[go: up one dir, main page]

0% found this document useful (0 votes)
8 views2 pages

Mobile Computing - Assignment2

Uploaded by

Shivansh Rastogi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views2 pages

Mobile Computing - Assignment2

Uploaded by

Shivansh Rastogi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Assignment-2

1. Explain Ad-Hoc Networks in Detail

Ad-hoc networks are decentralized wireless networks where nodes (devices) communicate directly with one
another without relying on pre-existing infrastructure like routers or access points. These networks are
dynamic, self-organizing, and designed to establish temporary connections between devices.

Key Characteristics:

1. Decentralized Structure:
o Unlike traditional networks, ad-hoc networks do not depend on centralized infrastructure.
Each node acts as both a sender and receiver, participating in the routing process.
2. Dynamic Topology:
o Nodes can join or leave the network at any time, and the topology frequently changes as
devices move.
3. Multi-hop Communication:
o If two nodes are out of direct communication range, data is relayed through intermediate
nodes to reach the destination.
4. Self-Configuring:
o Nodes automatically detect and configure the network, enabling quick deployment without
human intervention.

Applications:

• Military Use: Communication in battlefield scenarios where infrastructure is unavailable.


• Disaster Recovery: Establishing communication in areas affected by natural disasters, where
infrastructure is damaged.
• Temporary Networks: Setting up wireless networks in conferences, exhibitions, or remote locations.
• IoT Devices: Connecting smart devices in homes or industrial environments.

Advantages:

• Quick and flexible deployment.


• No reliance on existing infrastructure.
• Cost-effective in temporary or emergency situations.

Challenges:

• Limited bandwidth and range.


• Susceptible to security threats due to the lack of centralized control.
• Difficulty in managing dynamic topology.

2. Explain the Concept of MANET in Ad-Hoc Networks

MANET (Mobile Ad-Hoc Network) is a specific type of ad-hoc network where all participating nodes are
mobile and communicate wirelessly. The key feature of a MANET is its ability to function in environments
where no fixed infrastructure exists, making it highly dynamic and adaptive.
Features of MANET:

1. Mobility:
o All nodes are mobile and can move freely, leading to frequent changes in the network's
topology.
2. Peer-to-Peer Communication:
o Devices communicate directly with one another without centralized control. Each node serves
as a router to forward data to other nodes.
3. Self-Healing:
o MANETs can automatically reconfigure themselves when nodes move or leave the network,
ensuring continuous operation.
4. Multi-hop Routing:
o Communication between distant nodes is achieved through intermediate nodes that act as
relays.
5. Resource Constraints:
o Devices in a MANET often have limited battery life, computing power, and bandwidth, which
impacts network performance.

Applications of MANET:

• Military Networks: Secure, flexible communication between troops and vehicles in the field.
• Disaster Response: Quickly establishing communication networks for rescue operations in areas with
no infrastructure.
• Sensor Networks: Connecting distributed sensors to collect and relay data.
• Vehicular Networks: Supporting communication between vehicles (VANETs) for traffic
management and safety.

Advantages of MANET:

• Highly adaptable to changes in topology and mobility.


• Easy to deploy in remote or infrastructure-less environments.
• Facilitates communication in emergency situations.

Challenges of MANET:

1. Routing Complexity:
o Finding optimal routes in a constantly changing topology is challenging. Protocols like AODV
(Ad-hoc On-Demand Distance Vector) and DSR (Dynamic Source Routing) are used to
address this issue.
2. Security Risks:
o MANETs are vulnerable to attacks like eavesdropping, spoofing, and denial of service due to
the absence of centralized control.
3. Resource Constraints:
o Limited bandwidth, power, and processing capabilities of mobile nodes can hinder
performance.
4. Scalability Issues:
o Performance decreases as the number of nodes in the network increases.

You might also like