REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES

International Journal of Technical Research & Application
International Journal of Technical Research & ApplicationInternational Journal of Technical Research & Application

REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES

International Journal of Technical Research and Applications e-ISSN: 2320-8163, 
www.ijtra.com Volume 1, Issue 3 (july-August 2013), PP. 65-67 
65 | P a g e 
REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES 
Ashish Kumar Pandey1, Anurag Srivastava2 
1Assistant Professor, Dr. MC Saxena Group of Colleges, Lucknow, India 
2MIS Manager, Parag Factory, Lucknow, India 
Abstract— We have seen the advancement in the field of internet due to wireless networking technologies. It gives rise to many new applications. In the past of few decades, we have seen the advancement in wireless networks. The emerging capabilities of mobile devices have given a new direction to the internet, which decreases the cost and allow us to use infrastructure wireless networks and infrastructure less wireless networks (i.e. Mobile Ad Hoc Wireless Network).With so many applications that MANETs provides us, there are still some challenges that have to overcome. We present in this paper, the history of MANET, challenges (issues) involve in MANET and its some applications. 
Index Terms— wireless networking, Mobile Ad Hoc, MANET. (key words) 
I. INTRODUCTION. 
Opposed to the infrastructure wireless networks where each user directly communicates with an access point or base station, a mobile ad hoc network, or MANET is a kind of wireless ad hoc network [1]. It is a self-configuring network of mobile routers connected by wireless links with no access point. Every mobile device in a network is autonomous. The mobile devices are free to move haphazardly and organize themselves arbitrarily. In other words, ad hoc network do not rely on any fixed infrastructure (i.e. the mobile ad hoc network is infrastructure less wireless network. The Communication in MANET is take place by using multi-hop paths. Nodes in the MANET share the wireless medium and the topology of the network changes erratically and dynamically. In MANET, breaking of communication link is very frequent, as nodes are free to move to anywhere. The density of nodes and the number of nodes are depends on the applications in which we are using MANET. MANET has given rise to many applications like Tactical networks, Wireless Sensor Network, Data Networks, Device Networks, etc. With many applications there are still some design issues and challenges to overcome. 
Fig.1 Mobile ad hoc network 
II. HISTORY 
We can characterized the life cycle of mobile ad hoc network into first, second and third generation Present ad hoc network are considered the third generation [2][3]. The first generation of ad hoc network can be traced back to 1970’s. In 1970’s, these are called Packet Radio Network (PRNET)[4]. The Defence Advanced Research Project Agency (DARPA) initiated research of using packet- switched radio communication to provide reliable communication between computers and urbanized PRNET. Basically PRNET uses the combination of Areal Location of Hazardous Atmospheres (ALOHA) and Carrier Sense Multiple Access (CSMA) for multiple access and distance vector routing [5][2][3]. 
The PRNET is then evolved into the Survivable Adaptive Radio Network (SURAN) in the early 1980’s. SURAN provide some benefits by improving the radio performance ( making them smaller , cheaper and power thrifty). This SURAN also provide resilience to electronic attacks. 
Around the same time, United State Department of Defence (DOD ) continued funding for programs such Globe Mobile Information System (GloMo) and Near Term Digital Radio (NTDR). GloMo make use of CSMA/CA and TDMA molds, and provides self-organizing and self-healing network (i.e. ATM over wireless , Satellite Communication Network). The NTDR make use of clustering and link state routing and organized an ad hoc network. NTDR is worn by US Army.
International Journal of Technical Research and Applications e-ISSN: 2320-8163, 
www.ijtra.com Volume 1, Issue 3 (july-August 2013), PP. 65-67 
66 | P a g e 
This is the only “real” ad hoc network in use. By the growing interest in the ad hoc networks, a various other great developments takes place in 1990’s. 
The functioning group of MANET is born in Internet Engineering Task Force (IETF) who worked to standardized routing protocols for MANET and gives rise to the development of various mobile devices like PDA’s , palmtops, notebooks, etc . Meanwhile the Development of Standard IEEE 802.11 (i.e. WLAN’s ) benefited the ad hoc network. Some other standards are also developed that provide benefits to the MANET like Bluetooth and HIPERLAN. 
III. MANET CHALLENGES 
