
Volume3,June 2016,
Topic : A Detailed Study on Fundamental Characteristics and Functional Operations of Manet
Authors:Narayanasamy Rajendran || Dr. E.R.Naganathan
Abstract:A MANET is a collection of independent mobile nodes that communicates with each other through wireless medium. The MANET architecture is dynamic in nature, the nodes act as transmitter and receiver. The vehicular ad hoc network topology changes frequently due to the dynamic nature of the autonomous mobile nodes. MANET is exposed to multiple kinds of attacks due to its fundamental characteristics like no security mechanism, dynamic topology, no central control devices and open wireless medium. The impact of attacks affects the security, quality of service and the performance of MANET. MANET is the best alternative for developing countries where communications infrastructure doesn’t exist. To understand the how MANET is created, configured and controlled we need to understand the following area: MANET Architecture, Clustering Formation, Identification of Host and IP address auto configuration, Handover mechanisms on MANET, Routing on MANET, MANET file sharing, Different types of attacks and Security on MANET..
Keywords:
Download Paper
DOI: 01.1617/vol3/iss6/pid60478
Related Articles
Wormhole Attack Prevention and Detection Approaches in Mobile Ad hoc Networks: A Survey.
Authors: Avinash Singh || Ram Singar Verma
Doi : 01.1617/vol4/iss03/pid34591
Volume4 ,March 2016.
Developing a GIS Platform for Tourism marketing and promotion In Nigeria: Case Study Of Bauchi State
Authors: Abubakar Siddiq Ango || Abdulsalam Waheed Abdulfatah, Idrissa Djibo
Doi : 01.1617/vol3/iss09/pid91783
Volume3 ,September 2016.
Decentralized Trust Management and Trust Worthiness of Cloud Environments
Authors: Qhubaib Syed || Syed Afzal Ahmed,Syed Abdul Haq
Doi : 01.1617/vol4/iss4/pid21386
Volume4 ,April 2016.
Brain Controlled Chess Based on Virtual Reality Control for Paralyzed Patients
Authors: Sindhura Rao || Ashwini S,Kusuma Mohanchandra
Doi : 01.1617/vol4/iss4/pid82074
Volume4 ,April 2016.
Multilevel Authentication System
Authors: Nichita Silva Lobo || Beverly Rodrigues,Pavni Alluri,Prathibha Singh,Nicole Alvares
Doi : 01.1617/vol4/iss4/pid82135
Volume4 ,April 2016.
Stock Prediction Using Clustering And Regression Techniques
Authors: Shalini Lotlikar || Megha Ainapurkar
Doi : 01.1617/vol4/iss4/pid39708
Volume4 ,April 2016.
Brain Tumor Detection using Image Segmentation
Authors: Siddhi N. Nerurkar ||
Doi : 01.1617/vol4/iss4/pid02845
Volume4 ,April 2016.
Video Mining using Query by Example
Authors: Rosebud Valadares ||
Doi : 01.1617/vol4/iss4/pid89542
Volume4 ,April 2016.
Fuzzy Opinion Mining for Product Recommender System
Authors: Aarti Bandodker ||
Doi : 01.1617/vol4/iss4/pid03652
Volume4 ,April 2016.
Aadhaar and Server based Electoral system
Authors: Yugansh Garg || Sakshi Mishra
Doi : 01.1617/vol4/iss4/pid69053
Volume4 ,April 2016.