SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Research in Computer Science
 eISSN 2249-8265 Volume 2 Issue 2 (2012) pp. 33-36
 © White Globe Publications
 www.ijorcs.org
 This manuscript was a result of ‘Researchomania’ 2011 contest held by White Globe Publications. This contest motivates
 young graduates to enter the vast area of research and development.

                INTRODUCTORY APPROACH ON AD-HOC
                   NETWORKS AND ITS PARADIGMS
                                                   Mehtab Singh Kahlon
                                     Institute of Engineering & Technology, Bhaddal


Abstract: An ad-hoc wireless network is a collection of
wireless mobile nodes that self-configure to construct                                      Start
a network without the need for any established
infrastructure or backbone. Ad hoc networks use                       Nodes send signal to find the number of other nodes
mobile nodes to enable communication outside                                             within range
wireless transmission range. With the advancement in
wireless communications, more and more wireless                                  Synchronizing between nodes
networks appear, e.g., Mobile Ad Hoc Network
(MANET), Wireless Sensor Network (WSN), etc. So, in
this paper we have discussed Ad Hoc Networks along                       Sender node send messages to receiving node
with its energy issues, applications, QoS and
challenges.
                                                                  Receiving
                                                                  node Send       Yes                      No
                                                                                         Is receiving              Wait for
Keywords: - Ad-Hoc Wireless Networks, Routing,                      back                 node ready               sometime
MANET.                                                            Ready Signal

                  I. INTRODUCTION
                                                                                   Communication begins
   Ad-Hoc is a decentralized wireless network. The
network is ad hoc because it does not rely on a
                                                                                     Termination Process
preexisting infrastructure, such as routers in wired
networks or access points in managed (infrastructure)
wireless networks. Instead, each node participates in                                       Stop
routing by forwarding data for other nodes, and so the
determination of which nodes forward data is made                     Fig.1: Working of Ad Hoc Network [1]
dynamically based on the network connectivity. A
mobile ad hoc network, also called a mobile mesh                II. MOBILE AD HOC NETWORK (MANET)
network, is a self-configuring network of mobile                With the advancement in wireless communications,
devices connected by wireless links. Wireless               more and more wireless networks appear, e.g., Mobile
networks can be classified into two types:                  Ad Hoc Network (MANET), Wireless Sensor Network
Infrastructure based networks and Infrastructure less       (WSN). Mobile adhoc network (MANET) is a
(Mobile Ad hoc) Networks. Infrastructure based              temporary network setup for a specific purpose
network consists of a network with a fixed and wide         without help of any pre-existing infrastructure. The
gateways. Mobile hosts communicate with a bridge in         nodes in MANET are empowered to exchange packet
the network (called base station) within its                using a radio channel. The nodes not in direct reach of
communication radius. A lack of infrastructure              each other uses their intermediate nodes to forward
presents problems with centrally controlled security,       packets. Therefore threats exist to a mobile ad hoc
for example access control, which is traditionally          network both from external nodes unauthorized to
maintained by a central server. Also security               participate in the mobile ad hoc networks, and from
Mechanisms involving trusted third parties may no           internal nodes, which have the authorization
longer be viable in ad hoc networks. Figure 1 shows         credentials to participate in the mobile ad hoc network.
the working of general Ad Hoc Network.                      Internal nodes giving rise to threats can be further
                                                            divided according to their behavior - failed, badly
                                                            failed, selfish and malicious nodes. Figure 2 shows the
                                                            Mobile Ad Hoc Network.


                                                                                  www.ijorcs.org
34                                                                                              Mehtab Singh Kahlon

