This document provides an overview of mobile ad hoc networks (MANETs), including their characteristics, applications, routing protocols, attacks, and performance metrics. Some key points:
- MANETs are temporary networks formed without centralized administration between mobile nodes. Routing is challenging due to frequent topology changes from node mobility.
- Common routing protocols include proactive (table-driven), reactive (on-demand), and hybrid. Proactive maintains routing tables even without need, while reactive establishes routes on demand.
- Attacks on MANETs include location disclosure, black holes, replays, wormholes, and denial of service. Performance is evaluated using metrics like throughput, packet delivery ratio, and end-to