Seminar PPT 4th Sem

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 29

Seminar on MANET

Presented by: Nishant Sharma


Year: 4th year(AI & ML)
20EJDAI042
• Introduction
• Literature review
• Wired vs wireless network
• Features of MANET
• Uses of MANET
Table of • Working & Methodology
content • Routing in MANET
• Problems in MANET
• Application & future
• Conclusion
Introduction
• A Mobile Ad-Hoc Network (MANET) is a
type of wireless network where mobile
devices, often referred to as nodes,
communicate with each other without the
need for a pre-existing infrastructure or
centralized control. In a MANET, nodes can
dynamically join or leave the network, and
they collaborate to form a temporary
network on the fly. This decentralized and
self-configuring nature makes MANETs
particularly useful in scenarios where a
fixed communication infrastructure is
impractical, expensive, or unavailable.
Routing Protocols:Classic protocols like AODV (Ad-Hoc On-
Demand Distance Vector) and DSR (Dynamic Source
Routing) have been extensively studied. AODV is known for
its on-demand nature, reducing control overhead, while
DSR utilizes source routing for dynamic adaptability.

Security Challenges and Solutions:MANETs face security


Literature threats such as routing attacks, eavesdropping, and
malicious nodes. Cryptographic techniques, trust-based
models, and intrusion detection systems have been
review proposed to address security concerns (Buttyán & Hubaux,
2007).
Energy Efficiency: Energy-efficient communication is critical
in MANETs due to the limited resources of mobile nodes.
Studies explore power-aware routing protocols, sleep-wake
scheduling, and energy-efficient MAC (Medium Access
Control) protocols to extend node battery life (Du & Sun,
2002).
Quality of Service (QoS): MANETs are increasingly being used
for multimedia and real-time communication. QoS-aware
routing protocols are designed to ensure reliable and timely
data delivery, with ongoing research focusing on efficient
bandwidth management (Tarique & Majumder, 2013).

Literature Machine Learning for Intrusion Detection: With the dynamic


nature of MANETs, machine learning techniques are applied to
intrusion detection. These adaptive algorithms enhance
review security by recognizing and responding to evolving threats
(Wang & Jajodia, 2006).

Blockchain for Secure Management:Blockchain technology is


explored for secure and decentralized management in MANETs
(Sobh, 2019). It provides a tamper-proof distributed ledger,
enhancing security and trust in dynamic ad-hoc networks.
• Wired Networks
• Performance – Wired networks perform better than wireless
networks. This is due to less interference than a wireless network
would typically encounter. Having a wired network allow for a more
stable network overall. We highly recommend installing a wired
network for any critical machines such as servers and routers. This
will avoid any service disruption that is typically caused with wireless
Wired vs networks.
• Security – Wired networks are more secure than wireless networks.
wireless This is due to the fact that your network is only accessible with a
physical cable connection. With wireless networks, the Wi-Fi signal is
networks broadcasted outside of the building, leaving it open to the public and
potential hackers.
• Installation – This one depends on your situation. A lot of business
premises and modern homes have built in network cables that run
behind the walls and under the floor called structured cabling. If this
is the case then the majority of the difficult work is complete and the
rest should be straightforward to install.
• Wireless Networks
• Performance – As a general rule of thumb, wireless networks perform
worse than wired networks due to factors such as signal range,
amount of connected devices, office furniture and building features
such as lifts and pipework. However, Wi-Fi networks are improving in
Wired vs their capability with modern advancements such as 802.11ax. We are
watching this space as the industry is moving towards a wireless
connected workplace.
wireless • Security – A wireless network is less secure than a wired network.
Wireless networks must be secured correctly as accessing a wireless
networks network can be done discreetly and does not require physical access
to a building. Wireless networks can be secured to prevent malicious
attacks with an advanced authentication process such as enterprise
WPA2 with 802.1X.
• Installation – Wireless networks are mostly easy to install. They do
not require a large amount of physical cabling to be installed and
allow your computers and tablets to be moved around.
Dynamic topologies: nodes are free to move arbitrarily; thus the network
topology may be changed randomly and unpredictably and primarily
consists of bidirectional links. In some cases where the transmission power
of two nodes is different, a unidirectional link may exist.

