SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Wireless Ad-hoc Networks
Lu Han
October 8, 2004
Abstract
Deployed in 1990’s, Mobile Ad-hoc networks have been
widely researched for many years. Mobile Ad-hoc
Networks are a collection of two or more devices
equipped with wireless communications and networking
capability. These devices can communication with other
nodes that immediately within their radio range or one that
is outside their radio range. For the later, the nodes should
deploy an intermediate node to be the router to route the
packet from the source toward the destination. The
Wireless Ad-hoc Networks do not have gateway, every
node can act as the gateway. Although since 1990s’, lots
of research has been done on this particular field, it has
often been questioned as to whether the architecture of
Mobile Ad-hoc Networks is a fundamental flawed
architecture. The main reason for the argument is that
Mobile Ad-hoc Networks are almost never used in
practice, almost every wireless network nodes
communicate to base-station and access points instead of
co-operating to forward packets hop-by-hop.
We take the position that Mobile Ad-hoc Networks
(MANET) are a fundamentally flawed architecture. As
argument, we try to clarify the definition, architecture and
the characters of MANET, as well as the main challenges
of constructing the MANET. Although many works have
been done to solve the problem, we will show in this
paper that it is very difficult to solve these limitations
which made the Mobile Ad-hoc Networks a flawed
architecture.
After giving many evidences and analysis, we could see
that the key technologies of Wireless Ad-hoc Networks
were not implemented as well as we expect. That is to say,
many problems are inherently unsolvable. Thus, we could
explain why we take the position that Mobile Ad-hoc
Networks are flawed architecture.
1. Introduction
Research on Wireless Ad Hoc Networks has been ongoing
for decades. The history of wireless ad hoc networks can
be traced back to the Defense Advanced Research Project
Agency (DAPRPA) packet radio networks (PRNet),
which evolved into the survivable adaptive radio networks
(SURAD) program [11]. Ad hoc networks have play an
important role in military applications and related research
efforts, for example, the global mobile information
systems (GloMo) program [12] and the near-term digital
radio (NTDR) program [13]. Recent years have seen a
new spate of industrial and commercial applications for
wireless ad hoc networks, as viable communication
equipment and portable computers become more compact
and available.
Since their emergence in 1970’s, wireless networks have
become increasingly popular in the communication
industry. These networks provide mobile users with
ubiquitous computing capability and information access
regardless of the users’ location. There are currently two
variations of mobile wireless networks: infrastructured
and infrastructureless networks.
The infrastructured networks have fixed and wired
gateways or the fixed Base-Stations which are connected
to other Base-Stations through wires. Each node is within
the range of a Base-Station. A “Hand-off” occurs as
mobile host travels out of range of one Base-Station and
into the range of another and thus, mobile host is able to
continue communication seamlessly throughout the
network. Example applications of this type include
wireless local area networks and Mobile Phone.
The other type of wireless network, infrastructureless
networks, is knows as Mobile Ad-hoc Networks
(MANET). These networks have no fixed routers, every
node could be router. All nodes are capable of movement
and can be connected dynamically in arbitrary manner.
The responsibilities for organizing and controlling the
network are distributed among the terminals themselves.
The entire network is mobile, and the individual terminals
are allowed to move freely. In this type of networks, some
pairs of terminals may not be able to communicate directly
with each other and have to relay on some terminals so
that the messages are delivered to their destinations. Such
networks are often refereed to as multi-hop or store-and-
forward networks. The nodes of these networks function
as routers, which discover and maintain routes to other
nodes in the networks. The nodes may be located in or on
airplanes, ships, trucks, cars, perhaps even on people or
very small devices.
Mobile Ad-hoc Networks are supposed to be used for
disaster recovery, battlefield communications, and rescue
operations when the wired network is not available. It can
provide a feasible means for ground communications and
information access.
2. Characters and Fundamental
Challenges of Wireless Ad-hoc
Networks
Since Wireless Ad-hoc Networks are inherently different
from the well-known wired networks, it is an absolutely
new architecture. Thus some challenges raise from the
two key aspects: self-organization and wireless transport
of information [4], [5].
First of all, since the nodes in a Wireless Ad-hoc Network
are free to move arbitrarily at any time. So the networks
topology of MANET may change randomly and rapidly at
unpredictable times. This makes routing difficult because
the topology is constantly changing and nodes cannot be
assumed to have persistent data storage. In the worst case,
we do not even know whether the node will still remain
next minute, because the node will leave the network at
any minute.
Bandwidth constrained is also a big challenge. Wireless
links have significantly lower capacity than their
hardwired counterparts. Also, due to multiple access,
fading, noise, and interference conditions etc. the wireless
links have low throughput.
Energy constrained operation. Some or all of the nodes in
a MANET may rely on batteries. In this scenario, the most
important system design criteria for optimization may be
energy conservation.
Limited physical security: Mobile networks are generally
more prone to physical security threats than are fixed
cable networks. There are increased possibility
odeavesdropping, spoofing and denial-of-service attacks
in these networks.
3. The Argument
It is debated in academic as whether the Mobile Ad hoc
Networks are a fundamentally flawed architecture. The
reason for the debate is that Mobile Ad hoc networks are
almost never used in practice, the wireless networks we
use now is still Base-station or Access Point related. If we
could proof that, technically, the Mobile Ad-hoc is
unrealizable, then we could say it is a flawed architecture.
We take the position that MANET is a flawed architecture
and will prove our position in section 5. In section 4, we
will explain the counterclaim argument in favor that
MANET is a novel architecture which is technical correct
and could be realized and put into practice. Section 5
refutes this argument and explains why we think MANET
is a flawed architecture using some detail examples.
Conclusion and implication of our position are presented
in Section 6.
4. Counter Argument
It is claimed that Mobile Ad-hoc networks is a collection
of wireless mobile hosts forming a temporary network
without the aid of any established infrastructure or
centralized administration. It is great importance in
situation where it is very difficult to provide the necessary
infrastructure. Furthermore, ad-hoc networks have been
recognized as an important form of wireless network.
MANETs are internetworks formed by mobile wireless
routers, with each router having one or more associated
host devices (e.g., computers and sensors). A MANET’s
router implements routing protocols that—unlike
conventional routing techniques—tolerate rapid changes
in connectivity among nodes.
MANET’s routing algorithms organize the network by
automatically discovering the topology of the connectivity
among constituent nodes. The collection of interconnected
nodes serves as the network’s communications
infrastructure. MANETs are nonhierarchical systems, with
each node (mobile router) serving identical roles as a
source, sink, and pass-through for data. Thus, the MANET
is not tied to an existing or static communications
infrastructure (as is a cellular telephone network). The
ability to independently self-organize and serve as its own
infrastructure makes MANETs particularly attractive for
the industrial communications requirements in harsh
manufacturing environments.
Many researches have been done on all aspects of the
Mobile Ad-hoc Networks to make it more suitable for
wireless communications. People develop lots of routing
protocols to fit the mobility of the Wireless Ad-hoc
Networks. The routing algorithms become more and more
fit the rapid changing network topology of Wireless Ad-
hoc Networks.
