You are on page 1of 25

Prepared by: G.

BajiBabu

DRAWBACKS OF EXSISTING NETWORKS. SOLUTION TO IT : MANET CONCEPT OF MANET & ITS ATTRIBUTES. ROUTING W.R.F. TO MANET. PROTOCOLS FOR ROUTING. SECURITY : THREATS & SOLUTIONS. APPLICATIONS OF MANETs. SHORTCOMINGS of MANETs. CONCLUSION.

Networking : to share the resources & exchange the information among all the nodes which are interconnected. LAN MAN WAN DRAWBACKS: Setting up of fixed access points and backbone infrastructure is not always viable/possible. Infrastructure may not be present everywhere.. i.e. in a disaster area or battle-field or in a remote area.

A mobile ad hoc network is a collection of wireless nodes that can be dynamically set up ANYWHERE and ANYTIME, without using any pre-existing network infrastructure & which can form any arbitrary topology. Bcoz of its characteristics, MANETs make network available ALL THE TIME & EVERY WHERE

Ease of deployment. Speed of deployment. Decreased dependence on infrastructure. Dynamic topology. User flexibility.

Routing means to guide the data within the n/w from source to destination efficiently. Router does this by acquiring enough knowledge of the topology of the network. The following tasks should be taken care off : - Minimize the number of hops (path-length) - Minimize delay - Minimize packet loss - Minimize cost

Nodes themselves behave as routers & they are free to move at any speed, in any direction and they can organize themselves randomly. Host mobility :
Link failure/repair due to mobility Rate of link failure/repair is higher when nodes move fast

Distributed Environment
No centralized routing possible bcoz of the highly dynamic

nature of the network.

Route stability must be ensured despite mobility.

A table driven type of protocol based on BALLAMAN-FORD routing algorithm. Each node maintains a routing table which contains:

route to every possible destination


number of hops to the destination a sequence number assigned by the

destination node.

Each node periodically transmits updates, which includes its own sequence number & its own routing table updates. When two routes to a destination received from two different neighbors then
Chooses the one with greatest destination sequence number. If equal, chooses the smaller metric (hop count).

Pure on-demand routing protocol


A node does not perform route discovery or maintenance until it needs a route to another node or it offers its services as an intermediate node. Nodes that are not on active paths do not maintain routing information and do not participate in routing table exchanges.

Uses a broadcast route discovery mechanism. Uses hop-by-hop routing.

Source node floods Route Request (RREQ) to its neighbors. All node add their own identifier while forwarding RREQ further to their neighbors. When the intended destination receives a Route Request, it replies by sending a Route Reply (RREP) Route Reply travels along the reverse path set-up when Route Request is forwarded.

ATTACKS

EXTERNAL

INTERNAL

ATTACKER IS IN THE PROXIMITY, BUT NOT A TRUSTED NODE OF THE N/W.

ATTACKERS ARE THE WILLING PARTICIPANTS OF THE N/W.

ATTACKS ON ROUTING PROTOCOL

ATTACKS ON PACKET DELIVERY

EXTERNAL ATTACKS:
Encryption Authentication Key management

INTERNAL ATTACKS:
Security Routing Protocol based on DSR Protocol (on-demand): - set of security extensions are applied to protocols. SEAD Protocol based on DSDV Protocol (table driven): -security is provided on hop-to-hop basis. Ariadne Prtocol based on DSR Protocol (on-demand): -security is provided on point-to-point basis

Search-and-rescue applications in disaster situations. Defense (army, navy & air force) applications. Health Care applications. Academic environment applications. Industrial or corporate environment applications.

Battery constraints : network life limited by battery


life.

Mobility-induced route changes/packet losses. The radio interference. Packet collisions

QoS Supporting model.


Security, Reliability & Availability. Internetworking mechanism.

MANETS are the networks established in an arbitrary fashion. Operate in the absence of a fixed infrastructure. They can be used to provide network facilities in places where it isn't possible to form a fixed network or where it isn't cost effective to do so. Although there are numerous benefits of the MANETs, due to their nature, they are vulnerable and not deployable on a large scale because of the limits of technology.

Books: Subir Kumar Sarkar,T G Basavaraju & C Puttamadappa, Ad Hoc Mobile Wireless Networks, Auerbach Publications. Prashant Mohapatra & Srikanth V. Krishnamurthy, Ad-hoc Networks : Technologies and Protocols; Springer Publication. Dharmaprakash Agarwal & Qing-in-Zing, Wireless and Mobile systems; Thomson Publications. Kaveh Pahlavan & Prashant Krishnamurthy ; Principles of Wireless Networks, PHI Publication. Web sites:

www.ietf.org/mail-archive/web/manet/current/msg07065.html

http//www.computingunplugged.com/issues.

J. Broch, D. Maltz, D. Johnson, Y-C. Hu, and J. Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Proceedings of IEEE/ACM MobiCom, pages 8597, 1998.

You might also like