SlideShare a Scribd company logo
A NEW APPROACH OF SURVIVABLE MULTICAST ROUTING
PROTOCOL IN MOBILE AD-HOC NETWROK
1
Presented by:
Ariful Islam, ID:090212,
Al Hizbul Bahar, ID:090225
 To ensure the survivability of sub sources.
 To reduce the maintainance cost of the network.
 To ensure data transfer among all the nodes in a network.
 The data packet delivery ratio must be sufficiently high
 The data transmission delay must be as less as possible.
2
Objectives of Research
3
 Collection of self configurable mobile node connected through
wireless links
 Without aid of any existing network infrastructure or central
access point
 Each node participating in the network acts both as host and a
router
 Characteristics of MANETs :
 dynamic topology
 node mobility
 large number of degree of freedom
 self-organizing capability
What is MANET
 Node mobility in an ad hoc network causes frequently change
the network topology.
D
A
C
B
E F
D
A
C
B
E F
4
Basic Concept of MANET
Application Area
 Military battle field
 Commercial Sector
 Local level
 Civil Application
 Personal Area Network(PAN)
5
Design Issue and Challanges
 Topology, Mobility, Robustness
 Capacity and Efficiency
 Energy Consumption
 Quality of Service and Resource Management
 Security and reliability
 Scalability
6
7
Problem Specification of Existing System
Existing System Analysis
 The cost of main source is high
 The main source is required more energy to
run
 System damage possibility is high
 High traffic in main source.
 Coupling between main source and sub-
sources and sub-source and regions node
8
Continue...
Proposed Solution
 Replace main source by sub-sources
 Ensuring sub-source survivability
 Select new sub-source absence of sub-source
9
Continue...
10
 Sub-Sources
 Reciver Node
 Forwarding Node
10
 Sub-Sources
 Reciver Node
 Forwarding Node
11
Continue...
source
Conn.
Nodes
Dest.
Conn.
Nodes
Broadcast ROUTE REQUEST packet
Nodes check the duplicity of packet; if the packet is
duplicate the discarded otherwise continue the process
ROUTE REPLY packet to
source telling how to get
destination
Increment Hop count, rebroadcast the ROUTE REQUEST
packet to adjacent nodes and store info in its reverse route
table
Check the dest. sequence number
1
2
3 Step 2 is repeated until the dest. node is found
Dest. node is found and it
unicast a ROUTE REPLY
packet from where it got the
ROUTE REQUEST packet 4
Source
Addres
s
Reques
t
ID
Dest.
Add.
Source
Seqn. #
Dest.
Seqn.#
Hop
count
ROUTE REQUEST
Source
Address
Dest.
Addrss
Dest.
Sequence
#
Hop
count
Lifetime
ROUTE REPLY
Continue...
13
A
D
E
F
I
G
H
Conclusion
The existing system is working well with main source. But in the
absence of that main soure hole system will be damaged.
We proposed a solution in this case of problem, where main
source will be absence and sub-source are connected with each
other when they want to send data in a network.
Hence nodes are dynamic and infrastructure less ,there is a great
challange in this way of solution.
To overcome these challange, a specific node will query a
neigbour node in multicast network and send ROUTE
REQUEST. Repeating this process data transfer between two
node will be done.
14
References
 [1] G.Vijaya Kumar et. al. / (IJCSE) International Journal on
Computer Science and Engineering
 Vol. 02, No. 03, 2010, 706-713
 [2] M.S. Corson and V. Park, “A Highly Adaptive Distributed
Routing Algorithm for Mo-bile Wireless Networks,”Proc. IEEE
INFOCOM ’97, Kobe, Japan, April 1997.
 [3] E. Bommaiah, M. Liu, A. McAuley, and R. Talpade,
“AMRoute: Adhoc Multicast
 Routing Protocol,” Internet Draft,http://www.ietf.org/internet-
drafts/draft-talpade-manet-amroute-00.txt
 [4 ]http://en.wikipedia.org/wiki/Network_topology
 [5]compnetworking.about.com › ... › Network Design / IT
15
16
Thanks to All
17
Q & A