The Wireless Ad-hoc Networks itself is not hierarchy. In
order to manage all the nodes and make Routing Protocols
as well as Collision Detection mechanism easier, People
bring out the idea of constructing the Wireless Ad-hoc
Networks into a hierarchic architecture. Thus we have the
definition of Cluster. The networks is divided into clusters,
each cluster has its own clusterhead. The clusterhead will
contain the information of the other nodes in this cluster.
This idea is great, by using cluster, we avoid the flooding
process when doing routing and fault diagnoses.
And also the self-organization method was explored. Self-
organization networks are improved Mobile Ad-hoc
networks. They distinguish themselves from traditional
mobile ad-hoc networks, based on the traditional internet
two level hierarchy routing architecture, by emphasizing
their self-organization peculiarities. Self-organized
networks can act in an independent way from any provider.
Self-organized networks are also potentially very large
and not regularly distributed. For example, one single
network can cover the entire world. Also, self-organized
networks are highly co-operative, the tasks at any layer are
distributed over the nodes and any operation is the results
of the cooperation of a group of nodes.
People believe that MANET will be the main architecture
of the future wireless networks where the normal wireless
networks are impossible to build, especially in military
usage or emergency. They think the most important
characteristic which sets Wireless Ad-hoc networks apart
from cellular networks is the fact that they do not rely on a
fixed infrastructure. They also think Mobile Ad-hoc
networks are very attractive for tactical communication in
military and law enforcement. Again, they believe that
Wireless Ad hoc Networks will play an important role not
only in military and emergency application, but also can
be applied in civilian forums such as convention centers,
conferences, and electronic classroom.
However, we do not agree with the above statements. Our
point of view is that when we talk about the Mobile Ad-
hoc networks, we think they are a flawed architecture,
because first, until now, we haven’t seen any practice of
the Wireless Ad-hoc Networks, are the routing protocols,
self-organization, security solutions are all theories based
on simulation. Second, today, almost every wireless
network nodes communicate to base-stations and access
points, instead of co-operating to forward packets hop-by-
hop. In the following section, we will discuss in detail the
major technical topics about the Wireless Ad-hoc
networks. The results show us that even consider for the
basic technical topics, the Wireless ad-hoc networks are
fundamentally flawed architecture.
5. Wireless Ad-hoc Networks Issues
Even the most zealot supporters of MANET have to admit
that it is a challenging task to enable fast and reliable
communication within such a network. The inherent
characters of MANET make it a flawed architecture no
matter what we have done or will do to improve the
performance of the networks. Below are the factors that
prevent the mobile ad hoc networks to be an in-flawed
architecture.
5.1 Security in Wireless Ad-hoc Networks
Security is an important thing for all kinds of networks
including the Wireless Ad Hoc Networks. It is obviously
to see that the security issues for Wireless Ad Hoc
Networks are difficult than the ones for fixed networks.
This is due to system constraints in mobile devices as well
as frequent topology changes in the Wireless networks.
Here, system constraints include low-power, small
memory and bandwidth, and low battery power.
Mobility of relaying nodes and the fragility or routes turn
Wireless Ad-hoc Network architecture into highly
hazardous architectures. No entity is ensured to be present
at every time and it is then impossible to rely on a
centralized architecture that could realize network
structure or even authentication. The people who consider
the Mobile Ad hoc Networks are not a flawed architecture,
while we cannot see it used in practice is only because
most of its applications are in military are totally wrong. It
is true that Mobile Ad hoc Networks come from the
military. But perhaps those persons forgot one of the most
important things: the Security!
Everybody knows that the core requirement for military
applications dealing with trust and security! That is to say,
security is the most important issue for ad hoc networks,
especially for those security sensitive applications.
As we have mentioned before, in Mobile Ad-hoc
Networks, security is difficult to implement because of the
networks constrains and the rapidly topology changes.
After investigation, we found that there are two kinds of
security related problems in the Mobile Ad-hoc Networks.
One is the attacks based on the networks which are just
similar to the Internet, the other is Fault Diagnoses.
Fault Diagnoses algorithm is used to pick out the faulty
nodes and at the same time remove the node from the
whole networks. This process should be real-time as to
guarantee the performance of the whole networks. In order
to solve the fault diagnoses problem, many fault diagnoses
algorithms [6] were bring out. After carefully surveying
the existing algorithm today, we found that they cannot
correctly diagnose faulty node with the presence of the
changing of the network topology during the process of
diagnosis, and these algorithms are analyzed with
repetitious diagnosis for all the mobile hosts and cause the
great system overhead due to the transmission of diagnosis
messages by means of flooding throughout the whole
networks. While the topology of Mobile Ad-hoc Networks
changes from time to time, then we cannot use this kind of
Fault Diagnoses Algorithm to solve the questions.
Therefore, we can see that the current fault diagnosis
algorithms cannot solve the fault diagnosis problem.
As for the networks attacks, there are several factors of
security that we should consider. First, Availability
ensures the survivability of network services despite
denial of service attacks. Confidentiality ensures that
certain information is never disclosed to unauthorized
entities. Integrity guarantees that a message being
transferred is never corrupted. Authentication enables a
node to ensure the identity of the peer node it is
communicating with. Yet, active attacks might allow the
adversary to delete massages, to modify messages, and to
impersonate a node, thus violating availability, integrity,
authentication, and non-repudiation. Although that many
security-related researches have been done to this problem
[7], [8]
, we could see that Mobile Ad hoc networks are
inherently vulnerable to security attacks. While, on the
other hand, it is said that the main applications of MANET
are in military and emergency, all these applications are
security-sensitive. MENAT can not satisfy the security
requirement of the applications, so this makes that
MANET is a flawed architecture.
5.2 Routing Protocol in Ad-hoc Networks
Wireless Ad-hoc Networks operates without a fixed
infrastructure. Multi-hop, mobility, large network size
combined with device heterogeneity and bandwidth and
battery power limitations, all these factors make the design
of routing protocols a major challenge. Lots of
researchers did tremendous work on the Wireless Ad-hoc
Routing Protocols.
Two main kinds of Routing Protocols are existed today:
one is called table-driven protocols (including distance
vector and link state), another is on-demand protocols.
In table driven routing protocols, the protocols consistent
and up-to-date routing information to all nodes is
maintained at each node whereas in on-demand routing
the routes are created only when desired by the source
host.
While for the on demand Routing protocols, “on demand”
means that it builds routes between nodes only as desired
by source nodes. It maintains these routes as long as they
are needed by the sources.
If we look up the key words “Wireless Ad hoc Networks
Routing Protocols” in Google, we could find tons of
millions of all kinds of routing protocols, as LAR
(Location-Aided Routing), DSDV (Destination-
Sequenced Distance-Vector Routing), AODV (Ad-hoc
On-Demand Distance Vector Routing), and DSR
(Dynamic Source Routing Protocol)…… However, after
survey various types of routing strategies proposed for
wireless ad-hoc networks, we find the truth is all these
routing protocols are all have inherent drawbacks and
cannot be considered as good routing protocols for
Wireless ad hoc Networks. Just like Windows operating
systems need patch at all the time, the Wireless Ad hoc
networks routing protocol are all needs patches too.
The main problems about the routing protocols are as
