This document discusses ad hoc networks and wireless sensor networks. It defines ad hoc networks as temporary networks composed of mobile nodes without preexisting communication infrastructure. It describes key characteristics of ad hoc networks including self-organization, multi-hop routing, and mobility. The document outlines several types of ad hoc networks and discusses important issues in designing routing protocols, medium access control, security, energy management, and more for ad hoc networks.
The document discusses free computer science eBooks and technology news that are being provided. It includes links to blogs sharing this free content and encourages clicking on advertisements to support their work. It then discusses the topics of wireless technologies and Wi-Fi networks in particular, covering introductions, architectures, elements, how they work, topologies and configurations.
A computer network connects devices like computers, printers and routers that can communicate with each other. There are two main types of networks: local area networks (LANs) within a building and wide area networks (WANs) that interconnect LANs across large geographic areas. LANs use technologies like Ethernet and transmit data through cabling like twisted pair or fiber optic cables. Common devices that help manage data flow on networks include switches, routers and wireless access points.
Definition
A decentralized type of wireless network, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, It can turn the dream of networking at any place and at time into reality. We are almost there by the way .Ex- Bluetooth enabled mobile phones such as 3G, laptops, handheld digital devices, personal digital assistants, or wearable computers
Computer networks connect autonomous computers located anywhere. A LAN connects computers in a small area like a room or building using high speed. A MAN operates in a city and a WAN spans large distances like countries. Networks allow resource, information and communication sharing. Common topologies include bus, star, ring and mesh, with star being most common. Key components are physical media, devices like hubs, switches and routers, computers and networking software. TCP/IP is a common networking protocol and applications include email, web, commerce, telephony and conferencing.
A computer network allows devices to communicate over transmission media. There are two main types of networks: local area networks (LANs) and wide area networks (WANs). The Open Systems Interconnection (OSI) model defines seven layers of network communication, with the lower layers focusing on physical connectivity and the upper layers on applications and user data.
The document discusses key concepts related to ad hoc and wireless sensor networks. It defines ad hoc networks as infrastructureless wireless networks consisting of nodes that act as both senders and receivers and dynamically route data packets. It covers routing algorithms, single vs multi-hop communication, and unicast, broadcast, and multicast transmission models. The document also discusses different types of ad hoc networks including wireless mesh, sensor, and hybrid networks and compares them to cellular networks. It outlines applications and challenges at different layers of the networking protocol stack.
The document discusses key concepts related to ad hoc and wireless sensor networks. It defines ad hoc networks as infrastructureless, decentralized wireless networks where nodes can act as both senders and receivers and dynamically route data through other nodes. It covers routing algorithms, single vs multi-hop communication, unicast vs broadcast vs multicast transmission, and compares ad hoc networks to cellular networks and WANETs/MANETs. Application areas like military, emergency response, and wireless sensor networks are also mentioned.
MANET stands for mobile ad hoc network. It is a type of wireless network that can change locations and configure itself without a centralized administration. Nodes in a MANET can connect to each other to form a temporary network without any existing network infrastructure. Routing in MANETs is challenging due to the dynamic network topology, asymmetric links, and interference. Common routing algorithms for MANETs include distance vector, link state, and various protocols designed specifically for MANETs to handle mobility.
The document discusses free computer science eBooks and technology news that are being provided. It includes links to blogs sharing this free content and encourages clicking on advertisements to support their work. It then discusses the topics of wireless technologies and Wi-Fi networks in particular, covering introductions, architectures, elements, how they work, topologies and configurations.
A computer network connects devices like computers, printers and routers that can communicate with each other. There are two main types of networks: local area networks (LANs) within a building and wide area networks (WANs) that interconnect LANs across large geographic areas. LANs use technologies like Ethernet and transmit data through cabling like twisted pair or fiber optic cables. Common devices that help manage data flow on networks include switches, routers and wireless access points.
Definition
A decentralized type of wireless network, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, It can turn the dream of networking at any place and at time into reality. We are almost there by the way .Ex- Bluetooth enabled mobile phones such as 3G, laptops, handheld digital devices, personal digital assistants, or wearable computers
Computer networks connect autonomous computers located anywhere. A LAN connects computers in a small area like a room or building using high speed. A MAN operates in a city and a WAN spans large distances like countries. Networks allow resource, information and communication sharing. Common topologies include bus, star, ring and mesh, with star being most common. Key components are physical media, devices like hubs, switches and routers, computers and networking software. TCP/IP is a common networking protocol and applications include email, web, commerce, telephony and conferencing.
A computer network allows devices to communicate over transmission media. There are two main types of networks: local area networks (LANs) and wide area networks (WANs). The Open Systems Interconnection (OSI) model defines seven layers of network communication, with the lower layers focusing on physical connectivity and the upper layers on applications and user data.
The document discusses key concepts related to ad hoc and wireless sensor networks. It defines ad hoc networks as infrastructureless wireless networks consisting of nodes that act as both senders and receivers and dynamically route data packets. It covers routing algorithms, single vs multi-hop communication, and unicast, broadcast, and multicast transmission models. The document also discusses different types of ad hoc networks including wireless mesh, sensor, and hybrid networks and compares them to cellular networks. It outlines applications and challenges at different layers of the networking protocol stack.
The document discusses key concepts related to ad hoc and wireless sensor networks. It defines ad hoc networks as infrastructureless, decentralized wireless networks where nodes can act as both senders and receivers and dynamically route data through other nodes. It covers routing algorithms, single vs multi-hop communication, unicast vs broadcast vs multicast transmission, and compares ad hoc networks to cellular networks and WANETs/MANETs. Application areas like military, emergency response, and wireless sensor networks are also mentioned.
MANET stands for mobile ad hoc network. It is a type of wireless network that can change locations and configure itself without a centralized administration. Nodes in a MANET can connect to each other to form a temporary network without any existing network infrastructure. Routing in MANETs is challenging due to the dynamic network topology, asymmetric links, and interference. Common routing algorithms for MANETs include distance vector, link state, and various protocols designed specifically for MANETs to handle mobility.
