SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064 
Volume 1 Issue 3, December 2012 
www.ijsr.net 
Ad Hoc Networks Technical Issues on Radio Links
Security & QoS
M.A Siddique1
, Sarah Khan2
, Firaz Noushad3
1
Vijay Rural Engineering College, Dept of Computer Science
Nizamabad-503001, A.P, India,
ahtesham.siddique@gmail.com
2
Vijay College of Engineering for Women, Dept of Computer Science
Nizamabad-503001, A.P, India,
siddiqui.sarah04@gmail.com
3
Vijay Rural Engineering College, Dept of Computer Science
Nizamabad-503001, A.P, India,
write2firaz@gmail.com
Abstract: Mobile ad hoc networks (MANETS) are self-created and self organized by a collection of mobile nodes, interconnected by
multi-hop wireless paths in a strictly peer to peer fashion. Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts
without fixed network infrastructure and centralized administration. Communication in MANET is done via multi-hop paths. Lots of
challenges are there in this area, MANET contains diverse resources, the line of defense is very ambiguous, Nodes operate in shared
wireless medium, Network topology changes unpredictably and very dynamically, Radio link reliability is an issue, connection breaks
are pretty frequent. Moreover, density of nodes, number of nodes and mobility of these hosts may vary in different applications. There is
no stationary infrastructure. Each node in MANET acts a router that forwards data packets to other nodes.
Keywords: Routing Protocols, SRP. QoS, IEEE 802.11b, IEEE 802.11g, Bluetooth, (IEEE 802.15.1)
1. Introduction
An ad hoc network is a collection of wireless mobile
nodes (or routers) dynamically forming a temporary
network without the use of any existing network
infrastructure or centralized administration. The routers
are free to move randomly and organize themselves
arbitrarily; thus, the network’s wireless topology may
change rapidly and unpredictably. Such a network may
operate in a stand-alone fashion, or may be connected to
the Internet. Ultimo, mobility, large network size
combined with device heterogeneity, bandwidth, and
battery power constraints make the design of adequate
routing protocols a major challenge. Some form of routing
protocol that may wish to exchange packets might not be
able to communicate directly Mobile users will want to
communicate in situations in which no fixed wired
infrastructure is available. For example, a group of
researchers en route to a conference may meet at the
airport and need to connect to the wide area network,
students may need to interact during a lecture, or
firefighters need to connect to an ambulance en route to an
emergency scene. In such situations, a collection of
mobile hosts with wireless network interfaces may form a
temporary network without the aid of any established
infrastructure or centralized administration. Because
nowadays many laptops are equipped wit powerful CPUs,
large hard disk drives, and good sound and image
capabilities, the idea of forming a network among these
researchers, students, or members of a rescue team, who
can easily be equipped with the devices mentioned above,
seems possible. Such networks received considerable
attention in recent years in both commercial and military
applications, due to the attractive properties of building a
network on the fly and not requiring any preplanned
infrastructure such as a base station or central controller.
A mobile ad hoc network (MANET) group has been
formed within IETF. The primary focus of this working
group is to develop and evolve MANET specifications
and introduce them to the Internet standard track. The goal
is to support mobile ad-hoc networks with hundreds of
routers and solve challenges in this kind of network.
Some challenges that ad hoc networking faces are limited
wireless transmission range, hidden terminal problems,
packet losses due to transmission errors, mobility- induced
route changes, and battery constraints. Mobile ad hoc
networks could enhance the service area of access
networks and provide wireless connectivity into areas with
poor or previously no coverage (e.g., cell edges).
Connectivity to wire infrastructure will be provided
through multiple gateways with possibly different
capabilities and utilization.
To improve performance, the mobile host should have the
ability to adapt to variation in performance and coverage
and to switch gateways when beneficial. To enhance the
190
pr
la
ne
ne
di
pr
ga
ne
of
U
w
de
pe
de
co
su
an
un
2
W
as
R
m
ob
cl
ra
th
cl
co
ne
no
th
ra
ca
es
as
in
ne
w
w
ne
in
In
rediction of
ayer metric ha
etworking bri
etworks, dyn
irect peer-to
roperty of an
ateway to the
etwork interfa
f both the glo
Users could be
ways. User m
evices, migr
ersonalized s
evices to m
onnectivity an
uch an enviro
nd mobile
nprecedented
. Wireless
hoc & C
Wireless comm
s ultrasound,
Radio waves a
media have m
bstacles. Com
lassified by t
ange which is
he physical
lassifier is the
onsists of a
etwork-nodes
odes or the cl
he nodes them
ange. No matt
an be reache
stablishing co
s a network
nfrastructure
etworks. Ad-
wireless netwo
with an acces
etwork, or
nfrastructure f
ternationa
the best over
as a better ove
ings features l
namic multi
o-peer comm
ad hoc netw
wired backbo
ace on both ty
obal routing
enefit from u
mobility enabl
rate sessions
services. Host
move around
nd reach abili
onment, becau
communicat
growth during
s Network
Cellular)
munication ca
infrared or
are the most
more problem
mmon wirele
two means. O
also induced
limitations o
e networks to
large infrast
and the mo
lients form an
mselves. Rad
ter which tech
ed with a wir
ommunication
k three strate
networks, A
-Hoc Network
orks, where ea
s point or ba
MANET, d
for its operatio
l Journal of
rall performa
erview of the
like easy conn
hop network
munication. T
work needs to
one. The gate
ypes of netwo
and the local
ubiquitous net
les users to
s, and still
t mobility en
the network
ity. is in gene
use two hosts
tions has
g the past dec
k Commun
an be via diffe
electromagne
suitable for L
ms e.g. with
ess networks
One classifier
d by the netwo
of radio wa
opology, whe
tructure of m
obile client’s
n "Ad-Hoc" n
dio waves do
hnologies and
reless radio t
between mult
egies are av
Ad-Hoc netwo
ks Opposed
ach user direct
ase station, a
does not rel
on.
f Science an
Volume 1 I
ance, a netwo
network. Ad
nection to acc
k structures,
The multi h
be bridged b
way must hav
orks and be a p
l ad hoc routi
tworks in sev
switch betw
get the sa
nables the us
ks and maint
eral necessary
field of wire
experienced
cade.
nications (A
erent media s
etic radio wav
LBS as the ot
walls and ot
s today can
r is the netw
ork's purpose
aves. The ot
ther the netw
mostly in-mob
access only
network by be
o have a lim
thus what ran
transmission,
tiple compone
vailable: cellu
orks and hyb
to infrastruct
tly communica
a mobile ad
ly on a fi
nd Research
Issue 3, Dec
www.ijsr.n
ork-
hoc
cess
and
hop
by a
ve a
part
ing.
eral
ween
ame
ers’
tain
y in
less
an
Ad
such
ves.
ther
ther
be
work
and
ther
work
bile
the
eing
ited
nges
for
ents
ular
brid
ture
ates
hoc
ixed
T
m
w
r
d
c
e
th
d
i
c
th
r
th
e
d
f
c
c
n
w
c
m
in
m
o
s
tr
c
c
m
p
h
f
in
s
r
w
c
a
h (IJSR), Ind
cember 201
net 
Figure 1
The network
mobile nodes
wireless links
range can com
dynamically d
communicatio
each other’s s
hat relay pa
destination. Th
s, battery-pow
capabilities. Fu
he network
resulting in ra
his energy-co
environment,
dynamically i
functionality
central admin
complexities
network proto
with the tra
communicatio
media, limited
nterference, e
mobile ad hoc
of all, this ty
situations whe
rusted, too ex
creating, se
capabilities, ad
minimum user
planning of b
hoc networks
fashion, but
ntegrating m
services availa
range and ene
with existing
coverage and i
ad hoc networ
ia Online IS
12 
1: Classificati
is an autonom
that commu
s. Nodes that
mmunicate di
discovering e
on between no
end range, int
ackets genera
hese nodes ar
wered devices
urthermore, d
and they m
apid and unpr
onstrained, dy
nodes nee
in order to p
in the absen
nistration. Th
impose man
ocols. In addit
aditional pro
ons such as
d physical se
etc. Despite
c networks off
ype of networ
ere a fixed infr
xpensive or un
elf-organizing
d hoc network
r intervention
base station in
do not need
can be attac
many differen
able to other
ergy argument
cellular infra
interconnectiv
rks are expecte
SSN: 2319‐7
ion of Wireles
mous transito
unicate with
lie within e
irectly and ar
ach other. In
odes that are n
termediate no
ated by other
e often energy
s with a great
devices are fre
ay move ran
edictable topo
ynamic, distr
ed to organ
provide the ne
nce of fixed
e specific ch
ny design ch
tion, these ne
oblems inher
lower reliab
curity, time v
the many de
ffer numerous
rk is highly
frastructure is
nreliable. Bec
g and s
ks can be rapid
n. There is no
nstallation or
d to operate
ched to the
nt devices an
users. Furth
ts promote th
astructures as
vity. As a con
ed to become
7064 
ss Networks
ory association
each other o
each other’s s
re responsible
n order to en
not directly wi
odes act as rou
r nodes to t
y constrained
diversity in t
ee to join or le
ndomly, poss
ology changes
ributed multi-
nize themse
ecessary netw
infrastructure
haracteristics
hallenges to
etworks are fa
rent to wire
bility than w
varying chann
esign constra
advantages. F
suited for us
not available,
ause of their