Regardless of the variety of applications and the long history of mobile ad hoc network, there are still some issues and design challenges that we have to overcome [6]. This is the reason MANET is one of the elementary research field. MANET is a wireless network of mobile nodes, it’s a self- organized network. Every device can communicate with every other device i.e. it is also multi hop network. 
Fig.2 MANET challenges 
As it is a wireless network it inherits the traditional problem of wireless networking: 
1) The channel is unprotected from outside signal. 
2) The wireless media is unreliable as compared to the wired media. 
3) Hidden terminal and expose terminal phenomenon may occur. 
4) The channel has time varying and asymmetric propagation properties [6]. 
With these problems there are some other challenges and complexities: 
The scalability is required in MANET as it is used in military communications, because the network grows according to the need , so each mobile device must be capable to handle the intensification of network and to accomplish the task. MANET is a infrastructure less network, there is no central administration. Each device can communicate with every other device, hence it becomes difficult to detect and manage the faults. In MANET, the mobile devices can move randomly. The use of this dynamic topology results in route changes, frequent network partitions and possibly packet losses [1]. Each node in the network is autonomous, hence have the equipment for radio interface with different transmission/ receiving capabilties this results in asymmetric links. MANET uses no router in between. In network every node acts as a router and can forward packets of data to other nodes to provide information partaking among the mobile nodes. Difficult chore to implement ad hoc addressing scheme, the MAC address of the device is used in the stand alone ad hoc network. However every application are based on TCP/IP and UDP/IP 
Table.1 
MOBILE Ad Hoc NETWORK APPLICATIONS 
Areas 
Possible Scenarios 
Military Scenarios 
supports tactical MANET network for military communications and automated battle fields. 
Rescue Operations 
It provides Disaster recovery, means replacement of fixed infrastructure network in case of environmental disaster. 
Device Networks 
Device Networks supports the wireless connections between various mobile devices so that they can communicate. 
Free Internet Connection 
Sharing 
It also allow us to share the internet with other mobile devices. 
Sensor Network 
It consist of devices that have capability of sensing ,computation and wireless networking Wireless sensor network combines the power of all three of them, like smoke detectors, electricity, gas and water meters[7]. 
IV. FUTURE SCOPE 
We have seen a great development in the field of wireless networks(infrastructure based) and in the field of Mobile ad hoc network (infrastructure less network). The integaration of Wireless Networks and fixed infrastructure network with the Mobile ad hoc network may evolve the fouth generation communication support networks. From the technological point of view, the realisation of this vision still requires a large number of challenges related to devices, protocols, applications and services, are to be dealt with. The succinct discussion in this paper shows that, In spite the large efforts of the MANET research community and the ample progress made during the last years, a lot of technical issues
International Journal of Technical Research and Applications e-ISSN: 2320-8163, 
www.ijtra.com Volume 1, Issue 3 (july-August 2013), PP. 65-67 
67 | P a g e 
remain unanswered [8]. From an economical point of view, mobile ad-hoc networks open up new business opportunities for telecom operators and service providers. To this end, appropriate business scenarios, applications and economical models need to be identified, together with technological advances, making a transition of ad-hoc networks to the commercial world viable. 
V. ACKNOWLEDGEMENT 
I would like to thank Ms. Masooma Nigar and Mr. Mohit Kumar for their support and guidance. I would also like to thank to my family for their valuable support and guidance. 
REFERENCES 
[1] Jeoren Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demester “An Overview of Mobile ad hoc Netwroks: Applications & Challenges”. 
[2] Kavita Taneja, R.B. Patel “An Overveiw of Mobile Ad hoc Networks: Challenges and Future.” 
[3] Vikaram Patalbasi, Sonali Mote “Mobile Ad hoc Networks: Opportunities and Future.” 
[4] Humayun Bakht “History of Mobile Ad hoc Networks” http://www.oocities.org/humayunbakht/HMA NET.pdf 
[5] Ram Ramanathan and Jason Redi “A Brief Overview Of Ad Hoc Networks: Challenges and Directions” IEEE Communications Magazine- 50th Anniversary Commemorative Issue/May 2002 
[6] Imrich Chalmtac, Marco Conti, Jennifer J.-N. Liu “ Mobile ad hoc networking: imperatives and challenges.” 
[7] Andrea Goldsmith “Wireless Communications” Cambridge University Press. 
[8] Pravin Ghosekar, Girish Katkar, Dr. Pradip Ghorpade ”Mobile Ad Hoc Networking: Imperatives and Challenges”

