Professional Documents
Culture Documents
Challenges in Mobile Ad Hoc Networks
Challenges in Mobile Ad Hoc Networks
ABSTRACT:
small
recent
in
pervasive
wireless
progresses
and
networks
advances
and
novel
devices
like
computing
Personal
Digital
including
new
using
network
which
communicate:
any
pre-existing
opportunities
together
challenges.
This
report
fixed
with
severe
describes
the
1. INTRODUCTION
based
upon
information
resources
mobile
nodes
can
wireless
This
mode
of
configuration
connections
of
on-the-fly.
wireless
A typical
exchanging
data
among
them
2. RELATED BACKGROUND
2.1 MANET Concept
nodes
endpoints
can
functions as
In MANET,
Autonomous terminal:
also
perform
switching
a router. So usually
and
switches
are
indistinguishable in MANET.
2
Communication
one hop.
2. Remote-to-Remote: Communication
routing.
cost
of
lesser
functionality
and
delivering
data
and
frequently.
applicability.
the
When
connectivity
among
the
adapt
to
the
traffic
and
algorithms
and
mechanisms
that
implement
the
computing
and
communicating functions.
network.
considered.
deployed
in
military
in
1970s.
3. Challenges In MANETs
The special features of MANET bring this
technology great opportunity together with
severe challenges. These include:
the
ad hoc networks.
Many
What
international
conferences
and
destination
makes
machine.
routing
The
routing
algorithm
when
conferences
of
ACM
there
are
lots
of
algorithms
neighbors
are
automatically
Without
some
form
of
routing.
security provisions.
Loop
freedom:
Though,
if
of
resources
and
better
overall
performance.
such
adverse consequences.
Security:
in these contexts.
sleep
periods
Unidirectional
link
A routing
without
overly
support:
Bi-
many
discovery delay.
Proactive operation:
algorithms
are
incapable
of
This is the
Vector Routing
copy
on-demand
their tables.
algorithm,
that
is,
it
of
the
request
came.
This
failure
discovery if needed.
and
sends
link
failure
detection
has
become
very
User
and
program
activities
are
considerable.
Misuse Detection:
It bases its
usage.
information.
movement.
ID
may
find
it
to
preferably
detected
intrusions,
without
human
intervention.
7. Accuracy of the IDS is another major
desired.
8. It should interoperate with other
intrusion
systems
to
detection
communication
among
electing
tables.
a remedial
action. A secure
IDS agents.
This
node
does
local
independently,
and
intrusion
detection
neighboring
IDS
presents
distributed
and
nodes
4. CONCLUSION
This
coordinates
Dept. I.T, AITS
actions
among
report
describes
the
background
neighboring
10
from
military,
emergency
Distance
Vector
(AODV)
pages
Dynamic
Destination
Sequenced
Detection
in
Wireless
Ad
Hoc
5. REFERENCES
11