This document discusses mobile ad-hoc networks (MANETs) and wireless sensor networks (WSNs). It defines a MANET as a network formed spontaneously by wireless mobile nodes without any preexisting infrastructure. Key characteristics of MANETs include dynamic topologies, energy-constrained operation, limited bandwidth, and security threats. Applications include collaborative work, crisis management, and personal area networks. The document also describes different routing protocols for MANETs including table-driven, source-initiated, and hybrid protocols. It then discusses challenges in WSNs such as ad-hoc deployment, limited resources, scalability, and fault tolerance and how these influence routing protocol design.
This document provides notes on ad hoc networks from R N S Institute of Technology. It begins with an introduction comparing cellular and ad hoc wireless networks. Ad hoc networks are infrastructureless networks that use multi-hop radio relaying. The document then discusses applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also covers key issues in ad hoc networks including medium access, routing, multicasting, and energy management. The first unit focuses on these introductory concepts and applications of ad hoc networks.
This document discusses wireless communications and ad hoc networks. It begins with an introduction to wireless communications, including the generations of wireless technologies and electromagnetic spectrum used. It then covers wireless computer networks, focusing on wireless local area networks (WLANs) and transmission techniques like infrared and spread spectrum. The document explains the IEEE 802.11 standard architecture, including components like access points, basic service sets, and extended service sets. It discusses security issues and considerations for wireless networks. Finally, it defines ad hoc networks as decentralized peer-to-peer networks without a central access point, set up temporarily to meet immediate needs.
Ad hoc wireless networks allow devices to connect and communicate with each other without a centralized access point. Nodes in an ad hoc network relay messages through intermediate hops to reach destinations. Examples include Bluetooth networks and wireless mesh networks. Issues in ad hoc networks include medium access control, routing with mobility and bandwidth constraints, and providing quality of service guarantees.
1. Vehicular ad hoc networks (VANETs) use vehicle-to-vehicle and vehicle-to-infrastructure communication to share safety information, improving road safety.
2. VANETs allow vehicles to form a temporary network without any preexisting infrastructure, distributing real-time information to avoid accidents.
3. Current research focuses on applications for traffic scenarios, as well as addressing challenges relating to network topology, routing mechanisms, security, and minimizing power consumption.
This document provides guidance on writing a research paper, beginning with choosing a topic and developing a thesis statement. It outlines the steps of writing a paper, including selecting and analyzing primary and secondary sources, compiling information, avoiding plagiarism through proper paraphrasing and citation, and including a bibliography. The document emphasizes writing an outline before starting the paper, using multiple credible source types, and thoroughly proofreading the final draft. Research papers require following a process of topic selection, research, organization, citation, and revision to effectively communicate new information and ideas.
The document discusses different types of wireless networks including Mobile Ad Hoc Networks (MANETs), Wireless Sensor Networks (WSNs), and Vehicular Ad Hoc Networks (VANETs). It provides an overview of the key characteristics of each network type, such as their topology, communication paradigms, and constraints. MANETs allow nodes to connect and communicate in a decentralized manner without infrastructure support. WSNs consist of dense deployments of low-cost sensor nodes that collect and transmit data. VANETs are similar to MANETs but involve vehicle-to-vehicle communication and have more predictable mobility patterns.
The document discusses ad hoc networks and routing protocols. It begins with an introduction to mobile ad hoc networks (MANETs), including their characteristics and applications. Several categories of routing protocols are described, including table-driven protocols like Destination Sequenced Distance Vector Routing (DSDV) and Cluster-head Gateway Switch Routing (CGSR), as well as source-initiated on-demand protocols like Dynamic Source Routing (DSR). The document provides examples and explanations of how these different protocols perform routing in MANETs.
This document provides notes on ad hoc networks from R N S Institute of Technology. It begins with an introduction comparing cellular and ad hoc wireless networks. Ad hoc networks are infrastructureless networks that use multi-hop radio relaying. The document then discusses applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also covers key issues in ad hoc networks including medium access, routing, multicasting, and energy management. The first unit focuses on these introductory concepts and applications of ad hoc networks.
This document discusses wireless communications and ad hoc networks. It begins with an introduction to wireless communications, including the generations of wireless technologies and electromagnetic spectrum used. It then covers wireless computer networks, focusing on wireless local area networks (WLANs) and transmission techniques like infrared and spread spectrum. The document explains the IEEE 802.11 standard architecture, including components like access points, basic service sets, and extended service sets. It discusses security issues and considerations for wireless networks. Finally, it defines ad hoc networks as decentralized peer-to-peer networks without a central access point, set up temporarily to meet immediate needs.
Ad hoc wireless networks allow devices to connect and communicate with each other without a centralized access point. Nodes in an ad hoc network relay messages through intermediate hops to reach destinations. Examples include Bluetooth networks and wireless mesh networks. Issues in ad hoc networks include medium access control, routing with mobility and bandwidth constraints, and providing quality of service guarantees.
1. Vehicular ad hoc networks (VANETs) use vehicle-to-vehicle and vehicle-to-infrastructure communication to share safety information, improving road safety.
2. VANETs allow vehicles to form a temporary network without any preexisting infrastructure, distributing real-time information to avoid accidents.
3. Current research focuses on applications for traffic scenarios, as well as addressing challenges relating to network topology, routing mechanisms, security, and minimizing power consumption.
This document provides guidance on writing a research paper, beginning with choosing a topic and developing a thesis statement. It outlines the steps of writing a paper, including selecting and analyzing primary and secondary sources, compiling information, avoiding plagiarism through proper paraphrasing and citation, and including a bibliography. The document emphasizes writing an outline before starting the paper, using multiple credible source types, and thoroughly proofreading the final draft. Research papers require following a process of topic selection, research, organization, citation, and revision to effectively communicate new information and ideas.
The document discusses different types of wireless networks including Mobile Ad Hoc Networks (MANETs), Wireless Sensor Networks (WSNs), and Vehicular Ad Hoc Networks (VANETs). It provides an overview of the key characteristics of each network type, such as their topology, communication paradigms, and constraints. MANETs allow nodes to connect and communicate in a decentralized manner without infrastructure support. WSNs consist of dense deployments of low-cost sensor nodes that collect and transmit data. VANETs are similar to MANETs but involve vehicle-to-vehicle communication and have more predictable mobility patterns.
The document discusses ad hoc networks and routing protocols. It begins with an introduction to mobile ad hoc networks (MANETs), including their characteristics and applications. Several categories of routing protocols are described, including table-driven protocols like Destination Sequenced Distance Vector Routing (DSDV) and Cluster-head Gateway Switch Routing (CGSR), as well as source-initiated on-demand protocols like Dynamic Source Routing (DSR). The document provides examples and explanations of how these different protocols perform routing in MANETs.
The document discusses ad hoc networks. It defines an ad hoc network as a temporary network connection between devices without fixed infrastructure. Key characteristics of ad hoc networks include dynamic topology, nodes that can freely join and leave, multi-hop routing, and limited bandwidth. The document compares ad hoc networks to wired and managed wireless networks. It also discusses different types of ad hoc networks and routing protocols like DSR and AODV. Applications of ad hoc networks include military operations, conferences, and emergency response situations.
