【正文】
sed clustering and linkstate routing, and selforganized into a twotier ad hoc work. Now used by the US Army,NTDR is the only “real” (nonprototypical) ad hoc work in use today. Spurred by the growing interest in ad hoc working, a number of standards activities and mercial standards evolved in the mid to late’ the IETF, the Mobile Ad hoc Networking(MANET) working group was horn, and sought to standardize routing protocols for ad hoc works. The development of routing within the MANET working group and the larger munity forked into reactive (routes ondemand) and proactive (routes readytouse) routing protocols [4]. The submittee standardized a medium access protocol that was based on collision avoidance and tolerated hidden terminals, making it usable, if not optimal,for building mobile ad hoc work prototypes out of notebooks and PCMCIA and Bluetooth were some other standards that addressed and benefited ad hoc working. Open Problems Despite the long history of ad hoc working, there are still quite a number of problems that are open. Since ad hoc works do not assume the availability of a fixed infrastructure, it follows that individual nodes may have to rely on portable, limited power sources. The idea of energyefficiency therefore bees an important problem in ad hoc works. Surprisingly,there has been little published work in the area of energyefficiency of ad hoc works until fairly recently. Most existing solutions for saving energy in ad hoc works revolve around the reduction of power used by the radio transceiver. At the MAC level and above, this is often done by selectively sending the receiver into a sleep mode, or by using a transmitter with variable output power (and proportionate input power draw) and selecting routes that require many short hops, instead of a few longer hops [8]. The ability of fixed, wireless works to satisfy quality of service (QoS) requirements is another open problem. Ad hoc works further plicate the known QoS challenges in wireline works with RF channel characteristics that often 4 change unpredictably, along with the difficulty of sharing the channel medium with many neighbors, each with its own set of potentially changing QoS requirements. Reflecting the multilayer nature of ad hoc works, there are numerous attempts to improve the QoS problems from the service contracts [9] to the MAC layer. A promising method for satisfying QoS requirements is a more unified approach of crosslayer or verticallayer integration. The idea is to violate many of the traditional layering styles to allow different parts of the stack to adapt to the environment in a way that takes into account the adaptation and available information at other layers. A similar multilayer issue is that of security in ad hoc works [10]. Since nodes use the shared radio medium in a potentially insecure environment, they are susceptible to denial of service (DoS) attacks that are harder to track down than in wired works. Also, since a large portion of the work nodes will be dynamically reorganizing and forwarding packets on behalf of others, ad hoc works are particularly susceptible to the injection of bogus work control traffic. Finally, ad hoc works can he victims of specialized kinds of security attacks such as DoS attacks that cause a node to use its transceiver so much that it depletes its battery. Robots and sensors also provide new hardware capabilities ripe for new methods of enhancing ad hoc efficiency. Robots, for example,have a tight inte