de.slideshare.net
Open in
urlscan Pro
151.101.130.152
Public Scan
Submitted URL: https://search.app/LuAF3ey9AwEE8UW8A
Effective URL: https://de.slideshare.net/slideshow/mobile-computing-mobile-adhoc-networks-manets/247573308
Submission Tags: falconsandbox
Submission: On June 20 via api from US — Scanned from DE
Effective URL: https://de.slideshare.net/slideshow/mobile-computing-mobile-adhoc-networks-manets/247573308
Submission Tags: falconsandbox
Submission: On June 20 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET /search
<form class="SearchForm_form__j1XGE" method="get" action="/search" data-testid="search-form">
<div class="input-box"><input name="searchfrom" type="hidden" value="header"><input id="nav-search-query" data-cy="search-field" type="text" aria-label="Slideshare durchsuchen" placeholder="Suche" name="q" autocomplete="off" value=""><button
type="submit" class="SearchForm_submit__U8kPR" id="search-submit" data-cy="search-submit"><svg class="" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24" height="24" fill="currentColor">
<path d="M21.71,20.29,18,16.61A9,9,0,1,0,16.61,18l3.68,3.68a1,1,0,0,0,1.42,0A1,1,0,0,0,21.71,20.29ZM11,18a7,7,0,1,1,7-7A7,7,0,0,1,11,18Z"></path>
</svg><span class="sr-only">Suche senden</span></button></div>
</form>
<form class="Form_container__DMa4B">
<div>
<div class="Dropdown_container__NBOZ_ ReportForm_selectField__Kyyaj" data-testid="dropdown-component"><label for="reason" data-testid="label" class="Label_label__KH246 ">Wählen Sie Ihren Grund dafür aus, dass Sie diese Präsentation als
unangemessen melden.*</label><select id="reason" data-testid="select" aria-label="Wählen Sie Ihren Grund dafür aus, dass Sie diese Präsentation als unangemessen melden." class="Dropdown_select__8pQOA ">
<option data-testid="dropdown-option" value="">Grund auswählen</option>
<option data-testid="dropdown-option" value="defamatory">Diffamierend</option>
<option data-testid="dropdown-option" value="ultraviolence">Gewaltdarstellung oder Terrorpropaganda</option>
<option data-testid="dropdown-option" value="hate_speech">Hassrede oder Diskriminierung</option>
<option data-testid="dropdown-option" value="offensive">Drohungen oder Beleidigungen</option>
<option data-testid="dropdown-option" value="porn">Pornografisch</option>
<option data-testid="dropdown-option" value="spam">Spam oder Betrug</option>
</select><span class="RequiredNotice_required___q_RJ " data-testid="required-label">*erforderlich</span></div>
</div><button type="submit" class="Button_button__bdpZ1 Button_primary__K25Gq Button_contained__gyjai Button_medium__H8pKi Button_disabled__M5jJf" data-testid="button" disabled=""><span>Melden</span></button>
</form>
Text Content
Suche senden HochladenHerunterladen – 30 Tage kostenlosEinloggen MOBILE COMPUTING MOBILE ADHOC NETWORKS (MANETS) 3. Mai 2021• 0 gefällt mir•70 views Durch KI verbesserte Beschreibung Jyothishmathi Institute of Technology and Science KarimnagarFolgen Mobile ad hoc networks (MANETs) are wireless networks without any fixed infrastructure. Nodes in a MANET can act as both hosts and routers to forward packets between nodes. MANETs have dynamic topologies that change unpredictably as nodes move. Common routing protocols for MANETs operate in an on-demand fashion, discovering routes only when needed to reduce overhead from periodic updates. Some examples are dynamic source routing (DSR) and destination-sequenced distance-vector (DSDV) routing. Security poses unique challenges in MANETs due to the lack of centralized administration and shared wireless medium.Weniger lesen Mehr lesen Technologie Melden Teilen Melden Teilen 1 von 105 Jetzt herunterladenDownloaden Sie, um offline zu lesen SEITE 1 SEITE 2 SEITE 3 SEITE 4 SEITE 5 SEITE 6 SEITE 7 SEITE 8 SEITE 9 SEITE 10 SEITE 11 SEITE 12 SEITE 13 SEITE 14 SEITE 15 SEITE 16 SEITE 17 SEITE 18 SEITE 19 SEITE 20 SEITE 21 SEITE 22 SEITE 23 SEITE 24 SEITE 25 SEITE 26 SEITE 27 SEITE 28 SEITE 29 SEITE 30 SEITE 31 SEITE 32 SEITE 33 SEITE 34 SEITE 35 SEITE 36 SEITE 37 SEITE 38 SEITE 39 SEITE 40 SEITE 41 SEITE 42 SEITE 43 SEITE 44 SEITE 45 SEITE 46 SEITE 47 SEITE 48 SEITE 49 SEITE 50 SEITE 51 SEITE 52 SEITE 53 SEITE 54 SEITE 55 SEITE 56 SEITE 57 SEITE 58 SEITE 59 SEITE 60 SEITE 61 SEITE 62 SEITE 63 SEITE 64 SEITE 65 SEITE 66 SEITE 67 SEITE 68 SEITE 69 SEITE 70 SEITE 71 SEITE 72 SEITE 73 SEITE 74 SEITE 75 SEITE 76 SEITE 77 SEITE 78 SEITE 79 SEITE 80 SEITE 81 SEITE 82 SEITE 83 SEITE 84 SEITE 85 SEITE 86 SEITE 87 SEITE 88 SEITE 89 SEITE 90 SEITE 91 SEITE 92 SEITE 93 SEITE 94 SEITE 95 SEITE 96 SEITE 97 SEITE 98 SEITE 99 SEITE 100 SEITE 101 SEITE 102 SEITE 103 SEITE 104 SEITE 105 EMPFOHLEN Mane ts von nunnaswathi Mane ts Nunna Swathi 103 views•27 Folien This document provides an overview of mobile ad hoc networks (MANETs). It defines MANETs as wireless networks without fixed infrastructure where nodes are free to move and dynamically self-organize. Key points: - MANETs are formed spontaneously as nodes connect via wireless links without centralized administration. - Each node acts as a router, forwarding data for other nodes. Network topology changes frequently as nodes move. - Examples of MANET applications include military operations, emergency response, classroom environments, and home/office networks. - Challenges for MANET routing protocols include dynamic topology, limited resources, and network security. Common routing approaches include proactive, reactive, and geographic routing. Applications of ad hoc and wireless sensor networks von paruvathavardhinipra Applications of ad hoc and wireless sensor networks paruvathavardhinipra 655 views•25 Folien This document discusses ad hoc and wireless sensor networks. It describes several applications of ad hoc networks including military operations, collaborative work, emergency response, and wireless mesh networks. It also discusses wireless sensor networks and their use in fields like healthcare, environmental monitoring, and more. Finally, it outlines some of the major challenges in designing routing protocols for ad hoc networks such as mobility, bandwidth constraints, and resource limitations. Ad hoc wireless networks-Overview von paruvathavardhinipra Ad hoc wireless networks-Overview paruvathavardhinipra 210 views•31 Folien The document discusses key concepts related to ad hoc and wireless sensor networks. It defines ad hoc networks as infrastructureless, decentralized wireless networks where nodes can act as both senders and receivers and dynamically route data through other nodes. It covers routing algorithms, single vs multi-hop communication, unicast vs broadcast vs multicast transmission, and compares ad hoc networks to cellular networks and WANETs/MANETs. Application areas like military, emergency response, and wireless sensor networks are also mentioned. Improvement Of DSR Protocol von karumanchirk Improvement Of DSR Protocol Rajesh Karumanchi 4K views•33 Folien Interim Report on thesis we've worked... "Reactive Routing Protocols for Ad-Hoc Networks : Improvement of DSR Protocol" Manet von pushkardutt3 Manet Pushkar Dutt 13.2K views•12 Folien Mobile Ad hoc Networks (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. A mobile adhoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a Mobile Adhoc Network usually seek the help of other intermediate nodes to establish communication channels. In such an environment, malicious intermediate nodes can be a threat to the security of conversation between mobile nodes. The security experience from the Wired Network world is of little use in Wireless Mobile Ad hoc networks, due to some basic di_erences between the two Networks. Therefore, some novel solutions are required to make Mobile Adhoc Network secure. CHAPTER-1234 von BilalAnjum3 CHAPTER-1234 Bilal Anjum 412 views•88 Folien The document discusses WiFi-based mobility detection in mobile ad hoc networks. It introduces mobile ad hoc networks and describes their key characteristics, including being infrastructureless, multi-hop routing, dynamic topology, and energy constraints. It also discusses some example application scenarios for MANETs and different routing protocols used in MANETs, categorizing them as proactive, reactive, or hybrid and describing Destination-Sequenced Distance-Vector (DSDV) routing as one proactive protocol. Adhoc wireless networks and its issues von Menagakarthick Adhoc wireless networks and its issues Menaga Selvaraj 1.3K views•52 Folien This PPt will elaborate unit -1 in the subject of EC8702- Adhoc and Wireless Sensor Network for Engineering students. Manet von ankurtrip123 Manet Ankur Tripathi 1.3K views•13 Folien This document discusses mobile ad hoc networks (MANETs) and outlines some key challenges related to routing and security in these networks. It provides background on MANETs, explaining that they are infrastructure-less wireless networks where nodes can freely and dynamically self-organize. It then summarizes some of the main challenges like frequently changing topologies, limited resources of mobile nodes, and security issues like denial of service attacks. The document also gives an overview of different routing protocols for MANETs and requirements for these protocols to address challenges like frequent path breaks and bandwidth constraints. It concludes that comprehensive security solutions are still needed to address both routing and cooperation enforcement issues in these challenging ad hoc network environments. Mobility management in adhoc network von AmanSaurabh1 Mobility management in adhoc network Aman Saurabh 2.4K views•8 Folien This document discusses mobility management in mobile ad-hoc networks (MANETs). It begins by introducing MANETs and explaining that they are temporary networks formed spontaneously via wireless communication between mobile nodes without centralized administration. It then discusses the need for mobility management, including location management and handoff management routing protocols. It also discusses different types of node mobility and mobility models for predicting node movement patterns over time in MANETs. The document categorizes mobility models as trace-based (using real movement data) or synthetic-based (simulating realistic movement), and lists examples of models within each category like the random waypoint and reference point group mobility models. Adhoc technologies von shashi712 Adhoc technologies shashi712 1.2K views•12 Folien The document discusses different types of wireless networks including Mobile Ad Hoc Networks (MANETs), Wireless Sensor Networks (WSNs), and Vehicular Ad Hoc Networks (VANETs). It provides an overview of the key characteristics of each network type, such as their topology, communication paradigms, and constraints. MANETs allow nodes to connect and communicate in a decentralized manner without infrastructure support. WSNs consist of dense deployments of low-cost sensor nodes that collect and transmit data. VANETs are similar to MANETs but involve vehicle-to-vehicle communication and have more predictable mobility patterns. Lecture 3 4. prnet von cprakash2011 Lecture 3 4. prnet Chandra Meena 6.1K views•51 Folien This document discusses the origins and development of ad hoc networks. It describes how packet radio networks (PRNETs) in the 1970s, developed by DARPA, were the first generation of ad hoc networks. PRNETs used multi-hop routing between mobile radio terminals and packet radios to communicate without fixed infrastructure. The document outlines the key components and routing techniques of PRNETs, including point-to-point and broadcast routing. It also discusses how subsequent generations in the 1980s-1990s focused on improving performance, scalability, and developing commercial applications like Bluetooth. MOBILE Ad-Hoc NETWORK (MANET) von MonodipSinghaRoy MOBILE Ad-Hoc NETWORK (MANET) Monodip Singha Roy 5.5K views•26 Folien This document discusses mobile ad-hoc networks (MANETs). It defines MANETs as collections of wireless mobile nodes that can dynamically form a network without any centralized administration. The document outlines the characteristics, mechanisms, transmission standards, routing protocols, applications, and future aspects of MANETs. It explains that MANETs are self-configuring, infrastructureless networks suitable for situations where fixed networks are not available or are too expensive to deploy. EC8702 adhoc and wireless sensor networks iv ece von GOWTHAMMS6 EC8702 adhoc and wireless sensor networks iv ece GOWTHAMMS6 3.7K views•109 Folien This document outlines the syllabus for a course on Adhoc and Wireless Sensor Networks. It covers five units: (1) Introduction to Adhoc Networks and routing protocols, (2) Introduction to sensor networks and architectures, (3) Networking concepts and protocols for sensor networks, (4) Security issues in sensor networks, and (5) Sensor network platforms and tools. Some key topics discussed include characteristics of adhoc networks, challenges in routing, components and applications of wireless sensor networks, and medium access schemes. The objectives are for students to learn the fundamentals and apply their knowledge to identify suitable protocols based on network requirements and understand security and transport layer issues in these networks. Adhoc & WSN-Unit-I-Ragavan von ragavan1989 Adhoc & WSN-Unit-I-Ragavan Ragavan K 251 views•96 Folien This document outlines the course objectives, syllabus, and outcomes for the course EC8702 Ad Hoc and Wireless Sensor Networks. The course aims to teach students about ad hoc network and sensor network fundamentals, routing protocols, sensor network architecture and design issues, transport layer and security issues, and sensor network platforms and tools. The syllabus covers topics like ad hoc network routing protocols, sensor network introductions and architectures, networking concepts and protocols, security issues, and sensor network platforms. Upon completing the course, students will gain knowledge of ad hoc and sensor networks and be able to apply this to identify suitable protocols and address issues in these networks. 207088 633815660985047486 von SathishPilla 207088 633815660985047486 Sathish Pilla 491 views•36 Folien This document provides an overview of mobile ad-hoc networks, including a brief history and introduction. It discusses the key differences between infrastructure-based networks and infrastructure-less networks. It also covers routing protocols, setting up a simple ad-hoc network, pros and cons of ad-hoc networks, wireless ad-hoc sensor networks, differences between cellular and ad-hoc networks, and future research directions. Introduction to mobile ad hoc network von prajapatashish009 Introduction to mobile ad hoc network Ashish Prajapat 295 views•15 Folien This document discusses mobile ad-hoc networks (MANETs). It defines MANETs as self-configuring networks composed of mobile routers that connect via wireless links to form a temporary, random topology. MANETs are suitable for situations where infrastructure is not available or practical, such as emergency response. The document outlines the characteristics of MANETs, including that they are decentralized and nodes participate in routing by forwarding data. It also lists some applications of MANETs like military operations and disaster relief. Finally, it discusses challenges in MANETs like medium access, routing, security and energy management. Introduction to AWSN von PeriyanayagiS Introduction to AWSN PeriyanayagiS 139 views•17 Folien The document discusses the syllabus for the course EC8702 Adhoc and Wireless Sensor Networks. The syllabus covers topics like adhoc network routing protocols, sensor network architecture and design issues, transport layer and security protocols for adhoc and sensor networks, and programming platforms and tools. The course objectives are to learn the fundamentals of adhoc and sensor networks, apply routing algorithms, identify physical and MAC layer protocols, and describe transport layer and security issues. Upon completing the course, students will be able to explain adhoc and sensor network basics, apply routing algorithms, identify protocols, describe transport and security issues, and program sensor nodes. Mobile Ad Hoc Network or MANNET von telecomsutra Mobile Ad Hoc Network or MANNET telecomsutra 1.9K views•16 Folien A Session on Mobile Ad-hoc Networks and other emerging Telecom Trends Visit www.telecomSutra.com for more on Telecom concepts and trends. Unit 7 von poonampkc Unit 7 Assistant Professor 6.5K views•23 Folien Mobile ad hoc networks (MANETs) are wireless networks without a fixed infrastructure. Each node acts as both a host and a