SlideShare a Scribd company logo
1 of 17
Routing in adhoc networks of mobile hosts
                            SUBMITTED BY

                              S.Aravind
                             (09491A0423)




      Department of Electronics and Communication Engineering

      QIS COLLEGE OF ENGINEERING AND TECHNOLOGY
                                   .
What is an Ad hoc Network
• Collection of mobile wireless nodes forming a network
  without the aid of any infrastructure or centralized
  administration
• Nodes have limited transmission range
• Nodes act as a routers
DIFFERENCE B/W ADHOC AND
    NORMAL WIRELESS MODE
ADHOC MODE      NORM.WIRELESS MODE
WHY IT IS ADHOC
• IN NORMAL WIRELESS MODE BACK LOG IS
  INFRASTRUCTURE..
• IN ADHOC THERE IS NO INFRASTRUCTURE..SO
  IT IS PREFERRED TO OTHER N/W’S
• WI-FI,WI-MAX,BLUETOOTH ARE SOME OF
  INFRASTRUCTURED N/W’S
• MANET,VANET ARE SOME OF THE ADHOC
  NETWORKS
ROUTING IN ADHOC
• ROUTING IS NOTHING BUT THE WAY OF DATA
  TRANSFERRING B/W THE NODES.
• IN ADHOC EVERY COMPUTER ,MOBILE,PDA
  ACTS AS NODE,DATA IS TRANSFERRED B/W
  THE NODES
• DATA IS TRANSFERRED B/W THE NODES IN
  THE FORM OF PACKETS
TYPES OF ROUTING PROTOCOLS IN
               ADHOC
• Proactive routing: This type of protocols maintains
  fresh lists of destinations and their routes by
  periodically distributing routing tables throughout the
  network
• Reactive (on demand ) routing: This type of protocols
  finds a route on demand by flooding the network with
  Route Request packets
• Flow oriented routing: This type of protocols finds a
  route on demand by following present flows.
• Hybrid (both proactive &reactive routing):This type of
  protocols combines the advantages of proactive and of
  reactive routing
• Hierarchical routing protocols:With this type of protocols
  the choice of proactive and of reactive routing depends on
  the hierarchic level where a node resides.
• Backpressure routing:This type of routing does not pre-
  compute paths. It chooses next-hops dynamically as a
  packet is in progress toward its destination. These decisions
  are based on congestion gradients of neighbor nodes
• Host specific routing protocols:This type of protocols
  requires thorough administration to tailor the routing to a
  certain network layout and a distinct flow strategy
• Power aware routing protocols:Here the data is tranferred
  by calculating power of the next node.Highest power node
  is selected for transferring of data
ADHOC PROTOCOLS DERIVED TYPE
                     adhoc Mobile Routing Protocols




 Table Driven Protocols                               On Demand Protocols




                                Hybrid
                               Protocols
    DSDV, WR                                             ABR, DSR, AO
     P, STAR                                              DV, TORA


                                 ZRP
Security Challenges in Ad Hoc
                Networks
• Lack of Infrastructure or centralized control
   – Key management becomes difficult
• Dynamic topology
   – Challenging to design sophisticated & secure routing
     protocols
• Communication through Radio Waves
   – Difficult to prevent eavesdropping
• Vulnerabilities of routing mechanism
   – Non-cooperation of nodes
• Vulnerabilities of nodes
   – Captured or Compromised
ENERGY EFFICIENT ROUTING
          PROTOCOLS FOR ADHOC
• 1. DYNAMIC SOURCE ROUTING (DSR):The key feature of
  DSR is the use of source routing. That is ,the sender knows
  the complete hop by hop route to destination .These routes
  are stored in route cache.
• 2. MINIMUM BATTERY COST ROUTING (MBCR):The
  minimum battery cost routing model uses the remaining
  battery capacity of the node to measure the node life
  time, and path is choosed as per the good life time basis.
• 3. MINIMUM MAXIMUM BATTERY COST ROUTING
  (MMBCR):The main objective of MMBCR is to make sure
  that route selection is done based on the battery capacity
  of all the individual nodes. It selects the path having more
  battery capacity
ADVANTAGES AND DISADVANTAGES
ADVANTAGES:
• Can be accessible to remote areas where a wlan cannot reach.
• Can be established and destroyed easily.
• There is no need of long wires and cables and infrastructure
   equipment.
• It can be considered as fastest operation.
• Can be accessed at anywhere with the same ip address
DISADVANTAGES:
• No security in data transfer.
• If the battery power consumed the node will be destroyed.
• Threats from compromised nodes inside the network
• Lack of centralized management facility
PRACTICAL XP ADHOC SETUP
FUTURE REASERCHES
•   Routing Protocol Optimization
•   QoS Support
•   Simulation
•   Security
•   Standardization and Interoperability
CONCLUSION
• THOUGH ADHOC HAS SOME DEMERITS..LIKE
  SECURITY AND OTHER ,IT IS SOLVING SO
  MUCH PROBLEMS IN OUR DAY TO DAY
  LIFE…SO THINK FOR BETTER ADHOC…..ING
THANK YOU FOR YOUR
       CONCENTRATION




