SlideShare a Scribd company logo
1 of 12
•
•
•
•
•
•
•
•
•
When I go
on an online
shopping
spree -
Jannah
An ad-hoc network is one that is spontaneously formed when devices connect and
communicate with each other.
Let’s say that Adam needs to transfer a file over to his friend, Eve, but doesn’t have
access to a safe Wi-Fi connection. He can create an ad hoc network instead.
An ad hoc network is a temporary type of Local Area Network (LAN). If you set up an ad
hoc network permanently, it becomes a LAN.
Adam can create an ad hoc network between his and Eve’s laptops wirelessly, as long as
it is within 100 meters (about 328 feet). From that point, he can transfer files to Eve’s
laptop.
However, since Adam’s computer is the hosting device, the connection between the two
devices will end when Adam ends the session, no matter how many devices are
connected to the ad hoc network at the time.
A MANET consists of a number of
mobile devices that come together
to form a network as needed,
without any support from any
existing internet infrastructure or any
other kind of fixed stations.
What is MANET?
TYPES OF ADHOC NETWORK
• A MANET consists of a number of mobile devices that come together to form a network as needed, without
any support from any existing internet infrastructure or any other kind of fixed stations.
• A MANET can be defined as an autonomous system of nodes or MSs(also serving as routers) connected by
wireless links, the union of which forms a communication network modeled in the form of an arbitrary
communication graph.
• This is in contrast to the well-known single hop cellular network model that supports the needs of wireless
communication between two mobile nodes relies on the wired backbone and fixed base stations.
• In a MANET, no such infrastructure exists and network topology may be changed dynamically in an
unpredictable manner since nodes are free to move and each node has limiting transmitting power,
restricting access to the node only in the neighboring range.
• MANETs are basically peer-to-peer, multi-hop wireless networks in which information
packets are transmitted in a store and forward manner from a source to an arbitrary
destination, via intermediate nodes as given in the figure:
As nodes move, the connectivity may change based on relative
locations of other nodes. The resulting change in the network
topology known at the local level must be passed on to other
nodes so that old topology information can be updated.
For example, as MS2 in the figure changes its point of
attachment from MS3 to MS4, other nodes that are part of the
network should use this new route to forward packets to MS2.
In the figure, we assume that it is not possible to have all nodes
within each other's radio range. In case all nodes are closed
by within each other's radio range,
there are no routing issues to be
addressed.
InVANET
VANET iMANET
ACTION 1
Dynamic Topologies Bandwidth constrained,
variable capacity links
Autonomous
Behaviour
Energy Constrained
Operation
Limited Security Less Human
Intervention
Network topology which is
typically multi-hop may change
randomly and rapidly with time, it
can form unidirectional or bi-
directional links.
Wireless links usually have lower
reliability, efficiency, stability, and
capacity as compared to a wired
network
Each node can act as a host
and router, which shows its
autonomous behaviour.
As some or all the nodes rely on
batteries or other exhaustible means
for their energy. Mobile nodes are
characterized by less memory,
power, and lightweight features.
Wireless networks are more prone
to security threats. A centralized
firewall is absent due to the
distributed nature of the operation
for security, routing, and host
configuration.
They require minimum human
intervention to configure the
network, therefore they are
dynamically autonomous in
nature.
Provides separation from central network administration
Provides access to information and services regardless of
geographic area
Network can be set up at any place and at any time and
works without any infrastructure
Each node can play both the roles i.e., of router and host
showing autonomous nature
Self-configuring and self-healing nodes do not require
human intervention
Highly scalable and suits the expansion of more network
hub
Bandwidth Constraints
The bandwidth of the wireless links is always much lower
than in wired counterparts
Energy Constaints
The power of batteries is limited in all the devices,which
does not allow infinitive operation time for the nodes
High Latency
In an energy conserving design nodes are sleeping or idle
when they do not have to transmit any data .The delay will
be higher if the algorithm decides the nodes to wakeup
Transmission Errors
Attention and interferences are other effects of the wireless
link thats increases the error rate.
With the increase of portable device as well as progress in wireless communication,
ad-hoc networking is gaining importance with the increasing number of widespread
applications. Ad-hoc networking can be used in little to no communication
infrastructure or the existing infrastructure is expensive or inconvenient to use.
Ad-hoc networking helps the devices to maintain connections to the network as well
as easily removing and adding device to and from network.
They are used as:
• Tactical Networks - Military Communication automated battle fields.
• Sensor Networks - Remote weathers for sensors , earth activities.. .
• Emergency Services - Disaster recovery , earthquakes, crowd control.
• Education Applications - Setup virtual class and conference rooms .
• Entertainment - Multi-user games, robotics pets.
• Location Aware Service - Automated call forwarding , advertise location
specific services, Location dependent travel guide.
The future of mobile ad-hoc networks is really appealing, giving the vision of
“anytime , anywhere” .
Before those imagined scenarios come true , huge amount of work is to be
done in both research and implementation . Improvement in bandwidth
and capacity is required , which implies the need for a higher frequency
and better spatial spectral reuse.
MANETs can be used to provide network facilities in places where it is not
possible to form a fixed network or where it isn’t cost effective to do so.
Although there are numerous benefits of MANET, due to their nature, they are
vulnerable and not deployable on a large scale because of the limits of
technology.
MANET.pptx