This document discusses the origins and development of ad hoc networks. It describes how packet radio networks (PRNETs) in the 1970s, developed by DARPA, were the first generation of ad hoc networks. PRNETs used multi-hop routing between mobile radio terminals and packet radios to communicate without fixed infrastructure. The document outlines the key components and routing techniques of PRNETs, including point-to-point and broadcast routing. It also discusses how subsequent generations in the 1980s-1990s focused on improving performance, scalability, and developing commercial applications like Bluetooth.
This document discusses various topics related to ad-hoc wireless networks including wireless network concepts, radio propagation mechanisms, characteristics of wireless channels, cellular networks, ad hoc networks, medium access control, routing protocols, multicasting, and transport layer protocols for ad hoc networks. It provides classifications and examples of different types of network architectures, protocols, and issues/challenges in ad hoc wireless networks.
MANET stands for mobile ad hoc network. It is a type of wireless network that can change locations and configure itself without a centralized administration. Nodes in a MANET can connect to each other to form a temporary network without any existing network infrastructure. Routing in MANETs is challenging due to the dynamic network topology, asymmetric links, and interference. Common routing algorithms for MANETs include distance vector, link state, and various protocols designed specifically for MANETs to handle mobility.
The document discusses ad hoc wireless networks and their applications. It describes key characteristics of ad hoc networks including being self-organizing and lacking centralized administration. It outlines several applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also examines important technical issues for ad hoc networks related to medium access, routing, multicasting, transport protocols, energy management, and deployment considerations.
Mobile Ad hoc Networks (MANETs) allow devices to connect spontaneously without infrastructure by acting as both hosts and routers, forwarding traffic in a multi-hop fashion. They face challenges from dynamic topology, limited bandwidth and security, and use reactive routing protocols like Dynamic Source Routing (DSR) that discover routes on demand through flooding route requests. MANETs have applications in military operations, disaster relief, vehicular networks, and personal area networks.
The document summarizes routing security in ad hoc wireless networks. It discusses the characteristics of ad hoc wireless networks and routing protocols used, including proactive, reactive, and hybrid protocols. It then covers various security attacks on routing protocols like passive attacks, active attacks, impersonation attacks, and attacks using modification or fabrication. Finally, it discusses some security mechanisms and routing protocols that aim to provide security, such as SEAD, Ariadne, SAR, and SRP.
An ad-hoc wireless network is a collection of wireless nodes that can dynamically be set up anywhere and anytime without using an existing network infrastructure or centralized administration. There are different types including wireless mesh networks, wireless sensor networks, and hybrid wireless networks. Wireless mesh networks provide many paths for data transfer between sources and destinations with advantages like high data rates and scalability. Wireless sensor networks consist of sensor nodes that monitor regions without infrastructure by working together. Hybrid wireless networks incorporate properties of multi-hop relaying along with existing infrastructure for higher capacity and flexibility. Applications include monitoring, tracking, location services, and future scopes involve connecting more devices and enabling access to real-world information.
Mobile ad-hoc networks (MANETs) allow devices to connect without a centralized infrastructure by forming a multi-hop wireless network. MANETs are useful in situations where infrastructure is unavailable, expensive to set up, or where rapid deployment is needed. Routing in MANETs is challenging due to the dynamic topology, asymmetric wireless links, and interference. Common routing protocols for MANETs include DSDV, DSR, AODV, and protocols that use clustering or geographic position information to improve routing performance.
This document summarizes and compares various medium access control (MAC) protocols for wireless sensor networks. It begins by describing the properties and challenges of MAC layers in sensor networks, including sources of energy waste like idle listening, collisions, and overhearing. It then classifies and describes different types of MAC protocols for sensor networks, including contention-based, scheduling-based, and channel polling-based protocols. It also introduces cross-layer protocols and compares MAC protocols based on type, cross-layer support, and scheduling. Finally, it proposes future research directions for MAC protocol design in wireless sensor networks.
Definition
A decentralized type of wireless network, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, It can turn the dream of networking at any place and at time into reality. We are almost there by the way .Ex- Bluetooth enabled mobile phones such as 3G, laptops, handheld digital devices, personal digital assistants, or wearable computers
The document discusses ad-hoc networks and their key characteristics. It describes several challenges in ad-hoc networks including limited battery power, dynamic network topology, and scalability issues. It also summarizes several ad-hoc network routing protocols (e.g. DSDV, AODV, DSR), addressing both table-driven and on-demand approaches. Additionally, it outlines some ad-hoc MAC protocols like MACA and PAMAS that aim to manage shared wireless medium access.
This document provides an overview of wireless ad-hoc networks. It discusses the definition and types of multi-hop wireless networks. Some key technical challenges for ad-hoc networks are limited wireless range, mobility, and energy constraints. The document reviews several media access and routing protocols used in ad-hoc networks, including MACA, DSDV, AODV and DSR. It also discusses providing quality of service in ad-hoc networks and some of the challenges in routing, maintenance and variable resources. In conclusion, the document states that flexibility, low cost and applications make ad-hoc networks an essential part of future pervasive computing environments.
The document discusses mobile ad-hoc networks (MANETs). It provides an introduction to MANETs and their history. It describes different routing protocols for MANETs including reactive, proactive, and hybrid protocols. It discusses some problems with MANETs and applications of MANETs such as for business meetings. It proposes a solution for secure data transmission in MANETs and concludes with a comparison of MANET routing protocols.
Lecture 1 mobile and adhoc network- introductionChandra Meena
This document provides an overview of a course on mobile and ad hoc networks. It lists two textbooks that will be used and states that the goal is to cover fundamental design issues and solutions for network architecture and protocols. It also lists some related websites and outlines the objectives of chapters that will introduce wireless communication technologies, network standards, and multiple access techniques for ad hoc networks.
UNIT IV MOBILE AD-HOC NETWORKS
Ad-Hoc Basic Concepts – Characteristics – Applications – Design Issues – Routing – Essential of Traditional Routing Protocols –Popular Routing Protocols – Vehicular Ad Hoc networks ( VANET) – MANET Vs VANET – Security
Mobile ad-hoc networks (MANETs) are self-configuring networks of mobile routers connected by wireless links. They form a random, changing topology as routers move freely and unpredictably. MANETs are suitable for emergency situations where infrastructure is not available. They use routing protocols that are either table-driven and proactively maintain routes, or on-demand driven where routes are created as needed. Examples of protocols discussed are DSDV, AODV, DSR, and TORA. MANETs face challenges from their changing topology, but enable communication in infrastructure-less scenarios.
The document discusses ad hoc networks and wireless sensor networks. It defines an ad hoc network as a temporary network composed of mobile nodes without preexisting infrastructure that is self-organizing. Wireless sensor networks are introduced as a collection of sensor nodes densely deployed to monitor conditions and cooperatively pass data back to central nodes. The document outlines key characteristics of both networks including their temporary and adaptive nature, multi-hop routing, and challenges of mobility, power constraints, and dynamic topology changes.