Recomendados

Manet mobile ad hoc network – challenges, security and protocols-2 por
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2prjpublications
3.5K visualizações11 slides
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ... por
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET Journal
27 visualizações5 slides
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech... por
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET Journal
6 visualizações3 slides
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat... por
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
131 visualizações24 slides
A simulation and analysis of secured aodv protocol in mobile ad hoc networks por
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
160 visualizações6 slides
A simulation and analysis of secured aodv protocol in por
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol ineSAT Publishing House
467 visualizações6 slides

Mais conteúdo relacionado

Mais procurados

A Security Architecture for Automated Social Engineering (ASE) Attacks over F... por
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...CSCJournals
339 visualizações11 slides
Performance Analysis of Communication Protocols for Post Disaster Communication por
Performance Analysis of Communication Protocols for Post Disaster CommunicationPerformance Analysis of Communication Protocols for Post Disaster Communication
Performance Analysis of Communication Protocols for Post Disaster CommunicationAM Publications,India
18 visualizações5 slides
Iaetsd manet a reliable network in disaster areas por
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd Iaetsd
364 visualizações6 slides
I05225564 por
I05225564I05225564
I05225564IOSR-JEN
413 visualizações10 slides
To mitigate Black-hole attack with CBDS in MANET por
To mitigate Black-hole attack with CBDS in MANETTo mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANETIJERA Editor
411 visualizações7 slides
Do black holes exist por
Do black holes existDo black holes exist
Do black holes existThesis Scientist Private Limited
507 visualizações68 slides

Mais procurados(18)

A Security Architecture for Automated Social Engineering (ASE) Attacks over F... por CSCJournals
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
CSCJournals339 visualizações
Performance Analysis of Communication Protocols for Post Disaster Communication por AM Publications,India
Performance Analysis of Communication Protocols for Post Disaster CommunicationPerformance Analysis of Communication Protocols for Post Disaster Communication
Performance Analysis of Communication Protocols for Post Disaster Communication
AM Publications,India18 visualizações
Iaetsd manet a reliable network in disaster areas por Iaetsd Iaetsd
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areas
Iaetsd Iaetsd364 visualizações
I05225564 por IOSR-JEN
I05225564I05225564
I05225564
IOSR-JEN413 visualizações
To mitigate Black-hole attack with CBDS in MANET por IJERA Editor
To mitigate Black-hole attack with CBDS in MANETTo mitigate Black-hole attack with CBDS in MANET
To mitigate Black-hole attack with CBDS in MANET
IJERA Editor411 visualizações
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee... por ijcseit
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
ijcseit940 visualizações
Performance comparison of umts and lte on the basis of data rates por IAEME Publication
Performance comparison of umts and lte on the basis of data ratesPerformance comparison of umts and lte on the basis of data rates
Performance comparison of umts and lte on the basis of data rates
IAEME Publication424 visualizações
SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW... por Rakesh Jha
SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW...SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW...
SPECIAL SECTION ON RECENT ADVANCES IN SOFTWARE DEFINED NETWORKING FOR 5G NETW...
Rakesh Jha890 visualizações
Cz3210711074 por IJMER
Cz3210711074Cz3210711074
Cz3210711074
IJMER271 visualizações
Security Models in Cellular Wireless Networks por William Chipman
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
William Chipman619 visualizações
5 g mobile technology por Kiran Kumar
5 g mobile technology5 g mobile technology
5 g mobile technology
Kiran Kumar170 visualizações
27 32 por Editor IJARCET
27 3227 32
27 32
Editor IJARCET150 visualizações
A survey on security threats and detection2013 por Amina RIYAHI
A survey on security threats and detection2013A survey on security threats and detection2013
A survey on security threats and detection2013
Amina RIYAHI198 visualizações
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M... por ijtsrd
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
ijtsrd39 visualizações
An efficient transport protocol for delivery of multimedia content in wireles... por Alexander Decker
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...
Alexander Decker537 visualizações
MOBILE COMPUTING BY SIVASANKARI por SivaSankari36
MOBILE COMPUTING BY SIVASANKARIMOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARI
SivaSankari36371 visualizações
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol por ijsrd.com
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
ijsrd.com476 visualizações

