SlideShare a Scribd company logo
1 of 14
Table of ConTenTs
1.   Computer Network and its type

2.   Ad-hoc Network and MANET

3.   Features of MANET

4.   Working of MANET

5.   Security and its challenges in MANET

6.   Advantages and Application of MANET
Types of Network
MobIle aD HoC neTWoRK
Ad hoc is a Latin phrase which means "for this purpose “

A MANET is a type of Ad-hoc network.

Does not require base station.

Mobile Ad hoc Networks are self configuring networks.

Use wireless connections to connect to various networks.

Typical “peer-to-peer” rather than “client-server”.
1.Autonomous terminal

2.Operating without a central coordinator

3.Dynamic network topology

4.Distributed Operation

5.Multi-hop routing
Working of MANET
             May need to traverse multiple links to reach destination




                                                                 Internet
                                 C
                       B                   D
                                                     E
                                                     E
               A
                                                  Gateway


                                 F


 After one of the nodes is configured as a gateway, the
 Stand-alone MANET
entire network is connected to an external network like
                       Internet
Challenges in Securing MANETs




                          Initial
                          Routing
                          before
                          attack
Challenges in Securing MANETs

                           Data Packets




                           Initial
                           Routing
                           before
                           attack
Challenges in Securing MANETs

•Data packets received in
one place of the network
and replay them in
another place
•Attacker can attack the
Routing Algorithm
Challenges in Securing MANETs

Most packets will be
routed to the Attacker

The Attacker can
drop packets or
forward packets to
avoid detection
Advantages of MANET
This can be developed where there is less
telecommunication infrastructure

Cost Estimation is very less

These networks can be set up at any place and time.
MANET is Multi-hop network with Autonomous Terminal
and dynamic network topology.

MANET can be used as Temporary Network

It requires less time
Personal area networking

Military environments

Disaster Area such as War-Zone and Natural Calamity

Civilian environments

Emergency operations

VANE (Vehicular ad hoc Network)
     T
T       H   a   n
    K

More Related Content

What's hot

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks DEBABRATASINGH3
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network pptPramod Kuruvatti
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile CommunicationNoushad Hasan
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks Jubayer Alam Shoikat
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSjuno susi
 

What's hot (20)

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Cellular network
Cellular networkCellular network
Cellular network
 
MANET VS VANET
MANET VS VANETMANET VS VANET
MANET VS VANET
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
GSM Technology
GSM TechnologyGSM Technology
GSM Technology
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 

Viewers also liked

Viewers also liked (12)

Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Manet
ManetManet
Manet
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimization
 
Manet
ManetManet
Manet
 
Ant Colony Optimization presentation
Ant Colony Optimization presentationAnt Colony Optimization presentation
Ant Colony Optimization presentation
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimization
 

Similar to MANET

Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkTarun Varshney
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSPallepati Vasavi
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7Ramesh Babu
 
Networking Technologies Basic's complete notes
Networking Technologies Basic's complete notesNetworking Technologies Basic's complete notes
Networking Technologies Basic's complete notesIndrajaMeghavathula
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of networkhazirma
 
Presentation fyp
Presentation fypPresentation fyp
Presentation fypumisyafika
 
Mobile ad hoc networking - An introduction
Mobile ad hoc networking  - An introduction Mobile ad hoc networking  - An introduction
Mobile ad hoc networking - An introduction Ginoy Joy
 
To mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETTo mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETIJERA Editor
 
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoTModule 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoTashwini870728
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Vinish Alikkal
 

Similar to MANET (20)

Mymanet
MymanetMymanet
Mymanet
 
Manet
ManetManet
Manet
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Networking Technologies Basic's complete notes
Networking Technologies Basic's complete notesNetworking Technologies Basic's complete notes
Networking Technologies Basic's complete notes
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of network
 
P26093098
P26093098P26093098
P26093098
 
Presentation fyp
Presentation fypPresentation fyp
Presentation fyp
 
Mobile ad hoc networking - An introduction
Mobile ad hoc networking  - An introduction Mobile ad hoc networking  - An introduction
Mobile ad hoc networking - An introduction
 
270 273
270 273270 273
270 273
 
To mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETTo mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANET
 
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoTModule 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

MANET

  • 1.
  • 2. Table of ConTenTs 1. Computer Network and its type 2. Ad-hoc Network and MANET 3. Features of MANET 4. Working of MANET 5. Security and its challenges in MANET 6. Advantages and Application of MANET
  • 4.
  • 5. MobIle aD HoC neTWoRK Ad hoc is a Latin phrase which means "for this purpose “ A MANET is a type of Ad-hoc network. Does not require base station. Mobile Ad hoc Networks are self configuring networks. Use wireless connections to connect to various networks. Typical “peer-to-peer” rather than “client-server”.
  • 6. 1.Autonomous terminal 2.Operating without a central coordinator 3.Dynamic network topology 4.Distributed Operation 5.Multi-hop routing
  • 7. Working of MANET May need to traverse multiple links to reach destination Internet C B D E E A Gateway F After one of the nodes is configured as a gateway, the Stand-alone MANET entire network is connected to an external network like Internet
  • 8. Challenges in Securing MANETs Initial Routing before attack
  • 9. Challenges in Securing MANETs Data Packets Initial Routing before attack
  • 10. Challenges in Securing MANETs •Data packets received in one place of the network and replay them in another place •Attacker can attack the Routing Algorithm
  • 11. Challenges in Securing MANETs Most packets will be routed to the Attacker The Attacker can drop packets or forward packets to avoid detection
  • 12. Advantages of MANET This can be developed where there is less telecommunication infrastructure Cost Estimation is very less These networks can be set up at any place and time. MANET is Multi-hop network with Autonomous Terminal and dynamic network topology. MANET can be used as Temporary Network It requires less time
  • 13. Personal area networking Military environments Disaster Area such as War-Zone and Natural Calamity Civilian environments Emergency operations VANE (Vehicular ad hoc Network) T
  • 14. T H a n K

Editor's Notes

  1. A MANET is a type of ad hoc network. Ad hoc Network refers to a network connection and does not require access point or a wireless base station. Because MANETS are mobile , they use wireless connections to connect to various networks.
  2. Here is a simple routing algorithm for constructing a spanning tree rooted at a base station. The base station broadcasts a beacon. Those nodes who can hear the beacon, mark the base station as its parent. The beacon is then rebroadcast recursively to construct the spanning tree. Those nodes who don ’ t have a parent yet and receive the beacon will mark the sender as its parent.
  3. The routing tree enables dissemination of information from base station to nodes or collection of data from nodes to base station. Here is an example, all data packets will be sent to base station through the constructed routing tree.
  4. Wormholes can attack the routing algorithm. Since node chooses its parent based on the first copy of the beacon it receives. If an adversary can tunnel the beacon to distant parts of the network faster than it would reach there through normal multi-hop transmission, then the adversary can influence a node ’ s choice of its parent.