This document provides an introduction to mobile ad hoc networks (MANETs) and discusses associated research issues. It defines MANETs as infrastructureless, self-configuring networks formed spontaneously by wireless devices. Key characteristics of MANETs include dynamic topology, limited bandwidth, and lack of centralized management. The document outlines several research areas in MANETs, including power management, MAC layer protocols, routing, transport protocols, security, and data management. It discusses challenges in each area posed by the mobile and decentralized nature of MANETs.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
This document proposes a new theoretical approach to location based power aware routing in mobile ad hoc networks (MANETs). It aims to extend the network lifetime by improving power utilization during routing. The approach uses nodes' location information, remaining battery power, and bandwidth status to assign link stability and select routes with lower "uptime values" and minimum bandwidth over time. This is hypothesized to better utilize nodes' power sources and bandwidth. The document outlines calculating a root up time factor for each node based on its power backup and required power, and only using nodes with maximum backup. It concludes future work will design and validate a new protocol based on this approach.
The document discusses ad hoc networks. It defines an ad hoc network as a temporary network connection between devices without fixed infrastructure. Key characteristics of ad hoc networks include dynamic topology, nodes that can freely join and leave, multi-hop routing, and limited bandwidth. The document compares ad hoc networks to wired and managed wireless networks. It also discusses different types of ad hoc networks and routing protocols like DSR and AODV. Applications of ad hoc networks include military operations, conferences, and emergency response situations.
This document discusses the origins and development of ad hoc networks. It describes how packet radio networks (PRNETs) in the 1970s, developed by DARPA, were the first generation of ad hoc networks. PRNETs used multi-hop routing between mobile radio terminals and packet radios to communicate without fixed infrastructure. The document outlines the key components and routing techniques of PRNETs, including point-to-point and broadcast routing. It also discusses how subsequent generations in the 1980s-1990s focused on improving performance, scalability, and developing commercial applications like Bluetooth.
This document discusses various topics related to ad-hoc wireless networks including wireless network concepts, radio propagation mechanisms, characteristics of wireless channels, cellular networks, ad hoc networks, medium access control, routing protocols, multicasting, and transport layer protocols for ad hoc networks. It provides classifications and examples of different types of network architectures, protocols, and issues/challenges in ad hoc wireless networks.
MANET stands for mobile ad hoc network. It is a type of wireless network that can change locations and configure itself without a centralized administration. Nodes in a MANET can connect to each other to form a temporary network without any existing network infrastructure. Routing in MANETs is challenging due to the dynamic network topology, asymmetric links, and interference. Common routing algorithms for MANETs include distance vector, link state, and various protocols designed specifically for MANETs to handle mobility.
The document discusses ad hoc wireless networks and their applications. It describes key characteristics of ad hoc networks including being self-organizing and lacking centralized administration. It outlines several applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also examines important technical issues for ad hoc networks related to medium access, routing, multicasting, transport protocols, energy management, and deployment considerations.
Mobile Ad hoc Networks (MANETs) allow devices to connect spontaneously without infrastructure by acting as both hosts and routers, forwarding traffic in a multi-hop fashion. They face challenges from dynamic topology, limited bandwidth and security, and use reactive routing protocols like Dynamic Source Routing (DSR) that discover routes on demand through flooding route requests. MANETs have applications in military operations, disaster relief, vehicular networks, and personal area networks.
The document summarizes routing security in ad hoc wireless networks. It discusses the characteristics of ad hoc wireless networks and routing protocols used, including proactive, reactive, and hybrid protocols. It then covers various security attacks on routing protocols like passive attacks, active attacks, impersonation attacks, and attacks using modification or fabrication. Finally, it discusses some security mechanisms and routing protocols that aim to provide security, such as SEAD, Ariadne, SAR, and SRP.
An ad-hoc wireless network is a collection of wireless nodes that can dynamically be set up anywhere and anytime without using an existing network infrastructure or centralized administration. There are different types including wireless mesh networks, wireless sensor networks, and hybrid wireless networks. Wireless mesh networks provide many paths for data transfer between sources and destinations with advantages like high data rates and scalability. Wireless sensor networks consist of sensor nodes that monitor regions without infrastructure by working together. Hybrid wireless networks incorporate properties of multi-hop relaying along with existing infrastructure for higher capacity and flexibility. Applications include monitoring, tracking, location services, and future scopes involve connecting more devices and enabling access to real-world information.
Mobile ad-hoc networks (MANETs) allow devices to connect without a centralized infrastructure by forming a multi-hop wireless network. MANETs are useful in situations where infrastructure is unavailable, expensive to set up, or where rapid deployment is needed. Routing in MANETs is challenging due to the dynamic topology, asymmetric wireless links, and interference. Common routing protocols for MANETs include DSDV, DSR, AODV, and protocols that use clustering or geographic position information to improve routing performance.
This document summarizes and compares various medium access control (MAC) protocols for wireless sensor networks. It begins by describing the properties and challenges of MAC layers in sensor networks, including sources of energy waste like idle listening, collisions, and overhearing. It then classifies and describes different types of MAC protocols for sensor networks, including contention-based, scheduling-based, and channel polling-based protocols. It also introduces cross-layer protocols and compares MAC protocols based on type, cross-layer support, and scheduling. Finally, it proposes future research directions for MAC protocol design in wireless sensor networks.
Definition
A decentralized type of wireless network, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, It can turn the dream of networking at any place and at time into reality. We are almost there by the way .Ex- Bluetooth enabled mobile phones such as 3G, laptops, handheld digital devices, personal digital assistants, or wearable computers
The document discusses ad-hoc networks and their key characteristics. It describes several challenges in ad-hoc networks including limited battery power, dynamic network topology, and scalability issues. It also summarizes several ad-hoc network routing protocols (e.g. DSDV, AODV, DSR), addressing both table-driven and on-demand approaches. Additionally, it outlines some ad-hoc MAC protocols like MACA and PAMAS that aim to manage shared wireless medium access.
This document provides an overview of wireless ad-hoc networks. It discusses the definition and types of multi-hop wireless networks. Some key technical challenges for ad-hoc networks are limited wireless range, mobility, and energy constraints. The document reviews several media access and routing protocols used in ad-hoc networks, including MACA, DSDV, AODV and DSR. It also discusses providing quality of service in ad-hoc networks and some of the challenges in routing, maintenance and variable resources. In conclusion, the document states that flexibility, low cost and applications make ad-hoc networks an essential part of future pervasive computing environments.
The document discusses mobile ad-hoc networks (MANETs). It provides an introduction to MANETs and their history. It describes different routing protocols for MANETs including reactive, proactive, and hybrid protocols. It discusses some problems with MANETs and applications of MANETs such as for business meetings. It proposes a solution for secure data transmission in MANETs and concludes with a comparison of MANET routing protocols.
Lecture 1 mobile and adhoc network- introductionChandra Meena
This document provides an overview of a course on mobile and ad hoc networks. It lists two textbooks that will be used and states that the goal is to cover fundamental design issues and solutions for network architecture and protocols. It also lists some related websites and outlines the objectives of chapters that will introduce wireless communication technologies, network standards, and multiple access techniques for ad hoc networks.
