SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD30218 | Volume – 4 | Issue – 3 | March-April 2020 Page 159
A Study of Various Routing Techniques with
Issues and Challenges in Mobile Ad-Hoc Network
Neha Parveen Haque
Department of MCA, YMT College of Management, Kharghar, Navi Mumbai, Maharashtra, India
ABSTRACT
Wireless ad hoc network is dispersing type of wireless network. The network
is called as "ad hoc" network as it is not dependent on already existing
infrastructure, like routers in wired networks or access points in managed
network. Ad hoc networks become reliable for emergency response situation
such as natural disasters,militaryconflicts,etc byusingminimumcomposition
of system and quick distribution methods.Mobileadhocnetwork reliesonthe
existence of the least some infrastructure. Mobile IP requires home agent,
tunnels, and default router. DHCP requires servers and broadcast capabilities
of the medium reaching all participants or relays to server. Cellular phone
network requires base stations, infrastructure network etc. However, there
may be several situations where users of a network cannot rely on an
infrastructure, it too expensive, or there is none at all. It is necessary to note
that it target on so-called multi hop ad-hoc network when describing ad-hoc
networking. The ad-hoc setting up ofa connectionwithan infrastructureisnot
the main issues here. These networks should be mobile and use wireless
communications. This research paper focuses onroutingtechniquesinMobile
ad hoc networks and it also deciphers the issues and challenges of Mobile ad
hoc networks.
KEYWORDS: ad-hoc, MANETs, DSDV, AODV
How to cite this paper: Neha Parveen
Haque "A Study of Various Routing
Techniques with Issues and Challenges in
Mobile Ad-Hoc Network" Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-3, April 2020,
pp.159-161, URL:
www.ijtsrd.com/papers/ijtsrd30218.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
1. INTRODUCTION
A mobile ad hoc network is infrastructure less network of
mobile devices which are connected without wires as it is a
self-configuring and self-organizing [2]. Mobile ad hoc
network are formed dynamically by a sovereign system of
mobile node which are connected through wireless links.
There is no existing infrastructure or centralized
administration- no base station. Mobile nodes can move
randomly. It may be operated independently and it can be
connected to larger internet. Each node work as router.
Mobile IP and DHCP are used to handle the connections of
mobile devices to a fixed infrastructure. Mobile devices can
be connected either directly with an infrastructure using
mobile IP for mobility support andDHCPasa sourceofmany
parameters, such as an IP address. MANET research is
responsible for developing protocols and components to
enable ad-hoc networking betweenmobiledevices.Itshould
be noted that separation of end system and router is only a
logical separation. Typically, mobile nodes in an ad-hoc
scenario comprise routing and end system functionality [2].
Mobile ad hoc network (MANETs) represents a largeclassof
telecommunications networks, in which the nodes sharethe
same physical medium. MANETs continue to provide only a
fraction of their potential capacity this is the reason for the
include scarcity of spectrum, lack of stable infrastructure,
and non-commercial requirements such as mission-critical
systems that cannot tolerate. Ad-hoc networking concept is
not a new one, having been aroundinvariousformsformore
than 20 years. A MANET is an attractive and cost-effective
solution for providing communication in areas where fixed
infrastructure is not available and not reliable.
In spite of having several advantages, it also consist some of
the challenges issues that are required to be taken into
account in order to increase MANET survivability.
2. Review Literature:
Mobile Ad-Hoc Network are very difficult in distributed
system that consist of various wireless mobile node which
can actively organize on momentary ad-hoc network
topologies. Routing is the main problem in wireless
networks which display the obligation of integratedthedata
transmission in the networks.
2.1. Issues of mobile ad hoc networks:
1. No fixed topology:
In this term it signifies that there are many nodes which
transmission can be terminated due to its moving aspects.
There are significant routing protocols:
IJTSRD30218
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30218 | Volume – 4 | Issue – 3 | March-April 2020 Page 160
A. Route acquisition: In routing acquisition it delay while
transmission and doesn't not understand route.
B. Reconfiguration of route: Reconfiguration use various
algorithms to re-transmitthe nodeofmobilenetwork,to
achieve load balancing in wireless access points.