MANET stands for mobile ad hoc network. It is a type of wireless network that can change locations and configure itself without a centralized administration. Nodes in a MANET can connect to each other to form a temporary network without any existing network infrastructure. Routing in MANETs is challenging due to the dynamic network topology, asymmetric links, and interference. Common routing algorithms for MANETs include distance vector, link state, and various protocols designed specifically for MANETs to handle mobility.
The document discusses ad hoc and sensor networks. It begins with an introduction and outline that describes key topics like features and issues of ad hoc wireless networks, types of networks, routing protocol classifications and examples of table driven and on-demand routing protocols. The document then provides more detailed descriptions of topics like infrastructure versus ad hoc networks, challenges in designing routing protocols, characteristics of good routing protocols, examples of DSDV and AODV routing protocols, and message types used in AODV.
The document discusses ad-hoc networks and their key characteristics. It describes several challenges in ad-hoc networks including limited battery power, dynamic network topology, and scalability issues. It also summarizes several ad-hoc network routing protocols (e.g. DSDV, AODV, DSR), addressing both table-driven and on-demand approaches. Additionally, it outlines some ad-hoc MAC protocols like MACA and PAMAS that aim to manage shared wireless medium access.
This document contains a practice exam for Cisco's 640-802 CCNA certification. It includes 10 multiple choice questions testing knowledge of networking concepts like the functions of routers, differences between switches and hubs, and network addressing. Correct answers are provided along with explanations of the concepts being tested.
This document provides information about data communication and computer networks. It defines data communication as the exchange of data between a source and receiver via transmission media. A computer network is defined as an interconnection of computers that share resources through a communication medium. The key differences between data communication and computer networks are that computer networks can transfer data across large geographies, have different architectural layers, and connect multiple computers to share resources over long distances. The document also defines personal area networks (PANs), local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs) based on their size and maximum transmission distances. It provides information about nodes, MAC addresses, network interface cards (NICs), IP addresses
The document defines and describes various components of computer networks including network devices, topologies, network types, transmission media, and network models. It discusses bridges, switches, routers, hubs, bus, star, ring, tree, and mesh topologies. It also covers LAN, MAN, WAN, PAN networks as well as guided media like twisted pair, coaxial, and optical fiber and unguided wireless transmission. Network architectures like client-server and peer-to-peer are also mentioned along with the OSI and TCP/IP models.
The document discusses the syllabus for a Mobile Computing course. It covers topics like introduction to mobile computing, mobile internet protocols, transport layer protocols, and MAC protocols. Key concepts explained include mobile IP, care-of addresses, tunneling, TCP, DHCP, classifications of MAC protocols like CSMA/CA and RTS/CTS. Questions at the end evaluate student understanding of these mobile computing fundamentals.
This document provides an introduction to computer networks presented by Ram nivas sonkar. It begins with defining what a computer network is and discusses the key components and types of networks including LAN, MAN, WAN and PAN. It then covers topics like network topologies, wireless networks and the OSI model. Specifically, it describes common network topologies like star, bus, ring and tree and explains the layers of the OSI model from the physical layer up to the transport layer.
The document discusses the history and development of wireless networks. It describes the progression from 1G analog networks to 2G digital networks to 3G broadband networks. It also defines different types of wireless networks including ad-hoc peer-to-peer networks and infrastructure networks using access points. Finally, it outlines some common applications that use wireless networking like satellite communication, wireless local loops, and cellular networks.
Course Code: CS-301
Course Title: Introduction to Computing.
Degree: BS (SE, CS, BIO)
Contents of this chapter:
Basic information about computer networks, types of computer networks. Other contents include:
1. List four major benefits of connecting computers to form a network.
2. Define the terms LAN, WAN, and MAN.
3. List the three types of networks.
4. Name the three physical topologies used to build networks.
This document provides an overview of computer networks and wireless networks. It discusses the different types of network topologies including bus, star, ring, tree, and mesh. It also describes different network models like PAN, LAN, MAN, and WAN according to the geographical area covered. The document introduces various internetworking tools such as bridges, routers, and gateways. It provides a brief history of the OSI model and describes the seven layers of the OSI model. Finally, it discusses wireless networks and different wireless technologies including 2G, 3G, WLAN, and WiMAX.
The document provides information about the CCNA certification course. It discusses that CCNA is a popular certification course developed by Cisco that certifies skills in network fundamentals, networking concepts, security, automation and more. It can help candidates get jobs as network administrators, engineers, and other networking roles. The document outlines the topics covered in the CCNA course and lists the most common employers of CCNA certified professionals.
Computer networks have become part of our everyday lives. We use them to take cash from the local ATM. Whenever we send email or browse the Web, we rely on the world’s largest computer network, the Internet, to be our electronic mailman. Telemarketers, usually during dinner hour, use computer networks to sell us their wares. Our cable television stations rely on computer networks to transport programs onto our TV screens. What is a compelling example of their presence in our lives? Without computer networks, our cellular phone is little more than a battery powering-up a meaningless screen. Read more.........
This document provides information about Cisco and the CCNA certification. It discusses Cisco as a company and their networking products. The CCNA certification focuses on routing, switching, security, service provider, and voice communication skills. The CCNA exam contains questions in drag and drop and simulation formats. The document also summarizes different types of computer networks, common networking devices, cable types, topologies and more.
This document provides an overview of data communication and computer networks. It discusses key topics such as data representation, data flow, network topologies, categories of networks, protocols and standards. The document specifically describes data communication components, protocols and elements, network criteria and types of topologies including mesh, star, bus and ring. It also defines local, metropolitan and wide area networks and compares their characteristics. Finally, it introduces the OSI reference model and layers.
Ccn(Data communication and networking) edited solution-manual suitable to be ...Vishal kakade
This document provides solutions to review questions and exercises related to network models and data link control. It begins with solutions to review questions on network models, including definitions of the OSI and Internet models. It then provides solutions to exercises on typical network examples like telephone and cable networks. Finally, it discusses data link control protocols like Stop-and-Wait ARQ, Go-Back-N ARQ, and Selective-Repeat ARQ, and provides solutions to related exercises.