UNIT IV MOBILE AD-HOC NETWORKS
Ad-Hoc Basic Concepts – Characteristics – Applications – Design Issues – Routing – Essential of Traditional Routing Protocols –Popular Routing Protocols – Vehicular Ad Hoc networks ( VANET) – MANET Vs VANET – Security
Mobile ad-hoc networks (MANETs) are self-configuring networks of mobile routers connected by wireless links. They form a random, changing topology as routers move freely and unpredictably. MANETs are suitable for emergency situations where infrastructure is not available. They use routing protocols that are either table-driven and proactively maintain routes, or on-demand driven where routes are created as needed. Examples of protocols discussed are DSDV, AODV, DSR, and TORA. MANETs face challenges from their changing topology, but enable communication in infrastructure-less scenarios.
The document discusses ad hoc networks and wireless sensor networks. It defines an ad hoc network as a temporary network composed of mobile nodes without preexisting infrastructure that is self-organizing. Wireless sensor networks are introduced as a collection of sensor nodes densely deployed to monitor conditions and cooperatively pass data back to central nodes. The document outlines key characteristics of both networks including their temporary and adaptive nature, multi-hop routing, and challenges of mobility, power constraints, and dynamic topology changes.
This document provides an introduction to mobile ad hoc networks (MANETs) and discusses associated research issues. It defines MANETs as infrastructureless, self-configuring networks formed spontaneously by wireless devices. Key characteristics of MANETs include dynamic topology, limited bandwidth, and lack of centralized management. The document outlines several research areas in MANETs, including power management, MAC layer protocols, routing, transport protocols, security, and data management. It discusses challenges in each area posed by the mobile and decentralized nature of MANETs.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
This document proposes a new theoretical approach to location based power aware routing in mobile ad hoc networks (MANETs). It aims to extend the network lifetime by improving power utilization during routing. The approach uses nodes' location information, remaining battery power, and bandwidth status to assign link stability and select routes with lower "uptime values" and minimum bandwidth over time. This is hypothesized to better utilize nodes' power sources and bandwidth. The document outlines calculating a root up time factor for each node based on its power backup and required power, and only using nodes with maximum backup. It concludes future work will design and validate a new protocol based on this approach.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
This document proposes a modification to the Dynamic Source Routing (DSR) protocol called Modified DSR (MDSR) to reduce routing overhead caused by frequent link breakages in mobile ad hoc networks. MDSR adds a link breakage prediction algorithm that uses signal strength measurements to predict when a link may break. Intermediate nodes monitor signal strength and warn the source node if a link may soon break. This allows the source to proactively rebuild the route or switch to a backup route to avoid disconnection. Simulation results showed MDSR can reduce the number of dropped packets by at least 25% compared to standard DSR. The document also discusses how DSR works and the proposed proactive route maintenance concept in M
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
This document proposes a modification to the Dynamic Source Routing (DSR) protocol called Modified DSR (MDSR) to reduce routing overhead caused by frequent link breakages in mobile ad hoc networks. MDSR adds a link breakage prediction algorithm that uses signal strength measurements to predict when a link may break. Intermediate nodes monitor signal strength and warn the source node if a link may soon break. This allows the source to proactively rebuild the route or switch to a backup route to avoid disconnection. Simulation results showed MDSR can reduce the number of dropped packets by at least 25% compared to standard DSR. The document also discusses how DSR works and the proposed proactive route maintenance concept in M
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
Mobile Ad-hoc network (MANET) is type of wireless network in which group of mobile nodes co-operate to forward the data packets to their neighbours without using centralized authority or any physical medium like cables or base station.
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
This document analyzes the performance of two reactive MANET routing protocols, DSR and DSDV, under TCP Vegas and TCP Newreno variants through simulations. The simulations measured packet delivery ratio, average end-to-end delay, and total packets dropped. The results showed that DSDV generally had a higher packet delivery ratio but also higher end-to-end delay and more packet drops compared to DSR. DSR performed better in terms of delay and drops due to its on-demand route discovery, while DSDV maintained more consistent routes leading to better packet delivery.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
This document summarizes a research paper that examines the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSR, and DSDV. Through network simulations varying the number of nodes and connections, the paper evaluates the routing protocols based on average end-to-end delay, normalized routing load, packet delivery fraction, and throughput. The simulation results show that AODV generally has better performance than DSR and DSDV in terms of lower delay, higher packet delivery, and better throughput, especially as the network size increases. However, DSDV maintains more consistent performance than the reactive protocols as network conditions change.
This document provides an overview of mobile ad hoc networks (MANETs). It defines MANETs as wireless networks without fixed infrastructure where nodes are free to move and dynamically self-organize. Key points:
- MANETs are formed spontaneously as nodes connect via wireless links without centralized administration.
- Each node acts as a router, forwarding data for other nodes. Network topology changes frequently as nodes move.
- Examples of MANET applications include military operations, emergency response, classroom environments, and home/office networks.
- Challenges for MANET routing protocols include dynamic topology, limited resources, and network security. Common routing approaches include proactive, reactive, and geographic routing.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive
routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer
solutions-TCP over Ad hoc wireless Networks
This document provides an introduction and overview of a dissertation submitted by Rachna to partially fulfill the requirements for a Master of Technology degree in Computer Science and Engineering. The dissertation focuses on improving the route discovery phase in multi-path Dynamic Source Routing (DSR) for mobile ad-hoc networks using a hybrid ant colony optimization approach. Key topics covered in the introductory chapters include an introduction to mobile ad-hoc networks, categories of ad-hoc routing protocols including DSR and AODV, characteristics and design challenges of MANETs, and concepts related to route discovery and maintenance in DSR.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics, such as dynamic topology and limited resources. It then classifies routing protocols as either proactive (table-driven) or reactive (on-demand) and describes several examples of each type. Proactive protocols maintain up-to-date routing tables through periodic updates but incur more overhead. Reactive protocols discover routes on demand but add latency. The document provides details on popular protocols like DSDV, AODV, DSR and TORA, explaining their route discovery, maintenance and metrics.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics. It then classifies routing protocols into proactive (table-driven) and reactive (on-demand) categories. For each category, several representative protocols are described in detail, including DSDV, WRP, CGSR, DSR, AODV, ABR, SSA, and TORA. Their routing mechanisms and approaches to route discovery and maintenance are outlined. The document aims to provide an overview of major MANET routing protocols to help determine the most suitable ones for different network conditions.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
This document summarizes a research paper on load balancing protocols in mobile ad hoc networks (MANETs). It begins with an abstract of the paper and introduces MANETs and the importance of load balancing in them given nodes' limited resources. It then discusses various load metrics and load balancing routing protocols. Specific protocols covered include Ad Hoc On-Demand Distance Vector (AODV), Ad hoc On-Demand Multipath Distance Vector (AOMDV), and Scalable Multipath On-Demand Routing (SMORT). AOMDV and SMORT aim to compute multiple loop-free paths during route discovery to help balance traffic load across multiple paths. The document concludes that load balanced routing protocols use different metrics to select routes
This document summarizes a research paper that surveyed detection and prevention mechanisms for flooding attacks in mobile ad hoc networks (MANETs). It began with an abstract that described how MANETs are increasingly being used but also face security threats like flooding attacks. It then provided definitions and characteristics of MANETs and described two common routing protocols: AODV and OLSR. The paper discussed flooding attacks and different detection and prevention schemes that have been proposed. It concluded with a survey of these mechanisms to detect and mitigate flooding attacks in MANETs.