following:
First of all, consider the rapid passing pattern. We
define the rapid passing pattern to be one node
passing through the whole network very quickly.
Such a rapid passing node will generate the
following affects to the whole network. First, the
topology of the network changed rapidly, which will
lead to the lost of packets. Second, we have to
modify every node’s routing table that within the
communication distance of the rapid-passing node,
that will greatly improve the consumption of the
bandwidth and the overhead of the networks. Third,
obviously there will be tremendous delay of the data
sending to the rapid-moving node.
Transmission between two hosts over a wireless
network does not necessarily work equally well in
both directions. Thus, some routes determined by
some routing protocols may not work in some
environments.
Many routing protocols may create redundant routes,
which will greatly increase the routing updates as
well as increase the whole networks overhead.
Periodically sending routing tables will waste
network bandwidth. When the topology changes
slowly, sending routing messages will greatly waste
the bandwidth of Wireless Ad-hoc Networks. This
will add additional burdens to the limited bandwidth
of the Ad-hoc Networks.
Periodically sending routing tables also waste the
battery power. Energy consumption is also a critical
factor which prevents Wireless Ad-hoc Networks to
be a non-flowed architecture. We will discuss this in
5.3.
We all understand that a stable network routing protocols
is essential for any kinds of networks. However, for the
Wireless ad hoc Networks, we could not find a stable
routing protocol even after we have done research on it
more than 10 years. Needless to say that it is the Wireless
Ad hoc Networks itself is flawed.
5.3 Energy Consumption of Wireless Ad-hoc
Networks
Energy consumption is also one of the most important
performance metrics for wireless ad hoc networks, it
directly relates to the operational lifetime of the networks.
Mobile elements have to rely on finite source of energy.
While battery technology is improving over time, the need
for power consumption will not diminish. This point will
have a harmful effect on the operation time as it will have
on the connection quality and bandwidth.
In the Wireless Ad-hoc Networks, battery replacement
may not be possible. So as far as energy consumption
concerned, we should try to preserve energy while
maintaining high connectivity.
Each node depends on small low-capacity batteries as
energy sources, and cannot expect replacement when
operating in hostile and remote regions. For Wireless Ad-
hoc Networks, energy depletion and reduction is the
primary factor in connectivity degradation and length of
operational lifetime. Overall performance becomes highly
dependent on the energy efficiency of the algorithm.
Energy consumption is one of the most important
performance metrics for wireless ad hoc networks because
it directly relates to the operational lifetime of the network.
Most research efforts are focused on performance
comparisons and trade-off studies between various low-
energy routing and self-organization protocols, while
keeping other system parameters fixed. As a result, very
little has been revealed about the relationship between the
aggregate energy consumption and non-protocol
parameters such as node density, network coverage area,
and transceiver power characteristics.
We emphasis energy consumption not only because that it
is the key problem in the research of Wireless Ad-hoc
Networks, but also, we find that Energy consumption
problem also affects the routing protocols and the QoS of
the whole networks. Let’s assume that each source
randomly selects one of the possible routes and asks the
intermediate nodes on the route to relay traffic. Since
energy is a valuable resource, intermediate nodes may not
wish to consume their energy to carry the source’s traffic.
This is called “Selfish” of the node. However, if every
node behaves ‘Selfish’ and refuse to cooperate, network
throughput may be drastically reduced.
Also, there are many works have done to solve the energy
consumption problem. However, unfortunately, little
practical information is available about the energy
consumption behavior of wireless ad hoc network
interfaces and device specifications do not provide
information in a form that is helpful to protocol
developers
This, again, prove that the Wireless Ad Hoc Networks
cannot be put into practice. Further, we can hold our
position that the Wireless Ad Hoc Networks are a
fundamentally flawed architecture.
6. Conclusion
Mobile Ad hoc Networks are an ideal technology to
establish in an instant communication infrastructureless
for military application or a flawed architecture has been
bought out in this position paper. As we have proved
using the three main technical topics of the Wireless Ad-
hoc Networks, We hold the position that the Wireless Ad
hoc Networks are a flawed architecture for the following
technical reasons:
The most important thing for the networks is security.
It is even important for Wireless Ad hoc Networks
because its applications are in military. The MANET
can not appropriately solve the problem of the
security.
Routing is also a big problem. All the routing
protocols for Wireless Ad hoc Networks are need
patches. No suitable and stable routing protocols
until now.
Energy consumption problem still cannot be solved
even much of efforts have been done to it.
All these prove that the Wireless Ad hoc Networks is a
flawed architecture. Not only because it is almost never
used in practice but also because there are several
technical difficulty that cannot be conquered.
Besides, all the Wireless Ad-hoc Networks are expected to
be self-configuration. Self-configuration are referring to
two aspects, one is during the first construction of the
network, the self-configuration network is supposed to be
forming the network itself. The other problem is when one
host moves in or moves out the Wireless Ad-hoc networks,
the network should have the ability to re-configuration the
topology of the whole networks. Again we could see that
although many works have been done on this topic, but
unlucky, all the discussions do not give us a satisfied
answer to the self-configuration question. The question is
never tackled in systematic way. That again prove out
argument that the Wireless Ad-hoc Networks is a
fundamental flawed architecture, or else we should find
the appropriated answer to the problems.
However as the wireless and embedded computing
technologies continue to advance, I do hope later, one day,
we could build our wireless networks rely on some kinds
of the Wireless Ad hoc Networks.
References:
[1] IEEE Std 802.11 – 1999: Wireless Medium Access
Control (MAC) and Physical Layer (PHY)
specifications, Inst. Elec. Electron. Eng., New York,
USA, 1999.ISBN 0-7381-1658-0
[2] IPN Progress Report, August 15, 2002, Analysis of
Energy Consumption for Ad Hoc Wireless Sensor
Networks Using a Bit-Meter-Per-Joule Metric,
J.L.Gao
[3] A Distributed Light-Weight Authentication Model
for Ad-hoc Networks
[4] M. Satyanarayanan. Fundamental challenges in
mobile computing. submitted paper.
[5] M. Haardt W. Mohr R. Becher, M. Dillinger. Broad-
band wireless access and futurecommunication
networks. Proceedings of the IEEE, 89(1), 2001.
[6] S.Chessa, P.Santi, “Comparison Based System-Level
Fault Diagnosis in Ad-Hoc Networks”, Proc. IEEE
20th Symp. on Reliable Distributed Systems (SRDS),
New Orleans, pp. 257-266, October 2001
[7] Erik Skow, Jiejun Kong, Thomas Phan, Fred Cheng,
Richard Guy, Rajive Bagrodia, Mario Gerla, and
Songwu Lu, “A Security Architecture for
Application Session Handoff”
[8] Lidong Zhou, Zygmunt J. Haas, “Securing Ad Hoc
Networks”
[9] David B. Johnson, “Routing in Ad Hoc Networks of
Mobile Hosts”, Proceedings of the IEEE Workshop
on Mobile Computing Systems and Applications,
December 1994.
[10] Ljubica Blazevic, Levente Buttyan, Srdan Capkun,
Silvia Giordano, Jean-Pierre, Hubaux and Jean-Yves
Le Boudec, “Self-Organization in Mobile Ad-Hoc
Networks: the Approach of Terminodes”
[11] J. A. Freebersyser and B. Leinerr, “A DoD
perspective on mobile ad hoc networks,” in Ad
Hoc Networking, C. E. Perkin, Ed. Addison-Wesley,
2001, pp. 29–51.
[12] B. Leiner, R. Ruth, and A. R. Sastry, “Goals and
challenges of the DARPA GloMo program,”
IEEE Personal Communications, vol. 3, no. 6, pp.
34–43, December 1996.
[14] R. Ruppe, S. Griswald, P. Walsh, and R. Martin,
“Near term digital radio (NTDR) system,”
in Proceedings of IEEE MILCOM, vol. 3, November
1997, pp. 1282–1287.
[15] Yibin Liang, “Multipath “Fresnel Zone” Routing For
Wireless Ad Hoc Networks” March 4, 2004