Networking connects computing devices together to share data. It allows devices to communicate through a mix of hardware like cables and wireless equipment, and software like communication protocols. Networks can be categorized based on their geographic reach - local area networks (LANs) span a small area like a home or office, while wide area networks (WANs) connect across cities, states or globally. The largest public WAN is the Internet. Networks also use common protocols like TCP/IP to define the language devices use to communicate. While wired networks were traditionally used, wireless networking has become more popular for new installations.
This document discusses the key topics for Lab 4 of the CSE-307 Internetworking Essentials course, including network hardware, IP addressing concepts, and configuration of routers using Cisco Packet Tracer. It provides definitions and explanations of communication modes, carrier waves, IP addressing formats, and the functions of switches, routers, and hubs. The lab objectives are to understand these networking components and configure routers with IP addresses using simulation software. Evaluation will include two practical exams before the midterm covering the first four labs.
This document provides an overview of computer networks and their classification. It discusses the key components of data communication systems and different types of networks including personal area networks (PANs), local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). The document also covers different network topologies such as bus, ring, star, and mesh along with examples of each.
Wireless networking refers to any networking that does not involve cables. It uses radio waves to transmit signals and comes in various types depending on range and speed. The main types are WLAN, WMAN and WWAN. Wireless networks use technologies like WiFi, Bluetooth and WiMAX and standards set by bodies like IEEE, IETF and WiFi Alliance. They have topologies involving access points, stations and wireless bridges or repeaters to extend coverage. Wireless security uses encryption protocols to protect data in transit.
MANET stands for mobile ad hoc network. It is a type of wireless network that can change locations and configure itself without a centralized administration. Nodes in a MANET can connect to each other to form a temporary network without any existing network infrastructure. Routing in MANETs is challenging due to the dynamic network topology, asymmetric links, and interference. Common routing algorithms for MANETs include distance vector, link state, and various protocols designed specifically for MANETs to handle mobility.
The document discusses ad hoc and sensor networks. It begins with an introduction and outline that describes key topics like features and issues of ad hoc wireless networks, types of networks, routing protocol classifications and examples of table driven and on-demand routing protocols. The document then provides more detailed descriptions of topics like infrastructure versus ad hoc networks, challenges in designing routing protocols, characteristics of good routing protocols, examples of DSDV and AODV routing protocols, and message types used in AODV.
The document discusses ad-hoc networks and their key characteristics. It describes several challenges in ad-hoc networks including limited battery power, dynamic network topology, and scalability issues. It also summarizes several ad-hoc network routing protocols (e.g. DSDV, AODV, DSR), addressing both table-driven and on-demand approaches. Additionally, it outlines some ad-hoc MAC protocols like MACA and PAMAS that aim to manage shared wireless medium access.
This document contains a practice exam for Cisco's 640-802 CCNA certification. It includes 10 multiple choice questions testing knowledge of networking concepts like the functions of routers, differences between switches and hubs, and network addressing. Correct answers are provided along with explanations of the concepts being tested.
This document provides information about data communication and computer networks. It defines data communication as the exchange of data between a source and receiver via transmission media. A computer network is defined as an interconnection of computers that share resources through a communication medium. The key differences between data communication and computer networks are that computer networks can transfer data across large geographies, have different architectural layers, and connect multiple computers to share resources over long distances. The document also defines personal area networks (PANs), local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs) based on their size and maximum transmission distances. It provides information about nodes, MAC addresses, network interface cards (NICs), IP addresses
The document defines and describes various components of computer networks including network devices, topologies, network types, transmission media, and network models. It discusses bridges, switches, routers, hubs, bus, star, ring, tree, and mesh topologies. It also covers LAN, MAN, WAN, PAN networks as well as guided media like twisted pair, coaxial, and optical fiber and unguided wireless transmission. Network architectures like client-server and peer-to-peer are also mentioned along with the OSI and TCP/IP models.
The document discusses the syllabus for a Mobile Computing course. It covers topics like introduction to mobile computing, mobile internet protocols, transport layer protocols, and MAC protocols. Key concepts explained include mobile IP, care-of addresses, tunneling, TCP, DHCP, classifications of MAC protocols like CSMA/CA and RTS/CTS. Questions at the end evaluate student understanding of these mobile computing fundamentals.
This document provides an introduction to computer networks presented by Ram nivas sonkar. It begins with defining what a computer network is and discusses the key components and types of networks including LAN, MAN, WAN and PAN. It then covers topics like network topologies, wireless networks and the OSI model. Specifically, it describes common network topologies like star, bus, ring and tree and explains the layers of the OSI model from the physical layer up to the transport layer.
The document discusses the history and development of wireless networks. It describes the progression from 1G analog networks to 2G digital networks to 3G broadband networks. It also defines different types of wireless networks including ad-hoc peer-to-peer networks and infrastructure networks using access points. Finally, it outlines some common applications that use wireless networking like satellite communication, wireless local loops, and cellular networks.
Course Code: CS-301
Course Title: Introduction to Computing.
Degree: BS (SE, CS, BIO)
Contents of this chapter:
Basic information about computer networks, types of computer networks. Other contents include:
1. List four major benefits of connecting computers to form a network.
2. Define the terms LAN, WAN, and MAN.
3. List the three types of networks.
4. Name the three physical topologies used to build networks.
This document provides an overview of computer networks and wireless networks. It discusses the different types of network topologies including bus, star, ring, tree, and mesh. It also describes different network models like PAN, LAN, MAN, and WAN according to the geographical area covered. The document introduces various internetworking tools such as bridges, routers, and gateways. It provides a brief history of the OSI model and describes the seven layers of the OSI model. Finally, it discusses wireless networks and different wireless technologies including 2G, 3G, WLAN, and WiMAX.