router, forwarding packets for other nodes. MANETs have dynamic topologies as nodes can move freely. They are used in applications like military operations, emergency response, and conferences. Routing in MANETs is challenging due to the dynamic topology. Common routing protocols for MANETs include DSDV, AODV, DSR, and ZRP. DSDV adds sequence numbers to distance vector routing to avoid loops from topology changes. DSR is an on-demand routing protocol where the source determines the complete path to the destination. Centralized System in MANET with GRP Protocol von ijceronline Centralized System in MANET with GRP Protocol ijceronline 19 views•6 Folien This document summarizes a research paper on implementing a centralized system in a mobile ad hoc network (MANET) using the Gathering based Routing Protocol (GRP). It begins by introducing MANETs and their characteristics like dynamic topology. It then describes centralized systems and how they differ from decentralized networks like MANETs. Next, it discusses vulnerabilities of MANETs and challenges in routing. The GRP protocol is explained along with its advantages and disadvantages. The document outlines a simulation setup comparing network performance between a MANET and one with a centralized system using GRP with hello packet exchanges. Results showed the centralized system had better performance. The conclusion is that GRP protocol performs better in MANETs with a centralized system. Sensor Networks Introduction and Architecture von PeriyanayagiS Sensor Networks Introduction and Architecture PeriyanayagiS 1.3K views•100 Folien This document provides an overview of sensor networks and wireless sensor network architectures. It begins with an introduction to wireless sensor networks and their components. It then discusses the topics, challenges, and enabling technologies for WSNs. The document outlines the architecture of a sensor node and its goals. It provides examples of WSN applications and discusses sensor network deployment considerations. Finally, it addresses the design challenges, operational challenges, and required mechanisms for WSNs to meet their requirements. Mobile Ad-hoc Network (MANET) Applications von kushwaha_sushant Mobile Ad-hoc Network (MANET) Applications Sushant Kushwaha 3.2K views•15 Folien Mobile ad-hoc networks (MANETs) allow for content distribution, information dissemination, and file sharing between Bluetooth and WiFi devices in an enterprise network. MANETs form multicast tree topologies to disseminate data packets between nodes, with clusters of nodes creating a multicast tree structure. Mesh networks provide robust data services for mobile networks through dynamic autonomous topology segments as an inexpensive alternative to infrastructure-based cellular networks. Protocols like PUMA create mesh networks connecting MANET nodes with multiple paths between senders and receivers to improve packet delivery in mobile environments. MANETs also enable applications like remote imaging, messaging, and file transfers between devices like cameras and smartphones. Lecture 1 mobile and adhoc network- introduction von cprakash2011 Lecture 1 mobile and adhoc network- introduction Chandra Meena 18.4K views•52 Folien This document provides an overview of a course on mobile and ad hoc networks. It lists two textbooks that will be used and states that the goal is to cover fundamental design issues and solutions for network architecture and protocols. It also lists some related websites and outlines the objectives of chapters that will introduce wireless communication technologies, network standards, and multiple access techniques for ad hoc networks. MANET routing protocols Issues and Classifications von ArunChokkalingam MANET routing protocols Issues and Classifications ArunChokkalingam 502 views•25 Folien Introduction about routing Issues in designing a routing protocol Characteristics of an ideal routing protocol Classifications of routing protocols Adhoc networks notes by divya (rnsit) von vivekmaurya32 Adhoc networks notes by divya (rnsit) Vivek Maurya 5K views•75 Folien This document provides notes on ad hoc networks from R N S Institute of Technology. It begins with an introduction comparing cellular and ad hoc wireless networks. Ad hoc networks are infrastructureless networks that use multi-hop radio relaying. The document then discusses applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also covers key issues in ad hoc networks including medium access, routing, multicasting, and energy management. The first unit focuses on these introductory concepts and applications of ad hoc networks. Ad-hoc Networks by Ashok Panwar von AshokPanwar3 Ad-hoc Networks by Ashok Panwar Ashok Panwar 176 views•89 Folien The document discusses ad hoc networks and routing protocols. It begins with an introduction to mobile ad hoc networks (MANETs), including their characteristics and applications. Several categories of routing protocols are described, including table-driven protocols like Destination Sequenced Distance Vector Routing (DSDV) and Cluster-head Gateway Switch Routing (CGSR), as well as source-initiated on-demand protocols like Dynamic Source Routing (DSR). The document provides examples and explanations of how these different protocols perform routing in MANETs. Ad-Hoc Networks von ENGMSHARI Ad-Hoc Networks Mshari Alabdulkarim 109.5K views•55 Folien The document discusses ad-hoc networks and their key characteristics. It describes several challenges in ad-hoc networks including limited battery power, dynamic network topology, and scalability issues. It also summarizes several ad-hoc network routing protocols (e.g. DSDV, AODV, DSR), addressing both table-driven and on-demand approaches. Additionally, it outlines some ad-hoc MAC protocols like MACA and PAMAS that aim to manage shared wireless medium access. Survey of Reactive Routing Protocols for MANET von IOSR Survey of Reactive Routing Protocols for MANET IOSR Journals 346 views•9 Folien A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. The main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides a scalable solution to relatively large network topologies. The design follows the idea that each node tries to reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is needed. The performance differentials are analyzed using varying performance metrics. These simulations are carried out using the ns-2 network simulator IT6601 Mobile Computing Unit IV von pkaviya IT6601 Mobile Computing Unit IV pkaviya 445 views•80 Folien Mobile ad-hoc networks (MANETs) are self-configuring networks formed by mobile devices without any fixed infrastructure. Routing in MANETs is complex due to frequent topology changes from node movement and failures. The document discusses characteristics of MANETs such as dynamic topology and limited bandwidth. It also covers routing challenges, different routing protocol types (proactive, reactive, hybrid), and examples like Destination-Sequenced Distance-Vector Routing (DSDV) which is a proactive table-driven protocol that uses sequence numbers to avoid routing loops. WMN Chapter5.pptx von damayanti68 WMN Chapter5.pptx damayanti68 111 views•9 Folien Mobile ad-hoc networks (MANETs) are formed spontaneously by wireless devices without any preexisting infrastructure. Nodes in a MANET are free to move randomly and organize themselves arbitrarily, so the network topology can change unpredictably. MANETs have advantages like decentralized administration and self-configuration, but also challenges like limited bandwidth, dynamic topology, and security threats. Applications of MANETs include personal devices like cell phones communicating directly, military environments, emergency response situations, and more. WEITERE ÄHNLICHE INHALTE WAS IST ANGESAGT? Mobility management in adhoc network von AmanSaurabh1 Mobility management in adhoc network Aman Saurabh 2.4K views•8 Folien This document discusses mobility management in mobile ad-hoc networks (MANETs). It begins by introducing MANETs and explaining that they are temporary networks formed spontaneously via wireless communication between mobile nodes without centralized administration. It then discusses the need for mobility management, including location management and handoff management routing protocols. It also discusses different types of node mobility and mobility models for predicting node movement patterns over time in MANETs. The document categorizes mobility models as trace-based (using real movement data) or synthetic-based (simulating realistic movement), and lists examples of models within each category like the random waypoint and reference point group mobility models. Adhoc technologies von shashi712 Adhoc technologies shashi712 1.2K views•12 Folien The document discusses different types of wireless networks including Mobile Ad Hoc Networks (MANETs), Wireless Sensor Networks (WSNs), and Vehicular Ad Hoc Networks (VANETs). It provides an overview of the key characteristics of each network type, such as their topology, communication paradigms, and constraints. MANETs allow nodes to connect and communicate in a decentralized manner without infrastructure support. WSNs consist of dense deployments of low-cost sensor nodes that collect and transmit data. VANETs are similar to MANETs but involve vehicle-to-vehicle communication and have more predictable mobility patterns. Lecture 3 4. prnet von cprakash2011 Lecture 3 4. prnet Chandra Meena 6.1K views•51 Folien This document discusses the origins and development of ad hoc networks. It describes how packet radio networks (PRNETs) in the 1970s, developed by DARPA, were the first generation of ad hoc networks. PRNETs used multi-hop routing between mobile radio terminals and packet radios to communicate without fixed infrastructure. The document outlines the key components and routing techniques of PRNETs, including point-to-point and broadcast routing. It also discusses how subsequent generations in the 1980s-1990s focused on improving performance, scalability, and developing commercial applications like Bluetooth. MOBILE Ad-Hoc NETWORK (MANET) von MonodipSinghaRoy MOBILE Ad-Hoc NETWORK (MANET) Monodip Singha Roy 5.5K views•26 Folien This document discusses mobile ad-hoc networks (MANETs). It defines MANETs as collections of wireless mobile nodes that can dynamically form a network without any centralized administration. The document outlines the characteristics, mechanisms, transmission standards, routing protocols, applications, and future aspects of MANETs. It explains that MANETs are self-configuring, infrastructureless networks suitable for situations where fixed networks are not available or are too expensive to deploy. EC8702 adhoc and wireless sensor networks iv ece von GOWTHAMMS6 EC8702 adhoc and wireless sensor networks iv ece GOWTHAMMS6 3.7K views•109 Folien This document outlines the syllabus for a course on Adhoc and Wireless Sensor Networks. It covers five units: (1) Introduction to Adhoc Networks and routing protocols, (2) Introduction to sensor networks and architectures, (3) Networking concepts and protocols for sensor networks, (4) Security issues in sensor networks, and (5) Sensor network platforms and tools. Some key topics discussed include characteristics of adhoc networks, challenges in routing, components and applications of wireless sensor networks, and medium access schemes. The objectives are for students to learn the fundamentals and apply their knowledge to identify suitable protocols based on network requirements and understand security and transport layer issues in these networks. Adhoc & WSN-Unit-I-Ragavan von ragavan1989 Adhoc & WSN-Unit-I-Ragavan Ragavan K 251 views•96 Folien This document outlines the course objectives, syllabus, and outcomes for the course EC8702 Ad Hoc and Wireless Sensor Networks. The course aims to teach students about ad hoc network and sensor network fundamentals, routing protocols, sensor network architecture and design issues, transport layer and security issues, and sensor network platforms and tools. The syllabus covers topics like ad hoc network routing protocols, sensor network introductions and architectures, networking concepts and protocols, security issues, and sensor network platforms. Upon completing the course, students will gain knowledge of ad hoc and sensor networks and be able to apply this to identify suitable protocols and address issues in these networks. 207088 633815660985047486 von SathishPilla 207088 633815660985047486 Sathish Pilla 491 views•36 Folien This document provides an overview of mobile ad-hoc networks, including a brief history and introduction. It discusses the key differences between infrastructure-based networks and infrastructure-less networks. It also covers routing protocols, setting up a simple ad-hoc network, pros and cons of ad-hoc networks, wireless ad-hoc sensor networks, differences between cellular and ad-hoc networks, and future research directions. Introduction to mobile ad hoc network von prajapatashish009 Introduction to mobile ad hoc network Ashish Prajapat 295 views•15 Folien This document discusses mobile ad-hoc networks (MANETs). It defines MANETs as self-configuring networks composed of mobile routers that connect via wireless links to form a temporary, random topology. MANETs are suitable for situations where infrastructure is not available or practical, such as emergency response. The document outlines the characteristics of MANETs, including that they are decentralized and nodes participate in routing by forwarding data. It also lists some applications of MANETs like military operations and disaster relief. Finally, it discusses challenges in MANETs like medium access, routing, security and energy management. Introduction to AWSN von PeriyanayagiS Introduction to AWSN PeriyanayagiS 139 views•17 Folien The document discusses the syllabus for the course EC8702 Adhoc and Wireless Sensor Networks. The syllabus covers topics like adhoc network routing protocols, sensor network architecture and design issues, transport layer and security protocols for adhoc and sensor networks, and programming platforms and tools. The course objectives are to learn the fundamentals of adhoc and sensor networks, apply routing algorithms, identify physical and MAC layer protocols, and describe transport layer and security issues. Upon completing the course, students will be able to explain adhoc and sensor network basics, apply routing algorithms, identify protocols, describe transport and security issues, and program sensor nodes. Mobile Ad Hoc Network or MANNET von telecomsutra Mobile Ad Hoc Network or MANNET telecomsutra 1.9K views•16 Folien A Session on Mobile Ad-hoc Networks and other emerging Telecom Trends Visit www.telecomSutra.com for more on Telecom concepts and trends. Unit 7 von poonampkc Unit 7 Assistant Professor 6.5K views•23 Folien Mobile ad hoc networks (MANETs) are wireless networks without a fixed infrastructure. Each node acts as both a host and a router, forwarding packets for other nodes. MANETs have dynamic topologies as nodes can move freely. They are used in applications like military operations, emergency response, and conferences. Routing in MANETs is challenging due to the dynamic topology. Common routing protocols for MANETs include DSDV, AODV, DSR, and ZRP. DSDV adds sequence numbers to distance vector routing to avoid loops from topology changes. DSR is an on-demand routing protocol where the source determines the complete path to the destination. Centralized System in MANET with GRP Protocol von ijceronline Centralized System in MANET with GRP Protocol ijceronline 19 views•6 Folien This document summarizes a research paper on implementing a centralized system in a mobile ad hoc network (MANET) using the Gathering based Routing Protocol (GRP). It begins by introducing MANETs and their characteristics like dynamic topology. It then describes centralized systems and how they differ from decentralized networks like MANETs. Next, it discusses vulnerabilities of MANETs and challenges in routing. The GRP protocol is explained along with its advantages and disadvantages. The document outlines a simulation setup comparing network performance between a MANET and one with a centralized system using GRP with hello packet exchanges. Results showed the centralized system had better performance. The conclusion is that GRP protocol performs better in MANETs with a centralized system. Sensor Networks Introduction and Architecture von PeriyanayagiS Sensor Networks Introduction and Architecture PeriyanayagiS 1.3K views•100 Folien This document provides an overview of