2. Battery power devices:
Battery power is major issue in wireless network. [1]A node
can transmit data through longer distances only when it has
sufficient amount of battery capabilitypower.Area coverage
by nodes is important aspects in mobile ad hoc network. It
consist of sensor nodes which can transmit power and
monitor battery.
3. Security in ad hoc network:
Ad hoc wireless network are highly vulnerable to security
attack which is prime issue. There is no single node (
centralized node) and no secure protocol is placed. [2] It
consist of many requirement in network security such as
confidentiality, integrity, availability and non reputation
which adhere with digital signature.
4. Quality of service:
QOS is ambitious to a developer becauseitstopologykeepon
changing constantly.[1] There is some loss of data packets.It
is very challenging to sustain network conditionin qualityof
services. QOS goal to modify the network pattern and
provide guarantees of performance. In this nodes act as
hosts and routers both at a time. Routing path are formed
and replaced to node mobility.
5. Secure multicast:
It is a communication method where a singledata packet can
be transmitted from a sender and replicated to set of
receiver.[2] Confidentiality guarantees that the network
information cannot be revealed to illegal unit. Integrity is
very important to maintain the data to transmitted among
nodes without any change or degradation.
2.2. Challenges in Mobile Ad Hoc Network:
1. Medium Access scheme protocol in ad-hoc wireless
network:
Mac protocol is responsible for sharing use of transmission
medium. [1]It consist of distributed operation, maximum
throughput, real-time traffic support, power control
capabilities, hidden terminal problem, exposed terminal
problem.
2. Routing protocols in ad-hoc networks:
It is responsible for determining a feasible path to a
destination based on certain criterion which discovering,
storing and exchanging routing information. [2]Challenges
consist of mobility, bandwidth constraints, resource
constraints, erroneous transmission medium, location-
dependent contention.
3. Multicasting:
Multicasting is an important traits in wireless ad-hoc
network which secure and rescue operations:distribution of
commands and military application.[5] Challenges occur
with fast recovery, control overhead, efficient group
management, scalability, security.
4. Transport Layer protocol in ad-hoc network:
Transport layer has major function of connection-based it
consist of setting up and maintain end-to -end connection,
flow control, congestion control.[5] There are various
performance degradation stems from high error rate,
frequent path breaks, network partitioning.
5. Self-organization protocol in ad-hoc network:
Self-organization consist of set of a mobile nodes with
unique identifiers and wireless medium of communication
into a connected network, which can do things like self-
configure or self-organize. [12]It concerns maintain the
structure when topological changes occur.
Self-organization is the main attractive property of ad-hoc
networks to perform self-organization which consist of
following requirement:
A. Neighbor discovery: A node should gather network
information (transmission of reception of discovery
packets).
B. Topologyorganization:Everynodesgathersinformation
about the entire network (a part of) and construct and
maintain the network topology.
C. [8]Topology reorganization: It has links break, nodes
switch off etc and requires periodic or aperiodic
exchange of topology information.
6. Security in ad-hoc network:
What makes ad hoc more vulnerable to attacks:
lack of central coordination;
shared wireless medium.
The attacks against ad-hoc networks are generally classified
into:
A. passive attacks is how malicious nodes attempt to
obtain information relayed in the network;
active attack: Active attacks disrupt the operation of
the network and classified into the following types:
• external attacks is attacks implemented by nodes
outside the network.
• Internal attacks is attacks implemented by nodes
belonging to the same network.
There are following security threads in ad-hoc networks:
Resource consumption Energy depletion to deplete the
power of the node relaying the traffic through them.
Buffer overflow fill the routing table with’bad’entriesto
consume the buffer space of the target node.
Host impersonal act asananothernoderespondingwith
control packets and interrupting data traffic.
Information disclosure is disclose information destined
for a certain node.
3. Research Methodology:
3.1. Routing In Mobile Ad-Hoc Network:
Routing consist of problem which determination and
management of routes between nodes in ad hoc network.