self-administe
dly deployed w
need for deta
wiring. Also
in a stand-a
Internet, ther
nd making t
hermore, capa
eir use in tan
they can ex
nsequence, mo
an important
n of
over
send
e for
nable
ithin
uters
their
that
their
eave
sibly
s. In
-hop
elves
work
e or
and
the
faced
eless
wired
nels,
aints,
First
e in
, not
self-
ering
with
ailed
o, ad
alone
reby
their
city,
ndem
xtend
obile
part
191
International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064 
Volume 1 Issue 3, December 2012 
www.ijsr.net 
of the future 4G architecture, which aims to provide
pervasive computer environments that support users in
accomplishing their tasks, accessing information and
communicating anytime, anywhere and from any device.
3. Mobile Ad-hoc Network Applications
Ad hoc networks are key to the evolution of wireless
networks.. Ad hoc networks are typically composed of
equal nodes that communicate over wireless links without
any central control. Although military tactical
communication is still considered the primary application
for ad hoc networks, commercial interest in this type of
networks continues to grow. Applications such as rescue
missions in times of natural disasters, law enforcement
operations, commercial and educational use, and sensor
network are just a few possible commercial examples.
Ad hoc wireless networks inherit the traditional problems
of wireless and mobile communications, such as
bandwidth optimization, power control, and transmission
quality enhancement. In addition, the multi hop nature and
the lack of fixed infrastructure generates new research
problems such as configuration advertising, discovery,
and maintenance, as well as ad hoc addressing and self-
routing
 Tactical networks: Military communication and
operations, automated battlefields
 Disaster services: Search and rescue operations,
Disaster recovery, Replacement of fixed
infrastructure in case of environmental disasters,
Policing and fire fighting, Supporting doctors and
nurses in hospitals
 Commercial and civilian: E-commerce, electronic
payments anytime and anywhere environments.
 Home and enterprise: Home/office wireless
networking, Conferences, meeting rooms, Personal
area networks (PAN), Personal networks (PN),
Networks at construction sites.
 Education: Universities and campus settings, Virtual
classrooms, Ad hoc communications during meetings
or lectures.
 Entertainment: Multi-user games, Wireless P2P
networking, Outdoor Internet access, Robotic pets,
Theme park Sensor networks.
 Home applications: smart sensors & actuators
embedded in consumer electronics, Body area
network (BAN) Data tracking of environmental
conditions, animal movements, chemical / biological
detection.
 Context aware services: Follow-on services: call
forwarding, mobile workspace.
4. Security issues & Challenges
Security has become a primary concern to provide
protected communication between mobile nodes in a
hostile environment. Unlike the wired line networks, the
unique characteristics of mobile ad hoc networks pose a
number of nontrivial challenges to security design, such as
open peer-to-peer network architecture, shared wireless
medium, stringent resource constraints, and highly
dynamic network topology. These challenges clearly make
a case for building multi fence security solutions that
achieve both broad protection and desirable network
performance. One of the fundamental vulnerabilities of
MANETs comes from their open peer-to-peer
architecture. Unlike wired networks that have dedicated
routers, each mobile node in an ad hoc network may
function as a router and forward packets for other nodes.
The wireless channel is accessible to both legitimate
network users and malicious attackers. As a result, there is
no clear line of defense in MANETs from the security
design perspective. The boundary that separates the inside
network from the outside world becomes blurred. There is
no well-defined place or infrastructure where we may
deploy a single security solution. Moreover, portable
devices, as well as the system security information they
store, are vulnerable to compromises or physical capture,
especially low-end devices with weak protection.
Attackers may sneak into the network through these
subverted nodes, which pose the weakest link and incur a
domino effect of security breaches in the system. The
stringent resource constraints in MANETs constitute
another nontrivial challenge to security design. The
wireless channel is bandwidth constrained and shared
among multiple networking entities. The computation
capability of a mobile node is also constrained. For
example, some low-end devices, such as PDAs, can hardly
perform computation-intensive tasks like asymmetric
cryptographic computation. Because mobile devices are
typically powered by batteries, they may have very limited
energy resources. The wireless medium and node mobility
pose far more dynamics in MANETs compared to the
wired line networks. The network topology is highly
dynamic as nodes frequently join or leave the network,
and roam in the network on their own will. The wireless
channel is also subject to interferences and errors,
exhibiting volatile characteristics in terms of bandwidth
and delay. Despite such dynamics, mobile users may
request “anytime, anywhere” security services as they
move from one place to another. The above characteristics
of MANETs clearly make a case for building multi fence
security solutions that achieve both broad protection and
desirable network performance.
192
International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064 
Volume 1 Issue 3, December 2012 
www.ijsr.net 
Figure 2: Transmission using Wireless Link
First, the security solution should spread across many
individual components and rely on their collective
protection power to secure the entire network. The
security scheme adopted by each device has to work
within its own resource limitations in terms of
computation capability, memory, communication
capacity, and energy supply. Second, the security solution
should span different layers of the protocol stack, with
each layer contributing to a line of defense. No single-
layer solutions possible to thwart all potential attacks.
Third, the security solution should thwart threats from
both outsiders who launch attacks on the wireless channel
and network topology, and insiders who sneak into the
system through compromised devices and gain access to
certain system knowledge. Fourth, the security solution
should encompass all three components of prevention,
detection, and reaction that work in concert to guard the
system from collapse. Finally, the security solution should
be practical and affordable in a highly dynamic and
resource-constrained networking scenario.
There are three types of routing protocols: Proactive
Protocols, Reactive Protocols and Hybrid Protocols.
Proactive protocols are table-driven that constantly update
lists of destinations and routes. Reactive protocols respond
on demand. Hybrid protocols combine the features of
reactive and proactive protocols. The main goal of routing
protocols is to minimize delay, maximize network
throughput, maximize network lifetime and maximize
energy efficiency.
Security at Data-Link Layer: The wireless medium
access protocol implements mechanisms based on
cryptography to avoid unauthorized access and to enhance
the privacy on radio links. An analysis of IEEE 802.11
and Bluetooth can be discussed in brief. Security in the
IEEE 802.11 standard is provided by the Wired
Equivalent Privacy (WEP) scheme, which supports both
data encryption and integrity. The key is a 40-bit secret
key and is shared only by all the devices of a WLAN, or is
a pair wise secret key shared only by two communicating
devices. Bluetooth uses cryptographic security
mechanisms implemented in the data link layer. A key
management service provides each device with a set of
symmetric cryptographic keys required for the
initialization of a secret channel with another device, the
execution of an authentication protocol, and the exchange
of encrypted data on the secret channel.
Malicious nodes can disrupt the correct functioning of a
routing protocol by modifying routing information,
fabricating false routing information, and impersonating
other nodes. The Secure Routing Protocol (SRP) is an
extension that is applied to several existing reactive
routing protocols. SRP is based on the assumption of the
existence of a security association between the sender and
receiver based on a shared secret key negotiated at the
connection setup. SRP fights against the attacks that
disrupt the route discovery process. A node initiating a
route discovery is able to identify and discard false routing
information. Ariadne is a secure ad-hoc routing protocol
based on DSR and the Timed Efficient Stream Loss-
Tolerant Authentication (TESLA) authentication protocol.
The Authenticated Routing for Ad Hoc Network (ARAN)
Protocol is on-demand, secure, and detects and protects
against malicious actions carried out by third parties in the
ad hoc environment. ARAN is based on certificates from a
trusted certificate server before joining the ad hoc
network. Secure Efficient Ad Hoc Distance (SEAD) is a
proactive secure routing protocol based on routing table
update messages. The basic idea is to authenticate the