sensor networks and wireless sensor network architectures. It begins with an introduction to wireless sensor networks and their components. It then discusses the topics, challenges, and enabling technologies for WSNs. The document outlines the architecture of a sensor node and its goals. It provides examples of WSN applications and discusses sensor network deployment considerations. Finally, it addresses the design challenges, operational challenges, and required mechanisms for WSNs to meet their requirements. Mobile Ad-hoc Network (MANET) Applications von kushwaha_sushant Mobile Ad-hoc Network (MANET) Applications Sushant Kushwaha 3.2K views•15 Folien Mobile ad-hoc networks (MANETs) allow for content distribution, information dissemination, and file sharing between Bluetooth and WiFi devices in an enterprise network. MANETs form multicast tree topologies to disseminate data packets between nodes, with clusters of nodes creating a multicast tree structure. Mesh networks provide robust data services for mobile networks through dynamic autonomous topology segments as an inexpensive alternative to infrastructure-based cellular networks. Protocols like PUMA create mesh networks connecting MANET nodes with multiple paths between senders and receivers to improve packet delivery in mobile environments. MANETs also enable applications like remote imaging, messaging, and file transfers between devices like cameras and smartphones. Lecture 1 mobile and adhoc network- introduction von cprakash2011 Lecture 1 mobile and adhoc network- introduction Chandra Meena 18.4K views•52 Folien This document provides an overview of a course on mobile and ad hoc networks. It lists two textbooks that will be used and states that the goal is to cover fundamental design issues and solutions for network architecture and protocols. It also lists some related websites and outlines the objectives of chapters that will introduce wireless communication technologies, network standards, and multiple access techniques for ad hoc networks. MANET routing protocols Issues and Classifications von ArunChokkalingam MANET routing protocols Issues and Classifications ArunChokkalingam 502 views•25 Folien Introduction about routing Issues in designing a routing protocol Characteristics of an ideal routing protocol Classifications of routing protocols Adhoc networks notes by divya (rnsit) von vivekmaurya32 Adhoc networks notes by divya (rnsit) Vivek Maurya 5K views•75 Folien This document provides notes on ad hoc networks from R N S Institute of Technology. It begins with an introduction comparing cellular and ad hoc wireless networks. Ad hoc networks are infrastructureless networks that use multi-hop radio relaying. The document then discusses applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also covers key issues in ad hoc networks including medium access, routing, multicasting, and energy management. The first unit focuses on these introductory concepts and applications of ad hoc networks. Ad-hoc Networks by Ashok Panwar von AshokPanwar3 Ad-hoc Networks by Ashok Panwar Ashok Panwar 176 views•89 Folien The document discusses ad hoc networks and routing protocols. It begins with an introduction to mobile ad hoc networks (MANETs), including their characteristics and applications. Several categories of routing protocols are described, including table-driven protocols like Destination Sequenced Distance Vector Routing (DSDV) and Cluster-head Gateway Switch Routing (CGSR), as well as source-initiated on-demand protocols like Dynamic Source Routing (DSR). The document provides examples and explanations of how these different protocols perform routing in MANETs. Ad-Hoc Networks von ENGMSHARI Ad-Hoc Networks Mshari Alabdulkarim 109.5K views•55 Folien The document discusses ad-hoc networks and their key characteristics. It describes several challenges in ad-hoc networks including limited battery power, dynamic network topology, and scalability issues. It also summarizes several ad-hoc network routing protocols (e.g. DSDV, AODV, DSR), addressing both table-driven and on-demand approaches. Additionally, it outlines some ad-hoc MAC protocols like MACA and PAMAS that aim to manage shared wireless medium access. Survey of Reactive Routing Protocols for MANET von IOSR Survey of Reactive Routing Protocols for MANET IOSR Journals 346 views•9 Folien A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. The main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides a scalable solution to relatively large network topologies. The design follows the idea that each node tries to reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is needed. The performance differentials are analyzed using varying performance metrics. These simulations are carried out using the ns-2 network simulator WAS IST ANGESAGT? (20) Mobility management in adhoc network von AmanSaurabh1 Mobility management in adhoc network Aman Saurabh•2.4K views Adhoc technologies von shashi712 Adhoc technologies shashi712•1.2K views Lecture 3 4. prnet von cprakash2011 Lecture 3 4. prnet Chandra Meena•6.1K views MOBILE Ad-Hoc NETWORK (MANET) von MonodipSinghaRoy MOBILE Ad-Hoc NETWORK (MANET) Monodip Singha Roy•5.5K views EC8702 adhoc and wireless sensor networks iv ece von GOWTHAMMS6 EC8702 adhoc and wireless sensor networks iv ece GOWTHAMMS6•3.7K views Adhoc & WSN-Unit-I-Ragavan von ragavan1989 Adhoc & WSN-Unit-I-Ragavan Ragavan K•251 views 207088 633815660985047486 von SathishPilla 207088 633815660985047486 Sathish Pilla•491 views Introduction to mobile ad hoc network von prajapatashish009 Introduction to mobile ad hoc network Ashish Prajapat•295 views Introduction to AWSN von PeriyanayagiS Introduction to AWSN PeriyanayagiS•139 views Mobile Ad Hoc Network or MANNET von telecomsutra Mobile Ad Hoc Network or MANNET telecomsutra•1.9K views Unit 7 von poonampkc Unit 7 Assistant Professor•6.5K views Centralized System in MANET with GRP Protocol von ijceronline Centralized System in MANET with GRP Protocol ijceronline•19 views Sensor Networks Introduction and Architecture von PeriyanayagiS Sensor Networks Introduction and Architecture PeriyanayagiS•1.3K views Mobile Ad-hoc Network (MANET) Applications von kushwaha_sushant Mobile Ad-hoc Network (MANET) Applications Sushant Kushwaha•3.2K views Lecture 1 mobile and adhoc network- introduction von cprakash2011 Lecture 1 mobile and adhoc network- introduction Chandra Meena•18.4K views MANET routing protocols Issues and Classifications von ArunChokkalingam MANET routing protocols Issues and Classifications ArunChokkalingam•502 views Adhoc networks notes by divya (rnsit) von vivekmaurya32 Adhoc networks notes by divya (rnsit) Vivek Maurya•5K views Ad-hoc Networks by Ashok Panwar von AshokPanwar3 Ad-hoc Networks by Ashok Panwar Ashok Panwar•176 views Ad-Hoc Networks von ENGMSHARI Ad-Hoc Networks Mshari Alabdulkarim•109.5K views Survey of Reactive Routing Protocols for MANET von IOSR Survey of Reactive Routing Protocols for MANET IOSR Journals•346 views ÄHNLICH WIE MOBILE COMPUTING MOBILE ADHOC NETWORKS (MANETS) IT6601 Mobile Computing Unit IV von pkaviya IT6601 Mobile Computing Unit IV pkaviya 445 views•80 Folien Mobile ad-hoc networks (MANETs) are self-configuring networks formed by mobile devices without any fixed infrastructure. Routing in MANETs is complex due to frequent topology changes from node movement and failures. The document discusses characteristics of MANETs such as dynamic topology and limited bandwidth. It also covers routing challenges, different routing protocol types (proactive, reactive, hybrid), and examples like Destination-Sequenced Distance-Vector Routing (DSDV) which is a proactive table-driven protocol that uses sequence numbers to avoid routing loops. WMN Chapter5.pptx von damayanti68 WMN Chapter5.pptx damayanti68 111 views•9 Folien Mobile ad-hoc networks (MANETs) are formed spontaneously by wireless devices without any preexisting infrastructure. Nodes in a MANET are free to move randomly and organize themselves arbitrarily, so the network topology can change unpredictably. MANETs have advantages like decentralized administration and self-configuration, but also challenges like limited bandwidth, dynamic topology, and security threats. Applications of MANETs include personal devices like cell phones communicating directly, military environments, emergency response situations, and more. Mobile Computing UNIT-7 von asistithod Mobile Computing UNIT-7 Ramesh Babu 8.5K views•46 Folien This document discusses mobile ad-hoc networks (MANETs) and wireless sensor networks. It describes how MANETs are self-configuring networks formed by mobile nodes connected wirelessly without any fixed infrastructure. Each node acts as a router to forward packets. Wireless sensor networks are similar but use smart sensor nodes that can sense environmental data and disseminate it through the network. Examples of MANET and sensor network applications include content sharing between devices, industrial plant monitoring, and traffic monitoring. Security challenges in these networks are also discussed. An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ... von IOSR An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ... IOSR Journals 624 views•5 Folien This document provides an overview of mobile ad hoc networks (MANETs), including their applications, challenges, and comparisons of routing protocols. It discusses how MANETs are self-configuring networks of mobile nodes that communicate wirelessly without centralized administration. The document outlines several applications of MANETs, technological challenges in areas like routing, security, and power consumption. It also classifies and compares several popular routing protocols for MANETs like DSDV, AODV, DSR, evaluating them based on parameters like route selection method, topology structure, and ability to avoid loops. MANET.pptx von ssuser476e50 MANET.pptx ssuser476e50 72 views•12 Folien Mobile ad hoc network - A simple introduction, advantages and disadvantages, types , characteristics and future scope Manet ppt von PoojaRawat74 Manet ppt PoojaRawat74 47 views•13 Folien This document discusses mobile ad hoc networks (MANETs). It begins with an introduction to MANETs, describing their characteristics as peer-to-peer, self-forming, and self-healing wireless networks without a fixed infrastructure. The document then outlines the main types of MANETs: SPANs for smartphone networks, iMANETs that use internet protocols, and VANETs for vehicle communication networks. It provides examples of each type and their applications. In closing, the document briefly covers the merits and demerits of MANETs and potential future developments, such as improved security and testing under different conditions. Mobile adhoc von shivakrishnashekar Mobile adhoc Shiva Krishna Chandra Shekar 1.7K views•12 Folien This document provides a summary of routing protocols in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and their characteristics. It then discusses why traditional routing protocols are not suitable for MANETs and describes some common MANET routing protocols, classifying them as proactive (table-driven) or reactive (on-demand). Specifically, it provides detailed descriptions of the reactive protocols DSR and AODV, covering topics like route discovery, maintenance, and deletion. Finally, it compares these protocols and discusses which may be better suited under different network conditions. Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ... von DrUmangSingh Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ... Umang Singh 406 views•69 Folien This document discusses ad hoc networks and related research directions. It begins with an introduction to computer networks and wireless networks. It then covers classifications of wireless networks including cellular networks, wireless sensor networks, wireless mesh networks, and mobile ad hoc networks (MANETs). The document discusses MANETs in detail including paradigms, applications, and research issues related to routing, mobility, and resource constraints. It also discusses vehicular ad hoc networks (VANETs) and related challenges. Finally, it introduces flying ad hoc networks (FANETs) for communication between unmanned aerial vehicles and associated research issues like routing and coordination challenges. [IJET-V1I6P19] Authors : Kirti von IJETJOURNAL [IJET-V1I6P19] Authors : Kirti IJET - International Journal of Engineering and Techniques 171 views•11 Folien A MANET is an autonomous group of mobile users that communicate over reasonably slow wireless links. The network topology may vary rapidly and unpredictably over time, because the nodes are mobile. The network is decentralized, where all network activity, including discovering the topology and delivering messages must be executed by the nodes themselves. Hence routing functionality will have to be incorporated into the mobile nodes. MANET is a kind of wireless ad-hoc network and it is a self-configuring network of mobile routers (and associated hosts) connected by wireless links – the union of which forms an arbitrary topology. Such a network may operate in a standalone fashion, or may be connected to the larger Internet Problems in Ad Hoc Networks. Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N... von ijmter Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N... Editor IJMTER 735 views•11 Folien A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host node and a router so that all nodes can be source plus forwarders of traffic. The task of finding routes in Mobile Ad-hoc Network (MANET) is an important factor in determining the efficiency of any MANET routing protocols. This paper describes about the basic idea of different routing protocols and its efficient use in MANET. There are several routing protocols based on UNICAST and MULTICAST. This paper will conclude the main characteristics of these protocols with comparison and suggest the best suited protocol for particular topology or network. MOBILE COMPUTING MANETS,ROUTING ALGORITHMS von srivaniadudodla MOBILE COMPUTING MANETS,ROUTING ALGORITHMS Pallepati Vasavi 7.7K views•112 Folien Mobile Ad hoc Networks (MANETs) allow devices to connect spontaneously without infrastructure by acting as both hosts and routers, forwarding traffic in a multi-hop fashion. They face challenges from dynamic topology, limited bandwidth and security, and use reactive routing protocols like Dynamic Source Routing (DSR) that discover routes on demand through flooding route requests. MANETs have applications in military operations, disaster relief, vehicular networks, and personal area networks. A0110104 von IJRES A0110104 IJRES Journal 363 views•4 Folien International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability. adhoc wireless networks and its issues.pdf von paruvathavardhinij adhoc wireless networks and its issues.pdf paruvathavardhinij 11 views•52 Folien This document provides an overview of ad-hoc and wireless sensor networks. It begins by defining ad-hoc networks as temporary networks composed of mobile nodes that communicate without any fixed infrastructure. The key elements of ad-hoc networks include self-organization, distributed operation, and multi-hop routing. Several issues for ad-hoc networks are then discussed, including medium access, routing protocols, multicasting, transport layer protocols, pricing schemes, and quality of service provisioning. Specific challenges for each of these areas are outlined, such as mobility, bandwidth constraints, and error-prone wireless channels. Manet - The Art of Networking without a Network von smart26 Manet - The Art of Networking without a Network Tarun Varshney 4K views•31 Folien Mobile ad hoc network (MANET), or simply ad hoc network, comprises nodes that freely and dynamically self-organize into arbitrary and temporary network topology without any infrastructure support. Mobile ad hoc networks (manet) von VinishAlikkal Mobile ad hoc networks (manet) Vinish Alikkal 235 views•47 Folien MANET stands for mobile ad hoc network. It is a type of wireless network that can change locations and configure itself without a centralized administration. Nodes in a MANET can connect to each other to form a temporary network without any existing network infrastructure. Routing in MANETs is challenging due to the dynamic network topology, asymmetric links, and interference. Common routing algorithms for MANETs include distance vector, link state, and various protocols designed specifically for MANETs to handle mobility. Mobile ad hoc networks (MANET) for KTU von VinishAlikkal Mobile ad hoc networks (MANET) for KTU