Routing has significant solution characteristics hasdifferent
metrics to optimize should be address frequent changes in
topology and traffic patterns etc.[10] It handle any system
characteristics such as unidirectional links it shouldaddress
trade-off between latency in determining a route and
overhead of route management (control traffic and state).
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30218 | Volume – 4 | Issue – 3 | March-April 2020 Page 161
3.2. Classification of Ad Hoc routing protocols:
Classification of mobile ad hoc network in routing technique
protocol can be excuted in various form, but most of these
has to rely on routing strategy and network structure.[11]
The routing protocol scan be differentiate as flat routing,
hierarchical routing and geographic positiononthenetwork
structure. There are different classification in mobile ad hoc
network which consist of proactive routing, active routing
and hybrid routing which is based on routing information
updates.
Figure: Classification of routing protocol for ad hoc
network.
A. Proactive Routing:
Proactive routing is table-driven routing protocol in mobile
ad hoc networks. In this each node maintains a routing table
which consist on example of algorithm on DSDV, STAR,
CGSR.[3] It is based on temporal information for routing
these based on two classification of past history (DSDV,
AODV) and future history (LBR). This type of protocols
maintains lists of destinations and their routes by
periodically distributing routing tables into network.[5]
The main disadvantages of such algorithms are:
Respective amount of data for maintenance.
Slow reaction on restructuring and failures.
B. Reactive Routing:
In reactive routing it is based on (On-Demand Routing)
which signifies only when there is demand of node.[6] No
node maintain a routing table they obtain necessary path
required. Connection establishment process is method to
occur the required path when it demands for node.Itconsist
of DSR and AODV example algorithm. This type of protocol
signifies a route on demand by flooding the network with
Route Request packets. The main disadvantages of such
algorithms are:
High latency time in route finding.
Excessive flooding can lead to network clogging.
[7] Examples of on-demand algorithms are:
ABR - Associativity-Based Routing
Ad hoc On-demand Distance Vector(AODV)
Dynamic Source Routing
Power-Aware DSR-based
C. Hybrid Routing:
Hybrid routing is combination of both network (Proactive
and Reactive routing) which is divided into zones. [9]It
obtains the best feature of proactive and reactive routing
protocols. It has two important algorithm:
CEDAR(Core- Extraction Distributed Ad Hoc Routing
Algorithm)
ZRP(Zone Routing Protocol)
It has classification based on:
Utilization of specific resources itconsistoffloodingand
geographical.
4. Conclusion:
The mobile ad hoc network (MANETs) is a collection of
wireless mobile host dynamically establishing a short live
network without the support of a network infrastructure. In
this type of environment, it's expectedthata largenumber of
ad hoc connection will exist in the small region without any
mutual coordinations. [4]Mobile ad hoc networks are the
future of wireless network. Nodes in these networks will
generate both users and application traffic and perform
various network function in ad hoc networks.
5. Reference:
[1] International Journal of Recent Technology and
Engineering(IJRTE)ISSN:2277-3878,Volume-8,Issue-
1S4, June 2019, Research on Various Routing
Techniques in Wireless Ad-hoc Networks Koppisetti
Giridhar, C. Anbuananth, N. Krishnaraj.
[2] A STUDY OF MOBILE AD-HOC NETWORKS -ISSUES
AND CHALLENGES Mohsin Ur Rahman Salfi Teacher,
Department Of School EducationKashmir,Gov'tofJ&K,
India, Mohsin Ur Rahman Salfi, International Journal of
Advanced Research in Computer Science, 6 (7),
September–October, 2015,93-96.
[3] Routing Techniques in Mobile Ad-Hoc Networks
(MANETs): An Analytical Review and Concerned
Challenges1Dr. Ajay Jangra, 2Nisha Arora,Dept.ofCSE,
U.I.E.T. Kurukshetra University,Kurukshetra,Haryana,
India.
[4] https://www.slideshare.net/MonodipSinghaRoy/mobi
le-adhoc-network-manet
[5] https://www.slideshare.net/cprakash2011/lecture-3-
4-prnet?next_slideshow=1
[6] https://en.wikipedia.org/wiki/List_of_ad_hoc_routing_
protocols
[7] http://web.cse.ohio-state.edu/~lai.1/788-
Au03/Presentations/routing.ppt
[8] https://www.slideshare.net/ENGMSHARI/adhoc-
networks
[9] https://www.slideshare.net/jagdeepmatharu/mobile-
ad-hoc-networks-18261031
[10] https://www.slideshare.net/ENGMSHARI/adhoc-
networks
[11] https://www.slideshare.net/jagdeepmatharu/mobile-
ad-hoc-networks-18261031
[12] https://www.researchgate.net/publication/26149663
9_Self-Organization_in_Ad_Hoc_Wireless_Networks