sequence number and the metric field of a routing table
update message using one-way hash functions. Hash
chains and digital signatures are used by the Secure Ad
Hoc On-Demand Distance Vector (SAODV) mechanism.
Quality of Service (QoS): The ability of a network to
provide QoS depends on the intrinsic characteristics of all
the network components, from transmission links to MAC
and network layers. Wireless links have a low and highly
variable capacity, and high loss rates. Topologies are
highly dynamic and have high packet loss rates. Random
access– based MAC protocols have no QoS support. QoS
MAC protocols solve the problems of medium contention,
support reliable unicast communications, and provide
resource reservation for real-time traffic in a distributed
wireless environment. Numerous MAC protocols and
improvements that have proposed protocols that can
provide QoS guarantees to real-time traffic in a distributed
wireless environment include Group Allocation Multiple
193
International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064 
Volume 1 Issue 3, December 2012 
www.ijsr.net 
Access with Piggyback Reservation (GAMA/PR) protocol
and Black Burst (BB) contention mechanism.
With the rapid development of Internet technology, when
people for the Best effort service is no longer satisfied,
how to get more bandwidth, how to reduce the mistakes,
how to reduce the delay phenomenon, making Quality of
Service (QoS) related research, including the Integrated
Service (RSVP), Differentiated Service, etc., has become
an important research topic. In the above-mentioned
several agreements, most of them are made in the last two
years, only for the basic mode of operation be defined,
there is no consideration of QoS, only the ABR
(Associativity Based Routing), SSR (Signal Stability
Routing) and CEDAR (Core –Extracted Distributed Ad
hoc Routing) and so there are three kinds of QoS-related
functions. By ABR, for example, ABR defined by the
concept of associability is that QoS can be used to indicate
a link between adjacent nodes stability, while the adjacent
node in the exchange of messages, you can also
Bandwidth, Delay and other conditions to join, this way
then when you select a path, you can have more choices,
but also can do according to the different applications of
different considerations to select the most appropriate path
may be to ensure a minimum bandwidth that can be used,
or between two points of a finite delay. However, in the
MANET, the network patterns change at any time, each
node may change at any time position, that is, each node is
the relationship with the adjacent node may change at any
time, therefore, means that the need to provide QoS
dependent on regular Beaconing, so that each node to
master the situation around in order to provide effective
QoS information. Beaconing make the overhead on the
network increased, when the node mobility to improve
even when the general information that may affect the
transmission, which will be in the Ad Hoc Network to
provide QoS, the biggest problem.
5. Networking Enhancements for Router
Radio Links in MANET
Mobile Ad Hoc Networking (MANET) enhancements
address several of the issues faced when merging IP
routing and mobile radio communications in ad hoc
networking applications. In a MANET, highly mobile
"nodes" communicate with each other across bandwidth-
constrained radio links. An individual node includes both
a radio and a network router, with the two devices
interconnected via Ethernet. Key challenges in a MANET
environment include:
Convergence: since nodes can rapidly join or leave the
network, MANET routing topologies are highly dynamic.
Fast convergence in a MANET becomes a challenge
because a node's state can change well before the event is
detected by the routing protocol's normal timing
mechanisms.
Route Selection: Radio link quality in a MANET can
vary dramatically due to a variety of factors such as noise,
fading, interference, and power fluctuation. As a result,
routers need the ability to factor these fluctuations into
"best path" selection. Radios have limited buffering
capabilities, and could be easily over-loaded with IP
traffic. Directional radios that operate on a narrow beam
tend to model the network as a series of physical point-to-
point connections with neighbor nodes. This point-to-
point model does not translate gracefully to multi-hop,
multipoint router environments, as it increases the size of
each router's topology database and reduces routing
efficiency when mobile nodes join and leave the network,
based on neighbor up/down signaling from the radio. This
feature enables a router to use Layer 2 feedback from its
partner radio to optimize Layer 3 processing. Intra-nodal
communications between router and radio are supported
by means of PPP-over-Ethernet (PPPoE) sessions. A
PPPoE session is established between router and its
partner radio on behalf of every other router/radio
neighbor located in the MANET. Once the PPPoE
sessions are established, a PPP session is established end
to end. These Layer 2 sessions are the means by which
radio network status gets reported to the router's Layer 3
processes. MANET enhancements provide several new
capabilities for optimizing routing in a wireless, ad hoc
environment:
Figure 3: Radio Router Links in MANET
6. Conclusion
The rapid evolution in the field of mobile computing is
driving a new alternative way for mobile communication,
in which mobile devices form a self-creating, self-
organizing and self-administering wireless network, called
a mobile ad hoc network.. The development of ad hoc
wireless networks and sensor networks provides
tremendous opportunities in many areas including disaster
recovery, defense, health care, academic, and industrial
194
International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064 
Volume 1 Issue 3, December 2012 
www.ijsr.net 
environments. However, there are many challenges that
need to be addressed as well. The challenges include
developing the following: mechanisms for efficient use of
limited bandwidth and communication capacity,
mechanisms for reducing power consumption and hence
extending the battery life, smaller but more powerful
mobile devices, algorithms for enhancing information
security, and efficient routing procedures. These are major
challenges to overcome, but steady progress is being made
to address these.
7. Future Scope
There are currently two types of mobile wireless
networks. The first is known as infrastructure networks,
such as networks with fixed and wired gateways. The
bridges for these networks are known as base stations. The
second type of wireless network is the mobile ad-hoc
network. Ad-hoc connectivity is based on peer-to-peer
communication. Future mobile ad-hoc networks will use
mobile routers to provide Internet connectivity to mobile
ad-hoc users. A mobile router will also allow mobility of
an ad-hoc network, where mobile users may use an
Internet access within an ad-hoc network domain.
Recently, organizations have begun to see potential for
such dynamic networks. Mobile ad-hoc networks are of
increasing interest for a distributed set of applications,
such as distributed collaborative computing, distributed
sensing networks, potential fourth generation wireless
systems, and response to incidents that destroyed the
existing communication structure.
Acknowledgment
The Authors are thankful to there college management
authorities, thankful to there parents for their love &
affection, Author is thankful to her daughter for her
immense love.
References
[1] IEEE 802.11e/D4.4, Draft Supplement to Part 11:
Wireless Medium Access Control (MAC) and
Physical Layer (PHY) Specifications: Medium
Access Control (MAC)
[2] Enhancements for Quality of Service (QoS), June
2003. S. Adroutselli-Theotokis and Spinellis. A
survey of peer-to-peer content distribution
technologies. ACM Computing Surveys, Dec. 2004.
[3] D. Wu and R. Negi. Effective capacity: a wireless
link model for support of quality of service. IEEE
Transactions on Wireless Communications, 2(4):630–
643, 2003
[4] Irshad Ullah, Shoaib Ur, “Analysis of Black Hole
Attack on MANETs Using Different MANET
Routing Protocols.”, Master Thesis at School of
Computing, Blekinge Institute of Technology, 2009
[5] Suresh Singh Candy Yiu, ``Putting the cart before the
horse: merging traffic for energy conservation'', IEEE
Communications Magazine, June 2011, pp. 78 - 82.
[6] J. Jubin and J.D. Tornow, “The DARPA Packet
Radio Network Protocols”, proceedings of the IEEE.
Authors Profile
MA.Siddique, M.TECH(CSE), Associate
Professor, Dept of CSE, Vijay Rural
Engineering College, Nizambad (Dist), A.P,
India. He is author of five research papers,
with five papers in international conferences
& international journals, His area of interest is in “Ad-hoc
networking, wireless communications”.
Sarah Khan, M.TECH (Computer Science),
Associate Professor, Dept of CSE, Vijay
college of engineering for women,
Nizamabad (Dist), A.P, India. She is author
of five research papers, with five papers in
international conferences & international journals, her
area of interest is in “Ad-hoc networking, wireless
communications”.
Firaz Noushad, MTECH (CSE), Assistant
Professor, Dept of CSE, Vijay Rural
Engineering College, Nizamabad (Dist),
A.P, India. His area of interest is on MANET
Security Issues.
195