Vinish Alikkal 341 views•47 Folien MANET stands for mobile ad hoc network. It is a type of wireless network that can change locations and configure itself without a centralized administration. Nodes in a MANET can connect to each other to form a temporary network without any existing network infrastructure. Routing in MANETs is challenging due to the dynamic network topology, asymmetric links, and interference. Common routing algorithms for MANETs include distance vector, link state, and various protocols designed specifically for MANETs to handle mobility. adhoc applications.pptx von paruvathavardhinij adhoc applications.pptx paruvathavardhinij 4 views•25 Folien This document discusses ad hoc and wireless sensor networks. It describes several applications of ad hoc networks including military operations, collaborative work, emergency response, and wireless mesh networks. It also discusses wireless sensor networks and their use in fields like healthcare, environmental monitoring, and more. Finally, it outlines some of the major challenges in designing routing protocols for ad hoc networks such as mobility, bandwidth constraints, and resource limitations. Ioe module 4 von nikshaikh786 Ioe module 4 nikshaikh786 491 views•90 Folien Wireless sensor networks use large numbers of small, low-cost sensors that communicate wirelessly to monitor conditions like temperature, sound, pollution levels, pressure, etc. Sensors collect data and pass it to a base station, which can be accessed through the internet. Wireless sensor networks can be used for applications like environmental monitoring, smart grids, healthcare, agriculture, and more. They face challenges related to power efficiency, security, scalability and operating in different environments. Computer Network Introduction full von aneebkmct Computer Network Introduction full aneebkmct 158 views•84 Folien The document discusses different types of computer networks: - Local Area Network (LAN) connects devices within a home or office building and allows sharing of resources. - Metropolitan Area Network (MAN) spans a larger area like a city and provides high-speed connectivity. - Wide Area Network (WAN) connects multiple LANs over long distances using technologies like telephone lines. - Personal Area Network (PAN) enables communication among devices near an individual's body within a few meters. The document also describes different network topologies like star, bus, ring and mesh, and the OSI and TCP/IP network models. Unit 7 von vamsitricks Unit 7 vamsitricks 759 views•23 Folien Mobile ad hoc networks (MANETs) are wireless networks without a fixed infrastructure. Each node acts as both a host and a router, forwarding packets for other nodes. Routing in MANETs is challenging due to the dynamic topology from node mobility. Common routing protocols for MANETs include proactive (table-driven) protocols that maintain up-to-date routing tables and reactive (on-demand) protocols that find routes only when needed to limit overhead. Dynamic Source Routing (DSR) is a reactive routing protocol that uses source routing, where the data packet carries the complete hop-by-hop route to the destination. ÄHNLICH WIE MOBILE COMPUTING MOBILE ADHOC NETWORKS (MANETS) (20) IT6601 Mobile Computing Unit IV von pkaviya IT6601 Mobile Computing Unit IV pkaviya•445 views WMN Chapter5.pptx von damayanti68 WMN Chapter5.pptx damayanti68•111 views Mobile Computing UNIT-7 von asistithod Mobile Computing UNIT-7 Ramesh Babu•8.5K views An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ... von IOSR An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ... IOSR Journals•624 views MANET.pptx von ssuser476e50 MANET.pptx ssuser476e50•72 views Manet ppt von PoojaRawat74 Manet ppt PoojaRawat74•47 views Mobile adhoc von shivakrishnashekar Mobile adhoc Shiva Krishna Chandra Shekar•1.7K views Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ... von DrUmangSingh Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ... Umang Singh•406 views [IJET-V1I6P19] Authors : Kirti von IJETJOURNAL [IJET-V1I6P19] Authors : Kirti IJET - International Journal of Engineering and Techniques•171 views Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N... von ijmter Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N... Editor IJMTER•735 views MOBILE COMPUTING MANETS,ROUTING ALGORITHMS von srivaniadudodla MOBILE COMPUTING MANETS,ROUTING ALGORITHMS Pallepati Vasavi•7.7K views A0110104 von IJRES A0110104 IJRES Journal•363 views adhoc wireless networks and its issues.pdf von paruvathavardhinij adhoc wireless networks and its issues.pdf paruvathavardhinij•11 views Manet - The Art of Networking without a Network von smart26 Manet - The Art of Networking without a Network Tarun Varshney•4K views Mobile ad hoc networks (manet) von VinishAlikkal Mobile ad hoc networks (manet) Vinish Alikkal•235 views Mobile ad hoc networks (MANET) for KTU von VinishAlikkal Mobile ad hoc networks (MANET) for KTU Vinish Alikkal•341 views adhoc applications.pptx von paruvathavardhinij adhoc applications.pptx paruvathavardhinij•4 views Ioe module 4 von nikshaikh786 Ioe module 4 nikshaikh786•491 views Computer Network Introduction full von aneebkmct Computer Network Introduction full aneebkmct•158 views Unit 7 von vamsitricks Unit 7 vamsitricks•759 views DIASHOWS FÜR SIE Digital twins ppt von travel_affair Digital twins ppttravel_affair 59.3K views•21 Folien Robotic Process Automation (RPA) von MufaddalNullwala1 Robotic Process Automation (RPA)Mufaddal Nullwala 79.2K views•25 Folien A Product Requirements Document (PRD) Sample von RickWingenderMBAPMPA A Product Requirements Document (PRD) SampleRick Wingender, MBA, MS, PMP, CSPO 107.4K views•145 Folien Final Year Project von mbilalk315 Final Year ProjectMuhammad Khan 258.8K views•26 Folien Web scraping von SelectoCompany Web scrapingSelecto 20.3K views•15 Folien Business intelligence von rla1022 Business intelligenceRandy L. Archambault 64.9K views•29 Folien The Rise Of Low-Code And No-Code Platforms And Its Future | SynergyTop von Stevejohn70 The Rise Of Low-Code And No-Code Platforms And Its Future | SynergyTopSynergyTop Inc 1K views•6 Folien Artificial Intelligence Application in Oil and Gas von sparkcognition Artificial Intelligence Application in Oil and GasSparkCognition 6.9K views•24 Folien Big Data and Advanced Analytics von McK_CMSOForum Big Data and Advanced AnalyticsMcKinsey on Marketing & Sales 261.9K views•30 Folien An example of a successful proof of concept von ETLSolutions An example of a successful proof of conceptETLSolutions 146.5K views•8 Folien Building a Data Streaming Center of Excellence With Steve Gonzalez and Derek ... von HostedbyConfluent Building a Data Streaming Center of Excellence With Steve Gonzalez and Derek ...HostedbyConfluent 841 views•22 Folien Dashboard - definition, examples von matthieua Dashboard - definition, examplesMatthieu Aubry 44.8K views•17 Folien AIOps: Your DevOps Co-Pilot von DevOpsWebinars AIOps: Your DevOps Co-PilotDevOps.com 1.2K views•62 Folien State of the Cloud 2023—The AI era von BessemerVP State of the Cloud 2023—The AI eraBessemer Venture Partners 77K views•49 Folien Google App Engine ppt von OECLIBOdishaElectron Google App Engine pptOECLIB Odisha Electronics Control Library 18.4K views•19 Folien Google App Engine von softwarepark Google App EngineSoftware Park Thailand 12.5K views•67 Folien Expert systems Artificial Intelligence von ittirehan Expert systems Artificial Intelligenceitti rehan 12.2K views•28 Folien Uber - Building Intelligent Applications, Experimental ML with Uber’s Data Sc... von KarthikMurugesan2 Uber - Building Intelligent Applications, Experimental ML with Uber’s Data Sc...Karthik Murugesan 459 views•47 Folien IBM Blockchain Solutions Explained v0.6 von MattLucas3 IBM Blockchain Solutions Explained v0.6Matt Lucas 1.4K views•66 Folien Marketing Analytics with Business Intelligence von businessintelligence Marketing Analytics with Business IntelligenceDhiren Gala 3.4K views•25 Folien DIASHOWS FÜR SIE (20) Digital twins ppt von travel_affair Digital twins ppt travel_affair•59.3K views Robotic Process Automation (RPA) von MufaddalNullwala1 Robotic Process Automation (RPA) Mufaddal Nullwala•79.2K views A Product Requirements Document (PRD) Sample von RickWingenderMBAPMPA A Product Requirements Document (PRD) Sample Rick Wingender, MBA, MS, PMP, CSPO•107.4K views Final Year Project von mbilalk315 Final Year Project Muhammad Khan•258.8K views Web scraping von SelectoCompany Web scraping Selecto•20.3K views Business intelligence von rla1022 Business intelligence Randy L. Archambault•64.9K views The Rise Of Low-Code And No-Code Platforms And Its Future | SynergyTop von Stevejohn70 The Rise Of Low-Code And No-Code Platforms And Its Future | SynergyTop SynergyTop Inc•1K views Artificial Intelligence Application in Oil and Gas von sparkcognition Artificial Intelligence Application in Oil and Gas SparkCognition•6.9K views Big Data and Advanced Analytics von McK_CMSOForum Big Data and Advanced Analytics McKinsey on Marketing & Sales•261.9K views An example of a successful proof of concept von ETLSolutions An example of a successful proof of concept ETLSolutions•146.5K views Building a Data Streaming Center of Excellence With Steve Gonzalez and Derek ... von HostedbyConfluent Building a Data Streaming Center of Excellence With Steve Gonzalez and Derek ... HostedbyConfluent•841 views Dashboard - definition, examples von matthieua Dashboard - definition, examples Matthieu Aubry•44.8K views AIOps: Your DevOps Co-Pilot von DevOpsWebinars AIOps: Your DevOps Co-Pilot DevOps.com•1.2K views State of the Cloud 2023—The AI era von BessemerVP State of the Cloud 2023—The AI era Bessemer Venture Partners•77K views Google App Engine ppt von OECLIBOdishaElectron Google App Engine ppt OECLIB Odisha Electronics Control Library•18.4K views Google App Engine von softwarepark Google App Engine Software Park Thailand•12.5K views Expert systems Artificial Intelligence von ittirehan Expert systems Artificial Intelligence itti rehan•12.2K views Uber - Building Intelligent Applications, Experimental ML with Uber’s Data Sc... von KarthikMurugesan2 Uber - Building Intelligent Applications, Experimental ML with Uber’s Data Sc... Karthik Murugesan•459 views IBM Blockchain Solutions Explained v0.6 von MattLucas3 IBM Blockchain Solutions Explained v0.6 Matt Lucas•1.4K views Marketing Analytics with Business Intelligence von businessintelligence Marketing Analytics with Business Intelligence Dhiren Gala•3.4K views MEHR VON JYOTHISHMATHI INSTITUTE OF TECHNOLOGY AND SCIENCE KARIMNAGAR JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons von jegadeesanram5 JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons Jyothishmathi Institute of Technology and Science Karimnagar 568 views•96 Folien GUI Programming with Swing – Introduction, limitations of AWT, MVC architecture, components, containers. Understanding Layout Managers, Flow Layout, Border Layout, Grid Layout, Card Layout, Grid Bag Layout. Event Handling- The Delegation event model- Events, Event sources, Event Listeners, Event classes, Handling mouse and keyboard events, Adapter classes, Inner classes, Anonymous Inner classes. A Simple Swing Application, Applets – Applets and HTML, Security Issues, Applets and Applications, passing parameters to applets. Creating a Swing Applet, Painting in Swing, A Paint example, Exploring Swing Controls- JLabel and Image Icon, JText Field, The Swing Buttons-JButton, JToggle Button, JCheck Box, JRadio Button, JTabbed Pane, JScroll Pane, JList, JCombo Box, Swing Menus, Dialogs. JAVA PROGRAMMING - The Collections Framework von jegadeesanram5 JAVA PROGRAMMING - The Collections Framework Jyothishmathi Institute of Technology and Science Karimnagar 187 views•27 Folien The Collections Framework (java.util)- Collections overview, Collection Interfaces, The Collection classes- Array List, Linked List, Hash Set, Tree Set, Priority Queue, Array Deque. Accessing a Collection via an Iterator, Using an Iterator, The For-Each alternative, Map Interfaces and Classes, Comparators, Collection algorithms, Arrays, The Legacy Classes and Interfaces- Dictionary, Hashtable ,Properties, Stack, Vector More Utility classes, String Tokenizer, Bit Set, Date, Calendar, Random, Formatter, Scanner JAVA PROGRAMMING- Exception handling - Multithreading von jegadeesanram5 JAVA PROGRAMMING- Exception handling - Multithreading Jyothishmathi Institute of Technology and Science Karimnagar 390 views•54 Folien The document discusses Java programming concepts of exception handling and multithreading. It covers exception types, try/catch/throw/throws/finally clauses, creating custom exceptions, and the Java thread model for creating and synchronizing threads. The document also provides example code and discusses checked and unchecked exceptions, nested try blocks, and inter-thread communication in Java. JAVA PROGRAMMING – Packages - Stream based I/O von jegadeesanram5 JAVA PROGRAMMING – Packages - Stream based I/O Jyothishmathi Institute of Technology and Science Karimnagar 43 views•14 Folien This document provides an overview of packages, interfaces, and stream-based I/O in Java. It defines a package, discusses access protection and importing packages. Interfaces are introduced as a way to achieve multiple inheritance in Java. Key characteristics of interfaces like not allowing implementation and only containing abstract methods are described. The relationship between interfaces and abstract classes is compared. Common interfaces like Comparable are explained. Finally, stream-based I/O concepts like character streams, reading/writing files and serialization are listed as topics to be covered. Universities questions on these topics are also provided. Java programming -Object-Oriented Thinking- Inheritance von jegadeesanram5 Java programming -Object-Oriented Thinking- Inheritance Jyothishmathi Institute of Technology and Science Karimnagar 385 views•70 Folien Object-Oriented Thinking- A way of viewing world – Agents and Communities, messages and methods, Responsibilities, Classes and Instances, Class Hierarchies- Inheritance, Method binding, Overriding and Exceptions, Summary of Object-Oriented concepts. Java buzzwords, An Overview of Java, Data types, Variables and Arrays, operators, expressions, control statements, Introducing classes, Methods and Classes, String handling. Inheritance– Inheritance concept, Inheritance basics, Member access, Constructors, Creating Multilevel hierarchy, super uses, using final with inheritance, Polymorphism-ad hoc polymorphism, pure polymorphism, method overriding, abstract classes, Object class, forms of inheritance specialization, specification, construction, extension, limitation, combination, benefits of inheritance, costs of inheritance WEB TECHNOLOGIES JavaScript von jegadeesanram5 WEB TECHNOLOGIES JavaScript Jyothishmathi Institute of Technology and Science Karimnagar 289 views•40 Folien JavaScript Introduction to JavaScript: JavaScript language - declaring variables, scope of variables, functions, event handlers (onclick, onsubmit etc.), Document Object Model, Form validation. Simple AJAX application. WEB TECHNOLOGIES JSP von jegadeesanram5 WEB TECHNOLOGIES JSP Jyothishmathi Institute of Technology and Science Karimnagar 260 views•23 Folien JSP The Anatomy of a JSP Page, JSP Processing, Declarations, Directives, Expressions, Code Snippets, implicit objects, Using Beans in JSP Pages, Using Cookies and session for session tracking, connecting to database in JSP. WEB TECHNOLOGIES Servlet von jegadeesanram5 WEB TECHNOLOGIES Servlet Jyothishmathi Institute of Technology and Science Karimnagar 325 views•29 Folien Servlet Common Gateway Interface (CGI), Lifecycle of a Servlet, deploying a servlet, The Servlet API, Reading Servlet parameters, Reading Initialization parameters, Handling Http Request & Responses, Using Cookies and Sessions, connecting to a database using JDBC. WEB TECHNOLOGIES XML von jegadeesanram5 WEB TECHNOLOGIES XML Jyothishmathi Institute of Technology and Science Karimnagar 132 views•28 Folien Introduction to XML, Defining XML tags, their attributes and values, Document Type Definition, XML Schemas, Document Object Model, XHTML Parsing XML Data - DOM and SAX Parsers in java. WEB TECHNOLOGIES- PHP Programming von jegadeesanram5 WEB TECHNOLOGIES- PHP Programming Jyothishmathi Institute of Technology and Science Karimnagar 207 views•22 Folien Introduction to PHP: Declaring variables, data types, arrays, strings, operators, expressions, control structures, functions, Reading data from web form controls like text boxes, radio buttons, lists etc., Handling File