AODV - Ad hoc On-Demand Distance Vector Routing Protocols Darwin Nesakumar
Brief of AODV - Ad hoc On-Demand Distance Vector Routing Protocols with examples by Mr.Darwin Nesakumar, Assistant Professor, ECE/R.M.K.Engineering college
AODV - Ad hoc On-Demand Distance Vector Routing Protocols Darwin Nesakumar
Brief of AODV - Ad hoc On-Demand Distance Vector Routing Protocols with examples by Mr.Darwin Nesakumar, Assistant Professor, ECE/R.M.K.Engineering college
Definition
A decentralized type of wireless network, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, It can turn the dream of networking at any place and at time into reality. We are almost there by the way .Ex- Bluetooth enabled mobile phones such as 3G, laptops, handheld digital devices, personal digital assistants, or wearable computers
UNIT IV MOBILE AD-HOC NETWORKS
Ad-Hoc Basic Concepts – Characteristics – Applications – Design Issues – Routing – Essential of Traditional Routing Protocols –Popular Routing Protocols – Vehicular Ad Hoc networks ( VANET) – MANET Vs VANET – Security
Mobile Ad hoc Networks (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. A mobile adhoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a Mobile Adhoc Network usually seek the help of other intermediate nodes to establish communication channels. In such an environment, malicious intermediate nodes can be a threat to the security of conversation between mobile nodes. The security experience from the Wired Network world is of little use in Wireless Mobile Ad hoc networks, due to some basic di_erences between the two Networks. Therefore, some novel solutions are required to make Mobile Adhoc Network secure.
Definition
A decentralized type of wireless network, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, It can turn the dream of networking at any place and at time into reality. We are almost there by the way .Ex- Bluetooth enabled mobile phones such as 3G, laptops, handheld digital devices, personal digital assistants, or wearable computers
UNIT IV MOBILE AD-HOC NETWORKS
Ad-Hoc Basic Concepts – Characteristics – Applications – Design Issues – Routing – Essential of Traditional Routing Protocols –Popular Routing Protocols – Vehicular Ad Hoc networks ( VANET) – MANET Vs VANET – Security
Mobile Ad hoc Networks (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. A mobile adhoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a Mobile Adhoc Network usually seek the help of other intermediate nodes to establish communication channels. In such an environment, malicious intermediate nodes can be a threat to the security of conversation between mobile nodes. The security experience from the Wired Network world is of little use in Wireless Mobile Ad hoc networks, due to some basic di_erences between the two Networks. Therefore, some novel solutions are required to make Mobile Adhoc Network secure.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Difference between analog and digital signals, Logic ICs, half and full adder/subtractor, multiplexers, demultiplexers, flip-flops, shift registers, counters.
Concept (Block diagram), properties, positive and negative feedback, loop gain, open loop gain, feedback factors; topologies of feedback amplifier; effect of feedback on gain, output impedance, input impedance, sensitivities (qualitative), bandwidth stability; effect of positive feedback: instability and oscillation, condition of oscillation, Barkhausen criteria. Introduction to integrated circuits, operational amplified and its terminal properties; Application of operational amplifier; inverting and non-inverting mode of operation, Adders, Subtractors, Constant-gain multiplier, Voltage follower, Comparator, Integrator, Differentiator
Concept of Field Effect Transistors (channel width modulation), Gate isolation types, JFET Structure and characteristics, MOSFET Structure and characteristics, depletion and enhancement type; CS, CG, CD configurations; CMOS: Basic Principles
Formation of PNP / NPN junctions, energy band diagram; transistor mechanism and principle of transistors, CE, CB, CC configuration, transistor characteristics: cut-off active and saturation mode, transistor action, injection efficiency, base transport factor and current amplification factors for CB and CE modes. Biasing and Bias stability: calculation of stability factor
Semiconductors: Crystalline material: Mechanical properties, Energy band theory, Fermi levels; Conductors, Semiconductors & Insulators: electrical properties, band diagrams. Semiconductors: intrinsic & extrinsic, energy band diagram, P&N-type semiconductors, drift & diffusion carriers.
Diodes and Diode Circuits: Formation of P-N junction, energy band diagram, built-in-potential, forward and reverse biased P-N junction, formation of depletion zone, V-I characteristics, Zener breakdown, Avalanche breakdown and its reverse characteristics; Junction capacitance and Varactor diode. Simple diode circuits, load line, linear piecewise model; Rectifier circuits: half wave, full wave, PIV, DC voltage and current, ripple factor, efficiency, idea of regulation.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Introduction to MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE, R.M.K.Engineering College
1. Introduction to MANET
By
Mr.Darwin Nesakumar A, M.E.,(P.hD)
Assistant Professor
Department of ECE
R.M.K.Engineering College
Sunday, 12 July 2020 Introduction to MANET 1
Education is the only weapon to eradicate ignorance. - Dr.B.R.Ambedkar, P.hD
Welcome
2. Basic ‘Wh’ Questions
• What is meant by Mobile Ad-hoc Network (MANET)?
• Why MANET is required?
• Where MANET’s are used?
• What are the uniqueness of MANET?
• What are the issues and Challenges of MANET?
• What are the applications of MANET?
Sunday, 12 July 2020 Introduction to MANET 2
3. WIRED NETWORK
Reliable – Data will not be lost
Dedicated Path (Single Path)
100% Data is secured
Peer to Peer Communication
Predefined Topology
Sunday, 12 July 2020 Introduction to MANET 3
4. WIRELESS NETWORK
Not Reliable – Data may be lost
Multipath Propagation
Fading and Shadowing Effects
Not dedicated Path _ maintaining
the path is a challenge
Sunday, 12 July 2020 Introduction to MANET 4
5. Question 1
Which of the following is true for Wired Network?
a) Dynamic Topology
b) Peer – Peer Communication
c) Fading and shadowing effects
d) None of the above
Sunday, 12 July 2020 Introduction to MANET 5
6. Answer for Question 1
b) Peer – Peer Communication
Sunday, 12 July 2020 Introduction to MANET 6
7. Question 2
Which Network has Multipath Propagation?
a) Wireless Network
b) Wired Network
Sunday, 12 July 2020 Introduction to MANET 7
8. Answer for Question 2
a) Wireless Networks
Sunday, 12 July 2020 Introduction to MANET 8
9. Question 3
Wireless Network has predefined topology.
a) FALSE
b) TRUE
Sunday, 12 July 2020 Introduction to MANET 9
10. Answer for Question 3
a) FALSE
Sunday, 12 July 2020 Introduction to MANET 10
11. Local Area Network (LAN)
Range - 100m - 500m
When the devices are interconnected or
connected to a LAN, it becomes accessible
between each other.
Ex. Home Router, Phone, Computer and TV
connected to single network (Home Network)
via Cables/Wifi/Bluetooth, Hotspot Etc.
Sunday, 12 July 2020 Introduction to MANET 11
12. Metro Politian Network (MAN)
Range - 5km – 50 km
It interconnects users with computer
resources in a geographic area or region
larger than that covered by even a large
local area network (LAN) but smaller
than the area covered by a wide
area network (WAN).
Inclusion of many LANs
Ex.Cable TV
Sunday, 12 July 2020 Introduction to MANET 12
13. Wide Area Network (WAN)
Range - 100km -1000km /10,000 km
It is a telecommunications network that
extends over a large geographical area for
the primary purpose of
computer networking. WANs are often
established with leased
telecommunication circuits.
Inclusion of many MANs and LANs
Ex .Internet
Sunday, 12 July 2020 Introduction to MANET 13
14. Few other networks
PAN–Personal Area Network – Personal Devices
Upto 10m
Ex. Bluetooth, TV Remote, AC Remote
SAN-Storage Area Network –Storage space will be shared
Ex. Google Drive – Max 15GB)
BAN-Body Area Network -Recent Network
Ex. SMART Watches, SMART Gadgets used in Medical Applications
To Monitor/ to provide the security to old age people
Few or less than a meter
Sunday, 12 July 2020 Introduction to MANET 14
15. Question 1
What is the range of PAN Network?