More Related Content

What's hot

A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
Review of Wi-Fi Offloads in LTE Network
Review of Wi-Fi Offloads in LTE NetworkReview of Wi-Fi Offloads in LTE Network
Review of Wi-Fi Offloads in LTE Networkijsrd.com
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
networking tutorial
networking tutorialnetworking tutorial
networking tutorialRaj Alam
 
An Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc NetworksAn Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc Networkseditor1knowledgecuddle
 
Alternative Network Deployments
Alternative Network DeploymentsAlternative Network Deployments
Alternative Network DeploymentsJose Saldana
 
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET Journal
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
 
Review on a new generation wireless mobile network
Review on a new generation wireless mobile network  Review on a new generation wireless mobile network
Review on a new generation wireless mobile network eSAT Publishing House
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocolsiosrjce
 
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...acijjournal
 
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...Editor IJCATR
 

What's hot (17)

A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
Review of Wi-Fi Offloads in LTE Network
Review of Wi-Fi Offloads in LTE NetworkReview of Wi-Fi Offloads in LTE Network
Review of Wi-Fi Offloads in LTE Network
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
networking tutorial
networking tutorialnetworking tutorial
networking tutorial
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
An Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc NetworksAn Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc Networks
 
Alternative Network Deployments
Alternative Network DeploymentsAlternative Network Deployments
Alternative Network Deployments
 
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
 
60766682 5 g
60766682 5 g60766682 5 g
60766682 5 g
 
Manet overview
Manet overviewManet overview
Manet overview
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
Review on a new generation wireless mobile network
Review on a new generation wireless mobile network  Review on a new generation wireless mobile network
Review on a new generation wireless mobile network
 
I05225564
I05225564I05225564
I05225564
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
 
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...
 

Similar to A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad Hoc Network

Centralized System in MANET with GRP Protocol
Centralized System in MANET with GRP ProtocolCentralized System in MANET with GRP Protocol
Centralized System in MANET with GRP Protocolijceronline
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddvEditor Jacotech
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksIRJET Journal
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
 
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc NetworksSecurity Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networksijtsrd
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoceSAT Publishing House
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEWSECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEWijmnct
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 

Similar to A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad Hoc Network (20)

Centralized System in MANET with GRP Protocol
Centralized System in MANET with GRP ProtocolCentralized System in MANET with GRP Protocol
Centralized System in MANET with GRP Protocol
 
H010524049
H010524049H010524049
H010524049
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc NetworksSecurity Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
 
[IJET-V1I6P19] Authors : Kirti
[IJET-V1I6P19] Authors : Kirti[IJET-V1I6P19] Authors : Kirti
[IJET-V1I6P19] Authors : Kirti
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEWSECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
 
20120130405026
2012013040502620120130405026
20120130405026
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad Hoc Network

