SlideShare a Scribd company logo
International Journal of Research in Computer Science
 eISSN 2249-8265 Volume 2 Issue 2 (2012) pp. 33-36
 © White Globe Publications
 www.ijorcs.org
 This manuscript was a result of ‘Researchomania’ 2011 contest held by White Globe Publications. This contest motivates
 young graduates to enter the vast area of research and development.

                INTRODUCTORY APPROACH ON AD-HOC
                   NETWORKS AND ITS PARADIGMS
                                                   Mehtab Singh Kahlon
                                     Institute of Engineering & Technology, Bhaddal


Abstract: An ad-hoc wireless network is a collection of
wireless mobile nodes that self-configure to construct                                      Start
a network without the need for any established
infrastructure or backbone. Ad hoc networks use                       Nodes send signal to find the number of other nodes
mobile nodes to enable communication outside                                             within range
wireless transmission range. With the advancement in
wireless communications, more and more wireless                                  Synchronizing between nodes
networks appear, e.g., Mobile Ad Hoc Network
(MANET), Wireless Sensor Network (WSN), etc. So, in
this paper we have discussed Ad Hoc Networks along                       Sender node send messages to receiving node
with its energy issues, applications, QoS and
challenges.
                                                                  Receiving
                                                                  node Send       Yes                      No
                                                                                         Is receiving              Wait for
Keywords: - Ad-Hoc Wireless Networks, Routing,                      back                 node ready               sometime
MANET.                                                            Ready Signal

                  I. INTRODUCTION
                                                                                   Communication begins
   Ad-Hoc is a decentralized wireless network. The
network is ad hoc because it does not rely on a
                                                                                     Termination Process
preexisting infrastructure, such as routers in wired
networks or access points in managed (infrastructure)
wireless networks. Instead, each node participates in                                       Stop
routing by forwarding data for other nodes, and so the
determination of which nodes forward data is made                     Fig.1: Working of Ad Hoc Network [1]
dynamically based on the network connectivity. A
mobile ad hoc network, also called a mobile mesh                II. MOBILE AD HOC NETWORK (MANET)
network, is a self-configuring network of mobile                With the advancement in wireless communications,
devices connected by wireless links. Wireless               more and more wireless networks appear, e.g., Mobile
networks can be classified into two types:                  Ad Hoc Network (MANET), Wireless Sensor Network
Infrastructure based networks and Infrastructure less       (WSN). Mobile adhoc network (MANET) is a
(Mobile Ad hoc) Networks. Infrastructure based              temporary network setup for a specific purpose
network consists of a network with a fixed and wide         without help of any pre-existing infrastructure. The
gateways. Mobile hosts communicate with a bridge in         nodes in MANET are empowered to exchange packet
the network (called base station) within its                using a radio channel. The nodes not in direct reach of
communication radius. A lack of infrastructure              each other uses their intermediate nodes to forward
presents problems with centrally controlled security,       packets. Therefore threats exist to a mobile ad hoc
for example access control, which is traditionally          network both from external nodes unauthorized to
maintained by a central server. Also security               participate in the mobile ad hoc networks, and from
Mechanisms involving trusted third parties may no           internal nodes, which have the authorization
longer be viable in ad hoc networks. Figure 1 shows         credentials to participate in the mobile ad hoc network.
the working of general Ad Hoc Network.                      Internal nodes giving rise to threats can be further
                                                            divided according to their behavior - failed, badly
                                                            failed, selfish and malicious nodes. Figure 2 shows the
                                                            Mobile Ad Hoc Network.


                                                                                  www.ijorcs.org
34                                                                                              Mehtab Singh Kahlon

