We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Mobile Ad-Hoc Networks: An Overview

by Md. Sajid Anwer, Syed Hamid Hasan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 3
Year of Publication: 2017
Authors: Md. Sajid Anwer, Syed Hamid Hasan
10.5120/ijca2017915555

Md. Sajid Anwer, Syed Hamid Hasan . Mobile Ad-Hoc Networks: An Overview. International Journal of Computer Applications. 176, 3 ( Oct 2017), 18-20. DOI=10.5120/ijca2017915555

@article{ 10.5120/ijca2017915555,
author = { Md. Sajid Anwer, Syed Hamid Hasan },
title = { Mobile Ad-Hoc Networks: An Overview },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 176 },
number = { 3 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 18-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number3/28531-2017915555/ },
doi = { 10.5120/ijca2017915555 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:41:32.190783+05:30
%A Md. Sajid Anwer
%A Syed Hamid Hasan
%T Mobile Ad-Hoc Networks: An Overview
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 3
%P 18-20
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

When more than 1 terminal/node/device, that has networking and communication capabilities, communicate with a similar device in the absence of a centralized admin or a situation where dynamic network of wireless nodes communicates amongst each other without any fixed infrastructure it is called MANET (Mobile Ad-Hoc Networks). MANET is autonomous wireless mobile host systems where the node are dynamically linked to each other, at times acting as routers as well. In this paper we will discuss a typical wired network, its characteristics, and its ever changing network configuration without limit of size or direction. Thus arriving at a need for a new routing protocol (optional path agreements) that will specify the nodes for this purpose. The ideal routing protocol must not only enable the identification of the best path but also enable the Ad Hoc Network to adapt to this route dynamically. We will also discuss types of MANET, its history along with approaches of wireless mobile. We will also touch upon the various routing protocol suggested for the Ad-Hoc Network along with possible applications of MANET, pros & Cons, characteristic analysis and routing protocols.

References
  1. Toh. C.K., 2002. Ad Hoc Mobile Wireless Networks Protocols and Systems. Prentice Hall,Inc
  2. Freebersyser, J. A., and Leiner, B. A DoD perspective on mobile ad hoc networks. In: Perkins, C. (Ed.) Ad Hoc Networking, Addison Wesley, Reading, MA, 2001, pp. 29–51.
  3. J. Jubin and J.D. Tornow, “The DARPA Packet Radio Network Protocols”, proceedings of the IEEE, vol. 75, no. 1, January 1987, pp.21-32.
  4. J. A. Freebersyser and B. Leinerr, “A DoD perspective on mobile ad hoc networks,” in Ad Hoc Networking, C. E. Perkin, Ed. Addison-Wesley, 2001, pp. 29–51.
  5. R. Ruppe, S. Griswald, P.Walsh, and R. Martin, “Near term digital radio (NTDR) system”, in Proceedings of IEEE MILCOM, vol. 3, November 1997, pp.1282 – 1287.
  6. B. Leiner, R. Ruth, and A. R. Sastry, “Goals and challenges of the DARPA GloMo program,” IEEE Personal Communications, vol. 3, no. 6, pp. 34–43, December 1996.
  7. Vani A and Rao D, “Providing of Secure Routing against Attacks in MANETs” International Journal of Computer Applications (0975 – 8887) Volume 24– No.8, June 2011.
  8. Senthilkumar P., Baskar M. and Saravanan K., “A Study on Mobile Ad-Hock Networks (MANETS)”, JMS, Vol. No.1, Issue No.1, September 2011.
  9. Satria Mandala, Md. Asri Ngadi and A.Hanan Abdullah, “A Survey on MANET Intrusion Detection” IJCSS, Vol No 2, Issue 1, 2007.
  10. Ruchi R., Dawra M., “Performance characterization of AODV protocol in MANET”, IJARCET, Vol No 1, Issue No 3, May2012.
  11. D.Sivaganesan1 and Dr.R.Venkatesan, “Performance Analysis of Broadcasting in Mobile ad hoc networks using cluster approach”, IJASUC Vol No.1, Issue No.2, June 2010.
  12. Sreerama M and Venkat D., “Performance Evalution of MANET Routing Protocols using Reference Point Group Mobility and Random WayPoint Models”, IJASUC Vol No.2, Issue No.1, March 2011.
  13. Murty S, Dastagiraiah C. and Kumar A, “Analysis of MANET routing Protocols Using Random waypoint Model in DSR”, IJASUC Vol No .2, Issue No.4, December 2011.
  14. Chaudhary D., “Bee-Inspired Routing Protocols for mobile Ad HOC Network (MANET)”, JETWI, VOL No. 2, Issue No. 2, MAY 2010.
  15. Koshti D and Kamoji S, “Comparative study of Techniques used for Detection of Selfish Nodes in Mobile Ad hoc Networks” IJSCE, Vol 1, Issue 4, 2011W Lien and Feng Yi “A Threshold-Based Method for Selfish Nodes Detection in MANET”, 978-1-4244-7640-4/10/2010 IEEE.
  16. W Lien and Feng Yi, “A Threshold-Based Method for Selfish Nodes Detection in MANET”, IEEE, 2010.
  17. Sukumaran S, Venkatesh. J and Arunkorath, “A Survey of Methods to mitigate Selfishness in Mobile Ad hoc Networks” IJICT, Vol 1, Issue No. 2, June 2011.
  18. Rani et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(3), March - 2013, pp. 135-138
  19. Roy B., Banik S., Dey P., Sanyal S and Chaki N, “Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services”, JETCIS, Vol. No 3, Issue No. 1, January 2012.
  20. P.V.Jani, “Security within Ad-Hoc Networks,” Position Paper, PAMPAS Workshop, Sept. 16/17 2002.
  21. K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Ad Hoc Application QoS Mobile AdHoc sensor networks Wireless mobile approach AdHoc Routing protocol MANET WSN WMN.