SlideShare ist ein Scribd-Unternehmen logo
1 von 26
By-
AMAN GUPTA
ANJAN KUMAR DEY
DEEPAK RAWAT
DURGESH VERMA
SUDEEP KUMAR GIRI
• Defining MANET
• Applications and Shortcomings
• Solutions To Shortcomings
• Future Technologies
• Future Vision
The basic definition is:
A mobile ad hoc network is a self configuring
infrastructure-less network of mobile devices connected
by wireless.
Actually, Each device in a MANET is free to move
independently in any direction, and will therefore
change its links to other devices frequently. Each must
forward traffic unrelated to its own use, and therefore be
a ROUTER.
The main applications of MANET that we have gathered
from the previous presentations are as follows:
• Mobile Conferencing- Ad hoc networks enable mobile conferencing for business
users who need to collaborate outside their office where no network infrastructure is
available.
• Personal Area And Home Networking- Mobile devices with Bluetooth or WLAN
cards can be easily configured to form an ad hoc network. With the Internet
connectivity at home, these devices can easily be connected to the Internet.
• Emergency Services- In some kind of disaster like earthquakes, hurricanes, fire, and
so forth, ad hoc networks can be easily deployed to provide solutions to emergency
services.
• Public Hotspots- In places like airports, train stations, coffee shops, and pubs, football
grounds, and malls, ad hoc networks provide users the ability to create their own
network and communicate with each other instantly.
• Military Applications- In battlefield, MANET can be deployed for
communications among the soldiers in the field. Different military units are
expected to communicate and cooperate with each other within a
specified area. In these kinds of low mobility environments, MANET is used
for communications where virtually no network infrastructure is available.
• Location-based Services- MANET when integrated with location-based
information provides useful services. GPS (Global Positioning System), a
satellite-based radio navigation system, is a very effective tool to
determine the physical location of a device. A mobile host in a MANET
when connected to a GPS receiver will be able to determine its current
physical location.
• Web Address/Secure Data Transfer: A company can
either provide a network for internal means where all the
employees can access the data at a request or during a
conference only certain members are allowed to access.
• Bandwidth Selection: A selection of bandwidth can be done
which can be alternatively increased to an extent suitable for
quicker data transfer. But, As we know bandwidth access is a
major problem, so the main task of a communicating device
could be, to get legal permit for that particular bandwidth.
Application tuning- From a MANET perspective, this policy
proposal must be balanced against the potential bandwidth impacts. If a
mobile node acquires a particularly “interesting” set of data, it would be
useful to quickly push it to a more advantaged node (in terms of
bandwidth) so as not to flood the typically more constrained MANET with
numerous requests for that data set. This is an example of application
tuning.
Artificial intelligence- AI advances in areas such as link selection,
optimal routing, and network self-monitoring hold great promise.
Processing power vs Algorithm Efficiency is the main MANET related aspect.
In the end, a hybrid approach of certain AI technologies residing in the
network layer and other residing in the application layer on individual
nodes would seem to be the likely outcome.
Open air laser links- Laser communications have many advantages over RF –
higher potential bandwidth (with multiplexing), longer range – but also suffer from many
disadvantages. The need for direct LOSS, relatively clear air, precise knowledge of the
location of the intended recipient (especially difficult when both nodes are moving), and the
relative fragility of laser optics in general make for a challenging set of limitations to
overcome for widespread application in MANETs.
Smart antenna design: Several MEMS and NEMS techniques are
under consideration for tuneable antennas designs. These technologies can
potentially make drastic improvements on bandwidth, and connectivity, as well
as enhancing LPI/LPD capabilities.
Network Security:
Every security issue that cabled networks have (viruses, worms, denial
of service attacks, etc.), wireless networks and MANETs have as well.
Since the exposed nature of wireless links leave them open to
exploitation by virtually anyone with limited exposure to themselves,
add-on encryption in the form of VPNs or external bulk signal
encryption will likely remain a fact of life for MANETs for the
foreseeable future.
Considering, a system where the cameras work on the basis of ad hoc network.
A structure can be formed out in which two types of devices will work, one
without cameras and others equipped with cameras.
It works on the simple network where each and
every device is connected to the other and no lag or loss of data is observed.
Talking about MANET, this technology can be implemented in
the hot pursuits or during the criminal chase operations, where
the inbuilt cameras can snap the pictures of the convict and
ultimately the pictures get shared on other cop cars and the
location can be more easily detected.
These inexpensive devices, once deployed, can offer accurate information about
temperature, chemicals, critical environmental conditions (e.g., generate wild fire
alarms), and behaviour patterns like movements of some animals, and so forth.
Sensors with RFID-based applications are used for tracking inventory and toll
collections. In addition, these devices can also be used for security applications.
Future application of it would be implementing it in the farmers
field effectively. So that the farmers could examine the different
climatic conditions from their respective places.
Data transfer is a must and we face certain
constraints while doing this these are-
• Capacity
• Efficiency
• Availability
• Security
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications

Weitere ähnliche Inhalte

Was ist angesagt?

localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Haya Saani
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networksAcad
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Ali Habeeb
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Software Defined Network (SDN)
Software Defined Network (SDN)Software Defined Network (SDN)
Software Defined Network (SDN)Ahmed Ayman
 

Was ist angesagt? (20)

localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networks
 
Global state routing
Global state routingGlobal state routing
Global state routing
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
6lowpan
6lowpan6lowpan
6lowpan
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Software Defined Network (SDN)
Software Defined Network (SDN)Software Defined Network (SDN)
Software Defined Network (SDN)
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 

Andere mochten auch

Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsMobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsSushant Kushwaha
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkTarun Varshney
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introductionChandra Meena
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd Iaetsd
 
Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETtelecomsutra
 
Mobile Crowdsensing with Mobile Agents
Mobile Crowdsensing with Mobile AgentsMobile Crowdsensing with Mobile Agents
Mobile Crowdsensing with Mobile AgentsTeemu Leppänen
 
IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16Spiro Vellore
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)eSAT Journals
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc networkitsjadu
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetyatin1988
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologiesshashi712
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Sohebuzzaman Khan
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc networkAman Saurabh
 

Andere mochten auch (20)

Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsMobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) Applications
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Manet
ManetManet
Manet
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introduction
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areas
 
Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNET
 
MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)
 
Mobile Crowdsensing with Mobile Agents
Mobile Crowdsensing with Mobile AgentsMobile Crowdsensing with Mobile Agents
Mobile Crowdsensing with Mobile Agents
 
IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
 
Manet
ManetManet
Manet
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manet
 
Mymanet
MymanetMymanet
Mymanet
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologies
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 
Ad hoc
Ad hocAd hoc
Ad hoc
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
 

Ähnlich wie mobile ad-hoc network (MANET) and its applications

To mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETTo mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETIJERA Editor
 
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
 
Window based smart antenna design
Window based smart antenna designWindow based smart antenna design
Window based smart antenna designijwmn
 
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...acijjournal
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Iqra khalil
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET Journal
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSnanocdac
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification DocumentationSambit Dutta
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 

Ähnlich wie mobile ad-hoc network (MANET) and its applications (20)

Unit 7
Unit 7Unit 7
Unit 7
 
Unit 7
Unit 7Unit 7
Unit 7
 
To mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETTo mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANET
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
 
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
Window based smart antenna design
Window based smart antenna designWindow based smart antenna design
Window based smart antenna design
 
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
 
5g TECHNOLOY
5g TECHNOLOY5g TECHNOLOY
5g TECHNOLOY
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
 
Unit 1
Unit 1Unit 1
Unit 1
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 

Mehr von Aman Gupta

Project Report- RFID Based Automated Toll Collection System using Arduino @ A...
Project Report- RFID Based Automated Toll Collection System using Arduino @ A...Project Report- RFID Based Automated Toll Collection System using Arduino @ A...
Project Report- RFID Based Automated Toll Collection System using Arduino @ A...Aman Gupta
 
Summer Internship Report For PLC Programming of Traffic light through Ladder ...
Summer Internship Report For PLC Programming of Traffic light through Ladder ...Summer Internship Report For PLC Programming of Traffic light through Ladder ...
Summer Internship Report For PLC Programming of Traffic light through Ladder ...Aman Gupta
 
PLC (programmable logic controllers) RTD and CNC PPT- powerpoint presentation...
PLC (programmable logic controllers) RTD and CNC PPT- powerpoint presentation...PLC (programmable logic controllers) RTD and CNC PPT- powerpoint presentation...
PLC (programmable logic controllers) RTD and CNC PPT- powerpoint presentation...Aman Gupta
 
PLC (programmable logic controllers) & CNC (COMPUTER NUMERIC CONTROL) Interns...
PLC (programmable logic controllers) & CNC (COMPUTER NUMERIC CONTROL) Interns...PLC (programmable logic controllers) & CNC (COMPUTER NUMERIC CONTROL) Interns...
PLC (programmable logic controllers) & CNC (COMPUTER NUMERIC CONTROL) Interns...Aman Gupta
 