The document provides information about the CCNA certification course. It discusses that CCNA is a popular certification course developed by Cisco that certifies skills in network fundamentals, networking concepts, security, automation and more. It can help candidates get jobs as network administrators, engineers, and other networking roles. The document outlines the topics covered in the CCNA course and lists the most common employers of CCNA certified professionals.
Computer networks have become part of our everyday lives. We use them to take cash from the local ATM. Whenever we send email or browse the Web, we rely on the world’s largest computer network, the Internet, to be our electronic mailman. Telemarketers, usually during dinner hour, use computer networks to sell us their wares. Our cable television stations rely on computer networks to transport programs onto our TV screens. What is a compelling example of their presence in our lives? Without computer networks, our cellular phone is little more than a battery powering-up a meaningless screen. Read more.........
This document provides information about Cisco and the CCNA certification. It discusses Cisco as a company and their networking products. The CCNA certification focuses on routing, switching, security, service provider, and voice communication skills. The CCNA exam contains questions in drag and drop and simulation formats. The document also summarizes different types of computer networks, common networking devices, cable types, topologies and more.
This document provides an overview of data communication and computer networks. It discusses key topics such as data representation, data flow, network topologies, categories of networks, protocols and standards. The document specifically describes data communication components, protocols and elements, network criteria and types of topologies including mesh, star, bus and ring. It also defines local, metropolitan and wide area networks and compares their characteristics. Finally, it introduces the OSI reference model and layers.
Ccn(Data communication and networking) edited solution-manual suitable to be ...Vishal kakade
This document provides solutions to review questions and exercises related to network models and data link control. It begins with solutions to review questions on network models, including definitions of the OSI and Internet models. It then provides solutions to exercises on typical network examples like telephone and cable networks. Finally, it discusses data link control protocols like Stop-and-Wait ARQ, Go-Back-N ARQ, and Selective-Repeat ARQ, and provides solutions to related exercises.
Networking connects computing devices together to share data. It allows devices to communicate through a mix of hardware like cables and wireless equipment, and software like communication protocols. Networks can be categorized based on their geographic reach - local area networks (LANs) span a small area like a home or office, while wide area networks (WANs) connect across cities, states or globally. The largest public WAN is the Internet. Networks also use common protocols like TCP/IP to define the language devices use to communicate. While wired networks were traditionally used, wireless networking has become more popular for new installations.
This document discusses the key topics for Lab 4 of the CSE-307 Internetworking Essentials course, including network hardware, IP addressing concepts, and configuration of routers using Cisco Packet Tracer. It provides definitions and explanations of communication modes, carrier waves, IP addressing formats, and the functions of switches, routers, and hubs. The lab objectives are to understand these networking components and configure routers with IP addresses using simulation software. Evaluation will include two practical exams before the midterm covering the first four labs.
This document provides an overview of computer networks and their classification. It discusses the key components of data communication systems and different types of networks including personal area networks (PANs), local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). The document also covers different network topologies such as bus, ring, star, and mesh along with examples of each.
Wireless networking refers to any networking that does not involve cables. It uses radio waves to transmit signals and comes in various types depending on range and speed. The main types are WLAN, WMAN and WWAN. Wireless networks use technologies like WiFi, Bluetooth and WiMAX and standards set by bodies like IEEE, IETF and WiFi Alliance. They have topologies involving access points, stations and wireless bridges or repeaters to extend coverage. Wireless security uses encryption protocols to protect data in transit.
Similar to EC8702 Adhoc and wireless sensor networks (20)
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
1. EC8702- AD HOC AND WIRELESS
SENSOR NETWORKS
Mr. M. Premkumar, AP/ECE
SSMIET
Mrs.THAHSEEN THAHIR, AP/ECE
JCTCET
2. Unit 1
AD HOC NETWORKS –
INTRODUCTION AND
ROUTING PROTOCOLS
Unit 1
AD HOC NETWORKS –
INTRODUCTION AND
ROUTING PROTOCOLS
3. AD HOC NETWORKS – INTRODUCTION
AND ROUTING PROTOCOLS
•Elements of Ad hoc Wireless Networks
•Issues in Ad hoc wireless networks
•Example commercial applications of Ad hoc networking
•Ad hoc wireless Internet
•Issues in Designing a Routing Protocol for Ad Hoc
Wireless Networks
•Classifications of Routing Protocols
•Table Driven Routing Protocols –(DSDV)
•On–Demand Routing protocols –(AODV)
•Elements of Ad hoc Wireless Networks
•Issues in Ad hoc wireless networks
•Example commercial applications of Ad hoc networking
•Ad hoc wireless Internet
•Issues in Designing a Routing Protocol for Ad Hoc
Wireless Networks
•Classifications of Routing Protocols
•Table Driven Routing Protocols –(DSDV)
•On–Demand Routing protocols –(AODV)
4. Types of Wireless Networks: infrastructure vs. ad-
hoc networks
infrastructure
network
AP
AP
AP
wired network
AP: Access Point
•Infrastructure
Networks
• Fixed, wired backbone
•Mobile communicates
directly with access
points
•Suitable for locations
where access points can
be placed
• Cellular networks
ad-hoc network
•Infrastructure
Networks
• Fixed, wired backbone
•Mobile communicates
directly with access
points
•Suitable for locations
where access points can
be placed
• Cellular networks
5. •BSS without an AP is called an ad hoc network
• BSS with an AP is called an infrastructure network
8. Ad Hoc Networks
• Temporary network composed of mobile nodes without preexisting
communication infrastructure, such as Access Point (AP) and Base
Station (BS).
• Each node plays the role of router for multi-hop routing.
• Self-organizing network without infrastructure networks
• Started from DARPA PRNet in 1970
• Cooperative nodes (wireless)
• Each node decode-and-forward packets for other nodes
• Multi-hop packet forwarding through wireless links
• Proactive/reactive/hybrid routing protocols
• Most works based on CSMA/CA to solve the interference problem
• Temporary network composed of mobile nodes without preexisting
communication infrastructure, such as Access Point (AP) and Base
Station (BS).
