\select@language {brazilian}
\contentsline {chapter}{\numberline {1}Introdu\IeC {\c c}\IeC {\~a}o}{5}{chapter.1}
\contentsline {section}{\numberline {1.1}Motiva\IeC {\c c}\IeC {\~a}o}{6}{section.1.1}
\contentsline {subsection}{\numberline {1.1.1}Ve\IeC {\'\i }culos}{7}{subsection.1.1.1}
\contentsline {subsection}{\numberline {1.1.2}Multimedia}{7}{subsection.1.1.2}
\contentsline {section}{\numberline {1.2}Problemas em rede ad-hoc}{7}{section.1.2}
\contentsline {section}{\numberline {1.3}Metodologia}{8}{section.1.3}
\contentsline {section}{\numberline {1.4}Objetivos}{8}{section.1.4}
\contentsline {chapter}{\numberline {2}Descri\IeC {\c c}\IeC {\~a}o de conceitos}{9}{chapter.2}
\contentsline {section}{\numberline {2.1}Tolerancia a falha em rede ad-hoc}{9}{section.2.1}
\contentsline {section}{\numberline {2.2}Token Ring}{9}{section.2.2}
\contentsline {chapter}{\numberline {3}Trabalhos relacionados}{11}{chapter.3}
\contentsline {section}{\numberline {3.1}Toler\IeC {\^a}ncia a falha em rede ad-hoc wireless m\IeC {\'o}vel}{11}{section.3.1}
\contentsline {subsection}{\numberline {3.1.1}Designing Fault Tolerance Ad Hoc Wireless Networks}{11}{subsection.3.1.1}
\contentsline {subsection}{\numberline {3.1.2}Fault Tolerance Increasing In Token Ring LANs}{12}{subsection.3.1.2}
\contentsline {subsection}{\numberline {3.1.3}Distributed Fault-Tolerant Quality of Wireless Networks}{12}{subsection.3.1.3}
\contentsline {section}{\numberline {3.2}Token Ring wireless}{12}{section.3.2}
\contentsline {section}{\numberline {3.3}Wireless ad-hoc networks and related topologies: applications and research challenges}{13}{section.3.3}
\contentsline {section}{\numberline {3.4}Fairness and QoS in Multihop Wireless Networks}{13}{section.3.4}
\contentsline {chapter}{\numberline {4}Proposta}{15}{chapter.4}
\contentsline {section}{\numberline {4.1}Defini\IeC {\c c}\IeC {\~o}es}{15}{section.4.1}
\contentsline {subsection}{\numberline {4.1.1}Observa\IeC {\c c}\IeC {\~o}es}{16}{subsection.4.1.1}
\contentsline {section}{\numberline {4.2}Descri\IeC {\c c}\IeC {\~a}o do projeto}{16}{section.4.2}
\contentsline {subsection}{\numberline {4.2.1}A escolha de propriet\IeC {\'a}rio}{17}{subsection.4.2.1}
\contentsline {subsection}{\numberline {4.2.2}Controle de conectividade}{18}{subsection.4.2.2}
\contentsline {subsection}{\numberline {4.2.3}Procedimento de encontrar sucessor}{18}{subsection.4.2.3}
\contentsline {subsection}{\numberline {4.2.4}Procedimento de sa\IeC {\'\i }da em anel}{20}{subsection.4.2.4}
\contentsline {subsection}{\numberline {4.2.5}Gerenciamento de token}{20}{subsection.4.2.5}
\contentsline {subsection}{\numberline {4.2.6}Observa\IeC {\c c}\IeC {\~o}es}{20}{subsection.4.2.6}
\contentsline {chapter}{\numberline {5}Cronograma}{21}{chapter.5}
