CHAPTER 1 INTRODUCTION
This chapter provides some background information relating to the core of the thesis.
1.1. WIRELESS NETWORKING INTRODUCTION
Wireless networking is an emerging technology that allows users to access information and services electronically, regardless of their geographic position. The use of wireless communication between mobile users has become increasingly popular due to recent performance advancements in computer and wireless technologies. This has led to lower prices and higher data rates, which are the two main reasons why mobile computing is expected to see increasingly widespread use and
…show more content…
Each of the nodes has a wireless interface and communicates with others over either radio or infrared channels. Figure 1.2 shows a simple ad hoc network with three nodes.
Figure 1.1: Infrastructure Network.
Figure 1.2: Ad Hoc Network.
1.1. MOBILE AD HOC NETWORKS
1.1.1. Overview of Mobile Ad Hoc Networks
A Mobile Ad Hoc Network (MANET) consists of a set of mobile hosts that carry out basic networking functions like packet forwarding, routing, and service discovery without the help of an established infrastructure [1]. Nodes of an ad hoc network rely on one another in forwarding a packet to its destination, due to the limited range of each mobile host’s wireless transmissions. An ad hoc network uses no centralized administration. This ensures that the network will not cease functioning just because one of the mobile nodes moves out of the range of the others. Nodes should be able to enter and leave the network as they wish. Because of the limited transmitter range of the nodes, multiple hops are generally needed to reach other nodes. Every node in an ad hoc network must be willing to forward packets for other nodes. Thus, every node acts both as a host and as a router. The topology of ad hoc networks varies with time as nodes move, join or leave the network. This topological instability requires a routing protocol to run on each node to create and maintain routes among the nodes [21].
1.1.1. Mobile Ad hoc Networks’ Usages
Wireless ad-hoc
Figure 8.3(a) demonstrates a portion of a wireless ad hoc network where a source node S has a data packet to be sent to a destination node that is
A group of wireless sensor nodes (devices) dynamically constructs a temporary network without the exercise of any pre-existing network infrastructure or centralized administration. The main goal of ad-hoc networking is multihop broadcasting in which packets are transferred from source node to destination node through the intermediate nodes (hops). The main function of multi hop WSN is to enable communication between two terminal devices through a bit of middle nodes, which are transferring information from one level to another level. On the foundation of network connectivity, it dynamically gets to determine that which nodes should get included in routing, each node involved in routing transmit the data to further
routing. In this chapter, we introduce some popular routing protocols in each of the three
MANETs (Mobile ad-hoc network) is defined as autonomous collection of wireless mobile nodes that are self-configure to construct a network that can communicate over relatively bandwidth constrained wireless links.
Wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and or microwaves to maintain communications (Boyds, 2016). Wireless and mobile technologies continue to have a major impact on the global business environment and can be roughly categorized into mobile client devices for interactivity and communications infrastructure. Wireless technology is technology that uses radio waves to transmit and receive data, such as cell phones. It is used more than ever today for data transmission. Mobile
In Cellular Wireless, spaces are divided into cells. Each cell consists of base stations which is responsible to communicate with the hosts in its cell. Hosts moves from one cell to cell to another and hand off occurs, the new base station takes care of the communication. In Multi-hop wireless, mobility causes a change of route. Hence it need to traverse multiple links to reach destination. Ad hoc network is a self- organizing multi hop wireless network, which relies neither on infrastructure nor on the predetermined connectivity.
A wireless network is any type of computer network that uses wireless data connections for connecting network nodes .Wireless networking is a method by which homes, telecommunications networks and enterprise (business).Installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model network structure.
Where as, in the multi-hop wireless ad hoc networks, one or more intermediate nodes are present, which receive and forward packets through the wireless links. These networks’ have several advantages as compared to the single local wireless links like improved connectivity, extended coverage, less power and energy, cost effective higher data rates and more efficiency.
Mobile data communication has become a very important and rapidly evolving technology as it allows users to transmit data from remote locations to other remote or fixed locations. This proves to be the solution to the biggest problem of business people on the move mobility. In this paper it will define mobile computing, name and tell what you can do with mobile computers, discuss the advantages and disadvantages of mobile computers, name several major trend in mobile computers and finally, we look at the future of Mobile computing in the real world.
Mobile computing is technology that has enabled users to obtain internet services while being in a state of constant motion. Conventionally, internet could only be accessed only via Ethernet cable and users had to sit on one place in order to access internet. In this way, there existed no concept of taking work to a trip or connecting to world anytime. With the invention of mobile computing, users can take their work in their hands. One can now get internet service anywhere needed.
Information Disclosure. It is essential to protect any condential information exchange during the communica-tion process. Also any unauthorized access too the critical data stored on nodes must bepossible. In ad hoc networks, such information may contain anything, e.g., the specific status details of a node, the location of nodes, private keys or secret keys, passwords, and so on. The control data are more critical for security than the trac data. Forinstance, the routing directives in packet headers such as the identity or location of thenodes can be more valuable than the application-level messages.Confidential or importantinformation may be leaked to unauthorized nodes present in the network by compromised node. Such information may contain information regarding geographic location of nodesor optimal routes to authorized nodes in the network,the network topology.Routing AttacksThere are several attacks which can be mounted on the routing protocols and mayinterrupt the proper operation of the network. Brief descriptions of such attacks aregiven below:1. Routing Table Over
Mobile ad hoc network is decentralized form of network. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in
Abstract— Mobile Ad hoc Network (MANET) is a special self-describing wireless ad hoc network which consists of more number of nodes that can move randomly and erratically. Because of this infrastructure it enables many kinds of attacks and establish topology-exposure problem. Many of the existing multipath protocols may ignore the topology-exposure problem. In this, we proposed a TOpology-HIding multipath routing Protocol (TOHIP) for preventing attacks in topology-exposure. In TOHIP, the link connection information is hidden in route messages, so that the malicious nodes cannot conclude the network topology. In Route Reply phase, the protocol TOHIP can also be used to establish multiple node-disjoint routes and eliminate the unreliable route before transmitting packets in Route Probe phase. With the help of a newly designed protocol, security was assured and earned better capability of finding routes in MANET. The simulation result shows that TOHIP has given better performance when compared with Ad hoc On-demand Multipath Distance Vector (AOMDV) routing protocol.
A Vehicular Ad-hoc Networks (VANET) are considered as a specific type of Mobile Ad-hoc Network (MANET) which contains the of a set of mobile nodes (Vehicles)
Cellular network is a network where the last connection is wireless. In cellular network multiple low-power transmitters are used, with 100 W or less, thus, the spread range of such a transmitter is small, dividing an area into cells. A band of frequencies is allocated to each cell and each cell is served by a base station (BS), including of transmitter, receiver, and control unit. The base station provides wireless network coverage which can be used