Contenu connexe

Tendances

Extricom white paper_enterprise wlan & the broadband myth
Extricom white paper_enterprise wlan & the broadband mythExtricom white paper_enterprise wlan & the broadband myth
Extricom white paper_enterprise wlan & the broadband mythExtricom
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...IJCNCJournal
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study IRJET Journal
 
Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuNarenderSinghSandhu2
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
 
Selfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETsSelfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETsIOSR Journals
 
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...ijtsrd
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)Sorath Peetamber
 
Reduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsReduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsIJMER
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...IOSR Journals
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 

Tendances (15)

Et24912915
Et24912915Et24912915
Et24912915
 
Unit 7
Unit 7Unit 7
Unit 7
 
Extricom white paper_enterprise wlan & the broadband myth
Extricom white paper_enterprise wlan & the broadband mythExtricom white paper_enterprise wlan & the broadband myth
Extricom white paper_enterprise wlan & the broadband myth
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
 
Afeche nettech
Afeche nettechAfeche nettech
Afeche nettech
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
 
Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhu
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
 
Selfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETsSelfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETs
 
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 
Reduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsReduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in Manets
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 

Similaire à Ad hoc networks technical issues on radio links security & qo s

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
AODV information
AODV informationAODV information
AODV informationanilds02
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkSanjeev Kumar Jaiswal
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocolsiosrjce
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.Mangesh Vasu
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Vivek Maurya
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksjake henry
 
A Survey on Cost Effective Survivable Network Design in Wireless Access Network
A Survey on Cost Effective Survivable Network Design in Wireless Access Network A Survey on Cost Effective Survivable Network Design in Wireless Access Network
A Survey on Cost Effective Survivable Network Design in Wireless Access Network IJCSES Journal
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol ineSAT Publishing House
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 

Similaire à Ad hoc networks technical issues on radio links security & qo s (20)

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
AODV information
AODV informationAODV information
AODV information
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
 
A017220112
A017220112A017220112
A017220112
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
 
[IJET-V1I6P19] Authors : Kirti
[IJET-V1I6P19] Authors : Kirti[IJET-V1I6P19] Authors : Kirti
[IJET-V1I6P19] Authors : Kirti
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
A Survey on Cost Effective Survivable Network Design in Wireless Access Network
A Survey on Cost Effective Survivable Network Design in Wireless Access Network A Survey on Cost Effective Survivable Network Design in Wireless Access Network
A Survey on Cost Effective Survivable Network Design in Wireless Access Network
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol in
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
H010524049
H010524049H010524049
H010524049
 
eaodv
eaodveaodv
eaodv
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 

Plus de International Journal of Science and Research (IJSR)

Plus de International Journal of Science and Research (IJSR) (20)

Innovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart FailureInnovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart Failure
 
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverterDesign and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
 
Polarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material systemPolarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material system
 
Image resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fittingImage resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fitting
 
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
 
Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...
 