                                                            networks is a challenging issue, taking power
                                                            consumption into consideration. One critical issue for
                                                            all kinds of mobile nodes supported by battery powers
                                                            is power saving. Without power, any mobile node will
                                                            become useless. Battery power being limited,
                                                            extending the lifetime of batteries is an important
                                                            issue, especially for Mobile Ad Hoc Networks
                                                            (MANETs). To reduce the energy consumption in
                                                            mobile devices, there have been efforts in physical and
                                                            data link layers as well as in the network layer related
                                                            to the routing protocol. The purpose of power-aware
                                                            routing protocols is to maximize the network lifetime
                                                            [2].
              Fig.2: Mobile ad hoc network
                                                              VI. APPLICATIONS OF AD HOC NETWORKS
         III. QUALITY OF SERVICE (QOS)
                                                            A. Conferencing
   Quality of Service (QoS) is not easily achieved in
ad hoc networks. To provide QoS routing in Ad hoc              Perhaps the prototypical application requiring the
networks, it is not just sufficient to provide a basic      establishment of an ad hoc network is mobile
routing functionality where only a feasible route is        conferencing. When mobile computer users gather
found, other aspects like the bandwidth constraints due     outside their normal office environment, the business
to shared media, dynamic topology due to                    network infrastructure is often missing. But the need
continuously changing topology and the power                for collaborative computing might be even more
consumption due to limited battery powers must also         important here than in the everyday office
be considered. The nodes in the Ad hoc network move         environment. Indeed, the whole point of the meeting
randomly, hence, the topology changes continuously          might be to make some further progress on a particular
resulting in route breakage. Thus, the route breakage       collaborative project. Given that today’s project
must first be detected and a new route should be found      environments are heavily computerized, for projects in
to the destination in advance. The quality-of-service       a very broad range of industries the need for being able
(QoS) routing in an ad hoc network is difficult because     to create an ad hoc network seems clear.
the network topology may change constantly, and the         B. Home Networking
available state information for routing is inherently
imprecise [3, 4].                                               As another example, consider the scenario that will
                                                            likely result if wireless computers become popular at
     IV. LOCATION-AIDED ROUTING (LAR)                       home. These computers will probably be taken to and
   The LAR protocols use location information (which        from the office work environment and on business
may be out of date, by the time it is used) to reduce the   trips. It is quite possible that such computers will not
search space for a desired route. Limiting the search       have topologically related IP addresses, especially if
space results in fewer route discovery messages.            they are connected at the offices of each parent or at
Location information used in the LAR protocol may be        the children’s school. Keeping in mind the
provided by the Global Positioning System (GPS).            convenience that an unchanging IP address affords to
With the availability of GPS, it is possible for a mobile   the user, it would be nice to allow the various mobile
host to know its physical location [3]. In reality,         computers to operate an ad hoc network in the home,
position information provided by GPS includes some          even if the home maintains its own subnet with more
amount of error, which is the difference between GPS-       or less permanently situated network nodes.
calculated coordinates and the real coordinates. For
instance, NAVSTAR Global Positioning System has
positional accuracy of about 50–100 m and
Differential GPS offers accuracies of a few meters [5].

           V. ENERGY RELATED ISSUE
   In ad hoc networks, each device plays the role of a
router and has limited battery energy. In addition, the
network topology can constantly change. Thus, it is
widely accepted that conventional routing protocols
are not appropriate for mobile ad hoc networks and
consequently, the design of routing protocols for such                      Fig.3: Home Networking


                                                                            www.ijorcs.org
Introductory Approach on Ad-Hoc Networks and its Paradigms                                                               35