Destaque

Chintakunta por
ChintakuntaChintakunta
ChintakuntaPrasanth Chintakunta
442 visualizações4 slides
ANALYSIS OF WATER OF RAIGARH AREA WITH SPECIAL REFERENCE TO HEAVY METALS por
ANALYSIS OF WATER OF RAIGARH AREA WITH SPECIAL REFERENCE TO HEAVY METALSANALYSIS OF WATER OF RAIGARH AREA WITH SPECIAL REFERENCE TO HEAVY METALS
ANALYSIS OF WATER OF RAIGARH AREA WITH SPECIAL REFERENCE TO HEAVY METALSInternational Journal of Technical Research & Application
222 visualizações3 slides
EMPLOYEE SATISFACTION AND WORK MOTIVATION IN A PHARMACEUTICAL COMPANY por
EMPLOYEE SATISFACTION AND WORK MOTIVATION IN A PHARMACEUTICAL COMPANYEMPLOYEE SATISFACTION AND WORK MOTIVATION IN A PHARMACEUTICAL COMPANY
EMPLOYEE SATISFACTION AND WORK MOTIVATION IN A PHARMACEUTICAL COMPANYInternational Journal of Technical Research & Application
622 visualizações7 slides
EQUILIBRIUM, KINETIC AND THERMODYNAMIC STUDIES ON BASIC DYE ADSORPTION USING ... por
EQUILIBRIUM, KINETIC AND THERMODYNAMIC STUDIES ON BASIC DYE ADSORPTION USING ...EQUILIBRIUM, KINETIC AND THERMODYNAMIC STUDIES ON BASIC DYE ADSORPTION USING ...
EQUILIBRIUM, KINETIC AND THERMODYNAMIC STUDIES ON BASIC DYE ADSORPTION USING ...International Journal of Technical Research & Application
486 visualizações8 slides
Java interview questions tutorialspoint por
Java interview questions   tutorialspointJava interview questions   tutorialspoint
Java interview questions tutorialspointمحمود الحسين
1K visualizações20 slides
ACTUAL_TR_ por
ACTUAL_TR_ACTUAL_TR_
ACTUAL_TR_Murat Akinci
216 visualizações8 slides

Destaque(20)

