a review of ad-hoc network

N. Elamathi,

Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

ISSN: 2320-7248          Impact Factor:1.8         Volume:2         Issue:1         Year: 18 May,2015         Pages:143-149

International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

Abstract

This paper focus on the study of Ad hoc network its protocols and different types of network in detail. In Latin, ad hoc means “for this” or “for this purpose”. Recent advances in radio communication and computer technologies have led to the development of mobile computing environments. In mobile computing environments, user equipped with portable computers called mobile host, can change their locations while retaining network connections by utilizing wireless communication. As one of the research fields in mobile computing environments, there has been an increasing interest in ad hoc networks constructed by only mobile host. In ad hoc networks, every mobile host plays the role of a router, and communicates with each other. Even if the source and the destination are not in the communication range of the two mobile hosts, data packets are forwarded to the destination by relaying transmission through intermediate mobile hosts. Since no special infrastructures are required, many applications such as rescue affairs at disaster sites and inter-vehicle communication are expected to be developed in ad hoc networks. In ad hoc networks, since the network topology dynamically changes due to the movement of mobile hosts, different fundamental technologies from the conventional fixed networks are needed

Kewords

Ad Hoc network, WMN, WSN, MANET

Reference

[1]. Vani A and Rao D, “Providing of Secure Routing against Attacks in MANETs” International Journal of Computer Applications (0975 – 8887) Volume 24– No.8, June 2011. [2]. Senthilkumar P., Baskar M. and Saravanan K., “A Study on Mobile Ad-Hock Networks (MANETS)”, JMS, Vol. No.1, Issue No.1, September 2011. [3]. Satria Mandala, Md. Asri Ngadi and A.Hanan Abdullah, “A Survey on MANET Intrusion Detection” IJCSS, Vol No 2, Issue 1, 2007. [4]. Ruchi R., Dawra M., “Performance characterization of AODV protocol in MANET”, IJARCET, Vol No 1, Issue No 3, May2012. [5]. Sreerama M and Venkat D., “Performance Evalution of MANET Routing Protocols using Reference Point Group Mobility and Random WayPoint Models”, IJASUC Vol No.2, Issue No.1, March 2011. [6]. Murty S, Dastagiraiah C. and Kumar A, “Analysis of MANET routing Protocols Using Random waypoint Model in DSR”, IJASUC Vol No .2, Issue No.4, December 2011. [7]. Chaudhary D., “Bee-Inspired Routing Protocols for mobile Ad HOC Network (MANET)”, JETWI, VOL No. 2, Issue No. 2, MAY 2010. [9]. Sukumaran S, Venkatesh. J and Arunkorath, “A Survey of Methods to mitigate Selfishness in Mobile Ad hoc Networks” IJICT, Vol 1, Issue No. 2, June 2011.