de.slideshare.net Open in urlscan Pro
151.101.130.152  Public Scan

Submitted URL: https://search.app/LuAF3ey9AwEE8UW8A
Effective URL: https://de.slideshare.net/slideshow/mobile-computing-mobile-adhoc-networks-manets/247573308
Submission Tags: falconsandbox
Submission: On June 20 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET /search

<form class="SearchForm_form__j1XGE" method="get" action="/search" data-testid="search-form">
  <div class="input-box"><input name="searchfrom" type="hidden" value="header"><input id="nav-search-query" data-cy="search-field" type="text" aria-label="Slideshare durchsuchen" placeholder="Suche" name="q" autocomplete="off" value=""><button
      type="submit" class="SearchForm_submit__U8kPR" id="search-submit" data-cy="search-submit"><svg class="" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24" height="24" fill="currentColor">
        <path d="M21.71,20.29,18,16.61A9,9,0,1,0,16.61,18l3.68,3.68a1,1,0,0,0,1.42,0A1,1,0,0,0,21.71,20.29ZM11,18a7,7,0,1,1,7-7A7,7,0,0,1,11,18Z"></path>
      </svg><span class="sr-only">Suche senden</span></button></div>
</form>

<form class="Form_container__DMa4B">
  <div>
    <div class="Dropdown_container__NBOZ_ ReportForm_selectField__Kyyaj" data-testid="dropdown-component"><label for="reason" data-testid="label" class="Label_label__KH246  ">Wählen Sie Ihren Grund dafür aus, dass Sie diese Präsentation als
        unangemessen melden.*</label><select id="reason" data-testid="select" aria-label="Wählen Sie Ihren Grund dafür aus, dass Sie diese Präsentation als unangemessen melden." class="Dropdown_select__8pQOA ">
        <option data-testid="dropdown-option" value="">Grund auswählen</option>
        <option data-testid="dropdown-option" value="defamatory">Diffamierend</option>
        <option data-testid="dropdown-option" value="ultraviolence">Gewaltdarstellung oder Terrorpropaganda</option>
        <option data-testid="dropdown-option" value="hate_speech">Hassrede oder Diskriminierung</option>
        <option data-testid="dropdown-option" value="offensive">Drohungen oder Beleidigungen</option>
        <option data-testid="dropdown-option" value="porn">Pornografisch</option>
        <option data-testid="dropdown-option" value="spam">Spam oder Betrug</option>
      </select><span class="RequiredNotice_required___q_RJ " data-testid="required-label">*erforderlich</span></div>
  </div><button type="submit" class="Button_button__bdpZ1 Button_primary__K25Gq Button_contained__gyjai Button_medium__H8pKi Button_disabled__M5jJf" data-testid="button" disabled=""><span>Melden</span></button>
</form>

Text Content

Suche senden
HochladenHerunterladen – 30 Tage kostenlosEinloggen


MOBILE COMPUTING MOBILE ADHOC NETWORKS (MANETS)

3. Mai 2021•
0 gefällt mir•70 views
Durch KI verbesserte Beschreibung

Jyothishmathi Institute of Technology and Science KarimnagarFolgen

Mobile ad hoc networks (MANETs) are wireless networks without any fixed
infrastructure. Nodes in a MANET can act as both hosts and routers to forward
packets between nodes. MANETs have dynamic topologies that change unpredictably
as nodes move. Common routing protocols for MANETs operate in an on-demand
fashion, discovering routes only when needed to reduce overhead from periodic
updates. Some examples are dynamic source routing (DSR) and
destination-sequenced distance-vector (DSDV) routing. Security poses unique
challenges in MANETs due to the lack of centralized administration and shared
wireless medium.Weniger lesen

Mehr lesen
Technologie
Melden
Teilen
Melden
Teilen
1 von 105
Jetzt herunterladenDownloaden Sie, um offline zu lesen

SEITE 1

SEITE 2

SEITE 3

SEITE 4

SEITE 5

SEITE 6

SEITE 7

SEITE 8

SEITE 9

SEITE 10

SEITE 11

SEITE 12

SEITE 13

SEITE 14

SEITE 15

SEITE 16

SEITE 17

SEITE 18

SEITE 19

SEITE 20

SEITE 21

SEITE 22

SEITE 23

SEITE 24

SEITE 25

SEITE 26

SEITE 27

SEITE 28

SEITE 29

SEITE 30

SEITE 31

SEITE 32

SEITE 33

SEITE 34

SEITE 35

SEITE 36

SEITE 37

SEITE 38

SEITE 39

SEITE 40

SEITE 41

SEITE 42

SEITE 43

SEITE 44

SEITE 45

SEITE 46

SEITE 47

SEITE 48

SEITE 49

SEITE 50

SEITE 51

SEITE 52

SEITE 53

SEITE 54

SEITE 55

SEITE 56

SEITE 57

SEITE 58

SEITE 59

SEITE 60

SEITE 61

SEITE 62

SEITE 63

SEITE 64

SEITE 65

SEITE 66

SEITE 67

SEITE 68

SEITE 69

SEITE 70

SEITE 71

SEITE 72

SEITE 73

SEITE 74

SEITE 75

SEITE 76

SEITE 77

SEITE 78

SEITE 79

SEITE 80

SEITE 81

SEITE 82

SEITE 83

SEITE 84

SEITE 85

SEITE 86

SEITE 87

SEITE 88

SEITE 89

SEITE 90

SEITE 91

SEITE 92

SEITE 93

SEITE 94

SEITE 95

SEITE 96

SEITE 97

SEITE 98

SEITE 99

SEITE 100

SEITE 101

SEITE 102

SEITE 103

SEITE 104

SEITE 105




EMPFOHLEN

Mane ts von nunnaswathi

Mane ts

Nunna Swathi
103 views•27 Folien
This document provides an overview of mobile ad hoc networks (MANETs). It
defines MANETs as wireless networks without fixed infrastructure where nodes are
free to move and dynamically self-organize. Key points: - MANETs are formed
spontaneously as nodes connect via wireless links without centralized
administration. - Each node acts as a router, forwarding data for other nodes.
Network topology changes frequently as nodes move. - Examples of MANET
applications include military operations, emergency response, classroom
environments, and home/office networks. - Challenges for MANET routing protocols
include dynamic topology, limited resources, and network security. Common
routing approaches include proactive, reactive, and geographic routing.

Applications of ad hoc and wireless sensor networks von paruvathavardhinipra

Applications of ad hoc and wireless sensor networks

paruvathavardhinipra
655 views•25 Folien
This document discusses ad hoc and wireless sensor networks. It describes
several applications of ad hoc networks including military operations,
collaborative work, emergency response, and wireless mesh networks. It also
discusses wireless sensor networks and their use in fields like healthcare,
environmental monitoring, and more. Finally, it outlines some of the major
challenges in designing routing protocols for ad hoc networks such as mobility,
bandwidth constraints, and resource limitations.

Ad hoc wireless networks-Overview von paruvathavardhinipra

Ad hoc wireless networks-Overview

paruvathavardhinipra
210 views•31 Folien
The document discusses key concepts related to ad hoc and wireless sensor
networks. It defines ad hoc networks as infrastructureless, decentralized
wireless networks where nodes can act as both senders and receivers and
dynamically route data through other nodes. It covers routing algorithms, single
vs multi-hop communication, unicast vs broadcast vs multicast transmission, and
compares ad hoc networks to cellular networks and WANETs/MANETs. Application
areas like military, emergency response, and wireless sensor networks are also
mentioned.

Improvement Of DSR Protocol von karumanchirk

Improvement Of DSR Protocol

Rajesh Karumanchi
4K views•33 Folien
Interim Report on thesis we've worked... "Reactive Routing Protocols for Ad-Hoc
Networks : Improvement of DSR Protocol"

Manet von pushkardutt3

Manet

Pushkar Dutt
13.2K views•12 Folien
Mobile Ad hoc Networks (MANET) has become an exciting and important technology
in recent years because of the rapid proliferation of wireless devices. A mobile
adhoc network consists of mobile nodes that can move freely in an open
environment. Communicating nodes in a Mobile Adhoc Network usually seek the help
of other intermediate nodes to establish communication channels. In such an
environment, malicious intermediate nodes can be a threat to the security of
conversation between mobile nodes. The security experience from the Wired
Network world is of little use in Wireless Mobile Ad hoc networks, due to some
basic di_erences between the two Networks. Therefore, some novel solutions are
required to make Mobile Adhoc Network secure.

CHAPTER-1234 von BilalAnjum3

CHAPTER-1234

Bilal Anjum
412 views•88 Folien
The document discusses WiFi-based mobility detection in mobile ad hoc networks.
It introduces mobile ad hoc networks and describes their key characteristics,
including being infrastructureless, multi-hop routing, dynamic topology, and
energy constraints. It also discusses some example application scenarios for
MANETs and different routing protocols used in MANETs, categorizing them as
proactive, reactive, or hybrid and describing Destination-Sequenced
Distance-Vector (DSDV) routing as one proactive protocol.

Adhoc wireless networks and its issues von Menagakarthick

Adhoc wireless networks and its issues

Menaga Selvaraj
1.3K views•52 Folien
This PPt will elaborate unit -1 in the subject of EC8702- Adhoc and Wireless
Sensor Network for Engineering students.

Manet von ankurtrip123

Manet

Ankur Tripathi
1.3K views•13 Folien
This document discusses mobile ad hoc networks (MANETs) and outlines some key
challenges related to routing and security in these networks. It provides
background on MANETs, explaining that they are infrastructure-less wireless
networks where nodes can freely and dynamically self-organize. It then
summarizes some of the main challenges like frequently changing topologies,
limited resources of mobile nodes, and security issues like denial of service
attacks. The document also gives an overview of different routing protocols for
MANETs and requirements for these protocols to address challenges like frequent
path breaks and bandwidth constraints. It concludes that comprehensive security
solutions are still needed to address both routing and cooperation enforcement
issues in these challenging ad hoc network environments.

Mobility management in adhoc network von AmanSaurabh1

Mobility management in adhoc network

Aman Saurabh
2.4K views•8 Folien
This document discusses mobility management in mobile ad-hoc networks (MANETs).
It begins by introducing MANETs and explaining that they are temporary networks
formed spontaneously via wireless communication between mobile nodes without
centralized administration. It then discusses the need for mobility management,
including location management and handoff management routing protocols. It also
discusses different types of node mobility and mobility models for predicting
node movement patterns over time in MANETs. The document categorizes mobility
models as trace-based (using real movement data) or synthetic-based (simulating
realistic movement), and lists examples of models within each category like the
random waypoint and reference point group mobility models.

Adhoc technologies von shashi712

Adhoc technologies

shashi712
1.2K views•12 Folien
The document discusses different types of wireless networks including Mobile Ad
Hoc Networks (MANETs), Wireless Sensor Networks (WSNs), and Vehicular Ad Hoc
Networks (VANETs). It provides an overview of the key characteristics of each
network type, such as their topology, communication paradigms, and constraints.
MANETs allow nodes to connect and communicate in a decentralized manner without
infrastructure support. WSNs consist of dense deployments of low-cost sensor
nodes that collect and transmit data. VANETs are similar to MANETs but involve
vehicle-to-vehicle communication and have more predictable mobility patterns.

Lecture 3 4. prnet von cprakash2011

Lecture 3 4. prnet

Chandra Meena
6.1K views•51 Folien
This document discusses the origins and development of ad hoc networks. It
describes how packet radio networks (PRNETs) in the 1970s, developed by DARPA,
were the first generation of ad hoc networks. PRNETs used multi-hop routing
between mobile radio terminals and packet radios to communicate without fixed
infrastructure. The document outlines the key components and routing techniques
of PRNETs, including point-to-point and broadcast routing. It also discusses how
subsequent generations in the 1980s-1990s focused on improving performance,
scalability, and developing commercial applications like Bluetooth.

MOBILE Ad-Hoc NETWORK (MANET) von MonodipSinghaRoy

MOBILE Ad-Hoc NETWORK (MANET)

Monodip Singha Roy
5.5K views•26 Folien
This document discusses mobile ad-hoc networks (MANETs). It defines MANETs as
collections of wireless mobile nodes that can dynamically form a network without
any centralized administration. The document outlines the characteristics,
mechanisms, transmission standards, routing protocols, applications, and future
aspects of MANETs. It explains that MANETs are self-configuring,
infrastructureless networks suitable for situations where fixed networks are not
available or are too expensive to deploy.

EC8702 adhoc and wireless sensor networks iv ece von GOWTHAMMS6

EC8702 adhoc and wireless sensor networks iv ece

GOWTHAMMS6
3.7K views•109 Folien
This document outlines the syllabus for a course on Adhoc and Wireless Sensor
Networks. It covers five units: (1) Introduction to Adhoc Networks and routing
protocols, (2) Introduction to sensor networks and architectures, (3) Networking
concepts and protocols for sensor networks, (4) Security issues in sensor
networks, and (5) Sensor network platforms and tools. Some key topics discussed
include characteristics of adhoc networks, challenges in routing, components and
applications of wireless sensor networks, and medium access schemes. The
objectives are for students to learn the fundamentals and apply their knowledge
to identify suitable protocols based on network requirements and understand
security and transport layer issues in these networks.

Adhoc & WSN-Unit-I-Ragavan von ragavan1989

Adhoc & WSN-Unit-I-Ragavan

Ragavan K
251 views•96 Folien
This document outlines the course objectives, syllabus, and outcomes for the
course EC8702 Ad Hoc and Wireless Sensor Networks. The course aims to teach
students about ad hoc network and sensor network fundamentals, routing
protocols, sensor network architecture and design issues, transport layer and
security issues, and sensor network platforms and tools. The syllabus covers
topics like ad hoc network routing protocols, sensor network introductions and
architectures, networking concepts and protocols, security issues, and sensor
network platforms. Upon completing the course, students will gain knowledge of
ad hoc and sensor networks and be able to apply this to identify suitable
protocols and address issues in these networks.

207088 633815660985047486 von SathishPilla

207088 633815660985047486

Sathish Pilla
491 views•36 Folien
This document provides an overview of mobile ad-hoc networks, including a brief
history and introduction. It discusses the key differences between
infrastructure-based networks and infrastructure-less networks. It also covers
routing protocols, setting up a simple ad-hoc network, pros and cons of ad-hoc
networks, wireless ad-hoc sensor networks, differences between cellular and
ad-hoc networks, and future research directions.

Introduction to mobile ad hoc network von prajapatashish009

Introduction to mobile ad hoc network

Ashish Prajapat
295 views•15 Folien
This document discusses mobile ad-hoc networks (MANETs). It defines MANETs as
self-configuring networks composed of mobile routers that connect via wireless
links to form a temporary, random topology. MANETs are suitable for situations
where infrastructure is not available or practical, such as emergency response.
The document outlines the characteristics of MANETs, including that they are
decentralized and nodes participate in routing by forwarding data. It also lists
some applications of MANETs like military operations and disaster relief.
Finally, it discusses challenges in MANETs like medium access, routing, security
and energy management.

Introduction to AWSN von PeriyanayagiS

Introduction to AWSN

PeriyanayagiS
139 views•17 Folien
The document discusses the syllabus for the course EC8702 Adhoc and Wireless
Sensor Networks. The syllabus covers topics like adhoc network routing
protocols, sensor network architecture and design issues, transport layer and
security protocols for adhoc and sensor networks, and programming platforms and
tools. The course objectives are to learn the fundamentals of adhoc and sensor
networks, apply routing algorithms, identify physical and MAC layer protocols,
and describe transport layer and security issues. Upon completing the course,
students will be able to explain adhoc and sensor network basics, apply routing
algorithms, identify protocols, describe transport and security issues, and
program sensor nodes.

Mobile Ad Hoc Network or MANNET von telecomsutra

Mobile Ad Hoc Network or MANNET

telecomsutra
1.9K views•16 Folien
A Session on Mobile Ad-hoc Networks and other emerging Telecom Trends Visit
www.telecomSutra.com for more on Telecom concepts and trends.

Unit 7 von poonampkc

Unit 7

Assistant Professor
6.5K views•23 Folien
Mobile ad hoc networks (MANETs) are wireless networks without a fixed
infrastructure. Each node acts as both a host and a router, forwarding packets
for other nodes. MANETs have dynamic topologies as nodes can move freely. They
are used in applications like military operations, emergency response, and
conferences. Routing in MANETs is challenging due to the dynamic topology.
Common routing protocols for MANETs include DSDV, AODV, DSR, and ZRP. DSDV adds
sequence numbers to distance vector routing to avoid loops from topology
changes. DSR is an on-demand routing protocol where the source determines the
complete path to the destination.

Centralized System in MANET with GRP Protocol von ijceronline

Centralized System in MANET with GRP Protocol

ijceronline
19 views•6 Folien
This document summarizes a research paper on implementing a centralized system
in a mobile ad hoc network (MANET) using the Gathering based Routing Protocol
(GRP). It begins by introducing MANETs and their characteristics like dynamic
topology. It then describes centralized systems and how they differ from
decentralized networks like MANETs. Next, it discusses vulnerabilities of MANETs
and challenges in routing. The GRP protocol is explained along with its
advantages and disadvantages. The document outlines a simulation setup comparing
network performance between a MANET and one with a centralized system using GRP
with hello packet exchanges. Results showed the centralized system had better
performance. The conclusion is that GRP protocol performs better in MANETs with
a centralized system.

Sensor Networks Introduction and Architecture von PeriyanayagiS

Sensor Networks Introduction and Architecture

PeriyanayagiS
1.3K views•100 Folien
This document provides an overview of sensor networks and wireless sensor
network architectures. It begins with an introduction to wireless sensor
networks and their components. It then discusses the topics, challenges, and
enabling technologies for WSNs. The document outlines the architecture of a
sensor node and its goals. It provides examples of WSN applications and
discusses sensor network deployment considerations. Finally, it addresses the
design challenges, operational challenges, and required mechanisms for WSNs to
meet their requirements.