C. Emergency Services                                           VII. CHALLENGES IN AD HOC NETWORKS
   Ad hoc networks can help to overcome network                 One of the biggest obstacles to the adoption of ad
impairment during disaster emergencies. Mobile units         hoc networks may be reduced data rates—the same
will probably carry networking equipment in support          problem that slowed the adoption of wireless
of routine operations for the times when the internet is     computing during the last decade. We can typically
available and the infrastructure has not been impaired.      observe an order of magnitude difference in the speed
With the techniques and protocols in this book,              of wired and wireless networks. For instance, while
emergency mobile units can greatly extend the                many enterprise users are accustomed to 100 Mbit/sec
usefulness of their networking equipment during times        from the local Ethernet, wireless users must struggle to
of lost infrastructure support. For instance, police         get a reliable 10 Mbit/sec over the air: 1 to 2 Mbit/sec
squad cars and firefighting equipment can remain in          is much more common.
touch longer and provide information more quickly if
they can cooperate to form an ad hoc network in places                          VIII. CONCLUSION
not otherwise offering connectivity to the global                In recent years, mobile computing has enjoyed a
Internet.                                                    tremendous rise in popularity. The continued
D. Embedded Computing Applications                           miniaturization of mobile computing devices and the
                                                             extraordinary rise of processing power available in
   The world is full of machines that move, and future       mobile laptop computers combine to put more and
intelligent mobile machines will be able to process a        better computer-based applications into the hands of a
great deal more information about the environment in         growing segment of the population. At the same time,
which they operate. The “environment” itself will            the     markets    for   wireless   telephones    and
increasingly be a virtual one created by fixed and           communication devices are experiencing rapid growth.
mobile computers. Some researchers [Weiser 1993]             Projections have been made that, by the year 2002,
predict a world of ubiquitous computing, in which            there will be more than a billion wireless
computers will be all around us, constantly performing       communication devices in use, and more than 200
mundane tasks to make our lives a little easier. These       million wireless telephone handsets will be purchased
ubiquitous computers will often react to the changing        annually. So, in this paper we have discussed Ad Hoc
environment in which they are situated and will              Networks along with its energy issues, applications,
themselves cause changes to the environment in ways          QoS and challenges.
that are, we hope, predictable and planned.
                                                                                 IX. REFERENCES
E. Personal Area Networks and Bluetooth
                                                             [1] Pradeep Kumar Jaisal, Pankaj Kumar Mishra, “Survey
   The idea of a personal area network (PAN) is to                 of Security Issues in Wireless Adhoc Network
create much localized network populated by some                    Protocols”, IJECT VOL 2 Issue 4, Oct-Dec          2011,
network nodes that are closely associated with a single            [Online] Available: http://www.iject.org/vol2issue4/pra
person. These nodes may be attached to the person’s                deep1.pdf
belt or carried in a purse. More exotic visions of the       [2]   Tseng, Yu-Chee, Hsieh, Ten-Yueng, “Fully power
future include virtual reality devices attached around             aware and location aware protocols for wireless multi-
the head and other devices more oriented toward the                hop ad hoc networks”, proceedings of            Eleventh
sense of touch. These devices may or may not need to               International Conference        on             Computer
have an attachment to the wide area Internet, but they             communications and networks, 2002.
will almost certainly need to communicate with each          [3]   Kunagorn Kunavut, Teerapat Sanguankotchakorn,
other while they are associated with their users’                  QoS-aware routing for Mobile Ad hoc Networks
activities. In this scenario, mobility is not the                  Based on Multiple Metrics: Connectivity Index (CI) and
overriding consideration. Figure 4 shows the Global                Delay”, ECTI-CON, 2010, [Online] Available:
                                                                   http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A
Wireless Standards of WAN, MAN, LAN, and PAN.                      %2F%2Fieeexplore.ieee.org%2Fiel5%2F5483296%2F5
                                                                   491394%2F05491536.pdf%3Farnumber%3D5491536&
                                                                   authDecision=-203
                                                             [4]   Thriveni J, Alekhya V L, Deepa N, Uma B, Alice A,
                                                                   Prakash G L, K R Venugopal, L M Patnaik, “QoS
                                                                   Preemptive Routing with Bandwidth Estimation for
                                                                   Improved Performance in Ad Hoc Networks”, 2008
                                                                   IEEE.
                                                             [5]   Young-Bae Ko and Nitin H. Vaidya, “Location-Aided
                                                                   Routing (LAR) in mobile ad hoc networks”, Wireless
                                                                   Networks 6 (2000), ©J.C. Baltzer AG, Science
                                                                   Publishers, pp: 307- 321
            Fig.4: Global Wireless Standards


                                                                                www.ijorcs.org
36                                                                                                    Mehtab Singh Kahlon

