The document discusses mobile ad-hoc networks (MANETs). It provides an introduction to MANETs and their history. It describes different routing protocols for MANETs including reactive, proactive, and hybrid protocols. It discusses some problems with MANETs and applications of MANETs such as for business meetings. It proposes a solution for secure data transmission in MANETs and concludes with a comparison of MANET routing protocols.
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Introduction to MANET Routing Protocols and Secure Data Transmission
1. Submitted to: - Submitted by:-
Renu Sharma Vipin Kumar Maru
Date:-21/09/2012
Sri Aurobindo Institute of Technology
Indore
2. • INTRODUCTION TO ADHOCNET AND MANET
• HISTORY OF MANET
• ROUTING PROTOCOLS
REACTIVE PROTOCOL
PROACTIVE PROTOCOL
HYBRID PROTOCOL
• PROBLEMS OF MANET
• SECURE DATA TRANSMISSION IN MANET
• APPLICATIONS OF MANET
• CONCLUSION
3. Ad-Hoc is a decentralized wireless network.
The network is ad hoc because it does not
rely on a preexisting infrastructure, such as
routers in wired networks or access points in
managed (infrastructure) wireless networks.
Instead, each node participates in routing
by forwarding data for other nodes, and so
the determination of which nodes forward
data is made dynamically based on the
network connectivity.
4. Start
Node send the signal to find the no. of other nodes
within range.
Synchronization b/w nodes
Sender node send msg. to receiver node
YES
Receiving Is
NO
node send receivin Wait for
back g node sometime
Ready Ready
signal
Comm.begins
Term. process
Stop
5. • A mobile ad-hoc network is a collection of
mobile nodes forming an ad-hoc network
without the assistance of any centralized
structures. These networks introduced a new
art of network establishment and can be
well suited for an environment where either
the infrastructure is lost or where deploy an
infrastructure is not very cost effective.
There are quite a number of uses for mobile
ad-hoc networks which can be discussed
later .
6. The whole life-cycle of ad-hoc networks could be
categorized into the first, second, and the third
generation ad-hoc networks systems.
FIRST GENERATION:-
The first generation goes back to 1972. At the
time, they were called PRNET (Packet Radio
Networks). In conjunction with ALOHA (Areal
Locations of Hazardous Atmospheres) and CSMA
(Carrier Sense Medium Access), approaches for
medium access control and a kind of distance-
vector routing PRNET were used on a trial basis to
provide different networking capabilities in a combat
environment.
7. The second generation of ad-hoc networks emerged in
1980s,when the ad-hoc network systems were further
enhanced and implemented as a part of the SURAN
(Survivable Adaptive Radio Networks) program. This
provided a packet-switched network to the mobile battlefield
In an environment without infrastructure. This program proved
to be beneficial in improving the radios' performance by
making them smaller, cheaper, and resilient to electronic
attacks.
In the 1990s, the concept of commercial ad-hoc networks
arrived with notebook computers and other viable
communications equipment. At the same time, the idea of a
collection of mobile nodes was proposed at several research
conferences. The IEEE 802.11 subcommittee had adopted the
term "ad-hoc networks" and the research community had
started to look into the possibility of deploying ad-hoc
networks in other areas of application.
9. Mobile ad hoc network’s routing protocols are characteristically
subdivided into three main categories. These are proactive routing
protocols, reactive routing protocols and hybrid routing protocols.
10. AD HOC ON DEMAND DISTANCE
VESTOR(AODV)
DYNAMIC SOURCE ROUTING(DSR)
ADMISSION CONTROL ENABLED ON
DEMAND ROUTING(ACOR)
ASSOCIATIVITY BASED ROUTING(ABR)
11. DESTINATION SEQUENCED DISTANCE
VECTOR(DSDV)
OPTIMISED LINK STATE ROUTING(OLSR)
WIRELESS ROUTING PROTOCOL(WRP)
CLUSTER HEAD GATE WAY SWITCH
ROUTING(CGSR)
16. One of many possible uses of mobile ad-hoc
networks is in some business environments, where
the need for collaborative computing might be
more important outside the office environment than
inside, such as in a business meeting outside the
office to brief clients on a given assignment.
A mobile ad-hoc network can also be used to
provide crisis management services applications,
such as in disaster recovery, where the entire
communication infrastructure is destroyed and
resorting communication quickly is crucial. By
using a mobile ad-hoc network, an infrastructure
could be set up in hours instead of weeks, as is
required in the case of wired line communication.
17. Another application example of a mobile ad-hoc network is
Bluetooth, which is designed to support a personal area
network by eliminating the need of wires between various
devices, such as printers and personal digital assistants.
18. I have presented a detailed performance comparison of
routing protocols for mobile ad hoc wireless networks.
Reactive protocols performed well in high mobility scenarios
than proactive protocol. High mobility result in highly dynamic
topology i.e. frequent route failures and changes. Both
proactive protocols fail to respond fast enough to changing
topology.
Security is one of the fundamental issues in mobile ad-hoc
networks. I've highlighted different security
requirements, along with a possible solution to secure
transmission in these types of networks. The proposed
security solution is one of several ways to protect data
communication in mobile ad-hoc networks.
However, there's a solid need to deploy more efficient
strategies to resolve various issues besides security in mobile
ad-hoc networks.