An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...
 
Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...
 
Comparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brainComparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brain
 
T s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusionsT s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusions
 
Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...
 
Grid computing for load balancing strategies
Grid computing for load balancing strategiesGrid computing for load balancing strategies
Grid computing for load balancing strategies
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
Main physical causes of climate change and global warming a general overview
Main physical causes of climate change and global warming   a general overviewMain physical causes of climate change and global warming   a general overview
Main physical causes of climate change and global warming a general overview
 
Performance assessment of control loops
Performance assessment of control loopsPerformance assessment of control loops
Performance assessment of control loops
 
Capital market in bangladesh an overview
Capital market in bangladesh an overviewCapital market in bangladesh an overview
Capital market in bangladesh an overview
 
Faster and resourceful multi core web crawling
Faster and resourceful multi core web crawlingFaster and resourceful multi core web crawling
Faster and resourceful multi core web crawling
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
 
Parallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errorsParallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errors
 
Modeling software architecture with uml
Modeling software architecture with umlModeling software architecture with uml
Modeling software architecture with uml
 

Dernier

Nodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxNodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxwendy cai
 
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....santhyamuthu1
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...amrabdallah9
 
me3493 manufacturing technology unit 1 Part A
me3493 manufacturing technology unit 1 Part Ame3493 manufacturing technology unit 1 Part A
me3493 manufacturing technology unit 1 Part Akarthi keyan
 
Graphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesGraphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesDIPIKA83
 
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...soginsider
 
Gender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 ProjectGender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 Projectreemakb03
 
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
Engineering Mechanics  Chapter 5  Equilibrium of a Rigid BodyEngineering Mechanics  Chapter 5  Equilibrium of a Rigid Body
Engineering Mechanics Chapter 5 Equilibrium of a Rigid BodyAhmadHajasad2
 
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfSummer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfNaveenVerma126
 
Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Bahzad5
 
Multicomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfMulticomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfGiovanaGhasary1
 
IT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptxIT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptxSAJITHABANUS
 
Modelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovationsModelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovationsYusuf Yıldız
 
Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingMarian Marinov
 
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Sean Meyn
 
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratoryدليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide LaboratoryBahzad5
 
Landsman converter for power factor improvement
Landsman converter for power factor improvementLandsman converter for power factor improvement
Landsman converter for power factor improvementVijayMuni2
 
nvidia AI-gtc 2024 partial slide deck.pptx
nvidia AI-gtc 2024 partial slide deck.pptxnvidia AI-gtc 2024 partial slide deck.pptx
nvidia AI-gtc 2024 partial slide deck.pptxjasonsedano2
 

Dernier (20)

Litature Review: Research Paper work for Engineering
Litature Review: Research Paper work for EngineeringLitature Review: Research Paper work for Engineering
Litature Review: Research Paper work for Engineering
 
Nodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptxNodal seismic construction requirements.pptx
Nodal seismic construction requirements.pptx
 
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
 
me3493 manufacturing technology unit 1 Part A
me3493 manufacturing technology unit 1 Part Ame3493 manufacturing technology unit 1 Part A
me3493 manufacturing technology unit 1 Part A
 
Présentation IIRB 2024 Chloe Dufrane.pdf
Présentation IIRB 2024 Chloe Dufrane.pdfPrésentation IIRB 2024 Chloe Dufrane.pdf
Présentation IIRB 2024 Chloe Dufrane.pdf
 
Graphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesGraphics Primitives and CG Display Devices
Graphics Primitives and CG Display Devices
 
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
 
Gender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 ProjectGender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 Project
 
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
Engineering Mechanics  Chapter 5  Equilibrium of a Rigid BodyEngineering Mechanics  Chapter 5  Equilibrium of a Rigid Body
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
 
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfSummer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
 
Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)
 
Multicomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfMulticomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdf
 
IT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptxIT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptx
 
Modelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovationsModelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovations
 
Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & Logging
 
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
 
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratoryدليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
دليل تجارب الاسفلت المختبرية - Asphalt Experiments Guide Laboratory
 
Landsman converter for power factor improvement
Landsman converter for power factor improvementLandsman converter for power factor improvement
Landsman converter for power factor improvement
 
nvidia AI-gtc 2024 partial slide deck.pptx
nvidia AI-gtc 2024 partial slide deck.pptxnvidia AI-gtc 2024 partial slide deck.pptx
nvidia AI-gtc 2024 partial slide deck.pptx
 

