Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.

Similar presentations


Presentation on theme: "Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone."— Presentation transcript:

1 Mobile Ad Hoc Networking By Shaena Price

2 What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone fashion or be connected by the Internet

3 Functions Military efforts Businesspeople Disaster Recovery Education General Public

4 Protocols Two main groups of protocols: reactive and proactive. Dynamic Source Routing (DSR)- Dynamic Source Routing (DSR)- the sender determines the path that packets take. Intermediate nodes will look at the packet header to determine the destination. When a mobile node has a packet to send, it will first look at its own route cache to determine route existence. If the route does not exist, the sender will create a route request to determine target host. Each node will check to see if it knows the route to the destination. If it is determined that the destination is reachable then the host will reply with the path (route reply). If the path is discovered broken, an error message is generated signaling a failure in the network.

5 Protocols Ad Hoc On Demand Distance Vector Routing (AODV) - Ad Hoc On Demand Distance Vector Routing (AODV) - When a node begins communication, a Path Discovery process – broadcast route request (RREQ) message containing the source and destination address - commences. Each node that received a RREQ will create a reverse route back to the source and rebroadcast the request. The destination replies sending a route reply (RREP) message of that route to the source.

6 Protocols

7 Protocol

8 Attacks Impersonation Routing Attacks Eavesdropping Denial of Service

9 Security To have a network that is fully secure you need three key components: - Detection - Reaction - Prevention The secure solution will utilize different techniques to guard the entire system spanning all layers of the protocol stack.

10 Challenges Limited battery power Limited bandwidth No central management or control Implementing correct routing protocols Limited physical security Resource availability Authentication

11 Conclusion MANETs have served a general purpose of being a resolution to people in need of a connection when there is no fixed infrastructure in place. While there are increasing challenges, it is much likely that these MANETs will see widespread use throughout our country.


Download ppt "Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone."

Similar presentations


Ads by Google