                                                            networks is a challenging issue, taking power
                                                            consumption into consideration. One critical issue for
                                                            all kinds of mobile nodes supported by battery powers
                                                            is power saving. Without power, any mobile node will
                                                            become useless. Battery power being limited,
                                                            extending the lifetime of batteries is an important
                                                            issue, especially for Mobile Ad Hoc Networks
                                                            (MANETs). To reduce the energy consumption in
                                                            mobile devices, there have been efforts in physical and
                                                            data link layers as well as in the network layer related
                                                            to the routing protocol. The purpose of power-aware
                                                            routing protocols is to maximize the network lifetime
                                                            [2].
              Fig.2: Mobile ad hoc network
                                                              VI. APPLICATIONS OF AD HOC NETWORKS
         III. QUALITY OF SERVICE (QOS)
                                                            A. Conferencing
   Quality of Service (QoS) is not easily achieved in
ad hoc networks. To provide QoS routing in Ad hoc              Perhaps the prototypical application requiring the
networks, it is not just sufficient to provide a basic      establishment of an ad hoc network is mobile
routing functionality where only a feasible route is        conferencing. When mobile computer users gather
found, other aspects like the bandwidth constraints due     outside their normal office environment, the business
to shared media, dynamic topology due to                    network infrastructure is often missing. But the need
continuously changing topology and the power                for collaborative computing might be even more
consumption due to limited battery powers must also         important here than in the everyday office
be considered. The nodes in the Ad hoc network move         environment. Indeed, the whole point of the meeting
randomly, hence, the topology changes continuously          might be to make some further progress on a particular
resulting in route breakage. Thus, the route breakage       collaborative project. Given that today’s project
must first be detected and a new route should be found      environments are heavily computerized, for projects in
to the destination in advance. The quality-of-service       a very broad range of industries the need for being able
(QoS) routing in an ad hoc network is difficult because     to create an ad hoc network seems clear.
the network topology may change constantly, and the         B. Home Networking
available state information for routing is inherently
imprecise [3, 4].                                               As another example, consider the scenario that will
                                                            likely result if wireless computers become popular at
     IV. LOCATION-AIDED ROUTING (LAR)                       home. These computers will probably be taken to and
   The LAR protocols use location information (which        from the office work environment and on business
may be out of date, by the time it is used) to reduce the   trips. It is quite possible that such computers will not
search space for a desired route. Limiting the search       have topologically related IP addresses, especially if
space results in fewer route discovery messages.            they are connected at the offices of each parent or at
Location information used in the LAR protocol may be        the children’s school. Keeping in mind the
provided by the Global Positioning System (GPS).            convenience that an unchanging IP address affords to
With the availability of GPS, it is possible for a mobile   the user, it would be nice to allow the various mobile
host to know its physical location [3]. In reality,         computers to operate an ad hoc network in the home,
position information provided by GPS includes some          even if the home maintains its own subnet with more
amount of error, which is the difference between GPS-       or less permanently situated network nodes.
calculated coordinates and the real coordinates. For
instance, NAVSTAR Global Positioning System has
positional accuracy of about 50–100 m and
Differential GPS offers accuracies of a few meters [5].

           V. ENERGY RELATED ISSUE
   In ad hoc networks, each device plays the role of a
router and has limited battery energy. In addition, the
network topology can constantly change. Thus, it is
widely accepted that conventional routing protocols
are not appropriate for mobile ad hoc networks and
consequently, the design of routing protocols for such                      Fig.3: Home Networking


                                                                            www.ijorcs.org
Introductory Approach on Ad-Hoc Networks and its Paradigms                                                               35

