Open Access Open Access  Restricted Access Subscription or Fee Access

Survey on Wireless Ad-hoc Network

B.M. Harshitha, Veena V. Pattankar

Abstract


Mobile Ad-hoc Networks is a collection of two or more devices with wireless communications and networking application. These devices can communicate with other nodes that are within their radio range or one that is outside their radio range. The nodes should have an intermediate node to be the router to route the packet from the source toward the destination between the networks. The Wireless Ad-hoc Networks do not have gateway, as every node can act as the gateway. The reason for this is that Mobile Ad-hoc Networks are never used in practice, As argument, we try to clarify the definition, architecture, prons and cons, congestion types a of MANET. Although many works have been done to solve the problem, we will show in this paper the algorithm used for routing.


Full Text:

PDF

References


Fan-Hsun Tseng “A survey of black hole attacks in wireless mobile ad hoc networks”. Department of Computer Science & Information Engineering National Central University Taiwan.

“Corson, S., Macker, J.: “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”, RFC: 2501, January 1999. IEEE/IET Electronic Library. Accessed 29 July 2016

Douceur, J.R.: “The Sybil attack. In: Proceedings of the International Workshop on Peer to Peer Systems”, pp. 251–260 (March 2002)

Perkins, C.E., Bhagwat, P.: “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers”. In: ACM SIGCOMM Computer Communication Review, Association of Computing Machinery Publishers, vol. 24(4), pp. 234–244 (1994)

Mbarushimana, C., Shahrabi, A.: “TSLA: A QoS-Aware On-Demand Routing Protocol for Mobile Ad Hoc Networks.” In: Coudert, D., Simplot-Ryl, D., Stojmenovic, I. (eds.) ADHOC-NOW 2008. LNCS, vol. 5198, pp. 265–278. Springer, Heidelberg (2008)

Raza, I., Hussain, S.A.: “A Trust based Security Framework for Pure AODV Network”. In: Proc. of the Int. Conf. on Information and Emerging Technologies (ICIET), Karachi, Pakistan, July 6-7, 2007, pp. 1–6 (2007)


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.