SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 983
Mobile Ad Hoc Network (MANET): Applications, Benefits and
Performance Issues in a Global Positioning System
Dr. Rita Uzoma Alo1, Nwokoro Ifeanyi Stanly2, Nkwo Friday Onwe3
1Senior Lecturer, Dept. of Computer Science, Alex Ekwueme Federal University, Ndufu-Alike. Ebonyi State Nigeria
2,3Ph.D Student, Dept. of Computer Science, Alex Ekwueme Federal University, Ndufu-Alike. Ebonyi State Nigeria
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Mobile Ad Hoc network (MANET) is now a vital
and important area for wireless networks’ research and
development as the Internet and its developments in wireless
network technologies have in no little way, contributed to the
precise creation of several mobile computing applications.
MANET is attributed as a collection of two or more devices
that have wireless capabilities that communicate and share
resources without any fixed infrastructure. Each and every
node in a MANET has the ability to freely compliment and
move autonomously in whatever direction and will as a result
vary its links to other devices frequently as they are outfitted
and made operational with transmitters and receivers to
communicate and relate with other nodes given to the fact
that it is a stand-alone kind of network. This paper will
analyze some distinctive uniquenessof wirednetworks, system
applications and benefits of MANET, Performance issues in a
Global Positioning System.
Key Words: MANET, Wireless Ad Hoc Networks, Global
Positioning System, Mobile Ad Hoc Network Mobility,
Mobile Computing.
1. INTRODUCTION
With the prevalent growth of computers and wireless
communication modalities, mobile computing is now
enviable in the field of computercommunications.MobileAd
Hoc Network (MANET) is absolutely a wireless connectivity
that passes through nodes whicharecreatedbytheactivities
of the network.
MANET is a self-configuring network of mobile routers and
nodes connected by wireless links with no access point.
Every mobile device in a network is autonomous. Mobile
devices are bound to progress and move arbitrarily and
arrange themselves subjectively. Nodes in the MANETshare
the wireless medium and the topology of the network
changes erratically and dynamically [1].
In MANET, there is an often breaking of communication link
because nodes are free to move everywhere and in any
direction. The concentration of nodes and their numbers
depend on the platform and applications that are being
deployed. MANET has birthed several applications like the
Tactical networks, Global Positioning System, Wireless
Sensor Network, Data Networks, Device Networks, and
etcetera. The foremost purpose of mobile ad hoc network is
to broaden mobility into the area of independent, mobile,
and wireless domains, where a set of nodes may be
collectively merged to form routers and hosts. This means
that they are composed of the network routing
arrangements in an ad hoc form. Mobility is an expression
used to signify actions and roaming in different domains on
the internet.
The mobile nodes are privileged to retain their individual IP
addresses by not periodically changing it. This is called a
Mobile IP technology. The work of Mobile IP nodes is
saddled in the management of IP addresses with the
assistance of the Foreign and HomeAgents. AdHocNetwork
that is provided by a mobile IP node is a fully wireless
system that is bound to utilize any mobile network
infrastructure that has no base station. The nodes can be of
any link arrangement and each node assumes responsibility
for a router work with the Mobile IP with different levels of
Mobility [2].
It is important to note that the swift growth of mobile
phones is seen to support communication with one another
anytime and anywhere and could access the latest
information or share some basic information wherefore.
MANET infrastructure has also supported themilitaryasthe
dangers of the field environment are now reduced by the
accurate node to node communication and mobility which
helps in disaster management. The recent wireless LAN
technology has also come to play and that Bluetooth has
generated significant awareness as an improvement plan.
Bluetooth's main responsibility is to assist wireless devices
to contact and relate with one another in an Ad Hoc
Network.
Fig -1: Mobile Ad Hoc Network
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 984
There are several security vulnerabilityconcernsinwireless
systems just like in MANET. MANET ismorevulnerablethan
wired network due to mobile nodes, threats from
compromised nodes inside the network, limited physical
security, dynamic topology, scalability and lack of
centralized management [3]. MANET is more prone to
malicious attacks because of its vulnerability.
2. LITERATURE REVIEW
Information technology has been centered mainly on
wireless technology sometime now; this does not say that
the conventional mobile and other cellular networks are no
longer useful.
It is true that Mobile Ad Hoc Network has expunged the
limitations of other conventional networks in terms of their
infrastructural needs like provisions for routers, base
station, and etcetera. This limitation is removed as Ad Hoc
Network is in no doubt the main answer to the progression
of the wireless network and the Ad Hoc Network are
characteristically balanced on equal nodes within
communication over the wireless link without any known
central control requirement.
It is also true that the Refining Technology (RT) and the
Military Tactical Communication (MTC) are seen as the
principal application for Ad Hoc Networks. The demandsfor
Ad Hoc Networks applications continue to grow speedily
such as rescue mission in a time of natural disasters, law
enforcement operations, and othercommercial activitiesare
in high demand for Ad Hoc Networks.Mobileadhoc network
was developed by the American DefenceAdvancedResearch
Projects Agency (DARPA) in the early 1970s.
Radio system network known as the packet radio systems
(PRNET) was developed to transmit the Advanced Research
Projects Agency Network (ARPANET) within fixed and
mobile nodes. A key focus in MANET has been the routing
problem, and a large number of routing protocols have been
proposed: Destination Sequenced Distance Vector routing
(DSDV) [4], Dynamic Source Routing (DSR) [5], Ad Hoc On-
Demand Distance Vector routing (AODV) [6], Ad Hoc On-
Demand Multipath Distance Vector (AOMDV) [7]andNACK-
Based AODV (N-AODV) [8]. The existence of some of these
protocols is only in design.
The history of MANET can be discussed in first, second and
third generations. The packet radio network (PRNET) came
up within the first generation. This was built by the DARPA.
PRNET was built with mobile battlefield elements; this is a
