SlideShare a Scribd company logo
Table of ConTenTs
1.   Computer Network and its type

2.   Ad-hoc Network and MANET

3.   Features of MANET

4.   Working of MANET

5.   Security and its challenges in MANET

6.   Advantages and Application of MANET
Types of Network
MobIle aD HoC neTWoRK
Ad hoc is a Latin phrase which means "for this purpose “

A MANET is a type of Ad-hoc network.

Does not require base station.

Mobile Ad hoc Networks are self configuring networks.

Use wireless connections to connect to various networks.

Typical “peer-to-peer” rather than “client-server”.
1.Autonomous terminal

2.Operating without a central coordinator

3.Dynamic network topology

4.Distributed Operation

5.Multi-hop routing
Working of MANET
             May need to traverse multiple links to reach destination




                                                                 Internet
                                 C
                       B                   D
                                                     E
                                                     E
               A
                                                  Gateway


                                 F


 After one of the nodes is configured as a gateway, the
 Stand-alone MANET
entire network is connected to an external network like
                       Internet
Challenges in Securing MANETs




                          Initial
                          Routing
                          before
                          attack
Challenges in Securing MANETs

                           Data Packets




                           Initial
                           Routing
                           before
                           attack
Challenges in Securing MANETs

•Data packets received in
one place of the network
and replay them in
another place
•Attacker can attack the
Routing Algorithm
Challenges in Securing MANETs

Most packets will be
routed to the Attacker

The Attacker can
drop packets or
forward packets to
avoid detection
Advantages of MANET
This can be developed where there is less
telecommunication infrastructure

Cost Estimation is very less

These networks can be set up at any place and time.
MANET is Multi-hop network with Autonomous Terminal
and dynamic network topology.

MANET can be used as Temporary Network

It requires less time
Personal area networking

Military environments

Disaster Area such as War-Zone and Natural Calamity

Civilian environments

Emergency operations

VANE (Vehicular ad hoc Network)
     T
T       H   a   n
    K

More Related Content

What's hot

ELEMENTS OF CELLULAR RADIO SYSTEM DESIGN
ELEMENTS OF CELLULAR RADIO SYSTEM DESIGNELEMENTS OF CELLULAR RADIO SYSTEM DESIGN
ELEMENTS OF CELLULAR RADIO SYSTEM DESIGN
VenkataSatya Manchikalapati
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
Roma Vyas
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
Chakravarthy Chittala
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
KABILESH RAMAR
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
nitss007
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
Akash Raghunath
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
Devdutta Chakrabarti
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communicationNitish Tanwar
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulators
SyedAhamed44
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
DeepaDasarathan
 
Hiperlan
HiperlanHiperlan
Hiperlan
Then Murugeshwari
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
Mahbubur Rahman
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
Jasleen Kaur (Chandigarh University)
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
KABILESH RAMAR
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
Richa Kumari
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
Subhankar Chakraborty
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
Noushad Hasan
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
Aman Gupta
 

What's hot (20)

ELEMENTS OF CELLULAR RADIO SYSTEM DESIGN
ELEMENTS OF CELLULAR RADIO SYSTEM DESIGNELEMENTS OF CELLULAR RADIO SYSTEM DESIGN
ELEMENTS OF CELLULAR RADIO SYSTEM DESIGN
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communication
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulators
 
Handover
HandoverHandover
Handover
 
Cordless Technology
Cordless TechnologyCordless Technology
Cordless Technology
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 

Viewers also liked

Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
Sunita Sahu
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
Harsh Kishore Mishra
 
Manet
ManetManet
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimizationMeenakshi Devi
 
Ant Colony Optimization presentation
Ant Colony Optimization presentationAnt Colony Optimization presentation
Ant Colony Optimization presentationPartha Das
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimizationvk1dadhich
 

Viewers also liked (12)

Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Manet
ManetManet
Manet
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimization
 
Ant Colony Optimization presentation
Ant Colony Optimization presentationAnt Colony Optimization presentation
Ant Colony Optimization presentation
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimization
 

Similar to MANET

Mymanet
MymanetMymanet
Mymanet
Akshay Vasava
 
Manet
ManetManet
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
Tarun Varshney
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
Pallepati Vasavi
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7Ramesh Babu
 