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD30218 | Volume – 4 | Issue – 3 | March-April 2020 Page 159 A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad-Hoc Network Neha Parveen Haque Department of MCA, YMT College of Management, Kharghar, Navi Mumbai, Maharashtra, India ABSTRACT Wireless ad hoc network is dispersing type of wireless network. The network is called as "ad hoc" network as it is not dependent on already existing infrastructure, like routers in wired networks or access points in managed network. Ad hoc networks become reliable for emergency response situation such as natural disasters,militaryconflicts,etc byusingminimumcomposition of system and quick distribution methods.Mobileadhocnetwork reliesonthe existence of the least some infrastructure. Mobile IP requires home agent, tunnels, and default router. DHCP requires servers and broadcast capabilities of the medium reaching all participants or relays to server. Cellular phone network requires base stations, infrastructure network etc. However, there may be several situations where users of a network cannot rely on an infrastructure, it too expensive, or there is none at all. It is necessary to note that it target on so-called multi hop ad-hoc network when describing ad-hoc networking. The ad-hoc setting up ofa connectionwithan infrastructureisnot the main issues here. These networks should be mobile and use wireless communications. This research paper focuses onroutingtechniquesinMobile ad hoc networks and it also deciphers the issues and challenges of Mobile ad hoc networks. KEYWORDS: ad-hoc, MANETs, DSDV, AODV How to cite this paper: Neha Parveen Haque "A Study of Various Routing Techniques with Issues and Challenges in Mobile Ad-Hoc Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-3, April 2020, pp.159-161, URL: www.ijtsrd.com/papers/ijtsrd30218.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) 1. INTRODUCTION A mobile ad hoc network is infrastructure less network of mobile devices which are connected without wires as it is a self-configuring and self-organizing [2]. Mobile ad hoc network are formed dynamically by a sovereign system of mobile node which are connected through wireless links. There is no existing infrastructure or centralized administration- no base station. Mobile nodes can move randomly. It may be operated independently and it can be connected to larger internet. Each node work as router. Mobile IP and DHCP are used to handle the connections of mobile devices to a fixed infrastructure. Mobile devices can be connected either directly with an infrastructure using mobile IP for mobility support andDHCPasa sourceofmany parameters, such as an IP address. MANET research is responsible for developing protocols and components to enable ad-hoc networking betweenmobiledevices.Itshould be noted that separation of end system and router is only a logical separation. Typically, mobile nodes in an ad-hoc scenario comprise routing and end system functionality [2]. Mobile ad hoc network (MANETs) represents a largeclassof telecommunications networks, in which the nodes sharethe same physical medium. MANETs continue to provide only a fraction of their potential capacity this is the reason for the include scarcity of spectrum, lack of stable infrastructure, and non-commercial requirements such as mission-critical systems that cannot tolerate. Ad-hoc networking concept is not a new one, having been aroundinvariousformsformore than 20 years. A MANET is an attractive and cost-effective solution for providing communication in areas where fixed infrastructure is not available and not reliable. In spite of having several advantages, it also consist some of the challenges issues that are required to be taken into account in order to increase MANET survivability. 2. Review Literature: Mobile Ad-Hoc Network are very difficult in distributed system that consist of various wireless mobile node which can actively organize on momentary ad-hoc network topologies. Routing is the main problem in wireless networks which display the obligation of integratedthedata transmission in the networks. 2.1. Issues of mobile ad hoc networks: 1. No fixed topology: In this term it signifies that there are many nodes which transmission can be terminated due to its moving aspects. There are significant routing protocols: IJTSRD30218