Ad hoc networks technical issues on radio links security & qo s

  • 1. International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064  Volume 1 Issue 3, December 2012  www.ijsr.net  Ad Hoc Networks Technical Issues on Radio Links Security & QoS M.A Siddique1 , Sarah Khan2 , Firaz Noushad3 1 Vijay Rural Engineering College, Dept of Computer Science Nizamabad-503001, A.P, India, ahtesham.siddique@gmail.com 2 Vijay College of Engineering for Women, Dept of Computer Science Nizamabad-503001, A.P, India, siddiqui.sarah04@gmail.com 3 Vijay Rural Engineering College, Dept of Computer Science Nizamabad-503001, A.P, India, write2firaz@gmail.com Abstract: Mobile ad hoc networks (MANETS) are self-created and self organized by a collection of mobile nodes, interconnected by multi-hop wireless paths in a strictly peer to peer fashion. Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration. Communication in MANET is done via multi-hop paths. Lots of challenges are there in this area, MANET contains diverse resources, the line of defense is very ambiguous, Nodes operate in shared wireless medium, Network topology changes unpredictably and very dynamically, Radio link reliability is an issue, connection breaks are pretty frequent. Moreover, density of nodes, number of nodes and mobility of these hosts may vary in different applications. There is no stationary infrastructure. Each node in MANET acts a router that forwards data packets to other nodes. Keywords: Routing Protocols, SRP. QoS, IEEE 802.11b, IEEE 802.11g, Bluetooth, (IEEE 802.15.1) 1. Introduction An ad hoc network is a collection of wireless mobile nodes (or routers) dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. The routers are free to move randomly and organize themselves arbitrarily; thus, the network’s wireless topology may change rapidly and unpredictably. Such a network may operate in a stand-alone fashion, or may be connected to the Internet. Ultimo, mobility, large network size combined with device heterogeneity, bandwidth, and battery power constraints make the design of adequate routing protocols a major challenge. Some form of routing protocol that may wish to exchange packets might not be able to communicate directly Mobile users will want to communicate in situations in which no fixed wired infrastructure is available. For example, a group of researchers en route to a conference may meet at the airport and need to connect to the wide area network, students may need to interact during a lecture, or firefighters need to connect to an ambulance en route to an emergency scene. In such situations, a collection of mobile hosts with wireless network interfaces may form a temporary network without the aid of any established infrastructure or centralized administration. Because nowadays many laptops are equipped wit powerful CPUs, large hard disk drives, and good sound and image capabilities, the idea of forming a network among these researchers, students, or members of a rescue team, who can easily be equipped with the devices mentioned above, seems possible. Such networks received considerable attention in recent years in both commercial and military applications, due to the attractive properties of building a network on the fly and not requiring any preplanned infrastructure such as a base station or central controller. A mobile ad hoc network (MANET) group has been formed within IETF. The primary focus of this working group is to develop and evolve MANET specifications and introduce them to the Internet standard track. The goal is to support mobile ad-hoc networks with hundreds of routers and solve challenges in this kind of network. Some challenges that ad hoc networking faces are limited wireless transmission range, hidden terminal problems, packet losses due to transmission errors, mobility- induced route changes, and battery constraints. Mobile ad hoc networks could enhance the service area of access networks and provide wireless connectivity into areas with poor or previously no coverage (e.g., cell edges). Connectivity to wire infrastructure will be provided through multiple gateways with possibly different capabilities and utilization. To improve performance, the mobile host should have the ability to adapt to variation in performance and coverage and to switch gateways when beneficial. To enhance the 190
  • 2. pr la ne ne di pr ga ne of U w de pe de co su an un 2 W as R m ob cl ra th cl co ne no th ra ca es as in ne w w ne in In rediction of ayer metric ha etworking bri etworks, dyn irect peer-to roperty of an ateway to the etwork interfa f both the glo Users could be ways. User m evices, migr ersonalized s evices to m onnectivity an uch an enviro nd mobile nprecedented . Wireless hoc & C Wireless comm s ultrasound, Radio waves a media have m bstacles. Com lassified by t ange which is he physical lassifier is the onsists of a etwork-nodes odes or the cl he nodes them ange. No matt an be reache stablishing co s a network nfrastructure etworks. Ad- wireless netwo with an acces etwork, or nfrastructure f ternationa the best over as a better ove ings features l namic multi o-peer comm ad hoc netw wired backbo ace on both ty obal routing enefit from u mobility enabl rate sessions services. Host move around nd reach abili onment, becau communicat growth during s Network Cellular) munication ca infrared or are the most more problem mmon wirele two means. O also induced limitations o e networks to large infrast and the mo lients form an mselves. Rad ter which tech ed with a wir ommunication k three strate networks, A -Hoc Network orks, where ea s point or ba MANET, d for its operatio l Journal of rall performa erview of the like easy conn hop network munication. T work needs to one. The gate ypes of netwo and the local ubiquitous net les users to s, and still t mobility en the network ity. is in gene use two hosts tions has g the past dec k Commun an be via diffe electromagne suitable for L ms e.g. with ess networks One classifier d by the netwo of radio wa opology, whe tructure of m obile client’s n "Ad-Hoc" n dio waves do hnologies and reless radio t between mult egies are av Ad-Hoc netwo ks Opposed ach user direct ase station, a does not rel on. f Science an Volume 1 I ance, a netwo network. Ad nection to acc k structures, The multi h be bridged b way must hav orks and be a p l ad hoc routi tworks in sev switch betw get the sa nables the us ks and maint eral necessary field of wire experienced cade. nications (A erent media s etic radio wav LBS as the ot walls and ot s today can r is the netw ork's purpose aves. The ot ther the netw mostly in-mob access only network by be o have a lim thus what ran transmission, tiple compone vailable: cellu orks and hyb to infrastruct tly communica a mobile ad ly on a fi nd Research Issue 3, Dec www.ijsr.n ork- hoc cess and hop by a ve a part ing. eral ween ame ers’ tain y in less an Ad such ves. ther ther be work and ther work bile the eing ited nges for ents ular brid ture ates hoc ixed T m w r d c e th d i c th r th e d f c c n w c m in m o s tr c c m p h f in s r w c a h (IJSR), Ind cember 201 net  Figure 1 The network mobile nodes wireless links range can com dynamically d communicatio each other’s s hat relay pa destination. Th s, battery-pow capabilities. Fu he network resulting in ra his energy-co environment, dynamically i functionality central admin complexities network proto with the tra communicatio media, limited nterference, e mobile ad hoc of all, this ty situations whe rusted, too ex creating, se capabilities, ad minimum user planning of b hoc networks fashion, but ntegrating m services availa range and ene with existing coverage and i ad hoc networ ia Online IS 12  1: Classificati is an autonom that commu s. Nodes that mmunicate di discovering e on between no end range, int ackets genera hese nodes ar wered devices urthermore, d and they m apid and unpr onstrained, dy nodes nee in order to p in the absen nistration. Th impose man ocols. In addit aditional pro ons such as d physical se etc. Despite c networks off ype of networ ere a fixed infr xpensive or un elf-organizing d hoc network r intervention base station in do not need can be attac many differen able to other ergy argument cellular infra interconnectiv rks are expecte SSN: 2319‐7 ion of Wireles mous transito unicate with lie within e irectly and ar ach other. In odes that are n termediate no ated by other e often energy s with a great devices are fre ay move ran edictable topo ynamic, distr ed to organ provide the ne nce of fixed e specific ch ny design ch tion, these ne oblems inher lower reliab curity, time v the many de ffer numerous rk is highly frastructure is nreliable. Bec g and s ks can be rapid n. There is no nstallation or d to operate ched to the nt devices an users. Furth ts promote th astructures as vity. As a con ed to become 7064  ss Networks ory association each other o each other’s s re responsible n order to en not directly wi odes act as rou r nodes to t y constrained diversity in t ee to join or le ndomly, poss ology changes ributed multi- nize themse ecessary netw infrastructure haracteristics hallenges to etworks are fa rent to wire bility than w varying chann esign constra advantages. F suited for us not available, ause of their self-administe dly deployed w need for deta wiring. Also in a stand-a Internet, ther nd making t hermore, capa eir use in tan they can ex nsequence, mo an important n of over send e for nable ithin uters their that their eave sibly s. In -hop elves work e or and the faced eless wired nels, aints, First e in , not self- ering with ailed o, ad alone reby their city, ndem xtend obile part 191
