Manet

5,468 views

Published on

mobile Adhock network

1 Comment
7 Likes
Statistics
Notes
  • i Watch the Better PPT on ThesisScientist.com on the same Topic.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total views
5,468
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
563
Comments
1
Likes
7
Embeds 0
No embeds

No notes for slide

Manet

  1. 1. Manet<br />-:Presented By:-KaushikParmar<br />
  2. 2. Introduction<br />Importance of computer networks<br />Solutions to wireless approach<br />Birth of MANET<br />Ad hoc network<br />
  3. 3. Ad hoc network<br />A LAN or other small network<br />A communication network without a pre-exist network infrastructure<br />Role of Radio Terminals (RT)<br />
  4. 4. Characteristics<br />Communication via wireless means<br />Nodes are the hosts and routers<br />No centralized controller and infrastructure<br />Dynamic network topology<br />Autonomous<br />
  5. 5. Application areas<br />Military or police exercises<br />Disaster relief operations<br />Mine site operations<br />Urgent Business meetings<br />Robot data acquisition<br />
  6. 6. Manet<br />Collection of independent mobile nodes<br />Fully distributed network<br />Makes it highly flexible and robust<br />Kind of wireless ad hoc network<br />A type of mesh network<br />
  7. 7. Types Of Manets<br />Vehicular Ad Hoc Networks (VANETs)<br /> Intelligent vehicular ad hoc networks (InVANETs)<br />Internet Based Mobile Ad hoc Networks (iMANET)<br />
  8. 8. Network Security<br />Computer security + secure communication<br />Variables considered:-<br />Environmental concerns<br />Range of the network<br />Quality of service<br />Security criticality <br />
  9. 9. Security in Manet<br />Much more vulnerable to attack than wired network<br />Dynamically Changing Network Topology<br />Cooperative Algorithms<br />Lack of Centralized Monitoring<br />Lack of Clear Line of Defense<br />
  10. 10. Pros<br />Access to information and services regardless of geographic position<br />Can be set up at any place and time<br />Work without any pre-existing infrastructure<br />
  11. 11. Cons<br />Limited resources<br />Limited physical security<br />Lack of authorization facilities<br />Security protocols for wired networks cannot work for ad hoc networks<br />
  12. 12. Conclusion<br />

×