Uploads, Connecting to database (MySQL as reference), executing simple queries, handling results, Handling sessions and cookies File Handling in PHP: File operations like opening, closing, reading, writing, appending, deleting etc. on text and binary files, listing directories Compiler Design- Machine Independent Optimizations von jegadeesanram5 Compiler Design- Machine Independent Optimizations Jyothishmathi Institute of Technology and Science Karimnagar 1.1K views•20 Folien Machine-Independent Optimizations: The Principal Sources of Optimization, Introduction to Data-Flow Analysis, Foundations of Data-Flow Analysis, Constant Propagation, Partial Redundancy Elimination, Loops in Flow Graphs COMPILER DESIGN Run-Time Environments von jegadeesanram5 COMPILER DESIGN Run-Time Environments Jyothishmathi Institute of Technology and Science Karimnagar 1.7K views•64 Folien Run-Time Environments: Storage organization, Stack Allocation of Space, Access to Nonlocal Data on the Stack, Heap Management, Introduction to Garbage Collection, Introduction to Trace-Based Collection. Code Generation: Issues in the Design of a Code Generator, The Target Language, Addresses in the Target Code, Basic Blocks and Flow Graphs, Optimization of Basic Blocks, A Simple Code Generator, Peephole Optimization, Register Allocation and Assignment, Dynamic Programming Code-Generation COMPILER DESIGN- Syntax Directed Translation von jegadeesanram5 COMPILER DESIGN- Syntax Directed Translation Jyothishmathi Institute of Technology and Science Karimnagar 974 views•61 Folien Syntax-Directed Translation: Syntax-Directed Definitions, Evaluation Orders for SDD's, Applications of Syntax-Directed Translation, Syntax-Directed Translation Schemes, and Implementing L-Attributed SDD's. Intermediate-Code Generation: Variants of Syntax Trees, Three-Address Code, Types and Declarations, Type Checking, Control Flow, Back patching, Switch-Statements COMPILER DESIGN- Syntax Analysis von jegadeesanram5 COMPILER DESIGN- Syntax Analysis Jyothishmathi Institute of Technology and Science Karimnagar 117 views•21 Folien This document provides an overview of syntax analysis in compiler design. It discusses context-free grammars, top-down parsing including recursive descent and LL(1) parsing, and bottom-up parsing including LR parsing. It describes the key concepts of context-free grammars, ambiguous and unambiguous grammars. It explains top-down parsing as constructing a parse tree from the root node down and bottom-up parsing as building the tree from the leaf nodes up. It discusses the closure and goto operations used in LR parsing and describes the differences between LR(0), SLR, CLR, and LALR parsing techniques. COMPILER DESIGN- Introduction & Lexical Analysis: von jegadeesanram5 COMPILER DESIGN- Introduction & Lexical Analysis: Jyothishmathi Institute of Technology and Science Karimnagar 192 views•15 Folien Introduction: Language Processors, the structure of a compiler, the science of building a compiler, programming language basics. Lexical Analysis: The Role of the Lexical Analyzer, Input Buffering, Recognition of Tokens, The Lexical-Analyzer Generator Lex, Finite Automata, From Regular Expressions to Automata, Design of a Lexical-Analyzer Generator, Optimization of DFA-Based Pattern Matchers CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security von jegadeesanram5 CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security Jyothishmathi Institute of Technology and Science Karimnagar 654 views•65 Folien The Secure Inter-branch Payment Transactions case study describes the current electronic payment system used by General Bank of India to transfer funds between branches, which utilizes a central server but lacks strong security. Improvements are needed to add encryption, digital signatures for non-repudiation, and a public key infrastructure to securely distribute keys. Cryptographic toolkits and smart cards could also be incorporated into the system to enhance security of financial transactions transmitted over the private network. CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security von jegadeesanram5 CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security Jyothishmathi Institute of Technology and Science Karimnagar 354 views•66 Folien Transport-level Security: Web security considerations, Secure Socket Layer and Transport Layer Security, HTTPS, Secure Shell (SSH) Wireless Network Security: Wireless Security, Mobile Device Security, IEEE 802.11 Wireless LAN, IEEE 802.11i Wireless LAN Security CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions von jegadeesanram5 CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions Jyothishmathi Institute of Technology and Science Karimnagar 110 views•28 Folien Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme. Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers von jegadeesanram5 CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers Jyothishmathi Institute of Technology and Science Karimnagar 121 views•25 Folien Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm CRYPTOGRAPHY & NETWORK SECURITY von jegadeesanram5 CRYPTOGRAPHY & NETWORK SECURITY Jyothishmathi Institute of Technology and Science Karimnagar 1.2K views•26 Folien This document provides an overview of a university course on Cryptography and Network Security. It begins with the course syllabus, which outlines topics like security concepts, cryptography concepts and techniques, and types of security attacks. It then discusses key security concepts such as security services, security mechanisms, security attacks, and models for network and access security. It provides examples of security services like authentication, access control, and data confidentiality. It also describes security mechanisms and different classes of security attacks. The document concludes by listing reference books, online videos, related courses, tutorials, and sample multiple choice and problems related to cryptography and network security. MEHR VON JYOTHISHMATHI INSTITUTE OF TECHNOLOGY AND SCIENCE KARIMNAGAR (20) JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons von jegadeesanram5 JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons Jyothishmathi Institute of Technology and Science Karimnagar•568 views JAVA PROGRAMMING - The Collections Framework von jegadeesanram5 JAVA PROGRAMMING - The Collections Framework Jyothishmathi Institute of Technology and Science Karimnagar•187 views JAVA PROGRAMMING- Exception handling - Multithreading von jegadeesanram5 JAVA PROGRAMMING- Exception handling - Multithreading Jyothishmathi Institute of Technology and Science Karimnagar•390 views JAVA PROGRAMMING – Packages - Stream based I/O von jegadeesanram5 JAVA PROGRAMMING – Packages - Stream based I/O Jyothishmathi Institute of Technology and Science Karimnagar•43 views Java programming -Object-Oriented Thinking- Inheritance von jegadeesanram5 Java programming -Object-Oriented Thinking- Inheritance Jyothishmathi Institute of Technology and Science Karimnagar•385 views WEB TECHNOLOGIES JavaScript von jegadeesanram5 WEB TECHNOLOGIES JavaScript Jyothishmathi Institute of Technology and Science Karimnagar•289 views WEB TECHNOLOGIES JSP von jegadeesanram5 WEB TECHNOLOGIES JSP Jyothishmathi Institute of Technology and Science Karimnagar•260 views WEB TECHNOLOGIES Servlet von jegadeesanram5 WEB TECHNOLOGIES Servlet Jyothishmathi Institute of Technology and Science Karimnagar•325 views WEB TECHNOLOGIES XML von jegadeesanram5 WEB TECHNOLOGIES XML Jyothishmathi Institute of Technology and Science Karimnagar•132 views WEB TECHNOLOGIES- PHP Programming von jegadeesanram5 WEB TECHNOLOGIES- PHP Programming Jyothishmathi Institute of Technology and Science Karimnagar•207 views Compiler Design- Machine Independent Optimizations von jegadeesanram5 Compiler Design- Machine Independent Optimizations Jyothishmathi Institute of Technology and Science Karimnagar•1.1K views COMPILER DESIGN Run-Time Environments von jegadeesanram5 COMPILER DESIGN Run-Time Environments Jyothishmathi Institute of Technology and Science Karimnagar•1.7K views COMPILER DESIGN- Syntax Directed Translation von jegadeesanram5 COMPILER DESIGN- Syntax Directed Translation Jyothishmathi Institute of Technology and Science Karimnagar•974 views COMPILER DESIGN- Syntax Analysis von jegadeesanram5 COMPILER DESIGN- Syntax Analysis Jyothishmathi Institute of Technology and Science Karimnagar•117 views COMPILER DESIGN- Introduction & Lexical Analysis: von jegadeesanram5 COMPILER DESIGN- Introduction & Lexical Analysis: Jyothishmathi Institute of Technology and Science Karimnagar•192 views CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security von jegadeesanram5 CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security Jyothishmathi Institute of Technology and Science Karimnagar•654 views CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security von jegadeesanram5 CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security Jyothishmathi Institute of Technology and Science Karimnagar•354 views CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions von jegadeesanram5 CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions Jyothishmathi Institute of Technology and Science Karimnagar•110 views CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers von jegadeesanram5 CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers Jyothishmathi Institute of Technology and Science Karimnagar•121 views CRYPTOGRAPHY & NETWORK SECURITY von jegadeesanram5 CRYPTOGRAPHY & NETWORK SECURITY Jyothishmathi Institute of Technology and Science Karimnagar•1.2K views KÜRZLICH HOCHGELADEN GraphRAG for Life Science to increase LLM accuracy von TomazBratanic GraphRAG for Life Science to increase LLM accuracy Tomaz Bratanic 26 views•15 Folien GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers "Choosing proper type of scaling", Olena Syrota von fwdays "Choosing proper type of scaling", Olena Syrota Fwdays 13 views•27 Folien Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system. June Patch Tuesday von GoIvanti June Patch Tuesday Ivanti 58 views•35 Folien Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities. Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe von Syncsort Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe Precisely 17 views•12 Folien Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market. Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences. “Temporal Event Neural Networks: A More Efficient Alternative to the Transfor... von embeddedvision “Temporal Event Neural Networks: A More Efficient Alternative to the Transfor... Edge AI and Vision Alliance 15 views•25 Folien For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/ Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit. The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers. Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications. zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application... von AlexPruden zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application... Alex Pruden 15 views•32 Folien Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security. Paper Link: https://eprint.iacr.org/2024/257 WeTestAthens: Postman's AI & Automation Techniques von GetPostman WeTestAthens: Postman's AI & Automation Techniques Postman 88 views•70 Folien Postman's AI and Automation Techniques GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph von neo4j GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph Neo4j 20 views•15 Folien Tomaz Bratanic Graph ML and GenAI Expert - Neo4j HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU von panagenda HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU panagenda 74 views•48 Folien Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/ DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen! Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell. Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten. Diese Themen werden behandelt - Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten - Wie funktionieren CCB- und CCX-Lizenzen wirklich? - Verstehen des DLAU-Tools und wie man es am besten nutzt - Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw. - Praxisbeispiele und Best Practices zum sofortigen Umsetzen Building Production Ready Search Pipelines with Spark and Milvus von chloewilliams62 Building Production Ready Search Pipelines with Spark and Milvus Zilliz 34 views•28 Folien Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving. GNSS spoofing via SDR (Criptored Talks 2024) von JavierJunqueraSnchez GNSS spoofing via SDR (Criptored Talks 2024) Javier Junquera 57 views•32 Folien In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security. This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing. The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure. Serial Arm Control in Real Time Presentation von tolgahangng Serial Arm Control in Real Time Presentation tolgahangng 23 views•19 Folien Serial Arm Control in Real Time 5th LF Energy Power Grid Model Meet-up Slides von DanBrown980551 5th LF Energy Power Grid Model Meet-up Slides DanBrown980551 49 views•94 Folien 5th Power Grid Model Meet-up It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology. Power Grid Model The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services. Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability. Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization. What to expect For the upcoming meetup we are organizing, we have an exciting lineup of activities planned: -Insightful presentations covering two practical applications of the Power Grid Model. -An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024. -An interactive brainstorming session to discuss and propose new feature requests. -An opportunity to connect with fellow Power Grid Model enthusiasts and users. Driving Business Innovation: Latest Generative AI Advancements & Success Story von SafeSoftware Driving Business Innovation: Latest Generative AI Advancements & Success Story Safe Software 228 views•62 Folien Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency. During the hour, we’ll take you through: Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board. Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes. Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI. We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI. This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data! FREE A4 Cyber Security Awareness Posters-Social Engineering part 3 von DataHops FREE A4 Cyber Security Awareness Posters-Social Engineering part 3 Data Hops 13 views•12 Folien Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com Energy Efficient Video Encoding for Cloud and Edge Computing Instances von christian.timmerer Energy Efficient Video Encoding for Cloud and Edge Computing Instances Alpen-Adria-Universität 31 views•26 Folien Energy Efficient Video Encoding for Cloud and Edge Computing Instances Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians von neo4j Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians Neo4j 22 views•44 Folien Dmitrii Kamaev, PhD Senior Product Owner - QIAGEN Columbus Data & Analytics Wednesdays - June 2024 von JasonPacker Columbus Data & Analytics Wednesdays - June 2024 Jason Packer 65 views•31 Folien Columbus Data & Analytics Wednesdays, June 2024 with Maria Copot 20 Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors von DianaGray10 Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors DianaGray10 42 views•13 Folien Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more. The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications. We’ll discuss and demo the benefits of UiPath Apps and connectors including: Creating a compelling user experience for any software, without the limitations of APIs. Accelerating the app creation process, saving time and effort Enjoying high-performance CRUD (create, read, update, delete) operations, for seamless data management. Speakers: Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP Charlie Greenberg, host Presentation of the OECD Artificial Intelligence Review of Germany von innovationoecd Presentation of the OECD Artificial Intelligence Review of Germany innovationoecd 2.4K views•24 Folien Consult the full report at https://www.oecd.org/digital/oecd-artificial-intelligence-review-of-germany-609808d6-en.htm KÜRZLICH HOCHGELADEN (20) GraphRAG for Life Science to increase LLM accuracy von TomazBratanic GraphRAG for Life Science to increase LLM accuracy Tomaz Bratanic•26 views "Choosing proper type of scaling", Olena Syrota von fwdays "Choosing proper type of scaling", Olena Syrota Fwdays•13 views June Patch Tuesday von GoIvanti June Patch Tuesday Ivanti•58 views Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe von Syncsort Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe Precisely•17 views “Temporal Event Neural Networks: A More Efficient Alternative to the Transfor... von embeddedvision “Temporal Event Neural Networks: A More Efficient Alternative to the Transfor... Edge AI and Vision Alliance•15 views zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application... von AlexPruden zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application... Alex Pruden•15 views WeTestAthens: Postman's AI & Automation Techniques von GetPostman WeTestAthens: Postman's AI & Automation Techniques Postman•88 views GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph von neo4j GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph Neo4j•20 views HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU von panagenda HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU panagenda•74 views Building Production Ready Search Pipelines with Spark and Milvus von chloewilliams62 Building Production Ready Search Pipelines with Spark and Milvus Zilliz •34 views GNSS spoofing via SDR (Criptored Talks 2024) von JavierJunqueraSnchez GNSS spoofing via SDR (Criptored Talks 2024) Javier Junquera•57 views Serial Arm Control in Real Time Presentation von tolgahangng Serial Arm Control in Real Time Presentation tolgahangng•23 views 5th LF Energy Power Grid Model Meet-up Slides von DanBrown980551 5th LF Energy Power Grid Model Meet-up Slides DanBrown980551•49 views Driving Business Innovation: Latest Generative AI Advancements & Success Story von SafeSoftware Driving Business Innovation: Latest Generative AI Advancements & Success Story Safe Software•228 views FREE A4 Cyber Security Awareness Posters-Social Engineering part 3 von DataHops FREE A4 Cyber Security Awareness Posters-Social Engineering part 3 Data Hops•13 views Energy Efficient Video Encoding for Cloud and Edge Computing Instances von christian.timmerer Energy Efficient Video Encoding for Cloud and Edge Computing Instances Alpen-Adria-Universität•31 views Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians von neo4j Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians Neo4j•22 views Columbus Data & Analytics Wednesdays - June 2024 von JasonPacker Columbus Data & Analytics Wednesdays - June 2024 Jason Packer•65 views Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors von DianaGray10 Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors DianaGray10•42 views Presentation of the OECD Artificial Intelligence Review of Germany von innovationoecd Presentation of the OECD Artificial Intelligence Review of Germany innovationoecd•2.4K views GERELATEERDE BOEKEN Kostenlos mit einem 30-tägigen Test von EverandAlle anzeigen BoekConcise Guide to DWDMalasdair gilchrist 5 / 5 BoekConcise Guide to OTN optical transport networksalasdair gilchrist 4 / 5 Boek4G: LTE/LTE-Advanced for Mobile BroadbandErik Dahlman 4.5 / 5 BoekSoftware-Defined Networks: A Systems ApproachLarry Peterson 5 / 5 BoekMobile Network Optimization: A Guide for 2G and 3G Mobile Network OptimizationEmmanuel Usuah 3.5 / 5 BoekNetwork Engineering - The Essential HandbookW.J Bickerstaffe 0 / 5 BoekQOS-Enabled Networks: Tools and FoundationsMiguel Barreiros 0 / 5 BoekLTE-Advanced: A Practical Systems Approach to Understanding 3GPP LTE Releases 10 and 11 Radio Access TechnologiesSassan Ahmadi 4 / 5 BoekWireless Networking CompletePei Zheng 5 / 5 BoekLTE ServicesJean-Gabriel Rémy 1 / 5 BoekMobile Networks ArchitectureAndré Perez 0 / 5 BoekOptically Amplified WDM Networks- 0 / 5 BoekSAE and the Evolved Packet Core: Driving the Mobile Broadband RevolutionMagnus Olsson 3 / 5 BoekSD-WAN Demystified: Empowering Your Network for SuccessMaula Issa 0 / 5 BoekKey technologies for NG-PON2 systemRawa Muayad 0 / 5 BoekHACKING WITH KALI LINUX WIRELESS PENETRATIONEDDIE ARNOLD 0 / 5 BoekQoS: Myths and HypeJohn G. Waclawsky 0 / 5 BoekLocal Area Networks: An Introduction to the TechnologyJohn McNamara 0 / 5 BoekNetwork Mergers and Migrations: Junos Design and ImplementationGonzalo Gómez Herrero 0 / 5 BoekEnergy Management in Wireless Sensor NetworksYoucef Touati 4 / 5 BoekBuilding Wireless Sensor Networks: Application to Routing and Data Diffusion- 0 / 5 BoekSelf-Organizing Networks: Self-Planning, Self-Optimization and Self-Healing for GSM, UMTS and LTE- 0 / 5 BoekRouting in Wireless Mesh NetworksRaghav Kumar 0 / 5 BoekMobile WiMAX: A Systems Approach to Understanding IEEE 802.16m Radio Access TechnologySassan Ahmadi 0 / 5 BoekNetworks-on-Chip: From Implementations to Programming ParadigmsSheng Ma 0 / 5 BoekThird Generation CDMA Systems for Enhanced Data ServicesGiridhar D. Mandyam 5 / 5 BoekRadio Resource Management in Multi-Tier Cellular Wireless NetworksEkram Hossain 0 / 5 BoekReconfigurable Radio Systems: Network Architectures and StandardsMaria Stella Iacobucci 0 / 5 BoekModeling and Dimensioning of Mobile Wireless Networks: From GSM to LTEMaciej Stasiak 0 / 5 BoekLTE, LTE-Advanced and WiMAX: Towards IMT-Advanced NetworksAbd-Elhamid M. Taha 0 / 5 BoekPeering Carrier Ethernet NetworksSachidananda Kangovi 0 / 5 BoekComputer Networking Bootcamp: Routing, Switching And TroubleshootingRob Botwright 0 / 5 BoekOptical Network Design and PlanningJane M. Simmons 0 / 5 BoekPlanning, Negotiating, Implementing, and Managing Wide Area Networks: A Practical GuideLuiz Augusto de Carvalho 0 / 5 BoekIntroduction to Internet & Web Technology: Internet & Web TechnologyDr. Yashpal singh 0 / 5 BoekAdvances in Analog and RF IC Design for Wireless Communication Systems- 1 / 5 Boek6G Wireless Communications and Mobile NetworkingXianzhong Xie 0 / 5 BoekNode-to-Node Approaching in Wireless Mesh ConnectivityMadhusudan Singh 5 / 5 GERELATEERDE LUISTERBOEKEN Kostenlos mit einem 30-tägigen Test von EverandAlle anzeigen LuisterboekCOMPTIA NETWORK+: Tips and Tricks to Learn and Study about The CompTIA Network+ Certification from A-ZWalker Schmidt 0 / 5 LuisterboekHam Radio: from Beginner to Badass (Ham Radio, ARRL, ARRL exam, Ham Radio Licence)Greg Molloy 4 / 5 LuisterboekComputer Networking Beginners GuideErick Stack 4 / 5 LuisterboekTCP/IP: Network+ Protocols And Campus LAN Switching FundamentalsRob Botwright 0 / 5 LuisterboekCracking System Design: A Comprehensive Guide to Building Scalable and Reliable SystemsEt Tu Code 0 / 5 LuisterboekHam RadioCraig Barron 4.5 / 5 LuisterboekNetwork Engineer's Bible: Mastering 100 Protocols For Communication, Management, And SecurityRob Botwright 0 / 5 LuisterboekNeural Networks for Beginners: A Journey Through the World of Artificial IntelligenceBrandon Scott 0 / 5 LuisterboekWireless Security Masterclass: Penetration Testing For Network Defenders And Ethical HackersRob Botwright 0 / 5 LuisterboekCloud Security & Forensics Handbook: Dive Deep Into Azure, AWS, And GCPRob Botwright 0 / 5 LuisterboekNetworking in Distributed Systems: A comprehensive guide to Network Communication in Distributed SystemsEt Tu Code 0 / 5 LuisterboekApplication Design: Key Principles For Data-Intensive App SystemsRob Botwright 0 / 5 LuisterboekInternet of ThingsIntrobooks Team 4.5 / 5 LuisterboekNeural Network Programming: How To Create Modern AI Systems With Python, Tensorflow, And KerasRob Botwright 0 / 5 LuisterboekComputer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA)Benjamin Walker 0 / 5 LuisterboekEdge Computing 101: Novice To Pro: Expert Techniques And Practical ApplicationsRob Botwright 0 / 5 LuisterboekHidden Web: Decoding The Deep Web, Dark Web And DarknetRob Botwright 1 / 5 LuisterboekHow to Set Up a Home Network with Windows 7: Your Step by Step Guide to Setting Up a Home Network with Windows 7HowExpert 0 / 5 LuisterboekPower Distribution Unit (PDU) Secrets: What Everyone Who Works in a Data Center Needs to Know!Dr. Jim Anderson 4 / 5 LuisterboekComputer Science: Learn about Algorithms, Cybersecurity, Databases, Operating Systems, and Web DesignJonathan Rigdon 0 / 5 LuisterboekNetwork And Security Fundamentals For Ethical Hackers: Advanced Network Protocols, Attacks, And DefensesRob Botwright 0 / 5 LuisterboekHow It Works: The Internet and Smartphones- 0 / 5 LuisterboekCypherium: Bridging CBDC, DeFI and Web3Nick Davis 0 / 5 LuisterboekAzure Networking: Command Line Mastery From Beginner To ArchitectRob Botwright 0 / 5 LuisterboekHow Do Computers Talk to One Another?Melissa Abramovitz 0 / 5 LuisterboekMastering Neural Networks: A Comprehensive Guide to Understanding and Implementing Neural NetworksEt Tu Code 0 / 5 LuisterboekFiber Optics: Networking And Data Transmission In ActionRob Botwright 0 / 5 LuisterboekKubernetes Unleashed: Navigating the World of Automated Deployment and ScalingRebecca Park 0 / 5 LuisterboekComputer Networking Bootcamp: Routing, Switching And TroubleshootingRob Botwright 0 / 5 LuisterboekTransformer Models: A Comprehensive Guide to Understanding and Implementing Transformer Models in AIEt Tu Code 0 / 5 LuisterboekQuantum CommunicationIntrobooks Team 0 / 5 LuisterboekAssembly Language: The Ultimate Guide to Programming and Virtual MachinesJonathan Rigdon 0 / 5 LuisterboekSmart Futures: Decoding the Language of the Internet of ThingsRanjot Singh Chahal 0 / 5 LuisterboekOperating Systems: Concepts to Save Money, Time, and FrustrationJonathan Rigdon 0 / 5 LuisterboekPower Electronics Diploma Interview Q&A: Career GuideSumitra Kumari 0 / 5 LuisterboekNMAP Network Scanning Series: Network Security, Monitoring, And Scanning LibraryRob Botwright 0 / 5 LuisterboekEnterprise Strategy for Blockchain: Lessons in Disruption from Fintech, Supply Chains, and Consumer Industries (Management on the Cutting Edge)Ravi Sarathy 0 / 5 LuisterboekPerforming Arts BundleCraig Barron 0 / 5 LuisterboekWeb Development: Everything about Web Design and Operating Systems (2 in 1)Jonathan Rigdon 0 / 5 LuisterboekHow Software Defined Networking (SDN) Is Going to Change Your World Forever: The Revolution in Network Design and How It Affects YouDr. Jim Anderson 5 / 5 MOBILE COMPUTING MOBILE ADHOC NETWORKS (MANETS) * 1. UNIT-V Mobile Ad hoc NETworks (MANETs) Dr R Jegadeesan Prof-CSE Jyothishmathi Institute of Technology and Science, karimnagar * 2. Mobile Ad hoc NETworks (MANETs) • Mobile Ad hoc NETworks (MANETs) are wireless networks which are characterized by dynamic topologies and no fixed infrastructure. • Each node in a MANET is a computer that may be required to act as both a host and a router and, as much, may be required to forward packets between nodes which cannot directly communicate with one another. • Each MANET node has much smaller frequency spectrum requirements that that for a node in a fixed infrastructure network. • A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. • Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. • The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves, i.e., routing functionality will be incorporated into mobile nodes. * 3. A mobile ad hoc network is a collection of wireless nodes that can dynamically be set up anywhere and anytime without using any pre- existing fixed network infrastructure. * 4. MANET- Characteristics • Dynamic network topology • Bandwidth constraints and variable link capacity • Energy constrained nodes • Multi-hop communications • Limited security • Autonomous terminal • Distributed operation • Light-weight terminals * 5. Need for Ad Hoc Networks • Setting up of fixed access points and backbone infrastructure is not always viable – Infrastructure may not be present in a disaster area or war zone – Infrastructure may not be practical for short-range radios; Bluetooth (range ~ 10m) • Ad hoc networks: – Do not need backbone infrastructure support – Are easy to deploy – Useful when infrastructure is absent, destroyed or impractical * 6. Properties of MANETs • MANET enables fast establishment of networks. When anew network is to be established, the only requirement is to provide a new set of nodeswith limited wireless communication range. A node has limited capability, that is, it can connect only to the nodes which are nearby. Hence it consumes limited power. • A MANET node has the ability to discover a neighboring node and service. Using a service discovery protocol, a node discovers the serviceof a nearby node and communicates to a remote node in theMANET. • MANET nodes have peer-to-peer connectivity among themselves. • MANET nodes have independent computational, switching (or routing), and communication capabilities. • The wireless connectivity range in MANETs includes only nearest node connectivity. • The failure of an intermediate node results in greater latency in communicating with the remote server. * 7. • Limited bandwidth available between two intermediate nodes becomes a constraint for the MANET. The node may have limited power and thus computations need to be energy-efficient. • There is no access-point requirement in MANET. Only selected access points are provided for connection to other networks or other MANETs. • MANET nodes can be the iPods, Palm handheld computers, Smartphones, PCs, smart labels, smart sensors, and automobile- embedded systems • MANET nodes can use different protocols, for example, IrDA, Bluetooth, ZigBee, 802.11, GSM, and TCP/IP.MANET node performs data caching, saving, and aggregation. • MANET mobile device nodes interact seamlessly when they move with the nearby wireless nodes, sensor nodes, and embedded devices in automobiles so that the seamless connectivity is maintained between the devices. * 8. MANET challenges • To design a good wireless ad hoc network, various challenges have to be taken into account: • Dynamic Topology: Nodes are free to move in an arbitrary fashion resulting in the topology changing arbitrarily. This characteristic demands dynamic configuration of the network. • Limited security: Wireless networks are vulnerable to attack. Mobile ad hoc networks are more vulnerable as by design any node should be able to join or leave the network at any time. This requires flexibility and higher openness. • Limited Bandwidth: Wireless networks in general are bandwidth limited. In an ad hoc network, it is all the more so because there is no backbone to handle or multiplex higher bandwidth • Routing: Routing in a mobile ad hoc network is complex. This depends on many factors, including finding the routing path, selection of routers, topology, protocol etc. * 9. Applications of MANETS • The set of applications for MANETs is diverse, ranging from small, static networks that are constrained by power sources, to large-scale, mobile, highly dynamic networks. • The design of network protocols for these networks is a complex issue. Regardless of the application, MANETs need efficient distributed algorithms to determine network organization, link scheduling, and routing. Some of the main application areas of MANET‘s are: * 10. * 11. Applications of MANETS • Military battlefield– soldiers, tanks, planes. Ad- hoc networking would allow the military to take advantage of commonplace network technology to maintain an information network between the soldiers, vehicles, and military information headquarters. • Sensor networks – to monitor environmental conditions over a large area • Local level – Ad hoc networks can autonomously link an instant and temporary multimedia network using notebook computers or palmtop computers to spread and share information among participants at e.g. conference or classroom. Another appropriate local level application might be in home networks where devices can communicate directly to exchange information. * 12. • Personal Area Network (PAN) – pervasive computing i.e. to provide flexible connectivity between personal electronic devices or home appliances. Short-range MANET can simplify the intercommunication between various mobile devices (such as a PDA, a laptop, and a cellular phone). Tedious wired cables are replaced with wireless connections. Such an ad hoc network can also extend the access to the Internet or other networks by mechanisms e.g. Wireless LAN (WLAN), GPRS, and UMTS. • Vehicular Ad hoc Networks – intelligent transportation i.e. to enable real time vehicle monitoring and adaptive traffic control * 13. • Civilian environments – taxi cab network, meeting rooms, sports stadiums, boats, small aircraft • Emergency operations – search and rescue, policing and fire fighting and to provide connectivity between distant devices where the network infrastructure is unavailable. Ad hoc can be used in emergency/rescue operations for disaster relief efforts, e.g. in fire, flood, or earthquake. Emergency rescue operations must take place where non-existing