More Related Content

What's hot

Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packet
eSAT Publishing House
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...
eSAT Journals
 
Universal network coding based opportunistic routing for unicast
Universal network coding based opportunistic routing for unicastUniversal network coding based opportunistic routing for unicast
Universal network coding based opportunistic routing for unicast
Pvrtechnologies Nellore
 
50120140504011
5012014050401150120140504011
50120140504011
IAEME Publication
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
IJNSA Journal
 
B43040610
B43040610B43040610
B43040610
IJERA Editor
 
23
2323
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
cscpconf
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
IJCNCJournal
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
Shivi Shukla
 
Csit54201
Csit54201Csit54201
Csit54201
csandit
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
Editor IJCATR
 
A2546035115
A2546035115A2546035115
A2546035115
Prafull Maktedar
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
pharmaindexing
 
Grayhole
GrayholeGrayhole
Grayhole
Kumud Dixit
 
Impact of energy and link quality indicator with link quality estimators in w...
Impact of energy and link quality indicator with link quality estimators in w...Impact of energy and link quality indicator with link quality estimators in w...
Impact of energy and link quality indicator with link quality estimators in w...
graphhoc
 
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
pharmaindexing
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
IJTET Journal
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
IJCSIS Research Publications
 
F04503057062
F04503057062F04503057062
F04503057062
ijceronline
 

What's hot (20)

Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packet
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...
 
Universal network coding based opportunistic routing for unicast
Universal network coding based opportunistic routing for unicastUniversal network coding based opportunistic routing for unicast
Universal network coding based opportunistic routing for unicast
 
50120140504011
5012014050401150120140504011
50120140504011
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
B43040610
B43040610B43040610
B43040610
 
23
2323
23
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
 
Csit54201
Csit54201Csit54201
Csit54201
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
A2546035115
A2546035115A2546035115
A2546035115
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
 
Grayhole
GrayholeGrayhole
Grayhole
 
Impact of energy and link quality indicator with link quality estimators in w...
Impact of energy and link quality indicator with link quality estimators in w...Impact of energy and link quality indicator with link quality estimators in w...
Impact of energy and link quality indicator with link quality estimators in w...
 
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
F04503057062
F04503057062F04503057062
F04503057062
 

Viewers also liked

NAT Ccna
NAT CcnaNAT Ccna
NAT Ccna
singhsukdeep
 
Network address translation
Network address translationNetwork address translation
Network address translation
Varsha Honde
 
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
Amit Kumar , Jaipur Engineers
 
NAT|PAT
NAT|PATNAT|PAT
NAT|PAT
Mao Mos!
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
Darpan Dekivadiya
 
Network address translation
Network address translationNetwork address translation
Network address translation
Karppinen Ngoc Anh
 
Nat
Nat Nat
Nat
laura1352
 
Nat presentation
Nat presentationNat presentation
Nat presentation
hassoon3
 

Viewers also liked (8)

NAT Ccna
NAT CcnaNAT Ccna
NAT Ccna
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
 
NAT|PAT
NAT|PATNAT|PAT
NAT|PAT
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Nat
Nat Nat
Nat
 
Nat presentation
Nat presentationNat presentation
Nat presentation
 

Similar to Mobile Ad hoc networking

E017422935
E017422935E017422935
E017422935
IOSR Journals
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Alexander Decker
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
eSAT Publishing House
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Publishing House
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Journals
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
IRJET Journal
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
IJCNCJournal
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
IJTET Journal
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
Chandra Meena
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
ijsrd.com
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
Editor IJMTER
 
Improving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingImproving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routing
ijitjournal
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
KARTHIKEYAN V
 
IJET-V2I6P7
IJET-V2I6P7IJET-V2I6P7
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
IJMER
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
IOSR Journals
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
IJERA Editor
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
IJERA Editor
 
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc NetworkModified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
CSEIJJournal
 

Similar to Mobile Ad hoc networking (20)

E017422935
E017422935E017422935
E017422935
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
 
Improving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingImproving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routing
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
 