Weitere ähnliche Inhalte

Was ist angesagt?

Work exp ( wireless netwrk)
Work exp ( wireless netwrk)Work exp ( wireless netwrk)
Work exp ( wireless netwrk)vishalmotwani
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol ineSAT Publishing House
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...ijsrd.com
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
Mobile Adhoc Network (MANET) Routing Protocols Analytical StudyMobile Adhoc Network (MANET) Routing Protocols Analytical Study
Mobile Adhoc Network (MANET) Routing Protocols Analytical StudyIOSR Journals
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...INFOGAIN PUBLICATION
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkSanjeev Kumar Jaiswal
 

Was ist angesagt? (19)

Work exp ( wireless netwrk)
Work exp ( wireless netwrk)Work exp ( wireless netwrk)
Work exp ( wireless netwrk)
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol in
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
[IJET-V1I6P19] Authors : Kirti
[IJET-V1I6P19] Authors : Kirti[IJET-V1I6P19] Authors : Kirti
[IJET-V1I6P19] Authors : Kirti
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
Mobile Adhoc Network (MANET) Routing Protocols Analytical StudyMobile Adhoc Network (MANET) Routing Protocols Analytical Study
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
 
Unit 7
Unit 7Unit 7
Unit 7
 
Mobile Ad Hoc Network
Mobile Ad Hoc NetworkMobile Ad Hoc Network
Mobile Ad Hoc Network
 
Whitepaper WiFi Meshing
Whitepaper WiFi MeshingWhitepaper WiFi Meshing
Whitepaper WiFi Meshing
 
H010524049
H010524049H010524049
H010524049
 

Andere mochten auch

2013 14sociocultural&lifestyletrend4 challenge borderlines
2013 14sociocultural&lifestyletrend4 challenge borderlines2013 14sociocultural&lifestyletrend4 challenge borderlines
2013 14sociocultural&lifestyletrend4 challenge borderlineshyevoice
 