Mobile Ad-hoc Network (MANET) Applications von kushwaha_sushant

Mobile Ad-hoc Network (MANET) Applications

Sushant Kushwaha
3.2K views•15 Folien
Mobile ad-hoc networks (MANETs) allow for content distribution, information
dissemination, and file sharing between Bluetooth and WiFi devices in an
enterprise network. MANETs form multicast tree topologies to disseminate data
packets between nodes, with clusters of nodes creating a multicast tree
structure. Mesh networks provide robust data services for mobile networks
through dynamic autonomous topology segments as an inexpensive alternative to
infrastructure-based cellular networks. Protocols like PUMA create mesh networks
connecting MANET nodes with multiple paths between senders and receivers to
improve packet delivery in mobile environments. MANETs also enable applications
like remote imaging, messaging, and file transfers between devices like cameras
and smartphones.

Lecture 1 mobile and adhoc network- introduction von cprakash2011

Lecture 1 mobile and adhoc network- introduction

Chandra Meena
18.4K views•52 Folien
This document provides an overview of a course on mobile and ad hoc networks. It
lists two textbooks that will be used and states that the goal is to cover
fundamental design issues and solutions for network architecture and protocols.
It also lists some related websites and outlines the objectives of chapters that
will introduce wireless communication technologies, network standards, and
multiple access techniques for ad hoc networks.

MANET routing protocols Issues and Classifications von ArunChokkalingam

MANET routing protocols Issues and Classifications

ArunChokkalingam
502 views•25 Folien
Introduction about routing Issues in designing a routing protocol
Characteristics of an ideal routing protocol Classifications of routing
protocols

Adhoc networks notes by divya (rnsit) von vivekmaurya32

Adhoc networks notes by divya (rnsit)

Vivek Maurya
5K views•75 Folien
This document provides notes on ad hoc networks from R N S Institute of
Technology. It begins with an introduction comparing cellular and ad hoc
wireless networks. Ad hoc networks are infrastructureless networks that use
multi-hop radio relaying. The document then discusses applications of ad hoc
networks such as military operations, emergency response, wireless mesh
networks, and wireless sensor networks. It also covers key issues in ad hoc
networks including medium access, routing, multicasting, and energy management.
The first unit focuses on these introductory concepts and applications of ad hoc
networks.

Ad-hoc Networks by Ashok Panwar von AshokPanwar3

Ad-hoc Networks by Ashok Panwar

Ashok Panwar
176 views•89 Folien
The document discusses ad hoc networks and routing protocols. It begins with an
introduction to mobile ad hoc networks (MANETs), including their characteristics
and applications. Several categories of routing protocols are described,
including table-driven protocols like Destination Sequenced Distance Vector
Routing (DSDV) and Cluster-head Gateway Switch Routing (CGSR), as well as
source-initiated on-demand protocols like Dynamic Source Routing (DSR). The
document provides examples and explanations of how these different protocols
perform routing in MANETs.

Ad-Hoc Networks von ENGMSHARI

Ad-Hoc Networks

Mshari Alabdulkarim
109.5K views•55 Folien
The document discusses ad-hoc networks and their key characteristics. It
describes several challenges in ad-hoc networks including limited battery power,
dynamic network topology, and scalability issues. It also summarizes several
ad-hoc network routing protocols (e.g. DSDV, AODV, DSR), addressing both
table-driven and on-demand approaches. Additionally, it outlines some ad-hoc MAC
protocols like MACA and PAMAS that aim to manage shared wireless medium access.

Survey of Reactive Routing Protocols for MANET von IOSR

Survey of Reactive Routing Protocols for MANET

IOSR Journals
346 views•9 Folien
A MANET is a collection of mobile nodes by wireless links forming a dynamic
topology without any network infrastructure such as routers, servers, access
points/cables or centralized administration. The nodes are free to move about
and organize themselves into a network. These nodes change position frequently.
The main classes of routing protocols are Proactive, Reactive and Hybrid. A
Reactive (on-demand) routing strategy is a popular routing category for wireless
ad hoc routing. It is a relatively new routing philosophy that provides a
scalable solution to relatively large network topologies. The design follows the
idea that each node tries to reduce routing overhead by sending routing packets
whenever a communication is requested. DSR and AODV are reactive route discovery
algorithms where a mobile device of MANET connects by gateway only when it is
needed. The performance differentials are analyzed using varying performance
metrics. These simulations are carried out using the ns-2 network simulator

IT6601 Mobile Computing Unit IV von pkaviya

IT6601 Mobile Computing Unit IV

pkaviya
445 views•80 Folien
Mobile ad-hoc networks (MANETs) are self-configuring networks formed by mobile
devices without any fixed infrastructure. Routing in MANETs is complex due to
frequent topology changes from node movement and failures. The document
discusses characteristics of MANETs such as dynamic topology and limited
bandwidth. It also covers routing challenges, different routing protocol types
(proactive, reactive, hybrid), and examples like Destination-Sequenced
Distance-Vector Routing (DSDV) which is a proactive table-driven protocol that
uses sequence numbers to avoid routing loops.

WMN Chapter5.pptx von damayanti68

WMN Chapter5.pptx

damayanti68
111 views•9 Folien
Mobile ad-hoc networks (MANETs) are formed spontaneously by wireless devices
without any preexisting infrastructure. Nodes in a MANET are free to move
randomly and organize themselves arbitrarily, so the network topology can change
unpredictably. MANETs have advantages like decentralized administration and
self-configuration, but also challenges like limited bandwidth, dynamic
topology, and security threats. Applications of MANETs include personal devices
like cell phones communicating directly, military environments, emergency
response situations, and more.


WEITERE ÄHNLICHE INHALTE


WAS IST ANGESAGT?

Mobility management in adhoc network von AmanSaurabh1

Mobility management in adhoc network

Aman Saurabh
2.4K views•8 Folien
This document discusses mobility management in mobile ad-hoc networks (MANETs).
It begins by introducing MANETs and explaining that they are temporary networks
formed spontaneously via wireless communication between mobile nodes without
centralized administration. It then discusses the need for mobility management,
including location management and handoff management routing protocols. It also
discusses different types of node mobility and mobility models for predicting
node movement patterns over time in MANETs. The document categorizes mobility
models as trace-based (using real movement data) or synthetic-based (simulating
realistic movement), and lists examples of models within each category like the
random waypoint and reference point group mobility models.

Adhoc technologies von shashi712

Adhoc technologies

shashi712
1.2K views•12 Folien
The document discusses different types of wireless networks including Mobile Ad
Hoc Networks (MANETs), Wireless Sensor Networks (WSNs), and Vehicular Ad Hoc
Networks (VANETs). It provides an overview of the key characteristics of each
network type, such as their topology, communication paradigms, and constraints.
MANETs allow nodes to connect and communicate in a decentralized manner without
infrastructure support. WSNs consist of dense deployments of low-cost sensor
nodes that collect and transmit data. VANETs are similar to MANETs but involve
vehicle-to-vehicle communication and have more predictable mobility patterns.

Lecture 3 4. prnet von cprakash2011

Lecture 3 4. prnet

Chandra Meena
6.1K views•51 Folien
This document discusses the origins and development of ad hoc networks. It
describes how packet radio networks (PRNETs) in the 1970s, developed by DARPA,
were the first generation of ad hoc networks. PRNETs used multi-hop routing
between mobile radio terminals and packet radios to communicate without fixed
infrastructure. The document outlines the key components and routing techniques
of PRNETs, including point-to-point and broadcast routing. It also discusses how
subsequent generations in the 1980s-1990s focused on improving performance,
scalability, and developing commercial applications like Bluetooth.

MOBILE Ad-Hoc NETWORK (MANET) von MonodipSinghaRoy

MOBILE Ad-Hoc NETWORK (MANET)

Monodip Singha Roy
5.5K views•26 Folien
This document discusses mobile ad-hoc networks (MANETs). It defines MANETs as
collections of wireless mobile nodes that can dynamically form a network without
any centralized administration. The document outlines the characteristics,
mechanisms, transmission standards, routing protocols, applications, and future
aspects of MANETs. It explains that MANETs are self-configuring,
infrastructureless networks suitable for situations where fixed networks are not
available or are too expensive to deploy.

EC8702 adhoc and wireless sensor networks iv ece von GOWTHAMMS6

EC8702 adhoc and wireless sensor networks iv ece

GOWTHAMMS6
3.7K views•109 Folien
This document outlines the syllabus for a course on Adhoc and Wireless Sensor
Networks. It covers five units: (1) Introduction to Adhoc Networks and routing
protocols, (2) Introduction to sensor networks and architectures, (3) Networking
concepts and protocols for sensor networks, (4) Security issues in sensor
networks, and (5) Sensor network platforms and tools. Some key topics discussed
include characteristics of adhoc networks, challenges in routing, components and
applications of wireless sensor networks, and medium access schemes. The
objectives are for students to learn the fundamentals and apply their knowledge
to identify suitable protocols based on network requirements and understand
security and transport layer issues in these networks.

Adhoc & WSN-Unit-I-Ragavan von ragavan1989

Adhoc & WSN-Unit-I-Ragavan

Ragavan K
251 views•96 Folien
This document outlines the course objectives, syllabus, and outcomes for the
course EC8702 Ad Hoc and Wireless Sensor Networks. The course aims to teach
students about ad hoc network and sensor network fundamentals, routing
protocols, sensor network architecture and design issues, transport layer and
security issues, and sensor network platforms and tools. The syllabus covers
topics like ad hoc network routing protocols, sensor network introductions and
architectures, networking concepts and protocols, security issues, and sensor
network platforms. Upon completing the course, students will gain knowledge of
ad hoc and sensor networks and be able to apply this to identify suitable
protocols and address issues in these networks.

207088 633815660985047486 von SathishPilla

207088 633815660985047486

Sathish Pilla
491 views•36 Folien
This document provides an overview of mobile ad-hoc networks, including a brief
history and introduction. It discusses the key differences between
infrastructure-based networks and infrastructure-less networks. It also covers
routing protocols, setting up a simple ad-hoc network, pros and cons of ad-hoc
networks, wireless ad-hoc sensor networks, differences between cellular and
ad-hoc networks, and future research directions.

Introduction to mobile ad hoc network von prajapatashish009

Introduction to mobile ad hoc network

Ashish Prajapat
295 views•15 Folien
This document discusses mobile ad-hoc networks (MANETs). It defines MANETs as
self-configuring networks composed of mobile routers that connect via wireless
links to form a temporary, random topology. MANETs are suitable for situations
where infrastructure is not available or practical, such as emergency response.
The document outlines the characteristics of MANETs, including that they are
decentralized and nodes participate in routing by forwarding data. It also lists
some applications of MANETs like military operations and disaster relief.
Finally, it discusses challenges in MANETs like medium access, routing, security
and energy management.

Introduction to AWSN von PeriyanayagiS

Introduction to AWSN

PeriyanayagiS
139 views•17 Folien
The document discusses the syllabus for the course EC8702 Adhoc and Wireless
Sensor Networks. The syllabus covers topics like adhoc network routing
protocols, sensor network architecture and design issues, transport layer and
security protocols for adhoc and sensor networks, and programming platforms and
tools. The course objectives are to learn the fundamentals of adhoc and sensor
networks, apply routing algorithms, identify physical and MAC layer protocols,
and describe transport layer and security issues. Upon completing the course,
students will be able to explain adhoc and sensor network basics, apply routing
algorithms, identify protocols, describe transport and security issues, and
program sensor nodes.

Mobile Ad Hoc Network or MANNET von telecomsutra

Mobile Ad Hoc Network or MANNET

telecomsutra
1.9K views•16 Folien
A Session on Mobile Ad-hoc Networks and other emerging Telecom Trends Visit
www.telecomSutra.com for more on Telecom concepts and trends.

Unit 7 von poonampkc

Unit 7

Assistant Professor
6.5K views•23 Folien
Mobile ad hoc networks (MANETs) are wireless networks without a fixed
infrastructure. Each node acts as both a host and a router, forwarding packets
for other nodes. MANETs have dynamic topologies as nodes can move freely. They
are used in applications like military operations, emergency response, and
conferences. Routing in MANETs is challenging due to the dynamic topology.
Common routing protocols for MANETs include DSDV, AODV, DSR, and ZRP. DSDV adds
sequence numbers to distance vector routing to avoid loops from topology
changes. DSR is an on-demand routing protocol where the source determines the
complete path to the destination.

Centralized System in MANET with GRP Protocol von ijceronline

Centralized System in MANET with GRP Protocol

ijceronline
19 views•6 Folien
This document summarizes a research paper on implementing a centralized system
in a mobile ad hoc network (MANET) using the Gathering based Routing Protocol
(GRP). It begins by introducing MANETs and their characteristics like dynamic
topology. It then describes centralized systems and how they differ from
decentralized networks like MANETs. Next, it discusses vulnerabilities of MANETs
and challenges in routing. The GRP protocol is explained along with its
advantages and disadvantages. The document outlines a simulation setup comparing
network performance between a MANET and one with a centralized system using GRP
with hello packet exchanges. Results showed the centralized system had better
performance. The conclusion is that GRP protocol performs better in MANETs with
a centralized system.

Sensor Networks Introduction and Architecture von PeriyanayagiS

Sensor Networks Introduction and Architecture

PeriyanayagiS
1.3K views•100 Folien
This document provides an overview of sensor networks and wireless sensor
network architectures. It begins with an introduction to wireless sensor
networks and their components. It then discusses the topics, challenges, and
enabling technologies for WSNs. The document outlines the architecture of a
sensor node and its goals. It provides examples of WSN applications and
discusses sensor network deployment considerations. Finally, it addresses the
design challenges, operational challenges, and required mechanisms for WSNs to
meet their requirements.

Mobile Ad-hoc Network (MANET) Applications von kushwaha_sushant

Mobile Ad-hoc Network (MANET) Applications

Sushant Kushwaha
3.2K views•15 Folien
Mobile ad-hoc networks (MANETs) allow for content distribution, information
dissemination, and file sharing between Bluetooth and WiFi devices in an
enterprise network. MANETs form multicast tree topologies to disseminate data
packets between nodes, with clusters of nodes creating a multicast tree
structure. Mesh networks provide robust data services for mobile networks
through dynamic autonomous topology segments as an inexpensive alternative to
infrastructure-based cellular networks. Protocols like PUMA create mesh networks
connecting MANET nodes with multiple paths between senders and receivers to
improve packet delivery in mobile environments. MANETs also enable applications
like remote imaging, messaging, and file transfers between devices like cameras
and smartphones.

Lecture 1 mobile and adhoc network- introduction von cprakash2011

Lecture 1 mobile and adhoc network- introduction

Chandra Meena
18.4K views•52 Folien
This document provides an overview of a course on mobile and ad hoc networks. It
lists two textbooks that will be used and states that the goal is to cover
fundamental design issues and solutions for network architecture and protocols.
It also lists some related websites and outlines the objectives of chapters that
will introduce wireless communication technologies, network standards, and
multiple access techniques for ad hoc networks.

MANET routing protocols Issues and Classifications von ArunChokkalingam

MANET routing protocols Issues and Classifications

ArunChokkalingam
502 views•25 Folien
Introduction about routing Issues in designing a routing protocol
Characteristics of an ideal routing protocol Classifications of routing
protocols

Adhoc networks notes by divya (rnsit) von vivekmaurya32

Adhoc networks notes by divya (rnsit)

Vivek Maurya
5K views•75 Folien
This document provides notes on ad hoc networks from R N S Institute of
Technology. It begins with an introduction comparing cellular and ad hoc
wireless networks. Ad hoc networks are infrastructureless networks that use
multi-hop radio relaying. The document then discusses applications of ad hoc
networks such as military operations, emergency response, wireless mesh
networks, and wireless sensor networks. It also covers key issues in ad hoc
networks including medium access, routing, multicasting, and energy management.
The first unit focuses on these introductory concepts and applications of ad hoc
networks.

Ad-hoc Networks by Ashok Panwar von AshokPanwar3

Ad-hoc Networks by Ashok Panwar

Ashok Panwar
176 views•89 Folien
The document discusses ad hoc networks and routing protocols. It begins with an
introduction to mobile ad hoc networks (MANETs), including their characteristics
and applications. Several categories of routing protocols are described,
including table-driven protocols like Destination Sequenced Distance Vector
Routing (DSDV) and Cluster-head Gateway Switch Routing (CGSR), as well as
source-initiated on-demand protocols like Dynamic Source Routing (DSR). The
document provides examples and explanations of how these different protocols
perform routing in MANETs.

Ad-Hoc Networks von ENGMSHARI

Ad-Hoc Networks

Mshari Alabdulkarim
109.5K views•55 Folien
The document discusses ad-hoc networks and their key characteristics. It
describes several challenges in ad-hoc networks including limited battery power,
dynamic network topology, and scalability issues. It also summarizes several
ad-hoc network routing protocols (e.g. DSDV, AODV, DSR), addressing both
table-driven and on-demand approaches. Additionally, it outlines some ad-hoc MAC
protocols like MACA and PAMAS that aim to manage shared wireless medium access.