 [6] Bevan Das Vaduvur Bharghavan, “Routing in Ad-Hoc           [19] Broch J, Johnson DB, Maltz DA.: The dynamic source
       Networks Using Minimum Connected Dominating                   routing protocol for mobile ad hoc networks. Internet-
       Sets”, 1997 IEEE p- p376.                                     Draft, draft-ietf-manet-dsr-09.txt, April 2003.
 [7]   Shigang Chen and Klara Nahrstedt,      “Distributed      [20] M. Heissenbttel and T. Braun.: Ants-Based Routing in
       Quality-of-Service Routing in Ad Hoc Networks”,               Large Scale Mobile Ad-Hoc Networks. Technical
       IEEE JOURNAL ON SELECTED AREAS IN                             report, University of Bern,       Kommunikation     in
       COMMUNICATIONS, VOL. 17, NO. 8, AUGUST                        verteilten System (KiVS03), March 2003, 181–190.
       1999.
 [8]   Young-Bae Ko and Nitin H. Vaidya, “Location-Aided
       Routing (LAR) in mobile ad hoc networks”, Wireless
       Networks 6 (2000) 307–321, © J.C. Baltzer AG,
       Science Publishers.
 [9]   Lianggui Liu and Guangzeng FengL, “A Novel Ant
       Colony Based QoS-Aware Routing Algorithm for
       MANETs”, Wang, K. Chen, and Y.S. Ong (Eds.):
       ICNC 2005, LNCS 3612, pp. 457 –        466, 2005, ©
       Springer-Verlag, Berlin Heidelberg 2005.
[10]   Mohammad Reza EffatParvar, Mehdi EffatParvar, and
       Mahmoud Fathy, “Improvement of on Demand
       Multicast Routing Protocol in Ad Hoc Networks to
       Achieve Good Scalability and Reliability”, O. Gervasi
       et al. (Eds.): ICCSA 2008, Part II, LNCS 5073, pp.
       446–457, 2008, © Springer-Verlag Berlin Heidelberg
       2008.
[11]   Chi-Hsiang Yeh, “DEAR: An Extension of Traffic
       Engineering for Routing and Resource Management in
       Ad Hoc Wireless        Networks”, VTC 2002, 0-7803-
       7484-3/02/$17.00 02002 IEEE.
[12]   Dong Lu, Haitao Wu, Qian Zhang,        Wenwu Zhu,
       “PARS: Stimulating Cooperation for Power-Aware
       Routing in Ad-Hoc Networks”, 0-7803-8938-
       7/05/$20.00 (C) 2005 IEEE.
[13]   Kai Zeng, Kui Ren and Wenjing Lou, “Geographic On-
       Demand Disjoint Multipath Routing in Wireless       Ad
       Hoc Networks”.
[14]   RADHIKA D.JOSHI PRITI P.REGE, “Distributed
       Energy        Efficient Routing in Ad Hoc Networks”,
       978-1-4244-3328-       5/08/$25.00 ©2008 IEEE.
[15]   L. Boukhalfa, P. Minet and S. Midonnet,          “QoS
       Support in a MANET Based on OLSR and CBQ,”
       Proceedings of the Sixth International Conference on
       Networking (ICN’07), April 2007.
[16]   Myung Jong Lee, Jianling Zheng, Xuhui Hu, Hsin-hui
       Juan, Chunhui Zhu, Yong Liu, June Seung Yoon, and
       Tarek N. Saadawi, “A New       Taxonomy of Routing
       Algorithms for Wireless Mobile Ad Hoc Networks:
       The Component Approach”, IEEE Communications
       Magazine, vol. 44, no.11, pp. 116-     123, November
       2006.
[17]   Tung-shih Su, Chih-Hung Lin and Wen-Shyong Hsieh,
       ”A Novel QoSAware Routing for Ad Hoc Networks,”
       Journal of Communication and Information Systems,
       July/August 2006.
[18]   L.Hanzo and R.Tafazolli, ”Quality of Service Routing
       and Admission Control for Mobile Ad Hoc Network
       with a Contention - based MAC Layer,” IEEE
       International Conference on Mobile Adhoc and
       Sensor Systems, October 2006.




                                                                                 www.ijorcs.org

More Related Content

Viewers also liked

Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
IOSR Journals
 
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemAn Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
IJORCS
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
IJORCS
 
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification? Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
IJORCS
 
IJORCS, Volume 2 - Issue 6, Call for Papers
IJORCS, Volume 2 - Issue 6, Call for PapersIJORCS, Volume 2 - Issue 6, Call for Papers
IJORCS, Volume 2 - Issue 6, Call for Papers
IJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
IJORCS,Call For Papers- Volume 3, Issue 1,December 2012
IJORCS,Call For Papers- Volume 3, Issue 1,December 2012IJORCS,Call For Papers- Volume 3, Issue 1,December 2012
IJORCS,Call For Papers- Volume 3, Issue 1,December 2012
IJORCS
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
IJORCS
 
Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4
IJORCS
 

Viewers also liked (9)

Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemAn Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
 
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification? Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
 
IJORCS, Volume 2 - Issue 6, Call for Papers
IJORCS, Volume 2 - Issue 6, Call for PapersIJORCS, Volume 2 - Issue 6, Call for Papers
IJORCS, Volume 2 - Issue 6, Call for Papers
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
IJORCS,Call For Papers- Volume 3, Issue 1,December 2012
IJORCS,Call For Papers- Volume 3, Issue 1,December 2012IJORCS,Call For Papers- Volume 3, Issue 1,December 2012
IJORCS,Call For Papers- Volume 3, Issue 1,December 2012
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
 
Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4
 

Similar to Introductory Approach on Ad-hoc Networks and its Paradigms

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
IDES Editor
 
H010524049
H010524049H010524049
H010524049
IOSR Journals
 
Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering Techniques
IJMER
 
AODV information
AODV informationAODV information
AODV informationanilds02
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
FathimaFarsana9
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
iosrjce
 
A017220112
A017220112A017220112
A017220112
IOSR Journals
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
ijsrd.com
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
Elanthendral Mariappan
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
Mangesh Vasu
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
ijsrd.com
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
chris zlatis
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkSanjeev Kumar Jaiswal
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
IOSR Journals
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
IOSR Journals
 
Top schools in gudgao
Top schools in gudgaoTop schools in gudgao
Top schools in gudgao
Edhole.com
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
IRJET Journal
 

Similar to Introductory Approach on Ad-hoc Networks and its Paradigms (20)

270 273
270 273270 273
270 273
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
H010524049
H010524049H010524049
H010524049
 
Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering Techniques
 
AODV information
AODV informationAODV information
AODV information
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
A017220112
A017220112A017220112
A017220112
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Top schools in gudgao
Top schools in gudgaoTop schools in gudgao
Top schools in gudgao
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
 

More from IJORCS

Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsHelp the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
IJORCS
 
Real-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition SystemReal-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition System
IJORCS
 
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveFPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
IJORCS
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
IJORCS
 
Algebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionAlgebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression Function
IJORCS
 
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
IJORCS
 
CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2
IJORCS
 
Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1
IJORCS
 
Voice Recognition System using Template Matching
Voice Recognition System using Template MatchingVoice Recognition System using Template Matching
Voice Recognition System using Template Matching
IJORCS
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
IJORCS
 
A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...
IJORCS
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
IJORCS
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
IJORCS
 
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
IJORCS
 
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
IJORCS
 
A PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmA PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering Algorithm
IJORCS
 
Call for papers, IJORCS, Volume 3 - Issue 3
Call for papers, IJORCS, Volume 3 - Issue 3Call for papers, IJORCS, Volume 3 - Issue 3
Call for papers, IJORCS, Volume 3 - Issue 3IJORCS
 
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks
IJORCS
 
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
IJORCS
 
Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...
Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...
Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...
IJORCS
 

More from IJORCS (20)

Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsHelp the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
 
Real-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition SystemReal-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition System
 
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveFPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
 
Algebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionAlgebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression Function
 
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
 
CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2
 
Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1
 
Voice Recognition System using Template Matching
Voice Recognition System using Template MatchingVoice Recognition System using Template Matching
Voice Recognition System using Template Matching
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
 
A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
 
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
 
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
 
A PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmA PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering Algorithm
 
Call for papers, IJORCS, Volume 3 - Issue 3
Call for papers, IJORCS, Volume 3 - Issue 3Call for papers, IJORCS, Volume 3 - Issue 3
Call for papers, IJORCS, Volume 3 - Issue 3
 
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks
 
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
 
Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...
Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...
Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Introductory Approach on Ad-hoc Networks and its Paradigms

  • 1. International Journal of Research in Computer Science eISSN 2249-8265 Volume 2 Issue 2 (2012) pp. 33-36 © White Globe Publications www.ijorcs.org This manuscript was a result of ‘Researchomania’ 2011 contest held by White Globe Publications. This contest motivates young graduates to enter the vast area of research and development. INTRODUCTORY APPROACH ON AD-HOC NETWORKS AND ITS PARADIGMS Mehtab Singh Kahlon Institute of Engineering & Technology, Bhaddal Abstract: An ad-hoc wireless network is a collection of wireless mobile nodes that self-configure to construct Start a network without the need for any established infrastructure or backbone. Ad hoc networks use Nodes send signal to find the number of other nodes mobile nodes to enable communication outside within range wireless transmission range. With the advancement in wireless communications, more and more wireless Synchronizing between nodes networks appear, e.g., Mobile Ad Hoc Network (MANET), Wireless Sensor Network (WSN), etc. So, in this paper we have discussed Ad Hoc Networks along Sender node send messages to receiving node with its energy issues, applications, QoS and challenges. Receiving node Send Yes No Is receiving Wait for Keywords: - Ad-Hoc Wireless Networks, Routing, back node ready sometime MANET. Ready Signal I. INTRODUCTION Communication begins Ad-Hoc is a decentralized wireless network. The network is ad hoc because it does not rely on a Termination Process preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in Stop routing by forwarding data for other nodes, and so the determination of which nodes forward data is made Fig.1: Working of Ad Hoc Network [1] dynamically based on the network connectivity. A mobile ad hoc network, also called a mobile mesh II. MOBILE AD HOC NETWORK (MANET) network, is a self-configuring network of mobile With the advancement in wireless communications, devices connected by wireless links. Wireless more and more wireless networks appear, e.g., Mobile networks can be classified into two types: Ad Hoc Network (MANET), Wireless Sensor Network Infrastructure based networks and Infrastructure less (WSN). Mobile adhoc network (MANET) is a (Mobile Ad hoc) Networks. Infrastructure based temporary network setup for a specific purpose network consists of a network with a fixed and wide without help of any pre-existing infrastructure. The gateways. Mobile hosts communicate with a bridge in nodes in MANET are empowered to exchange packet the network (called base station) within its using a radio channel. The nodes not in direct reach of communication radius. A lack of infrastructure each other uses their intermediate nodes to forward presents problems with centrally controlled security, packets. Therefore threats exist to a mobile ad hoc for example access control, which is traditionally network both from external nodes unauthorized to maintained by a central server. Also security participate in the mobile ad hoc networks, and from Mechanisms involving trusted third parties may no internal nodes, which have the authorization longer be viable in ad hoc networks. Figure 1 shows credentials to participate in the mobile ad hoc network. the working of general Ad Hoc Network. Internal nodes giving rise to threats can be further divided according to their behavior - failed, badly failed, selfish and malicious nodes. Figure 2 shows the Mobile Ad Hoc Network. www.ijorcs.org
  • 2. 34 Mehtab Singh Kahlon networks is a challenging issue, taking power consumption into consideration. One critical issue for all kinds of mobile nodes supported by battery powers is power saving. Without power, any mobile node will become useless. Battery power being limited, extending the lifetime of batteries is an important issue, especially for Mobile Ad Hoc Networks (MANETs). To reduce the energy consumption in mobile devices, there have been efforts in physical and data link layers as well as in the network layer related to the routing protocol. The purpose of power-aware routing protocols is to maximize the network lifetime [2]. Fig.2: Mobile ad hoc network VI. APPLICATIONS OF AD HOC NETWORKS III. QUALITY OF SERVICE (QOS) A. Conferencing Quality of Service (QoS) is not easily achieved in ad hoc networks. To provide QoS routing in Ad hoc Perhaps the prototypical application requiring the networks, it is not just sufficient to provide a basic establishment of an ad hoc network is mobile routing functionality where only a feasible route is conferencing. When mobile computer users gather found, other aspects like the bandwidth constraints due outside their normal office environment, the business to shared media, dynamic topology due to network infrastructure is often missing. But the need continuously changing topology and the power for collaborative computing might be even more consumption due to limited battery powers must also important here than in the everyday office be considered. The nodes in the Ad hoc network move environment. Indeed, the whole point of the meeting randomly, hence, the