a) 5km to 50 km
b) 10m to 100m
c) 100m to 500m
d) Upto 10 meters
Sunday, 12 July 2020 Introduction to MANET 15
16. Answer for Question 1
d) Upto 10 meters
Sunday, 12 July 2020 Introduction to MANET 16
17. Question 2
WAN stands for
a) Wireless Ad hoc Network
b) Wide Area Network
c) Wired Area Network
d) None of the above
Sunday, 12 July 2020 Introduction to MANET 17
18. Answer for Question 2
b) Wide Area Network
Sunday, 12 July 2020 Introduction to MANET 18
19. Network Connections
Sunday, 12 July 2020 Introduction to MANET 19
NETWORK
WIRELESS
NETWORKS
INFRASTRUCTURE
NETWORK
INFRASTRUCTURE LESS
NETWORK
WIRED
NETWORKS
20. Wired Networks – Connection through base station, links etc.
Wireless Networks –Connection through air medium
Infrastructure Wireless Networks
Centralized node acts as server (Ex. WiFi)
Centralized Communication
Static Server – A node is dedicated to act as server
Single Hop Communication ( Single Point Network – Connection is made between
sender and receiver directly without using any intermediate nodes)
Non – Cooperative Communication
External Component is required to make connection ( Ex. WiFi Router)
Sunday, 12 July 2020 Introduction to MANET 20
21. Infrastructure less Wireless Networks
D2D ( Device to Device) Communication
Relay Network ( Similar like Relay Game)
Decentralized Communication ( Ex. Mobile Hotspot)
Every device can be act as sever and client
Cooperative Communications
Multi hop ( Multi Point Network – Connection is made between sender and receiver
through many nodes)
Sunday, 12 July 2020 Introduction to MANET 21
22. Question 1
Infrastructure Network has which of the following?
a) Centralized Server
b) Decentralized Server
c) Centralized Client
d) Decentralized Client
Sunday, 12 July 2020 Introduction to MANET 22
23. Answer for Question 1
a) Centralized Server
Sunday, 12 July 2020 Introduction to MANET 23
24. Question 2
Which is the best example for Infrastructure Network?
a) Bluetooth
b) WiFi
Sunday, 12 July 2020 Introduction to MANET 24
28. Question 4
Which network has cooperative communications?
a) Infrastructure less Wireless Networks
b) Infrastructure Wireless Networks
Sunday, 12 July 2020 Introduction to MANET 28
29. Answer for Question 4
a) Infrastructure less Wireless Networks
Sunday, 12 July 2020 Introduction to MANET 29
30. Evolution of MANET
• ALOHAnet developed in 1970
This protocol communications scheme in which each source (transmitter) in a network sends data
whenever there is a frame to send. If the frame successfully reaches the destination (receiver), the
next frame is sent. If the frame fails to be received at the destination, it is sent again.
• Ethernet developed in 1980
Ethernet is a standard communication protocol embedded in software and hardware devices.
It is used for building a local area network. The local area network is a computer network that
interconnects a group of computers and shares the information through cables or wires.
• In 1994, Bluetooth proposed by Ericsson to develop a short-range, low-power, low- complexity,
and inexpensive radio interface.
• WLAN 802.11 spec. is proposed in 1997 – WANET or MANET is proposed early 1990s.
2
Sunday, 12 July 2020 Introduction to MANET 30
31. What is MANET ?
M –> MOBILE - Devices are dynamic in nature
A –> AD HOC - Temporary / On fly / On demand /Spontaneous
NET –> NETWORK - Two or more devices are connected
Connection between the devices through
Wired Channel
Wireless Channel
Sunday, 12 July 2020 Introduction to MANET 31
32. ABSS without anAP is called an ad hoc network;
a BSS with anAP is called an infrastructure network.
3Sunday, 12 July 2020 Introduction to MANET 32
Ad hoc network
BSS ( Basic Service Set ) Consists
of the different nodes in the
network ( Ex.Mobile, Laptop etc.)
AP ( Access Point ) is acted as a
central controller / Server to all
the devices connected in the
network (Ex.Router)
33. Ad hoc networks
Temporary network composed of mobile nodes without pre-existing communication infrastructure,
such as Access Point (AP) and Base Station (BS).
Each node plays the role of router for multi-hop routing. – (Each node –> Server - Transceiver)
Self-organizing network without infrastructure networks
Started from DARPA PRNet in 1970 (Defense Advanced Research Projects Agency Packet Radio Network)
Cooperative nodes (wireless)
Each node decode-and-forward packets for other nodes
Multi-hop packet forwarding through wireless links
Proactive/reactive/hybrid routing protocols
Most works based on CSMA/CA to solve the interference problem
Carrier Sense Multiple Access/Collision Avoidance Protocol (IEEE 802.11 MAC)
4
Sunday, 12 July 2020 Introduction to MANET 33
34. Ad hoc networks
An ad hoc wireless network
collection of two or more devices equipped with wireless communications
and networking capability.
Such devices can communicate with another node that is immediately within
their radio range or one that is outside their radio range.
For the latter scenario, an intermediate node is used to relay or forward the
packet from the source toward the destination.
Since an ad hoc wireless network does not rely on any fixed network entities,
the network itself is essentially infrastructure- less.