GRAPHENE SYNTHESIS AND APPLICATION POSTER
GRAPHENE SYNTHESIS AND APPLICATION POSTERGRAPHENE SYNTHESIS AND APPLICATION POSTER
GRAPHENE SYNTHESIS AND APPLICATION POSTERAman Gupta
 
GRAPHENE SYNTHESIS AND ITS APPLICATIONS TERM PAPER PRESENTATION
GRAPHENE SYNTHESIS AND ITS APPLICATIONS TERM PAPER PRESENTATIONGRAPHENE SYNTHESIS AND ITS APPLICATIONS TERM PAPER PRESENTATION
GRAPHENE SYNTHESIS AND ITS APPLICATIONS TERM PAPER PRESENTATIONAman Gupta
 
GRAPHENE PRESENTATION
GRAPHENE PRESENTATIONGRAPHENE PRESENTATION
GRAPHENE PRESENTATIONAman Gupta
 
GRAPHENE: THE MIRACLE MATERIAL, SYNTHESIS AND APPLICATION RESEARCH PAPER PRES...
GRAPHENE: THE MIRACLE MATERIAL, SYNTHESIS AND APPLICATION RESEARCH PAPER PRES...GRAPHENE: THE MIRACLE MATERIAL, SYNTHESIS AND APPLICATION RESEARCH PAPER PRES...
GRAPHENE: THE MIRACLE MATERIAL, SYNTHESIS AND APPLICATION RESEARCH PAPER PRES...Aman Gupta
 

Mehr von Aman Gupta (9)

Project Report- RFID Based Automated Toll Collection System using Arduino @ A...
Project Report- RFID Based Automated Toll Collection System using Arduino @ A...Project Report- RFID Based Automated Toll Collection System using Arduino @ A...
Project Report- RFID Based Automated Toll Collection System using Arduino @ A...
 
Summer Internship Report For PLC Programming of Traffic light through Ladder ...
Summer Internship Report For PLC Programming of Traffic light through Ladder ...Summer Internship Report For PLC Programming of Traffic light through Ladder ...
Summer Internship Report For PLC Programming of Traffic light through Ladder ...
 
PLC (programmable logic controllers) RTD and CNC PPT- powerpoint presentation...
PLC (programmable logic controllers) RTD and CNC PPT- powerpoint presentation...PLC (programmable logic controllers) RTD and CNC PPT- powerpoint presentation...
PLC (programmable logic controllers) RTD and CNC PPT- powerpoint presentation...
 
PLC (programmable logic controllers) & CNC (COMPUTER NUMERIC CONTROL) Interns...
PLC (programmable logic controllers) & CNC (COMPUTER NUMERIC CONTROL) Interns...PLC (programmable logic controllers) & CNC (COMPUTER NUMERIC CONTROL) Interns...
PLC (programmable logic controllers) & CNC (COMPUTER NUMERIC CONTROL) Interns...
 
GRAPHENE SYNTHESIS AND APPLICATION POSTER
GRAPHENE SYNTHESIS AND APPLICATION POSTERGRAPHENE SYNTHESIS AND APPLICATION POSTER
GRAPHENE SYNTHESIS AND APPLICATION POSTER
 
GRAPHENE SYNTHESIS AND ITS APPLICATIONS TERM PAPER PRESENTATION
GRAPHENE SYNTHESIS AND ITS APPLICATIONS TERM PAPER PRESENTATIONGRAPHENE SYNTHESIS AND ITS APPLICATIONS TERM PAPER PRESENTATION
GRAPHENE SYNTHESIS AND ITS APPLICATIONS TERM PAPER PRESENTATION
 
GRAPHENE PRESENTATION
GRAPHENE PRESENTATIONGRAPHENE PRESENTATION
GRAPHENE PRESENTATION
 
GRAPHENE: THE MIRACLE MATERIAL, SYNTHESIS AND APPLICATION RESEARCH PAPER PRES...
GRAPHENE: THE MIRACLE MATERIAL, SYNTHESIS AND APPLICATION RESEARCH PAPER PRES...GRAPHENE: THE MIRACLE MATERIAL, SYNTHESIS AND APPLICATION RESEARCH PAPER PRES...
GRAPHENE: THE MIRACLE MATERIAL, SYNTHESIS AND APPLICATION RESEARCH PAPER PRES...
 
