SlideShare a Scribd company logo
1 of 29
1
An Introduction to Mobile Ad hoc Network
and Its Research Issues
Dr. Noman Islam
Email: noman.islam@indus.edu.pk
Web:
https://sites.google.com/a/nu.edu.pk/noman-islam/
http://facebook.com/sir.noman.islam
What is Ad hoc Network?
2
 According to Webster's online dictionary, the term
Ad hoc stands for any thing that is improvised or
for a specific purpose etc.
 Ad hoc Networks are:
 infrastructure-less networks
 erected on-the-fly among a set of nodes
 for a specific purpose
Types of Ad hoc Networks
3
Wireless Sensor Network Mobile Ad hoc Network
Wireless Mesh Network
Mobile Ad hoc Network (MANET)
4
□ IETF defines MANET as follows:
“MANET is an autonomous system of mobile routers (and
associated hosts) connected by wireless links--the union of
which form an arbitrary graph. The routers are free to move
randomly and organize themselves arbitrarily; thus, the
network's wireless topology may change rapidly and
unpredictably. Such a network may operate in a standalone
fashion, or may be connected to the larger Internet”
Properties of MANET
5
Properties Conventional Network MANET
Nodes
Mobility – +
Resource + –
Reliability + –
Links
Bandwidth + –
Symmetry + –
Stability + –
Environment
Dynamism – +
Infrastructure + –
Certification Authority + –
DHCP + –
Interoperability + –
Nodes Acquaintance + –
Why MANET?
6
 The zero dependence on infrastructure and
swift and facile deployment of MANET can
foster a numberof useful applications like
ubiquitous computing, disaster recovery etc.
7
Military Application Ubiquitous Computing
Disaster Recovery Vehicular Ad hoc Network
Applications of Mobile and Ad hoc Networks
Ad hoc Gaming Smart Agriculture
Animal Monitoring
Applications of Mobile and Ad hoc Networks
Simulation Toolkits
9
Research Issues in MANET
10
 Conventional networking protocols fails to perform
when employed on MANET due to its exclusive
temperament like:
 Dynamic topology
 Frequent network partitioning
 Multihop routing
 Resource constraints
 Volatile links
 No dedicated entities
Research Trends in MANET
11
Research trends for various issues (grouped in 15 categories) over the six
year (1998 to 2003), a survey of more than 1300 MANET related papers
Research Trends in MANET
12
Research trends for various MANET issues in 2003
Selected Research Issues
13
 Power Management
 MAC Layer Protocol
 Routing
 Addressing
 Transport Protocols
 Security
 Mobility Models
 Standardization Challenge
 Data Management
Power Management
14
 The nodes in MANET have poor
resources
 Algorithms should keep into account
the power consumption in different
modes of operation i.e.
 Sleep / Standby Mode
 Doze
 Active
 Coordinated effort at all layers
 Adjusting the transmission power to
optimal value
 Energy efficient routing
MAC Layer
15
 Distributed or Centralized
 Hidden Vs Exposed Node problem
 Minimum Control Overhead
 Bandwidth reservation made at one
point of time may become invalid
once the node moves out of the
region
 Contention Free Vs Contention
based
 TDMA, FDMA, CDMA
 CSMA that senses the spectrum first
 MACA that transmits RTS / CTS
packets
Hidden Node Problem
Exposed Node Problem
Routing
16
 Challenges like:
 Frequent route changes
 Routing loops
 Scalability
Routing
Protocols
Flat
Protocols
Proactive
DSDV CSGR, WRP
Reactive
AODV DSR TORA
Hybrid
ZRP
Position
Based
Routing
GPSR DREAM
Dynamic Source Routing
17
Other types of routing protocols
18
 QoS aware routing
 Energy efficient routing
 Secure routing
 Multicast routing
 Tree based
 Mesh based
Addressing Issue
19
 No DHCP, no pre assignment of addresses
 Generate tentative address (e.g. using hashing
algorithms) and check for uniqueness
 What happens with:
 Network partitioning
 Network merger
 Mobile IP can address some of the issues
 Security is also an important issue
 DOS attack
 Election of DHCP server
 Statefull and Stateless approaches
Transport protocol
20
 Transport Protocols
 TCP : connection oriented, reliable, flow control, congestion control
 UDP : unreliable, low overhead, connection less
 TCP Congestion Control
 Additive Increase Multiplicative Decrease
 designed for fixed networks
 packet loss as an indication of congestion
 packet loss is a common phenomena in MANET due to mobility
 packet loss leads to congestion control algorithm. that leads to
reduction in window size and hence degrades performance
 Cross-layer communication can be exploited
TCP Congestion Control
21
Security Issue
22
 Lack of Secure Boundaries (specially in battlefield
environments)
 Threats from Compromised nodes Inside the
Network
 Byzantine failures
 Lack of Centralized Management
 Restricted Power supply
 DOS attack
 Scalability
Security issue
23
 Physical layer
 Signal jamming
 Routing layer attacks
 Multipath routing
Security Attacks at various layers
24
Mobility Models
25
Random Walk Mobility
Model
City Section Mobility ModelRandom Direction Mobility
Model
Random Waypoint Mobility
Model
Standardization Issue
26
 IETF MANET working group
 working on routing protocols
 IEEE 802.15 group
 For personal area networks (PAN)
 IEEE 802.11p
 Family of Standards for Wireless Access in Vehicular
Environments (WAVE)
Cooperation Issue
27
 Interdependency
 Requires cooperation
 Presence of selfish nodes even in small number
can jeopardize network
 Two schemes:
 Cooperation enforcement
 Incentive based mechanism
Data Management Issue
28
PROBLEM ISSUES / SOLUTIONS
Routing Reactive or Proactive Routing Protocols
Service Discovery Centralized or Distributed directory
Location Management Global Positioning System
Query Processing and
Optimization
Profile Driven Querying, Optimization, Location Based
Querying
Caching Profile Driven, Cooperative, Semantic caching
Replication Partial or Full Replication
Naming Flooding or Name Server
Transaction Management Can we satisfy all ACID requirements?
Hetrogeneity Transcoding techniques
Security DOS Attacks, Trust Issues
Conclusion
29
 A basic introduction to MANET and its research
issues have been highlighted
 Most of the protocols of MANET are still at infancy
stage
 A number of avenues are available for research in
the area of MANET

More Related Content

What's hot

5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing3G4G
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology TutorialAPNIC
 
WiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11beWiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11beBryan Len
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptx
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptxpowerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptx
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptxsemua
 
IT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit IIT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit Ipkaviya
 
Chapter1.ppt
Chapter1.pptChapter1.ppt
Chapter1.pptsyam babu
 
Network Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile TecnologyNetwork Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile Tecnologyvineetkathan
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSPallepati Vasavi
 

What's hot (20)

5G Security Briefing
5G Security Briefing5G Security Briefing
5G Security Briefing
 
5G Technology Tutorial
5G Technology Tutorial5G Technology Tutorial
5G Technology Tutorial
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
CS8601 MOBILE COMPUTING
CS8601	MOBILE COMPUTING CS8601	MOBILE COMPUTING
CS8601 MOBILE COMPUTING
 
WiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11beWiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11be
 
Cellular network
Cellular networkCellular network
Cellular network
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
SS7: 2G/3G's weakest link
SS7: 2G/3G's weakest linkSS7: 2G/3G's weakest link
SS7: 2G/3G's weakest link
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptx
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptxpowerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptx
powerpoint_presentation_-_making_5g_nr_a_reality_february_2020_web.pptx
 
IT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit IIT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit I
 
WLAN
WLANWLAN
WLAN
 
CS8601 mobile computing Two marks Questions and Answer
CS8601 mobile computing Two marks Questions and AnswerCS8601 mobile computing Two marks Questions and Answer
CS8601 mobile computing Two marks Questions and Answer
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
Chapter1.ppt
Chapter1.pptChapter1.ppt
Chapter1.ppt
 
QoS in WSN thesis
QoS in WSN thesisQoS in WSN thesis
QoS in WSN thesis
 
Network Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile TecnologyNetwork Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile Tecnology
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 

Similar to Ad hoc networks introduction

Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification DocumentationSambit Dutta
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Natasha Barnett
 
Multimedia services in VANETs
Multimedia services in VANETsMultimedia services in VANETs
Multimedia services in VANETsMisbahFatima7
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
 
Iss 2
Iss 2Iss 2
Iss 2ijgca
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEijgca
 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routingAbhishek Kona
 
Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesIJMER
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessAlexander Decker
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 

Similar to Ad hoc networks introduction (20)

Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
A0110104
A0110104A0110104
A0110104
 
Multimedia services in VANETs
Multimedia services in VANETsMultimedia services in VANETs
Multimedia services in VANETs
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
 