Survey of Reactive Routing Protocols for MANET von IOSR

Survey of Reactive Routing Protocols for MANET

IOSR Journals
346 views•9 Folien
A MANET is a collection of mobile nodes by wireless links forming a dynamic
topology without any network infrastructure such as routers, servers, access
points/cables or centralized administration. The nodes are free to move about
and organize themselves into a network. These nodes change position frequently.
The main classes of routing protocols are Proactive, Reactive and Hybrid. A
Reactive (on-demand) routing strategy is a popular routing category for wireless
ad hoc routing. It is a relatively new routing philosophy that provides a
scalable solution to relatively large network topologies. The design follows the
idea that each node tries to reduce routing overhead by sending routing packets
whenever a communication is requested. DSR and AODV are reactive route discovery
algorithms where a mobile device of MANET connects by gateway only when it is
needed. The performance differentials are analyzed using varying performance
metrics. These simulations are carried out using the ns-2 network simulator


WAS IST ANGESAGT? (20)

Mobility management in adhoc network von AmanSaurabh1

Mobility management in adhoc network
Aman Saurabh•2.4K views
Adhoc technologies von shashi712

Adhoc technologies
shashi712•1.2K views
Lecture 3 4. prnet von cprakash2011

Lecture 3 4. prnet
Chandra Meena•6.1K views
MOBILE Ad-Hoc NETWORK (MANET) von MonodipSinghaRoy

MOBILE Ad-Hoc NETWORK (MANET)
Monodip Singha Roy•5.5K views
EC8702 adhoc and wireless sensor networks iv ece von GOWTHAMMS6

EC8702 adhoc and wireless sensor networks iv ece
GOWTHAMMS6•3.7K views
Adhoc & WSN-Unit-I-Ragavan von ragavan1989

Adhoc & WSN-Unit-I-Ragavan
Ragavan K•251 views
207088 633815660985047486 von SathishPilla

207088 633815660985047486
Sathish Pilla•491 views
Introduction to mobile ad hoc network von prajapatashish009

Introduction to mobile ad hoc network
Ashish Prajapat•295 views
Introduction to AWSN von PeriyanayagiS

Introduction to AWSN
PeriyanayagiS•139 views
Mobile Ad Hoc Network or MANNET von telecomsutra

Mobile Ad Hoc Network or MANNET
telecomsutra•1.9K views
Unit 7 von poonampkc

Unit 7
Assistant Professor•6.5K views
Centralized System in MANET with GRP Protocol von ijceronline

Centralized System in MANET with GRP Protocol
ijceronline•19 views
Sensor Networks Introduction and Architecture von PeriyanayagiS

Sensor Networks Introduction and Architecture
PeriyanayagiS•1.3K views
Mobile Ad-hoc Network (MANET) Applications von kushwaha_sushant

Mobile Ad-hoc Network (MANET) Applications
Sushant Kushwaha•3.2K views
Lecture 1 mobile and adhoc network- introduction von cprakash2011

Lecture 1 mobile and adhoc network- introduction
Chandra Meena•18.4K views
MANET routing protocols Issues and Classifications von ArunChokkalingam

MANET routing protocols Issues and Classifications
ArunChokkalingam•502 views
Adhoc networks notes by divya (rnsit) von vivekmaurya32

Adhoc networks notes by divya (rnsit)
Vivek Maurya•5K views
Ad-hoc Networks by Ashok Panwar von AshokPanwar3

Ad-hoc Networks by Ashok Panwar
Ashok Panwar•176 views
Ad-Hoc Networks von ENGMSHARI

Ad-Hoc Networks
Mshari Alabdulkarim•109.5K views
Survey of Reactive Routing Protocols for MANET von IOSR

Survey of Reactive Routing Protocols for MANET
IOSR Journals•346 views


ÄHNLICH WIE MOBILE COMPUTING MOBILE ADHOC NETWORKS (MANETS)

IT6601 Mobile Computing Unit IV von pkaviya

IT6601 Mobile Computing Unit IV

pkaviya
445 views•80 Folien
Mobile ad-hoc networks (MANETs) are self-configuring networks formed by mobile
devices without any fixed infrastructure. Routing in MANETs is complex due to
frequent topology changes from node movement and failures. The document
discusses characteristics of MANETs such as dynamic topology and limited
bandwidth. It also covers routing challenges, different routing protocol types
(proactive, reactive, hybrid), and examples like Destination-Sequenced
Distance-Vector Routing (DSDV) which is a proactive table-driven protocol that
uses sequence numbers to avoid routing loops.

WMN Chapter5.pptx von damayanti68

WMN Chapter5.pptx

damayanti68
111 views•9 Folien
Mobile ad-hoc networks (MANETs) are formed spontaneously by wireless devices
without any preexisting infrastructure. Nodes in a MANET are free to move
randomly and organize themselves arbitrarily, so the network topology can change
unpredictably. MANETs have advantages like decentralized administration and
self-configuration, but also challenges like limited bandwidth, dynamic
topology, and security threats. Applications of MANETs include personal devices
like cell phones communicating directly, military environments, emergency
response situations, and more.

Mobile Computing UNIT-7 von asistithod

Mobile Computing UNIT-7

Ramesh Babu
8.5K views•46 Folien
This document discusses mobile ad-hoc networks (MANETs) and wireless sensor
networks. It describes how MANETs are self-configuring networks formed by mobile
nodes connected wirelessly without any fixed infrastructure. Each node acts as a
router to forward packets. Wireless sensor networks are similar but use smart
sensor nodes that can sense environmental data and disseminate it through the
network. Examples of MANET and sensor network applications include content
sharing between devices, industrial plant monitoring, and traffic monitoring.
Security challenges in these networks are also discussed.

An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
von IOSR

An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...

IOSR Journals
624 views•5 Folien
This document provides an overview of mobile ad hoc networks (MANETs), including
their applications, challenges, and comparisons of routing protocols. It
discusses how MANETs are self-configuring networks of mobile nodes that
communicate wirelessly without centralized administration. The document outlines
several applications of MANETs, technological challenges in areas like routing,
security, and power consumption. It also classifies and compares several popular
routing protocols for MANETs like DSDV, AODV, DSR, evaluating them based on
parameters like route selection method, topology structure, and ability to avoid
loops.

MANET.pptx von ssuser476e50

MANET.pptx

ssuser476e50
72 views•12 Folien
Mobile ad hoc network - A simple introduction, advantages and disadvantages,
types , characteristics and future scope

Manet ppt von PoojaRawat74

Manet ppt

PoojaRawat74
47 views•13 Folien
This document discusses mobile ad hoc networks (MANETs). It begins with an
introduction to MANETs, describing their characteristics as peer-to-peer,
self-forming, and self-healing wireless networks without a fixed infrastructure.
The document then outlines the main types of MANETs: SPANs for smartphone
networks, iMANETs that use internet protocols, and VANETs for vehicle
communication networks. It provides examples of each type and their
applications. In closing, the document briefly covers the merits and demerits of
MANETs and potential future developments, such as improved security and testing
under different conditions.

Mobile adhoc von shivakrishnashekar

Mobile adhoc

Shiva Krishna Chandra Shekar
1.7K views•12 Folien
This document provides a summary of routing protocols in mobile ad hoc networks
(MANETs). It begins with an introduction to MANETs and their characteristics. It
then discusses why traditional routing protocols are not suitable for MANETs and
describes some common MANET routing protocols, classifying them as proactive
(table-driven) or reactive (on-demand). Specifically, it provides detailed
descriptions of the reactive protocols DSR and AODV, covering topics like route
discovery, maintenance, and deletion. Finally, it compares these protocols and
discusses which may be better suited under different network conditions.

Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
von DrUmangSingh

Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...

Umang Singh
406 views•69 Folien
This document discusses ad hoc networks and related research directions. It
begins with an introduction to computer networks and wireless networks. It then
covers classifications of wireless networks including cellular networks,
wireless sensor networks, wireless mesh networks, and mobile ad hoc networks
(MANETs). The document discusses MANETs in detail including paradigms,
applications, and research issues related to routing, mobility, and resource
constraints. It also discusses vehicular ad hoc networks (VANETs) and related
challenges. Finally, it introduces flying ad hoc networks (FANETs) for
communication between unmanned aerial vehicles and associated research issues
like routing and coordination challenges.

[IJET-V1I6P19] Authors : Kirti von IJETJOURNAL

[IJET-V1I6P19] Authors : Kirti

IJET - International Journal of Engineering and Techniques
171 views•11 Folien
A MANET is an autonomous group of mobile users that communicate over reasonably
slow wireless links. The network topology may vary rapidly and unpredictably
over time, because the nodes are mobile. The network is decentralized, where all
network activity, including discovering the topology and delivering messages
must be executed by the nodes themselves. Hence routing functionality will have
to be incorporated into the mobile nodes. MANET is a kind of wireless ad-hoc
network and it is a self-configuring network of mobile routers (and associated
hosts) connected by wireless links – the union of which forms an arbitrary
topology. Such a network may operate in a standalone fashion, or may be
connected to the larger Internet Problems in Ad Hoc Networks.

Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
von ijmter

Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...

Editor IJMTER
735 views•11 Folien
A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of
mobile nodes with no permanent infrastructure. In a MANETs, there is no
difference between a host node and a router so that all nodes can be source plus
forwarders of traffic. The task of finding routes in Mobile Ad-hoc Network
(MANET) is an important factor in determining the efficiency of any MANET
routing protocols. This paper describes about the basic idea of different
routing protocols and its efficient use in MANET. There are several routing
protocols based on UNICAST and MULTICAST. This paper will conclude the main
characteristics of these protocols with comparison and suggest the best suited
protocol for particular topology or network.

MOBILE COMPUTING MANETS,ROUTING ALGORITHMS von srivaniadudodla

MOBILE COMPUTING MANETS,ROUTING ALGORITHMS

Pallepati Vasavi
7.7K views•112 Folien
Mobile Ad hoc Networks (MANETs) allow devices to connect spontaneously without
infrastructure by acting as both hosts and routers, forwarding traffic in a
multi-hop fashion. They face challenges from dynamic topology, limited bandwidth
and security, and use reactive routing protocols like Dynamic Source Routing
(DSR) that discover routes on demand through flooding route requests. MANETs
have applications in military operations, disaster relief, vehicular networks,
and personal area networks.

A0110104 von IJRES

A0110104

IJRES Journal
363 views•4 Folien
International Journal of Research in Engineering and Science is an open access
peer-reviewed international forum for scientists involved in research to publish
quality and refereed papers. Papers reporting original research or
experimentally proved review work are welcome. Papers for publication are
selected through peer review to ensure originality, relevance, and readability.

adhoc wireless networks and its issues.pdf von paruvathavardhinij

adhoc wireless networks and its issues.pdf

paruvathavardhinij
11 views•52 Folien
This document provides an overview of ad-hoc and wireless sensor networks. It
begins by defining ad-hoc networks as temporary networks composed of mobile
nodes that communicate without any fixed infrastructure. The key elements of
ad-hoc networks include self-organization, distributed operation, and multi-hop
routing. Several issues for ad-hoc networks are then discussed, including medium
access, routing protocols, multicasting, transport layer protocols, pricing
schemes, and quality of service provisioning. Specific challenges for each of
these areas are outlined, such as mobility, bandwidth constraints, and
error-prone wireless channels.

Manet - The Art of Networking without a Network von smart26

Manet - The Art of Networking without a Network

Tarun Varshney
4K views•31 Folien
Mobile ad hoc network (MANET), or simply ad hoc network, comprises nodes that
freely and dynamically self-organize into arbitrary and temporary network
topology without any infrastructure support.

Mobile ad hoc networks (manet) von VinishAlikkal

Mobile ad hoc networks (manet)

Vinish Alikkal
235 views•47 Folien
MANET stands for mobile ad hoc network. It is a type of wireless network that
can change locations and configure itself without a centralized administration.
Nodes in a MANET can connect to each other to form a temporary network without
any existing network infrastructure. Routing in MANETs is challenging due to the
dynamic network topology, asymmetric links, and interference. Common routing
algorithms for MANETs include distance vector, link state, and various protocols
designed specifically for MANETs to handle mobility.

Mobile ad hoc networks (MANET) for KTU von VinishAlikkal

Mobile ad hoc networks (MANET) for KTU

Vinish Alikkal
341 views•47 Folien
MANET stands for mobile ad hoc network. It is a type of wireless network that
can change locations and configure itself without a centralized administration.
Nodes in a MANET can connect to each other to form a temporary network without
any existing network infrastructure. Routing in MANETs is challenging due to the
dynamic network topology, asymmetric links, and interference. Common routing
algorithms for MANETs include distance vector, link state, and various protocols
designed specifically for MANETs to handle mobility.

adhoc applications.pptx von paruvathavardhinij

adhoc applications.pptx

paruvathavardhinij
4 views•25 Folien
This document discusses ad hoc and wireless sensor networks. It describes
several applications of ad hoc networks including military operations,
collaborative work, emergency response, and wireless mesh networks. It also
discusses wireless sensor networks and their use in fields like healthcare,
environmental monitoring, and more. Finally, it outlines some of the major
challenges in designing routing protocols for ad hoc networks such as mobility,
bandwidth constraints, and resource limitations.

Ioe module 4 von nikshaikh786

Ioe module 4

nikshaikh786
491 views•90 Folien
Wireless sensor networks use large numbers of small, low-cost sensors that
communicate wirelessly to monitor conditions like temperature, sound, pollution
levels, pressure, etc. Sensors collect data and pass it to a base station, which
can be accessed through the internet. Wireless sensor networks can be used for
applications like environmental monitoring, smart grids, healthcare,
agriculture, and more. They face challenges related to power efficiency,
security, scalability and operating in different environments.

Computer Network Introduction full von aneebkmct

Computer Network Introduction full

aneebkmct
158 views•84 Folien
The document discusses different types of computer networks: - Local Area
Network (LAN) connects devices within a home or office building and allows
sharing of resources. - Metropolitan Area Network (MAN) spans a larger area like
a city and provides high-speed connectivity. - Wide Area Network (WAN) connects
multiple LANs over long distances using technologies like telephone lines. -
Personal Area Network (PAN) enables communication among devices near an
individual's body within a few meters. The document also describes different
network topologies like star, bus, ring and mesh, and the OSI and TCP/IP network
models.

Unit 7 von vamsitricks

Unit 7

vamsitricks
759 views•23 Folien
Mobile ad hoc networks (MANETs) are wireless networks without a fixed
infrastructure. Each node acts as both a host and a router, forwarding packets
for other nodes. Routing in MANETs is challenging due to the dynamic topology
from node mobility. Common routing protocols for MANETs include proactive
(table-driven) protocols that maintain up-to-date routing tables and reactive
(on-demand) protocols that find routes only when needed to limit overhead.
Dynamic Source Routing (DSR) is a reactive routing protocol that uses source
routing, where the data packet carries the complete hop-by-hop route to the
destination.


ÄHNLICH WIE MOBILE COMPUTING MOBILE ADHOC NETWORKS (MANETS) (20)

IT6601 Mobile Computing Unit IV von pkaviya

IT6601 Mobile Computing Unit IV
pkaviya•445 views
WMN Chapter5.pptx von damayanti68

WMN Chapter5.pptx
damayanti68•111 views
Mobile Computing UNIT-7 von asistithod

Mobile Computing UNIT-7
Ramesh Babu•8.5K views
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
von IOSR

An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
IOSR Journals•624 views
MANET.pptx von ssuser476e50

MANET.pptx
ssuser476e50•72 views
Manet ppt von PoojaRawat74

Manet ppt
PoojaRawat74•47 views
Mobile adhoc von shivakrishnashekar

Mobile adhoc
Shiva Krishna Chandra Shekar•1.7K views
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
von DrUmangSingh

Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Umang Singh•406 views
[IJET-V1I6P19] Authors : Kirti von IJETJOURNAL

[IJET-V1I6P19] Authors : Kirti
IJET - International Journal of Engineering and Techniques•171 views
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
von ijmter

Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Editor IJMTER•735 views
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS von srivaniadudodla

MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
Pallepati Vasavi•7.7K views
A0110104 von IJRES

A0110104
IJRES Journal•363 views
adhoc wireless networks and its issues.pdf von paruvathavardhinij

adhoc wireless networks and its issues.pdf
paruvathavardhinij•11 views
Manet - The Art of Networking without a Network von smart26

Manet - The Art of Networking without a Network
Tarun Varshney•4K views
Mobile ad hoc networks (manet) von VinishAlikkal

Mobile ad hoc networks (manet)
Vinish Alikkal•235 views
Mobile ad hoc networks (MANET) for KTU von VinishAlikkal

Mobile ad hoc networks (MANET) for KTU
Vinish Alikkal•341 views
adhoc applications.pptx von paruvathavardhinij

adhoc applications.pptx
paruvathavardhinij•4 views
Ioe module 4 von nikshaikh786

Ioe module 4
nikshaikh786•491 views
Computer Network Introduction full von aneebkmct

Computer Network Introduction full
aneebkmct•158 views
Unit 7 von vamsitricks

Unit 7
vamsitricks•759 views



DIASHOWS FÜR SIE

Digital twins ppt von travel_affair

Digital twins ppttravel_affair
59.3K views•21 Folien

Robotic Process Automation (RPA) von MufaddalNullwala1

Robotic Process Automation (RPA)Mufaddal Nullwala
79.2K views•25 Folien

A Product Requirements Document (PRD) Sample von RickWingenderMBAPMPA

A Product Requirements Document (PRD) SampleRick Wingender, MBA, MS, PMP, CSPO
107.4K views•145 Folien

Final Year Project von mbilalk315

Final Year ProjectMuhammad Khan
258.8K views•26 Folien

Web scraping von SelectoCompany

Web scrapingSelecto
20.3K views•15 Folien

Business intelligence von rla1022

Business intelligenceRandy L. Archambault
64.9K views•29 Folien

The Rise Of Low-Code And No-Code Platforms And Its Future | SynergyTop von
Stevejohn70

The Rise Of Low-Code And No-Code Platforms And Its Future | SynergyTopSynergyTop
Inc
1K views•6 Folien

Artificial Intelligence Application in Oil and Gas von sparkcognition

Artificial Intelligence Application in Oil and GasSparkCognition
6.9K views•24 Folien

Big Data and Advanced Analytics von McK_CMSOForum

Big Data and Advanced AnalyticsMcKinsey on Marketing & Sales
261.9K views•30 Folien

An example of a successful proof of concept von ETLSolutions

An example of a successful proof of conceptETLSolutions
146.5K views•8 Folien

Building a Data Streaming Center of Excellence With Steve Gonzalez and Derek ...
von HostedbyConfluent

