Mobile Ad hoc networking

Download Mobile Ad hoc networking

Post on 08-Jul-2015




0 download

Embed Size (px)


Mobile Ad hoc networking


Centralized Monitoring System to detect Black hole Attack in MANET


1Presented by:Ariful Islam, ID:090212,Al Hizbul Bahar, ID:090225To ensure the survivability of sub sources.To reduce the maintainance cost of the network.To ensure data transfer among all the nodes in a network.The data packet delivery ratio must be sufficiently highThe data transmission delay must be as less as possible.2Objectives of Research3Collection of self configurable mobile node connected through wireless linksWithout aid of any existing network infrastructure or central access pointEach node participating in the network acts both as host and a routerCharacteristics of MANETs : dynamic topology node mobility large number of degree of freedom self-organizing capabilityWhat is MANETNode mobility in an ad hoc network causes frequently change the network topology.

DACBEFDACBEF4Basic Concept of MANETApplication AreaMilitary battle fieldCommercial SectorLocal levelCivil ApplicationPersonal Area Network(PAN)5Design Issue and ChallangesTopology, Mobility, RobustnessCapacity and EfficiencyEnergy ConsumptionQuality of Service and Resource ManagementSecurity and reliabilityScalability

67Problem Specification of Existing System

Existing System AnalysisThe cost of main source is highThe main source is required more energy to runSystem damage possibility is highHigh traffic in main source.Coupling between main source and sub-sources and sub-source and regions node

8Continue...Proposed SolutionReplace main source by sub-sourcesEnsuring sub-source survivability Select new sub-source absence of sub-source

9Continue...10Sub-SourcesReciver NodeForwarding Node


Sub-SourcesReciver NodeForwarding Node

11Continue...sourceConn. NodesDest.Conn.NodesBroadcast ROUTE REQUEST packetNodes check the duplicity of packet; if the packet is duplicate the discarded otherwise continue the processROUTE REPLY packet to source telling how to get destinationIncrement Hop count, rebroadcast the ROUTE REQUEST packet to adjacent nodes and store info in its reverse route tableCheck the dest. sequence number 123Step 2 is repeated until the dest. node is found Dest. node is found and it unicast a ROUTE REPLY packet from where it got the ROUTE REQUEST packet 4Source AddressRequestIDDest. Add.SourceSeqn. #Dest. Seqn.#Hop countROUTE REQUESTSource AddressDest. AddrssDest.Sequence#Hop countLifetimeROUTE REPLY12Continue...13

ADEFIGHConclusionThe existing system is working well with main source. But in the absence of that main soure hole system will be damaged. We proposed a solution in this case of problem, where main source will be absence and sub-source are connected with each other when they want to send data in a network.

Hence nodes are dynamic and infrastructure less ,there is a great challange in this way of solution.To overcome these challange, a specific node will query a neigbour node in multicast network and send ROUTE REQUEST. Repeating this process data transfer between two node will be done.14References[1] G.Vijaya Kumar et. al. / (IJCSE) International Journal on Computer Science and EngineeringVol. 02, No. 03, 2010, 706-713[2] M.S. Corson and V. Park, A Highly Adaptive Distributed Routing Algorithm for Mo-bile Wireless Networks,Proc. IEEE INFOCOM 97, Kobe, Japan, April 1997.[3] E. Bommaiah, M. Liu, A. McAuley, and R. Talpade, AMRoute: Adhoc MulticastRouting Protocol, Internet Draft,[4 ][5] ... Network Design / IT

1516Thanks to All

17Q & A