Networking Technologies Basic's complete notes
Networking Technologies Basic's complete notesNetworking Technologies Basic's complete notes
Networking Technologies Basic's complete notes
IndrajaMeghavathula
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
GayathriRHICETCSESTA
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of networkhazirma
 
P26093098
P26093098P26093098
P26093098
IJERA Editor
 
Presentation fyp
Presentation fypPresentation fyp
Presentation fyp
umisyafika
 
Mobile ad hoc networking - An introduction
Mobile ad hoc networking  - An introduction Mobile ad hoc networking  - An introduction
Mobile ad hoc networking - An introduction
Ginoy Joy
 
To mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETTo mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANET
IJERA Editor
 
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoTModule 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
ashwini870728
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
Mazin Alwaaly
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
Vinish Alikkal
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)
Vinish Alikkal
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
Thesis Scientist Private Limited
 
IT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IVIT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IV
pkaviya
 

Similar to MANET (20)

Mymanet
MymanetMymanet
Mymanet
 
Manet
ManetManet
Manet
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7
 
Networking Technologies Basic's complete notes
Networking Technologies Basic's complete notesNetworking Technologies Basic's complete notes
Networking Technologies Basic's complete notes
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of network
 
P26093098
P26093098P26093098
P26093098
 
Presentation fyp
Presentation fypPresentation fyp
Presentation fyp
 
Mobile ad hoc networking - An introduction
Mobile ad hoc networking  - An introduction Mobile ad hoc networking  - An introduction
Mobile ad hoc networking - An introduction
 
270 273
270 273270 273
270 273
 
To mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETTo mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANET
 
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoTModule 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
 
IT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IVIT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IV
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

MANET

  • 1.
  • 2. Table of ConTenTs 1. Computer Network and its type 2. Ad-hoc Network and MANET 3. Features of MANET 4. Working of MANET 5. Security and its challenges in MANET 6. Advantages and Application of MANET
  • 4.
  • 5. MobIle aD HoC neTWoRK Ad hoc is a Latin phrase which means "for this purpose “ A MANET is a type of Ad-hoc network. Does not require base station. Mobile Ad hoc Networks are self configuring networks. Use wireless connections to connect to various networks. Typical “peer-to-peer” rather than “client-server”.
  • 6. 1.Autonomous terminal 2.Operating without a central coordinator 3.Dynamic network topology 4.Distributed Operation 5.Multi-hop routing
  • 7. Working of MANET May need to traverse multiple links to reach destination Internet C B D E E A Gateway F After one of the nodes is configured as a gateway, the Stand-alone MANET entire network is connected to an external network like Internet
  • 8. Challenges in Securing MANETs Initial Routing before attack
  • 9. Challenges in Securing MANETs Data Packets Initial Routing before attack
  • 10. Challenges in Securing MANETs •Data packets received in one place of the network and replay them in another place •Attacker can attack the Routing Algorithm
  • 11. Challenges in Securing MANETs Most packets will be routed to the Attacker The Attacker can drop packets or forward packets to avoid detection
  • 12. Advantages of MANET This can be developed where there is less telecommunication infrastructure Cost Estimation is very less These networks can be set up at any place and time. MANET is Multi-hop network with Autonomous Terminal and dynamic network topology. MANET can be used as Temporary Network It requires less time
  • 13. Personal area networking Military environments Disaster Area such as War-Zone and Natural Calamity Civilian environments Emergency operations VANE (Vehicular ad hoc Network) T
  • 14. T H a n K

Editor's Notes

  1. A MANET is a type of ad hoc network. Ad hoc Network refers to a network connection and does not require access point or a wireless base station. Because MANETS are mobile , they use wireless connections to connect to various networks.
  2. Here is a simple routing algorithm for constructing a spanning tree rooted at a base station. The base station broadcasts a beacon. Those nodes who can hear the beacon, mark the base station as its parent. The beacon is then rebroadcast recursively to construct the spanning tree. Those nodes who don ’ t have a parent yet and receive the beacon will mark the sender as its parent.
  3. The routing tree enables dissemination of information from base station to nodes or collection of data from nodes to base station. Here is an example, all data packets will be sent to base station through the constructed routing tree.
  4. Wormholes can attack the routing algorithm. Since node chooses its parent based on the first copy of the beacon it receives. If an adversary can tunnel the beacon to distant parts of the network faster than it would reach there through normal multi-hop transmission, then the adversary can influence a node ’ s choice of its parent.