ANY QUESTIONS FROM YOUR SIDE…?

More Related Content

What's hot

ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking ConceptTushar Ranjan
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDushhyant Kumar
 
Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)Sajan Sahu
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Ec8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 1 watmEc8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 1 watmHemalathaR31
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Sohebuzzaman Khan
 

What's hot (19)

ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
Ch 02 (1)
Ch 02 (1)Ch 02 (1)
Ch 02 (1)
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Lecture 7
 Lecture 7 Lecture 7
Lecture 7
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)
 
MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Lecture 3 4. prnet
Lecture 3 4. prnetLecture 3 4. prnet
Lecture 3 4. prnet
 
ATM
ATMATM
ATM
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Switching
SwitchingSwitching
Switching
 
Ec8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 1 watmEc8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 1 watm
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 
Frame relay
Frame relayFrame relay
Frame relay
 

Viewers also liked

issues in desigining routing protocols
 issues in desigining routing protocols issues in desigining routing protocols
issues in desigining routing protocolsPradeep Kumar TS
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksPradeep Kumar TS
 
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDr Praveen Jain
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 

Viewers also liked (6)

issues in desigining routing protocols
 issues in desigining routing protocols issues in desigining routing protocols
issues in desigining routing protocols
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attack
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 

Similar to Aravindsikharam

Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Umang Singh
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptxsameernsn1
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptxkarthiksmart21
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkTarun Varshney
 
Routing Techniques in Wireless Sensor Networks.pptx
Routing Techniques in Wireless Sensor Networks.pptxRouting Techniques in Wireless Sensor Networks.pptx
Routing Techniques in Wireless Sensor Networks.pptxKp Sharma
 
wireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptxwireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptxmayurbankar2
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxBinyamBekeleMoges
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTINGdevika g
 
fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...
fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...
fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...MrSSaiKumar
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
ad-hoc network by divyajyothi
ad-hoc network by divyajyothiad-hoc network by divyajyothi
ad-hoc network by divyajyothidivyajyothi405
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptxMunazza63
 
IT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IVIT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IVpkaviya
 
adhoc wireless networks and its issues.pdf
adhoc wireless networks and its issues.pdfadhoc wireless networks and its issues.pdf
adhoc wireless networks and its issues.pdfparuvathavardhinij
 

Similar to Aravindsikharam (20)

Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
 
abbas.pptx
abbas.pptxabbas.pptx
abbas.pptx
 
Routing Techniques in Wireless Sensor Networks.pptx
Routing Techniques in Wireless Sensor Networks.pptxRouting Techniques in Wireless Sensor Networks.pptx
Routing Techniques in Wireless Sensor Networks.pptx
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
wireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptxwireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptx
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptx
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...
fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...
fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
G0943745
G0943745G0943745
G0943745
 
ad-hoc network by divyajyothi
ad-hoc network by divyajyothiad-hoc network by divyajyothi
ad-hoc network by divyajyothi
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
Manet
ManetManet
Manet
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
IT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IVIT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IV
 
adhoc wireless networks and its issues.pdf
adhoc wireless networks and its issues.pdfadhoc wireless networks and its issues.pdf
adhoc wireless networks and its issues.pdf
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Aravindsikharam