topology changes continuously might be to make some further progress on a particular resulting in route breakage. Thus, the route breakage collaborative project. Given that today’s project must first be detected and a new route should be found environments are heavily computerized, for projects in to the destination in advance. The quality-of-service a very broad range of industries the need for being able (QoS) routing in an ad hoc network is difficult because to create an ad hoc network seems clear. the network topology may change constantly, and the B. Home Networking available state information for routing is inherently imprecise [3, 4]. As another example, consider the scenario that will likely result if wireless computers become popular at IV. LOCATION-AIDED ROUTING (LAR) home. These computers will probably be taken to and The LAR protocols use location information (which from the office work environment and on business may be out of date, by the time it is used) to reduce the trips. It is quite possible that such computers will not search space for a desired route. Limiting the search have topologically related IP addresses, especially if space results in fewer route discovery messages. they are connected at the offices of each parent or at Location information used in the LAR protocol may be the children’s school. Keeping in mind the provided by the Global Positioning System (GPS). convenience that an unchanging IP address affords to With the availability of GPS, it is possible for a mobile the user, it would be nice to allow the various mobile host to know its physical location [3]. In reality, computers to operate an ad hoc network in the home, position information provided by GPS includes some even if the home maintains its own subnet with more amount of error, which is the difference between GPS- or less permanently situated network nodes. calculated coordinates and the real coordinates. For instance, NAVSTAR Global Positioning System has positional accuracy of about 50–100 m and Differential GPS offers accuracies of a few meters [5]. V. ENERGY RELATED ISSUE In ad hoc networks, each device plays the role of a router and has limited battery energy. In addition, the network topology can constantly change. Thus, it is widely accepted that conventional routing protocols are not appropriate for mobile ad hoc networks and consequently, the design of routing protocols for such Fig.3: Home Networking www.ijorcs.org
  • 3. Introductory Approach on Ad-Hoc Networks and its Paradigms 35 C. Emergency Services VII. CHALLENGES IN AD HOC NETWORKS Ad hoc networks can help to overcome network One of the biggest obstacles to the adoption of ad impairment during disaster emergencies. Mobile units hoc networks may be reduced data rates—the same will probably carry networking equipment in support problem that slowed the adoption of wireless of routine operations for the times when the internet is computing during the last decade. We can typically available and the infrastructure has not been impaired. observe an order of magnitude difference in the speed With the techniques and protocols in this book, of wired and wireless networks. For instance, while emergency mobile units can greatly extend the many enterprise users are accustomed to 100 Mbit/sec usefulness of their networking equipment during times from the local Ethernet, wireless users must struggle to of lost infrastructure support. For instance, police get a reliable 10 Mbit/sec over the air: 1 to 2 Mbit/sec squad cars and firefighting equipment can remain in is much more common. touch longer and provide information more quickly if they can cooperate to form an ad hoc network in places VIII. CONCLUSION not otherwise offering connectivity to the global In recent years, mobile computing has enjoyed a Internet. tremendous rise in popularity. The continued D. Embedded Computing Applications miniaturization of mobile computing devices and the extraordinary rise of processing power available in The world is full of machines that move, and future mobile laptop computers combine to put more and intelligent mobile machines will be able to process a better computer-based applications into the hands of a great deal more information about the environment in growing segment of the population. At the same time, which they operate. The “environment” itself will the markets for wireless telephones and increasingly be a virtual one created by fixed and communication devices are experiencing rapid growth. mobile computers. Some researchers [Weiser 1993] Projections have been made that, by the year 2002, predict a world of ubiquitous computing, in which there will be more than a billion wireless computers will be all around us, constantly performing communication devices in use, and more than 200 mundane tasks to make our lives a little easier. These million wireless telephone handsets will be purchased ubiquitous computers will often react to the changing annually. So, in this paper we have discussed Ad Hoc environment in which they are