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30218 | Volume – 4 | Issue – 3 | March-April 2020 Page 160 A. Route acquisition: In routing acquisition it delay while transmission and doesn't not understand route. B. Reconfiguration of route: Reconfiguration use various algorithms to re-transmitthe nodeofmobilenetwork,to achieve load balancing in wireless access points. 2. Battery power devices: Battery power is major issue in wireless network. [1]A node can transmit data through longer distances only when it has sufficient amount of battery capabilitypower.Area coverage by nodes is important aspects in mobile ad hoc network. It consist of sensor nodes which can transmit power and monitor battery. 3. Security in ad hoc network: Ad hoc wireless network are highly vulnerable to security attack which is prime issue. There is no single node ( centralized node) and no secure protocol is placed. [2] It consist of many requirement in network security such as confidentiality, integrity, availability and non reputation which adhere with digital signature. 4. Quality of service: QOS is ambitious to a developer becauseitstopologykeepon changing constantly.[1] There is some loss of data packets.It is very challenging to sustain network conditionin qualityof services. QOS goal to modify the network pattern and provide guarantees of performance. In this nodes act as hosts and routers both at a time. Routing path are formed and replaced to node mobility. 5. Secure multicast: It is a communication method where a singledata packet can be transmitted from a sender and replicated to set of receiver.[2] Confidentiality guarantees that the network information cannot be revealed to illegal unit. Integrity is very important to maintain the data to transmitted among nodes without any change or degradation. 2.2. Challenges in Mobile Ad Hoc Network: 1. Medium Access scheme protocol in ad-hoc wireless network: Mac protocol is responsible for sharing use of transmission medium. [1]It consist of distributed operation, maximum throughput, real-time traffic support, power control capabilities, hidden terminal problem, exposed terminal problem. 2. Routing protocols in ad-hoc networks: It is responsible for determining a feasible path to a destination based on certain criterion which discovering, storing and exchanging routing information. [2]Challenges consist of mobility, bandwidth constraints, resource constraints, erroneous transmission medium, location- dependent contention. 3. Multicasting: Multicasting is an important traits in wireless ad-hoc network which secure and rescue operations:distribution of commands and military application.[5] Challenges occur with fast recovery, control overhead, efficient group management, scalability, security. 4. Transport Layer protocol in ad-hoc network: Transport layer has major function of connection-based it consist of setting up and maintain end-to -end connection, flow control, congestion control.[5] There are various performance degradation stems from high error rate, frequent path breaks, network partitioning. 5. Self-organization protocol in ad-hoc network: Self-organization consist of set of a mobile nodes with unique identifiers and wireless medium of communication into a connected network, which can do things like self- configure or self-organize. [12]It concerns maintain the structure when topological changes occur. Self-organization is the main attractive property of ad-hoc networks to perform self-organization which consist of following requirement: A. Neighbor discovery: A node should gather network information (transmission of reception of discovery packets). B. Topologyorganization:Everynodesgathersinformation about the entire network (a part of) and construct and maintain the network topology. C. [8]Topology reorganization: It has links break, nodes switch off etc and requires periodic or aperiodic exchange of topology information. 6. Security in ad-hoc network: What makes ad hoc more vulnerable to attacks: lack of central coordination; shared wireless medium. The attacks against ad-hoc networks are generally classified into: A. passive attacks is how malicious nodes attempt to obtain information relayed in the network; active attack: Active attacks disrupt the operation of the network and classified into the following types: • external attacks is attacks implemented by nodes outside the network. • Internal attacks is attacks implemented by nodes belonging to the same network. There are following security threads in ad-hoc networks: Resource consumption Energy depletion to deplete the power of the node relaying the traffic through them. Buffer overflow fill the routing table with’bad’entriesto consume the buffer space of the target node. Host impersonal act asananothernoderespondingwith control packets and interrupting data traffic. Information disclosure is disclose information destined for a certain node. 3. Research Methodology: 3.1. Routing In Mobile Ad-Hoc Network: Routing consist of problem which determination and management of routes between nodes in ad hoc network. Routing has significant solution characteristics hasdifferent metrics to optimize should be address frequent changes in topology and traffic patterns etc.[10] It handle any system characteristics such as unidirectional links it shouldaddress trade-off between latency in determining a route and overhead of route management (control traffic and state).