IJET-V2I6P7
IJET-V2I6P7IJET-V2I6P7
IJET-V2I6P7
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc NetworkModified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
Modified GPSR for Fault Tolerant and Energy Efficiency in Mobile Ad Hoc Network
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 

Mobile Ad hoc networking

  • 1. A NEW APPROACH OF SURVIVABLE MULTICAST ROUTING PROTOCOL IN MOBILE AD-HOC NETWROK 1 Presented by: Ariful Islam, ID:090212, Al Hizbul Bahar, ID:090225
  • 2.  To ensure the survivability of sub sources.  To reduce the maintainance cost of the network.  To ensure data transfer among all the nodes in a network.  The data packet delivery ratio must be sufficiently high  The data transmission delay must be as less as possible. 2 Objectives of Research
  • 3. 3  Collection of self configurable mobile node connected through wireless links  Without aid of any existing network infrastructure or central access point  Each node participating in the network acts both as host and a router  Characteristics of MANETs :  dynamic topology  node mobility  large number of degree of freedom  self-organizing capability What is MANET
  • 4.  Node mobility in an ad hoc network causes frequently change the network topology. D A C B E F D A C B E F 4 Basic Concept of MANET
  • 5. Application Area  Military battle field  Commercial Sector  Local level  Civil Application  Personal Area Network(PAN) 5
  • 6. Design Issue and Challanges  Topology, Mobility, Robustness  Capacity and Efficiency  Energy Consumption  Quality of Service and Resource Management  Security and reliability  Scalability 6
  • 7. 7 Problem Specification of Existing System Existing System Analysis
  • 8.  The cost of main source is high  The main source is required more energy to run  System damage possibility is high  High traffic in main source.  Coupling between main source and sub- sources and sub-source and regions node 8 Continue...
  • 9. Proposed Solution  Replace main source by sub-sources  Ensuring sub-source survivability  Select new sub-source absence of sub-source 9
  • 10. Continue... 10  Sub-Sources  Reciver Node  Forwarding Node 10
  • 11.  Sub-Sources  Reciver Node  Forwarding Node 11 Continue...
  • 12. source Conn. Nodes Dest. Conn. Nodes Broadcast ROUTE REQUEST packet Nodes check the duplicity of packet; if the packet is duplicate the discarded otherwise continue the process ROUTE REPLY packet to source telling how to get destination Increment Hop count, rebroadcast the ROUTE REQUEST packet to adjacent nodes and store info in its reverse route table Check the dest. sequence number 1 2 3 Step 2 is repeated until the dest. node is found Dest. node is found and it unicast a ROUTE REPLY packet from where it got the ROUTE REQUEST packet 4 Source Addres s Reques t ID Dest. Add. Source Seqn. # Dest. Seqn.# Hop count ROUTE REQUEST Source Address Dest. Addrss Dest. Sequence # Hop count Lifetime ROUTE REPLY
  • 14. Conclusion The existing system is working well with main source. But in the absence of that main soure hole system will be damaged. We proposed a solution in this case of problem, where main source will be absence and sub-source are connected with each other when they want to send data in a network. Hence nodes are dynamic and infrastructure less ,there is a great challange in this way of solution. To overcome these challange, a specific node will query a neigbour node in multicast network and send ROUTE REQUEST. Repeating this process data transfer between two node will be done. 14
  • 15. References  [1] G.Vijaya Kumar et. al. / (IJCSE) International Journal on Computer Science and Engineering  Vol. 02, No. 03, 2010, 706-713  [2] M.S. Corson and V. Park, “A Highly Adaptive Distributed Routing Algorithm for Mo-bile Wireless Networks,”Proc. IEEE INFOCOM ’97, Kobe, Japan, April 1997.  [3] E. Bommaiah, M. Liu, A. McAuley, and R. Talpade, “AMRoute: Adhoc Multicast  Routing Protocol,” Internet Draft,http://www.ietf.org/internet- drafts/draft-talpade-manet-amroute-00.txt  [4 ]http://en.wikipedia.org/wiki/Network_topology  [5]compnetworking.about.com › ... › Network Design / IT 15