SlideShare una empresa de Scribd logo
1 de 31
TARUN VARSHNEY
varshney@live.in
Department of Information Technology
ABES Engineering College
MANET : The Art of Networking
without a Network
Wireless Networks
• Computer network that is wireless
• Infrastructure-based networks
• Less expensive to setup
IP backbone
Server
Router
Gateways
Disadvantages
• Disaster areas
• no infrastructure
• Large construction sites
• Too expensive
• Inconvenient
• Military operations
Solution???
• Mobile ad hoc network
• Mobile ad hoc network (MANET), or simply ad hoc network, comprises
nodes that freely and dynamically self-organize into arbitrary and temporary
network topology without any infrastructure support.
Mobile
Random and perhaps changing
Ad Hoc
Not engineered i.e. made or happening only for a particular purpose or
need, not planned before it happens
Network
Network, is a collection of systems and other hardware interconnected by
communication channels that allow sharing of resources and information
MANET: Mobile Ad hoc Network
 MANET is a self-configuring network of mobile nodes connected by
wireless links - the union of which form an arbitrary topology.
 Individual nodes act as routers
 Minimal configuration and quick deployment make ad hoc networks
suitable for emergency situations like natural or human-induced
disasters, military conflicts, emergency medical situations etc.
 Such a network may operate in a standalone fashion, or may be
connected to the larger Internet.
MANET: Mobile Ad hoc Network (continued)
Mobile Ad Hoc Network (MANET) is a collection of two or more
devices or nodes or terminals with wireless communication and
networking capability that communicate with each other without the
aid of any centralized administrator also the wireless nodes that can
dynamically form a network to exchange information without using any
existing fixed network infrastructure
MANET: Mobile Ad hoc Network (continued)
MANETs: Operation
A
B
C
D
E
F
Internet
E
Gateway
Stand-alone MANET
After one of the nodes is configured as a gateway, the entire network is
connected to an external network like Internet
Mobile Ad Network – HOME
A
B
C
MANET: Formation
MANET: Architecture
Collision – Hidden-Station Problem
• A wishes to communicate with B. However A cannot detect communication from C but
can detect communication from B.
• C also wishes to communicate with B. Again C cannot detect communication from A but
can detect Communication from B.
• C is hidden from A and A is hidden from C.
• Both A and C transmit and their signals collide leading to loss of both packets.
Collision – Exposed-station Problem
• Nodes A, B, and C can all detect communications from one another. However, Only C can
detect communication from D.
• Node B wishes to send to Node A and Node C wishes to send to Node D.
• So Node B begins transmitting to Node A and Node C recognizes this. The medium is in
use so Node C can not transmit to Node D.
• Even though both transmission requests could be made going in opposite directions, the
transmission does not happen. This is because Node C is exposed to Nodes A and B while D
is not.
Routing is the process of selecting paths in a network along which to send
network traffic
Routing Protocols are the set of rules and regulation that are must followed
during the communication over the network.
MANET: Routing and Routing Protocols
MANET: Classification of Routing Protocol
 Proactive Routing Protocol or Table Driven Approaches:
Maintain regular and up to date routing information about each node in the network by
propagating route updation at fixed time interval throughout the network.
 Reactive Routing Protocol:
Establish the route to a destination only when there is a demand for it.
Also called as “Demand Protocol”.
 Hybrid Routing Protocol:
Combination of proactive and reactive protocol
The route is established with the proactive routes and uses reactive flooding for new
mobile nodes.
 Reactive Routing Protocol
Ad Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing (DSR)
Associativity Based Routing (ABR)
 Proactive Routing Protocol
Destination-Sequenced Distance-Vector Routing (DSDV)
Optimized Link State Routing (OLSR)
The Wireless Routing Protocol (WRP)
MANET: Routing Protocols (continued)
 Hybrid Routing Protocol
Temporary Ordered routing Algorithm (TORA)
Zone Routing Protocol (ZPR)
Order One routing Protocol(OOPR)
 Constructs route on demand and reduce routing load.
 Uses table driven routing framework.
 Destination sequence number for routing packets to destination mobile nodes.
 Location independent algorithm.
 Bi-directional route.
 Packet send from source to destination, floods the network with the RREQ
packets. All mobile node receive RREQ from neighbor or update message then
checks routing table to find out that if it is the destination node or if it has fresh
route to the destination then unicast RREP which is routed back on a temporary
reverse route generated by RREQ from source node or else it re-broadcast RREQ.
Ad Hoc On-Demand Distance Vector (AODV)
The Internet Engineering task Force MANET working group suggests two
different types of matrices for Evaluting the performance of the protocols of the
MANETs
 Qualitative Metrics
 Quantitative Metrics
Performance and Evaluation issues of Routing Protocols
Qualitative Metrics
Qualitative metrics include the :
• Loop Freedom
• On-Demand Routing Behavior
• Proactive Behavior
• Security
• Unidirectional Link Support
• Sleep Mode
Quantitative Metrics
Quantitative metrics broadly includes the:
• End-to-end data throughput and delay
• Route Acquisition Time
• Out-of-Order Delivery
• Efficiency
Challenges in Securing MANETs
To secure an ad hoc network, the following attributes may be considered:
- Availability
- Confidentiality
- Integrity
- Authentication
Challenges in Securing MANETs
• Security exposures of ad hoc routing protocols are due to two different types of attacks:
- Active attacks through which the misbehaving node has to bear some energy costs in
order to perform some harmful operation, and
- Passive attacks that mainly consist of lack of cooperation with the purpose of energy
saving.
• Nodes that perform active attacks with the aim of damaging other nodes by causing
network outage are considered to be malicious.
• Nodes that perform passive attacks with the aim of saving battery life for their own
communications are considered to be selfish
• Selfish nodes can severely degrade network performances and eventually partition the
network
Challenges in Securing MANETs
• In a wormhole attack a malicious node can record packets (or bits) at one
location in the network and tunnel them to another location through a
private network shared with a colluding malicious node.
• Most existing ad hoc routing protocols would be unable to find consistent
routes to any destination
• When an attacker forwards only routing control messages and not data
packets, communication may be severely damaged
Challenges in Securing MANETs
- Wormhole Attacks
Initial
Routing
before attack
Challenges in Securing MANETs
- Wormhole Attacks
Initial
Routing
before attack
Challenges in Securing MANETs
- Wormhole Attacks
Tunnel packets received in one
place of the network and
replay them in another place
The attacker can have no key
material. All it requires is
two transceivers and one
high quality out-of-band
channel
Challenges in Securing MANETs
- Wormhole Attacks
Most packets will be
routed to the
wormhole
The wormhole can
drop packets or
more
subtly, selectively
forward packets
to avoid detection
MANET Applications
• Tactical Networks
• Military communication, operation
• Automated Battlefields
• Sensor Networks
• Home applications: allow users to manage home device locally and
remotely
MANET Applications (continued)
• Emergency Services
• Replacement of a fixed infrastructure in case of
earthquake, hurricanes
• Home and Enterprise Networking
• Shared whiteboard applications
• Use PDA to print anywhere
• Entertainment
• Multi-user games
• Robotic pets
• MANETs is challenging and promising system concepts
• Requires new type of architectures and protocols
• Open areas
• Secure routing protocol
• Quality of service
• Low power consumption
Conclusion
Conclusion
• Security of ad hoc networks has recently gained momentum in the
research community
• Due to the open nature of ad hoc networks and their inherent lack of
infrastructure, security exposures can be an impediment to basic
network operation
• Security solutions for MANET have to cope with a challenging
environment including scarce energy and computational resources and
lack of persistent structure
• The solutions presented in this presentation only cover a subset of all
threats and are far from providing a comprehensive answer to the security
problem in ad hoc networks
• They often address isolated issues away from a global approach to security
• As the technology for ad hoc wireless networks gains maturity,
comprehensive security solutions based on realistic trust models and
addressing all prevalent issues like routing, key management and
cooperation enforcement are expected to appear
Conclusion