• Each node plays the role of router for multi-hop routing.
• Self-organizing network without infrastructure networks
• Started from DARPA PRNet in 1970
• Cooperative nodes (wireless)
• Each node decode-and-forward packets for other nodes
• Multi-hop packet forwarding through wireless links
• Proactive/reactive/hybrid routing protocols
• Most works based on CSMA/CA to solve the interference problem
9. Why Ad Hoc Networks ?
Ease of deployment
Speed of deployment
Decreased dependence on infrastructure
Ease of deployment
Speed of deployment
Decreased dependence on infrastructure
10. What is an Ad hoc Network?
A network without any base
stations “infrastructure-less”
or multi-hop
A collection of two or more
devices equipped with wireless
communications and networking
capability
Supports anytime and
anywhere computing
Two topologies:
Heterogeneous (left)
• Differences in capabilities
Homogeneous or fully
symmetric (Right)
• all nodes have identical
capabilities and
responsibilities
infrastructure
network
AP
AP
AP
wired network
AP: Access Point
communications and networking
capability
Supports anytime and
anywhere computing
Two topologies:
Heterogeneous (left)
• Differences in capabilities
Homogeneous or fully
symmetric (Right)
• all nodes have identical
capabilities and
responsibilities Homogeneous network
ad-hoc network
AP
AP wired network
12. Mobile Ad Hoc Networks?
Mobility causes route changes
13. What is an Ad hoc Network?
Self-organizing and adaptive –
Allows spontaneous formation
and deformation of mobile
networks
Each mobile host acts as a
router
Supports peer-to-peer
communications
Supports peer-to-remote
communications
Reduced administrative cost
Ease of deployment
infrastructure
network
AP
AP
AP
wired network
AP: Access Point
Self-organizing and adaptive –
Allows spontaneous formation
and deformation of mobile
networks
Each mobile host acts as a
router
Supports peer-to-peer
communications
Supports peer-to-remote
communications
Reduced administrative cost
Ease of deployment
ad-hoc network
14. Ad Hoc Networks – Operating
Principle
Example of an Ad Hoc Network
Fig. depicts a peer-to-peer multihop ad hoc network
Mobile node A communicates directly with B (single hop)
when a channel is available
If Channel is not available, then multi-hop communication is
necessary e.g. A->D->B
For multi-hop communication to work, the intermediate
nodes should route the packet i.e. they should act as a
router
Example: For communication between A-C, B, or D & E,
should act as routers
A
B C
D E
Example of an Ad Hoc Network
Fig. depicts a peer-to-peer multihop ad hoc network
Mobile node A communicates directly with B (single hop)
when a channel is available
If Channel is not available, then multi-hop communication is
necessary e.g. A->D->B
For multi-hop communication to work, the intermediate
nodes should route the packet i.e. they should act as a
router
Example: For communication between A-C, B, or D & E,
should act as routers
15. Bringing up an Ad hoc Network
1. Ad hoc network begins with at least two nodes broadcasting
their presence (beaconing) with their respective address
information
2. They may also include their location info if GPS equipped
3. Beaconing messages are control messages. If node A is able
to establish a direct communication with node B verified by
appropriate control messages between them, they both
update their routing tables
A
B C
D E
1. Ad hoc network begins with at least two nodes broadcasting
their presence (beaconing) with their respective address
information
2. They may also include their location info if GPS equipped
3. Beaconing messages are control messages. If node A is able
to establish a direct communication with node B verified by
appropriate control messages between them, they both
update their routing tables
16. Bringing up an Ad hoc Network
4. Third node C joins the network with its beacon
signal. Two scenarios are possible:
(i)A & B both try to determine if single hop
communication is feasible
(ii)Only one of the nodes e.g. B tries to
determine if single hop communication is feasible
and establishes a connection
A
B C
D E
4. Third node C joins the network with its beacon
signal. Two scenarios are possible:
(i)A & B both try to determine if single hop
communication is feasible
(ii)Only one of the nodes e.g. B tries to
determine if single hop communication is feasible
and establishes a connection
17. Bringing up an Ad hoc Network
5. The distinct topology updates consisting of both
address and the route updates are made in three
nodes immediately.
5. In first scenario, all routes are direct i.e. A->B,
B->C, and A->C (Lets assume bi-directional links)
A
B C
D E
5. The distinct topology updates consisting of both
address and the route updates are made in three
nodes immediately.
5. In first scenario, all routes are direct i.e. A->B,
B->C, and A->C (Lets assume bi-directional links)
18. Topology Update Due to a Link
Failure
Mobility of nodes may cause link breakage requiring route
updates
Assume link between B & C breaks because of some reason
Nodes A & C are still reachable via D and E
So old route between A &C was A->B->C is to be replaced by
A->D->E->C
All five nodes are required to incorporate this change in
their routing table
This change will happen first in nodes B & C
Then A & E
Then D
A
B
C
D E
Mobility of nodes may cause link breakage requiring route
updates
Assume link between B & C breaks because of some reason
Nodes A & C are still reachable via D and E
So old route between A &C was A->B->C is to be replaced by
A->D->E->C
All five nodes are required to incorporate this change in
their routing table
This change will happen first in nodes B & C
Then A & E
Then D
19. Types of Wireless Ad Hoc Networks
•Mobile ad hoc network (MANET)
An ad hoc network of mobile devices.
•Vehicular ad hoc network (VANET)
Used for communication between vehicles.
• Smartphone ad hoc network (SPAN)
Wireless ad hoc network created on smart phones via existing
technologies like Wi-Fi and Bluetooth.
• Wireless mesh network
A mesh network is an ad hoc network where the various nodes are in
communication directly with each other to relay information
throughout the total network.
•Mobile ad hoc network (MANET)
An ad hoc network of mobile devices.
•Vehicular ad hoc network (VANET)
Used for communication between vehicles.
• Smartphone ad hoc network (SPAN)
Wireless ad hoc network created on smart phones via existing
technologies like Wi-Fi and Bluetooth.