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
This document analyzes the performance of the AODV, DSR, and IERP routing protocols in a mobile ad hoc network (MANET) with varying constant bit rate (CBR) traffic loads. It conducts simulations in QualNet 6.1 and evaluates the protocols based on average end-to-end delay, throughput, average jitter, and packet delivery ratio under different CBR values. The results show that AODV generally performs best with low and stable delay, jitter and high throughput and delivery ratio. DSR has better performance than IERP for throughput and delivery ratio. IERP shows the worst performance for delay and jitter as CBR increases. The document concludes by stating AODV is best overall but
This document provides an introduction to systems and system modeling. It defines a system as any object that performs an action and is dependent on other entities. A system can be divided into sub-systems, each of which can also be considered a complete system. Dynamic systems change over time, while static systems do not change. An example of a system discussed is a college, with students, classrooms, laboratories, etc. as constituent entities. The goal of system modeling and simulation is to study systems mathematically and using computers without performing actual experiments.
System modeling and simulation full notes by sushma shetty (www.vtulife.com)Vivek Maurya
This document provides an overview of system simulation and modelling. It discusses when simulation is an appropriate tool and areas it can be applied, including manufacturing, semiconductors, construction, the military, logistics and healthcare. Simulation allows experimenting with systems to study their behavior over time without disrupting operations. It enables testing new designs and policies. The document also covers system components like entities, attributes, and activities, and defines a system and its environment.
Ise viii-information and network security [10 is835]-solutionVivek Maurya
This document contains the question paper solution from VTU for the course Information and Network Security 10IS835. It discusses various topics in system security policies, including:
- How managerial guidelines and technical specifications can be used in system-specific security policies.
- Who is responsible for policy management and how policies are managed.
- The different approaches for creating and managing issue-specific security policies.
- The major steps and components of contingency planning, including the business impact analysis.
- Pipkin's three categories of incident indicators and the ISO/IEC 270xx standard for information security management.
- The importance of incident response planning and testing security response plans.
- The
Ise viii-information and network security [10 is835]-question paperVivek Maurya
This document contains questions from past exams for the Information and Network Security course at VTU. It covers 8 units:
1. Planning for Security - Questions cover topics like security policies, policy management, contingency planning, and incident response strategies.
2. Security Technology: Firewalls and VPNs - Includes questions on firewall types, configurations, VPN techniques and protocols.
3. Security Technology 2 - Focuses on intrusion detection systems, vulnerability scanners, and authentication methods.
4. Cryptography - Addresses symmetric/asymmetric encryption methods, cryptosystem attacks, digital signatures, and ciphers.
5. Introduction to Network Security and Authentication Applications - Discusses security models,
Ise viii-information and network security [10 is835]-assignmentVivek Maurya
This document contains assignments for various units in an Information and Network Security course. It includes assignment questions related to topics like policy management, security technologies like firewalls and VPNs, cryptography, network security models, authentication applications, email security, IP security, and web security. For each unit, it lists multiple assignment questions to be answered related to key concepts and explanations of those concepts covered in that particular unit.
The document discusses the benefits of exercise for both physical and mental health. Regular exercise can improve cardiovascular health, reduce symptoms of depression and anxiety, enhance mood, and boost brain function. Staying physically active helps fight diseases and conditions, increases energy levels, and promotes better quality of life.
This document discusses key concepts in discrete-event simulation including entities, events, activities, delays, and system state. It explains how a discrete-event simulation proceeds by advancing the simulation clock to the next event time and processing one event at a time. Each event may change the system state and trigger new future events. Three common world views for modeling discrete systems are described: event-scheduling, process-interaction, and activity scanning. An example grocery store simulation is presented to illustrate modeling a system as a discrete-event simulation using event scheduling.
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
This document provides an introduction to cloud computing security issues in infrastructure as a service (IaaS). It discusses how cloud computing works and the service models of software as a service, platform as a service, and IaaS. IaaS provides processing power, data storage, and other shared resources on a pay-as-you-go basis. The document focuses on security issues related to the IaaS model, examining security for service level agreements, utility computing, platform virtualization, networks and connectivity, and computer hardware. It also discusses how security issues with cloud software can impact IaaS and cloud computing overall.
Cloud Computing Security Issues in Infrastructure as a Service”Vivek Maurya
This document summarizes a technical seminar presentation on security issues in cloud computing infrastructure as a service (IaaS). The presentation covers IaaS components and security drawbacks, literature reviewing approaches to monitoring service level agreements and strengthening network isolation, and the conclusions that each IaaS component poses security risks, cloud requires balancing cost, security and privacy, and changes in trust increase challenges.
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...DharmaBanothu
Natural language processing (NLP) has
recently garnered significant interest for the
computational representation and analysis of human
language. Its applications span multiple domains such
as machine translation, email spam detection,
information extraction, summarization, healthcare,
and question answering. This paper first delineates
four phases by examining various levels of NLP and
components of Natural Language Generation,
followed by a review of the history and progression of
NLP. Subsequently, we delve into the current state of
the art by presenting diverse NLP applications,
contemporary trends, and challenges. Finally, we
discuss some available datasets, models, and
evaluation metrics in NLP.
East Carolina University diploma. ECU diplomaCollege diploma
WhatsApp: +852 56142185
ECU diploma for sale. Buy a fake East Carolina University diploma. I need a fake East Carolina University diploma. Fake ECU diploma for sale.
Skype: adolph.863
QQ/WeChat: 648998850
Email: buydocument1@gmail.com
https://www.buydocument.net
https://www.buyfastdegree.com
https://www.getadiploma9.com
https://www.diploma999.com
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
Hot Call Girls In Bangalore ✔ 9079923931 ✔ Hi I Am Divya Vip Call Girl Servic...
Unit8 tgb
1. 1
UNIT 8:- Mobile Ad-Hoc Networks,
Wireless Sensor Networks
a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with
any support from the existing infrastructure or any other kind of fixed stations. We can formalize this
statement by defining an ad hoc (ad-hoc or adhoc) network as an autonomous system of mobile hosts
(MHs) (also serving as routers) connected by wireless links, the union of which forms a
communication network modeled in the form of an arbitrary communication graph. This is in contrast
to the wellknown single hop cellular network model that supports the needs of wireless
communication by installing base stations (BSs) as access points. In these cellular networks,
communications between two mobile nodes completely rely on the wired backbone and the fixed
BSs. In a MANET, no such infrastructure exists and the network topology may dynamically change
in an unpredictable manner since nodes are free to move.
Important characteristics of a MANET Characteristics:
Dynamic Topologies Nodes are free to move arbitrarily with different speeds; thus,the network
topology may change randomly and at unpredictable times.
Energy-constrained Operation Some or all of the nodes in an ad hoc network may rely on batteries or
other exhaustible means for their energy. For these nodes, the most important system design
optimization criteria may be energy conservation.
Limited Bandwidth: Wireless links continue to have significantly lower capacity than infra
structured networks. In addition, the realized throughput of wireless communications - after
accounting for the effects of multiple access, fading, noise, and interference conditions, etc., is often
much less than a radio's maximum transmission rate
Security Threats : Mobile wireless networks are generally more prone to physical security threats than
fixed-cable nets. The increased possibility of eavesdropping, spoofing, and minimization of denial-of
service type attacks should be carefully considered.