platform without known infrastructure. PRNET is said to be
reliable, vigorous, trustworthy and operational research
network. SURAN (Survivable Adaptive Radio Networks)
came within 1980’s as a second-generation network. They
were significantly improved in the areas of portability,
affordability and more efficient as the radios had a
considerable enhancement.
SURAN birthed GloMo ( Global Mobile Information System)
and the NTDR ( Near Term Digital Radio) The objective of
GloMo was to present support for office environment
Ethernet configured multimedia connectivityat anytime. On
the other hand, NTDR utilized someclusterlink routingstate
which arranged itself into a distinctive two-tier Ad Hoc
network. NTDR is wholly used in crude oil refining and also
by the US Army. It is on record that NTDR is simply the only
real and non-prototyping Ad-Hoc network that exists at the
moment.
Finally, the third generation was developed in the 1990’s
which is seen as a commercial network that is in use with
laptop computers. It also has open source software and
based on Radio Frequency and Infrared techniques.
3. SYSTEM APPLICATION OF MANET
Mobile Ad Hoc network is now a reliable mobile network in
the business commonplace. The progression in wireless
communications and the rampant use of portable devices
has given Ad Hoc networks the needed attention it befits.
MANET is now a dependable network in the military
formation. The petroleum sector now relies on MANET for
crude oil refining; business, public, and otherprivatesectors
can now integrate Ad Hoc networks in a commercial
quantum. Irrespective of demography and immediacy,
network users can now access and share information with
the support of Mobile Ad-Hoc Networks.
There is no fixed infrastructure as MANET has dynamic
connectivity and free to move to any position unlike other
infrastructural networks like the Local Area Network (LAN),
Wide Area Network (WAN), Metropolitan Area Network
(MAN) and etcetera. MANET assures flexibility, availability,
and robustness. We will look at the essence of MANET in the
following segments;
3.1 Military Segment
Ad Hoc networks now support the military to take lead in
common places like the hostile environments (Sambisa
Forest, Birni Gwari, Creeks in the Niger Delta regions, Ezilo
Expressway, etc) in order to share information between the
military infrastructure, soldiers and the movement of such
bandits (Boko Haram, Militants). This will ensure support
and maintain information between all the teams in the
combatant both the aerial and surveillance sets. This
includes the groundandtactical supportgroups.Information
could be released directly from the Defence Headquarters
and it will arrive at the intended destination and in a needed
time without further requirement or provisions for fixed
infrastructure that supports such information delivery.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 985
3.2 Business Segment
Ad Hoc networks are prevalence in the emergency and
rescue operations for disaster management like the time of
water flooding, fire incidences, andhurricanesituations. The
rescue teams are capable of communicating using GPS in
order to appropriately ventilate their productive energies
into useful actions and to also ensure safety and interest.
MANET is also most useful to the law enforcement agencies
in cyber crime combating and other atrocious and heinous
crimes. Taxi transport system likethefamousUber now uses
Ad Hoc networks to monitor drivers and their exact mileage
plied on each trip. Crude oil refining is made possible
through MANET as there is little or no provisions for
infrastructures and human presence in such operations.
3.3 Data Networks
A commercial application for MANET includes ubiquitous
computing [9]. Data networks possibly will beunlimitedand
beyond the normal reachoffixedandinstalledinfrastructure
by permitting computer systems to senddata toitsusersina
network. This will ensurethatnetworksarereadilyavailable
and easy to use.
3.4 Sensor Networks
Like in the Global Positioning Systems (GPS), there aresome
compositions of the mammoth figure of tinysensors.Ithelps
to identify the number or size of properties in a particular
location. The figure below shows the distinctive qualities of
an Ad Hoc network with regards to its utilization of
infrastructure-less platforms, unlike other networks.
Fig -2: MANET and other Infrastructural Networks
4. BENEFITS OF AD HOC NETWORK ROUTING
PROTOCOL
 Ad Hoc Networks are very useful especially in some
situations in which the fixed infrastructural network is
relatively expensive or not trustworthy.
 Installation of Ad Hoc Network is undemanding as it
requires least possible human involvement as the planning
of base stations and its installations are not required.
 Mobile Ad Hoc Networks has a built-in structure for the
utilization of the 4G architecture and its resources. This
provides the ready system environments that support
different users to accomplish varying task and
communication irrespective of their location or device in
use.
 Ad hoc networks could be incorporated into the World
Wide Web or the internet as a whole. This means that
several devices are bound to interconnect and several users
benefiting from the network provider.
 Capacity, range and energy arguments promote their use
in tandem with existing cellular infrastructures as they can
extend coverage and interconnectivity [10].
5. GLOBAL POSITIONING SYSTEM (GPS)
GPS is a Mobile Ad Hoc Networks Positioning system that
uses radio navigation technique to explore devices or
environments. GPS consists of 24 satellites within the six
orbital planes that operate in a circular of 10,900 nautical
miles (20,200 km) orbits with an inclination angle of 55
degrees and with a 12-hour period. GPS operates in an L-
band frequency (1575.42 and 1226.6 MHz), and is useful in
all the spheres of life both in the Agro business, the taxi cab
system, crude oil refining, military, intelligence, and public
sectors.
Orbital messages are transmitted from the satellites in the
sky and this contains some elements, clocks, and statuses
which are useful to the GPS receiver to trace its positioning
and the speed rate in terms of velocity. Three satellites are
required in deciding the latitude and longitude from the
transceiver and also the receiver’s height and elevation.
The exactness of some readings is supported by the
provision of additional satellites. This will also ensure an
adequate accuracy from the readings and to support ground
station operations. To improve its accuracy, assistance from
ground stations can be applied. Such systems, called
differential GPS (DGPS), can reduce the error to less than a
few meters [11].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 986
Fig -3: Block Diagram of a GPS Receiver