There is no need for any fixed radio base stations, no wires or fixed routers.
5
Sunday, 12 July 2020 Introduction to MANET 34
35. (cont…)
An ad hoc wireless network is self-organizing and adaptive.
This means that a formed network can be de-formed on-the- fly without the need for
any system administration.
The term "ad hoc" tends to imply "can take different forms" and "can be mobile,
standalone, or networked.“
Ad hoc nodes or devices should be able to detect the presence of other such devices and
to perform the necessary handshaking to allow communications and the sharing of
information and services. [Hidden Terminal Problem]
6Sunday, 12 July 2020 Introduction to MANET 35
36. Hidden Terminal
Problem
Node A is hidden to C and vice versa.
The transmission range of access point A
reaches at B, but not at access point C,
similarly transmission range of access
point C reaches B, but not at A. These
nodes are known as hidden terminals.
The problem occurs when nodes A and C
start to send data packets simultaneously
to the access point B. Because the access
point A and C are out of range of each
other and resultant they cannot detect a
collision while transmitting.
Sunday, 12 July 2020 Introduction to MANET 36
37. To avoid hidden terminal problem
Request To Send (RTS)/Clear To Send (CTS) Process
When A has to send data to B, it begins by sending an RTS frame to B to request permission to
send it a frame. When B receives this request, it may decide to grant permission, in which case it
sends the CTS frame back.
Upon receipt of the CTS, A now sends its frame and starts an ACK timer. Upon correct receipt of
the data frame, B responds with an ACK frame leading to the closure of data transfer operation
between A & B. In case A's ACK timer expires before the ACK gets back to it, the whole protocol is
run again.
Sunday, 12 July 2020 Introduction to MANET 37
38. Wireless Ad-hoc Network
A wireless ad-hoc network is a decentralized type of wireless network.
The network is ad hoc because it does not rely on a pre- existing infrastructure, such
as routers in wired networks or access points in managed (infrastructure)
wireless networks.
Each node participates in routing by forwarding data for other nodes, and so the
determination of which nodes forward data is made dynamically based on the network
connectivity.
In addition to the classic routing, ad hoc networks can use flooding for
forwarding the data.
7Sunday, 12 July 2020 Introduction to MANET 38
39. Mobile Ad Hoc Networks (MANET)
Backbone
Mobile nodes
Access points
MANETWireless Mobile Network
8Sunday, 12 July 2020 Introduction to MANET 39
40. Mobile Ad-hoc Network
Self-configuring network of mobile routers (and associated hosts)
connected by wireless links
This union forms a random topology
Routers move randomly free
Topology changes rapidly and unpredictably
Standalone fashion or connected to the larger Internet
While MANETs are self contained, they can also be tied to an
IP-based global or local network – Hybrid MANETs
9Sunday, 12 July 2020 Introduction to MANET 40
41. Ad hoc Networks Types
MANET – Mobile Ad hoc Network – Mobile Devices
Self-configuring, self-organizing, infrastructure-less network of mobile devices connected
without wires
VANET –Vehicular Ad hoc Network – Communication Vehicles
Communication between vehicles and roadside equipment - Artificial intelligence that helps
vehicles to behave in intelligent manners during vehicle-to-vehicle collisions, accidents.
Vehicles are using radio waves to communicate with each other, creating communication
networks instantly on-the-fly while vehicles move along roads.
Sunday, 12 July 2020 Introduction to MANET 41
42. Ad hoc Networks Types
WSN –Wireless Sensor Networks –Sensor Devices
SPAN -SmartPhone Ad hoc Networks
Smartphones to create peer-to-peer networks without relying on cellular carrier
networks, wireless access points, or traditional network infrastructure
iMANET - Internet-based Mobile Ad-hoc Networks
supports Internet protocols such as TCP/UDP and IP. The network uses a network-
layer routing protocol to link mobile nodes and establish routes distributed and
automatically.
Sunday, 12 July 2020 Introduction to MANET 42
43. Advantages of MANET
More Flexibility
Better in Stability
It is considered a robust network because its non- hierarchical distributed control and
management
Heterogeneous in nature ( Mobile, Laptop, Tablet etc.)
It can be turn up and turn down in a very short time
It can be more economical
Sunday, 12 July 2020 Introduction to MANET 43
44. Question 1
Ad hoc network doesn't have Access Point (AP).
a) FALSE
b) TRUE
Sunday, 12 July 2020 Introduction to MANET 44
46. Question 2
To Solve the Interference problem ad hoc networks uses
a) CDMA
b) CSMA/CA
c) CSMA/CD
d) None of the above
Sunday, 12 July 2020 Introduction to MANET 46
47. Answer for Question 2
b) CSMA/CA
Sunday, 12 July 2020 Introduction to MANET 47
48. Question 3
Ad hoc is NOT a self Organizing and Adaptive Network.
a) FALSE
b) TRUE
Sunday, 12 July 2020 Introduction to MANET 48
49. Answer for Question 3
a) FALSE
Sunday, 12 July 2020 Introduction to MANET 49
50. Question 4
Which one of the primary method is used to avoid hidden terminal
terminal problem
a) RTS/CTS Process
b) Anti hidden terminal protocol
c) Anti fading Process
d) None of the above
Sunday, 12 July 2020 Introduction to MANET 50
51. Answer for Question 4
a) RTS/CTS Process
Sunday, 12 July 2020 Introduction to MANET 51
52. Question 5
Which one of the following is Heterogeneous in nature?
a) MANET
b) SONET
c) None of the above
Sunday, 12 July 2020 Introduction to MANET 52
53. Answer for Question 5
a) MANET
Sunday, 12 July 2020 Introduction to MANET 53
54. MANET Applications
Applications Descriptions/Services
Tactical Networks •Military communication, operations
•Coordination of military object moving at high speeds such as fleets
of airplanes or ships
•Automated battlefields
Sensor networks •Collection of embedded sensor devices used to collect real time data
to automate everyday functions. Data highly correlated in time and
space, e.g., remote sensors for weather, earth activities; sensors for
manufacturing equipments.
•Can have between 1000 -100,000 nodes, each node collecting sample
data, then forwarding data to centralized host for processing using low
homogeneous rates.
Emergency
services
•Search, rescue, crowd control, and commando operations as well as
disaster recovery , for e.g. Early retrieval and transmission of patient data (
record, status, diagnosis ) from /to the hospital
•Replacement of a fixed infrastructure in case of earthquakes, hurricanes, fire etc.
Sunday, 12 July 2020 Introduction to MANET 54
55. MANET Applications
Applications Descriptions/Services
Commercial
environments
• E-commerce, e.g., electronic payments from anywhere (i.e., in taxi)
• Business: dynamic access to customer files stored in a central location
on the fly provide consistent databases for all agents
Mobile office - AADHAAR
•Vehicular services:
transmission of news ,road conditions ,weather, music
local ad hoc network with nearby vehicles for road/accident guidance
Home and
enterprise
networking
•Home/office wireless networking(WLAN), e.g., shared whiteboard ,application,
use PDA to print anywhere – Bus, Super Market
•Personal area network (PAN)
Educational
applications
•Set up virtual classrooms or conference rooms
•Set up ad hoc communication during conferences, meetings, or
lectures
Sunday, 12 July 2020 Introduction to MANET 55
56. MANET Applications
Applications
Entertainment
Descriptions/Services
Multiuser games – PUBG
Robotic pets
Outdoor internet access
Location- aware Follow- on services, e.g., automatic call forwarding, transmission of the
Services actual workspace to the current location
Information services
push, e.g., advertise location-specific services, like gas stations
pull, e.g., location-dependent travel guide; services ( printer, fax,
phone, server, gas stations) availability information; caches,
intermediate results, state information, etc.
Sunday, 12 July 2020 Introduction to MANET 56
57. Issues in Ad-Hoc
Ad hoc wireless devices can take different forms (for example, palmtop, laptop, Internet mobile
phone, etc.), the computation, storage,and communications capabilities and interoperability of
such devices will vary tremendously.
Ad hoc devices should not only detect the presence of connectivity with neighbouring
devices/nodes, but also identify what type the devices are and their corresponding attributes.
Due to the presence of mobility, routing information will have to change to reflect changes in
link connectivity.
The diversity of ad hoc mobile devices also implies that the battery capacity of such devices will
also vary. Since ad hoc networks rely on forwarding data packets sent by other nodes, power
consumption becomes a critical issue.