2013 14sociocultural&lifestyletrend5 tailoredism & paradigm shift
2013 14sociocultural&lifestyletrend5 tailoredism & paradigm shift2013 14sociocultural&lifestyletrend5 tailoredism & paradigm shift
2013 14sociocultural&lifestyletrend5 tailoredism & paradigm shifthyevoice
 
2013 14sociocultural&lifestyletrend2 generosity & rooted evolution
2013 14sociocultural&lifestyletrend2 generosity & rooted evolution2013 14sociocultural&lifestyletrend2 generosity & rooted evolution
2013 14sociocultural&lifestyletrend2 generosity & rooted evolutionhyevoice
 
2013 14sociocultural&lifestyletrend3 seek for balance & add on culture
2013 14sociocultural&lifestyletrend3 seek for balance & add on culture2013 14sociocultural&lifestyletrend3 seek for balance & add on culture
2013 14sociocultural&lifestyletrend3 seek for balance & add on culturehyevoice
 
Dionne Hudson City of Shaker Heights Safety and Public Works
Dionne Hudson City of Shaker Heights Safety and Public WorksDionne Hudson City of Shaker Heights Safety and Public Works
Dionne Hudson City of Shaker Heights Safety and Public WorksDionne Hudson
 

Andere mochten auch (8)

Hbase
HbaseHbase
Hbase
 
2013 14sociocultural&lifestyletrend4 challenge borderlines
2013 14sociocultural&lifestyletrend4 challenge borderlines2013 14sociocultural&lifestyletrend4 challenge borderlines
2013 14sociocultural&lifestyletrend4 challenge borderlines
 
Pig
PigPig
Pig
 
2013 14sociocultural&lifestyletrend5 tailoredism & paradigm shift
2013 14sociocultural&lifestyletrend5 tailoredism & paradigm shift2013 14sociocultural&lifestyletrend5 tailoredism & paradigm shift
2013 14sociocultural&lifestyletrend5 tailoredism & paradigm shift
 
2013 14sociocultural&lifestyletrend2 generosity & rooted evolution
2013 14sociocultural&lifestyletrend2 generosity & rooted evolution2013 14sociocultural&lifestyletrend2 generosity & rooted evolution
2013 14sociocultural&lifestyletrend2 generosity & rooted evolution
 
2013 14sociocultural&lifestyletrend3 seek for balance & add on culture
2013 14sociocultural&lifestyletrend3 seek for balance & add on culture2013 14sociocultural&lifestyletrend3 seek for balance & add on culture
2013 14sociocultural&lifestyletrend3 seek for balance & add on culture
 
Dionne Hudson City of Shaker Heights Safety and Public Works
Dionne Hudson City of Shaker Heights Safety and Public WorksDionne Hudson City of Shaker Heights Safety and Public Works
Dionne Hudson City of Shaker Heights Safety and Public Works
 
Hive
HiveHive
Hive
 

Ähnlich wie AODV information

A Background Study Of MANET
A Background Study Of MANETA Background Study Of MANET
A Background Study Of MANETAngela Shin
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification DocumentationSambit Dutta
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Natasha Barnett
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksjake henry
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Iqra khalil
 

Ähnlich wie AODV information (20)

Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
 
A Background Study Of MANET
A Background Study Of MANETA Background Study Of MANET
A Background Study Of MANET
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
 

Kürzlich hochgeladen

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Kürzlich hochgeladen (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