6. PERFORMANCE ISSUES
MANET and other traditional wired, fixed networks have
many different characteristics. For the design of a suitable
routing protocol for MANET operating environment, one
must consider the different directions and the sub-
qualitative and quantitative aspects of the design and
implementation [12].
MANET has a handful of challenges as no network is
completely efficient. Some of the drawbacksareenumerated
as follows;
 Independence: Given to the fact that the routing nodes
are independently mobilized, there is no provision for a
centralized administrator or server-side entity.
 Bandwidth Usage:Wirelessconnectionsare boostedwith
some bandwidth optimizations but considerably lowerthan
the wired links. The routing protocols in a wireless network
system are bound to utilize bandwidth provisions in the
most advantageous manner by ensuringthattheoverheadis
kept as moderateaspossible. Thelimitedtransmission range
also imposes a constraint on routing protocols in
maintaining the topological information. Especially in
MANETS due to frequent changes in topology, maintaining
the topological information at all nodes involves more
control overhead which, in turn, results in more bandwidth
wastage [13].
 Active topology: Since nodes are mobile, they have
connected actively in a random mode as linksof thesystem's
network are not static. The links are supported in a distance
of a node to the other. The process of updating of
information within nodes is challenging in a MANETsystem.
 Inadequate resources:Mobile nodesareboundtorelyon
battery power only as it is a limited resource that could run
down if there are no sufficient backup provisions. Storage
space and power supply are also inadequate.
 Transmission quality and material security: Mobility
translates to a higher security menace and challenges just
like in the peer-to-peer network architecture. The system is
made available to several users as the legitimate network
users and the malicious attackers abound. Snoopers,
spoofing, and denial of service attacks ought to be
considered. The resultantdreadful conditionsofthereceived
signal should be a concern.
 Distribution operation: This is a qualitative
characteristic because of the existence of MANET in the
areas that do not have the requirements for the creation of
the basic network, routing here may not depend on a
particular node to function.
 Loop-freedom: This ensures that the routing protocol
ought to be reliable with its distinctiveness given that an
appropriate effort should be done to ensure avoidance of
wastage of bandwidth.
 Demand-based operation: In ordertoreducetheburden
on each node, if the link is not so much enhanced, demand
should be considered when using On-demand approach to
the establishment of a pathway and it is only when the need
for a particular path queries the establishment of that path
[14]
7. CONCLUSION
There is a paradigm shift in the growth and development of
mobile technology as wireless alternatives for
communications abound. These feet, savages the mobile
devices the ability to self-create, self-administration, self-
organization, and self-configuration. This is termeda Mobile
Ad Hoc Network. Mobile Ad Hoc Network has its own
challenges as it is vulnerable mostly at the receiving end,
unlike the fixed wired networks. No doubt, vulnerability is a
serious security concern in mobile technology. This paper
has explained the various principles of MANET which
supports thrill seekers and researchers to understand the
inherent flexibility, deployment, collaboration and
configuration in a wireless network systemandothersensor
networks like the Global Positioning System.
REFERENCES
1) M. Raja and C. Baboo, “An Overview of MANET:
Applications, Attacks andChallenges,”International
Journal of ComputerScience andMobileComputing,
Vol.3 Issue.1, Jan. 2014, pg. 409.
2) A. Saleh, K. Al-Omari and P. Sumari, “An Overview
of Mobile Ad Hoc Networks for the Existing
Protocols and Applications,” International Journal
on Application of Graph Theory in Wireless Ad Hoc
and Sensor Networks (Graph – Hoc), Vol. 02, Mar
2010, pg. 87.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 987
3) A. Kumar, “Security Attacks in Manet - A Review,”
National Workshop-Cum-Conference on Recent
Trends in Mathematics and Computing (RTMC)
2011, Proceedings published in International
Journal of Computer Applications® (IJCA), Apr
2011, pg. 1.
4) C. Perkins, and P. Bhagwat, “Highly dynamic
Destination-Sequenced Distance- Vector routing
(DSDV) for mobile computers,” In Proceedings of
the conference on Communications Architectures,
Protocols and Applications(SIGCOMM‘94),London,
UK, Aug 31–Sep 1994, ACM: New York, NY, USA,
1994; pp. 234–244.
5) D. Johnson, and D. Maltz, “Dynamic Source Routing
in Ad Hoc Networks. In Mobile Computing,” Kluwer
Academic Publisher: Dordrecht, the Netherlands,
1996, pp. 153–181.
6) C. Perkins, E. Royer “Ad-hoc On-Demand Distance
Vector Routing,” In Proceedings of the 2nd IEEE
Workshop on Mobile Computing Systems and
Applications,NewOrleans,LA,USA,25–26February
1999.
7) B. Singh, S. Baghla, and H. Monga, “Mobility models
based performance evaluation of AOMDV routing
protocol of MANET,” International Journal
Application Research, 2017, pp. 3, 82–86.
8) A. Bianchi, S. Pizzutilo and G. Vessio, “Preliminary
description of NACK-based ad-hoc On-demand
Distance Vector routing protocol for MANETs,” In
Proceedings of the 2014 9th International
Conference on Software Engineering and
Applications (ICSOFT-EA), Vienna, Austria, 29–31
August 2014.
9) M. Raja, and C. Baboo, “An Overview of MANET:
Applications, Attacks andChallenges,”International
Journal of ComputerScience andMobileComputing,
Vol.3 Issue.1, Jan. 2014, pp. 408-417.
10) N. Raza, M. Aftab, M. Akbar, O. Ashraf, and M. Irfan,
“Mobile Ad-Hoc Networks Applications and Its
Challenges,” Communications and Network, Aug
2016, pp. 131-136.
http://dx.doi.org/10.4236/cn.2016.83013
11) A. Krikelis, “Location-dependent multimedia
computing,” IEEE Concurrency Vol. 7 Issue2,April–
June 1999 pp. 13–15.
12) A. Saleh, K. Al-Omari and P. Sumari, “AnOverviewof
Mobile Ad Hoc Networks for the Existing Protocols
and Applications,” International Journal on
Application of Graph Theory inWirelessAdHocand
Sensor Networks (Graph – Hoc), Vol. 02, March
2010, page 94.
13) M. Raja, and C. Baboo, “An Overview of MANET:
Applications, Attacks andChallenges,”International
Journal of ComputerScience andMobileComputing,
Vol.3 Issue.1, January 2014, pg. 415.
14) A. Saleh, K. Al-Omari and P. Sumari, “AnOverviewof
Mobile Ad Hoc Networks for the Existing Protocols
and Applications,” International Journal on
Application of Graph Theory inWirelessAdHocand
Sensor Networks (Graph – Hoc), Vol. 02, March
2010, page 94.