15Sunday, 12 July 2020 Introduction to MANET 57
58. Cellular and ad hoc wireless networks
Sunday, 12 July 2020 Introduction to MANET 58
59. Comparison of wireless cellular and wireless ad-hoc network
concepts
Sunday, 12 July 2020 Introduction to MANET 59
60. Differences between cellular networks and ad hoc wireless networks
Cellular Networks Ad Hoc Wireless Networks
Fixed infrastructure-based Infrastructure-less
Single-hop wireless links Multi-hop wireless links
Guaranteed bandwidth Shared radio channel
(more suitable for best-effort data traffic)(designed for voice traffic)
Centralized routing Distributed routing
Circuit-switched Packet-switched
(evolving toward packet switching) (evolving toward emulation of circuit
switching)
Seamless connectivity Frequency path break
due to mobility(low call drops during handoffs)
High cost and time of deployment Quick and cost-effective deployment
Reuse of frequency spectrum through
geographical channel reuse
Dynamic frequency reuse based on carrier
sense mechanism
7
Sunday, 12 July 2020 Introduction to MANET 60
61. Differences between cellular networks and ad hoc wireless networks
Easier to achieve time synchronization Time synchronization is difficult and
consumes bandwidth
Easier to employ bandwidth reservation Bandwidth reservation requires complex
medium access control protocols
Application domains include mainly civilian
and commercial sector
Application domains include battlefields,
emergency search and rescue operation, and
collaborative computing
High cost of network maintenance
(backup power source, staffing, etc.)
Self-organization and maintenance properties
are built into the network
Mobile hosts are of relatively low complexity Mobile hosts require more intelligence
(should have a transceiver as well as
routing/switching capacity)
Major goals of routing and call admission are Man aim of routing is to find paths with
to maximize the call acceptance ratio and
minimize the call drop ratio
minimum overhead and also quick
reconfiguration of broken paths
Widely deployed and currently in the third
generation
Several issues are to be addressed for
successful commercial deployment even
though widespread use exists in defense
8
Sunday, 12 July 2020 Introduction to MANET 61
62. Heterogeneity in Mobile Devices
(a) Heterogeneous mobile device ad hoc networks,and (b) homogeneous ad hoc network comprising
powerful laptop computers.
16Sunday, 12 July 2020 Introduction to MANET 62
63. Heterogeneity in Mobile Devices
The presence of heterogeneity implies that some devices are more powerful than
others, and some can be servers while others can only be clients.
It is evident that there are differences in size, computational, power, memory, disk,
and battery capacity.
Mobile devices can exist in many forms.There are great differences among these
devices,
Heterogeneity can affect communication performance and the design of communication
protocols.
17Sunday, 12 July 2020 Introduction to MANET 63
64. Heterogeneity in Mobile Devices
Come in different favours:
Sensor Network
Personal Area Network
Traditional MobileAd Hoc Network
19Sunday, 12 July 2020 Introduction to MANET 64
65. Characteristics of some existing mobile devices
Sunday, 12 July 2020 Introduction to MANET 65
67. B
A
C
F
E D
Mobile Node Wireless Link Path from C to E
6
An ad hoc wireless networks
Sunday, 12 July 2020 Introduction to MANET 67
68. Wired Network
Gateway node
Transmission range
Wired link to the Internet
Wireless link
A house with rooftop transceiver
Wireless mesh networks operating in a residential zone
11
Sunday, 12 July 2020 Introduction to MANET 68
69. Internet
Radio relay node
LampMulti-hop radio relay link
Wired link to the Internet Coverage area
Wireless mesh network covering a highway
12
Sunday, 12 July 2020 Introduction to MANET 69
70. Question 1
Which of the following is true for MANET?
a) Infrastructure Network
b) Infrastructure less Network
c) Storage Network
d) Storage less Network
Sunday, 12 July 2020 Introduction to MANET 70
71. Answer for Question 1
b) Infrastructure less Network
Sunday, 12 July 2020 Introduction to MANET 71
72. Question 2
MANET has Multi hop Connection.
a) TRUE
b) FALSE
Sunday, 12 July 2020 Introduction to MANET 72
74. SUMMARY
MANETs
• Multi Hop Relaying Network
• No fixed infrastructure
• No Pre existing Infrastructure
• Dynamic changed network topology
• Nodes in the network are mobile in general
• No central Controller ( To serve as server)
• The wireless hosts in such networks
communicate with each other without
existing of fixed infrastructure and without
central controller
• Decentralized Network
• Cooperative Communications
• Heterogeneous in nature
• Device to Device Communication
• A MANET can be connected to other fixed
network or to the internet
• Limited bandwidth and power
• No peer – peer communication
• Multipath Propagation
• Proactive / Reactive Protocols
• CSMA/CA Protocol to avoid hidden terminal
problem
Sunday, 12 July 2020 Introduction to MANET 74