AODV information

  • 1. Wireless Ad-hoc Networks Lu Han October 8, 2004 Abstract Deployed in 1990’s, Mobile Ad-hoc networks have been widely researched for many years. Mobile Ad-hoc Networks are a collection of two or more devices equipped with wireless communications and networking capability. These devices can communication with other nodes that immediately within their radio range or one that is outside their radio range. For the later, the nodes should deploy an intermediate node to be the router to route the packet from the source toward the destination. The Wireless Ad-hoc Networks do not have gateway, every node can act as the gateway. Although since 1990s’, lots of research has been done on this particular field, it has often been questioned as to whether the architecture of Mobile Ad-hoc Networks is a fundamental flawed architecture. The main reason for the argument is that Mobile Ad-hoc Networks are almost never used in practice, almost every wireless network nodes communicate to base-station and access points instead of co-operating to forward packets hop-by-hop. We take the position that Mobile Ad-hoc Networks (MANET) are a fundamentally flawed architecture. As argument, we try to clarify the definition, architecture and the characters of MANET, as well as the main challenges of constructing the MANET. Although many works have been done to solve the problem, we will show in this paper that it is very difficult to solve these limitations which made the Mobile Ad-hoc Networks a flawed architecture. After giving many evidences and analysis, we could see that the key technologies of Wireless Ad-hoc Networks were not implemented as well as we expect. That is to say, many problems are inherently unsolvable. Thus, we could explain why we take the position that Mobile Ad-hoc Networks are flawed architecture. 1. Introduction Research on Wireless Ad Hoc Networks has been ongoing for decades. The history of wireless ad hoc networks can be traced back to the Defense Advanced Research Project Agency (DAPRPA) packet radio networks (PRNet), which evolved into the survivable adaptive radio networks (SURAD) program [11]. Ad hoc networks have play an important role in military applications and related research efforts, for example, the global mobile information systems (GloMo) program [12] and the near-term digital radio (NTDR) program [13]. Recent years have seen a new spate of industrial and commercial applications for wireless ad hoc networks, as viable communication equipment and portable computers become more compact and available. Since their emergence in 1970’s, wireless networks have become increasingly popular in the communication industry. These networks provide mobile users with ubiquitous computing capability and information access regardless of the users’ location. There are currently two variations of mobile wireless networks: infrastructured and infrastructureless networks. The infrastructured networks have fixed and wired gateways or the fixed Base-Stations which are connected to other Base-Stations through wires. Each node is within the range of a Base-Station. A “Hand-off” occurs as mobile host travels out of range of one Base-Station and into the range of another and thus, mobile host is able to continue communication seamlessly throughout the network. Example applications of this type include wireless local area networks and Mobile Phone. The other type of wireless network, infrastructureless networks, is knows as Mobile Ad-hoc Networks (MANET). These networks have no fixed routers, every node could be router. All nodes are capable of movement and can be connected dynamically in arbitrary manner. The responsibilities for organizing and controlling the
  • 2. network are distributed among the terminals themselves. The entire network is mobile, and the individual terminals are allowed to move freely. In this type of networks, some pairs of terminals may not be able to communicate directly with each other and have to relay on some terminals so that the messages are delivered to their destinations. Such networks are often refereed to as multi-hop or store-and- forward networks. The nodes of these networks function as routers, which discover and maintain routes to other nodes in the networks. The nodes may be located in or on airplanes, ships, trucks, cars, perhaps even on people or very small devices. Mobile Ad-hoc Networks are supposed to be used for disaster recovery, battlefield communications, and rescue operations when the wired network is not available. It can provide a feasible means for ground communications and information access. 2. Characters and Fundamental Challenges of Wireless Ad-hoc Networks Since Wireless Ad-hoc Networks are inherently different from the well-known wired networks, it is an absolutely new architecture. Thus some challenges raise from the two key aspects: self-organization and wireless transport of information [4], [5]. First of all, since the nodes in a Wireless Ad-hoc Network are free to move arbitrarily at any time. So the networks topology of MANET may change randomly and rapidly at unpredictable times. This makes routing difficult because the topology is constantly changing and nodes cannot be assumed to have persistent data storage. In the worst case, we do not even know whether the node will still remain next minute, because the node will leave the network at any minute. Bandwidth constrained is also a big challenge. Wireless links have significantly lower capacity than their hardwired counterparts. Also, due to multiple access, fading, noise, and interference conditions etc. the wireless links have low throughput. Energy constrained operation. Some or all of the nodes in a MANET may rely on batteries. In this scenario, the most important system design criteria for optimization may be energy conservation. Limited physical security: Mobile networks are generally more prone to physical security threats than are fixed cable networks. There are increased possibility odeavesdropping, spoofing and denial-of-service attacks in these networks. 3. The Argument It is debated in academic as whether the Mobile Ad hoc Networks are a fundamentally flawed architecture. The reason for the debate is that Mobile Ad hoc networks are almost never used in practice, the wireless networks we use now is still Base-station or Access Point related. If we could proof that, technically, the Mobile Ad-hoc is unrealizable, then we could say it is a flawed architecture. We take the position that MANET is a flawed architecture and will prove our position in section 5. In section 4, we will explain the counterclaim argument in favor that MANET is a novel architecture which is technical correct and could be realized and put into practice. Section 5 refutes this argument and explains why we think MANET is a flawed architecture using some detail examples. Conclusion and implication of our position are presented in Section 6. 4. Counter Argument It is claimed that Mobile Ad-hoc networks is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. It is great importance in situation where it is very difficult to provide the necessary infrastructure. Furthermore, ad-hoc networks have been recognized as an important form of wireless network. MANETs are internetworks formed by mobile wireless routers, with each router having one or more associated host devices (e.g., computers and sensors). A MANET’s router implements routing protocols that—unlike conventional routing techniques—tolerate rapid changes in connectivity among nodes. MANET’s routing algorithms organize the network by automatically discovering the topology of the connectivity among constituent nodes. The collection of interconnected nodes serves as the network’s communications infrastructure. MANETs are nonhierarchical systems, with each node (mobile router) serving identical roles as a source, sink, and pass-through for data. Thus, the MANET is not tied to an existing or static communications infrastructure (as is a cellular telephone network). The ability to independently self-organize and serve as its own infrastructure makes MANETs particularly attractive for the industrial communications requirements in harsh manufacturing environments.