Bandwidth-constrained and variable capacity links: wireless links continue


to have significantly lower capacity than infrastructure networks.

Features of
MANET Energy-constrained operation: some or all of the MSs in a MANET may rely
on batteries or other exhaustible means for their energy. For these nodes
or devices, the most important system design optimization criteria may be
energy conservation.

Limited physical security: MANETs are generally more prone to physical


security threats than wire line networks. The increased possibility of
eavesdropping, spoofing, and denial of services (DoS) attacks should be
considered carefully. To reduce security threats, many existing link security
techniques are often applied within wireless networks.
Defense applications: Many defense applications require on the fly
communications set-up, and ad hoc/sensor networks are excellent
candidates for use in battlefield management.

Crisis management applications: These arise, for example, as a result of


natural disasters in which the entire communication infrastructure is in
disarray. Restoring communications quickly is essential.

Uses of Tele-geoprocessing application: The combination of GPS, GIS


(Geographical Information Systems), and high-capacity wireless mobile
systems enables a new type of application referred to as tele- geo
MANET processing.
Education via the internet: Educational opportunities available on the
internet or remote areas because of the economic infeasibility of providing
expensive last-mile wire line internet access in these areas to all
subscribers.
Vehicular area network: This a growing and very useful application of
adhoc network in providing emergency services and other information.
This is equally effective in both urban and rural setup. The basic and
exchange necessary data that is beneficial in a given situation.
Working in MANET

• As we can see that the


nodes(mobiles) are connected to
each other through the wireless
network in which the node MT1
moves from one place to another
place as the mobile changes there
places.
Movement of
an node from
one place to
others as
change in its
initial position
Route request and its reply
Methodology
Problem Definition
• Clearly define the objectives and scope of the study.
• Identify specific challenges or issues within MANETs that the methodology aims to address.
Literature Review
• Overview of existing literature on MANETs.
• Identification of key protocols, algorithms, and technologies.
• Understanding the state-of-the-art solutions and identifying gaps.
Research Objectives
• Definition of specific research objectives based on identified gaps and challenges.
• Clear articulation of the goals for each aspect of MANETs to be investigated or optimized.
Methodology
Network Model Design
• Specification of the characteristics of the simulated or real-world MANET.
• Definition of parameters such as node mobility patterns, network size, communication range, and traffic patterns.
• Selection of an appropriate simulation tool or hardware setup for experimentation.
Routing Protocols
• Selection of representative routing protocols based on literature and research objectives.
• Implementation and simulation of these protocols in the chosen network model.
• Evaluation of protocols based on key performance metrics.
Security Mechanisms
• Identification of common security threats in MANETs based on literature.
• Implementation and simulation of security mechanisms such as encryption, authentication, and intrusion detection.
• Evaluation of the effectiveness of these mechanisms in securing MANET communication.
Methodology
• Energy Efficiency Optimization
• Implementation of energy-efficient routing algorithms or power management strategies.
• Simulation of the MANET under different scenarios to assess the impact on energy consumption.
• Evaluation of trade-offs between energy efficiency and other performance metrics.
• Performance Evaluation and Analysis
• Conducting a comprehensive performance evaluation of the MANET under various scenarios.
• Analysis of simulation results and comparison of the performance of different routing protocols, security
mechanisms, and energy-efficient strategies.
• Optimization and Fine-Tuning
• Identification of areas for improvement based on performance evaluation results.
• Optimization of protocols or algorithms to enhance efficiency, scalability, and adaptability.
Methodology