Building a Data Streaming Center of Excellence With Steve Gonzalez and Derek
...HostedbyConfluent
841 views•22 Folien

Dashboard - definition, examples von matthieua

Dashboard - definition, examplesMatthieu Aubry
44.8K views•17 Folien

AIOps: Your DevOps Co-Pilot von DevOpsWebinars

AIOps: Your DevOps Co-PilotDevOps.com
1.2K views•62 Folien

State of the Cloud 2023—The AI era von BessemerVP

State of the Cloud 2023—The AI eraBessemer Venture Partners
77K views•49 Folien

Google App Engine ppt von OECLIBOdishaElectron

Google App Engine pptOECLIB Odisha Electronics Control Library
18.4K views•19 Folien

Google App Engine von softwarepark

Google App EngineSoftware Park Thailand
12.5K views•67 Folien

Expert systems Artificial Intelligence von ittirehan

Expert systems Artificial Intelligenceitti rehan
12.2K views•28 Folien

Uber - Building Intelligent Applications, Experimental ML with Uber’s Data Sc...
von KarthikMurugesan2

Uber - Building Intelligent Applications, Experimental ML with Uber’s Data
Sc...Karthik Murugesan
459 views•47 Folien

IBM Blockchain Solutions Explained v0.6 von MattLucas3

IBM Blockchain Solutions Explained v0.6Matt Lucas
1.4K views•66 Folien

Marketing Analytics with Business Intelligence von businessintelligence

Marketing Analytics with Business IntelligenceDhiren Gala
3.4K views•25 Folien


DIASHOWS FÜR SIE (20)

Digital twins ppt von travel_affair

Digital twins ppt
travel_affair•59.3K views
Robotic Process Automation (RPA) von MufaddalNullwala1

Robotic Process Automation (RPA)
Mufaddal Nullwala•79.2K views
A Product Requirements Document (PRD) Sample von RickWingenderMBAPMPA

A Product Requirements Document (PRD) Sample
Rick Wingender, MBA, MS, PMP, CSPO•107.4K views
Final Year Project von mbilalk315

Final Year Project
Muhammad Khan•258.8K views
Web scraping von SelectoCompany

Web scraping
Selecto•20.3K views
Business intelligence von rla1022

Business intelligence
Randy L. Archambault•64.9K views
The Rise Of Low-Code And No-Code Platforms And Its Future | SynergyTop von
Stevejohn70

The Rise Of Low-Code And No-Code Platforms And Its Future | SynergyTop
SynergyTop Inc•1K views
Artificial Intelligence Application in Oil and Gas von sparkcognition

Artificial Intelligence Application in Oil and Gas
SparkCognition•6.9K views
Big Data and Advanced Analytics von McK_CMSOForum

Big Data and Advanced Analytics
McKinsey on Marketing & Sales•261.9K views
An example of a successful proof of concept von ETLSolutions

An example of a successful proof of concept
ETLSolutions•146.5K views
Building a Data Streaming Center of Excellence With Steve Gonzalez and Derek ...
von HostedbyConfluent

Building a Data Streaming Center of Excellence With Steve Gonzalez and Derek ...
HostedbyConfluent•841 views
Dashboard - definition, examples von matthieua

Dashboard - definition, examples
Matthieu Aubry•44.8K views
AIOps: Your DevOps Co-Pilot von DevOpsWebinars

AIOps: Your DevOps Co-Pilot
DevOps.com•1.2K views
State of the Cloud 2023—The AI era von BessemerVP

State of the Cloud 2023—The AI era
Bessemer Venture Partners•77K views
Google App Engine ppt von OECLIBOdishaElectron

Google App Engine ppt
OECLIB Odisha Electronics Control Library•18.4K views
Google App Engine von softwarepark

Google App Engine
Software Park Thailand•12.5K views
Expert systems Artificial Intelligence von ittirehan

Expert systems Artificial Intelligence
itti rehan•12.2K views
Uber - Building Intelligent Applications, Experimental ML with Uber’s Data Sc...
von KarthikMurugesan2

Uber - Building Intelligent Applications, Experimental ML with Uber’s Data Sc...
Karthik Murugesan•459 views
IBM Blockchain Solutions Explained v0.6 von MattLucas3

IBM Blockchain Solutions Explained v0.6
Matt Lucas•1.4K views
Marketing Analytics with Business Intelligence von businessintelligence

Marketing Analytics with Business Intelligence
Dhiren Gala•3.4K views


MEHR VON JYOTHISHMATHI INSTITUTE OF TECHNOLOGY AND SCIENCE KARIMNAGAR

JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons von
jegadeesanram5

JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons

Jyothishmathi Institute of Technology and Science Karimnagar
568 views•96 Folien
GUI Programming with Swing – Introduction, limitations of AWT, MVC architecture,
components, containers. Understanding Layout Managers, Flow Layout, Border
Layout, Grid Layout, Card Layout, Grid Bag Layout. Event Handling- The
Delegation event model- Events, Event sources, Event Listeners, Event classes,
Handling mouse and keyboard events, Adapter classes, Inner classes, Anonymous
Inner classes. A Simple Swing Application, Applets – Applets and HTML, Security
Issues, Applets and Applications, passing parameters to applets. Creating a
Swing Applet, Painting in Swing, A Paint example, Exploring Swing Controls-
JLabel and Image Icon, JText Field, The Swing Buttons-JButton, JToggle Button,
JCheck Box, JRadio Button, JTabbed Pane, JScroll Pane, JList, JCombo Box, Swing
Menus, Dialogs.

JAVA PROGRAMMING - The Collections Framework von jegadeesanram5

JAVA PROGRAMMING - The Collections Framework

Jyothishmathi Institute of Technology and Science Karimnagar
187 views•27 Folien
The Collections Framework (java.util)- Collections overview, Collection
Interfaces, The Collection classes- Array List, Linked List, Hash Set, Tree Set,
Priority Queue, Array Deque. Accessing a Collection via an Iterator, Using an
Iterator, The For-Each alternative, Map Interfaces and Classes, Comparators,
Collection algorithms, Arrays, The Legacy Classes and Interfaces- Dictionary,
Hashtable ,Properties, Stack, Vector More Utility classes, String Tokenizer, Bit
Set, Date, Calendar, Random, Formatter, Scanner

JAVA PROGRAMMING- Exception handling - Multithreading von jegadeesanram5

JAVA PROGRAMMING- Exception handling - Multithreading

Jyothishmathi Institute of Technology and Science Karimnagar
390 views•54 Folien
The document discusses Java programming concepts of exception handling and
multithreading. It covers exception types, try/catch/throw/throws/finally
clauses, creating custom exceptions, and the Java thread model for creating and
synchronizing threads. The document also provides example code and discusses
checked and unchecked exceptions, nested try blocks, and inter-thread
communication in Java.

JAVA PROGRAMMING – Packages - Stream based I/O von jegadeesanram5

JAVA PROGRAMMING – Packages - Stream based I/O

Jyothishmathi Institute of Technology and Science Karimnagar
43 views•14 Folien
This document provides an overview of packages, interfaces, and stream-based I/O
in Java. It defines a package, discusses access protection and importing
packages. Interfaces are introduced as a way to achieve multiple inheritance in
Java. Key characteristics of interfaces like not allowing implementation and
only containing abstract methods are described. The relationship between
interfaces and abstract classes is compared. Common interfaces like Comparable
are explained. Finally, stream-based I/O concepts like character streams,
reading/writing files and serialization are listed as topics to be covered.
Universities questions on these topics are also provided.

Java programming -Object-Oriented Thinking- Inheritance von jegadeesanram5

Java programming -Object-Oriented Thinking- Inheritance

Jyothishmathi Institute of Technology and Science Karimnagar
385 views•70 Folien
Object-Oriented Thinking- A way of viewing world – Agents and Communities,
messages and methods, Responsibilities, Classes and Instances, Class
Hierarchies- Inheritance, Method binding, Overriding and Exceptions, Summary of
Object-Oriented concepts. Java buzzwords, An Overview of Java, Data types,
Variables and Arrays, operators, expressions, control statements, Introducing
classes, Methods and Classes, String handling. Inheritance– Inheritance concept,
Inheritance basics, Member access, Constructors, Creating Multilevel hierarchy,
super uses, using final with inheritance, Polymorphism-ad hoc polymorphism, pure
polymorphism, method overriding, abstract classes, Object class, forms of
inheritance specialization, specification, construction, extension, limitation,
combination, benefits of inheritance, costs of inheritance

WEB TECHNOLOGIES JavaScript von jegadeesanram5

WEB TECHNOLOGIES JavaScript

Jyothishmathi Institute of Technology and Science Karimnagar
289 views•40 Folien
JavaScript Introduction to JavaScript: JavaScript language - declaring
variables, scope of variables, functions, event handlers (onclick, onsubmit
etc.), Document Object Model, Form validation. Simple AJAX application.

WEB TECHNOLOGIES JSP von jegadeesanram5

WEB TECHNOLOGIES JSP

Jyothishmathi Institute of Technology and Science Karimnagar
260 views•23 Folien
JSP The Anatomy of a JSP Page, JSP Processing, Declarations, Directives,
Expressions, Code Snippets, implicit objects, Using Beans in JSP Pages, Using
Cookies and session for session tracking, connecting to database in JSP.

WEB TECHNOLOGIES Servlet von jegadeesanram5

WEB TECHNOLOGIES Servlet

Jyothishmathi Institute of Technology and Science Karimnagar
325 views•29 Folien
Servlet Common Gateway Interface (CGI), Lifecycle of a Servlet, deploying a
servlet, The Servlet API, Reading Servlet parameters, Reading Initialization
parameters, Handling Http Request & Responses, Using Cookies and Sessions,
connecting to a database using JDBC.

WEB TECHNOLOGIES XML von jegadeesanram5

WEB TECHNOLOGIES XML

Jyothishmathi Institute of Technology and Science Karimnagar
132 views•28 Folien
Introduction to XML, Defining XML tags, their attributes and values, Document
Type Definition, XML Schemas, Document Object Model, XHTML Parsing XML Data -
DOM and SAX Parsers in java.

WEB TECHNOLOGIES- PHP Programming von jegadeesanram5

WEB TECHNOLOGIES- PHP Programming

Jyothishmathi Institute of Technology and Science Karimnagar
207 views•22 Folien
Introduction to PHP: Declaring variables, data types, arrays, strings,
operators, expressions, control structures, functions, Reading data from web
form controls like text boxes, radio buttons, lists etc., Handling File Uploads,
Connecting to database (MySQL as reference), executing simple queries, handling
results, Handling sessions and cookies File Handling in PHP: File operations
like opening, closing, reading, writing, appending, deleting etc. on text and
binary files, listing directories

Compiler Design- Machine Independent Optimizations von jegadeesanram5

Compiler Design- Machine Independent Optimizations

Jyothishmathi Institute of Technology and Science Karimnagar
1.1K views•20 Folien
Machine-Independent Optimizations: The Principal Sources of Optimization,
Introduction to Data-Flow Analysis, Foundations of Data-Flow Analysis, Constant
Propagation, Partial Redundancy Elimination, Loops in Flow Graphs

COMPILER DESIGN Run-Time Environments von jegadeesanram5

COMPILER DESIGN Run-Time Environments

Jyothishmathi Institute of Technology and Science Karimnagar
1.7K views•64 Folien
Run-Time Environments: Storage organization, Stack Allocation of Space, Access
to Nonlocal Data on the Stack, Heap Management, Introduction to Garbage
Collection, Introduction to Trace-Based Collection. Code Generation: Issues in
the Design of a Code Generator, The Target Language, Addresses in the Target
Code, Basic Blocks and Flow Graphs, Optimization of Basic Blocks, A Simple Code
Generator, Peephole Optimization, Register Allocation and Assignment, Dynamic
Programming Code-Generation

COMPILER DESIGN- Syntax Directed Translation von jegadeesanram5

COMPILER DESIGN- Syntax Directed Translation

Jyothishmathi Institute of Technology and Science Karimnagar
974 views•61 Folien
Syntax-Directed Translation: Syntax-Directed Definitions, Evaluation Orders for
SDD's, Applications of Syntax-Directed Translation, Syntax-Directed Translation
Schemes, and Implementing L-Attributed SDD's. Intermediate-Code Generation:
Variants of Syntax Trees, Three-Address Code, Types and Declarations, Type
Checking, Control Flow, Back patching, Switch-Statements

COMPILER DESIGN- Syntax Analysis von jegadeesanram5

COMPILER DESIGN- Syntax Analysis

Jyothishmathi Institute of Technology and Science Karimnagar
117 views•21 Folien
This document provides an overview of syntax analysis in compiler design. It
discusses context-free grammars, top-down parsing including recursive descent
and LL(1) parsing, and bottom-up parsing including LR parsing. It describes the
key concepts of context-free grammars, ambiguous and unambiguous grammars. It
explains top-down parsing as constructing a parse tree from the root node down
and bottom-up parsing as building the tree from the leaf nodes up. It discusses
the closure and goto operations used in LR parsing and describes the differences
between LR(0), SLR, CLR, and LALR parsing techniques.

COMPILER DESIGN- Introduction & Lexical Analysis: von jegadeesanram5

COMPILER DESIGN- Introduction & Lexical Analysis:

Jyothishmathi Institute of Technology and Science Karimnagar
192 views•15 Folien
Introduction: Language Processors, the structure of a compiler, the science of
building a compiler, programming language basics. Lexical Analysis: The Role of
the Lexical Analyzer, Input Buffering, Recognition of Tokens, The
Lexical-Analyzer Generator Lex, Finite Automata, From Regular Expressions to
Automata, Design of a Lexical-Analyzer Generator, Optimization of DFA-Based
Pattern Matchers

CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security von jegadeesanram5

CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security

Jyothishmathi Institute of Technology and Science Karimnagar
654 views•65 Folien
The Secure Inter-branch Payment Transactions case study describes the current
electronic payment system used by General Bank of India to transfer funds
between branches, which utilizes a central server but lacks strong security.
Improvements are needed to add encryption, digital signatures for
non-repudiation, and a public key infrastructure to securely distribute keys.
Cryptographic toolkits and smart cards could also be incorporated into the
system to enhance security of financial transactions transmitted over the
private network.

CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security von jegadeesanram5

CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security

Jyothishmathi Institute of Technology and Science Karimnagar
354 views•66 Folien
Transport-level Security: Web security considerations, Secure Socket Layer and
Transport Layer Security, HTTPS, Secure Shell (SSH) Wireless Network Security:
Wireless Security, Mobile Device Security, IEEE 802.11 Wireless LAN, IEEE
802.11i Wireless LAN Security

CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions von jegadeesanram5

CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions

Jyothishmathi Institute of Technology and Science Karimnagar
110 views•28 Folien
Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm
(SHA-512), Message authentication codes: Authentication requirements, HMAC,
CMAC, Digital signatures, Elgamal Digital Signature Scheme. Key Management and
Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric
Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service,
Public – Key Infrastructure

CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers von jegadeesanram5

CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers

Jyothishmathi Institute of Technology and Science Karimnagar
121 views•25 Folien
Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA,
Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers: Principles
of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman
Key Exchange, Knapsack Algorithm

CRYPTOGRAPHY & NETWORK SECURITY von jegadeesanram5

CRYPTOGRAPHY & NETWORK SECURITY

Jyothishmathi Institute of Technology and Science Karimnagar
1.2K views•26 Folien
This document provides an overview of a university course on Cryptography and
Network Security. It begins with the course syllabus, which outlines topics like
security concepts, cryptography concepts and techniques, and types of security
attacks. It then discusses key security concepts such as security services,
security mechanisms, security attacks, and models for network and access
security. It provides examples of security services like authentication, access
control, and data confidentiality. It also describes security mechanisms and
different classes of security attacks. The document concludes by listing
reference books, online videos, related courses, tutorials, and sample multiple
choice and problems related to cryptography and network security.