Java interview questions tutorialspoint por محمود الحسين
Java interview questions   tutorialspointJava interview questions   tutorialspoint
Java interview questions tutorialspoint
محمود الحسين1K visualizações
ACTUAL_TR_ por Murat Akinci
ACTUAL_TR_ACTUAL_TR_
ACTUAL_TR_
Murat Akinci216 visualizações
Sufiyan_CV_Upated- DEC- 2014 por Mohammed Sufiyan
Sufiyan_CV_Upated- DEC- 2014Sufiyan_CV_Upated- DEC- 2014
Sufiyan_CV_Upated- DEC- 2014
Mohammed Sufiyan352 visualizações
Using powerpoint at exhibitions presentation por Lorna Rose
Using powerpoint at exhibitions presentationUsing powerpoint at exhibitions presentation
Using powerpoint at exhibitions presentation
Lorna Rose222 visualizações
Bus 370 entire course por profanchloren1984
Bus 370 entire courseBus 370 entire course
Bus 370 entire course
profanchloren19841.2K visualizações
Benetton Group Marketing Analysis/ تحلیل بازاریابی گروه بنتون por Ehsan Zeraatparvar
Benetton Group Marketing Analysis/ تحلیل بازاریابی گروه بنتونBenetton Group Marketing Analysis/ تحلیل بازاریابی گروه بنتون
Benetton Group Marketing Analysis/ تحلیل بازاریابی گروه بنتون
Ehsan Zeraatparvar795 visualizações
Material Testing Equipments - Gemarc Enterprises por Lance Libot
Material Testing Equipments - Gemarc EnterprisesMaterial Testing Equipments - Gemarc Enterprises
Material Testing Equipments - Gemarc Enterprises
Lance Libot416 visualizações
Caterer | Asian Restaurants - Chef Patricks Kitchen por Lance Libot
Caterer | Asian Restaurants - Chef Patricks KitchenCaterer | Asian Restaurants - Chef Patricks Kitchen
Caterer | Asian Restaurants - Chef Patricks Kitchen
Lance Libot421 visualizações

Similar a REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES

Proposed Scheme for Secured Routing in MANET por
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
66 visualizações5 slides
The Basic Physical Layout Of A Lan por
The Basic Physical Layout Of A LanThe Basic Physical Layout Of A Lan
The Basic Physical Layout Of A LanLeslie Thomas
2 visualizações39 slides
3. 7769 8114-1-pb por
3. 7769 8114-1-pb3. 7769 8114-1-pb
3. 7769 8114-1-pbIAESIJEECS
15 visualizações11 slides
Secured Intrusion Protection System through EAACK in MANETS por
Secured Intrusion Protection System through EAACK in MANETSSecured Intrusion Protection System through EAACK in MANETS
Secured Intrusion Protection System through EAACK in MANETSijtsrd
16 visualizações7 slides
A017220112 por
A017220112A017220112
A017220112IOSR Journals
116 visualizações12 slides
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING por
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
136 visualizações12 slides

Similar a REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES(20)

Proposed Scheme for Secured Routing in MANET por IJAEMSJORNAL
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
IJAEMSJORNAL66 visualizações
The Basic Physical Layout Of A Lan por Leslie Thomas
The Basic Physical Layout Of A LanThe Basic Physical Layout Of A Lan
The Basic Physical Layout Of A Lan
Leslie Thomas2 visualizações
3. 7769 8114-1-pb por IAESIJEECS
3. 7769 8114-1-pb3. 7769 8114-1-pb
3. 7769 8114-1-pb
IAESIJEECS15 visualizações
Secured Intrusion Protection System through EAACK in MANETS por ijtsrd
Secured Intrusion Protection System through EAACK in MANETSSecured Intrusion Protection System through EAACK in MANETS
Secured Intrusion Protection System through EAACK in MANETS
ijtsrd16 visualizações
A017220112 por IOSR Journals
A017220112A017220112
A017220112
IOSR Journals116 visualizações
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING por IJCI JOURNAL
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
IJCI JOURNAL136 visualizações
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets por ijiert bestjournal
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
ijiert bestjournal47 visualizações
H010524049 por IOSR Journals
H010524049H010524049
H010524049
IOSR Journals123 visualizações
Window based smart antenna design por ijwmn
Window based smart antenna designWindow based smart antenna design
Window based smart antenna design
ijwmn130 visualizações
An Introduction To Computer Networking A Survey por Cheryl Brown
An Introduction To Computer Networking  A SurveyAn Introduction To Computer Networking  A Survey
An Introduction To Computer Networking A Survey
Cheryl Brown2 visualizações
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA... por acijjournal
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
acijjournal74 visualizações
Detecting of routng misbehavion in hybrid wireless networks used and acknowle... por AAKASH S
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
AAKASH S924 visualizações
Virtual Private Network ( Vpn ) por Tracy Berry
Virtual Private Network ( Vpn )Virtual Private Network ( Vpn )
Virtual Private Network ( Vpn )
Tracy Berry3 visualizações
A Review of different Routing Protocols for Ad Hoc Mobile Wireless Networks por IJEEE
A Review of different Routing Protocols for Ad Hoc Mobile Wireless NetworksA Review of different Routing Protocols for Ad Hoc Mobile Wireless Networks
A Review of different Routing Protocols for Ad Hoc Mobile Wireless Networks
IJEEE 155 visualizações
40120140503011 por IAEME Publication
4012014050301140120140503011
40120140503011
IAEME Publication264 visualizações
Booysen machine 2012 por Sreekrishna Das
Booysen machine 2012Booysen machine 2012
Booysen machine 2012
Sreekrishna Das68 visualizações
AODV information por anilds02
AODV informationAODV information
AODV information
anilds02453 visualizações