More Related Content

What's hot

5G Mobile Communication Technology: An Overview
	 5G Mobile Communication Technology: An Overview	 5G Mobile Communication Technology: An Overview
5G Mobile Communication Technology: An OverviewIRJET Journal
 
Opportunistic use of the 2.63.5 ghz band for broadband services in the west a...
Opportunistic use of the 2.63.5 ghz band for broadband services in the west a...Opportunistic use of the 2.63.5 ghz band for broadband services in the west a...
Opportunistic use of the 2.63.5 ghz band for broadband services in the west a...ijmnct
 
An Overview of 5G Wireless Cellular Technologies
An Overview of 5G Wireless Cellular TechnologiesAn Overview of 5G Wireless Cellular Technologies
An Overview of 5G Wireless Cellular TechnologiesEditor IJCATR
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
 
The Survey on Mobile Computing and its Applications
The Survey on Mobile Computing and its ApplicationsThe Survey on Mobile Computing and its Applications
The Survey on Mobile Computing and its ApplicationsIRJET Journal
 
LTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
LTE - Advancing the Intelligent Edge with Public Safety LTE White PaperLTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
LTE - Advancing the Intelligent Edge with Public Safety LTE White PaperBrian Mollett
 
Study on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile GenerationsStudy on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile Generationsijtsrd
 
COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...
COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...
COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...IJCNCJournal
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksWilliam Chipman
 
5 g mobile technology
5 g mobile technology5 g mobile technology
5 g mobile technologyKiran Kumar
 
Millimeter wave mobile communications for 5 g Cellular
Millimeter wave mobile communications for 5 g CellularMillimeter wave mobile communications for 5 g Cellular
Millimeter wave mobile communications for 5 g CellularPoornima E.G.
 

What's hot (18)

5G Mobile Communication Technology: An Overview
	 5G Mobile Communication Technology: An Overview	 5G Mobile Communication Technology: An Overview
5G Mobile Communication Technology: An Overview
 
Opportunistic use of the 2.63.5 ghz band for broadband services in the west a...
Opportunistic use of the 2.63.5 ghz band for broadband services in the west a...Opportunistic use of the 2.63.5 ghz band for broadband services in the west a...
Opportunistic use of the 2.63.5 ghz band for broadband services in the west a...
 