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30218 | Volume – 4 | Issue – 3 | March-April 2020 Page 161 3.2. Classification of Ad Hoc routing protocols: Classification of mobile ad hoc network in routing technique protocol can be excuted in various form, but most of these has to rely on routing strategy and network structure.[11] The routing protocol scan be differentiate as flat routing, hierarchical routing and geographic positiononthenetwork structure. There are different classification in mobile ad hoc network which consist of proactive routing, active routing and hybrid routing which is based on routing information updates. Figure: Classification of routing protocol for ad hoc network. A. Proactive Routing: Proactive routing is table-driven routing protocol in mobile ad hoc networks. In this each node maintains a routing table which consist on example of algorithm on DSDV, STAR, CGSR.[3] It is based on temporal information for routing these based on two classification of past history (DSDV, AODV) and future history (LBR). This type of protocols maintains lists of destinations and their routes by periodically distributing routing tables into network.[5] The main disadvantages of such algorithms are: Respective amount of data for maintenance. Slow reaction on restructuring and failures. B. Reactive Routing: In reactive routing it is based on (On-Demand Routing) which signifies only when there is demand of node.[6] No node maintain a routing table they obtain necessary path required. Connection establishment process is method to occur the required path when it demands for node.Itconsist of DSR and AODV example algorithm. This type of protocol signifies a route on demand by flooding the network with Route Request packets. The main disadvantages of such algorithms are: High latency time in route finding. Excessive flooding can lead to network clogging. [7] Examples of on-demand algorithms are: ABR - Associativity-Based Routing Ad hoc On-demand Distance Vector(AODV) Dynamic Source Routing Power-Aware DSR-based C. Hybrid Routing: Hybrid routing is combination of both network (Proactive and Reactive routing) which is divided into zones. [9]It obtains the best feature of proactive and reactive routing protocols. It has two important algorithm: CEDAR(Core- Extraction Distributed Ad Hoc Routing Algorithm) ZRP(Zone Routing Protocol) It has classification based on: Utilization of specific resources itconsistoffloodingand geographical. 4. Conclusion: The mobile ad hoc network (MANETs) is a collection of wireless mobile host dynamically establishing a short live network without the support of a network infrastructure. In this type of environment, it's expectedthata largenumber of ad hoc connection will exist in the small region without any mutual coordinations. [4]Mobile ad hoc networks are the future of wireless network. Nodes in these networks will generate both users and application traffic and perform various network function in ad hoc networks. 5. Reference: [1] International Journal of Recent Technology and Engineering(IJRTE)ISSN:2277-3878,Volume-8,Issue- 1S4, June 2019, Research on Various Routing Techniques in Wireless Ad-hoc Networks Koppisetti Giridhar, C. Anbuananth, N. Krishnaraj. [2] A STUDY OF MOBILE AD-HOC NETWORKS -ISSUES AND CHALLENGES Mohsin Ur Rahman Salfi Teacher, Department Of School EducationKashmir,Gov'tofJ&K, India, Mohsin Ur Rahman Salfi, International Journal of Advanced Research in Computer Science, 6 (7), September–October, 2015,93-96. [3] Routing Techniques in Mobile Ad-Hoc Networks (MANETs): An Analytical Review and Concerned Challenges1Dr. Ajay Jangra, 2Nisha Arora,Dept.ofCSE, U.I.E.T. Kurukshetra University,Kurukshetra,Haryana, India. [4] https://www.slideshare.net/MonodipSinghaRoy/mobi le-adhoc-network-manet [5] https://www.slideshare.net/cprakash2011/lecture-3- 4-prnet?next_slideshow=1 [6] https://en.wikipedia.org/wiki/List_of_ad_hoc_routing_ protocols [7] http://web.cse.ohio-state.edu/~lai.1/788- Au03/Presentations/routing.ppt [8] https://www.slideshare.net/ENGMSHARI/adhoc- networks [9] https://www.slideshare.net/jagdeepmatharu/mobile- ad-hoc-networks-18261031 [10] https://www.slideshare.net/ENGMSHARI/adhoc- networks [11] https://www.slideshare.net/jagdeepmatharu/mobile- ad-hoc-networks-18261031 [12] https://www.researchgate.net/publication/26149663 9_Self-Organization_in_Ad_Hoc_Wireless_Networks