• Optimization and Fine-Tuning


• Identification of areas for improvement based on performance evaluation results.
• Optimization of protocols or algorithms to enhance efficiency, scalability, and
adaptability.
• Validation
• Validation of proposed solutions or optimizations through comparisons with
existing protocols or alternative approaches.
• Ensuring the reliability and robustness of proposed MANET solutions.
Routing in MANET
• In Mobile Ad hoc Network (MANET),
nodes do not know the topology of their
network, instead they have to discover it
by their own as the topology in the ad-
hoc network is dynamic topology. The
basic rules is that a new node whenever
enters into an ad-hoc network, must
announce its arrival and presence and
should also listen to similar
announcement broadcasts made by
other mobile nodes.
Destination Sequenced Distance Vector Routing
Pro-active routing Protocol (DSDV): It is a pro-active/table driven
protocols: These are routing protocol. It actually extends the distance
also known as table- vector routing protocol of the wired networks as
driven routing the name suggests. It is based on the Bellman-
protocols. Each
ford routing algorithm.
mobile node
maintains a separate
routing table which
contains the Global State Routing (GSR): It is a
information of the pro-active/table driven routing protocol. It
routes to all the actually extends the link state routing of the
possible destination wired networks. It is based on the Dijkstra’s
mobile nodes. routing algorithm.
Reactive routing
protocols: These are also Dynamic Source Routing protocol (DSR): It is a reactive/on-
known as on-demand demand routing protocol. In this type of routing, the route is
routing protocol. In this discovered only when it is required/needed. The process of
type of routing, the route route discovery occurs by flooding the route request packets
is discovered only when throughout the mobile network.
it is required/needed. The
process of route
discovery occurs by
flooding the route request Ad-Hoc On Demand Vector Routing protocol (AODV): It is a
packets throughout the reactive/on-demand routing protocol. It is an extension of
mobile network. It dynamic source routing protocol (DSR) and it helps to
consists of two major remove the disadvantage of dynamic source routing
protocol. In DSR, after route discovery, when the source
phases namely, route
mobile node sends the data packet to the destination mobile
discovery and route node, it also contains the complete path in its header.
maintenance.
Hybrid Routing protocol: It basically
combines the advantages of both, reactive
and pro-active routing protocols. These
protocols are adaptive in nature and
adapts according to the zone and position
of the source and destination mobile
nodes. One of the most popular hybrid
routing protocol is Zone Routing
Protocol (ZRP).
Dynamic Limited Resources:
Topology: Frequent Nodes in MANETs have
changes in network limited battery power,
topology due to node processing capabilities,

• Problems mobility. and memory.

in MANET Routing
Security Concerns: Lack
Protocols:Designing
of a centralized
robust and efficient
authority makes
routing protocols that
MANETs susceptible to
can handle dynamic
various security
topologies,
threats, including
intermittent
routing attacks and
connectivity, and node
eavesdropping.
failures.
Quality of Service (QoS):
Providing reliable and
Scalability: MANETs
timely communication
should be able to scale to
for applications with

• Problems specific QoS


requirements (e.g., real-
time video streaming).
accommodate a varying
number of nodes.

in MANET
Interference and Signal
Resource Discovery: Strength: Nodes may
Efficiently discovering experience interference
and managing network from other wireless
resources in a dynamic devices, and signal
environment. strength can vary due to
environmental factors.
Military Operations:Battlefield
communications, reconnaissance, and
surveillance.

Disaster Management: Emergency response


in disaster-stricken areas
• Application
of manet Vehicular Communication
(VANETs): Cooperative driving, traffic
management, and safety applications.

Search and Rescue Operations:Coordination


among search and rescue teams in remote or
challenging terrains.
Integration with 5G and Beyond:

Future of
MANET
MANETs may be integrated with 5G networks to
enhance connectivity and communication
capabilities. The convergence of MANETs with
advanced cellular networks could lead to more
robust and versatile communication solutions.
Edge Computing in MANETs:

Future of
MANET
The integration of edge computing capabilities
within MANETs can lead to improved data
processing, reduced latency, and enhanced real-time
decision-making. This is particularly relevant for
applications requiring quick data analysis at the
network's edge.
Machine Learning and Artificial Intelligence:

Future of
MANET
The incorporation of machine learning and artificial
intelligence algorithms into MANETs can enhance
network management, security, and optimization.
Intelligent routing decisions, anomaly detection, and
adaptive protocols may be developed to improve
overall network performance.
Blockchain for Security:

Future of
MANET
Blockchain technology may be applied to enhance
the security and trustworthiness of MANETs.
Decentralized and tamper-proof ledgers can be
utilized for secure authentication, transaction
validation, and distributed consensus within the
network.
Mobile Ad-Hoc Networks
(MANETs) represent a
fascinating and dynamic realm
of wireless communication.
Conclusion
Thank you for your attention
and engagement in this
exploration of Mobile Ad-Hoc
Networks.
Thank you

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy