Energy Awareness training ppt for manufacturing process.pptx
Mymanet
1.
2. Table of ConTenTs
1. Computer Network and its type
2. Ad-hoc Network and MANET
3. Features of MANET
4. Working of MANET
5. Security and its challenges in MANET
6. Advantages and Application of MANET
5. MOBILE AD HOC NETWORK
Ad hoc is a Latin phrase which means "for this purpose“
A MANET is a type of Ad-hoc network.
Does not require base station.
Mobile Ad hoc Networks are self configuring networks.
Use wireless connections to connect to various networks.
Typical “peer-to-peer” rather than “client-server”.
7. Working of MANET
A
B
C
D
E
F
Internet
E
Gateway
Stand-alone MANET
After one of the nodes is configured as a gateway, the
entire network is connected to an external network like
Internet
May need to traverse multiple links to reach destination
8. Challenges in Securing MANETsChallenges in Securing MANETs
InitialInitial
RoutingRouting
beforebefore
attackattack
9. Challenges in Securing MANETsChallenges in Securing MANETs
InitialInitial
RoutingRouting
beforebefore
attackattack
Data PacketsData Packets
10. Challenges in Securing MANETsChallenges in Securing MANETs
•Data packets received in
one place of the network
and replay them in
another place
•Attacker can attack the
Routing Algorithm
11. Challenges in Securing MANETsChallenges in Securing MANETs
Most packets will be
routed to the Attacker
The Attacker can
drop packets or
forward packets to
avoid detection
12. Advantages of MANET
This can be developed where there is less
telecommunication infrastructure
Cost Estimation is very less
These networks can be set up at any place and time.
MANET is Multi-hop network with Autonomous Terminal
and dynamic network topology.
MANET can be used as Temporary Network
It requires less time
13. Personal area networking
Military environments
DisasterArea such as War-Zone and Natural Calamity
Civilian environments
Emergency operations
VANET(Vehicularad hoc Network)
A MANET is a type of ad hoc network.
Ad hoc Network refers to a network connection and does not require access point or a wireless base station.
Because MANETS are mobile, they use wireless connections to connect to various networks.
Here is a simple routing algorithm for constructing a spanning tree rooted at a base station. The base station broadcasts a beacon. Those nodes who can hear the beacon, mark the base station as its parent. The beacon is then rebroadcast recursively to construct the spanning tree. Those nodes who don’t have a parent yet and receive the beacon will mark the sender as its parent.
The routing tree enables dissemination of information from base station to nodes or collection of data from nodes to base station. Here is an example, all data packets will be sent to base station through the constructed routing tree.
Wormholes can attack the routing algorithm. Since node chooses its parent based on the first copy of the beacon it receives. If an adversary can tunnel the beacon to distant parts of the network faster than it would reach there through normal multi-hop transmission, then the adversary can influence a node’s choice of its parent.