• Wireless mesh network
A mesh network is an ad hoc network where the various nodes are in
communication directly with each other to relay information
throughout the total network.
20. Types of Wireless Ad Hoc Networks
•Army tactical MENT
Used in the army for "on-the-move" communication
•Wireless sensor network
Wireless sensors that collect everything from
temperature and pressure readings to noise and humidity
levels
• Disaster rescue ad hoc network
Ad hoc networks are important when disaster strikes and
established communication hardware isn't functioning
properly.
•Army tactical MENT
Used in the army for "on-the-move" communication
•Wireless sensor network
Wireless sensors that collect everything from
temperature and pressure readings to noise and humidity
levels
• Disaster rescue ad hoc network
Ad hoc networks are important when disaster strikes and
established communication hardware isn't functioning
properly.
21. Advantages
•Ad-hoc networks can have more flexibility.
•It is better in mobility.
•It can be turn up and turn down in a very
short time.
•More economical
•It considered as a robust network because
of its non-hierarchical distributed control
and management mechanisms.
•Ad-hoc networks can have more flexibility.
•It is better in mobility.
•It can be turn up and turn down in a very
short time.
•More economical
•It considered as a robust network because
of its non-hierarchical distributed control
and management mechanisms.
23. Issues in Ad hoc wireless networks
•Medium Access Control (MAC)
•Routing
•Multicasting
•Transport layer protocol
•Quality of Service (QOS)
•Self-organization
•Security
•Energy management
•Scalability
•Deployment considerations
•Medium Access Control (MAC)
•Routing
•Multicasting
•Transport layer protocol
•Quality of Service (QOS)
•Self-organization
•Security
•Energy management
•Scalability
•Deployment considerations
24. Medium Access Control
Major issues
•Distributed Operation
•Synchronization
•Hidden Terminals Problem
•Exposed Terminals Problem
•Throughput
•Minimizing the occurrence of collisions
•Maximizing channel utilization
•Minimizing control overhead
•Access delay
•Real-time Traffic support and Resource reservation
Major issues
•Distributed Operation
•Synchronization
•Hidden Terminals Problem
•Exposed Terminals Problem
•Throughput
•Minimizing the occurrence of collisions
•Maximizing channel utilization
•Minimizing control overhead
•Access delay
•Real-time Traffic support and Resource reservation
29. Transport Layer Protocol
The main objectives of the transport layer
protocols include :
•Setting up & maintaining end-to-end
connections
•Reliable end-to-end delivery of packets
•Flow control
•Congestion control.
The main objectives of the transport layer
protocols include :
•Setting up & maintaining end-to-end
connections
•Reliable end-to-end delivery of packets
•Flow control
•Congestion control.
30. Quality of Service (QoS)
•QoS is the performance level of services offered by a
service provider or a network to the user.
• QoS provisioning often requires
•Negotiation between host & the network
•Resource reservation schemes
•Priority scheduling
•Call admission control
•QoS parameters
•QoS is the performance level of services offered by a
service provider or a network to the user.
• QoS provisioning often requires
•Negotiation between host & the network
•Resource reservation schemes
•Priority scheduling
•Call admission control
•QoS parameters
31. QoS-aware routing
•Finding the path is the first step toward a QoS-aware
routing protocol.
•The parameters that can be considered for routing
decisions are
•Network throughput
•Packet delivery ratio
•Reliability
•Delay
•Delay jitter
•Packet loss rate
•Bit error rate
QoS-aware routing
•Finding the path is the first step toward a QoS-aware
routing protocol.
•The parameters that can be considered for routing
decisions are
•Network throughput
•Packet delivery ratio
•Reliability
•Delay
•Delay jitter
•Packet loss rate
•Bit error rate
32. Self-Organization
•One very important property that an ad hoc wireless
network should exhibit is organizing & maintaining the
network by itself.
•The major activities that an ad hoc wireless network is
required to perform for self organization are,
•Neighbor discovery.
•Topology organization &
•Topology reorganization (updating topology
information)
•One very important property that an ad hoc wireless
network should exhibit is organizing & maintaining the
network by itself.
•The major activities that an ad hoc wireless network is
required to perform for self organization are,
•Neighbor discovery.
•Topology organization &
•Topology reorganization (updating topology
information)
33. Security
•It is an important issue
•Attacks against network are two types
•Passive attack
•Active attack
•External attack
•Internal attack
•The major security threats are
•Denial of service
•Resource consumption
•Host impersonation
•Interference
•It is an important issue
•Attacks against network are two types
•Passive attack
•Active attack
•External attack
•Internal attack
•The major security threats are
•Denial of service
•Resource consumption
•Host impersonation
•Interference
34. Energy Management
•It is a process of managing the sources to enhance the
lifetime of a network.
• Features are
•Shaping the energy discharge pattern of a node’s battery
to enhance battery life
•Finding routes that consumes minimum energy
•Using distributed scheduling schemes to improve battery
life
•Handling the processor & interface devices to minimize
power consumption.
•It is a process of managing the sources to enhance the
lifetime of a network.
• Features are
•Shaping the energy discharge pattern of a node’s battery
to enhance battery life
•Finding routes that consumes minimum energy
•Using distributed scheduling schemes to improve battery
life
•Handling the processor & interface devices to minimize
power consumption.
35. Categories
•Transmission power management
•Battery energy management
•Processor power management
•Devices power management
Categories
•Transmission power management
•Battery energy management
•Processor power management
•Devices power management
36. Scalability
•Scalability is the ability of the routing
protocol to scale well in a network with a
large number of nodes.
• It requires minimization of control overhead
& adaptation of the routing protocol to the
network size.
•Scalability is the ability of the routing
protocol to scale well in a network with a
large number of nodes.
• It requires minimization of control overhead
& adaptation of the routing protocol to the
network size.