An Overview of 5G Wireless Cellular Technologies
An Overview of 5G Wireless Cellular TechnologiesAn Overview of 5G Wireless Cellular Technologies
An Overview of 5G Wireless Cellular Technologies
 
Assignment Of 5G Antenna Design Technique
Assignment Of 5G Antenna Design TechniqueAssignment Of 5G Antenna Design Technique
Assignment Of 5G Antenna Design Technique
 
120
120120
120
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
 
The Survey on Mobile Computing and its Applications
The Survey on Mobile Computing and its ApplicationsThe Survey on Mobile Computing and its Applications
The Survey on Mobile Computing and its Applications
 
D010221620
D010221620D010221620
D010221620
 
LTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
LTE - Advancing the Intelligent Edge with Public Safety LTE White PaperLTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
LTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
 
Study on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile GenerationsStudy on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile Generations
 
COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...
COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...
COMPARATIVE AND QOS PERFORMANCE ANALYSIS OF TERRESTRIAL-AERIAL PLATFORMS-SATE...
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
 
5 g technology
5 g technology5 g technology
5 g technology
 
5G design concepts
5G design concepts5G design concepts
5G design concepts
 
M2M communications
M2M communicationsM2M communications
M2M communications
 
5 g mobile technology
5 g mobile technology5 g mobile technology
5 g mobile technology
 
5G technology
5G technology5G technology
5G technology
 
Millimeter wave mobile communications for 5 g Cellular
Millimeter wave mobile communications for 5 g CellularMillimeter wave mobile communications for 5 g Cellular
Millimeter wave mobile communications for 5 g Cellular
 

Similar to IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance Issues in a Global Positioning System

Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd Iaetsd
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2prjpublications
 
AODV information
AODV informationAODV information
AODV informationanilds02
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
 
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...acijjournal
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET Journal
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
 
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc NetworksSecurity Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networksijtsrd
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol ineSAT Publishing House
 
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
 
Performance Analysis of Communication Protocols for Post Disaster Communication
Performance Analysis of Communication Protocols for Post Disaster CommunicationPerformance Analysis of Communication Protocols for Post Disaster Communication
Performance Analysis of Communication Protocols for Post Disaster CommunicationAM Publications,India
 
Window based smart antenna design
Window based smart antenna designWindow based smart antenna design
Window based smart antenna designijwmn
 

Similar to IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance Issues in a Global Positioning System (20)

Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areas
 
H010524049
H010524049H010524049
H010524049
 
A017220112
A017220112A017220112
A017220112
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
 
AODV information
AODV informationAODV information
AODV information
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
 
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc NetworksSecurity Vulnerability and Counter Measures in Mobile Ad Hoc Networks
Security Vulnerability and Counter Measures in Mobile Ad Hoc Networks
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol in
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
 
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
 
Performance Analysis of Communication Protocols for Post Disaster Communication
Performance Analysis of Communication Protocols for Post Disaster CommunicationPerformance Analysis of Communication Protocols for Post Disaster Communication
Performance Analysis of Communication Protocols for Post Disaster Communication
 