MEHR VON JYOTHISHMATHI INSTITUTE OF TECHNOLOGY AND SCIENCE KARIMNAGAR (20)

JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons von
jegadeesanram5

JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
Jyothishmathi Institute of Technology and Science Karimnagar•568 views
JAVA PROGRAMMING - The Collections Framework von jegadeesanram5

JAVA PROGRAMMING - The Collections Framework
Jyothishmathi Institute of Technology and Science Karimnagar•187 views
JAVA PROGRAMMING- Exception handling - Multithreading von jegadeesanram5

JAVA PROGRAMMING- Exception handling - Multithreading
Jyothishmathi Institute of Technology and Science Karimnagar•390 views
JAVA PROGRAMMING – Packages - Stream based I/O von jegadeesanram5

JAVA PROGRAMMING – Packages - Stream based I/O
Jyothishmathi Institute of Technology and Science Karimnagar•43 views
Java programming -Object-Oriented Thinking- Inheritance von jegadeesanram5

Java programming -Object-Oriented Thinking- Inheritance
Jyothishmathi Institute of Technology and Science Karimnagar•385 views
WEB TECHNOLOGIES JavaScript von jegadeesanram5

WEB TECHNOLOGIES JavaScript
Jyothishmathi Institute of Technology and Science Karimnagar•289 views
WEB TECHNOLOGIES JSP von jegadeesanram5

WEB TECHNOLOGIES JSP
Jyothishmathi Institute of Technology and Science Karimnagar•260 views
WEB TECHNOLOGIES Servlet von jegadeesanram5

WEB TECHNOLOGIES Servlet
Jyothishmathi Institute of Technology and Science Karimnagar•325 views
WEB TECHNOLOGIES XML von jegadeesanram5

WEB TECHNOLOGIES XML
Jyothishmathi Institute of Technology and Science Karimnagar•132 views
WEB TECHNOLOGIES- PHP Programming von jegadeesanram5

WEB TECHNOLOGIES- PHP Programming
Jyothishmathi Institute of Technology and Science Karimnagar•207 views
Compiler Design- Machine Independent Optimizations von jegadeesanram5

Compiler Design- Machine Independent Optimizations
Jyothishmathi Institute of Technology and Science Karimnagar•1.1K views
COMPILER DESIGN Run-Time Environments von jegadeesanram5

COMPILER DESIGN Run-Time Environments
Jyothishmathi Institute of Technology and Science Karimnagar•1.7K views
COMPILER DESIGN- Syntax Directed Translation von jegadeesanram5

COMPILER DESIGN- Syntax Directed Translation
Jyothishmathi Institute of Technology and Science Karimnagar•974 views
COMPILER DESIGN- Syntax Analysis von jegadeesanram5

COMPILER DESIGN- Syntax Analysis
Jyothishmathi Institute of Technology and Science Karimnagar•117 views
COMPILER DESIGN- Introduction & Lexical Analysis: von jegadeesanram5

COMPILER DESIGN- Introduction & Lexical Analysis:
Jyothishmathi Institute of Technology and Science Karimnagar•192 views
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security von jegadeesanram5

CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Jyothishmathi Institute of Technology and Science Karimnagar•654 views
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security von jegadeesanram5

CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Jyothishmathi Institute of Technology and Science Karimnagar•354 views
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions von jegadeesanram5

CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
Jyothishmathi Institute of Technology and Science Karimnagar•110 views
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers von jegadeesanram5

CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
Jyothishmathi Institute of Technology and Science Karimnagar•121 views
CRYPTOGRAPHY & NETWORK SECURITY von jegadeesanram5

CRYPTOGRAPHY & NETWORK SECURITY
Jyothishmathi Institute of Technology and Science Karimnagar•1.2K views



KÜRZLICH HOCHGELADEN

GraphRAG for Life Science to increase LLM accuracy von TomazBratanic

GraphRAG for Life Science to increase LLM accuracy

Tomaz Bratanic
26 views•15 Folien
GraphRAG for life science domain, where you retriever information from
biomedical knowledge graphs using LLMs to increase the accuracy and performance
of generated answers

"Choosing proper type of scaling", Olena Syrota von fwdays

"Choosing proper type of scaling", Olena Syrota

Fwdays
13 views•27 Folien
Imagine an IoT processing system that is already quite mature and
production-ready and for which client coverage is growing and scaling and
performance aspects are life and death questions. The system has Redis, MongoDB,
and stream processing based on ksqldb. In this talk, firstly, we will analyze
scaling approaches and then select the proper ones for our system.

June Patch Tuesday von GoIvanti

June Patch Tuesday

Ivanti
58 views•35 Folien
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and
brings you the intelligence and guidance needed to prioritize where to focus
your attention first. Catch early analysis on our Ivanti blog, then join
industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do
a deep dive into each of the bulletins and give guidance on the risks associated
with the newly-identified vulnerabilities.

Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe von
Syncsort

Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe

Precisely
17 views•12 Folien
Inconsistent user experience and siloed data, high costs, and changing customer
expectations – Citizens Bank was experiencing these challenges while it was
attempting to deliver a superior digital banking experience for its clients. Its
core banking applications run on the mainframe and Citizens was using legacy
utilities to get the critical mainframe data to feed customer-facing channels,
like call centers, web, and mobile. Ultimately, this led to higher operating
costs (MIPS), delayed response times, and longer time to market. Ever-changing
customer expectations demand more modern digital experiences, and the bank
needed to find a solution that could provide real-time data to its customer
channels with low latency and operating costs. Join this session to learn how
Citizens is leveraging Precisely to replicate mainframe data to its customer
channels and deliver on their “modern digital bank” experiences.

“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
von embeddedvision

“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...

Edge AI and Vision Alliance
15 views•25 Folien
For the full video of this presentation, please visit:
https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the
“Temporal Event Neural Networks: A More Efficient Alternative to the
Transformer” tutorial at the May 2024 Embedded Vision Summit. The expansion of
AI services necessitates enhanced computational capabilities on edge devices.
Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a
novel and highly efficient state-space network. TENNs demonstrate exceptional
proficiency in handling multi-dimensional streaming data, facilitating
advancements in object detection, action recognition, speech enhancement and
language model/sequence generation. Through the utilization of polynomial-based
continuous convolutions, TENNs streamline models, expedite training processes
and significantly diminish memory requirements, achieving notable reductions of
up to 50x in parameters and 5,000x in energy consumption compared to prevailing
methodologies like transformers. Integration with BrainChip’s Akida neuromorphic
hardware IP further enhances TENNs’ capabilities, enabling the realization of
highly capable, portable and passively cooled edge devices. This presentation
delves into the technical innovations underlying TENNs, presents real-world
benchmarks, and elucidates how this cutting-edge approach is positioned to
revolutionize edge AI across diverse applications.

zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
von AlexPruden

zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...

Alex Pruden
15 views•32 Folien
Folding is a recent technique for building efficient recursive SNARKs. Several
elegant folding protocols have been proposed, such as Nova, Supernova,
Hypernova, Protostar, and others. However, all of them rely on an additively
homomorphic commitment scheme based on discrete log, and are therefore not
post-quantum secure. In this work we present LatticeFold, the first
lattice-based folding protocol based on the Module SIS problem. This folding
protocol naturally leads to an efficient recursive lattice-based SNARK and an
efficient PCD scheme. LatticeFold supports folding low-degree relations, such as
R1CS, as well as high-degree relations, such as CCS. The key challenge is to
construct a secure folding protocol that works with the Ajtai commitment scheme.
The difficulty, is ensuring that extracted witnesses are low norm through many
rounds of folding. We present a novel technique using the sumcheck protocol to
ensure that extracted witnesses are always low norm no matter how many rounds of
folding are used. Our evaluation of the final proof system suggests that it is
as performant as Hypernova, while providing post-quantum security. Paper Link:
https://eprint.iacr.org/2024/257

WeTestAthens: Postman's AI & Automation Techniques von GetPostman

WeTestAthens: Postman's AI & Automation Techniques

Postman
88 views•70 Folien
Postman's AI and Automation Techniques

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph von neo4j

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph

Neo4j
20 views•15 Folien
Tomaz Bratanic Graph ML and GenAI Expert - Neo4j

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU von panagenda

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU

panagenda
74 views•48 Folien
Webinar Recording:
https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der
HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde
haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu
kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung
funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie
sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das
verstehen wir und wir möchten Ihnen dabei helfen! Wir erklären Ihnen, wie Sie
häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr
Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte
Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch
einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein
Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird.
Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir
Ihnen das neue Lizenzmodell. Nehmen Sie an diesem Webinar teil, bei dem
HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt
näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick
zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte
Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten. Diese
Themen werden behandelt - Reduzierung der Lizenzkosten durch Auffinden und
Beheben von Fehlkonfigurationen und überflüssigen Konten - Wie funktionieren
CCB- und CCX-Lizenzen wirklich? - Verstehen des DLAU-Tools und wie man es am
besten nutzt - Tipps für häufige Problembereiche, wie z. B. Team-Postfächer,
Funktions-/Testbenutzer usw. - Praxisbeispiele und Best Practices zum sofortigen
Umsetzen

Building Production Ready Search Pipelines with Spark and Milvus von
chloewilliams62

Building Production Ready Search Pipelines with Spark and Milvus

Zilliz
34 views•28 Folien
Spark is the widely used ETL tool for processing, indexing and ingesting data to
serving stack for search. Milvus is the production-ready open-source vector
database. In this talk we will show how to use Spark to process unstructured
data to extract vector representations, and push the vectors to Milvus vector
database for search serving.

GNSS spoofing via SDR (Criptored Talks 2024) von JavierJunqueraSnchez

GNSS spoofing via SDR (Criptored Talks 2024)

Javier Junquera
57 views•32 Folien
In the realm of cybersecurity, offensive security practices act as a critical
shield. By simulating real-world attacks in a controlled environment, these
techniques expose vulnerabilities before malicious actors can exploit them. This
proactive approach allows manufacturers to identify and fix weaknesses,
significantly enhancing system security. This presentation delves into the
development of a system designed to mimic Galileo's Open Service signal using
software-defined radio (SDR) technology. We'll begin with a foundational
overview of both Global Navigation Satellite Systems (GNSS) and the intricacies
of digital signal processing. The presentation culminates in a live
demonstration. We'll showcase the manipulation of Galileo's Open Service pilot
signal, simulating an attack on various software and hardware systems. This
practical demonstration serves to highlight the potential consequences of
unaddressed vulnerabilities, emphasizing the importance of offensive security
practices in safeguarding critical infrastructure.

Serial Arm Control in Real Time Presentation von tolgahangng

Serial Arm Control in Real Time Presentation

tolgahangng
23 views•19 Folien
Serial Arm Control in Real Time

5th LF Energy Power Grid Model Meet-up Slides von DanBrown980551

5th LF Energy Power Grid Model Meet-up Slides

DanBrown980551
49 views•94 Folien
5th Power Grid Model Meet-up It is with great pleasure that we extend to you an
invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024.
This event will adopt a hybrid format, allowing participants to join us either
through an online Mircosoft Teams session or in person at TU/e located at Den
Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven
University of Technology (TU/e), a research university specializing in
engineering science & technology. Power Grid Model The global energy transition
is placing new and unprecedented demands on Distribution System Operators
(DSOs). Alongside upgrades to grid capacity, processes such as digitization,
capacity optimization, and congestion management are becoming vital for
delivering reliable services. Power Grid Model is an open source project from
Linux Foundation Energy and provides a calculation engine that is increasingly
essential for DSOs. It offers a standards-based foundation enabling real-time
power systems analysis, simulations of electrical power grids, and sophisticated
what-if analysis. In addition, it enables in-depth studies and analysis of the
electrical power grid’s behavior and performance. This comprehensive model
incorporates essential factors such as power generation capacity, electrical
losses, voltage levels, power flows, and system stability. Power Grid Model is
currently being applied in a wide variety of use cases, including grid planning,
expansion, reliability, and congestion studies. It can also help in analyzing
the impact of renewable energy integration, assessing the effects of
disturbances or faults, and developing strategies for grid control and
optimization. What to expect For the upcoming meetup we are organizing, we have
an exciting lineup of activities planned: -Insightful presentations covering two
practical applications of the Power Grid Model. -An update on the latest
advancements in Power Grid -Model technology during the first and second
quarters of 2024. -An interactive brainstorming session to discuss and propose
new feature requests. -An opportunity to connect with fellow Power Grid Model
enthusiasts and users.

Driving Business Innovation: Latest Generative AI Advancements & Success Story
von SafeSoftware

Driving Business Innovation: Latest Generative AI Advancements & Success Story

Safe Software
228 views•62 Folien
Are you ready to revolutionize how you handle data? Join us for a webinar where
we’ll bring you up to speed with the latest advancements in Generative AI
technology and discover how leveraging FME with tools from giants like Google
Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through: Guest Speaker Segment with Hannah
Barrington: Dive into the world of dynamic real estate marketing with Hannah,
the Marketing Manager at Workspace Group. Hear firsthand how their team
generates engaging descriptions for thousands of office units by integrating
diverse data sources—from PDF floorplans to web pages—using FME transformers,
like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show
you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama
within FME to input data, create custom models, and enhance security protocols.
This segment will include demos to illustrate the full capabilities of FME in
AI-driven processes. Custom AI Models: Discover how to leverage FME to build
personalized AI models using your data. Whether it’s populating a model with
local data for added security or integrating public AI tools, find out how FME
facilitates a versatile and secure approach to AI. We’ll wrap up with a live Q&A
session where you can engage with our experts on your specific use cases, and
learn more about optimizing your data workflows with AI. This webinar is ideal
for professionals seeking to harness the power of AI within their data
management systems while ensuring high levels of customization and security.
Whether you're a novice or an expert, gain actionable insights and strategies to
elevate your data processes. Join us to see how FME and AI can revolutionize how
you work with data!

FREE A4 Cyber Security Awareness Posters-Social Engineering part 3 von DataHops

FREE A4 Cyber Security Awareness Posters-Social Engineering part 3

Data Hops
13 views•12 Folien
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and
security Training Posters . Promote security awareness in the home or workplace.
Lock them Out From training providers datahops.com

Energy Efficient Video Encoding for Cloud and Edge Computing Instances von
christian.timmerer

Energy Efficient Video Encoding for Cloud and Edge Computing Instances

Alpen-Adria-Universität
31 views•26 Folien
Energy Efficient Video Encoding for Cloud and Edge Computing Instances

Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians von neo4j

Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians

Neo4j
22 views•44 Folien
Dmitrii Kamaev, PhD Senior Product Owner - QIAGEN

Columbus Data & Analytics Wednesdays - June 2024 von JasonPacker

Columbus Data & Analytics Wednesdays - June 2024

Jason Packer
65 views•31 Folien
Columbus Data & Analytics Wednesdays, June 2024 with Maria Copot 20

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
von DianaGray10

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors

DianaGray10
42 views•13 Folien
Join us to learn how UiPath Apps can directly and easily interact with prebuilt
connectors via Integration Service--including Salesforce, ServiceNow, Open
GenAI, and more. The best part is you can achieve this without building a custom
workflow! Say goodbye to the hassle of using separate automations to call APIs.
By seamlessly integrating within App Studio, you can now easily streamline your
workflow, while gaining direct access to our Connector Catalog of popular
applications. We’ll discuss and demo the benefits of UiPath Apps and connectors
including: Creating a compelling user experience for any software, without the
limitations of APIs. Accelerating the app creation process, saving time and
effort Enjoying high-performance CRUD (create, read, update, delete) operations,
for seamless data management. Speakers: Russell Alfeche, Technology Leader, RPA
at qBotic and UiPath MVP Charlie Greenberg, host

Presentation of the OECD Artificial Intelligence Review of Germany von
innovationoecd

Presentation of the OECD Artificial Intelligence Review of Germany

innovationoecd
2.4K views•24 Folien
Consult the full report at
https://www.oecd.org/digital/oecd-artificial-intelligence-review-of-germany-609808d6-en.htm


KÜRZLICH HOCHGELADEN (20)

GraphRAG for Life Science to increase LLM accuracy von TomazBratanic

GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic•26 views
"Choosing proper type of scaling", Olena Syrota von fwdays

"Choosing proper type of scaling", Olena Syrota
Fwdays•13 views
June Patch Tuesday von GoIvanti

June Patch Tuesday
Ivanti•58 views
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe von
Syncsort

Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely•17 views
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
von embeddedvision

“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance•15 views
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
von AlexPruden

zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden•15 views
WeTestAthens: Postman's AI & Automation Techniques von GetPostman

WeTestAthens: Postman's AI & Automation Techniques
Postman•88 views
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph von neo4j

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j•20 views
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU von panagenda

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda•74 views
Building Production Ready Search Pipelines with Spark and Milvus von
chloewilliams62

Building Production Ready Search Pipelines with Spark and Milvus
Zilliz •34 views
GNSS spoofing via SDR (Criptored Talks 2024) von JavierJunqueraSnchez

GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera•57 views
Serial Arm Control in Real Time Presentation von tolgahangng

Serial Arm Control in Real Time Presentation
tolgahangng•23 views
5th LF Energy Power Grid Model Meet-up Slides von DanBrown980551

5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551•49 views
Driving Business Innovation: Latest Generative AI Advancements & Success Story
von SafeSoftware

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software•228 views
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3 von DataHops

FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops•13 views
Energy Efficient Video Encoding for Cloud and Edge Computing Instances von
christian.timmerer

Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität•31 views
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians von neo4j

Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j•22 views
Columbus Data & Analytics Wednesdays - June 2024 von JasonPacker

Columbus Data & Analytics Wednesdays - June 2024
Jason Packer•65 views
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
von DianaGray10

Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10•42 views
Presentation of the OECD Artificial Intelligence Review of Germany von
innovationoecd

Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd•2.4K views


GERELATEERDE BOEKEN

Kostenlos mit einem 30-tägigen Test von EverandAlle anzeigen
BoekConcise Guide to DWDMalasdair gilchrist

5 / 5

BoekConcise Guide to OTN optical transport networksalasdair gilchrist

4 / 5

Boek4G: LTE/LTE-Advanced for Mobile BroadbandErik Dahlman

4.5 / 5

BoekSoftware-Defined Networks: A Systems ApproachLarry Peterson

5 / 5

BoekMobile Network Optimization: A Guide for 2G and 3G Mobile Network
OptimizationEmmanuel Usuah

3.5 / 5

BoekNetwork Engineering - The Essential HandbookW.J Bickerstaffe

0 / 5

BoekQOS-Enabled Networks: Tools and FoundationsMiguel Barreiros

0 / 5

BoekLTE-Advanced: A Practical Systems Approach to Understanding 3GPP LTE
Releases 10 and 11 Radio Access TechnologiesSassan Ahmadi

4 / 5

BoekWireless Networking CompletePei Zheng

5 / 5

BoekLTE ServicesJean-Gabriel Rémy

1 / 5

BoekMobile Networks ArchitectureAndré Perez

0 / 5

BoekOptically Amplified WDM Networks-

0 / 5

BoekSAE and the Evolved Packet Core: Driving the Mobile Broadband
RevolutionMagnus Olsson

3 / 5

BoekSD-WAN Demystified: Empowering Your Network for SuccessMaula Issa

0 / 5

BoekKey technologies for NG-PON2 systemRawa Muayad

0 / 5

BoekHACKING WITH KALI LINUX WIRELESS PENETRATIONEDDIE ARNOLD

0 / 5

BoekQoS: Myths and HypeJohn G. Waclawsky

0 / 5

BoekLocal Area Networks: An Introduction to the TechnologyJohn McNamara

0 / 5

BoekNetwork Mergers and Migrations: Junos Design and ImplementationGonzalo Gómez
Herrero