2. 2
Applications of MANETs
Collaborative Work - For some business scenarios, the need for collaborative computing might be
more important outside office environments than inside a building. After all, it is often the case
where people do need to have outside meetings to cooperate and exchange information on a given
project;
• Crisis-management Applications - These arise, for example, as a result of natural disasters where
the entire communications infrastructure is in disarray (for example, Tsunamis, hurricanes, etc.).
Restoring communications quickly is essential. By using ad hoc networks, an infrastructure could be
set up in hours instead of days/weeks required for wire-line communications;
Personal Area Networking - A personal area network (PAN) is a short-range, localized network
where nodes are usually associated with a given person. These nodes could be attached to someone's
cell phone, pulse watch, belt, and so on. In these scenarios, mobilityis only a major consideration
when interaction among several PANs is necessary, illustrating the case where, for instance, people
meet in real life. Bluetooth [Haarstenl998] is an example of a technology aimed at, among other
things, supporting PANs by eliminating the need of wires between devices such as printers, cell
phones, PDAs, laptop computers, headsets, and so on, and is discussed later in this book. Other
standards under the IEEE 802.15 working group for wireless PANs are also described.
Classification of routing protocols
Ad-hoc Routing protocols can be categorized as table-driven or source initiated.
Table-driven or proactive ,routing protocols finds routes to all possible destinations ahead of
time. The routes are recorded in the nodes’ routing tables and are updated within the
predefined intervals. Proactive routing protocols are faster in decision making ,but cause
problems if the topology of the network continually changes.
These protocols require every node to maintain one or more tables to store updated
routing information from every node to all other nodes.
Source-initiated routing protocols:
Source-initiated, or reactive, routing protocols are on-demand procedures and create routes
only when requested to do so by source nodes. A route request initiates a route-discover
process in the network and is completed once a route is discovered. If it exists, at the time of
request, a route is maintained by a route-maintenance procedure until either the destination
node becomes irrelevant to the source or the route is no longer needed.
Control overhead of packets is smaller than of proactive protocols.
3. 3
Table driven / proactive
Destination sequenced distance vector [DSDV]: The DSDV is table driven based
routing algorithm. DSDV is improved version of Bellman Ford routing algorithm.
Each DSDV node maintain two routing tables: - table for forwarding packets, and table
for advertising incremental updates. The nodes will maintain a routing table that consists
of a sequence number. The routing table periodically exchanged so that every node will
have latest information.
DSDV is suitable for small networks.
The algorithm works as follows
A node or a mobile device will make an update in its routing table and send the
information to its neighbor upon receiving the updated information and make an update
in its own routing table.
The update is made by comparing the sequence number received is greater than present
sequence number than the new one will be used.
If there is a link failure in one of the node will change the metric value to infinity and
broadcast the message.
Cluster head gateway switch router [CGSR]
CGSR is also a table driven routing protocol. In this algorithm the mobile devices will be
grouped to form a cluster the grouping is based on the range and each cluster is controlled by
cluster head. All the mobile devices will maintain 2 tables cluster member table and routing
table.
The cluster member table will have the information about the cluster head for each
destination the routing table will have routing information. In this protocol the packet cannot
be directly sent to the destination instead cluster heads are used for routing.
CGSR routing involves cluster routing, where a node finds the best route over cluster heads
from the cluster member table.
4. 4
Wireless routing protocol [WRP]
WRP is also based on table driven approach this protocol makes use of 4 tables
1. Distance table :- Which contains information like destination, next hop, distance
2. Routing table: - Which contains routing information.
3. Link cost table:- Which contains cost information to each neighbor
4. Message retransmission list table: - this table provides sequence number of the message,
a retransmission counter, acknowledgements and list of updates sent in update message.
Whenever there is a change in the network an update will be made which will be broadcasted
to other nodes.
Other nodes upon receiving the updated information will make an update in their table.
If there is no update in the network a hello message should be sent.
Source initiated / reactive protocol
Dynamic source routing [DSR]: DSR is a source initiated or on demand routing
protocol in which source finds unexpired route to the destination to send the packet. It is
used in the network where mobile nodes move with moderate speed.
Overhead is significantly reduced, since nodes do not exchange routing table information
it has 2 phases.
1. Route discovery
2. Route maintenance
The source which wants to send the information to the destination will create a route request
message by adding its own identification number and broadcasts them in the network. The
intermediate nodes will continue the broadcast but adding their own identification number.
When the destination is reached a route reply message is generated which will be sent back
to the source. The source can receive multiple route replies indicating the presence of
multiple paths.
The source will pick up one of the path and will use for transmission. If there is a link failure
one of the node will detect and will create a route error message which will be sent back to
the source in this case the path has to be re-established for further transmission.
5. 5
Associated based routing [ABR]: ABR is an efficient on-demand or source initiated
routing protocol. In ABR, the destination node decides the best route, using node
associativity. ABR is suitable for small networks, as it provides fast route discovery and
creates shortest paths through associativity.
Each node keeps track of associativity information by sending messages periodically.
If the associativity value is more means nodes mobility is less.
If the associativity value is less means nodes mobility is
In ABR the source which wants to send the packet to the destination will create a query
packet and broadcast in the network. Query packet generation is required for discovering the
route.
The broadcast continues as long as destination is reached once the destination is reached it
creates the reply packet and sends back to the source.
The query packet will have the following information.
1. Source id
2. Destination id
3. All intermediate node id
4. Sequence number
5. CRC and
6. Time to live [TTL]
A node sends an update packet to the neighbors and waits for the reply if update is received
back, then associative tick will be incremented high then it means mobile device is still a part
of the network otherwise it might not be.
Adhoc on demand distance vector [AODV]
It is a source initiated routing protocol in mobile adhoc networks.
The algorithm consist of 2 phases
1. Route discovery phase
2. Route maintenance phase
In route discovery phase the path from source to destination is identified by broadcasting
route request packet [RREQ]. When the intermediate node receive RREQ they will create a
backward pointer and continue the broadcast when the route request packet reaches the
destination a route reply would be generated [RREP]. The route reply will have information
about the path that can be chosen for the packet transmission.
6. 6
The route request packet can have following information.
1. Source id
2. Destination id
3. Sequence number
4. Backward pointer information
5. CRC and
6. Time to live[TTL]
In the above network the RREQ will be broadcasted by the source node 1 to its neighbor and
neighbors will check whether RREQ is already processed. If it is already processed the
packet will be discarded.
If it is not processed a backward pointer is created and the broad cast continues.
When the packet is reached at destination a route reply is created [RREP] in the above
network the first RREP is sent to the source can have the path information as 1-2-4-6-8.
When the source receives this information it will be stored in the routing table. Mean
while the destination can create one more RREP which can have the information as 1-3-7-8
the destination will send this RREP to the source and will also ask the source to discard old
path as the new path is having minimum number of hops.
Route maintainence phase
The nodes in the network periodically exchange hello messages to inform that they
are still a part of network and the path is valid. Whenever there is a link failure detected. A
route error packet [RERR] will be sent to the source indicating the path is no more valid.
