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.2008.4435897","volume":"22","author":"Campista","year":"2008","unstructured":"Campista, et al.: Routing metrics and protocols for wireless mesh networks. IEEE Network\u00a022(1), 6\u201312 (2008)","journal-title":"IEEE Network"},{"issue":"1","key":"24_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MNET.2008.4435899","volume":"22","author":"Baumann","year":"2008","unstructured":"Baumann, Heimlicher, Plattner: Routing in large-scale wireless mesh networks using temperature fields. IEEE Network\u00a022(1), 25\u201331 (2008)","journal-title":"IEEE Network"},{"doi-asserted-by":"crossref","unstructured":"Bisnik, N., Abouzeid, A.: Dealy and throughput in random aceess wireless mesh networks. In: IEEE ICC 2006 Proceedings, pp. 403\u2013408 (2006)","key":"24_CR8","DOI":"10.1109\/ICC.2006.254761"},{"doi-asserted-by":"crossref","unstructured":"Sepehr, F.H., Ashtiani, F.: An analytical model for evaluation of wireless mesh networks. In: International Symposium on Telecommunications, pp. 295\u2013300 (2008)","key":"24_CR9","DOI":"10.1109\/ISTEL.2008.4651317"},{"issue":"2","key":"24_CR10","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1109\/TVT.2007.905389","volume":"57","author":"T. Liu","year":"2008","unstructured":"Liu, T., Liao, W.: Location-dependent throughput and delay in wireless mesh networks. IEEE Transactions on Vehicular Technology\u00a057(2), 1188\u20131198 (2008)","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"8","key":"24_CR11","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1109\/TMC.2007.70778","volume":"7","author":"P. Zhou","year":"2008","unstructured":"Zhou, P., et al.: Asymptotic capacity of infrastructure wireless mesh networks. IEEE Transactions on Mobile Computing\u00a07(8), 1011\u20131024 (2008)","journal-title":"IEEE Transactions on Mobile Computing"},{"doi-asserted-by":"crossref","unstructured":"Cornils, M., et al.: Simulative Analysis of the Hybrid Wireless Mesh Protocol (HWMP). In: European Wireless Conference, pp. 536\u2013543 (2010)","key":"24_CR12","DOI":"10.1109\/EW.2010.5483486"},{"doi-asserted-by":"crossref","unstructured":"Peppas, N., et al.: Hybrid routing protocol in wireless mesh networks. In: MILCOM, pp. 1\u20137 (2007)","key":"24_CR13","DOI":"10.1109\/MILCOM.2007.4454863"},{"doi-asserted-by":"crossref","unstructured":"Abomasan, M., Wysoeki, T., Lipman, J.: Performance investigation on three-classes of MANET routing protocols. In: Asia-Pacific Conference on Communications, October 3-5, pp. 774\u2013778 (2005)","key":"24_CR14","DOI":"10.1109\/APCC.2005.1554167"},{"issue":"6","key":"24_CR15","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1109\/TMC.2006.83","volume":"5","author":"A.A. Pirzada","year":"2006","unstructured":"Pirzada, A.A., Mcdonald, C., Datta, A.: Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing\u00a05(6), 695\u2013710 (2006)","journal-title":"IEEE Transactions on Mobile Computing"},{"unstructured":"Bolch, G., Greiner, S., de Meer, H., Trivedi, K.S.: Queuing Networks and Markov Chains, ch. 6-7, pp. 212\u2013214, 263\u2013267. John Wiley and Sons (1998)","key":"24_CR16"},{"unstructured":"HWMP for NS-2. Wireless Software R&D Group of IITP RAS (February 2009)","key":"24_CR17"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T20:17:51Z","timestamp":1746130671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}