Más contenido relacionado

La actualidad más candente

issues in desigining routing protocols
 issues in desigining routing protocols issues in desigining routing protocols
issues in desigining routing protocolsPradeep Kumar TS
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Introduction to Routing Protocols of MANET
Introduction to Routing Protocols of MANET Introduction to Routing Protocols of MANET
Introduction to Routing Protocols of MANET Darwin Nesakumar
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)JaironLanda
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsDarwin Nesakumar
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 

La actualidad más candente (20)

issues in desigining routing protocols
 issues in desigining routing protocols issues in desigining routing protocols
issues in desigining routing protocols
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Introduction to Routing Protocols of MANET
Introduction to Routing Protocols of MANET Introduction to Routing Protocols of MANET
Introduction to Routing Protocols of MANET
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 

Destacado

Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Mobile ad hoc networking: imperatives and challenges
Mobile ad hoc networking: imperatives and challengesMobile ad hoc networking: imperatives and challenges
Mobile ad hoc networking: imperatives and challengesguest1b5f71
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsAman Gupta
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introductionChandra Meena
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd Iaetsd
 
My Final Project
My Final ProjectMy Final Project
My Final Projectaskkathir
 
P2P on the local network
P2P on the local networkP2P on the local network
P2P on the local networkPeter Elst
 
IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16Spiro Vellore
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)eSAT Journals
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc networkitsjadu
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetyatin1988
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologiesshashi712
 

Destacado (20)

Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Mobile ad hoc networking: imperatives and challenges
Mobile ad hoc networking: imperatives and challengesMobile ad hoc networking: imperatives and challenges
Mobile ad hoc networking: imperatives and challenges
 
Manet
ManetManet
Manet
 
Manet
ManetManet
Manet
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introduction
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areas
 
My Final Project
My Final ProjectMy Final Project
My Final Project
 
P2P on the local network
P2P on the local networkP2P on the local network
P2P on the local network
 
MANET
MANETMANET
MANET
 
IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
 
Mymanet
MymanetMymanet
Mymanet
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manet
 
Manet
ManetManet
Manet
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologies
 

Similar a Manet - The Art of Networking without a Network

IT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IVIT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IVpkaviya
 
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Umang Singh
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptxkarthiksmart21
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxBinyamBekeleMoges
 
WMN Chapter5.pptx
WMN Chapter5.pptxWMN Chapter5.pptx
WMN Chapter5.pptxdamayanti68
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTINGdevika g
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptxsameernsn1
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSPallepati Vasavi
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7Ramesh Babu
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Vinish Alikkal
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETateeq ateeq
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networksArunChokkalingam
 
networking.ppt
networking.pptnetworking.ppt
networking.pptsuchita74
 

Similar a Manet - The Art of Networking without a Network (20)

IT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IVIT6601 Mobile Computing Unit IV
IT6601 Mobile Computing Unit IV
 
Mobile computing Mobile Adhoc Networks (MANETs)
Mobile computing Mobile Adhoc Networks (MANETs)Mobile computing Mobile Adhoc Networks (MANETs)
Mobile computing Mobile Adhoc Networks (MANETs)
 
unit-4
unit-4 unit-4
unit-4
 
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptx
 
WMN Chapter5.pptx
WMN Chapter5.pptxWMN Chapter5.pptx
WMN Chapter5.pptx
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)
 
Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
Mane ts
Mane tsMane ts
Mane ts
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
Manet ppt
Manet pptManet ppt
Manet ppt
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Manet - The Art of Networking without a Network

