Beruflich Dokumente
Kultur Dokumente
BajiBabu
DRAWBACKS OF EXSISTING NETWORKS. SOLUTION TO IT : MANET CONCEPT OF MANET & ITS ATTRIBUTES. ROUTING W.R.F. TO MANET. PROTOCOLS FOR ROUTING. SECURITY : THREATS & SOLUTIONS. APPLICATIONS OF MANETs. SHORTCOMINGS of MANETs. CONCLUSION.
Networking : to share the resources & exchange the information among all the nodes which are interconnected. LAN MAN WAN DRAWBACKS: Setting up of fixed access points and backbone infrastructure is not always viable/possible. Infrastructure may not be present everywhere.. i.e. in a disaster area or battle-field or in a remote area.
A mobile ad hoc network is a collection of wireless nodes that can be dynamically set up ANYWHERE and ANYTIME, without using any pre-existing network infrastructure & which can form any arbitrary topology. Bcoz of its characteristics, MANETs make network available ALL THE TIME & EVERY WHERE
Ease of deployment. Speed of deployment. Decreased dependence on infrastructure. Dynamic topology. User flexibility.
Routing means to guide the data within the n/w from source to destination efficiently. Router does this by acquiring enough knowledge of the topology of the network. The following tasks should be taken care off : - Minimize the number of hops (path-length) - Minimize delay - Minimize packet loss - Minimize cost
Nodes themselves behave as routers & they are free to move at any speed, in any direction and they can organize themselves randomly. Host mobility :
Link failure/repair due to mobility Rate of link failure/repair is higher when nodes move fast
Distributed Environment
No centralized routing possible bcoz of the highly dynamic
A table driven type of protocol based on BALLAMAN-FORD routing algorithm. Each node maintains a routing table which contains:
destination node.
Each node periodically transmits updates, which includes its own sequence number & its own routing table updates. When two routes to a destination received from two different neighbors then
Chooses the one with greatest destination sequence number. If equal, chooses the smaller metric (hop count).
Source node floods Route Request (RREQ) to its neighbors. All node add their own identifier while forwarding RREQ further to their neighbors. When the intended destination receives a Route Request, it replies by sending a Route Reply (RREP) Route Reply travels along the reverse path set-up when Route Request is forwarded.
ATTACKS
EXTERNAL
INTERNAL
EXTERNAL ATTACKS:
Encryption Authentication Key management
INTERNAL ATTACKS:
Security Routing Protocol based on DSR Protocol (on-demand): - set of security extensions are applied to protocols. SEAD Protocol based on DSDV Protocol (table driven): -security is provided on hop-to-hop basis. Ariadne Prtocol based on DSR Protocol (on-demand): -security is provided on point-to-point basis
Search-and-rescue applications in disaster situations. Defense (army, navy & air force) applications. Health Care applications. Academic environment applications. Industrial or corporate environment applications.
MANETS are the networks established in an arbitrary fashion. Operate in the absence of a fixed infrastructure. They can be used to provide network facilities in places where it isn't possible to form a fixed network or where it isn't cost effective to do so. Although there are numerous benefits of the MANETs, due to their nature, they are vulnerable and not deployable on a large scale because of the limits of technology.
Books: Subir Kumar Sarkar,T G Basavaraju & C Puttamadappa, Ad Hoc Mobile Wireless Networks, Auerbach Publications. Prashant Mohapatra & Srikanth V. Krishnamurthy, Ad-hoc Networks : Technologies and Protocols; Springer Publication. Dharmaprakash Agarwal & Qing-in-Zing, Wireless and Mobile systems; Thomson Publications. Kaveh Pahlavan & Prashant Krishnamurthy ; Principles of Wireless Networks, PHI Publication. Web sites:
www.ietf.org/mail-archive/web/manet/current/msg07065.html
http//www.computingunplugged.com/issues.
J. Broch, D. Maltz, D. Johnson, Y-C. Hu, and J. Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Proceedings of IEEE/ACM MobiCom, pages 8597, 1998.