  • 3. Many researches have been done on all aspects of the Mobile Ad-hoc Networks to make it more suitable for wireless communications. People develop lots of routing protocols to fit the mobility of the Wireless Ad-hoc Networks. The routing algorithms become more and more fit the rapid changing network topology of Wireless Ad- hoc Networks. The Wireless Ad-hoc Networks itself is not hierarchy. In order to manage all the nodes and make Routing Protocols as well as Collision Detection mechanism easier, People bring out the idea of constructing the Wireless Ad-hoc Networks into a hierarchic architecture. Thus we have the definition of Cluster. The networks is divided into clusters, each cluster has its own clusterhead. The clusterhead will contain the information of the other nodes in this cluster. This idea is great, by using cluster, we avoid the flooding process when doing routing and fault diagnoses. And also the self-organization method was explored. Self- organization networks are improved Mobile Ad-hoc networks. They distinguish themselves from traditional mobile ad-hoc networks, based on the traditional internet two level hierarchy routing architecture, by emphasizing their self-organization peculiarities. Self-organized networks can act in an independent way from any provider. Self-organized networks are also potentially very large and not regularly distributed. For example, one single network can cover the entire world. Also, self-organized networks are highly co-operative, the tasks at any layer are distributed over the nodes and any operation is the results of the cooperation of a group of nodes. People believe that MANET will be the main architecture of the future wireless networks where the normal wireless networks are impossible to build, especially in military usage or emergency. They think the most important characteristic which sets Wireless Ad-hoc networks apart from cellular networks is the fact that they do not rely on a fixed infrastructure. They also think Mobile Ad-hoc networks are very attractive for tactical communication in military and law enforcement. Again, they believe that Wireless Ad hoc Networks will play an important role not only in military and emergency application, but also can be applied in civilian forums such as convention centers, conferences, and electronic classroom. However, we do not agree with the above statements. Our point of view is that when we talk about the Mobile Ad- hoc networks, we think they are a flawed architecture, because first, until now, we haven’t seen any practice of the Wireless Ad-hoc Networks, are the routing protocols, self-organization, security solutions are all theories based on simulation. Second, today, almost every wireless network nodes communicate to base-stations and access points, instead of co-operating to forward packets hop-by- hop. In the following section, we will discuss in detail the major technical topics about the Wireless Ad-hoc networks. The results show us that even consider for the basic technical topics, the Wireless ad-hoc networks are fundamentally flawed architecture. 5. Wireless Ad-hoc Networks Issues Even the most zealot supporters of MANET have to admit that it is a challenging task to enable fast and reliable communication within such a network. The inherent characters of MANET make it a flawed architecture no matter what we have done or will do to improve the performance of the networks. Below are the factors that prevent the mobile ad hoc networks to be an in-flawed architecture. 5.1 Security in Wireless Ad-hoc Networks Security is an important thing for all kinds of networks including the Wireless Ad Hoc Networks. It is obviously to see that the security issues for Wireless Ad Hoc Networks are difficult than the ones for fixed networks. This is due to system constraints in mobile devices as well as frequent topology changes in the Wireless networks. Here, system constraints include low-power, small memory and bandwidth, and low battery power. Mobility of relaying nodes and the fragility or routes turn Wireless Ad-hoc Network architecture into highly hazardous architectures. No entity is ensured to be present at every time and it is then impossible to rely on a centralized architecture that could realize network structure or even authentication. The people who consider the Mobile Ad hoc Networks are not a flawed architecture, while we cannot see it used in practice is only because most of its applications are in military are totally wrong. It is true that Mobile Ad hoc Networks come from the military. But perhaps those persons forgot one of the most important things: the Security! Everybody knows that the core requirement for military applications dealing with trust and security! That is to say, security is the most important issue for ad hoc networks, especially for those security sensitive applications. As we have mentioned before, in Mobile Ad-hoc Networks, security is difficult to implement because of the networks constrains and the rapidly topology changes. After investigation, we found that there are two kinds of security related problems in the Mobile Ad-hoc Networks.
  • 4. One is the attacks based on the networks which are just similar to the Internet, the other is Fault Diagnoses. Fault Diagnoses algorithm is used to pick out the faulty nodes and at the same time remove the node from the whole networks. This process should be real-time as to guarantee the performance of the whole networks. In order to solve the fault diagnoses problem, many fault diagnoses algorithms [6] were bring out. After carefully surveying the existing algorithm today, we found that they cannot correctly diagnose faulty node with the presence of the changing of the network topology during the process of diagnosis, and these algorithms are analyzed with repetitious diagnosis for all the mobile hosts and cause the great system overhead due to the transmission of diagnosis messages by means of flooding throughout the whole networks. While the topology of Mobile Ad-hoc Networks changes from time to time, then we cannot use this kind of Fault Diagnoses Algorithm to solve the questions. Therefore, we can see that the current fault diagnosis algorithms cannot solve the fault diagnosis problem. As for the networks attacks, there are several factors of security that we should consider. First, Availability ensures the survivability of network services despite denial of service attacks. Confidentiality ensures that certain information is never disclosed to unauthorized entities. Integrity guarantees that a message being transferred is never corrupted. Authentication enables a node to ensure the identity of the peer node it is communicating with. Yet, active attacks might allow the adversary to delete massages, to modify messages, and to impersonate a node, thus violating availability, integrity, authentication, and non-repudiation. Although that many security-related researches have been done to this problem [7], [8] , we could see that Mobile Ad hoc networks are inherently vulnerable to security attacks. While, on the other hand, it is said that the main applications of MANET are in military and emergency, all these applications are security-sensitive. MENAT can not satisfy the security requirement of the applications, so this makes that MANET is a flawed architecture. 5.2 Routing Protocol in Ad-hoc Networks Wireless Ad-hoc Networks operates without a fixed infrastructure. Multi-hop, mobility, large network size combined with device heterogeneity and bandwidth and battery power limitations, all these factors make the design of routing protocols a major challenge. Lots of researchers did tremendous work on the Wireless Ad-hoc Routing Protocols. Two main kinds of Routing Protocols are existed today: one is called table-driven protocols (including distance vector and link state), another is on-demand protocols. In table driven routing protocols, the protocols consistent and up-to-date routing information to all nodes is maintained at each node whereas in on-demand routing the routes are created only when desired by the source host. While for the on demand Routing protocols, “on demand” means that it builds routes between nodes only as desired by source nodes. It maintains these routes as long as they are needed by the sources. If we look up the key words “Wireless Ad hoc Networks Routing Protocols” in Google, we could find tons of millions of all kinds of routing protocols, as LAR (Location-Aided Routing), DSDV (Destination- Sequenced Distance-Vector Routing), AODV (Ad-hoc On-Demand Distance Vector Routing), and DSR (Dynamic Source Routing Protocol)…… However, after survey various types of routing strategies proposed for wireless ad-hoc networks, we find the truth is all these routing protocols are all have inherent drawbacks and cannot be considered as good routing protocols for Wireless ad hoc Networks. Just like Windows operating systems need patch at all the time, the Wireless Ad hoc networks routing protocol are all needs patches too. The main problems about the routing protocols are as following: First of all, consider the rapid passing pattern. We define the rapid passing pattern to be one node passing through the whole network very quickly. Such a rapid passing node will generate the following affects to the whole network. First, the topology of the network changed rapidly, which will lead to the lost of packets. Second, we have to modify every node’s routing table that within the communication distance of the rapid-passing node, that will greatly improve the consumption of the bandwidth and the overhead of the networks. Third, obviously there will be tremendous delay of the data sending to the rapid-moving node. Transmission between two hosts over a wireless network does not necessarily work equally well in both directions. Thus, some routes determined by some routing protocols may not work in some environments. Many routing protocols may create redundant routes, which will greatly increase the routing updates as well as increase the whole networks overhead.