situated and will Networks along with its energy issues, applications, themselves cause changes to the environment in ways QoS and challenges. that are, we hope, predictable and planned. IX. REFERENCES E. Personal Area Networks and Bluetooth [1] Pradeep Kumar Jaisal, Pankaj Kumar Mishra, “Survey The idea of a personal area network (PAN) is to of Security Issues in Wireless Adhoc Network create much localized network populated by some Protocols”, IJECT VOL 2 Issue 4, Oct-Dec 2011, network nodes that are closely associated with a single [Online] Available: http://www.iject.org/vol2issue4/pra person. These nodes may be attached to the person’s deep1.pdf belt or carried in a purse. More exotic visions of the [2] Tseng, Yu-Chee, Hsieh, Ten-Yueng, “Fully power future include virtual reality devices attached around aware and location aware protocols for wireless multi- the head and other devices more oriented toward the hop ad hoc networks”, proceedings of Eleventh sense of touch. These devices may or may not need to International Conference on Computer have an attachment to the wide area Internet, but they communications and networks, 2002. will almost certainly need to communicate with each [3] Kunagorn Kunavut, Teerapat Sanguankotchakorn, other while they are associated with their users’ QoS-aware routing for Mobile Ad hoc Networks activities. In this scenario, mobility is not the Based on Multiple Metrics: Connectivity Index (CI) and overriding consideration. Figure 4 shows the Global Delay”, ECTI-CON, 2010, [Online] Available: http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A Wireless Standards of WAN, MAN, LAN, and PAN. %2F%2Fieeexplore.ieee.org%2Fiel5%2F5483296%2F5 491394%2F05491536.pdf%3Farnumber%3D5491536& authDecision=-203 [4] Thriveni J, Alekhya V L, Deepa N, Uma B, Alice A, Prakash G L, K R Venugopal, L M Patnaik, “QoS Preemptive Routing with Bandwidth Estimation for Improved Performance in Ad Hoc Networks”, 2008 IEEE. [5] Young-Bae Ko and Nitin H. Vaidya, “Location-Aided Routing (LAR) in mobile ad hoc networks”, Wireless Networks 6 (2000), ©J.C. Baltzer AG, Science Publishers, pp: 307- 321 Fig.4: Global Wireless Standards www.ijorcs.org
  • 4. 36 Mehtab Singh Kahlon [6] Bevan Das Vaduvur Bharghavan, “Routing in Ad-Hoc [19] Broch J, Johnson DB, Maltz DA.: The dynamic source Networks Using Minimum Connected Dominating routing protocol for mobile ad hoc networks. Internet- Sets”, 1997 IEEE p- p376. Draft, draft-ietf-manet-dsr-09.txt, April 2003. [7] Shigang Chen and Klara Nahrstedt, “Distributed [20] M. Heissenbttel and T. Braun.: Ants-Based Routing in Quality-of-Service Routing in Ad Hoc Networks”, Large Scale Mobile Ad-Hoc Networks. Technical IEEE JOURNAL ON SELECTED AREAS IN report, University of Bern, Kommunikation in COMMUNICATIONS, VOL. 17, NO. 8, AUGUST verteilten System (KiVS03), March 2003, 181–190. 1999. [8] Young-Bae Ko and Nitin H. Vaidya, “Location-Aided Routing (LAR) in mobile ad hoc networks”, Wireless Networks 6 (2000) 307–321, © J.C. Baltzer AG, Science Publishers. [9] Lianggui Liu and Guangzeng FengL, “A Novel Ant Colony Based QoS-Aware Routing Algorithm for MANETs”, Wang, K. Chen, and Y.S. Ong (Eds.): ICNC 2005, LNCS 3612, pp. 457 – 466, 2005, © Springer-Verlag, Berlin Heidelberg 2005. [10] Mohammad Reza EffatParvar, Mehdi EffatParvar, and Mahmoud Fathy, “Improvement of on Demand Multicast Routing Protocol in Ad Hoc Networks to Achieve Good Scalability and Reliability”, O. Gervasi et al. (Eds.): ICCSA 2008, Part II, LNCS 5073, pp. 446–457, 2008, © Springer-Verlag Berlin Heidelberg 2008. [11] Chi-Hsiang Yeh, “DEAR: An Extension of Traffic Engineering for Routing and Resource Management in Ad Hoc Wireless Networks”, VTC 2002, 0-7803- 7484-3/02/$17.00 02002 IEEE. [12] Dong Lu, Haitao Wu, Qian Zhang, Wenwu Zhu, “PARS: Stimulating Cooperation for Power-Aware Routing in Ad-Hoc Networks”, 0-7803-8938- 7/05/$20.00 (C) 2005 IEEE. [13] Kai Zeng, Kui Ren and Wenjing Lou, “Geographic On- Demand Disjoint Multipath Routing in Wireless Ad Hoc Networks”. [14] RADHIKA D.JOSHI PRITI P.REGE, “Distributed Energy Efficient Routing in Ad Hoc Networks”, 978-1-4244-3328- 5/08/$25.00 ©2008 IEEE. [15] L. Boukhalfa, P. Minet and S. Midonnet, “QoS Support in a MANET Based on OLSR and CBQ,” Proceedings of the Sixth International Conference on Networking (ICN’07), April 2007. [16] Myung Jong Lee, Jianling Zheng, Xuhui Hu, Hsin-hui Juan, Chunhui Zhu, Yong Liu, June Seung Yoon, and Tarek N. Saadawi, “A New Taxonomy of Routing Algorithms for Wireless Mobile Ad Hoc Networks: The Component Approach”, IEEE Communications Magazine, vol. 44, no.11, pp. 116- 123, November 2006. [17] Tung-shih Su, Chih-Hung Lin and Wen-Shyong Hsieh, ”A Novel QoSAware Routing for Ad Hoc Networks,” Journal of Communication and Information Systems, July/August 2006. [18] L.Hanzo and R.Tafazolli, ”Quality of Service Routing and Admission Control for Mobile Ad Hoc Network with a Contention - based MAC Layer,” IEEE International Conference on Mobile Adhoc and Sensor Systems, October 2006. www.ijorcs.org