Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
mobile ad hoc network research paper.
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: mobile ad hoc network research paper.
I. INTRODUCTION
Mobile Ad hoc network (MANET) is a self configuring infrastructureless network of mobile devices .MANET is a collection of wireless mobile nodes that dynamically form a network temporarily without any support of central administration. Mobile ad hoc network is a collection of wireless mobile nodes that establishes the network in absence of fixed infrastructure.MANET routing protocols possess two properties such as:
1. QUALITATIVE PROPERTIES.
2. QUANTITATIVE PROPERTIES.
1.Qualitative properties involves:
• Distributed operation
• Loop freedom
• Demand based routing
• Security
2.Quantitative properties involves:
• End to end throughput.
• Delay
• Route discovery time
• Memory byte requirement
• Network recovery time
2. RELATED STUDY:
A Mobile Ad-hoc Network (MANET) is a temporary wireless network composed of mobile nodes, in which an infrastructure is absent. Nodes in these networks utilize the same random access wireless channel, cooperating in a friendly manner to engaging themselves in multihop forwarding. The nodes in the network not only acts as hosts but also as routers that route data to/from other nodes in network .
Characteristics of MANETs:
1.Dynamic network topology:
MANET can be formed without any preexisting infrastructure.As the nodes move,the topology may change rapidly and the connectivity within the network varies with time.
2.Distributed operations:
Nodes collaborate operations to implement functions and not a single node is solely responsible for the overall operation.. Every node in the MANET can assist in routing of packets in the network.
3.It follows dynamic topology where nodes may join and leave the network at any time and the multi-hop routing may keep changing as nodes j...
... middle of paper ...
...air of survey papers from which we identified early reactive and proactive MANET routing protocols. Our review focuses upon protocols developed by Perkins, namely the Destination Sequenced Distance Vector (DSDV) and Ad-hoc On-demand Distance Vector (AODV) which researchers claim is the most popular MANET routing protocol. Due to the popularity of the AODV protocol a number of variations and improvements on the core protocol have been proposed by researchers to address specific issues with the protocol. We investigate the evolution of the AODV protocol by reviewing works based upon the Multicast Ad-hoc
On-demand Distance Vector (MAODV), developed by [18], this protocol adds multicasting support to the core AODV protocol. A number of researchers highlighted the lack of security mechanisms within the original AODV protocol as a major concern for deployment of a MANET.
Research suggests that managers and employees in the wireless industry have faced tough challenges in their daily work. Managers have had the difficult job of crafting appropriate business strategies and human resource practices in the face of technological uncertainty, volatile demand, and heightened price competition in markets plagued by overcapacity (Batts, Colvin, Katz & Keefe (2005). This paper will examine the challenges facing the wireless industry the near future and recommend ways in which my new organization, Twenty1Wirless, can meet those challenges. First we will discuss the challenges we are facing as an organization. Next, we will explore the opportunities Twenty1 Wireless has to overcome these challenges. Finally, we will discuss
The location of each node and structure of the network are mostly fixed. There are many routing protocols proposed for land-based networks like Directed Diffusion and TTDD. It requires periodically updates if it is adapted to dynamic topology, which is not energy efficient. For example, GPSR is typical geographic-based routing protocol for land-based sensor networks.
Lastly, they have to develop the protocols to be used.... ... middle of paper ... ... n.d. - n.d. - n.d.
Sybil attacks are a threat to geographical routing protocols, since they require the exchange of coordinates for efficient packet routing. Ideally, a node only sends a set of coordinates, but under a Sybil attack, an attacker could pretend to be in many places at once. The Sybil attack can significantly reduce the effectiveness of fault-tolerant schemes such as distributed storage dispersity and multipath routing, and topology maintenance. Replicas, storage partitions, or routes believed to be using disjoint nodes could in actuality be using a single adversary presenting multiple identities. All of the techniques involve utilizing multiple identities. For instance, in a sensor network voting scheme, the Sybil attack might utilize multiple identities to generate additional “votes”. Similarly, to attack the routing protocol, the Sybil attack would rely on a malicious node taking on the identity of multiple nodes, and thus routing multiple paths through a single malicious
Project Name: Wireless Network Connection and Access for all offsite employees, mobile devices and buildings.
n.a. - n.a. - n.a. - n.a. - n.a. - A+E Networks. 2009. The 'Standard' of the 'Standard'. Web. The Web.
Roger Dingledine, Nick Mathewson, Paul Syverson. Tor: The Second-Generation Onion Router. Washington DC: Naval Research Lab, 2004.
Johnson, D., Maltz, D. (1996). Dynamic Source Routing in Ad-hoc Wireless network. Print ISBN: 0 79239697 0
8) Ian F. Akyildiz, Ismail H. Kasimoglu, “Ad Hoc Networks’’, Wireless sensor and actor networks: Research Challenges, Georgia Institute of Technology, USA, May-2004.
Analysis of the Environment of the Mobile Network System Executive Summary 3 Glossary of Abbreviations 4 Introduction 5 Recent History
An Open Shortest Path First (OSPF) protocol enhancement to save energy using Energy Aware Routing (EAR) strategy
In this topology, all nodes are connected to a central device, usually a hub or a switch. Each connected device has a dedicated, point-to-point connection between the device and the hub. The star network topology is by far the most widely implemented topology in use today.
In a client-server network, the capability of the server will decline as the amount of clients asking for services from the server increment. In spite of that, in P2P systems overall network performance really enhances as an increasing number of nodes are added to the system. These companions can arrange themselves into a specific purpose groups(ad hoc) as they impart, work together and offer data transfer capacity with another to finish the current workload (sharing of files). Each companion can transfer and download at the meantime, and in a procedure like this, new companions can join the group while old companions leave at whatever time. This active re-association of group peer members is not opaque to ultimate consumer.
Compared to Local Area Network (LAN)and Wide Area Network(WAN), Global Area Network covers a large geographical area, because a Global Area Network(GAN) is used to support mobile communication over a number of wireless LAN’s, the challenge of any GAN is transferring user communication from one local area to the next local area.
Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). The adage of the adage.... ... middle of paper ... ...