  • 5. Periodically sending routing tables will waste network bandwidth. When the topology changes slowly, sending routing messages will greatly waste the bandwidth of Wireless Ad-hoc Networks. This will add additional burdens to the limited bandwidth of the Ad-hoc Networks. Periodically sending routing tables also waste the battery power. Energy consumption is also a critical factor which prevents Wireless Ad-hoc Networks to be a non-flowed architecture. We will discuss this in 5.3. We all understand that a stable network routing protocols is essential for any kinds of networks. However, for the Wireless ad hoc Networks, we could not find a stable routing protocol even after we have done research on it more than 10 years. Needless to say that it is the Wireless Ad hoc Networks itself is flawed. 5.3 Energy Consumption of Wireless Ad-hoc Networks Energy consumption is also one of the most important performance metrics for wireless ad hoc networks, it directly relates to the operational lifetime of the networks. Mobile elements have to rely on finite source of energy. While battery technology is improving over time, the need for power consumption will not diminish. This point will have a harmful effect on the operation time as it will have on the connection quality and bandwidth. In the Wireless Ad-hoc Networks, battery replacement may not be possible. So as far as energy consumption concerned, we should try to preserve energy while maintaining high connectivity. Each node depends on small low-capacity batteries as energy sources, and cannot expect replacement when operating in hostile and remote regions. For Wireless Ad- hoc Networks, energy depletion and reduction is the primary factor in connectivity degradation and length of operational lifetime. Overall performance becomes highly dependent on the energy efficiency of the algorithm. Energy consumption is one of the most important performance metrics for wireless ad hoc networks because it directly relates to the operational lifetime of the network. Most research efforts are focused on performance comparisons and trade-off studies between various low- energy routing and self-organization protocols, while keeping other system parameters fixed. As a result, very little has been revealed about the relationship between the aggregate energy consumption and non-protocol parameters such as node density, network coverage area, and transceiver power characteristics. We emphasis energy consumption not only because that it is the key problem in the research of Wireless Ad-hoc Networks, but also, we find that Energy consumption problem also affects the routing protocols and the QoS of the whole networks. Let’s assume that each source randomly selects one of the possible routes and asks the intermediate nodes on the route to relay traffic. Since energy is a valuable resource, intermediate nodes may not wish to consume their energy to carry the source’s traffic. This is called “Selfish” of the node. However, if every node behaves ‘Selfish’ and refuse to cooperate, network throughput may be drastically reduced. Also, there are many works have done to solve the energy consumption problem. However, unfortunately, little practical information is available about the energy consumption behavior of wireless ad hoc network interfaces and device specifications do not provide information in a form that is helpful to protocol developers This, again, prove that the Wireless Ad Hoc Networks cannot be put into practice. Further, we can hold our position that the Wireless Ad Hoc Networks are a fundamentally flawed architecture. 6. Conclusion Mobile Ad hoc Networks are an ideal technology to establish in an instant communication infrastructureless for military application or a flawed architecture has been bought out in this position paper. As we have proved using the three main technical topics of the Wireless Ad- hoc Networks, We hold the position that the Wireless Ad hoc Networks are a flawed architecture for the following technical reasons: The most important thing for the networks is security. It is even important for Wireless Ad hoc Networks because its applications are in military. The MANET can not appropriately solve the problem of the security. Routing is also a big problem. All the routing protocols for Wireless Ad hoc Networks are need patches. No suitable and stable routing protocols until now.
  • 6. Energy consumption problem still cannot be solved even much of efforts have been done to it. All these prove that the Wireless Ad hoc Networks is a flawed architecture. Not only because it is almost never used in practice but also because there are several technical difficulty that cannot be conquered. Besides, all the Wireless Ad-hoc Networks are expected to be self-configuration. Self-configuration are referring to two aspects, one is during the first construction of the network, the self-configuration network is supposed to be forming the network itself. The other problem is when one host moves in or moves out the Wireless Ad-hoc networks, the network should have the ability to re-configuration the topology of the whole networks. Again we could see that although many works have been done on this topic, but unlucky, all the discussions do not give us a satisfied answer to the self-configuration question. The question is never tackled in systematic way. That again prove out argument that the Wireless Ad-hoc Networks is a fundamental flawed architecture, or else we should find the appropriated answer to the problems. However as the wireless and embedded computing technologies continue to advance, I do hope later, one day, we could build our wireless networks rely on some kinds of the Wireless Ad hoc Networks. References: [1] IEEE Std 802.11 – 1999: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications, Inst. Elec. Electron. Eng., New York, USA, 1999.ISBN 0-7381-1658-0 [2] IPN Progress Report, August 15, 2002, Analysis of Energy Consumption for Ad Hoc Wireless Sensor Networks Using a Bit-Meter-Per-Joule Metric, J.L.Gao [3] A Distributed Light-Weight Authentication Model for Ad-hoc Networks [4] M. Satyanarayanan. Fundamental challenges in mobile computing. submitted paper. [5] M. Haardt W. Mohr R. Becher, M. Dillinger. Broad- band wireless access and futurecommunication networks. Proceedings of the IEEE, 89(1), 2001. [6] S.Chessa, P.Santi, “Comparison Based System-Level Fault Diagnosis in Ad-Hoc Networks”, Proc. IEEE 20th Symp. on Reliable Distributed Systems (SRDS), New Orleans, pp. 257-266, October 2001 [7] Erik Skow, Jiejun Kong, Thomas Phan, Fred Cheng, Richard Guy, Rajive Bagrodia, Mario Gerla, and Songwu Lu, “A Security Architecture for Application Session Handoff” [8] Lidong Zhou, Zygmunt J. Haas, “Securing Ad Hoc Networks” [9] David B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts”, Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, December 1994. [10] Ljubica Blazevic, Levente Buttyan, Srdan Capkun, Silvia Giordano, Jean-Pierre, Hubaux and Jean-Yves Le Boudec, “Self-Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes” [11] J. A. Freebersyser and B. Leinerr, “A DoD perspective on mobile ad hoc networks,” in Ad Hoc Networking, C. E. Perkin, Ed. Addison-Wesley, 2001, pp. 29–51. [12] B. Leiner, R. Ruth, and A. R. Sastry, “Goals and challenges of the DARPA GloMo program,” IEEE Personal Communications, vol. 3, no. 6, pp. 34–43, December 1996. [14] R. Ruppe, S. Griswald, P. Walsh, and R. Martin, “Near term digital radio (NTDR) system,” in Proceedings of IEEE MILCOM, vol. 3, November 1997, pp. 1282–1287. [15] Yibin Liang, “Multipath “Fresnel Zone” Routing For Wireless Ad Hoc Networks” March 4, 2004