or damaged communications infrastructure and rapid deployment of a communication network is needed. Information is relayed from one rescue team member to another over a small hand held. * 14. Routing in MANET‘s • Routing in Mobile Ad hoc networks is an important issue as these networks do not have fixed infrastructure and routing requires distributed and cooperative actions from all nodes in the network. MANET‘s provide pointto point routing similar to Internet routing. • The major difference between routing in MANET and regular internet is the route discovery mechanism. Internet routing protocols suchas RIP or OSPF have relatively long converge times, which is acceptable for a wired network that has infrequent topology changes. However, a MANET has a rapid topology changes due to node mobility making the traditional internet routing protocols inappropriate. • MANET-specific routing protocols have been proposed, that handle topology changes well, but they have large control overhead and arenot scalable for large networks. • Another major difference in the routing is the network address. In internet routing, the network address (IP address) is hierarchical containing a network ID and a computer ID on that network. In contrast, for most MANET‘s the network address is simply an ID of the node in the network and is not hierarchical. The routing protocol must use the entire address to decide the next hop. * 15. Some of the fundamental differences between wired networks & ad-hoc networks are: • Asymmetric links: - Routing information collected for one direction is of no use for the other direction. Many routing algorithms for wired networks rely on a symmetric scenario. • Redundant links: - In wired networks, some redundancy is present to survive link failures and this redundancy is controlled by a network administrator. In ad-hoc networks, nobody controls redundancy resulting in many redundant links up to the extreme of a complete meshed topology. • Interference: - In wired networks, links exist only where a wire exists, and connectionsare planned by network administrators. But, in ad-hoc networks links come and go depending on transmission characteristics, one transmission might interfere with another and nodes might overhear the transmission of other nodes. • Dynamic topology: - The mobile nodes might move in an arbitrary manner or medium characteristics might change. This result in frequent changes in topology, so snapshots are valid only for a very short period of time. So, in ad-hoc networks, routing tables must somehow reflect these frequent changes in topology and routing algorithms have to be adopted. * 16. Summary of the difficulties faced for routing in ad-hoc networks • Traditional routing algorithms known from wired networks will not work efficiently or fail completely. These algorithms have not been designed with a highly dynamic topology, asymmetric links, or interference in mind. • Routing in wireless ad-hoc networks cannot rely on layer three knowledge alone. Information from lower layers concerning connectivity or interference can help routing algorithms to find a good path. • Centralized approaches will not really work, because it takes too long to collect the current status and disseminate it again. Within this time the topology has already changed. * 17. Summary of the difficulties faced for routing in ad-hoc networks • Many nodes need routing capabilities. While there might be some without, at least one router has to be within the range of each node. Algorithms have to consider the limited battery power of these nodes. • The notion of a connection with certain characteristics cannot work properly. Ad-hoc networks will be connectionless, because it is not possible to maintain a connection in a fast changing environment and to forward data following this connection. Nodes have to make local decisions for forwarding and send packets roughly toward the final destination. • A last alternative to forward a packet across an unknown topology is flooding. This approach always works if the load is low, but it is very inefficient. A hop counter is needed in each packet to avoid looping, and the diameter of the ad-hoc network. * 18. Routing Algorithms – Always maintain routes:- Little or no delay for route determination – Consume bandwidth to keep routes up-to- date – Maintain routes which may never be used – Advantages: low route latency, State information, QoS guarantee related to connection set-up or other real-time requirements – Disadvantages: high overhead (periodic updates) and route repair depends on update * 19. – only obtain route information when needed – Advantages: no overhead from periodic update, scalability as long as there is only light traffic and low mobility. – Disadvantages: high route latency, route caching can reduce latency • Hybrid algorithms: maintain routes to nearby nodes even if they are not needed and maintain routes to far away nodes only when needed. Example is Zone Routing Protocol (ZRP). * 20. Destination sequence distance vector (DSDV) • Destination sequence distance vector (DSDV) routing is an example of proactive algorithms and an enhancement to distance vector routing for ad-hoc networks. • Distance vector routing is used as routing information protocol (RIP) in wired networks. It performs extremely poorly with certain network changes due to the count-to-infinity problem. • Each node exchanges its neighbor table periodically with its neighbors. Changes at one node in the network propagate slowly through the network. • The strategies to avoid this problem which are used in fixed networks do not help in the case of wireless ad-hoc networks, due to the rapidly changing topology. This might create loops or unreachable regions within the network. * 21. • DSDV adds the concept of sequence numbers to the distance vector algorithm. • Each routing advertisement comes with a sequence number. • Within ad-hoc networks, advertisementsmay propagate along many paths. Sequence numbers help to apply the advertisements in correct order. • This avoids the loops that are likely with the unchanged distance vector algorithm. * 22. • Each node maintains a routing table which stores next hop, cost metric towards each destination and a sequence number that is created by the destination itself. • Each node periodically forwards routing table to neighbors. Each node increments and appends its sequence number when sending its local routing table. • Each route is tagged with a sequence number; routes with greater sequence numbers are preferred. • Each node advertises a monotonically increasing even sequence number for itself. • When a node decides that a route is broken, it increments the sequence number of the route and advertises it with infinite metric. Destination advertises new sequence number. * 23. Security in MANET’s • Securing wireless ad-hoc networks is a highly challenging issue. • Understanding possible form of attacks is always the first step towards developing good security solutions. • Security of communication in MANET is important for secure transmission of information. • Absence of any central co-ordination mechanism and shared wireless medium makes MANETmore vulnerable to digital/cyber attacks than wired network there are a number of attacks that affect MANET. * 24. These attacks can be classified into two types: • 1. External Attack: – External attacks are carried out by nodes that do not belong to the network. – It causes congestion sends false routing information or causes unavailability of services. • 2. Internal Attack: – Internal attacks are from compromised nodes that are part of the network. In an internal attack the malicious node from the network gains unauthorized access and impersonates as a genuine node. – It can analyze traffic between other nodes and may participate in other network activities. * 25. • Denial of Service attack: This attack aims to attack the availability of a node or the entire network. If the attack is successful the services will notbe available. The attacker generally uses radio signal jamming and the battery exhaustion method. • Impersonation: If the authentication mechanism is not properly implemented a malicious node can act as a genuine node and monitorthe network traffic. It can also send fake routing packets, and gain access to some confidential information. • Eavesdropping: This is a passive attack. The node simply observes the confidential information. This information can be later used by themalicious node. The secret information like location, public key, private key,password etc. can be fetched by eavesdropper. • Routing Attacks: The malicious node makes routing services a target because it‘s an important service in MANETs. There are two flavors to this routing attack. One is attack on routing protocol and another is attack on packet forwarding or delivery mechanism. * 26. • Black hole Attack: In this attack, an attacker advertises a zero metric for all destinations causing all nodes around it to route packets towards it.[9] A malicious node sends fake routing information, claiming that it has an optimum route and causes other good nodes to route data packetsthrough the malicious one. A malicious node drops all packets that it receives instead of normally forwarding those packets. An attacker listen the requests in a flooding based protocol. • Wormhole Attack: In a wormhole attack, an attacker receives packets at one point in the network, ―tunnels‖ them to another point in the network, and then replays them into the network from that point. Routing can be disrupted when routing control message are tunnelled. This tunnel between two colluding attacks is known as a wormhole. • Replay Attack: An attacker that performs a replay attack are retransmitted the valid data repeatedly to inject the network routing traffic that has been captured previously. This attack usually targets the freshness of routes,but can also be used to undermine poorly designed securitysolutions. * 27. • Jamming: In jamming, attacker initially keep monitoring wireless medium in order to determine frequency at which destination node is receiving signal from sender. It then transmit signal on that frequency so that error free receptor is hindered. • Man- in- the- middle attack: An attacker sites between the sender and receiver and sniffs any information being sent between two nodes. In some cases, attacker may impersonate the sender to communicate with receiver or impersonate the receiver to reply to the sender. • Gray-hole attack: This attack is also known as routing misbehavior attack which leads to dropping of messages. Gray-hole attack has two phases. In the first phase the node advertise itself as having a valid route to destination while in second phase, nodes drops intercepted packets with a certain probability. * 28. Dynamic Source Routing • The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi- hop wireless ad hoc networks of mobile nodes. • DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. • The protocol is composed of the two main mechanisms of "Route Discovery" and "Route Maintenance", which work together to allow nodes to discover and maintain routes to arbitrary destinations in the ad hoc network. • All aspects of the protocol operate entirely on-demand, allowing the routing packet overhead of DSR to scale automatically to only that needed to react to changes in the routes currently in use. * 29. • Route discovery. If the source does not have a route to the destination in its route cache, it broadcasts a route request (RREQ) message specifying the destination node for which the route is requested. • The RREQ message includes a route record which specifies the sequence of nodes traversed by the message. When an intermediate node receives a RREQ, it checks to see if it is already in the route record. If it is, it drops the message. • This is done to prevent routing loops. If the intermediate node had received the RREQ before, then it also drops the message. The intermediate node forwards the RREQ to the next hop according to the route specified in the header. • When the destination receives the RREQ, it sends back a route reply message. If the destination has a route to the source in its route cache, then it can send a route response (RREP) message along this route. Otherwise, the RREP message can be sent along the reverse route back to thesource. • Intermediate nodes may also use their route cache to reply to RREQs. If an intermediate node has a route to the destination in its cache, then it can append the route to the route record in the RREQ, and send an RREP back to the source containing this route. This can help limit flooding of the RREQ. However, if the cached route is out-of-date, it can result in the source receiving staleroutes. * 30. • Route maintenance. When a node detects a broken link while trying to forward a packet tothe next hop, it sends a route error (RERR) message back to the source containing the link in error. When an RERR message is received, all routes containing the link in error are deleted at that node. • As an example, consider the following MANET, where a node S wants to send a packet to D, but does not know the route to D. So, it initiates a route discovery. Source node S floods Route Request (RREQ). Each node appends its own identifier when forwarding RREQ as shown below. * 31. * 32. * 33. * 34. • Destination D on receiving the first RREQ, sends a Route Reply (RREP). • RREP is sent on a route obtained by reversing the route appended to received RREQ. • RREP includes the route from S to D on which RREQ was received by node D. * 35. • Route Reply can be sent by reversing the route in Route Request (RREQ) only if links are guaranteed to be bi-directional. • If Unidirectional (asymmetric) links are allowed, then RREP may need a route discovery from S to D. • Node S on receiving RREP, caches the route included in the RREP. When node S sends a data packet to D, the entire route is included in the packet header {hence the name source routing}. • Intermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded. * 36. * 37. • Route Reply can be sent by reversing the routein Route Request (RREQ) only if links are guaranteed to be bi-directional. If Unidirectional (asymmetric) links are allowed, then RREP may need a route discovery from S to D. Node S on receiving RREP, caches the route included in the RREP. When node S sends a data packet to D, the entire route is included in the packetheader {hence the name source routing}. Intermediate nodes use the source route included in a packetto determine to whom a packet should be forwarded. * 38. * 39. • J sends a route error to S along route J-F- E-S when its attempt to forward the data packet S (with route SEFJD) on J-D fails. Nodes hearing RERR update their route cache to remove link J-D * 40. * 41. • Advantages of DSR: • Routes maintained only between nodes who need to communicate-- reduces overheadof route maintenance • Route caching can further reduce route discovery overhead • A single route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches • Disadvantages of DSR: • Packet header size grows with route length due to source routing • Flood of route requests may potentially reach all nodes in the network • Care must be taken to avoid collisions between route requests propagated by neighboring nodes -- insertion of random delays before forwardingRREQ • Increased contention if too many route replies come back due to nodes replying using their local cache-- Route Reply Storm problem. Reply storm may be eased by preventing a node from sending RREP if it hears another RREP with a shorter route • An intermediate node may send Route Reply using a stale cached route, thus polluting other caches * 42. Ad Hoc On-Demand Distance Vector Routing (AODV) • AODV is another reactive protocol as it reacts to changes and maintains only the active routes in the caches or tables for a pre-specified expiration time. Distance vector means a set of distant nodes, which defines thepath to destination. • AODV can be considered as a descendant of DSR and DSDV algorithms. • It uses the same route discovery mechanism used by DSR. DSR includes source routes in packet headers and resulting large headers cansometimes degrade performance, particularly when data contents of a packet aresmall. • AODV attempts to improve on DSR by maintaining routing tables atthe nodes, so that data packets do not have to containroutes. • AODV retains the desirable feature of DSR that routes are maintained only between nodes which need to communicate. • However, as opposed to DSR, which uses source routing, AODV uses