Iss 2
Iss 2Iss 2
Iss 2
 
Iss3
Iss3Iss3
Iss3
 
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCEIMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE
 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routing
 
Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering Techniques
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wireless
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
 
Aodv
AodvAodv
Aodv
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
Mane ts
Mane tsMane ts
Mane ts
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
 
H010524049
H010524049H010524049
H010524049
 

Recently uploaded

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Ad hoc networks introduction

  • 1. 1 An Introduction to Mobile Ad hoc Network and Its Research Issues Dr. Noman Islam Email: noman.islam@indus.edu.pk Web: https://sites.google.com/a/nu.edu.pk/noman-islam/ http://facebook.com/sir.noman.islam
  • 2. What is Ad hoc Network? 2  According to Webster's online dictionary, the term Ad hoc stands for any thing that is improvised or for a specific purpose etc.  Ad hoc Networks are:  infrastructure-less networks  erected on-the-fly among a set of nodes  for a specific purpose
  • 3. Types of Ad hoc Networks 3 Wireless Sensor Network Mobile Ad hoc Network Wireless Mesh Network
  • 4. Mobile Ad hoc Network (MANET) 4 □ IETF defines MANET as follows: “MANET is an autonomous system of mobile routers (and associated hosts) connected by wireless links--the union of which form an arbitrary graph. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. Such a network may operate in a standalone fashion, or may be connected to the larger Internet”
  • 5. Properties of MANET 5 Properties Conventional Network MANET Nodes Mobility – + Resource + – Reliability + – Links Bandwidth + – Symmetry + – Stability + – Environment Dynamism – + Infrastructure + – Certification Authority + – DHCP + – Interoperability + – Nodes Acquaintance + –
  • 6. Why MANET? 6  The zero dependence on infrastructure and swift and facile deployment of MANET can foster a numberof useful applications like ubiquitous computing, disaster recovery etc.
  • 7. 7 Military Application Ubiquitous Computing Disaster Recovery Vehicular Ad hoc Network Applications of Mobile and Ad hoc Networks
  • 8. Ad hoc Gaming Smart Agriculture Animal Monitoring Applications of Mobile and Ad hoc Networks
  • 10. Research Issues in MANET 10  Conventional networking protocols fails to perform when employed on MANET due to its exclusive temperament like:  Dynamic topology  Frequent network partitioning  Multihop routing  Resource constraints  Volatile links  No dedicated entities
  • 11. Research Trends in MANET 11 Research trends for various issues (grouped in 15 categories) over the six year (1998 to 2003), a survey of more than 1300 MANET related papers
  • 12. Research Trends in MANET 12 Research trends for various MANET issues in 2003
  • 13. Selected Research Issues 13  Power Management  MAC Layer Protocol  Routing  Addressing  Transport Protocols  Security  Mobility Models  Standardization Challenge  Data Management
  • 14. Power Management 14  The nodes in MANET have poor resources  Algorithms should keep into account the power consumption in different modes of operation i.e.  Sleep / Standby Mode  Doze  Active  Coordinated effort at all layers  Adjusting the transmission power to optimal value  Energy efficient routing
  • 15. MAC Layer 15  Distributed or Centralized  Hidden Vs Exposed Node problem  Minimum Control Overhead  Bandwidth reservation made at one point of time may become invalid once the node moves out of the region  Contention Free Vs Contention based  TDMA, FDMA, CDMA  CSMA that senses the spectrum first  MACA that transmits RTS / CTS packets Hidden Node Problem Exposed Node Problem
  • 16. Routing 16  Challenges like:  Frequent route changes  Routing loops  Scalability Routing Protocols Flat Protocols Proactive DSDV CSGR, WRP Reactive AODV DSR TORA Hybrid ZRP Position Based Routing GPSR DREAM
  • 18. Other types of routing protocols 18  QoS aware routing  Energy efficient routing  Secure routing  Multicast routing  Tree based  Mesh based
  • 19. Addressing Issue 19  No DHCP, no pre assignment of addresses  Generate tentative address (e.g. using hashing algorithms) and check for uniqueness  What happens with:  Network partitioning  Network merger  Mobile IP can address some of the issues  Security is also an important issue  DOS attack  Election of DHCP server  Statefull and Stateless approaches
  • 20. Transport protocol 20  Transport Protocols  TCP : connection oriented, reliable, flow control, congestion control  UDP : unreliable, low overhead, connection less  TCP Congestion Control  Additive Increase Multiplicative Decrease  designed for fixed networks  packet loss as an indication of congestion  packet loss is a common phenomena in MANET due to mobility  packet loss leads to congestion control algorithm. that leads to reduction in window size and hence degrades performance  Cross-layer communication can be exploited
  • 22. Security Issue 22  Lack of Secure Boundaries (specially in battlefield environments)  Threats from Compromised nodes Inside the Network  Byzantine failures  Lack of Centralized Management  Restricted Power supply  DOS attack  Scalability
  • 23. Security issue 23  Physical layer  Signal jamming  Routing layer attacks  Multipath routing
  • 24. Security Attacks at various layers 24
  • 25. Mobility Models 25 Random Walk Mobility Model City Section Mobility ModelRandom Direction Mobility Model Random Waypoint Mobility Model
  • 26. Standardization Issue 26  IETF MANET working group  working on routing protocols  IEEE 802.15 group  For personal area networks (PAN)  IEEE 802.11p  Family of Standards for Wireless Access in Vehicular Environments (WAVE)
  • 27. Cooperation Issue 27  Interdependency  Requires cooperation  Presence of selfish nodes even in small number can jeopardize network  Two schemes:  Cooperation enforcement  Incentive based mechanism
  • 28. Data Management Issue 28 PROBLEM ISSUES / SOLUTIONS Routing Reactive or Proactive Routing Protocols Service Discovery Centralized or Distributed directory Location Management Global Positioning System Query Processing and Optimization Profile Driven Querying, Optimization, Location Based Querying Caching Profile Driven, Cooperative, Semantic caching Replication Partial or Full Replication Naming Flooding or Name Server Transaction Management Can we satisfy all ACID requirements? Hetrogeneity Transcoding techniques Security DOS Attacks, Trust Issues
  • 29. Conclusion 29  A basic introduction to MANET and its research issues have been highlighted  Most of the protocols of MANET are still at infancy stage  A number of avenues are available for research in the area of MANET