0 / 5

BoekEnergy Management in Wireless Sensor NetworksYoucef Touati

4 / 5

BoekBuilding Wireless Sensor Networks: Application to Routing and Data
Diffusion-

0 / 5

BoekSelf-Organizing Networks: Self-Planning, Self-Optimization and Self-Healing
for GSM, UMTS and LTE-

0 / 5

BoekRouting in Wireless Mesh NetworksRaghav Kumar

0 / 5

BoekMobile WiMAX: A Systems Approach to Understanding IEEE 802.16m Radio Access
TechnologySassan Ahmadi

0 / 5

BoekNetworks-on-Chip: From Implementations to Programming ParadigmsSheng Ma

0 / 5

BoekThird Generation CDMA Systems for Enhanced Data ServicesGiridhar D. Mandyam

5 / 5

BoekRadio Resource Management in Multi-Tier Cellular Wireless NetworksEkram
Hossain

0 / 5

BoekReconfigurable Radio Systems: Network Architectures and StandardsMaria
Stella Iacobucci

0 / 5

BoekModeling and Dimensioning of Mobile Wireless Networks: From GSM to LTEMaciej
Stasiak

0 / 5

BoekLTE, LTE-Advanced and WiMAX: Towards IMT-Advanced NetworksAbd-Elhamid M.
Taha

0 / 5

BoekPeering Carrier Ethernet NetworksSachidananda Kangovi

0 / 5

BoekComputer Networking Bootcamp: Routing, Switching And TroubleshootingRob
Botwright

0 / 5

BoekOptical Network Design and PlanningJane M. Simmons

0 / 5

BoekPlanning, Negotiating, Implementing, and Managing Wide Area Networks: A
Practical GuideLuiz Augusto de Carvalho

0 / 5

BoekIntroduction to Internet & Web Technology: Internet & Web TechnologyDr.
Yashpal singh

0 / 5

BoekAdvances in Analog and RF IC Design for Wireless Communication Systems-

1 / 5

Boek6G Wireless Communications and Mobile NetworkingXianzhong Xie

0 / 5

BoekNode-to-Node Approaching in Wireless Mesh ConnectivityMadhusudan Singh

5 / 5


GERELATEERDE LUISTERBOEKEN

Kostenlos mit einem 30-tägigen Test von EverandAlle anzeigen
LuisterboekCOMPTIA NETWORK+: Tips and Tricks to Learn and Study about The
CompTIA Network+ Certification from A-ZWalker Schmidt

0 / 5

LuisterboekHam Radio: from Beginner to Badass (Ham Radio, ARRL, ARRL exam, Ham
Radio Licence)Greg Molloy

4 / 5

LuisterboekComputer Networking Beginners GuideErick Stack

4 / 5

LuisterboekTCP/IP: Network+ Protocols And Campus LAN Switching FundamentalsRob
Botwright

0 / 5

LuisterboekCracking System Design: A Comprehensive Guide to Building Scalable
and Reliable SystemsEt Tu Code

0 / 5

LuisterboekHam RadioCraig Barron

4.5 / 5

LuisterboekNetwork Engineer's Bible: Mastering 100 Protocols For Communication,
Management, And SecurityRob Botwright

0 / 5

LuisterboekNeural Networks for Beginners: A Journey Through the World of
Artificial IntelligenceBrandon Scott

0 / 5

LuisterboekWireless Security Masterclass: Penetration Testing For Network
Defenders And Ethical HackersRob Botwright

0 / 5

LuisterboekCloud Security & Forensics Handbook: Dive Deep Into Azure, AWS, And
GCPRob Botwright

0 / 5

LuisterboekNetworking in Distributed Systems: A comprehensive guide to Network
Communication in Distributed SystemsEt Tu Code

0 / 5

LuisterboekApplication Design: Key Principles For Data-Intensive App SystemsRob
Botwright

0 / 5

LuisterboekInternet of ThingsIntrobooks Team

4.5 / 5

LuisterboekNeural Network Programming: How To Create Modern AI Systems With
Python, Tensorflow, And KerasRob Botwright

0 / 5

LuisterboekComputer Networking: The Complete Beginner's Guide to Learning the
Basics of Network Security, Computer Architecture, Wireless Technology and
Communications Systems (Including Cisco, CCENT, and CCNA)Benjamin Walker

0 / 5

LuisterboekEdge Computing 101: Novice To Pro: Expert Techniques And Practical
ApplicationsRob Botwright

0 / 5

LuisterboekHidden Web: Decoding The Deep Web, Dark Web And DarknetRob Botwright

1 / 5

LuisterboekHow to Set Up a Home Network with Windows 7: Your Step by Step Guide
to Setting Up a Home Network with Windows 7HowExpert

0 / 5

LuisterboekPower Distribution Unit (PDU) Secrets: What Everyone Who Works in a
Data Center Needs to Know!Dr. Jim Anderson

4 / 5

LuisterboekComputer Science: Learn about Algorithms, Cybersecurity, Databases,
Operating Systems, and Web DesignJonathan Rigdon

0 / 5

LuisterboekNetwork And Security Fundamentals For Ethical Hackers: Advanced
Network Protocols, Attacks, And DefensesRob Botwright

0 / 5

LuisterboekHow It Works: The Internet and Smartphones-

0 / 5

LuisterboekCypherium: Bridging CBDC, DeFI and Web3Nick Davis

0 / 5

LuisterboekAzure Networking: Command Line Mastery From Beginner To ArchitectRob
Botwright

0 / 5

LuisterboekHow Do Computers Talk to One Another?Melissa Abramovitz

0 / 5

LuisterboekMastering Neural Networks: A Comprehensive Guide to Understanding and
Implementing Neural NetworksEt Tu Code

0 / 5

LuisterboekFiber Optics: Networking And Data Transmission In ActionRob Botwright

0 / 5

LuisterboekKubernetes Unleashed: Navigating the World of Automated Deployment
and ScalingRebecca Park

0 / 5

LuisterboekComputer Networking Bootcamp: Routing, Switching And
TroubleshootingRob Botwright

0 / 5

LuisterboekTransformer Models: A Comprehensive Guide to Understanding and
Implementing Transformer Models in AIEt Tu Code

0 / 5

LuisterboekQuantum CommunicationIntrobooks Team

0 / 5

LuisterboekAssembly Language: The Ultimate Guide to Programming and Virtual
MachinesJonathan Rigdon

0 / 5

LuisterboekSmart Futures: Decoding the Language of the Internet of ThingsRanjot
Singh Chahal

0 / 5

LuisterboekOperating Systems: Concepts to Save Money, Time, and
FrustrationJonathan Rigdon

0 / 5

LuisterboekPower Electronics Diploma Interview Q&A: Career GuideSumitra Kumari

0 / 5

LuisterboekNMAP Network Scanning Series: Network Security, Monitoring, And
Scanning LibraryRob Botwright

0 / 5

LuisterboekEnterprise Strategy for Blockchain: Lessons in Disruption from
Fintech, Supply Chains, and Consumer Industries (Management on the Cutting
Edge)Ravi Sarathy

0 / 5

LuisterboekPerforming Arts BundleCraig Barron

0 / 5

LuisterboekWeb Development: Everything about Web Design and Operating Systems (2
in 1)Jonathan Rigdon

0 / 5

LuisterboekHow Software Defined Networking (SDN) Is Going to Change Your World
Forever: The Revolution in Network Design and How It Affects YouDr. Jim Anderson

5 / 5


MOBILE COMPUTING MOBILE ADHOC NETWORKS (MANETS)