Mais de International Journal of Technical Research & Application

STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW por
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEWSTUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEWInternational Journal of Technical Research & Application
70 visualizações5 slides
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED... por
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...International Journal of Technical Research & Application
294 visualizações7 slides
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T... por
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...International Journal of Technical Research & Application
312 visualizações6 slides
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS por
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONSSTUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONSInternational Journal of Technical Research & Application
182 visualizações6 slides
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL... por
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...International Journal of Technical Research & Application
222 visualizações4 slides
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER por
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTERPOD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTERInternational Journal of Technical Research & Application
374 visualizações3 slides

Mais de International Journal of Technical Research & Application(20)

Último

Drama KS5 Breakdown por
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 BreakdownWestHatch
71 visualizações2 slides
Google solution challenge..pptx por
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptxChitreshGyanani1
98 visualizações18 slides
Create a Structure in VBNet.pptx por
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptxBreach_P
70 visualizações8 slides
Education and Diversity.pptx por
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptxDrHafizKosar
118 visualizações16 slides
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf por
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfSukhwinderSingh895865
507 visualizações6 slides
ICS3211_lecture 08_2023.pdf por
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdfVanessa Camilleri
103 visualizações30 slides

Último(20)

Drama KS5 Breakdown por WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch71 visualizações
Google solution challenge..pptx por ChitreshGyanani1
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptx
ChitreshGyanani198 visualizações
Create a Structure in VBNet.pptx por Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P70 visualizações
Education and Diversity.pptx por DrHafizKosar
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar118 visualizações
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf por SukhwinderSingh895865
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
SukhwinderSingh895865507 visualizações
ICS3211_lecture 08_2023.pdf por Vanessa Camilleri
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdf
Vanessa Camilleri103 visualizações
Community-led Open Access Publishing webinar.pptx por Jisc
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
Jisc74 visualizações
Classification of crude drugs.pptx por GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1477 visualizações
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx por Inge de Waard
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptxOEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
Inge de Waard167 visualizações
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx por Debapriya Chakraborty
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxGopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Debapriya Chakraborty598 visualizações
The Accursed House by Émile Gaboriau por DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta158 visualizações
Sociology KS5 por WestHatch
Sociology KS5Sociology KS5
Sociology KS5
WestHatch64 visualizações
Psychology KS5 por WestHatch
Psychology KS5Psychology KS5
Psychology KS5
WestHatch77 visualizações
The basics - information, data, technology and systems.pdf por JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena188 visualizações
Use of Probiotics in Aquaculture.pptx por AKSHAY MANDAL
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptx
AKSHAY MANDAL89 visualizações
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1} por DR .PALLAVI PATHANIA
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
DR .PALLAVI PATHANIA240 visualizações
Scope of Biochemistry.pptx por shoba shoba
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptx
shoba shoba124 visualizações

REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES

  • 1. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 1, Issue 3 (july-August 2013), PP. 65-67 65 | P a g e REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES Ashish Kumar Pandey1, Anurag Srivastava2 1Assistant Professor, Dr. MC Saxena Group of Colleges, Lucknow, India 2MIS Manager, Parag Factory, Lucknow, India Abstract— We have seen the advancement in the field of internet due to wireless networking technologies. It gives rise to many new applications. In the past of few decades, we have seen the advancement in wireless networks. The emerging capabilities of mobile devices have given a new direction to the internet, which decreases the cost and allow us to use infrastructure wireless networks and infrastructure less wireless networks (i.e. Mobile Ad Hoc Wireless Network).With so many applications that MANETs provides us, there are still some challenges that have to overcome. We present in this paper, the history of MANET, challenges (issues) involve in MANET and its some applications. Index Terms— wireless networking, Mobile Ad Hoc, MANET. (key words) I. INTRODUCTION. Opposed to the infrastructure wireless networks where each user directly communicates with an access point or base station, a mobile ad hoc network, or MANET is a kind of wireless ad hoc network [1]. It is a self-configuring network of mobile routers connected by wireless links with no access point. Every mobile device in a network is autonomous. The mobile devices are free to move haphazardly and organize themselves arbitrarily. In other words, ad hoc network do not rely on any fixed infrastructure (i.e. the mobile ad hoc network is infrastructure less wireless network. The Communication in MANET is take place by using multi-hop paths. Nodes in the MANET share the wireless medium and the topology of the network changes erratically and dynamically. In MANET, breaking of communication link is very frequent, as nodes are free to move to anywhere. The density of nodes and the number of nodes are depends on the applications in which we are using MANET. MANET has given rise to many applications like Tactical networks, Wireless Sensor Network, Data Networks, Device Networks, etc. With many applications there are still some design issues and challenges to overcome. Fig.1 Mobile ad hoc network II. HISTORY We can characterized the life cycle of mobile ad hoc network into first, second and third generation Present ad hoc network are considered the third generation [2][3]. The first generation of ad hoc network can be traced back to 1970’s. In 1970’s, these are called Packet Radio Network (PRNET)[4]. The Defence Advanced Research Project Agency (DARPA) initiated research of using packet- switched radio communication to provide reliable communication between computers and urbanized PRNET. Basically PRNET uses the combination of Areal Location of Hazardous Atmospheres (ALOHA) and Carrier Sense Multiple Access (CSMA) for multiple access and distance vector routing [5][2][3]. The PRNET is then evolved into the Survivable Adaptive Radio Network (SURAN) in the early 1980’s. SURAN provide some benefits by improving the radio performance ( making them smaller , cheaper and power thrifty). This SURAN also provide resilience to electronic attacks. Around the same time, United State Department of Defence (DOD ) continued funding for programs such Globe Mobile Information System (GloMo) and Near Term Digital Radio (NTDR). GloMo make use of CSMA/CA and TDMA molds, and provides self-organizing and self-healing network (i.e. ATM over wireless , Satellite Communication Network). The NTDR make use of clustering and link state routing and organized an ad hoc network. NTDR is worn by US Army.
  • 2. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 1, Issue 3 (july-August 2013), PP. 65-67 66 | P a g e This is the only “real” ad hoc network in use. By the growing interest in the ad hoc networks, a various other great developments takes place in 1990’s. The functioning group of MANET is born in Internet Engineering Task Force (IETF) who worked to standardized routing protocols for MANET and gives rise to the development of various mobile devices like PDA’s , palmtops, notebooks, etc . Meanwhile the Development of Standard IEEE 802.11 (i.e. WLAN’s ) benefited the ad hoc network. Some other standards are also developed that provide benefits to the MANET like Bluetooth and HIPERLAN. III. MANET CHALLENGES Regardless of the variety of applications and the long history of mobile ad hoc network, there are still some issues and design challenges that we have to overcome [6]. This is the reason MANET is one of the elementary research field. MANET is a wireless network of mobile nodes, it’s a self- organized network. Every device can communicate with every other device i.e. it is also multi hop network. Fig.2 MANET challenges As it is a wireless network it inherits the traditional problem of wireless networking: 1) The channel is unprotected from outside signal. 