C. Emergency Services                                           VII. CHALLENGES IN AD HOC NETWORKS
   Ad hoc networks can help to overcome network                 One of the biggest obstacles to the adoption of ad
impairment during disaster emergencies. Mobile units         hoc networks may be reduced data rates—the same
will probably carry networking equipment in support          problem that slowed the adoption of wireless
of routine operations for the times when the internet is     computing during the last decade. We can typically
available and the infrastructure has not been impaired.      observe an order of magnitude difference in the speed
With the techniques and protocols in this book,              of wired and wireless networks. For instance, while
emergency mobile units can greatly extend the                many enterprise users are accustomed to 100 Mbit/sec
usefulness of their networking equipment during times        from the local Ethernet, wireless users must struggle to
of lost infrastructure support. For instance, police         get a reliable 10 Mbit/sec over the air: 1 to 2 Mbit/sec
squad cars and firefighting equipment can remain in          is much more common.
touch longer and provide information more quickly if
they can cooperate to form an ad hoc network in places                          VIII. CONCLUSION
not otherwise offering connectivity to the global                In recent years, mobile computing has enjoyed a
Internet.                                                    tremendous rise in popularity. The continued
D. Embedded Computing Applications                           miniaturization of mobile computing devices and the
                                                             extraordinary rise of processing power available in
   The world is full of machines that move, and future       mobile laptop computers combine to put more and
intelligent mobile machines will be able to process a        better computer-based applications into the hands of a
great deal more information about the environment in         growing segment of the population. At the same time,
which they operate. The “environment” itself will            the     markets    for   wireless   telephones    and
increasingly be a virtual one created by fixed and           communication devices are experiencing rapid growth.
mobile computers. Some researchers [Weiser 1993]             Projections have been made that, by the year 2002,
predict a world of ubiquitous computing, in which            there will be more than a billion wireless
computers will be all around us, constantly performing       communication devices in use, and more than 200
mundane tasks to make our lives a little easier. These       million wireless telephone handsets will be purchased
ubiquitous computers will often react to the changing        annually. So, in this paper we have discussed Ad Hoc
environment in which they are situated and will              Networks along with its energy issues, applications,
themselves cause changes to the environment in ways          QoS and challenges.
that are, we hope, predictable and planned.
                                                                                 IX. REFERENCES
E. Personal Area Networks and Bluetooth
                                                             [1] Pradeep Kumar Jaisal, Pankaj Kumar Mishra, “Survey
   The idea of a personal area network (PAN) is to                 of Security Issues in Wireless Adhoc Network
create much localized network populated by some                    Protocols”, IJECT VOL 2 Issue 4, Oct-Dec          2011,
network nodes that are closely associated with a single            [Online] Available: http://www.iject.org/vol2issue4/pra
person. These nodes may be attached to the person’s                deep1.pdf
belt or carried in a purse. More exotic visions of the       [2]   Tseng, Yu-Chee, Hsieh, Ten-Yueng, “Fully power
future include virtual reality devices attached around             aware and location aware protocols for wireless multi-
the head and other devices more oriented toward the                hop ad hoc networks”, proceedings of            Eleventh
sense of touch. These devices may or may not need to               International Conference        on             Computer
have an attachment to the wide area Internet, but they             communications and networks, 2002.
will almost certainly need to communicate with each          [3]   Kunagorn Kunavut, Teerapat Sanguankotchakorn,
other while they are associated with their users’                  QoS-aware routing for Mobile Ad hoc Networks
activities. In this scenario, mobility is not the                  Based on Multiple Metrics: Connectivity Index (CI) and
overriding consideration. Figure 4 shows the Global                Delay”, ECTI-CON, 2010, [Online] Available:
                                                                   http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A
Wireless Standards of WAN, MAN, LAN, and PAN.                      %2F%2Fieeexplore.ieee.org%2Fiel5%2F5483296%2F5
                                                                   491394%2F05491536.pdf%3Farnumber%3D5491536&
                                                                   authDecision=-203
                                                             [4]   Thriveni J, Alekhya V L, Deepa N, Uma B, Alice A,
                                                                   Prakash G L, K R Venugopal, L M Patnaik, “QoS
                                                                   Preemptive Routing with Bandwidth Estimation for
                                                                   Improved Performance in Ad Hoc Networks”, 2008
                                                                   IEEE.
                                                             [5]   Young-Bae Ko and Nitin H. Vaidya, “Location-Aided
                                                                   Routing (LAR) in mobile ad hoc networks”, Wireless
                                                                   Networks 6 (2000), ©J.C. Baltzer AG, Science
                                                                   Publishers, pp: 307- 321
            Fig.4: Global Wireless Standards


                                                                                www.ijorcs.org
36                                                                                                    Mehtab Singh Kahlon