Editor's Notes

  1. 1. Greedy Perimeter Stateless Routing for Wireless Networks (GPSR) 2. Distance Routing Effect Algorithm for Mobility (DREAM)
  2. Wormhole attack: An attacker records packets at one location in the network and tunnels them to another location. Routing can be disrupted when routing control messages are tunneled. This tunnel between two colluding attackers is referred as a wormhole [8] [32]. Wormhole attacks are severe threats to MANET routing protocols. For example, when a wormhole attack is used against an on-demand routing protocol such as DSR or AODV, the attack could prevent the discovery of any routes other than through the wormhole. ² Blackhole attack: The blackhole attack has two properties. First, the node exploits the mobile ad hoc routing protocol, such as AODV, to advertise itself as having a valid route to a destination node, even though the route is spurious, with the intention of intercepting packets. Second, the attacker consumes the intercepted packets without any forwarding. However, the attacker runs the risk that neighboring nodes will monitor and expose the ongoing attacks. There is a more subtle form of these attacks when an attacker selectively forwards packets. An attacker suppresses or modifies packets originating from some nodes, while leaving the data from the other nodes unaffected, which limits the suspicion of its wrongdoing. ² Byzantine attack: A compromised intermediate node works alone, or a set of compromised intermediate nodes works in collusion and carry out attacks such as creating routing loops, forwarding packets through non-optimal paths, or selectively dropping packets, which results in disruption or degradation of the routing services [17].
  3. In Random way point, An MN begins by staying in one location for a certain period of time (i.e., a pause time). Once this time expires, the MN chooses a random destination as well as a speed. It then travels towards the newly chosen destination at the selected speed. Upon arrival, the MN takes another break before starting the process again. In the Random Walk Mobility Model, a host moves from its current location to a new location by randomly choosing a direction and speed in which to travel In this Random direction model , MNs choose a random direction in which to travel instead of a random destination. After choosing a random direction, an MN travels to the border of the simulation area in that direction. As soon as the boundary is reached the MN stops for a certain period of time, chooses another angular direction (between 0 and 180 degrees) and continues the process. In the City Mobility Model, the simulation area is a network that represents the section of a city where the ad hoc network exists. Each mobile nodes begins the simulation at a defined point of some street. The movement algorithm from the current destination to the new destination locates a path corresponding to the shortest travel time between the two points; in addition, there are safe driving characteristics such as a speed limit and a minimum distance allowed between any to mobile nodes. While reaching the destination, the Mobile Node pauses for a specific time and then randomly chooses another destination (i.e., a point of some street) and repeats the process.