 * 1. UNIT-V Mobile Ad hoc NETworks (MANETs) Dr R Jegadeesan Prof-CSE
   Jyothishmathi Institute of Technology and Science, karimnagar
 * 2. Mobile Ad hoc NETworks (MANETs) • Mobile Ad hoc NETworks (MANETs) are
   wireless networks which are characterized by dynamic topologies and no fixed
   infrastructure. • Each node in a MANET is a computer that may be required to
   act as both a host and a router and, as much, may be required to forward
   packets between nodes which cannot directly communicate with one another. •
   Each MANET node has much smaller frequency spectrum requirements that that
   for a node in a fixed infrastructure network. • A MANET is an autonomous
   collection of mobile users that communicate over relatively bandwidth
   constrained wireless links. • Since the nodes are mobile, the network
   topology may change rapidly and unpredictably over time. • The network is
   decentralized, where all network activity including discovering the topology
   and delivering messages must be executed by the nodes themselves, i.e.,
   routing functionality will be incorporated into mobile nodes.
 * 3. A mobile ad hoc network is a collection of wireless nodes that can
   dynamically be set up anywhere and anytime without using any pre- existing
   fixed network infrastructure.
 * 4. MANET- Characteristics • Dynamic network topology • Bandwidth constraints
   and variable link capacity • Energy constrained nodes • Multi-hop
   communications • Limited security • Autonomous terminal • Distributed
   operation • Light-weight terminals
 * 5. Need for Ad Hoc Networks • Setting up of fixed access points and backbone
   infrastructure is not always viable – Infrastructure may not be present in a
   disaster area or war zone – Infrastructure may not be practical for
   short-range radios; Bluetooth (range ~ 10m) • Ad hoc networks: – Do not need
   backbone infrastructure support – Are easy to deploy – Useful when
   infrastructure is absent, destroyed or impractical
 * 6. Properties of MANETs • MANET enables fast establishment of networks. When
   anew network is to be established, the only requirement is to provide a new
   set of nodeswith limited wireless communication range. A node has limited
   capability, that is, it can connect only to the nodes which are nearby. Hence
   it consumes limited power. • A MANET node has the ability to discover a
   neighboring node and service. Using a service discovery protocol, a node
   discovers the serviceof a nearby node and communicates to a remote node in
   theMANET. • MANET nodes have peer-to-peer connectivity among themselves. •
   MANET nodes have independent computational, switching (or routing), and
   communication capabilities. • The wireless connectivity range in MANETs
   includes only nearest node connectivity. • The failure of an intermediate
   node results in greater latency in communicating with the remote server.
 * 7. • Limited bandwidth available between two intermediate nodes becomes a
   constraint for the MANET. The node may have limited power and thus
   computations need to be energy-efficient. • There is no access-point
   requirement in MANET. Only selected access points are provided for connection
   to other networks or other MANETs. • MANET nodes can be the iPods, Palm
   handheld computers, Smartphones, PCs, smart labels, smart sensors, and
   automobile- embedded systems • MANET nodes can use different protocols, for
   example, IrDA, Bluetooth, ZigBee, 802.11, GSM, and TCP/IP.MANET node performs
   data caching, saving, and aggregation. • MANET mobile device nodes interact
   seamlessly when they move with the nearby wireless nodes, sensor nodes, and
   embedded devices in automobiles so that the seamless connectivity is
   maintained between the devices.
 * 8. MANET challenges • To design a good wireless ad hoc network, various
   challenges have to be taken into account: • Dynamic Topology: Nodes are free
   to move in an arbitrary fashion resulting in the topology changing
   arbitrarily. This characteristic demands dynamic configuration of the
   network. • Limited security: Wireless networks are vulnerable to attack.
   Mobile ad hoc networks are more vulnerable as by design any node should be
   able to join or leave the network at any time. This requires flexibility and
   higher openness. • Limited Bandwidth: Wireless networks in general are
   bandwidth limited. In an ad hoc network, it is all the more so because there
   is no backbone to handle or multiplex higher bandwidth • Routing: Routing in
   a mobile ad hoc network is complex. This depends on many factors, including
   finding the routing path, selection of routers, topology, protocol etc.
 * 9. Applications of MANETS • The set of applications for MANETs is diverse,
   ranging from small, static networks that are constrained by power sources, to
   large-scale, mobile, highly dynamic networks. • The design of network
   protocols for these networks is a complex issue. Regardless of the
   application, MANETs need efficient distributed algorithms to determine
   network organization, link scheduling, and routing. Some of the main
   application areas of MANET‘s are:
 * 10.
 * 11. Applications of MANETS • Military battlefield– soldiers, tanks, planes.
   Ad- hoc networking would allow the military to take advantage of commonplace
   network technology to maintain an information network between the soldiers,
   vehicles, and military information headquarters. • Sensor networks – to
   monitor environmental conditions over a large area • Local level – Ad hoc
   networks can autonomously link an instant and temporary multimedia network
   using notebook computers or palmtop computers to spread and share information
   among participants at e.g. conference or classroom. Another appropriate local
   level application might be in home networks where devices can communicate
   directly to exchange information.
 * 12. • Personal Area Network (PAN) – pervasive computing i.e. to provide
   flexible connectivity between personal electronic devices or home appliances.
   Short-range MANET can simplify the intercommunication between various mobile
   devices (such as a PDA, a laptop, and a cellular phone). Tedious wired cables
   are replaced with wireless connections. Such an ad hoc network can also
   extend the access to the Internet or other networks by mechanisms e.g.
   Wireless LAN (WLAN), GPRS, and UMTS. • Vehicular Ad hoc Networks –
   intelligent transportation i.e. to enable real time vehicle monitoring and
   adaptive traffic control
 * 13. • Civilian environments – taxi cab network, meeting rooms, sports
   stadiums, boats, small aircraft • Emergency operations – search and rescue,
   policing and fire fighting and to provide connectivity between distant
   devices where the network infrastructure is unavailable. Ad hoc can be used
   in emergency/rescue operations for disaster relief efforts, e.g. in fire,
   flood, or earthquake. Emergency rescue operations must take place where
   non-existing or damaged communications infrastructure and rapid deployment of
   a communication network is needed. Information is relayed from one rescue
   team member to another over a small hand held.
 * 14. Routing in MANET‘s • Routing in Mobile Ad hoc networks is an important
   issue as these networks do not have fixed infrastructure and routing requires
   distributed and cooperative actions from all nodes in the network. MANET‘s
   provide pointto point routing similar to Internet routing. • The major
   difference between routing in MANET and regular internet is the route
   discovery mechanism. Internet routing protocols suchas RIP or OSPF have
   relatively long converge times, which is acceptable for a wired network that
   has infrequent topology changes. However, a MANET has a rapid topology
   changes due to node mobility making the traditional internet routing
   protocols inappropriate. • MANET-specific routing protocols have been
   proposed, that handle topology changes well, but they have large control
   overhead and arenot scalable for large networks. • Another major difference
   in the routing is the network address. In internet routing, the network
   address (IP address) is hierarchical containing a network ID and a computer
   ID on that network. In contrast, for most MANET‘s the network address is
   simply an ID of the node in the network and is not hierarchical. The routing
   protocol must use the entire address to decide the next hop.
 * 15. Some of the fundamental differences between wired networks & ad-hoc
   networks are: • Asymmetric links: - Routing information collected for one
   direction is of no use for the other direction. Many routing algorithms for
   wired networks rely on a symmetric scenario. • Redundant links: - In wired
   networks, some redundancy is present to survive link failures and this
   redundancy is controlled by a network administrator. In ad-hoc networks,
   nobody controls redundancy resulting in many redundant links up to the
   extreme of a complete meshed topology. • Interference: - In wired networks,
   links exist only where a wire exists, and connectionsare planned by network
   administrators. But, in ad-hoc networks links come and go depending on
   transmission characteristics, one transmission might interfere with another
   and nodes might overhear the transmission of other nodes. • Dynamic topology:
   - The mobile nodes might move in an arbitrary manner or medium
   characteristics might change. This result in frequent changes in topology, so
   snapshots are valid only for a very short period of time. So, in ad-hoc
   networks, routing tables must somehow reflect these frequent changes in
   topology and routing algorithms have to be adopted.
 * 16. Summary of the difficulties faced for routing in ad-hoc networks •
   Traditional routing algorithms known from wired networks will not work
   efficiently or fail completely. These algorithms have not been designed with
   a highly dynamic topology, asymmetric links, or interference in mind. •
   Routing in wireless ad-hoc networks cannot rely on layer three knowledge
   alone. Information from lower layers concerning connectivity or interference
   can help routing algorithms to find a good path. • Centralized approaches
   will not really work, because it takes too long to collect the current status
   and disseminate it again. Within this time the topology has already changed.
 * 17. Summary of the difficulties faced for routing in ad-hoc networks • Many
   nodes need routing capabilities. While there might be some without, at least
   one router has to be within the range of each node. Algorithms have to
   consider the limited battery power of these nodes. • The notion of a
   connection with certain characteristics cannot work properly. Ad-hoc networks
   will be connectionless, because it is not possible to maintain a connection
   in a fast changing environment and to forward data following this connection.
   Nodes have to make local decisions for forwarding and send packets roughly
   toward the final destination. • A last alternative to forward a packet across
   an unknown topology is flooding. This approach always works if the load is
   low, but it is very inefficient. A hop counter is needed in each packet to
   avoid looping, and the diameter of the ad-hoc network.
 * 18. Routing Algorithms – Always maintain routes:- Little or no delay for
   route determination – Consume bandwidth to keep routes up-to- date – Maintain
   routes which may never be used – Advantages: low route latency, State
   information, QoS guarantee related to connection set-up or other real-time
   requirements – Disadvantages: high overhead (periodic updates) and route
   repair depends on update
 * 19. – only obtain route information when needed – Advantages: no overhead
   from periodic update, scalability as long as there is only light traffic and
   low mobility. – Disadvantages: high route latency, route caching can reduce
   latency • Hybrid algorithms: maintain routes to nearby nodes even if they are
   not needed and maintain routes to far away nodes only when needed. Example is
   Zone Routing Protocol (ZRP).
 * 20. Destination sequence distance vector (DSDV) • Destination sequence
   distance vector (DSDV) routing is an example of proactive algorithms and an
   enhancement to distance vector routing for ad-hoc networks. • Distance vector
   routing is used as routing information protocol (RIP) in wired networks. It
   performs extremely poorly with certain network changes due to the
   count-to-infinity problem. • Each node exchanges its neighbor table
   periodically with its neighbors. Changes at one node in the network propagate
   slowly through the network. • The strategies to avoid this problem which are
   used in fixed networks do not help in the case of wireless ad-hoc networks,
   due to the rapidly changing topology. This might create loops or unreachable
   regions within the network.
 * 21. • DSDV adds the concept of sequence numbers to the distance vector
   algorithm. • Each routing advertisement comes with a sequence number. •
   Within ad-hoc networks, advertisementsmay propagate along many paths.
   Sequence numbers help to apply the advertisements in correct order. • This
   avoids the loops that are likely with the unchanged distance vector
   algorithm.
 * 22. • Each node maintains a routing table which stores next hop, cost metric
   towards each destination and a sequence number that is created by the
   destination itself. • Each node periodically forwards routing table to
   neighbors. Each node increments and appends its sequence number when sending
   its local routing table. • Each route is tagged with a sequence number;
   routes with greater sequence numbers are preferred. • Each node advertises a
   monotonically increasing even sequence number for itself. • When a node
   decides that a route is broken, it increments the sequence number of the
   route and advertises it with infinite metric. Destination advertises new
   sequence number.
 * 23. Security in MANET’s • Securing wireless ad-hoc networks is a highly
   challenging issue. • Understanding possible form of attacks is always the
   first step towards developing good security solutions. • Security of
   communication in MANET is important for secure transmission of information. •
   Absence of any central co-ordination mechanism and shared wireless medium
   makes MANETmore vulnerable to digital/cyber attacks than wired network there
   are a number of attacks that affect MANET.
 * 24. These attacks can be classified into two types: • 1. External Attack: –
   External attacks are carried out by nodes that do not belong to the network.
   – It causes congestion sends false routing information or causes
   unavailability of services. • 2. Internal Attack: – Internal attacks are from
   compromised nodes that are part of the network. In an internal attack the
   malicious node from the network gains unauthorized access and impersonates as
   a genuine node. – It can analyze traffic between other nodes and may
   participate in other network activities.
 * 25. • Denial of Service attack: This attack aims to attack the availability
   of a node or the entire network. If the attack is successful the services
   will notbe available. The attacker generally uses radio signal jamming and
   the battery exhaustion method. • Impersonation: If the authentication
   mechanism is not properly implemented a malicious node can act as a genuine
   node and monitorthe network traffic. It can also send fake routing packets,
   and gain access to some confidential information. • Eavesdropping: This is a
   passive attack. The node simply observes the confidential information. This
   information can be later used by themalicious node. The secret information
   like location, public key, private key,password etc. can be fetched by
   eavesdropper. • Routing Attacks: The malicious node makes routing services a
   target because it‘s an important service in MANETs. There are two flavors to
   this routing attack. One is attack on routing protocol and another is attack
   on packet forwarding or delivery mechanism.
 * 26. • Black hole Attack: In this attack, an attacker advertises a zero metric
   for all destinations causing all nodes around it to route packets towards
   it.[9] A malicious node sends fake routing information, claiming that it has
   an optimum route and causes other good nodes to route data packetsthrough the
   malicious one. A malicious node drops all packets that it receives instead of
   normally forwarding those packets. An attacker listen the requests in a
   flooding based protocol. • Wormhole Attack: In a wormhole attack, an attacker
   receives packets at one point in the network, ―tunnels‖ them to another point
   in the network, and then replays them into the network from that point.
   Routing can be disrupted when routing control message are tunnelled. This
   tunnel between two colluding attacks is known as a wormhole. • Replay Attack:
   An attacker that performs a replay attack are retransmitted the valid data
   repeatedly to inject the network routing traffic that has been captured
   previously. This attack usually targets the freshness of routes,but can also
   be used to undermine poorly designed securitysolutions.
 * 27. • Jamming: In jamming, attacker initially keep monitoring wireless medium
   in order to determine frequency at which destination node is receiving signal
   from sender. It then transmit signal on that frequency so that error free
   receptor is hindered. • Man- in- the- middle attack: An attacker sites
   between the sender and receiver and sniffs any information being sent between
   two nodes. In some cases, attacker may impersonate the sender to communicate
   with receiver or impersonate the receiver to reply to the sender. • Gray-hole
   attack: This attack is also known as routing misbehavior attack which leads
   to dropping of messages. Gray-hole attack has two phases. In the first phase
   the node advertise itself as having a valid route to destination while in
   second phase, nodes drops intercepted packets with a certain probability.
 * 28. Dynamic Source Routing • The Dynamic Source Routing protocol (DSR) is a
   simple and efficient routing protocol designed specifically for use in multi-
   hop wireless ad hoc networks of mobile nodes. • DSR allows the network to be
   completely self-organizing and self-configuring, without the need for any
   existing network infrastructure or administration. • The protocol is composed
   of the two main mechanisms of "Route Discovery" and "Route Maintenance",
   which work together to allow nodes to discover and maintain routes to
   arbitrary destinations in the ad hoc network. • All aspects of the protocol
   operate entirely on-demand, allowing the routing packet overhead of DSR to
   scale automatically to only that needed to react to changes in the routes
   currently in use.
 * 29. • Route discovery. If the source does not have a route to the destination
   in its route cache, it broadcasts a route request (RREQ) message specifying
   the destination node for which the route is requested. • The RREQ message
   includes a route record which specifies the sequence of nodes traversed by
   the message. When an intermediate node receives a RREQ, it checks to see if
   it is already in the route record. If it is, it drops the message. • This is
   done to prevent routing loops. If the intermediate node had received the RREQ
   before, then it also drops the message. The intermediate node forwards the
   RREQ to the next hop according to the route specified in the header. • When
   the destination receives the RREQ, it sends back a route reply message. If
   the destination has a route to the source in its route cache, then it can
   send a route response (RREP) message along this route. Otherwise, the RREP
   message can be sent along the reverse route back to thesource. • Intermediate
   nodes may also use their route cache to reply to RREQs. If an intermediate
   node has a route to the destination in its cache, then it can append the
   route to the route record in the RREQ, and send an RREP back to the source
   containing this route. This can help limit flooding of the RREQ. However, if
   the cached route is out-of-date, it can result in the source receiving
   staleroutes.
 * 30. • Route maintenance. When a node detects a broken link while trying to
   forward a packet tothe next hop, it sends a route error (RERR) message back
   to the source containing the link in error. When an RERR message is received,
   all routes containing the link in error are deleted at that node. • As an
   example, consider the following MANET, where a node S wants to send a packet
   to D, but does not know the route to D. So, it initiates a route discovery.
   Source node S floods Route Request (RREQ). Each node appends its own
   identifier when forwarding RREQ as shown below.
 * 31.
 * 32.
 * 33.
 * 34. • Destination D on receiving the first RREQ, sends a Route Reply (RREP).
   • RREP is sent on a route obtained by reversing the route appended to
   received RREQ. • RREP includes the route from S to D on which RREQ was
   received by node D.
 * 35. • Route Reply can be sent by reversing the route in Route Request (RREQ)
   only if links are guaranteed to be bi-directional. • If Unidirectional
   (asymmetric) links are allowed, then RREP may need a route discovery from S
   to D. • Node S on receiving RREP, caches the route included in the RREP. When
   node S sends a data packet to D, the entire route is included in the packet
   header {hence the name source routing}. • Intermediate nodes use the source
   route included in a packet to determine to whom a packet should be forwarded.
 * 36.
 * 37. • Route Reply can be sent by reversing the routein Route Request (RREQ)
   only if links are guaranteed to be bi-directional. If Unidirectional
   (asymmetric) links are allowed, then RREP may need a route discovery from S
   to D. Node S on receiving RREP, caches the route included in the RREP. When
   node S sends a data packet to D, the entire route is included in the
   packetheader {hence the name source routing}. Intermediate nodes use the
   source route included in a packetto determine to whom a packet should be
   forwarded.
 * 38.
 * 39. • J sends a route error to S along route J-F- E-S when its attempt to
   forward the data packet S (with route SEFJD) on J-D fails. Nodes hearing RERR
   update their route cache to remove link J-D
 * 40.
 * 41. • Advantages of DSR: • Routes maintained only between nodes who need to
   communicate-- reduces overheadof route maintenance • Route caching can
   further reduce route discovery overhead • A single route discovery may yield
   many routes to the destination, due to intermediate nodes replying from local
   caches • Disadvantages of DSR: • Packet header size grows with route length
   due to source routing • Flood of route requests may potentially reach all
   nodes in the network • Care must be taken to avoid collisions between route
   requests propagated by neighboring nodes -- insertion of random delays before
   forwardingRREQ • Increased contention if too many route replies come back due
   to nodes replying using their local cache-- Route Reply Storm problem. Reply
   storm may be eased by preventing a node from sending RREP if it hears another
   RREP with a shorter route • An intermediate node may send Route Reply using a
   stale cached route, thus polluting other caches
 * 42. Ad Hoc On-Demand Distance Vector Routing (AODV) • AODV is another
   reactive protocol as it reacts to changes and maintains only the active
   routes in the caches or tables for a pre-specified expiration time. Distance
   vector means a set of distant nodes, which defines thepath to destination. •
   AODV can be considered as a descendant of DSR and DSDV algorithms. • It uses
   the same route discovery mechanism used by DSR. DSR includes source routes in
   packet headers and resulting large headers cansometimes degrade performance,
   particularly when data contents of a packet aresmall. • AODV attempts to
   improve on DSR by maintaining routing tables atthe nodes, so that data
   packets do not have to containroutes. • AODV retains the desirable feature of
   DSR that routes are maintained only between nodes which need to communicate.
   • However, as opposed to DSR, which uses source routing, AODV uses hop-
   by-hop routing by maintaining routing table entries at intermediatenodes.
 * 43. • Route Discovery. The route discovery process is initiated when a source
   needs a route to a destination and it does not have a route in its routing
   table. • To initiate route discovery, the source floods the network with a
   RREQ packet specifying the destination for which the route is requested. When
   a node receives an RREQ packet, it checks to see whether it is the
   destination or whether it has a route to the destination. • If either case is
   true, the node generates an RREP packet, which is sent back to the source
   along the reversepath. • Each node along the reverse path sets up a forward
   pointer to the node it received the RREP from. This sets up a forward path
   from the source to the destination. • If the node is not the destination and
   does not have a route to the destination, it rebroadcasts the RREQ packet. •
   At intermediate nodes duplicate RREQ packets are discarded. When the source
   node receives the first RREP, it can begin sending data to the destination. •
   To determine the relative degree out-of-datedness of routes, each entry in
   the node routing table and all RREQ and RREP packets are tagged with a
   destination sequence number.
 * 44. • A larger destination sequence number indicates a more current (or more
   recent) route. Upon receiving an RREQ or RREP packet, a node updates its
   routing information to set up the reverse or forward path, respectively, only
   if the route contained in the RREQ or RREP packet is more current than its
   own route. • Route Maintenance. When a node detects a broken link while
   attempting to forward a packet to the next hop, it generates a RERR packet
   that is sent to all sources using the broken link. The RERR packet erases all
   routes using the link along the way. If a source receives a RERR packet and a
   route to the destination is still required, it initiates a new route
   discovery process. Routes are also deleted from the routing table if they are
   unused for a certain amount of time.
 * 45.
 * 46.
 * 47.
 * 48.
 * 49.
 * 50.
 * 51. • An intermediate node (not the destination) may also send a Route Reply
   (RREP) provided that it knows a more recent path than the one previously
   known to sender S. • To determine whether the path known to an intermediate
   node is more recent, destination sequence numbers are used. • The likelihood
   that an intermediate node will send a Route Reply when using AODV is not as
   high as DSR. A new Route Request by node S for a destination is assigned a
   higher destination sequence number. • An intermediate node which knows a
   route, but with a smaller sequence number, cannot send Route Reply
 * 52.
 * 53.
 * 54. • When node X is unable to forward packet P (from node S to node D) on
   link (X,Y), it generates a RERR message Node X increments the destination
   sequence number for D cached at node X. • The incremented sequence number N
   is included in the RERR. When node S receives the RERR, it initiates a new
   route discovery for D using destination sequence number at least as large as
   N. • When node D receives the route request with destination sequence number
   N, node D will set its sequence number to N, unless it is already larger than
   N.
 * 55. • Sequence numbers are used in AODV to avoid using old/broken routes and
   to determine which route is newer. Also, it prevents formation of loA s os pu
   m se .t h a t A does not know about failur of link C-D because RERR sent by C
   is lost. Now C performs a route discovery for D. Node A receives the RREQ
   (say, viapath C-E-A) NodeA will reply since A knows a route to D via node B
   resulting in a loop (for instance, C-E-A-B-C )
 * 56. • Neighboring nodes periodically exchange hello message and absence of
   hello message indicates a link failure. When node X is unable to forward
   packet P (from node S to node D) on link (X,Y), it generates a RERR message.
   Node X increments the destination sequence number for D cached at node X. •
   The incremented sequence number N is included in the RERR. When node S
   receives the RERR, it initiates a new route discovery for D using destination
   sequence number at least as large as N. • When node D receives the route
   request with destination sequence number N, node D will set its sequence
   number to N, unless it is already larger than N.
 * 57. • Protocols and Tools: – Wireless Application Protocol-WAP •
   (Introduction Protocol architecture, and treatment of protocols of all
   layers), – Bluetooth (User scenarios, physical layer, MAC layer, networking,
   security, link management) – J2ME.
 * 58. The Wireless Application Protocol (WAP) • The Wireless Application
   Protocol (WAP) is an open, global specification that empowers mobile users
   with wireless devices to easily access and interact with information and
   services instantly.
 * 59. The Wireless Application Protocol (WAP)
 * 60. • WAP is a global standard and is not controlled by any single company. •
   Ericsson, Nokia, Motorola, and Unwired Planet founded the WAP Forum in the
   summer of 1997 with the initial purpose of defining an industry-wide
   specification for developing applications over wireless communications
   networks. • The WAP specifications define a set of protocols in application,
   session, transaction, security, and transport layers, which enable operators,
   manufacturers, and applications providers to meet the challenges in advanced
   wireless service differentiation and fast/flexible service creation. The
   Wireless Application Protocol (WAP)
 * 61. All solutions must be: • interoperable, i.e., allowing terminals and
   software from different vendors to communicate with networks from different
   providers • scaleable, i.e., protocols and services should scale with
   customer needs and number of customers • efficient, i.e., provision of QoS
   suited to the characteristics of the wireless and mobile networks • reliable,
   i.e., provision of a consistent and predictable platform for deploying
   services; and • secure, i.e., preservation of the integrity of user data,
   protection of devices and services from security problems.
 * 62. of wireless transports. Why Choose WAP? • In the past, wireless Internet
   access has been limited by the capabilities of handheld devices and wireless
   networks. • WAP utilizes Internet standards such as XML, user datagram
   protocol (UDP), and Internet protocol (IP). Many of the protocols are based
   on Internet standards such as hypertext transfer protocol (HTTP) and TLS but
   have been optimized for the unique constraints of the wireless environment:
   low bandwidth, high latency, and less connection stability. • Internet
   standards such as hypertext markup language (HTML), HTTP, TLS and
   transmission control protocol (TCP) are inefficient over mobile networks,
   requiring large amounts of mainly text-based data to be sent. Standard HTML
   content cannot be effectively displayed on the small-size screens of
   pocket-sized mobile phones and pagers. • WAP utilizes binary transmission for
   greater compression of data and is optimized for long latency and low
   bandwidth. WAP sessions cope with intermittent coverage and can operate over
   a wide variety
 * 63. WAP Architecture • The following figure gives an overview of the WAP
   architecture, its protocols and components, and compares this architecture
   with the typical internet architecture when using the World Wide Web. • The
   basis for transmission of data is formed by different bearer services. • WAP
   does not specify bearer services, but uses existing data services and will
   integrate further services. • Examples are message services, such as short
   message service (SMS) of GSM, circuit-switched data, such as high-speed
   circuit switched data (HSCSD) in GSM, or packet switched data, such as
   general packet radio service (GPRS) in GSM. Many other bearers are supported,
   such as CDPD, IS-136, PHS.
 * 64. WAP Architecture
 * 65. WAP Architecture • WDP: – The WAP datagram protocol (WDP) and the
   additional Wireless control message protocol (WCMP) is the transport layer
   that sends and receives messages via any available bearer network, including
   SMS, USSD, CSD, CDPD, IS–136 packet data, and GPRS. – The transport layer
   service access point (T- SAP) is the common interface to be used by higher
   layers independent of the underlying network.
 * 66. WAP Architecture • WTLS: – The next higher layer, the security layer with
   its wireless transport layer security protocol WTLS offers its service at the
   security SAP (SEC-SAP). – WTLS is based on transport layer security (TLS,
   formerly SSL, secure sockets layer). WTLS has been optimized for use in
   wireless networks with narrow-band channels. It can offer data integrity,
   privacy, authentication, and (some) denial-of-service protection.
 * 67. WAP Architecture • WTP: – The WAP transaction protocol (WTP) layer
   provides transaction support, adding reliability to the datagram service
   provided by WDP at the transaction SAP (TR-SAP). • WSP: – The session layer
   with the wireless session protocol (WSP) currently offers two services at the
   session-SAP (S-SAP), one connection-oriented and one connectionless if used
   directly on top of WDP. A special service for browsing the web (WSP/B) has
   been defined that offers HTTP/1.1 functionality, long-lived session state,
   session suspend and resume, session migration and other features needed for
   wireless mobile access to the web. • WAE: – The application layer with the
   wireless application environment (WAE) offers a framework for the integration
   of different www and mobile telephony applications.
 * 68. Working of WAP • WAP does not always force all applications to use the
   whole protocol architecture. • Applications can use only a part of the
   architecture. • For example, if an application does not require security but
   needs the reliable transport of data, it can directly use a service of the
   transaction layer. Simple applications can directly use WDP.
 * 69. Working of WAP
 * 70. Working of WAP • Different scenarios are possible for the integration of
   WAP components into existing wireless and fixed networks. • On the left side,
   different fixed networks, such as the traditional internet and the public
   switched telephone network (PSTN), are shown. • One cannot change protocols
   and services of these existing networks so several new elements will be
   implemented between these networks and the WAP-enabled wireless, mobile
   devices in a wireless network on the right-hand side.
 * 71. Wireless Datagram Protocol (WDP) • Wireless Datagram Protocol defines the
   movement of information from receiver to the sender and resembles the User
   Datagram Protocol in the Internet protocol suite.
 * 72. WDP
 * 73. WDP • WDP offers a consistent service at the Transport Service Access
   Point to the upper layer protocol of WAP. • This consistency of service
   allows for applications to operate transparently over different available
   bearer services. • WDP can be mapped onto different bearers, with different
   characteristics. In order to optimize the protocol with respect to memory
   usage and radio transmission efficiency, the protocol performance over each
   bearer may vary.
 * 74. WDP • WDP offers source and destination port numbers used for
   multiplexing and demultiplexing of data respectively. • The service primitive
   to send a datagram is TDUnitdata. req with the destination address (DA),
   destination port (DP), Source address (SA), source port (SP), and user data
   (UD) as mandatory parameters. • Destination and source address are unique
   addresses for the receiver and sender of the user data. • These could be
   MSISDNs (i.e., a telephone number), IP addresses, or any other unique
   identifiers. • The T-DUnitdata.ind service primitive indicates the reception
   of data. Here destination address and port are only optional parameters.
 * 75. WDP WDP serviceprimitives
 * 76. WDP • If a higher layer requests a service the WDP cannot fulfil, this
   error is indicated with the T-DError.ind service primitive. • An error code
   (EC) is returned indicating the reason for the error to the higher layer. WDP
   is not allowed to use this primitive to indicate problems with the bearer
   service. • It is only allowed to use the primitive to indicate local
   problems, such as a user data size that is too large. • If any errors happen
   when WDP datagrams are sent from one WDP entity to another, the wireless
   control message protocol (WCMP) provides error handling mechanisms for WDP
   and should therefore be implemented. • WCMP contains control messages that
   resemble the internet control message protocol messages and can also be used
   for diagnostic and informational purposes. • WCMP can be used by WDP nodes
   and gateways to report errors.
 * 77. WDP • Typical WCMP messages are destination unreachable (route, port,
   address unreachable), parameter problem (errors in the packet header),
   message too big, reassembly failure, or echo request/reply. • An additional
   WDP management entity supports WDP and provides information about changes in
   the environment, which may influence the correct operation of WDP.
 * 78. BLUETOOTH • Device synchronization: Seamless connectivity among
   PDAs,computers, and mobile phones allows applications to update information
   on multiple devices automatically when data on any one devicechanges. •
   Peripheral connectivity. • Car kits: Hands-free packages enable users to
   access phones andother devices without taking their hands off the steering
   wheel • Mobile payments: Your Bluetooth-enabled phone can communicate with a
   Bluetooth-enabled vending machine to buy a can of Diet Pepsi, and put the
   charge on your phone bill. • The 802.11b protocol is designed to connect
   relatively large devices with lots of power and speed, such as desktops and
   laptops, where devices communicate at up to 11 Mbit/sec, at greater distances
   (up to 300 feet, or 100 meters). By contrast, Bluetooth is designed to
   connect small devices like PDAs, mobile phones, and peripherals at slower
   speeds (1 Mbit/sec), within a shorter range (30 feet, or 10 meters), which
   reduces power requirements. Another major difference is that 802.11b wasn't
   designedfor voice communications, while any Bluetooth connection can support
   both data and voice communications. • User scenarios
 * 79. • Networking in Bluetooth • Bluetooth operates on 79 channels in the 2.4
   GHz band with 1 MHz carrier spacing. Each device performs frequency hopping
   with 1,600 hops/s in a pseudo random fashion. A piconet is a collection of
   Bluetooth devices which are synchronized to the same hopping sequence. One
   device in the piconet can act as master (M), all other devices connected to
   the master must act as slaves (S). The master determines the hopping pattern
   in the piconet and the slaves have to synchronize to this pattern. Each
   piconet has a unique hopping pattern. If a device wants to participate it has
   to synchronize to this. A typical piconet is shown below:
 * 80.
 * 81. • Parked devices (P) can not actively participate in the piconet (i.e.,
   they do not have a connection), but are known and can be reactivated within
   some milliseconds. Devices in stand-by (SB) do not participate in the
   piconet. Each piconet has exactly one master and up to seven simultaneous
   slaves. More than 200 devices can be parked. The first step in forming a
   piconet involves a master sending its clock and device ID. All the Bluetooth
   devices have the same capability to become a master or a slave and two or
   three devices are sufficient to form a piconet. The unit establishing the
   piconet automatically becomes the master, all other devices will be slaves.
   The hopping pattern is determined by the device ID, a 48-bit worldwide unique
   identifier. • The phase in the hopping pattern is determined by the master‘s
   clock. After adjusting the internal clock according to the master a device
   may participate in the piconet. All active devices are assigned a 3-bit
   active member address (AMA). All parked devices use an 8-bit parked member
   address (PMA). Devices in stand-by do not need an address.
 * 82. • A device in one piconet can communicate to another device in another
   piconet, forming a scatternet. A master in one piconet may be a slave in
   another piconet. Both piconets use a different hopping sequence, always
   determined by the master of the piconet. Bluetooth applies FH-CDMA for
   separation of piconets.
 * 83.
 * 84. • A collision occurs if two or more piconets use the same carrier
   frequency at the same time. This will probably happen as the hopping
   sequences are not coordinated. If a device wants to participate in more than
   one piconet, it has to synchronize to the hopping sequence of the piconet it
   wants to take part in. If a device acts as slave in one piconet, it simply
   starts to synchronize with the hopping sequence of the piconet it wants to
   join. After synchronization, it acts as a slave in this piconet and no longer
   participates in its former piconet. To enable synchronization, a slave has to
   know the identity of the master that determines the hopping sequence of a
   piconet. Before leaving one piconet, a slave informs the current master that
   it will be unavailable for a certain amount of time. The remaining devices in
   the piconet continue to communicate as usual.
 * 85. Bluetooth Protocol Stack • The Bluetooth protocol stack can be divided
   into a core specification, which describes the protocols from physical layer
   to the data link control together with management functions, and profile
   specifications describing many protocols and functions needed to adapt the
   wireless Bluetooth technology to legacy and new applications. • A high-level
   view of the architecture is shown. The responsibilities of the layers in this
   stack are as follows: • The radio layer is the physical wireless connection.
   To avoid interference with other devices that communicate in the ISM band,
   the modulation is based on fast frequency hopping. Bluetooth divides the 2.4
   GHz frequency band into 79 channels 1 MHz apart (from 2.402 to 2.480 GHz),
   and uses this spread spectrum to hop from one channel to another, up to 1600
   • times a second. The standard wavelength range is 10 cm to 10 m, and can be
   extended to 100 m by increasing transmission power.
 * 86.
 * 87. • The baseband layer is responsible for controlling and sending data
   packets over the radio link. It provides transmission channels for both data
   and voice. The baseband layer maintains Synchronous Connection-Oriented (SCO)
   links for voice and Asynchronous Connectionless (ACL) links for data. SCO
   packets are never retransmitted but ACL packets are, to ensure data
   integrity. SCO links are point-to-point symmetric connections, where time
   slots are reserved to guarantee timely transmission. A slave device is
   allowed to respond during the time slot immediately following an SCO
   transmission from the master. A master can support up to three SCO links to a
   single slave or to multiple slaves, and a single slave can support up to two
   SCO links to different slaves. Data transmissions on ACL links, on the other
   hand, are established on a per-slot basis (using slots not reserved for SCO
   links). ACL links support point-to-multipoint transmissions. After an ACL
   transmission from the master, only a slave addressed specificallymay respond
   during the next time slot; if no device is addressed, the messageis treated
   as a broadcast.
 * 88. • by the application, or through certain support protocols provided to
   ease the burden on application programmers. • The Logical Link Control and
   Adaptation Protocol (L2CAP) receives application data and adapts it to the
   Bluetooth format. Quality of Service (QoS) parameters are exchanged at this
   layer.
 * 89. • Link Manager Protocol • The link manager protocol (LMP) manages various
   aspects of the radio link between a master and a slave and the current
   parameter setting of the devices. LMP enhances baseband functionality, but
   higher layers can still directly access the baseband. The following groups of
   functions are covered by the LMP: • Authentication, pairing, and encryption:
   Although basic authentication is handled in the baseband, LMP has to control
   the exchange of random numbers and signed responses. LMP is not directly
   involved in the encryption process, but sets the encryption mode (no
   encryption, point-to-point, or broadcast), key size, and random speed. •
   Synchronization: Precise synchronization is of major importance within a
   Bluetooth network. The clock offset is updated each time a packet is received
   from the master. • Capability negotiation: Not only the version of the LMP
   can be exchanged but also information about the supported features. Not all
   Bluetooth devices will support all features that are described in the
   standard, so devices have to agree the usage of, e.g., multi-slot packets,
   encryption, SCO links, voice encoding, park/sniff/hold mode, HV2/HV3 packets
   etc. • Quality of service negotiation: Different parameters control the QoS
   of a Bluetooth device at these lower layers. The poll interval, i.e., the
   maximum time between transmissions from a master to a particular slave,
   controls the latency and transfer capacity. A master can also limit the
   number of slots available for slaves’ answers to increase its own bandwidth.
   • Power control: A Bluetooth device can measure the received signal strength.
   Depending on this signal level the device can direct the sender of the
   measured signal to increase or decrease its transmit power. • Link
   supervision: LMP has to control the activity of a link, it may set up new SCO
   links, or it may declare the failure of a link. • State and transmission mode
   change: Devices might switch the master/slave role, detach themselves from a
   connection, or change the operating mode
 * 90. • Bluetooth defines several low-power states for a device. The following
   figure shows the major states of a Bluetooth device and typical transitions.
   Every device, which is currently not participating in a piconet (and not
   switched off), is in standby mode. This is a low-power mode where only the
   native clock is running. The next step towards the inquiry mode can happen in
   two different ways. Either a device wants to establish a piconet or a device
   just wants to listen to see if something is going on.
 * 91.
 * 92. • A device wants to establish a piconet: A user of the device wants to
   scan for other devices in the radio range. The device starts the inquiry
   procedure by sending an inquiry access code (IAC) that is common to all
   Bluetooth devices. The IAC is broadcast over 32 so- called wake-up carriers
   in turn. • Devices in standby that listen periodically: Devices in standby
   may enter the inquiry mode periodically to search for IAC messages on the
   wake-up carriers. As soon as a device detects an inquiry it returns a packet
   containing its device address and timing information required by the master
   to initiate a connection. From that moment on, the device acts as slave.
 * 93.
 * 94. • During the page state two different roles are defined. After finding
   all required devices the master is able to set up connections to each device,
   i.e., setting up a piconet. As soon as a device synchronizes to the hopping
   pattern of the piconet it also enters the connection state. The connection
   state comprises the active state and the low power states: park, sniff, and
   hold. In the active state the slave participates in the piconet by listening,
   transmitting, and receiving. ACL and SCO links can be used. A master
   periodically synchronizes with all slaves. All devices being active must have
   the 3-bit active member address (AMA). To save battery power, a Bluetooth
   device can go into one of three low power states:
 * 95. • L2CAP • The logical link control and adaptation protocol (L2CAP) is a
   data link control protocol on top of the baseband layer offering logical
   channels between Bluetooth devices with QoS properties. L2CAP is available
   for ACLs only. • L2CAP provides three different types of logical channels
   that are transported via the ACL between master and slave: • Connectionless:
   These unidirectional channels are typically used for broadcasts from a master
   to its slave(s). • Connection-oriented: Each channel of this type is bi-
   directional and supports QoS flow specifications for each direction. These
   flow specs follow RFC 1363 and define average/peak data rate, maximum burst
   size, latency, and jitter.
 * 96. • Signaling: This third type of logical channel is used to exchanging
   signaling messages between L2CAP entities. • Each channel can be identified
   by its channel identifier (CID). Signaling channels always use a CID value of
   1, a CID value of 2 is reserved for connectionless channels. For
   connection-oriented channels a unique CID (>= 64) is dynamically assigned at
   each end of the channel to identify the connection. • The following figure
   shows the three packet types belonging to the three logical channel types.
 * 97. • The length field indicates the length of the payload (plus PSM for
   connectionless PDUs). The CID has the multiplexing/demultiplexing function.
   For connectionless PDUs a protocol/service multiplexor (PSM) field is needed
   to identify the higher layer recipient for the payload. For
   connection-oriented PDUs the CID already fulfills this function. Several PSM
   values have been defined, e.g., 1 (SDP), 3 (RFCOMM), 5 (TCS-BIN). Values
   above 4096 can be assigned dynamically. The payload of the signaling PDU
   contains one or more commands. Each command has its own code (e.g., for
   command reject, connection request, disconnection response etc.) and an ID
   that matches a request with its reply. The length field indicates the length
   of the data field for this command.
 * 98. • The first step, called pairing, is necessary if two Bluetooth devices
   have never met before. To set up trust between the two devices a user can
   enter a secret PIN into both devices. This PIN can have a length of up to 16
   byte. Based on the PIN, the device address, and random numbers, several keys
   can be computed which can be used as link key for authentication. The
   authentication is a challenge-response process based on the link key, a
   random number generated by a verifier (the device that requests
   authentication), and the device address of the claimat (the device that is
   authenticated).
 * 99. • Based on the link key, and again a random number an encryption key is
   generated during the encryption stage of the security architecture. This key
   has a maximum size of 128 bits and can be individually generated for each
   transmission. Based on the encryption key, the device address and the current
   clock a payload key is generated for ciphering user data. The payload key is
   a stream of pseudo-random bits. The ciphering process is a simple XOR of the
   user data and the payload key. • All Bluetooth-enabled devices must implement
   the Generic Access Profile, which contains all the Bluetooth protocols and
   possible devices. This profile defines a security model that includes three
   security modes.
 * 100. Bluetooth Profiles • Bluetooth profiles are intended to ensure
   interoperability among Bluetooth-enabled devices and applications from
   different manufacturers and vendors. A profile defines the roles and
   capabilities for specific types of applications. Profiles represent default
   solutions for a certain usage model. They use a selection of protocols and
   parameter set to form a basis for interoperability. Protocols can be seen as
   horizontal layers while profiles are vertical slices as shown below:
 * 101. . • The following basic profiles have been specified: generic access,
   service discovery, cordless telephony, intercom, serial port, headset, dialup
   networking, fax, LAN access, generic object exchange, object push, file
   transfer, and synchronization. Additional profiles are: advanced audio
   distribution, PAN, audio video remote control, basic printing, basic imaging,
   extended service discovery, generic audio video distribution, hands-free, and
   hardcopy cable replacement. Some of the profiles are given below: • The
   Generic Access Profile defines connection procedures, device discovery, and
   link management. It also defines procedures related to use of different
   security models and common format requirements for parameters accessible on
   the user interface level. At a minimum all Bluetooth devices must support
   this profile.
 * 102. Java 2 Micro Edition (J2ME) • Sun Microsystems defines J2ME as "a highly
   optimized Java run- time environment targeting a wide range of consumer
   products, including pagers, cellular phones, screen-phones, digital set-top
   boxes and car navigation systems." J2ME brings the cross-platform
   functionality of the Java language to smaller devices, allowing mobile
   wireless devices to share applications. Java 2 Micro Edition maintains the
   qualities that Java technology has become known for: • built-in consistency
   across products in terms of running anywhere, anytime, on any device • the
   power of a high-level object-oriented programming language with a large
   developer base; • portability of code; • safe network delivery; and • upward
   scalability with J2SE and J2EE
 * 103. • class libraries that are far more domain- specific than the class
   libraries provided in a configuration.
 * 104. Configurations • A configuration is a subset of profile. A configuration
   defines a Java platform for a ―horizontal‖category or grouping of devices
   with similar requirements on total memory budget and other hardware
   capabilities. More specifically, a configuration: • specifies the Java
   programming language features supported, • specifies the Java virtual machine
   features supported, • specifies the basic Java libraries and APIs supported.
   • To avoid fragmentation, there will be a very limited number of J2ME
   configurations. Currently, the goal is to define two standard J2ME
   configurations:
 * 105. Thank you