  • 1. Routing in adhoc networks of mobile hosts SUBMITTED BY S.Aravind (09491A0423) Department of Electronics and Communication Engineering QIS COLLEGE OF ENGINEERING AND TECHNOLOGY .
  • 2. What is an Ad hoc Network • Collection of mobile wireless nodes forming a network without the aid of any infrastructure or centralized administration • Nodes have limited transmission range • Nodes act as a routers
  • 3. DIFFERENCE B/W ADHOC AND NORMAL WIRELESS MODE ADHOC MODE NORM.WIRELESS MODE
  • 4. WHY IT IS ADHOC • IN NORMAL WIRELESS MODE BACK LOG IS INFRASTRUCTURE.. • IN ADHOC THERE IS NO INFRASTRUCTURE..SO IT IS PREFERRED TO OTHER N/W’S • WI-FI,WI-MAX,BLUETOOTH ARE SOME OF INFRASTRUCTURED N/W’S • MANET,VANET ARE SOME OF THE ADHOC NETWORKS
  • 5. ROUTING IN ADHOC • ROUTING IS NOTHING BUT THE WAY OF DATA TRANSFERRING B/W THE NODES. • IN ADHOC EVERY COMPUTER ,MOBILE,PDA ACTS AS NODE,DATA IS TRANSFERRED B/W THE NODES • DATA IS TRANSFERRED B/W THE NODES IN THE FORM OF PACKETS
  • 6. TYPES OF ROUTING PROTOCOLS IN ADHOC • Proactive routing: This type of protocols maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network • Reactive (on demand ) routing: This type of protocols finds a route on demand by flooding the network with Route Request packets • Flow oriented routing: This type of protocols finds a route on demand by following present flows. • Hybrid (both proactive &reactive routing):This type of protocols combines the advantages of proactive and of reactive routing
  • 7. • Hierarchical routing protocols:With this type of protocols the choice of proactive and of reactive routing depends on the hierarchic level where a node resides. • Backpressure routing:This type of routing does not pre- compute paths. It chooses next-hops dynamically as a packet is in progress toward its destination. These decisions are based on congestion gradients of neighbor nodes • Host specific routing protocols:This type of protocols requires thorough administration to tailor the routing to a certain network layout and a distinct flow strategy • Power aware routing protocols:Here the data is tranferred by calculating power of the next node.Highest power node is selected for transferring of data
  • 8. ADHOC PROTOCOLS DERIVED TYPE adhoc Mobile Routing Protocols Table Driven Protocols On Demand Protocols Hybrid Protocols DSDV, WR ABR, DSR, AO P, STAR DV, TORA ZRP
  • 9. Security Challenges in Ad Hoc Networks • Lack of Infrastructure or centralized control – Key management becomes difficult • Dynamic topology – Challenging to design sophisticated & secure routing protocols • Communication through Radio Waves – Difficult to prevent eavesdropping • Vulnerabilities of routing mechanism – Non-cooperation of nodes • Vulnerabilities of nodes – Captured or Compromised
  • 10. ENERGY EFFICIENT ROUTING PROTOCOLS FOR ADHOC • 1. DYNAMIC SOURCE ROUTING (DSR):The key feature of DSR is the use of source routing. That is ,the sender knows the complete hop by hop route to destination .These routes are stored in route cache. • 2. MINIMUM BATTERY COST ROUTING (MBCR):The minimum battery cost routing model uses the remaining battery capacity of the node to measure the node life time, and path is choosed as per the good life time basis. • 3. MINIMUM MAXIMUM BATTERY COST ROUTING (MMBCR):The main objective of MMBCR is to make sure that route selection is done based on the battery capacity of all the individual nodes. It selects the path having more battery capacity
  • 11. ADVANTAGES AND DISADVANTAGES ADVANTAGES: • Can be accessible to remote areas where a wlan cannot reach. • Can be established and destroyed easily. • There is no need of long wires and cables and infrastructure equipment. • It can be considered as fastest operation. • Can be accessed at anywhere with the same ip address DISADVANTAGES: • No security in data transfer. • If the battery power consumed the node will be destroyed. • Threats from compromised nodes inside the network • Lack of centralized management facility
  • 13.
  • 14.
  • 15. FUTURE REASERCHES • Routing Protocol Optimization • QoS Support • Simulation • Security • Standardization and Interoperability
  • 16. CONCLUSION • THOUGH ADHOC HAS SOME DEMERITS..LIKE SECURITY AND OTHER ,IT IS SOLVING SO MUCH PROBLEMS IN OUR DAY TO DAY LIFE…SO THINK FOR BETTER ADHOC…..ING
  • 17. THANK YOU FOR YOUR CONCENTRATION ANY QUESTIONS FROM YOUR SIDE…?