Window based smart antenna design
Window based smart antenna designWindow based smart antenna design
Window based smart antenna design
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance Issues in a Global Positioning System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 983 Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance Issues in a Global Positioning System Dr. Rita Uzoma Alo1, Nwokoro Ifeanyi Stanly2, Nkwo Friday Onwe3 1Senior Lecturer, Dept. of Computer Science, Alex Ekwueme Federal University, Ndufu-Alike. Ebonyi State Nigeria 2,3Ph.D Student, Dept. of Computer Science, Alex Ekwueme Federal University, Ndufu-Alike. Ebonyi State Nigeria ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Mobile Ad Hoc network (MANET) is now a vital and important area for wireless networks’ research and development as the Internet and its developments in wireless network technologies have in no little way, contributed to the precise creation of several mobile computing applications. MANET is attributed as a collection of two or more devices that have wireless capabilities that communicate and share resources without any fixed infrastructure. Each and every node in a MANET has the ability to freely compliment and move autonomously in whatever direction and will as a result vary its links to other devices frequently as they are outfitted and made operational with transmitters and receivers to communicate and relate with other nodes given to the fact that it is a stand-alone kind of network. This paper will analyze some distinctive uniquenessof wirednetworks, system applications and benefits of MANET, Performance issues in a Global Positioning System. Key Words: MANET, Wireless Ad Hoc Networks, Global Positioning System, Mobile Ad Hoc Network Mobility, Mobile Computing. 1. INTRODUCTION With the prevalent growth of computers and wireless communication modalities, mobile computing is now enviable in the field of computercommunications.MobileAd Hoc Network (MANET) is absolutely a wireless connectivity that passes through nodes whicharecreatedbytheactivities of the network. MANET is a self-configuring network of mobile routers and nodes connected by wireless links with no access point. Every mobile device in a network is autonomous. Mobile devices are bound to progress and move arbitrarily and arrange themselves subjectively. Nodes in the MANETshare the wireless medium and the topology of the network changes erratically and dynamically [1]. In MANET, there is an often breaking of communication link because nodes are free to move everywhere and in any direction. The concentration of nodes and their numbers depend on the platform and applications that are being deployed. MANET has birthed several applications like the Tactical networks, Global Positioning System, Wireless Sensor Network, Data Networks, Device Networks, and etcetera. The foremost purpose of mobile ad hoc network is to broaden mobility into the area of independent, mobile, and wireless domains, where a set of nodes may be collectively merged to form routers and hosts. This means that they are composed of the network routing arrangements in an ad hoc form. Mobility is an expression used to signify actions and roaming in different domains on the internet. The mobile nodes are privileged to retain their individual IP addresses by not periodically changing it. This is called a Mobile IP technology. The work of Mobile IP nodes is saddled in the management of IP addresses with the assistance of the Foreign and HomeAgents. AdHocNetwork that is provided by a mobile IP node is a fully wireless system that is bound to utilize any mobile network infrastructure that has no base station. The nodes can be of any link arrangement and each node assumes responsibility for a router work with the Mobile IP with different levels of Mobility [2]. It is important to note that the swift growth of mobile phones is seen to support communication with one another anytime and anywhere and could access the latest information or share some basic information wherefore. MANET infrastructure has also supported themilitaryasthe dangers of the field environment are now reduced by the accurate node to node communication and mobility which helps in disaster management. The recent wireless LAN technology has also come to play and that Bluetooth has generated significant awareness as an improvement plan. Bluetooth's main responsibility is to assist wireless devices to contact and relate with one another in an Ad Hoc Network. Fig -1: Mobile Ad Hoc Network
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 984 There are several security vulnerabilityconcernsinwireless systems just like in MANET. MANET ismorevulnerablethan wired network due to mobile nodes, threats from compromised nodes inside the network, limited physical security, dynamic topology, scalability and lack of centralized management [3]. MANET is more prone to malicious attacks because of its vulnerability. 2. LITERATURE REVIEW Information technology has been centered mainly on wireless technology sometime now; this does not say that the conventional mobile and other cellular networks are no longer useful. It is true that Mobile Ad Hoc Network has expunged the limitations of other conventional networks in terms of their infrastructural needs like provisions for routers, base station, and etcetera. This limitation is removed as Ad Hoc Network is in no doubt the main answer to the progression of the wireless network and the Ad Hoc Network are characteristically balanced on equal nodes within communication over the wireless link without any known central control requirement. It is also true that the Refining Technology (RT) and the Military Tactical Communication (MTC) are seen as the principal application for Ad Hoc Networks. The demandsfor Ad Hoc Networks applications continue to grow speedily such as rescue mission in a time of natural disasters, law enforcement operations, and othercommercial activitiesare in high demand for Ad Hoc Networks.Mobileadhoc network was developed by the American DefenceAdvancedResearch Projects Agency (DARPA) in the early 1970s. Radio system network known as the packet radio systems (PRNET) was developed to transmit the Advanced Research Projects Agency Network (ARPANET) within fixed and mobile nodes. A key focus in MANET has been the routing problem, and a large number of routing protocols have been proposed: Destination Sequenced Distance Vector routing (DSDV) [4], Dynamic Source Routing (DSR) [5], Ad Hoc On- Demand Distance Vector routing (AODV) [6], Ad Hoc On- Demand Multipath Distance Vector (AOMDV) [7]andNACK- Based AODV (N-AODV) [8]. The existence of some of these protocols is only in design. The history of MANET can be discussed in first, second and third generations. The packet radio network (PRNET) came up within the first generation. This was built by the DARPA. PRNET was built with mobile battlefield elements; this is a platform without known infrastructure. PRNET is said to be reliable, vigorous, trustworthy and operational research network. SURAN (Survivable Adaptive Radio Networks) came within 1980’s as a second-generation network. They were significantly improved in the areas of portability, affordability and more efficient as the radios had a considerable enhancement. SURAN birthed GloMo ( Global Mobile Information System) and the NTDR ( Near Term Digital Radio) The objective of GloMo was to present support for office environment Ethernet configured multimedia connectivityat anytime. On the other hand, NTDR utilized someclusterlink routingstate which arranged itself into a distinctive two-tier Ad Hoc network. NTDR is wholly used in crude oil refining and also by the US Army. It is on record that NTDR is simply the only real and non-prototyping Ad-Hoc network that exists at the moment. Finally, the third generation was developed in the 1990’s which is seen as a commercial network that is in use with laptop computers. It also has open source software and based on Radio Frequency and Infrared techniques. 3. SYSTEM APPLICATION OF MANET Mobile Ad Hoc network is now a reliable mobile network in the business commonplace. The progression in wireless communications and the rampant use of portable devices has given Ad Hoc networks the needed attention it befits. MANET is now a dependable network in the military formation. The petroleum sector now relies on MANET for crude oil refining; business, public, and otherprivatesectors can now integrate Ad Hoc networks in a commercial quantum. Irrespective of demography and immediacy, network users can now access and share information with the support of Mobile Ad-Hoc Networks. There is no fixed infrastructure as MANET has dynamic connectivity and free to move to any position unlike other infrastructural networks like the Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN) and etcetera. MANET assures flexibility, availability, and robustness. We will look at the essence of MANET in the following segments; 3.1 Military Segment Ad Hoc networks now support the military to take lead in common places like the hostile environments (Sambisa Forest, Birni Gwari, Creeks in the Niger Delta regions, Ezilo Expressway, etc) in order to share information between the military infrastructure, soldiers and the movement of such bandits (Boko Haram, Militants). This will ensure support and maintain information between all the teams in the combatant both the aerial and surveillance sets. This includes the groundandtactical supportgroups.Information could be released directly from the Defence Headquarters and it will arrive at the intended destination and in a needed time without further requirement or provisions for fixed infrastructure that supports such information delivery.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 985 3.2 Business Segment Ad Hoc networks are prevalence in the emergency and rescue operations for disaster management like the time of water flooding, fire incidences, andhurricanesituations. The rescue teams are capable of communicating using GPS in order to appropriately ventilate their productive energies into useful actions and to also ensure safety and interest. MANET is also most useful to the law enforcement agencies in cyber crime combating and other atrocious and heinous crimes. Taxi transport system likethefamousUber now uses Ad Hoc networks to monitor drivers and their exact mileage plied on each trip. Crude oil refining is made possible through MANET as there is little or no provisions for infrastructures and human presence in such operations. 3.3 Data Networks A commercial application for MANET includes ubiquitous computing [9]. Data networks possibly will beunlimitedand beyond the normal reachoffixedandinstalledinfrastructure by permitting computer systems to senddata toitsusersina network. This will ensurethatnetworksarereadilyavailable and easy to use. 3.4 Sensor Networks Like in the Global Positioning Systems (GPS), there aresome compositions of the mammoth figure of tinysensors.Ithelps to identify the number or size of properties in a particular location. The figure below shows the distinctive qualities of an Ad Hoc network with regards to its utilization of infrastructure-less platforms, unlike other networks. Fig -2: MANET and other Infrastructural Networks 4. BENEFITS OF AD HOC NETWORK ROUTING PROTOCOL  Ad Hoc Networks are very useful especially in some situations in which the fixed infrastructural network is relatively expensive or not trustworthy.  Installation of Ad Hoc Network is undemanding as it requires least possible human involvement as the planning of base stations and its installations are not required.  Mobile Ad Hoc Networks has a built-in structure for the utilization of the 4G architecture and its resources. This provides the ready system environments that support different users to accomplish varying task and communication irrespective of their location or device in use.  Ad hoc networks could be incorporated into the World Wide Web or the internet as a whole. This means that several devices are bound to interconnect and several users benefiting from the network provider.  Capacity, range and energy arguments promote their use in tandem with existing cellular infrastructures as they can extend coverage and interconnectivity [10]. 5. GLOBAL POSITIONING SYSTEM (GPS) GPS is a Mobile Ad Hoc Networks Positioning system that uses radio navigation technique to explore devices or environments. GPS consists of 24 satellites within the six orbital planes that operate in a circular of 10,900 nautical miles (20,200 km) orbits with an inclination angle of 55 degrees and with a 12-hour period. GPS operates in an L- band frequency (1575.42 and 1226.6 MHz), and is useful in all the spheres of life both in the Agro business, the taxi cab system, crude oil refining, military, intelligence, and public sectors. Orbital messages are transmitted from the satellites in the sky and this contains some elements, clocks, and statuses which are useful to the GPS receiver to trace its positioning and the speed rate in terms of velocity. Three satellites are required in deciding the latitude and longitude from the transceiver and also the receiver’s height and elevation. The exactness of some readings is supported by the provision of additional satellites. This will also ensure an adequate accuracy from the readings and to support ground station operations. To improve its accuracy, assistance from ground stations can be applied. Such systems, called differential GPS (DGPS), can reduce the error to less than a few meters [11].