  • 3. International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064  Volume 1 Issue 3, December 2012  www.ijsr.net  of the future 4G architecture, which aims to provide pervasive computer environments that support users in accomplishing their tasks, accessing information and communicating anytime, anywhere and from any device. 3. Mobile Ad-hoc Network Applications Ad hoc networks are key to the evolution of wireless networks.. Ad hoc networks are typically composed of equal nodes that communicate over wireless links without any central control. Although military tactical communication is still considered the primary application for ad hoc networks, commercial interest in this type of networks continues to grow. Applications such as rescue missions in times of natural disasters, law enforcement operations, commercial and educational use, and sensor network are just a few possible commercial examples. Ad hoc wireless networks inherit the traditional problems of wireless and mobile communications, such as bandwidth optimization, power control, and transmission quality enhancement. In addition, the multi hop nature and the lack of fixed infrastructure generates new research problems such as configuration advertising, discovery, and maintenance, as well as ad hoc addressing and self- routing  Tactical networks: Military communication and operations, automated battlefields  Disaster services: Search and rescue operations, Disaster recovery, Replacement of fixed infrastructure in case of environmental disasters, Policing and fire fighting, Supporting doctors and nurses in hospitals  Commercial and civilian: E-commerce, electronic payments anytime and anywhere environments.  Home and enterprise: Home/office wireless networking, Conferences, meeting rooms, Personal area networks (PAN), Personal networks (PN), Networks at construction sites.  Education: Universities and campus settings, Virtual classrooms, Ad hoc communications during meetings or lectures.  Entertainment: Multi-user games, Wireless P2P networking, Outdoor Internet access, Robotic pets, Theme park Sensor networks.  Home applications: smart sensors & actuators embedded in consumer electronics, Body area network (BAN) Data tracking of environmental conditions, animal movements, chemical / biological detection.  Context aware services: Follow-on services: call forwarding, mobile workspace. 4. Security issues & Challenges Security has become a primary concern to provide protected communication between mobile nodes in a hostile environment. Unlike the wired line networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, and highly dynamic network topology. These challenges clearly make a case for building multi fence security solutions that achieve both broad protection and desirable network performance. One of the fundamental vulnerabilities of MANETs comes from their open peer-to-peer architecture. Unlike wired networks that have dedicated routers, each mobile node in an ad hoc network may function as a router and forward packets for other nodes. The wireless channel is accessible to both legitimate network users and malicious attackers. As a result, there is no clear line of defense in MANETs from the security design perspective. The boundary that separates the inside network from the outside world becomes blurred. There is no well-defined place or infrastructure where we may deploy a single security solution. Moreover, portable devices, as well as the system security information they store, are vulnerable to compromises or physical capture, especially low-end devices with weak protection. Attackers may sneak into the network through these subverted nodes, which pose the weakest link and incur a domino effect of security breaches in the system. The stringent resource constraints in MANETs constitute another nontrivial challenge to security design. The wireless channel is bandwidth constrained and shared among multiple networking entities. The computation capability of a mobile node is also constrained. For example, some low-end devices, such as PDAs, can hardly perform computation-intensive tasks like asymmetric cryptographic computation. Because mobile devices are typically powered by batteries, they may have very limited energy resources. The wireless medium and node mobility pose far more dynamics in MANETs compared to the wired line networks. The network topology is highly dynamic as nodes frequently join or leave the network, and roam in the network on their own will. The wireless channel is also subject to interferences and errors, exhibiting volatile characteristics in terms of bandwidth and delay. Despite such dynamics, mobile users may request “anytime, anywhere” security services as they move from one place to another. The above characteristics of MANETs clearly make a case for building multi fence security solutions that achieve both broad protection and desirable network performance. 192
  • 4. International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064  Volume 1 Issue 3, December 2012  www.ijsr.net  Figure 2: Transmission using Wireless Link First, the security solution should spread across many individual components and rely on their collective protection power to secure the entire network. The security scheme adopted by each device has to work within its own resource limitations in terms of computation capability, memory, communication capacity, and energy supply. Second, the security solution should span different layers of the protocol stack, with each layer contributing to a line of defense. No single- layer solutions possible to thwart all potential attacks. Third, the security solution should thwart threats from both outsiders who launch attacks on the wireless channel and network topology, and insiders who sneak into the system through compromised devices and gain access to certain system knowledge. Fourth, the security solution should encompass all three components of prevention, detection, and reaction that work in concert to guard the system from collapse. Finally, the security solution should be practical and affordable in a highly dynamic and resource-constrained networking scenario. There are three types of routing protocols: Proactive Protocols, Reactive Protocols and Hybrid Protocols. Proactive protocols are table-driven that constantly update lists of destinations and routes. Reactive protocols respond on demand. Hybrid protocols combine the features of reactive and proactive protocols. The main goal of routing protocols is to minimize delay, maximize network throughput, maximize network lifetime and maximize energy efficiency. Security at Data-Link Layer: The wireless medium access protocol implements mechanisms based on cryptography to avoid unauthorized access and to enhance the privacy on radio links. An analysis of IEEE 802.11 and Bluetooth can be discussed in brief. Security in the IEEE 802.11 standard is provided by the Wired Equivalent Privacy (WEP) scheme, which supports both data encryption and integrity. The key is a 40-bit secret key and is shared only by all the devices of a WLAN, or is a pair wise secret key shared only by two communicating devices. Bluetooth uses cryptographic security mechanisms implemented in the data link layer. A key management service provides each device with a set of symmetric cryptographic keys required for the initialization of a secret channel with another device, the execution of an authentication protocol, and the exchange of encrypted data on the secret channel. Malicious nodes can disrupt the correct functioning of a routing protocol by modifying routing information, fabricating false routing information, and impersonating other nodes. The Secure Routing Protocol (SRP) is an extension that is applied to several existing reactive routing protocols. SRP is based on the assumption of the existence of a security association between the sender and receiver based on a shared secret key negotiated at the connection setup. SRP fights against the attacks that disrupt the route discovery process. A node initiating a route discovery is able to identify and discard false routing information. Ariadne is a secure ad-hoc routing protocol based on DSR and the Timed Efficient Stream Loss- Tolerant Authentication (TESLA) authentication protocol. The Authenticated Routing for Ad Hoc Network (ARAN) Protocol is on-demand, secure, and detects and protects against malicious actions carried out by third parties in the ad hoc environment. ARAN is based on certificates from a trusted certificate server before joining the ad hoc network. Secure Efficient Ad Hoc Distance (SEAD) is a proactive secure routing protocol based on routing table update messages. The basic idea is to authenticate the sequence number and the metric field of a routing table update message using one-way hash functions. Hash chains and digital signatures are used by the Secure Ad Hoc On-Demand Distance Vector (SAODV) mechanism. Quality of Service (QoS): The ability of a network to provide QoS depends on the intrinsic characteristics of all the network components, from transmission links to MAC and network layers. Wireless links have a low and highly variable capacity, and high loss rates. Topologies are highly dynamic and have high packet loss rates. Random access– based MAC protocols have no QoS support. QoS MAC protocols solve the problems of medium contention, support reliable unicast communications, and provide resource reservation for real-time traffic in a distributed wireless environment. Numerous MAC protocols and improvements that have proposed protocols that can provide QoS guarantees to real-time traffic in a distributed wireless environment include Group Allocation Multiple 193