Jetzt herunterladen


ALS UNANGEMESSEN MELDEN

Wählen Sie Ihren Grund dafür aus, dass Sie diese Präsentation als unangemessen
melden.*Grund auswählenDiffamierendGewaltdarstellung oder
TerrorpropagandaHassrede oder DiskriminierungDrohungen oder
BeleidigungenPornografischSpam oder Betrug*erforderlich
Melden
Copyright-Beschwerde


0 GEFÄLLT MIR

Sei der Erste, dem dies gefälltMehr anzeigen


VIEWS

Aufrufe insgesamt70
Auf Slideshare0
Aus Einbettungen0
Anzahl der Einbettungen0


DIESER GESPEICHERTE EINTRAG IST AUCH IN EINER LISTE.

Das Entfernen aus „Gespeichert“ löscht den Titel auch aus Ihren Listen.
AbbrechenLöschen


ZU EINER NEUEN LISTE HINZUFÜGEN

Wie möchten Sie diese Liste nennen?*
*erforderlich0/50
Liste privat machen
AbbrechenSpeichern

InfoSupportAGBPrivacyDatenschutzCookie-EinstellungenMeine persönlichen Daten
nicht verkaufen oder weitergebenEverand
Deutsche
English
Español
Portugues
Français
Aktuelle SpracheDeutsche

--------------------------------------------------------------------------------

© 2024 SlideShare von Scribd