  • 1. TARUN VARSHNEY varshney@live.in Department of Information Technology ABES Engineering College MANET : The Art of Networking without a Network
  • 2. Wireless Networks • Computer network that is wireless • Infrastructure-based networks • Less expensive to setup IP backbone Server Router Gateways
  • 3. Disadvantages • Disaster areas • no infrastructure • Large construction sites • Too expensive • Inconvenient • Military operations
  • 4. Solution??? • Mobile ad hoc network • Mobile ad hoc network (MANET), or simply ad hoc network, comprises nodes that freely and dynamically self-organize into arbitrary and temporary network topology without any infrastructure support.
  • 5. Mobile Random and perhaps changing Ad Hoc Not engineered i.e. made or happening only for a particular purpose or need, not planned before it happens Network Network, is a collection of systems and other hardware interconnected by communication channels that allow sharing of resources and information MANET: Mobile Ad hoc Network
  • 6.  MANET is a self-configuring network of mobile nodes connected by wireless links - the union of which form an arbitrary topology.  Individual nodes act as routers  Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like natural or human-induced disasters, military conflicts, emergency medical situations etc.  Such a network may operate in a standalone fashion, or may be connected to the larger Internet. MANET: Mobile Ad hoc Network (continued)
  • 7. Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communication and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure MANET: Mobile Ad hoc Network (continued)
  • 8. MANETs: Operation A B C D E F Internet E Gateway Stand-alone MANET After one of the nodes is configured as a gateway, the entire network is connected to an external network like Internet
  • 9. Mobile Ad Network – HOME A B C MANET: Formation
  • 11. Collision – Hidden-Station Problem • A wishes to communicate with B. However A cannot detect communication from C but can detect communication from B. • C also wishes to communicate with B. Again C cannot detect communication from A but can detect Communication from B. • C is hidden from A and A is hidden from C. • Both A and C transmit and their signals collide leading to loss of both packets.
  • 12. Collision – Exposed-station Problem • Nodes A, B, and C can all detect communications from one another. However, Only C can detect communication from D. • Node B wishes to send to Node A and Node C wishes to send to Node D. • So Node B begins transmitting to Node A and Node C recognizes this. The medium is in use so Node C can not transmit to Node D. • Even though both transmission requests could be made going in opposite directions, the transmission does not happen. This is because Node C is exposed to Nodes A and B while D is not.
  • 13. Routing is the process of selecting paths in a network along which to send network traffic Routing Protocols are the set of rules and regulation that are must followed during the communication over the network. MANET: Routing and Routing Protocols
  • 14. MANET: Classification of Routing Protocol  Proactive Routing Protocol or Table Driven Approaches: Maintain regular and up to date routing information about each node in the network by propagating route updation at fixed time interval throughout the network.  Reactive Routing Protocol: Establish the route to a destination only when there is a demand for it. Also called as “Demand Protocol”.  Hybrid Routing Protocol: Combination of proactive and reactive protocol The route is established with the proactive routes and uses reactive flooding for new mobile nodes.
  • 15.  Reactive Routing Protocol Ad Hoc On-Demand Distance Vector (AODV) Dynamic Source Routing (DSR) Associativity Based Routing (ABR)  Proactive Routing Protocol Destination-Sequenced Distance-Vector Routing (DSDV) Optimized Link State Routing (OLSR) The Wireless Routing Protocol (WRP) MANET: Routing Protocols (continued)  Hybrid Routing Protocol Temporary Ordered routing Algorithm (TORA) Zone Routing Protocol (ZPR) Order One routing Protocol(OOPR)
  • 16.  Constructs route on demand and reduce routing load.  Uses table driven routing framework.  Destination sequence number for routing packets to destination mobile nodes.  Location independent algorithm.  Bi-directional route.  Packet send from source to destination, floods the network with the RREQ packets. All mobile node receive RREQ from neighbor or update message then checks routing table to find out that if it is the destination node or if it has fresh route to the destination then unicast RREP which is routed back on a temporary reverse route generated by RREQ from source node or else it re-broadcast RREQ. Ad Hoc On-Demand Distance Vector (AODV)
  • 17. The Internet Engineering task Force MANET working group suggests two different types of matrices for Evaluting the performance of the protocols of the MANETs  Qualitative Metrics  Quantitative Metrics Performance and Evaluation issues of Routing Protocols
  • 18. Qualitative Metrics Qualitative metrics include the : • Loop Freedom • On-Demand Routing Behavior • Proactive Behavior • Security • Unidirectional Link Support • Sleep Mode
  • 19. Quantitative Metrics Quantitative metrics broadly includes the: • End-to-end data throughput and delay • Route Acquisition Time • Out-of-Order Delivery • Efficiency
  • 20. Challenges in Securing MANETs To secure an ad hoc network, the following attributes may be considered: - Availability - Confidentiality - Integrity - Authentication
  • 21. Challenges in Securing MANETs • Security exposures of ad hoc routing protocols are due to two different types of attacks: - Active attacks through which the misbehaving node has to bear some energy costs in order to perform some harmful operation, and - Passive attacks that mainly consist of lack of cooperation with the purpose of energy saving. • Nodes that perform active attacks with the aim of damaging other nodes by causing network outage are considered to be malicious. • Nodes that perform passive attacks with the aim of saving battery life for their own communications are considered to be selfish • Selfish nodes can severely degrade network performances and eventually partition the network
  • 22. Challenges in Securing MANETs • In a wormhole attack a malicious node can record packets (or bits) at one location in the network and tunnel them to another location through a private network shared with a colluding malicious node. • Most existing ad hoc routing protocols would be unable to find consistent routes to any destination • When an attacker forwards only routing control messages and not data packets, communication may be severely damaged
  • 23. Challenges in Securing MANETs - Wormhole Attacks Initial Routing before attack
  • 24. Challenges in Securing MANETs - Wormhole Attacks Initial Routing before attack
  • 25. Challenges in Securing MANETs - Wormhole Attacks Tunnel packets received in one place of the network and replay them in another place The attacker can have no key material. All it requires is two transceivers and one high quality out-of-band channel
  • 26. Challenges in Securing MANETs - Wormhole Attacks Most packets will be routed to the wormhole The wormhole can drop packets or more subtly, selectively forward packets to avoid detection
  • 27. MANET Applications • Tactical Networks • Military communication, operation • Automated Battlefields • Sensor Networks • Home applications: allow users to manage home device locally and remotely
  • 28. MANET Applications (continued) • Emergency Services • Replacement of a fixed infrastructure in case of earthquake, hurricanes • Home and Enterprise Networking • Shared whiteboard applications • Use PDA to print anywhere • Entertainment • Multi-user games • Robotic pets
  • 29. • MANETs is challenging and promising system concepts • Requires new type of architectures and protocols • Open areas • Secure routing protocol • Quality of service • Low power consumption Conclusion
  • 30. Conclusion • Security of ad hoc networks has recently gained momentum in the research community • Due to the open nature of ad hoc networks and their inherent lack of infrastructure, security exposures can be an impediment to basic network operation • Security solutions for MANET have to cope with a challenging environment including scarce energy and computational resources and lack of persistent structure
  • 31. • The solutions presented in this presentation only cover a subset of all threats and are far from providing a comprehensive answer to the security problem in ad hoc networks • They often address isolated issues away from a global approach to security • As the technology for ad hoc wireless networks gains maturity, comprehensive security solutions based on realistic trust models and addressing all prevalent issues like routing, key management and cooperation enforcement are expected to appear Conclusion