2) The wireless media is unreliable as compared to the wired media. 3) Hidden terminal and expose terminal phenomenon may occur. 4) The channel has time varying and asymmetric propagation properties [6]. With these problems there are some other challenges and complexities: The scalability is required in MANET as it is used in military communications, because the network grows according to the need , so each mobile device must be capable to handle the intensification of network and to accomplish the task. MANET is a infrastructure less network, there is no central administration. Each device can communicate with every other device, hence it becomes difficult to detect and manage the faults. In MANET, the mobile devices can move randomly. The use of this dynamic topology results in route changes, frequent network partitions and possibly packet losses [1]. Each node in the network is autonomous, hence have the equipment for radio interface with different transmission/ receiving capabilties this results in asymmetric links. MANET uses no router in between. In network every node acts as a router and can forward packets of data to other nodes to provide information partaking among the mobile nodes. Difficult chore to implement ad hoc addressing scheme, the MAC address of the device is used in the stand alone ad hoc network. However every application are based on TCP/IP and UDP/IP Table.1 MOBILE Ad Hoc NETWORK APPLICATIONS Areas Possible Scenarios Military Scenarios supports tactical MANET network for military communications and automated battle fields. Rescue Operations It provides Disaster recovery, means replacement of fixed infrastructure network in case of environmental disaster. Device Networks Device Networks supports the wireless connections between various mobile devices so that they can communicate. Free Internet Connection Sharing It also allow us to share the internet with other mobile devices. Sensor Network It consist of devices that have capability of sensing ,computation and wireless networking Wireless sensor network combines the power of all three of them, like smoke detectors, electricity, gas and water meters[7]. IV. FUTURE SCOPE We have seen a great development in the field of wireless networks(infrastructure based) and in the field of Mobile ad hoc network (infrastructure less network). The integaration of Wireless Networks and fixed infrastructure network with the Mobile ad hoc network may evolve the fouth generation communication support networks. From the technological point of view, the realisation of this vision still requires a large number of challenges related to devices, protocols, applications and services, are to be dealt with. The succinct discussion in this paper shows that, In spite the large efforts of the MANET research community and the ample progress made during the last years, a lot of technical issues
  • 3. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 1, Issue 3 (july-August 2013), PP. 65-67 67 | P a g e remain unanswered [8]. From an economical point of view, mobile ad-hoc networks open up new business opportunities for telecom operators and service providers. To this end, appropriate business scenarios, applications and economical models need to be identified, together with technological advances, making a transition of ad-hoc networks to the commercial world viable. V. ACKNOWLEDGEMENT I would like to thank Ms. Masooma Nigar and Mr. Mohit Kumar for their support and guidance. I would also like to thank to my family for their valuable support and guidance. REFERENCES [1] Jeoren Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demester “An Overview of Mobile ad hoc Netwroks: Applications & Challenges”. [2] Kavita Taneja, R.B. Patel “An Overveiw of Mobile Ad hoc Networks: Challenges and Future.” [3] Vikaram Patalbasi, Sonali Mote “Mobile Ad hoc Networks: Opportunities and Future.” [4] Humayun Bakht “History of Mobile Ad hoc Networks” http://www.oocities.org/humayunbakht/HMA NET.pdf [5] Ram Ramanathan and Jason Redi “A Brief Overview Of Ad Hoc Networks: Challenges and Directions” IEEE Communications Magazine- 50th Anniversary Commemorative Issue/May 2002 [6] Imrich Chalmtac, Marco Conti, Jennifer J.-N. Liu “ Mobile ad hoc networking: imperatives and challenges.” [7] Andrea Goldsmith “Wireless Communications” Cambridge University Press. [8] Pravin Ghosekar, Girish Katkar, Dr. Pradip Ghorpade ”Mobile Ad Hoc Networking: Imperatives and Challenges”