37. Deployment Considerations
•The deployment of a commercial ad hoc
wireless network has the following benefits
when compared to wired networks
•Low cost of deployment
•Incremental deployment
•Short deployment time
•Reconfigurability
•The deployment of a commercial ad hoc
wireless network has the following benefits
when compared to wired networks
•Low cost of deployment
•Incremental deployment
•Short deployment time
•Reconfigurability
38. Challenges in Ad hoc Mobile Networks
•Host is no longer an end system - can also be an
acting intermediate system
•Changing the network topology over time
•Potentially frequent network partitions
•Every node can be mobile
•Limited power capacity
•Limited wireless bandwidth
•Presence of varying channel quality
•Host is no longer an end system - can also be an
acting intermediate system
•Changing the network topology over time
•Potentially frequent network partitions
•Every node can be mobile
•Limited power capacity
•Limited wireless bandwidth
•Presence of varying channel quality
39. Challenges in Ad hoc Mobile Networks
•No centralized entity – distributed
•How to support routing?
•How to support channel access?
•How to deal with mobility?
•How to conserve power?
•How to use bandwidth efficiently?
•No centralized entity – distributed
•How to support routing?
•How to support channel access?
•How to deal with mobility?
•How to conserve power?
•How to use bandwidth efficiently?
40. AD HOC WIRELESS INTERNET
•It extends the services of the internet to the
end users over an adhoc wireless network.
•Some of the applications are
•Wireless mesh network
•Provisioning of temporary internet services to major
conference venues
•Sports venues
•Temporary military settlements
•Battlefields
•Broadband internet services in rural regions
•It extends the services of the internet to the
end users over an adhoc wireless network.
•Some of the applications are
•Wireless mesh network
•Provisioning of temporary internet services to major
conference venues
•Sports venues
•Temporary military settlements
•Battlefields
•Broadband internet services in rural regions
41.
42. Gateway
•They are the entry points to the wired internet.
•Generally owned & operated by a service provider.
•They perform following tasks ,
•Keeping track of end users.
•Bandwidth management.
•Load balancing.
•Traffic shaping.
•Packet filtering.
•Width fairness &
•Address, service & location discovery.
•They are the entry points to the wired internet.
•Generally owned & operated by a service provider.
•They perform following tasks ,
•Keeping track of end users.
•Bandwidth management.
•Load balancing.
•Traffic shaping.
•Packet filtering.
•Width fairness &
•Address, service & location discovery.
43. Address mobility
•This problem is worse here as the nodes
operate over multiple wireless hops.
•Solution such as Mobile IP can provide
temporary alternative.
•This problem is worse here as the nodes
operate over multiple wireless hops.
•Solution such as Mobile IP can provide
temporary alternative.
44. Routing
• It is a major problem in ad hoc wireless
internet,
•due to dynamic topological changes
•the presence of gateways
•multi-hop relaying
•the hybrid character of the network
•Solution -> use separate routing protocol for
the wireless part of ad hoc wireless internet.
• It is a major problem in ad hoc wireless
internet,
•due to dynamic topological changes
•the presence of gateways
•multi-hop relaying
•the hybrid character of the network
•Solution -> use separate routing protocol for
the wireless part of ad hoc wireless internet.
45. Other issues
•Transport layer protocol
•Load balancing
•Pricing / Billing
•Provisioning of security
•QoS support
•Service, address & location discovery
•Transport layer protocol
•Load balancing
•Pricing / Billing
•Provisioning of security
•QoS support
•Service, address & location discovery
46. Ad hoc wireless Internet implemented by a
wireless mesh network
47. Problems Facing Routing in Ad hoc Networks
•Routers are now moving
•Link changes are happening quite often
Packet losses due to transmission errors
•Event updates are sent often – a lot of control
traffic
•Routing table may not be able to, converge
•Routing loop may exist
•Current wired routing uses shortest path
metric
•Routers are now moving
•Link changes are happening quite often
Packet losses due to transmission errors
•Event updates are sent often – a lot of control
traffic
•Routing table may not be able to, converge
•Routing loop may exist
•Current wired routing uses shortest path
metric
48. Problems facing channel access in Ad hoc
Networks
•Distributed channel access, i.e. no fixed
base station concept
•Very hard to avoid packet collisions
•Very hard to support QoS
•Early work on packet radio is based on
CSMA
•Distributed channel access, i.e. no fixed
base station concept
•Very hard to avoid packet collisions
•Very hard to support QoS
•Early work on packet radio is based on
CSMA
49. Problems of Mobility in Ad hoc
•Mobility affects signal transmission ->
Affects communication
•Mobility affects channel access
•Mobility affects routing
•Mobility-induced route changes
•Mobility-induced packet losses
•Mobility affects multicasting
•Mobility affects applications
•Mobility affects signal transmission ->
Affects communication
•Mobility affects channel access
•Mobility affects routing
•Mobility-induced route changes
•Mobility-induced packet losses
•Mobility affects multicasting
•Mobility affects applications
50. Mobility in Ad hoc Networks
•Mobility patterns may be different
•people sitting at an airport lounge
•New York taxi cabs
•kids playing
•military movements
•personal area network
•Mobility characteristics
•speed
•predictability
• direction of movement
• pattern of movement
•Mobility patterns may be different
•people sitting at an airport lounge
•New York taxi cabs
•kids playing
•military movements
•personal area network
•Mobility characteristics
•speed
•predictability
• direction of movement
• pattern of movement
51. Problems of Power in Ad hoc
•Ad hoc devices come in many different forms
•Most of them battery powered
•Battery technology is not progressing as fast as
memory or CPU technologies
•Wireless transmission, reception, retransmission,
beaconing, consume power!
•Quest for power-efficient protocols
•Quest for better power management techniques
•Ad hoc devices come in many different forms
•Most of them battery powered
•Battery technology is not progressing as fast as
memory or CPU technologies
•Wireless transmission, reception, retransmission,
beaconing, consume power!
•Quest for power-efficient protocols
•Quest for better power management techniques
52. Research on Mobile Ad Hoc
Networks
•Variations in capabilities & responsibilities
•Variations in traffic characteristics,
mobility models, etc.