Temporary ordered routing algorithm [TORA]
It is also a source initiated routing algorithm, creates multiple routes for any source/
destination pair. The advantage of multiple routes is that route discovery is not required for
every alteration in the network topology.
TORA consists of three phases,
1. Route Creation/discovery
2. Route maintenance
3. Route erasure
TORA uses three types of packets: Query Packets for route creation, Update Packets for both
creation and maintenance
7. 7
The route will be discovered from the source to destination only when a request is made for
the transmission. In this algorithm the source will generate a query packet which will be
broadcasted in the network this continues as long as a node that is directly connected to the
destination is identified.
When the destination is identified an update packet will be generated and sent back to
the source. The update packet will have the path information if there are more than one
update packet received by the source, it means there are multiple paths to the destination, the
source has to choose best path available.
Security in adhoc networks
The following are the security threat in adhoc network.
1. Limited computational capabilities : the nodes in the mobile adhoc network are
modular, independent and will have limited computational capability.
It becomes a source of vulnerability when they handle public key cryptography.
2. Limited power supply : since nodes have limited power supply attacker can exhaust
batteries by giving excessive computations to be carried out.
3. Challenging key management : the key management becomes extremely difficult as the
mobile devices will be under movement.
Types of attack in adhoc network
The attack can be classified into 2 types
1. Passive 2. Active
In passive attack, the normal operation of routing protocol is not interrupted. The attacker
just tries to gather the information
In active attack, the attacker can insert some arbitrary packets and therefore might affect the
normal operation of network
Attack can also be one of the following types
1. Pin attack : with the pin attack, an unauthorized node pretends to have shortest path to
the destination
The attacker can listen to path setup phase and become the part of network.
2. Location disclosure attack : by knowing the locations of intermediate nodes, the
attacker can find out the location of target node
3. Routing table overflow : the attacker can create some routes whose destination do not
exist. It will have major impact on proactive based routing
4. Energy exhaustion attack : the attacker tries to forward unwanted packets or send
unwanted requests which can conserve the battery of the nodes
8. 8
Criteria for a secure routing protocol
The attack in adhoc network can be prevented by using a securing routing protocol. It should
have following properties
1. Authenticity: when a routing table is updated, it must verify whether updates were
provided by authenticated node.
2. Integrity of information : when a routing table is updated the information must be
verified whether it is modified or not
3. In order updates: sequence numbers or some mechanism must be used to maintain
updates in order.
4. Maximum update time: updates in routing table must be done as quickly as possible.
5. Authorization: only authorized nodes must be able to send update packets.
Wireless sensor network
WSNs, which can be considered as a special case of ad hoc networks with reduced or no mobility, are
expected to find increasing deployment in coming years, as they enable reliable monitoring and
analysis of unknown and untested environments. These networks are "data centric", i.e., unlike
traditional ad hoc networks where data is requested from a specific node, data is requested based on
certain attributes such as,"which area has temperature over 35°C or 95°F". Therefore a large
number of sensors need to be deployed to accurately reflect the physical attribute in a given area.
Routing protocol design for WSNs is heavily influenced by many challenging factors, which must be
overcome before efficient communication can be achieved. These challenges can be summarized as
follows:
Ad hoc deployment - Sensor nodes are randomly deployed which requires that the system be able to
cope up with the resultant distribution and form connections between the nodes. In addition, the
system should be adaptive to changes in network connectivity as a result of node failure.
• Computational capabilities - Sensor nodes have limited computing power and therefore may not
be able to run sophisticated network protocols leading to light weighted and simple versions of
routing protocols.
9. 9
• Energy consumption without losing accuracy - Sensor nodes can use up their limited energy
supply carrying out computations and transmitting information in a wireless environment. As such,
energyconserving forms of communication and computation are crucial as
the node lifetime shows a strong dependence on the battery lifetime. In a multi-hop WSN, nodes play
a dual role as data sender and data router. Therefore, malfunctioning of some sensor nodes due to
power failure can cause significant topological changes and might require rerouting of packets and
reorganization of the network.
Scalability - The number of sensor nodes deployed in the sensing area may be in the order of
hundreds, thousands, or more. Any routing scheme must be scalable enough to respond to events and
capable of operating with such large number of sensor nodes. Most of the sensors can remain in the
sleep state until an event occurs, with data from only a few remaining sensors providing a coarse
quality.
• Communication range - The bandwidth of the wireless links connecting sensor nodes is often
limited, hence constraining inter sensor communication. Moreover, limitations on energy forces
sensor nodes to have short transmission ranges. Therefore, it is likely that a path from a source to a
destination consists of multiple wireless hops
Fault tolerance - Some sensor nodes may fail or be blocked due to lack of power, physical damage,
or environmental interference. If many nodes fail, MAC and routing protocols must accommodate
formation of new links and routes to the data collection BSs. This may require actively adjusting
transmit powers and signaling rates on the existing links to reduce energy consumption, or rerouting
packets through regions of the network where more energy is available. Therefore, multiple levels of
redundancy may be needed in a fault tolerant WSN.
• Connectivity - High node density in sensor networks precludes them from being completely
isolated from each other. Therefore, sensor nodes are expected to be highly connected. This, however,
may not prevent the network topology from varying and the network size from shrinking due to
sensor nodes failures. In addition, connectivity depends on the, possibly random, distribution of
nodes.
Transmission media - In a multi-hop sensor network, communicating nodes are linked by a wireless
medium. Therefore, the traditional problems associated with a wireless channel (e.g., fading, high
error rate) also affect the operation of the sensor network. In general, bandwidth requirements of
sensor applications will be low, in the order of 1-100 kb/s. As we have seen in Chapters 4 and 5 and
in the previous section, the design of the MAC protocol is also critical in terms of conserving energy
in WSNs.
• QoS - In some applications (e.g., some military applications), the data should be delivered within a
certain period of time from the moment it is sensed, otherwise the data will be useless. Therefore,
bounded latency for data delivery is another condition for time constrained applications.
10. 10
• Control Overhead - When the number of retransmissions in wireless medium increases due to
collisions, the latency and energy consumption also increases. Hence, control packet overhead
increases linearly with the node density. As a result, tradeoffs between energy conservation, self-
configuration, and latency may exist.
• Security - Security is an important issue which does not mean physical security, but it implies that
both authentication and encryption should be feasible. But, with limited resources, implementation of
any complex algorithm needs to be avoided. Thus, a tradeoff exists between the security level and
energy consumption in a WSN.
Protocol stack for sensor network
The protocol stack of sensor network combines power efficiency and least cost path routing.
The architecture consist of
1. Physical layer
2. Data link layer
3. Network layer
4. Transport layer
5. Application layer
All these layers are backed by management plane, mobility management plane and task
management plane.
Physical layer is responsible for transmitting and receiving signals.
The data link layer consists of medium access control [MAC] which is used to
prevent packet collision.
The network layer is responsible for routing the packets
The application layer is used for creation of packets by making use of software.
The power management plane monitors the sensor’s power level among sensor node.