More Related Content

What's hot

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
rajatmal4
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Chandra Meena
 
Telecom interconnect Billing Basics
Telecom interconnect Billing   BasicsTelecom interconnect Billing   Basics
Telecom interconnect Billing Basics
Shilpin Pvt. Ltd.
 

What's hot (20)

Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
INTRODUCTION TO WIRELESS COMMUNICATION
INTRODUCTION TO WIRELESS COMMUNICATIONINTRODUCTION TO WIRELESS COMMUNICATION
INTRODUCTION TO WIRELESS COMMUNICATION
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Ec8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 1 watmEc8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 1 watm
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Introduction to mobile ad hoc network
Introduction to mobile ad hoc networkIntroduction to mobile ad hoc network
Introduction to mobile ad hoc network
 
Network Planning and Optimization
Network Planning and OptimizationNetwork Planning and Optimization
Network Planning and Optimization
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Data dissemination
Data disseminationData dissemination
Data dissemination
 
Telecom interconnect Billing Basics
Telecom interconnect Billing   BasicsTelecom interconnect Billing   Basics
Telecom interconnect Billing Basics
 
Different types of network
Different types of networkDifferent types of network
Different types of network
 
Wireless WANs
Wireless WANsWireless WANs
Wireless WANs
 
Introduction to gsm
Introduction to gsmIntroduction to gsm
Introduction to gsm
 
Wireless local area netwok slide
Wireless local area netwok slideWireless local area netwok slide
Wireless local area netwok slide
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 

Similar to MANET.pptx

Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7
Ramesh Babu
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
Sanjeev Kumar Jaiswal
 
AODV information
AODV informationAODV information
AODV information
anilds02
 

Similar to MANET.pptx (20)

Introduction to Advance Network By Bilal Azam
Introduction to Advance Network By Bilal AzamIntroduction to Advance Network By Bilal Azam
Introduction to Advance Network By Bilal Azam
 
Mobile computing Mobile Adhoc Networks (MANETs)
Mobile computing Mobile Adhoc Networks (MANETs)Mobile computing Mobile Adhoc Networks (MANETs)
Mobile computing Mobile Adhoc Networks (MANETs)
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7
 
Computer Network Introduction full
Computer Network Introduction fullComputer Network Introduction full
Computer Network Introduction full
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
 
AODV information
AODV informationAODV information
AODV information
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
 
Lan man wan
Lan man wanLan man wan
Lan man wan
 
Lan man wan
Lan man wanLan man wan
Lan man wan
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
 
Vikash file full_final
Vikash file full_finalVikash file full_final
Vikash file full_final
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 

Recently uploaded

Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
meharikiros2
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Recently uploaded (20)

Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 

MANET.pptx

  • 2. When I go on an online shopping spree - Jannah An ad-hoc network is one that is spontaneously formed when devices connect and communicate with each other. Let’s say that Adam needs to transfer a file over to his friend, Eve, but doesn’t have access to a safe Wi-Fi connection. He can create an ad hoc network instead. An ad hoc network is a temporary type of Local Area Network (LAN). If you set up an ad hoc network permanently, it becomes a LAN. Adam can create an ad hoc network between his and Eve’s laptops wirelessly, as long as it is within 100 meters (about 328 feet). From that point, he can transfer files to Eve’s laptop. However, since Adam’s computer is the hosting device, the connection between the two devices will end when Adam ends the session, no matter how many devices are connected to the ad hoc network at the time.
  • 3. A MANET consists of a number of mobile devices that come together to form a network as needed, without any support from any existing internet infrastructure or any other kind of fixed stations. What is MANET? TYPES OF ADHOC NETWORK
  • 4. • A MANET consists of a number of mobile devices that come together to form a network as needed, without any support from any existing internet infrastructure or any other kind of fixed stations. • A MANET can be defined as an autonomous system of nodes or MSs(also serving as routers) connected by wireless links, the union of which forms a communication network modeled in the form of an arbitrary communication graph. • This is in contrast to the well-known single hop cellular network model that supports the needs of wireless communication between two mobile nodes relies on the wired backbone and fixed base stations. • In a MANET, no such infrastructure exists and network topology may be changed dynamically in an unpredictable manner since nodes are free to move and each node has limiting transmitting power, restricting access to the node only in the neighboring range. • MANETs are basically peer-to-peer, multi-hop wireless networks in which information packets are transmitted in a store and forward manner from a source to an arbitrary destination, via intermediate nodes as given in the figure:
  • 5. As nodes move, the connectivity may change based on relative locations of other nodes. The resulting change in the network topology known at the local level must be passed on to other nodes so that old topology information can be updated. For example, as MS2 in the figure changes its point of attachment from MS3 to MS4, other nodes that are part of the network should use this new route to forward packets to MS2. In the figure, we assume that it is not possible to have all nodes within each other's radio range. In case all nodes are closed by within each other's radio range, there are no routing issues to be addressed.
  • 7. ACTION 1 Dynamic Topologies Bandwidth constrained, variable capacity links Autonomous Behaviour Energy Constrained Operation Limited Security Less Human Intervention Network topology which is typically multi-hop may change randomly and rapidly with time, it can form unidirectional or bi- directional links. Wireless links usually have lower reliability, efficiency, stability, and capacity as compared to a wired network Each node can act as a host and router, which shows its autonomous behaviour. As some or all the nodes rely on batteries or other exhaustible means for their energy. Mobile nodes are characterized by less memory, power, and lightweight features. Wireless networks are more prone to security threats. A centralized firewall is absent due to the distributed nature of the operation for security, routing, and host configuration. They require minimum human intervention to configure the network, therefore they are dynamically autonomous in nature.
  • 8. Provides separation from central network administration Provides access to information and services regardless of geographic area Network can be set up at any place and at any time and works without any infrastructure Each node can play both the roles i.e., of router and host showing autonomous nature Self-configuring and self-healing nodes do not require human intervention Highly scalable and suits the expansion of more network hub
  • 9. Bandwidth Constraints The bandwidth of the wireless links is always much lower than in wired counterparts Energy Constaints The power of batteries is limited in all the devices,which does not allow infinitive operation time for the nodes High Latency In an energy conserving design nodes are sleeping or idle when they do not have to transmit any data .The delay will be higher if the algorithm decides the nodes to wakeup Transmission Errors Attention and interferences are other effects of the wireless link thats increases the error rate.
  • 10. With the increase of portable device as well as progress in wireless communication, ad-hoc networking is gaining importance with the increasing number of widespread applications. Ad-hoc networking can be used in little to no communication infrastructure or the existing infrastructure is expensive or inconvenient to use. Ad-hoc networking helps the devices to maintain connections to the network as well as easily removing and adding device to and from network. They are used as: • Tactical Networks - Military Communication automated battle fields. • Sensor Networks - Remote weathers for sensors , earth activities.. . • Emergency Services - Disaster recovery , earthquakes, crowd control. • Education Applications - Setup virtual class and conference rooms . • Entertainment - Multi-user games, robotics pets. • Location Aware Service - Automated call forwarding , advertise location specific services, Location dependent travel guide.
  • 11. The future of mobile ad-hoc networks is really appealing, giving the vision of “anytime , anywhere” . Before those imagined scenarios come true , huge amount of work is to be done in both research and implementation . Improvement in bandwidth and capacity is required , which implies the need for a higher frequency and better spatial spectral reuse. MANETs can be used to provide network facilities in places where it is not possible to form a fixed network or where it isn’t cost effective to do so. Although there are numerous benefits of MANET, due to their nature, they are vulnerable and not deployable on a large scale because of the limits of technology.