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 986 Fig -3: Block Diagram of a GPS Receiver 6. PERFORMANCE ISSUES MANET and other traditional wired, fixed networks have many different characteristics. For the design of a suitable routing protocol for MANET operating environment, one must consider the different directions and the sub- qualitative and quantitative aspects of the design and implementation [12]. MANET has a handful of challenges as no network is completely efficient. Some of the drawbacksareenumerated as follows;  Independence: Given to the fact that the routing nodes are independently mobilized, there is no provision for a centralized administrator or server-side entity.  Bandwidth Usage:Wirelessconnectionsare boostedwith some bandwidth optimizations but considerably lowerthan the wired links. The routing protocols in a wireless network system are bound to utilize bandwidth provisions in the most advantageous manner by ensuringthattheoverheadis kept as moderateaspossible. Thelimitedtransmission range also imposes a constraint on routing protocols in maintaining the topological information. Especially in MANETS due to frequent changes in topology, maintaining the topological information at all nodes involves more control overhead which, in turn, results in more bandwidth wastage [13].  Active topology: Since nodes are mobile, they have connected actively in a random mode as linksof thesystem's network are not static. The links are supported in a distance of a node to the other. The process of updating of information within nodes is challenging in a MANETsystem.  Inadequate resources:Mobile nodesareboundtorelyon battery power only as it is a limited resource that could run down if there are no sufficient backup provisions. Storage space and power supply are also inadequate.  Transmission quality and material security: Mobility translates to a higher security menace and challenges just like in the peer-to-peer network architecture. The system is made available to several users as the legitimate network users and the malicious attackers abound. Snoopers, spoofing, and denial of service attacks ought to be considered. The resultantdreadful conditionsofthereceived signal should be a concern.  Distribution operation: This is a qualitative characteristic because of the existence of MANET in the areas that do not have the requirements for the creation of the basic network, routing here may not depend on a particular node to function.  Loop-freedom: This ensures that the routing protocol ought to be reliable with its distinctiveness given that an appropriate effort should be done to ensure avoidance of wastage of bandwidth.  Demand-based operation: In ordertoreducetheburden on each node, if the link is not so much enhanced, demand should be considered when using On-demand approach to the establishment of a pathway and it is only when the need for a particular path queries the establishment of that path [14] 7. CONCLUSION There is a paradigm shift in the growth and development of mobile technology as wireless alternatives for communications abound. These feet, savages the mobile devices the ability to self-create, self-administration, self- organization, and self-configuration. This is termeda Mobile Ad Hoc Network. Mobile Ad Hoc Network has its own challenges as it is vulnerable mostly at the receiving end, unlike the fixed wired networks. No doubt, vulnerability is a serious security concern in mobile technology. This paper has explained the various principles of MANET which supports thrill seekers and researchers to understand the inherent flexibility, deployment, collaboration and configuration in a wireless network systemandothersensor networks like the Global Positioning System. REFERENCES 1) M. Raja and C. Baboo, “An Overview of MANET: Applications, Attacks andChallenges,”International Journal of ComputerScience andMobileComputing, Vol.3 Issue.1, Jan. 2014, pg. 409. 2) A. Saleh, K. Al-Omari and P. Sumari, “An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications,” International Journal on Application of Graph Theory in Wireless Ad Hoc and Sensor Networks (Graph – Hoc), Vol. 02, Mar 2010, pg. 87.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 987 3) A. Kumar, “Security Attacks in Manet - A Review,” National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing (RTMC) 2011, Proceedings published in International Journal of Computer Applications® (IJCA), Apr 2011, pg. 1. 4) C. Perkins, and P. Bhagwat, “Highly dynamic Destination-Sequenced Distance- Vector routing (DSDV) for mobile computers,” In Proceedings of the conference on Communications Architectures, Protocols and Applications(SIGCOMM‘94),London, UK, Aug 31–Sep 1994, ACM: New York, NY, USA, 1994; pp. 234–244. 5) D. Johnson, and D. Maltz, “Dynamic Source Routing in Ad Hoc Networks. In Mobile Computing,” Kluwer Academic Publisher: Dordrecht, the Netherlands, 1996, pp. 153–181. 6) C. Perkins, E. Royer “Ad-hoc On-Demand Distance Vector Routing,” In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications,NewOrleans,LA,USA,25–26February 1999. 7) B. Singh, S. Baghla, and H. Monga, “Mobility models based performance evaluation of AOMDV routing protocol of MANET,” International Journal Application Research, 2017, pp. 3, 82–86. 8) A. Bianchi, S. Pizzutilo and G. Vessio, “Preliminary description of NACK-based ad-hoc On-demand Distance Vector routing protocol for MANETs,” In Proceedings of the 2014 9th International Conference on Software Engineering and Applications (ICSOFT-EA), Vienna, Austria, 29–31 August 2014. 9) M. Raja, and C. Baboo, “An Overview of MANET: Applications, Attacks andChallenges,”International Journal of ComputerScience andMobileComputing, Vol.3 Issue.1, Jan. 2014, pp. 408-417. 10) N. Raza, M. Aftab, M. Akbar, O. Ashraf, and M. Irfan, “Mobile Ad-Hoc Networks Applications and Its Challenges,” Communications and Network, Aug 2016, pp. 131-136. http://dx.doi.org/10.4236/cn.2016.83013 11) A. Krikelis, “Location-dependent multimedia computing,” IEEE Concurrency Vol. 7 Issue2,April– June 1999 pp. 13–15. 12) A. Saleh, K. Al-Omari and P. Sumari, “AnOverviewof Mobile Ad Hoc Networks for the Existing Protocols and Applications,” International Journal on Application of Graph Theory inWirelessAdHocand Sensor Networks (Graph – Hoc), Vol. 02, March 2010, page 94. 13) M. Raja, and C. Baboo, “An Overview of MANET: Applications, Attacks andChallenges,”International Journal of ComputerScience andMobileComputing, Vol.3 Issue.1, January 2014, pg. 415. 14) A. Saleh, K. Al-Omari and P. Sumari, “AnOverviewof Mobile Ad Hoc Networks for the Existing Protocols and Applications,” International Journal on Application of Graph Theory inWirelessAdHocand Sensor Networks (Graph – Hoc), Vol. 02, March 2010, page 94.