 [6] Bevan Das Vaduvur Bharghavan, “Routing in Ad-Hoc           [19] Broch J, Johnson DB, Maltz DA.: The dynamic source
       Networks Using Minimum Connected Dominating                   routing protocol for mobile ad hoc networks. Internet-
       Sets”, 1997 IEEE p- p376.                                     Draft, draft-ietf-manet-dsr-09.txt, April 2003.
 [7]   Shigang Chen and Klara Nahrstedt,      “Distributed      [20] M. Heissenbttel and T. Braun.: Ants-Based Routing in
       Quality-of-Service Routing in Ad Hoc Networks”,               Large Scale Mobile Ad-Hoc Networks. Technical
       IEEE JOURNAL ON SELECTED AREAS IN                             report, University of Bern,       Kommunikation     in
       COMMUNICATIONS, VOL. 17, NO. 8, AUGUST                        verteilten System (KiVS03), March 2003, 181–190.
       1999.
 [8]   Young-Bae Ko and Nitin H. Vaidya, “Location-Aided
       Routing (LAR) in mobile ad hoc networks”, Wireless
       Networks 6 (2000) 307–321, © J.C. Baltzer AG,
       Science Publishers.
 [9]   Lianggui Liu and Guangzeng FengL, “A Novel Ant
       Colony Based QoS-Aware Routing Algorithm for
       MANETs”, Wang, K. Chen, and Y.S. Ong (Eds.):
       ICNC 2005, LNCS 3612, pp. 457 –        466, 2005, ©
       Springer-Verlag, Berlin Heidelberg 2005.
[10]   Mohammad Reza EffatParvar, Mehdi EffatParvar, and
       Mahmoud Fathy, “Improvement of on Demand
       Multicast Routing Protocol in Ad Hoc Networks to
       Achieve Good Scalability and Reliability”, O. Gervasi
       et al. (Eds.): ICCSA 2008, Part II, LNCS 5073, pp.
       446–457, 2008, © Springer-Verlag Berlin Heidelberg
       2008.
[11]   Chi-Hsiang Yeh, “DEAR: An Extension of Traffic
       Engineering for Routing and Resource Management in
       Ad Hoc Wireless        Networks”, VTC 2002, 0-7803-
       7484-3/02/$17.00 02002 IEEE.
[12]   Dong Lu, Haitao Wu, Qian Zhang,        Wenwu Zhu,
       “PARS: Stimulating Cooperation for Power-Aware
       Routing in Ad-Hoc Networks”, 0-7803-8938-
       7/05/$20.00 (C) 2005 IEEE.
[13]   Kai Zeng, Kui Ren and Wenjing Lou, “Geographic On-
       Demand Disjoint Multipath Routing in Wireless       Ad
       Hoc Networks”.
[14]   RADHIKA D.JOSHI PRITI P.REGE, “Distributed
       Energy        Efficient Routing in Ad Hoc Networks”,
       978-1-4244-3328-       5/08/$25.00 ©2008 IEEE.
[15]   L. Boukhalfa, P. Minet and S. Midonnet,          “QoS
       Support in a MANET Based on OLSR and CBQ,”
       Proceedings of the Sixth International Conference on
       Networking (ICN’07), April 2007.
[16]   Myung Jong Lee, Jianling Zheng, Xuhui Hu, Hsin-hui
       Juan, Chunhui Zhu, Yong Liu, June Seung Yoon, and
       Tarek N. Saadawi, “A New       Taxonomy of Routing
       Algorithms for Wireless Mobile Ad Hoc Networks:
       The Component Approach”, IEEE Communications
       Magazine, vol. 44, no.11, pp. 116-     123, November
       2006.
[17]   Tung-shih Su, Chih-Hung Lin and Wen-Shyong Hsieh,
       ”A Novel QoSAware Routing for Ad Hoc Networks,”
       Journal of Communication and Information Systems,
       July/August 2006.
[18]   L.Hanzo and R.Tafazolli, ”Quality of Service Routing
       and Admission Control for Mobile Ad Hoc Network
       with a Contention - based MAC Layer,” IEEE
       International Conference on Mobile Adhoc and
       Sensor Systems, October 2006.




                                                                                 www.ijorcs.org

Weitere Àhnliche Inhalte

Andere mochten auch

Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIOSR Journals
 
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemAn Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemIJORCS
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...IJORCS
 
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification? Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification? IJORCS
 
IJORCS, Volume 2 - Issue 6, Call for Papers
IJORCS, Volume 2 - Issue 6, Call for PapersIJORCS, Volume 2 - Issue 6, Call for Papers
IJORCS, Volume 2 - Issue 6, Call for PapersIJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysIJORCS
 
IJORCS,Call For Papers- Volume 3, Issue 1,December 2012
IJORCS,Call For Papers- Volume 3, Issue 1,December 2012IJORCS,Call For Papers- Volume 3, Issue 1,December 2012
IJORCS,Call For Papers- Volume 3, Issue 1,December 2012IJORCS
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicIJORCS
 
Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4IJORCS
 

Andere mochten auch (9)

Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemAn Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
 
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification? Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification?
 
IJORCS, Volume 2 - Issue 6, Call for Papers
IJORCS, Volume 2 - Issue 6, Call for PapersIJORCS, Volume 2 - Issue 6, Call for Papers
IJORCS, Volume 2 - Issue 6, Call for Papers
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
IJORCS,Call For Papers- Volume 3, Issue 1,December 2012
IJORCS,Call For Papers- Volume 3, Issue 1,December 2012IJORCS,Call For Papers- Volume 3, Issue 1,December 2012
IJORCS,Call For Papers- Volume 3, Issue 1,December 2012
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
 
Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4Call for Papers - IJORCS, Volume 4 Issue 4
Call for Papers - IJORCS, Volume 4 Issue 4
 

Ähnlich wie Ad-Hoc Networks Research Paper

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
 
Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesIJMER
 
AODV information
AODV informationAODV information
AODV informationanilds02
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networksFathimaFarsana9
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocolsiosrjce
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless networkElanthendral Mariappan
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.Mangesh Vasu
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networkschris zlatis
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkSanjeev Kumar Jaiswal
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
 