11. 11
Structure of a sensor node
Transceiver
Embedded
Processor
Sensor
Battery
Memory
Transceiver
Embedded
Processor
Sensor
Battery
Memory
1Kbps- 1Mbps
3m-300m
Lossy Transmission
8 bit, 10 MHz
Slow Computation
Limited Lifetime
Requires
Supervision
Multiple sensors
128Kb-1Mb
Limited Storage
The sensor node consist of a
1. sensing unit
2. processing unit
3. memory unit
4. self power unit
5. wireless transreceiver
Sensing unit: it consists of a sensor and analog to digital converter [ADC]. the
analog signal produced by sensor is converted to digital and is fed into processing
unit. The sensing unit is responsible for collecting the data externally and interacts
with central processor
Processing and memory unit: the processing unit is responsible for performing
some computations it executes some instructions which is responsible for setting up
the connection with another node. The memory unit is used for storing the data.
Self power unit: it is responsible for powering the node and keeping it alive. The
main task of the sensor node is to identify events , to process data , and then to
transmit the data. The power of a node is consumed mainly in the transmitter and
receiver unit. The sensor node can be supplied by a self-power unit, self-power unit
battery, or solar cells.
12. 12
Communication energy model
IEEE standards as 802.11a, b, and g provide a wide range of data rates: 54,48,36,24,18,12,9
and 6 mb/s. this range reflects the trade off between the transmission range and data rate
intrinsic in a wireless communication channel. An accurate energy model is crucial for the
development of energy efficient clustering and routing protocols. The energy consumption, E
for all components of the watts is summarized as
E=theta+ηwdn
Where Ѳ is the distance independent term that accounts for the overhead of the radio
electronics and digital processing, and ηwd^n is the distance dependent term in which η
represents the amplifier inefficiency factor w is the free space path loss d is the distance and
n in the environmental factor. Based on an environmental condition, n can be any number
between 2 and 4 and η specifies the inefficiency of the transmitter when generating
maximum power wd^n at the antenna. Clearly the distance dependent portal of total energy
consumption depends on the real-world Tranreceiver parameters, Ѳ, η and the path
attenuation wd^n. if the value of Ѳ overshadows ηwd^n, the reduction in the transmission
distances through the use of multihop communication is not effective.
Clustering protocol
Decentralized energy efficient propagation protocol [DEEP]: DEEP is used for
identifying a head and the members.
The algorithm works as follows
1. Initialize: when network is created one of the node in the network will be made as cluster
head. The cluster head sends a signal known as cluster head declaration signal to all the
nodes which are in the range ’ .
This is used for identifying the members of the cluster. The cluster head sends cluster
head exploration to all the nodes which are in the range dr1 and dr2. This is done to
identify a new cluster head.
2. Repeat : even though many nodes receive the cluster head exploration only one node fro
which the equation ERC1 < ER < ERC2 can become the candidate of the cluster head.
‘ER’ is the energy of cluster head exploration and
‘ERC!’=Pout – ηwd 1
‘ERC2’=Pout–ηwd 2
η, w, n are dependent on environment factors.
13. 13
The new candidate sends cluster head declaration for all the nodes in the range dr. if a
node receives multiple cluster head declaration which ever signal is having higher energy
will be chosen as cluster head. The other candidates will be eliminated.
3. Conclusion: if there are not enough members in a cluster member exploration/search
signal will be generated atleast if a node does not receive any signal member exploration
or search signal will be generated.
Low energy adaptive clustering hierarchy protocol [LEACH]:
LEACH is a clustering protocol used for identifying the cluster head and the members. It
consist of 2 phases
1. Clustering phase
2. Steady state phase
Both these phases are repeated in round. The algorithm works as follows. A node will pick
up a number between 0 and 1 and compares the value with if is greater it
becomes the candidate for cluster head.
P is the ratio of cluster heads to total number of nodes
r-> is the round
g-> number of nodes who has not got during the first round will be equivalent to P and
node can become the cluster head.
Similarly when the value of ‘r’ reaches close to (1-p) will be equivalent to P and node
can become a cluster head
The cluster head candidates begin to send a signal to other nodes which ever candidate is
having a higher signal will become cluster head.
Routing protocol
14. 14
Routing protocol in sensor network: In sensor network the routing of information can
happen within a cluster or between nodes of different clusters.
If the routing is happening within a cluster. Then the protocol is called as intra cluster
routing.
If the routing is happening between the nodes of different clusters it is called as inter cluster
routing.
Intracluster routing
In intracluster routing, the packets are transmitter with in a cluster
It can be of two types.
1. Direct routing algorithm
2. Multihop routing algorithm
In direct routing, the cluster head as the destination for all cluster nodes. The cluster nodes
can communicate directly with cluster nodes.
In multihop the destination is reached through multiple hops. If there are many paths. Then
only the path which is energy efficient will be considered. In multihop routing, a node might
have to under go multiple hops before it reaches the destination. The sensor node will be at
different distances apart from other nodes. A packet from a node is routed to a neighbor node
that exhibits high energy. The number in the node indicates the remaining energy in the node
Inter cluster routing [ICR]: It is a destination initiated reactive routing algorithm. The
destination is called as local base station [LBS] it will start the route discovery by creating
interest signal and following them. ICR works in two phases, Route discovery and data
acquisition.
In Route Discovery Phase, the LBS initiates route discovery by sending an interest signal
within the range Ri,
1. All the nodes which are in the range Ri will receive the interest signal.
2. Upon receiving the interest signal it will be stored and flooding continues.
15. 15
3. If an intermediate node receive already processed interest signal it will be discarded
4. Before flooding the interest signal the cost value will be updated. The format of the
interest signal and the formula for the cost is as given below.
Interest signal
Type Period Source
Address
cost
The type field indicates message format. The period indicates how often interest signal has to
be sent. The source address field is used for sorting address of the source node. The cost field
indicates number of hops required to reach the source. In formula for the cost α and β are
normalization factor based on environment.
Cost=αh+β∑ Bm/Bri
Where, h is hop count
Bm = It is the maximum battery available in the node
Bri = it is the remaining battery in the node.
Write a note on Zigbee technology?
ZigBee is one of the newest technologies enabling Wireless Personal Area Networks
(WPAN).
ZigBee is an established set of specifications for wireless personal area networking
(WPAN), i.e. digital radio connections between computers and related devices.
WPAN Low Rate or ZigBee provides specifications for devices that have low data rates,
consume very low power and are thus characterized by long battery life. ZigBee makes
possible completely networked homes where all devices are able to communicate and be
controlled by a single unit.
The IEEE 802.15.4 standard and Zigbee wireless technology are designed to satisfy the
market's need for a low-cost, standard-based and flexible wireless network technology,
which offers low power consumption, reliability, interoperability and security for control
and monitoring applications with low to moderate data rates.
The data which gets transmitted includes temperature reading on or off state of a switch
keystroke of a keyboard etc.
The Bluetooth technology which is used in mobile phones, laptops, runs on zigbee.
Zigbee is an IEEE 802.15.4 standard. Zigbee operates in a frequency range 900MHz- 2.5
GHz.
The technology can be used for transmitting the data within the range of 20mts.
It can also be used for transmission of data within a range greater than 20mts. This is
possible through the intermediate nodes.