•Performance criteria (e.g., optimize
throughput, reduce energy consumption)
•Increased research funding -> Significant
research activity
•Variations in capabilities & responsibilities
•Variations in traffic characteristics,
mobility models, etc.
•Performance criteria (e.g., optimize
throughput, reduce energy consumption)
•Increased research funding -> Significant
research activity
54. Table Driven Routing Protocols
•Extensions of the wired network routing protocols.
•Maintains the global topology information in the form of
tables at every node.
•Tables are updated frequently in order to maintain
consistent and accurate network state information.
•Examples
•Destination Sequenced Distance Vector Routing
Protocol (DSDV)
•Wireless Routing Protocol (WRP)
•Source-Tree Adaptive Routing Protocol (STAR)
•Cluster-head Gateway Switch Routing Protocol (CGSR)
•Extensions of the wired network routing protocols.
•Maintains the global topology information in the form of
tables at every node.
•Tables are updated frequently in order to maintain
consistent and accurate network state information.
•Examples
•Destination Sequenced Distance Vector Routing
Protocol (DSDV)
•Wireless Routing Protocol (WRP)
•Source-Tree Adaptive Routing Protocol (STAR)
•Cluster-head Gateway Switch Routing Protocol (CGSR)
55. Destination Sequenced Distance Vector Routing
Protocol (DSDV)
•It is a modified version of Bellman Ford Algorithm
•It is a hop-by-hop vector routing protocol requiring
each node to periodically broadcast routing updates.
•Each node maintains routing information for all known
destinations
•Routing information must be updated periodically
•Traffic overhead even if there is no change in network
topology
•Maintains routes which are never used
•Allows fast reaction to topology changes
•It is a modified version of Bellman Ford Algorithm
•It is a hop-by-hop vector routing protocol requiring
each node to periodically broadcast routing updates.
•Each node maintains routing information for all known
destinations
•Routing information must be updated periodically
•Traffic overhead even if there is no change in network
topology
•Maintains routes which are never used
•Allows fast reaction to topology changes
56. DSDV Table Format
Table updates
•Incremental updates-> single network
data packet unit(NDPU)
•Full dump updates-> multiple NDPUs
59. Advantages
•Less delay involved in the route setup process
•Mechanism of incremental update with
sequence number tags makes the existing wired
network protocols adaptable to ad hoc wireless
networks
•The updates are propagated throughout the
network in order to maintain an up-to-date
view of the network topology at all nodes.
•Less delay involved in the route setup process
•Mechanism of incremental update with
sequence number tags makes the existing wired
network protocols adaptable to ad hoc wireless
networks
•The updates are propagated throughout the
network in order to maintain an up-to-date
view of the network topology at all nodes.
60. Disadvantages
•Broken links lead to a heavy control overhead during high
mobility
•Even a small network with high mobility or a large
network with low mobility can completely choke the
available bandwidth
•Suffers from excessive control overhead
•In order to obtain information about a particular
destination node, a node has to wait for a table update
message initiated by the same destination node
•Broken links lead to a heavy control overhead during high
mobility
•Even a small network with high mobility or a large
network with low mobility can completely choke the
available bandwidth
•Suffers from excessive control overhead
•In order to obtain information about a particular
destination node, a node has to wait for a table update
message initiated by the same destination node
61. ON-DEMAND ROUTING PROTOCOLS
•In table-driven protocols, each node maintain up-to-
date routing information to all the
nodes in the network
•In on-demand protocols a node finds the route to
a destination when it desires to send packets to the
destination
•Ex
•Dynamic source routing protocol (DSR)
•Ad hoc on-demand distance-vector routing protocol
(AODV)
•In table-driven protocols, each node maintain up-to-
date routing information to all the
nodes in the network
•In on-demand protocols a node finds the route to
a destination when it desires to send packets to the
destination
•Ex
•Dynamic source routing protocol (DSR)
•Ad hoc on-demand distance-vector routing protocol
(AODV)
62. Ad hoc On–Demand Distance Vector
Routing (AODV)
•Reactive routing protocol which does not maintain
routes but build the routes as per requirements
•AODV is used to overcome the drawbacks of DSR
•DSR maintains route information which makes it
slow.
• If the network is large, it is difficult to hold
whole information of the routes
• In AODV, along with routing tables of every node, two
counters including Sequence Number (SEQ NO) and
broadcast ID are maintained
•Reactive routing protocol which does not maintain
routes but build the routes as per requirements
•AODV is used to overcome the drawbacks of DSR
•DSR maintains route information which makes it
slow.
• If the network is large, it is difficult to hold
whole information of the routes
• In AODV, along with routing tables of every node, two
counters including Sequence Number (SEQ NO) and
broadcast ID are maintained
63. AODV
•Route Request carries
•source identifier (SrcID)
•Destination identifier (DestID)
•Source sequence number (SrcSeqNum)
•Destination sequence number (DestSeqNum)
•Broadcast identifier (BcastID)
•Time to live (TTL)
•Route Reply
•Route Request carries
•source identifier (SrcID)
•Destination identifier (DestID)
•Source sequence number (SrcSeqNum)
•Destination sequence number (DestSeqNum)
•Broadcast identifier (BcastID)
•Time to live (TTL)
•Route Reply
66. Advantage
•The routes are established on demand
and destination sequence numbers are
used to find the latest route to the
destination. So the connection setup delay
is less
•Dynamic networks can be handled easily.
•No loop generation
•The routes are established on demand
and destination sequence numbers are
used to find the latest route to the
destination. So the connection setup delay
is less
•Dynamic networks can be handled easily.
•No loop generation
67. Disadvantage
•Multiple RouteReply packets in response
to a single RouteRequest packet can lead
to heavy control overhead
•Periodic beaconing leads to unnecessary
bandwidth consumption
•Multiple RouteReply packets in response
to a single RouteRequest packet can lead
to heavy control overhead
•Periodic beaconing leads to unnecessary
bandwidth consumption