Sei sulla pagina 1di 15

name-Aditya

Roll no.-17BTI150403
ECE Department

Submitted To –Shweta Sinha


1. Introduction
2. Characteristics
3. Advantages
4. Applications
5.MANET Routing Protocols
6.Security goals
7.Destination -Sequence Distance vector
8. Dynamic Source Routing
9. Zone Routing Protocol
 An ad hoc network is a collection of
mobile nodes
 This network is a temporary network
without the aid of centralization
administration
 These nodes generally have a limited
transmission range
 It acts as both router and hosts
 Walkies talkies is the best examples
* Distributed operation
There is no central control of the network operation ,the
control of the network is distributed among the nodes .
* Autonomous terminal
In MANET, each m funcobile node is an independent which
could function as both a host and router.
* Light –weight terminal
In maximum cases, the nodes at MANET are mobile with
less CPU capability ,low power are small memory etc.
 Independence from central network
administration .self configuring network
 Nodes are also act a router
 Less expensive as compared to wired
network
 Improved Flexibility
 The network can be set up at any place
and time
* Military Environments
Military communication and operation
* Emergency Operation
Search –and- Result
Policing and fire fighting
* Education
Ad hoc communication during meeting or lectures.
* Entertainment
Multi user game
 PROACTIVE
 REACTIVE
 HYBRID
• Proactive
In proactive routing ,each node has to maintain one or more tables
to store routing information
REACTIVE
It is also know as on-demand routing protocol.
If a node want to send a packet to another node then this protocol
searches for the route in an on-demand manner.
HYBRID
They introduces a hybrid model that combines reactive and
proactive routing protocol
 Availability – Availability means the assets are accessible
to authorized parties at appropriate timer.
 Confidentiality – Confidentiality ensure that computer-
related assets are accessed by authorized parties.
 Integrity – Integrity means that assets can be modified only
by authorized parties.
 Non repudiation – Non repudiation ensures that sender
and receiver of a message cannot disavow that they have
ever sent or received such a message.
*Adapted from Routing information Protocol
*Each node maintain a routing table which
store
Next hop
Cost matrix for each destination
*Routing table update are transmitted periodically
* Routing information is trasmitted by broadcast
 DSR is a type of Reactive Routing Protocol
 On demand Protocol
 Source node floods Route Request
[RREQ] in the network
 Use broadcast method to send RREQ
A Hybrid Protocol
 ZRP combines both proactive and reactive
approach
 Divide network into non-overlapping
routing zones and use independent protocol
and use independent protocol on different
zones
* INTRA-ZONE – Proactive protocol are used
* INTER –ZONE – Reactive protocol are used

Potrebbero piacerti anche