  • 5. International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064  Volume 1 Issue 3, December 2012  www.ijsr.net  Access with Piggyback Reservation (GAMA/PR) protocol and Black Burst (BB) contention mechanism. With the rapid development of Internet technology, when people for the Best effort service is no longer satisfied, how to get more bandwidth, how to reduce the mistakes, how to reduce the delay phenomenon, making Quality of Service (QoS) related research, including the Integrated Service (RSVP), Differentiated Service, etc., has become an important research topic. In the above-mentioned several agreements, most of them are made in the last two years, only for the basic mode of operation be defined, there is no consideration of QoS, only the ABR (Associativity Based Routing), SSR (Signal Stability Routing) and CEDAR (Core –Extracted Distributed Ad hoc Routing) and so there are three kinds of QoS-related functions. By ABR, for example, ABR defined by the concept of associability is that QoS can be used to indicate a link between adjacent nodes stability, while the adjacent node in the exchange of messages, you can also Bandwidth, Delay and other conditions to join, this way then when you select a path, you can have more choices, but also can do according to the different applications of different considerations to select the most appropriate path may be to ensure a minimum bandwidth that can be used, or between two points of a finite delay. However, in the MANET, the network patterns change at any time, each node may change at any time position, that is, each node is the relationship with the adjacent node may change at any time, therefore, means that the need to provide QoS dependent on regular Beaconing, so that each node to master the situation around in order to provide effective QoS information. Beaconing make the overhead on the network increased, when the node mobility to improve even when the general information that may affect the transmission, which will be in the Ad Hoc Network to provide QoS, the biggest problem. 5. Networking Enhancements for Router Radio Links in MANET Mobile Ad Hoc Networking (MANET) enhancements address several of the issues faced when merging IP routing and mobile radio communications in ad hoc networking applications. In a MANET, highly mobile "nodes" communicate with each other across bandwidth- constrained radio links. An individual node includes both a radio and a network router, with the two devices interconnected via Ethernet. Key challenges in a MANET environment include: Convergence: since nodes can rapidly join or leave the network, MANET routing topologies are highly dynamic. Fast convergence in a MANET becomes a challenge because a node's state can change well before the event is detected by the routing protocol's normal timing mechanisms. Route Selection: Radio link quality in a MANET can vary dramatically due to a variety of factors such as noise, fading, interference, and power fluctuation. As a result, routers need the ability to factor these fluctuations into "best path" selection. Radios have limited buffering capabilities, and could be easily over-loaded with IP traffic. Directional radios that operate on a narrow beam tend to model the network as a series of physical point-to- point connections with neighbor nodes. This point-to- point model does not translate gracefully to multi-hop, multipoint router environments, as it increases the size of each router's topology database and reduces routing efficiency when mobile nodes join and leave the network, based on neighbor up/down signaling from the radio. This feature enables a router to use Layer 2 feedback from its partner radio to optimize Layer 3 processing. Intra-nodal communications between router and radio are supported by means of PPP-over-Ethernet (PPPoE) sessions. A PPPoE session is established between router and its partner radio on behalf of every other router/radio neighbor located in the MANET. Once the PPPoE sessions are established, a PPP session is established end to end. These Layer 2 sessions are the means by which radio network status gets reported to the router's Layer 3 processes. MANET enhancements provide several new capabilities for optimizing routing in a wireless, ad hoc environment: Figure 3: Radio Router Links in MANET 6. Conclusion The rapid evolution in the field of mobile computing is driving a new alternative way for mobile communication, in which mobile devices form a self-creating, self- organizing and self-administering wireless network, called a mobile ad hoc network.. The development of ad hoc wireless networks and sensor networks provides tremendous opportunities in many areas including disaster recovery, defense, health care, academic, and industrial 194
  • 6. International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064  Volume 1 Issue 3, December 2012  www.ijsr.net  environments. However, there are many challenges that need to be addressed as well. The challenges include developing the following: mechanisms for efficient use of limited bandwidth and communication capacity, mechanisms for reducing power consumption and hence extending the battery life, smaller but more powerful mobile devices, algorithms for enhancing information security, and efficient routing procedures. These are major challenges to overcome, but steady progress is being made to address these. 7. Future Scope There are currently two types of mobile wireless networks. The first is known as infrastructure networks, such as networks with fixed and wired gateways. The bridges for these networks are known as base stations. The second type of wireless network is the mobile ad-hoc network. Ad-hoc connectivity is based on peer-to-peer communication. Future mobile ad-hoc networks will use mobile routers to provide Internet connectivity to mobile ad-hoc users. A mobile router will also allow mobility of an ad-hoc network, where mobile users may use an Internet access within an ad-hoc network domain. Recently, organizations have begun to see potential for such dynamic networks. Mobile ad-hoc networks are of increasing interest for a distributed set of applications, such as distributed collaborative computing, distributed sensing networks, potential fourth generation wireless systems, and response to incidents that destroyed the existing communication structure. Acknowledgment The Authors are thankful to there college management authorities, thankful to there parents for their love & affection, Author is thankful to her daughter for her immense love. References [1] IEEE 802.11e/D4.4, Draft Supplement to Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) [2] Enhancements for Quality of Service (QoS), June 2003. S. Adroutselli-Theotokis and Spinellis. A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, Dec. 2004. [3] D. Wu and R. Negi. Effective capacity: a wireless link model for support of quality of service. IEEE Transactions on Wireless Communications, 2(4):630– 643, 2003 [4] Irshad Ullah, Shoaib Ur, “Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols.”, Master Thesis at School of Computing, Blekinge Institute of Technology, 2009 [5] Suresh Singh Candy Yiu, ``Putting the cart before the horse: merging traffic for energy conservation'', IEEE Communications Magazine, June 2011, pp. 78 - 82. [6] J. Jubin and J.D. Tornow, “The DARPA Packet Radio Network Protocols”, proceedings of the IEEE. Authors Profile MA.Siddique, M.TECH(CSE), Associate Professor, Dept of CSE, Vijay Rural Engineering College, Nizambad (Dist), A.P, India. He is author of five research papers, with five papers in international conferences & international journals, His area of interest is in “Ad-hoc networking, wireless communications”. Sarah Khan, M.TECH (Computer Science), Associate Professor, Dept of CSE, Vijay college of engineering for women, Nizamabad (Dist), A.P, India. She is author of five research papers, with five papers in international conferences & international journals, her area of interest is in “Ad-hoc networking, wireless communications”. Firaz Noushad, MTECH (CSE), Assistant Professor, Dept of CSE, Vijay Rural Engineering College, Nizamabad (Dist), A.P, India. His area of interest is on MANET Security Issues. 195