Aman@Resume
Aman@ResumeAman@Resume
Aman@Resume
 

Kürzlich hochgeladen

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 

Kürzlich hochgeladen (20)

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 

mobile ad-hoc network (MANET) and its applications

  • 1. By- AMAN GUPTA ANJAN KUMAR DEY DEEPAK RAWAT DURGESH VERMA SUDEEP KUMAR GIRI
  • 2. • Defining MANET • Applications and Shortcomings • Solutions To Shortcomings • Future Technologies • Future Vision
  • 3.
  • 4. The basic definition is: A mobile ad hoc network is a self configuring infrastructure-less network of mobile devices connected by wireless. Actually, Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a ROUTER.
  • 5.
  • 6. The main applications of MANET that we have gathered from the previous presentations are as follows: • Mobile Conferencing- Ad hoc networks enable mobile conferencing for business users who need to collaborate outside their office where no network infrastructure is available. • Personal Area And Home Networking- Mobile devices with Bluetooth or WLAN cards can be easily configured to form an ad hoc network. With the Internet connectivity at home, these devices can easily be connected to the Internet. • Emergency Services- In some kind of disaster like earthquakes, hurricanes, fire, and so forth, ad hoc networks can be easily deployed to provide solutions to emergency services. • Public Hotspots- In places like airports, train stations, coffee shops, and pubs, football grounds, and malls, ad hoc networks provide users the ability to create their own network and communicate with each other instantly.
  • 7. • Military Applications- In battlefield, MANET can be deployed for communications among the soldiers in the field. Different military units are expected to communicate and cooperate with each other within a specified area. In these kinds of low mobility environments, MANET is used for communications where virtually no network infrastructure is available. • Location-based Services- MANET when integrated with location-based information provides useful services. GPS (Global Positioning System), a satellite-based radio navigation system, is a very effective tool to determine the physical location of a device. A mobile host in a MANET when connected to a GPS receiver will be able to determine its current physical location.
  • 8.
  • 9.
  • 10. • Web Address/Secure Data Transfer: A company can either provide a network for internal means where all the employees can access the data at a request or during a conference only certain members are allowed to access. • Bandwidth Selection: A selection of bandwidth can be done which can be alternatively increased to an extent suitable for quicker data transfer. But, As we know bandwidth access is a major problem, so the main task of a communicating device could be, to get legal permit for that particular bandwidth.
  • 11.
  • 12.
  • 13. Application tuning- From a MANET perspective, this policy proposal must be balanced against the potential bandwidth impacts. If a mobile node acquires a particularly “interesting” set of data, it would be useful to quickly push it to a more advantaged node (in terms of bandwidth) so as not to flood the typically more constrained MANET with numerous requests for that data set. This is an example of application tuning. Artificial intelligence- AI advances in areas such as link selection, optimal routing, and network self-monitoring hold great promise. Processing power vs Algorithm Efficiency is the main MANET related aspect. In the end, a hybrid approach of certain AI technologies residing in the network layer and other residing in the application layer on individual nodes would seem to be the likely outcome.
  • 14. Open air laser links- Laser communications have many advantages over RF – higher potential bandwidth (with multiplexing), longer range – but also suffer from many disadvantages. The need for direct LOSS, relatively clear air, precise knowledge of the location of the intended recipient (especially difficult when both nodes are moving), and the relative fragility of laser optics in general make for a challenging set of limitations to overcome for widespread application in MANETs.
  • 15. Smart antenna design: Several MEMS and NEMS techniques are under consideration for tuneable antennas designs. These technologies can potentially make drastic improvements on bandwidth, and connectivity, as well as enhancing LPI/LPD capabilities.
  • 16.
  • 17. Network Security: Every security issue that cabled networks have (viruses, worms, denial of service attacks, etc.), wireless networks and MANETs have as well. Since the exposed nature of wireless links leave them open to exploitation by virtually anyone with limited exposure to themselves, add-on encryption in the form of VPNs or external bulk signal encryption will likely remain a fact of life for MANETs for the foreseeable future.
  • 18.
  • 19. Considering, a system where the cameras work on the basis of ad hoc network. A structure can be formed out in which two types of devices will work, one without cameras and others equipped with cameras. It works on the simple network where each and every device is connected to the other and no lag or loss of data is observed.
  • 20. Talking about MANET, this technology can be implemented in the hot pursuits or during the criminal chase operations, where the inbuilt cameras can snap the pictures of the convict and ultimately the pictures get shared on other cop cars and the location can be more easily detected.
  • 21. These inexpensive devices, once deployed, can offer accurate information about temperature, chemicals, critical environmental conditions (e.g., generate wild fire alarms), and behaviour patterns like movements of some animals, and so forth. Sensors with RFID-based applications are used for tracking inventory and toll collections. In addition, these devices can also be used for security applications.
  • 22. Future application of it would be implementing it in the farmers field effectively. So that the farmers could examine the different climatic conditions from their respective places.
  • 23. Data transfer is a must and we face certain constraints while doing this these are- • Capacity • Efficiency • Availability • Security