Top schools in gudgao
Top schools in gudgaoTop schools in gudgao
Top schools in gudgaoEdhole.com
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study IRJET Journal
 

Ähnlich wie Ad-Hoc Networks Research Paper (20)

270 273
270 273270 273
270 273
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
H010524049
H010524049H010524049
H010524049
 
Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering Techniques
 
AODV information
AODV informationAODV information
AODV information
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
A017220112
A017220112A017220112
A017220112
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Top schools in gudgao
Top schools in gudgaoTop schools in gudgao
Top schools in gudgao
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
 

Mehr von IJORCS

Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsHelp the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsIJORCS
 
Real-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition SystemReal-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition SystemIJORCS
 
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveFPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveIJORCS
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...IJORCS
 
Algebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionAlgebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionIJORCS
 
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...IJORCS
 
CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2IJORCS
 
Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1IJORCS
 
Voice Recognition System using Template Matching
Voice Recognition System using Template MatchingVoice Recognition System using Template Matching
Voice Recognition System using Template MatchingIJORCS
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessIJORCS
 
A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...IJORCS
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...IJORCS
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
 
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...IJORCS
 
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...IJORCS
 
A PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmA PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmIJORCS
 
Call for papers, IJORCS, Volume 3 - Issue 3
Call for papers, IJORCS, Volume 3 - Issue 3Call for papers, IJORCS, Volume 3 - Issue 3
Call for papers, IJORCS, Volume 3 - Issue 3IJORCS
 
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks IJORCS
 
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing IJORCS
 
Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...
Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...
Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...IJORCS
 

Mehr von IJORCS (20)

Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsHelp the Genetic Algorithm to Minimize the Urban Traffic on Intersections
Help the Genetic Algorithm to Minimize the Urban Traffic on Intersections
 
Real-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition SystemReal-Time Multiple License Plate Recognition System
Real-Time Multiple License Plate Recognition System
 
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveFPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
 
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...Using Virtualization Technique to Increase Security and Reduce Energy Consump...
Using Virtualization Technique to Increase Security and Reduce Energy Consump...
 
Algebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionAlgebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression Function
 
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
 
CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2CFP. IJORCS, Volume 4 - Issue2
CFP. IJORCS, Volume 4 - Issue2
 
Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1Call for Papers - IJORCS - Vol 4, Issue 1
Call for Papers - IJORCS - Vol 4, Issue 1
 
Voice Recognition System using Template Matching
Voice Recognition System using Template MatchingVoice Recognition System using Template Matching
Voice Recognition System using Template Matching
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
 
A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...A Review and Analysis on Mobile Application Development Processes using Agile...
A Review and Analysis on Mobile Application Development Processes using Agile...
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
 
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...
 
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...The Design of Cognitive Social Simulation Framework using Statistical Methodo...
The Design of Cognitive Social Simulation Framework using Statistical Methodo...
 
A PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering AlgorithmA PSO-Based Subtractive Data Clustering Algorithm
A PSO-Based Subtractive Data Clustering Algorithm
 
Call for papers, IJORCS, Volume 3 - Issue 3
Call for papers, IJORCS, Volume 3 - Issue 3Call for papers, IJORCS, Volume 3 - Issue 3
Call for papers, IJORCS, Volume 3 - Issue 3
 
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks
 
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
 
Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...
Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...
Prediction of Atmospheric Pressure at Ground Level using Artificial Neural Ne...
 

KĂŒrzlich hochgeladen

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

KĂŒrzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Ad-Hoc Networks Research Paper

  • 1. International Journal of Research in Computer Science eISSN 2249-8265 Volume 2 Issue 2 (2012) pp. 33-36 © White Globe Publications www.ijorcs.org This manuscript was a result of ‘Researchomania’ 2011 contest held by White Globe Publications. This contest motivates young graduates to enter the vast area of research and development. INTRODUCTORY APPROACH ON AD-HOC NETWORKS AND ITS PARADIGMS Mehtab Singh Kahlon Institute of Engineering & Technology, Bhaddal Abstract: An ad-hoc wireless network is a collection of wireless mobile nodes that self-configure to construct Start a network without the need for any established infrastructure or backbone. Ad hoc networks use Nodes send signal to find the number of other nodes mobile nodes to enable communication outside within range wireless transmission range. With the advancement in wireless communications, more and more wireless Synchronizing between nodes networks appear, e.g., Mobile Ad Hoc Network (MANET), Wireless Sensor Network (WSN), etc. So, in this paper we have discussed Ad Hoc Networks along Sender node send messages to receiving node with its energy issues, applications, QoS and challenges. Receiving node Send Yes No Is receiving Wait for Keywords: - Ad-Hoc Wireless Networks, Routing, back node ready sometime MANET. Ready Signal I. INTRODUCTION Communication begins Ad-Hoc is a decentralized wireless network. The network is ad hoc because it does not rely on a Termination Process preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in Stop routing by forwarding data for other nodes, and so the determination of which nodes forward data is made Fig.1: Working of Ad Hoc Network [1] dynamically based on the network connectivity. A mobile ad hoc network, also called a mobile mesh II. MOBILE AD HOC NETWORK (MANET) network, is a self-configuring network of mobile With the advancement in wireless communications, devices connected by wireless links. Wireless more and more wireless networks appear, e.g., Mobile networks can be classified into two types: Ad Hoc Network (MANET), Wireless Sensor Network Infrastructure based networks and Infrastructure less (WSN). Mobile adhoc network (MANET) is a (Mobile Ad hoc) Networks. Infrastructure based temporary network setup for a specific purpose network consists of a network with a fixed and wide without help of any pre-existing infrastructure. The gateways. Mobile hosts communicate with a bridge in nodes in MANET are empowered to exchange packet the network (called base station) within its using a radio channel. The nodes not in direct reach of communication radius. A lack of infrastructure each other uses their intermediate nodes to forward presents problems with centrally controlled security, packets. Therefore threats exist to a mobile ad hoc for example access control, which is traditionally network both from external nodes unauthorized to maintained by a central server. Also security participate in the mobile ad hoc networks, and from Mechanisms involving trusted third parties may no internal nodes, which have the authorization longer be viable in ad hoc networks. Figure 1 shows credentials to participate in the mobile ad hoc network. the working of general Ad Hoc Network. Internal nodes giving rise to threats can be further divided according to their behavior - failed, badly failed, selfish and malicious nodes. Figure 2 shows the Mobile Ad Hoc Network. www.ijorcs.org
  • 2. 34 Mehtab Singh Kahlon networks is a challenging issue, taking power consumption into consideration. One critical issue for all kinds of mobile nodes supported by battery powers is power saving. Without power, any mobile node will become useless. Battery power being limited, extending the lifetime of batteries is an important issue, especially for Mobile Ad Hoc Networks (MANETs). To reduce the energy consumption in mobile devices, there have been efforts in physical and data link layers as well as in the network layer related to the routing protocol. The purpose of power-aware routing protocols is to maximize the network lifetime [2]. Fig.2: Mobile ad hoc network VI. APPLICATIONS OF AD HOC NETWORKS III. QUALITY OF SERVICE (QOS) A. Conferencing Quality of Service (QoS) is not easily achieved in ad hoc networks. To provide QoS routing in Ad hoc Perhaps the prototypical application requiring the networks, it is not just sufficient to provide a basic establishment of an ad hoc network is mobile routing functionality where only a feasible route is conferencing. When mobile computer users gather found, other aspects like the bandwidth constraints due outside their normal office environment, the business to shared media, dynamic topology due to network infrastructure is often missing. But the need continuously changing topology and the power for collaborative computing might be even more consumption due to limited battery powers must also important here than in the everyday office be considered. The nodes in the Ad hoc network move environment. Indeed, the whole point of the meeting randomly, hence, the topology changes continuously might be to make some further progress on a particular resulting in route breakage. Thus, the route breakage collaborative project. Given that today’s project must first be detected and a new route should be found environments are heavily computerized, for projects in to the destination in advance. The quality-of-service a very broad range of industries the need for being able (QoS) routing in an ad hoc network is difficult because to create an ad hoc network seems clear. the network topology may change constantly, and the B. Home Networking available state information for routing is inherently imprecise [3, 4]. As another example, consider the scenario that will likely result if wireless computers become popular at IV. LOCATION-AIDED ROUTING (LAR) home. These computers will probably be taken to and The LAR protocols use location information (which from the office work environment and on business may be out of date, by the time it is used) to reduce the trips. It is quite possible that such computers will not search space for a desired route. Limiting the search have topologically related IP addresses, especially if space results in fewer route discovery messages. they are connected at the offices of each parent or at Location information used in the LAR protocol may be the children’s school. Keeping in mind the provided by the Global Positioning System (GPS). convenience that an unchanging IP address affords to With the availability of GPS, it is possible for a mobile the user, it would be nice to allow the various mobile host to know its physical location [3]. In reality, computers to operate an ad hoc network in the home, position information provided by GPS includes some even if the home maintains its own subnet with more amount of error, which is the difference between GPS- or less permanently situated network nodes. calculated coordinates and the real coordinates. For instance, NAVSTAR Global Positioning System has positional accuracy of about 50–100 m and Differential GPS offers accuracies of a few meters [5]. V. ENERGY RELATED ISSUE In ad hoc networks, each device plays the role of a router and has limited battery energy. In addition, the network topology can constantly change. Thus, it is widely accepted that conventional routing protocols are not appropriate for mobile ad hoc networks and consequently, the design of routing protocols for such Fig.3: Home Networking www.ijorcs.org
  • 3. Introductory Approach on Ad-Hoc Networks and its Paradigms 35 C. Emergency Services VII. CHALLENGES IN AD HOC NETWORKS Ad hoc networks can help to overcome network One of the biggest obstacles to the adoption of ad impairment during disaster emergencies. Mobile units hoc networks may be reduced data rates—the same will probably carry networking equipment in support problem that slowed the adoption of wireless of routine operations for the times when the internet is computing during the last decade. We can typically available and the infrastructure has not been impaired. observe an order of magnitude difference in the speed With the techniques and protocols in this book, of wired and wireless networks. For instance, while emergency mobile units can greatly extend the many enterprise users are accustomed to 100 Mbit/sec usefulness of their networking equipment during times from the local Ethernet, wireless users must struggle to of lost infrastructure support. For instance, police get a reliable 10 Mbit/sec over the air: 1 to 2 Mbit/sec squad cars and firefighting equipment can remain in is much more common. touch longer and provide information more quickly if they can cooperate to form an ad hoc network in places VIII. CONCLUSION not otherwise offering connectivity to the global In recent years, mobile computing has enjoyed a Internet. tremendous rise in popularity. The continued D. Embedded Computing Applications miniaturization of mobile computing devices and the extraordinary rise of processing power available in The world is full of machines that move, and future mobile laptop computers combine to put more and intelligent mobile machines will be able to process a better computer-based applications into the hands of a great deal more information about the environment in growing segment of the population. At the same time, which they operate. The “environment” itself will the markets for wireless telephones and increasingly be a virtual one created by fixed and communication devices are experiencing rapid growth. mobile computers. Some researchers [Weiser 1993] Projections have been made that, by the year 2002, predict a world of ubiquitous computing, in which there will be more than a billion wireless computers will be all around us, constantly performing communication devices in use, and more than 200 mundane tasks to make our lives a little easier. These million wireless telephone handsets will be purchased ubiquitous computers will often react to the changing annually. So, in this paper we have discussed Ad Hoc environment in which they are situated and will Networks along with its energy issues, applications, themselves cause changes to the environment in ways QoS and challenges. that are, we hope, predictable and planned. IX. REFERENCES E. Personal Area Networks and Bluetooth [1] Pradeep Kumar Jaisal, Pankaj Kumar Mishra, “Survey The idea of a personal area network (PAN) is to of Security Issues in Wireless Adhoc Network create much localized network populated by some Protocols”, IJECT VOL 2 Issue 4, Oct-Dec 2011, network nodes that are closely associated with a single [Online] Available: http://www.iject.org/vol2issue4/pra person. These nodes may be attached to the person’s deep1.pdf belt or carried in a purse. More exotic visions of the [2] Tseng, Yu-Chee, Hsieh, Ten-Yueng, “Fully power future include virtual reality devices attached around aware and location aware protocols for wireless multi- the head and other devices more oriented toward the hop ad hoc networks”, proceedings of Eleventh sense of touch. These devices may or may not need to International Conference on Computer have an attachment to the wide area Internet, but they communications and networks, 2002. will almost certainly need to communicate with each [3] Kunagorn Kunavut, Teerapat Sanguankotchakorn, other while they are associated with their users’ QoS-aware routing for Mobile Ad hoc Networks activities. In this scenario, mobility is not the Based on Multiple Metrics: Connectivity Index (CI) and overriding consideration. Figure 4 shows the Global Delay”, ECTI-CON, 2010, [Online] Available: http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A Wireless Standards of WAN, MAN, LAN, and PAN. %2F%2Fieeexplore.ieee.org%2Fiel5%2F5483296%2F5 491394%2F05491536.pdf%3Farnumber%3D5491536& authDecision=-203 [4] Thriveni J, Alekhya V L, Deepa N, Uma B, Alice A, Prakash G L, K R Venugopal, L M Patnaik, “QoS Preemptive Routing with Bandwidth Estimation for Improved Performance in Ad Hoc Networks”, 2008 IEEE. [5] Young-Bae Ko and Nitin H. Vaidya, “Location-Aided Routing (LAR) in mobile ad hoc networks”, Wireless Networks 6 (2000), ©J.C. Baltzer AG, Science Publishers, pp: 307- 321 Fig.4: Global Wireless Standards www.ijorcs.org
  • 4. 36 Mehtab Singh Kahlon [6] Bevan Das Vaduvur Bharghavan, “Routing in Ad-Hoc [19] Broch J, Johnson DB, Maltz DA.: The dynamic source Networks Using Minimum Connected Dominating routing protocol for mobile ad hoc networks. Internet- Sets”, 1997 IEEE p- p376. Draft, draft-ietf-manet-dsr-09.txt, April 2003. [7] Shigang Chen and Klara Nahrstedt, “Distributed [20] M. Heissenbttel and T. Braun.: Ants-Based Routing in Quality-of-Service Routing in Ad Hoc Networks”, Large Scale Mobile Ad-Hoc Networks. Technical IEEE JOURNAL ON SELECTED AREAS IN report, University of Bern, Kommunikation in COMMUNICATIONS, VOL. 17, NO. 8, AUGUST verteilten System (KiVS03), March 2003, 181–190. 1999. [8] Young-Bae Ko and Nitin H. Vaidya, “Location-Aided Routing (LAR) in mobile ad hoc networks”, Wireless Networks 6 (2000) 307–321, © J.C. Baltzer AG, Science Publishers. [9] Lianggui Liu and Guangzeng FengL, “A Novel Ant Colony Based QoS-Aware Routing Algorithm for MANETs”, Wang, K. Chen, and Y.S. Ong (Eds.): ICNC 2005, LNCS 3612, pp. 457 – 466, 2005, © Springer-Verlag, Berlin Heidelberg 2005. [10] Mohammad Reza EffatParvar, Mehdi EffatParvar, and Mahmoud Fathy, “Improvement of on Demand Multicast Routing Protocol in Ad Hoc Networks to Achieve Good Scalability and Reliability”, O. Gervasi et al. (Eds.): ICCSA 2008, Part II, LNCS 5073, pp. 446–457, 2008, © Springer-Verlag Berlin Heidelberg 2008. [11] Chi-Hsiang Yeh, “DEAR: An Extension of Traffic Engineering for Routing and Resource Management in Ad Hoc Wireless Networks”, VTC 2002, 0-7803- 7484-3/02/$17.00 02002 IEEE. [12] Dong Lu, Haitao Wu, Qian Zhang, Wenwu Zhu, “PARS: Stimulating Cooperation for Power-Aware Routing in Ad-Hoc Networks”, 0-7803-8938- 7/05/$20.00 (C) 2005 IEEE. [13] Kai Zeng, Kui Ren and Wenjing Lou, “Geographic On- Demand Disjoint Multipath Routing in Wireless Ad Hoc Networks”. [14] RADHIKA D.JOSHI PRITI P.REGE, “Distributed Energy Efficient Routing in Ad Hoc Networks”, 978-1-4244-3328- 5/08/$25.00 ©2008 IEEE. [15] L. Boukhalfa, P. Minet and S. Midonnet, “QoS Support in a MANET Based on OLSR and CBQ,” Proceedings of the Sixth International Conference on Networking (ICN’07), April 2007. [16] Myung Jong Lee, Jianling Zheng, Xuhui Hu, Hsin-hui Juan, Chunhui Zhu, Yong Liu, June Seung Yoon, and Tarek N. Saadawi, “A New Taxonomy of Routing Algorithms for Wireless Mobile Ad Hoc Networks: The Component Approach”, IEEE Communications Magazine, vol. 44, no.11, pp. 116- 123, November 2006. [17] Tung-shih Su, Chih-Hung Lin and Wen-Shyong Hsieh, ”A Novel QoSAware Routing for Ad Hoc Networks,” Journal of Communication and Information Systems, July/August 2006. [18] L.Hanzo and R.Tafazolli, ”Quality of Service Routing and Admission Control for Mobile Ad Hoc Network with a Contention - based MAC Layer,” IEEE International Conference on Mobile Adhoc and Sensor Systems, October 2006. www.ijorcs.org