hop- by-hop routing by maintaining routing table entries at intermediatenodes. * 43. • Route Discovery. The route discovery process is initiated when a source needs a route to a destination and it does not have a route in its routing table. • To initiate route discovery, the source floods the network with a RREQ packet specifying the destination for which the route is requested. When a node receives an RREQ packet, it checks to see whether it is the destination or whether it has a route to the destination. • If either case is true, the node generates an RREP packet, which is sent back to the source along the reversepath. • Each node along the reverse path sets up a forward pointer to the node it received the RREP from. This sets up a forward path from the source to the destination. • If the node is not the destination and does not have a route to the destination, it rebroadcasts the RREQ packet. • At intermediate nodes duplicate RREQ packets are discarded. When the source node receives the first RREP, it can begin sending data to the destination. • To determine the relative degree out-of-datedness of routes, each entry in the node routing table and all RREQ and RREP packets are tagged with a destination sequence number. * 44. • A larger destination sequence number indicates a more current (or more recent) route. Upon receiving an RREQ or RREP packet, a node updates its routing information to set up the reverse or forward path, respectively, only if the route contained in the RREQ or RREP packet is more current than its own route. • Route Maintenance. When a node detects a broken link while attempting to forward a packet to the next hop, it generates a RERR packet that is sent to all sources using the broken link. The RERR packet erases all routes using the link along the way. If a source receives a RERR packet and a route to the destination is still required, it initiates a new route discovery process. Routes are also deleted from the routing table if they are unused for a certain amount of time. * 45. * 46. * 47. * 48. * 49. * 50. * 51. • An intermediate node (not the destination) may also send a Route Reply (RREP) provided that it knows a more recent path than the one previously known to sender S. • To determine whether the path known to an intermediate node is more recent, destination sequence numbers are used. • The likelihood that an intermediate node will send a Route Reply when using AODV is not as high as DSR. A new Route Request by node S for a destination is assigned a higher destination sequence number. • An intermediate node which knows a route, but with a smaller sequence number, cannot send Route Reply * 52. * 53. * 54. • When node X is unable to forward packet P (from node S to node D) on link (X,Y), it generates a RERR message Node X increments the destination sequence number for D cached at node X. • The incremented sequence number N is included in the RERR. When node S receives the RERR, it initiates a new route discovery for D using destination sequence number at least as large as N. • When node D receives the route request with destination sequence number N, node D will set its sequence number to N, unless it is already larger than N. * 55. • Sequence numbers are used in AODV to avoid using old/broken routes and to determine which route is newer. Also, it prevents formation of loA s os pu m se .t h a t A does not know about failur of link C-D because RERR sent by C is lost. Now C performs a route discovery for D. Node A receives the RREQ (say, viapath C-E-A) NodeA will reply since A knows a route to D via node B resulting in a loop (for instance, C-E-A-B-C ) * 56. • Neighboring nodes periodically exchange hello message and absence of hello message indicates a link failure. When node X is unable to forward packet P (from node S to node D) on link (X,Y), it generates a RERR message. Node X increments the destination sequence number for D cached at node X. • The incremented sequence number N is included in the RERR. When node S receives the RERR, it initiates a new route discovery for D using destination sequence number at least as large as N. • When node D receives the route request with destination sequence number N, node D will set its sequence number to N, unless it is already larger than N. * 57. • Protocols and Tools: – Wireless Application Protocol-WAP • (Introduction Protocol architecture, and treatment of protocols of all layers), – Bluetooth (User scenarios, physical layer, MAC layer, networking, security, link management) – J2ME. * 58. The Wireless Application Protocol (WAP) • The Wireless Application Protocol (WAP) is an open, global specification that empowers mobile users with wireless devices to easily access and interact with information and services instantly. * 59. The Wireless Application Protocol (WAP) * 60. • WAP is a global standard and is not controlled by any single company. • Ericsson, Nokia, Motorola, and Unwired Planet founded the WAP Forum in the summer of 1997 with the initial purpose of defining an industry-wide specification for developing applications over wireless communications networks. • The WAP specifications define a set of protocols in application, session, transaction, security, and transport layers, which enable operators, manufacturers, and applications providers to meet the challenges in advanced wireless service differentiation and fast/flexible service creation. The Wireless Application Protocol (WAP) * 61. All solutions must be: • interoperable, i.e., allowing terminals and software from different vendors to communicate with networks from different providers • scaleable, i.e., protocols and services should scale with customer needs and number of customers • efficient, i.e., provision of QoS suited to the characteristics of the wireless and mobile networks • reliable, i.e., provision of a consistent and predictable platform for deploying services; and • secure, i.e., preservation of the integrity of user data, protection of devices and services from security problems. * 62. of wireless transports. Why Choose WAP? • In the past, wireless Internet access has been limited by the capabilities of handheld devices and wireless networks. • WAP utilizes Internet standards such as XML, user datagram protocol (UDP), and Internet protocol (IP). Many of the protocols are based on Internet standards such as hypertext transfer protocol (HTTP) and TLS but have been optimized for the unique constraints of the wireless environment: low bandwidth, high latency, and less connection stability. • Internet standards such as hypertext markup language (HTML), HTTP, TLS and transmission control protocol (TCP) are inefficient over mobile networks, requiring large amounts of mainly text-based data to be sent. Standard HTML content cannot be effectively displayed on the small-size screens of pocket-sized mobile phones and pagers. • WAP utilizes binary transmission for greater compression of data and is optimized for long latency and low bandwidth. WAP sessions cope with intermittent coverage and can operate over a wide variety * 63. WAP Architecture • The following figure gives an overview of the WAP architecture, its protocols and components, and compares this architecture with the typical internet architecture when using the World Wide Web. • The basis for transmission of data is formed by different bearer services. • WAP does not specify bearer services, but uses existing data services and will integrate further services. • Examples are message services, such as short message service (SMS) of GSM, circuit-switched data, such as high-speed circuit switched data (HSCSD) in GSM, or packet switched data, such as general packet radio service (GPRS) in GSM. Many other bearers are supported, such as CDPD, IS-136, PHS. * 64. WAP Architecture * 65. WAP Architecture • WDP: – The WAP datagram protocol (WDP) and the additional Wireless control message protocol (WCMP) is the transport layer that sends and receives messages via any available bearer network, including SMS, USSD, CSD, CDPD, IS–136 packet data, and GPRS. – The transport layer service access point (T- SAP) is the common interface to be used by higher layers independent of the underlying network. * 66. WAP Architecture • WTLS: – The next higher layer, the security layer with its wireless transport layer security protocol WTLS offers its service at the security SAP (SEC-SAP). – WTLS is based on transport layer security (TLS, formerly SSL, secure sockets layer). WTLS has been optimized for use in wireless networks with narrow-band channels. It can offer data integrity, privacy, authentication, and (some) denial-of-service protection. * 67. WAP Architecture • WTP: – The WAP transaction protocol (WTP) layer provides transaction support, adding reliability to the datagram service provided by WDP at the transaction SAP (TR-SAP). • WSP: – The session layer with the wireless session protocol (WSP) currently offers two services at the session-SAP (S-SAP), one connection-oriented and one connectionless if used directly on top of WDP. A special service for browsing the web (WSP/B) has been defined that offers HTTP/1.1 functionality, long-lived session state, session suspend and resume, session migration and other features needed for wireless mobile access to the web. • WAE: – The application layer with the wireless application environment (WAE) offers a framework for the integration of different www and mobile telephony applications. * 68. Working of WAP • WAP does not always force all applications to use the whole protocol architecture. • Applications can use only a part of the architecture. • For example, if an application does not require security but needs the reliable transport of data, it can directly use a service of the transaction layer. Simple applications can directly use WDP. * 69. Working of WAP * 70. Working of WAP • Different scenarios are possible for the integration of WAP components into existing wireless and fixed networks. • On the left side, different fixed networks, such as the traditional internet and the public switched telephone network (PSTN), are shown. • One cannot change protocols and services of these existing networks so several new elements will be implemented between these networks and the WAP-enabled wireless, mobile devices in a wireless network on the right-hand side. * 71. Wireless Datagram Protocol (WDP) • Wireless Datagram Protocol defines the movement of information from receiver to the sender and resembles the User Datagram Protocol in the Internet protocol suite. * 72. WDP * 73. WDP • WDP offers a consistent service at the Transport Service Access Point to the upper layer protocol of WAP. • This consistency of service allows for applications to operate transparently over different available bearer services. • WDP can be mapped onto different bearers, with different characteristics. In order to optimize the protocol with respect to memory usage and radio transmission efficiency, the protocol performance over each bearer may vary. * 74. WDP • WDP offers source and destination port numbers used for multiplexing and demultiplexing of data respectively. • The service primitive to send a datagram is TDUnitdata. req with the destination address (DA), destination port (DP), Source address (SA), source port (SP), and user data (UD) as mandatory parameters. • Destination and source address are unique addresses for the receiver and sender of the user data. • These could be MSISDNs (i.e., a telephone number), IP addresses, or any other unique identifiers. • The T-DUnitdata.ind service primitive indicates the reception of data. Here destination address and port are only optional parameters. * 75. WDP WDP serviceprimitives * 76. WDP • If a higher layer requests a service the WDP cannot fulfil, this error is indicated with the T-DError.ind service primitive. • An error code (EC) is returned indicating the reason for the error to the higher layer. WDP is not allowed to use this primitive to indicate problems with the bearer service. • It is only allowed to use the primitive to indicate local problems, such as a user data size that is too large. • If any errors happen when WDP datagrams are sent from one WDP entity to another, the wireless control message protocol (WCMP) provides error handling mechanisms for WDP and should therefore be implemented. • WCMP contains control messages that resemble the internet control message protocol messages and can also be used for diagnostic and informational purposes. • WCMP can be used by WDP nodes and gateways to report errors. * 77. WDP • Typical WCMP messages are destination unreachable (route, port, address unreachable), parameter problem (errors in the packet header), message too big, reassembly failure, or echo request/reply. • An additional WDP management entity supports WDP and provides information about changes in the environment, which may influence the correct operation of WDP. * 78. BLUETOOTH • Device synchronization: Seamless connectivity among PDAs,computers, and mobile phones allows applications to update information on multiple devices automatically when data on any one devicechanges. • Peripheral connectivity. • Car kits: Hands-free packages enable users to access phones andother devices without taking their hands off the steering wheel • Mobile payments: Your Bluetooth-enabled phone can communicate with a Bluetooth-enabled vending machine to buy a can of Diet Pepsi, and put the charge on your phone bill. • The 802.11b protocol is designed to connect relatively large devices with lots of power and speed, such as desktops and laptops, where devices communicate at up to 11 Mbit/sec, at greater distances (up to 300 feet, or 100 meters). By contrast, Bluetooth is designed to connect small devices like PDAs, mobile phones, and peripherals at slower speeds (1 Mbit/sec), within a shorter range (30 feet, or 10 meters), which reduces power requirements. Another major difference is that 802.11b wasn't designedfor voice communications, while any Bluetooth connection can support both data and voice communications. • User scenarios * 79. • Networking in Bluetooth • Bluetooth operates on 79 channels in the 2.4 GHz band with 1 MHz carrier spacing. Each device performs frequency hopping with 1,600 hops/s in a pseudo random fashion. A piconet is a collection of Bluetooth devices which are synchronized to the same hopping sequence. One device in the piconet can act as master (M), all other devices connected to the master must act as slaves (S). The master determines the hopping pattern in the piconet and the slaves have to synchronize to this pattern. Each piconet has a unique hopping pattern. If a device wants to participate it has to synchronize to this. A typical piconet is shown below: * 80. * 81. • Parked devices (P) can not actively participate in the piconet (i.e., they do not have a connection), but are known and can be reactivated within some milliseconds. Devices in stand-by (SB) do not participate in the piconet. Each piconet has exactly one master and up to seven simultaneous slaves. More than 200 devices can be parked. The first step in forming a piconet involves a master sending its clock and device ID. All the Bluetooth devices have the same capability to become a master or a slave and two or three devices are sufficient to form a piconet. The unit establishing the piconet automatically becomes the master, all other devices will be slaves. The hopping pattern is determined by the device ID, a 48-bit worldwide unique identifier. • The phase in the hopping pattern is determined by the master‘s clock. After adjusting the internal clock according to the master a device may participate in the piconet. All active devices are assigned a 3-bit active member address (AMA). All parked devices use an 8-bit parked member address (PMA). Devices in stand-by do not need an address. * 82. • A device in one piconet can communicate to another device in another piconet, forming a scatternet. A master in one piconet may be a slave in another piconet. Both piconets use a different hopping sequence, always determined by the master of the piconet. Bluetooth applies FH-CDMA for separation of piconets. * 83. * 84. • A collision occurs if two or more piconets use the same carrier frequency at the same time. This will probably happen as the hopping sequences are not coordinated. If a device wants to participate in more than one piconet, it has to synchronize to the hopping sequence of the piconet it wants to take part in. If a device acts as slave in one piconet, it simply starts to synchronize with the hopping sequence of the piconet it wants to join. After synchronization, it acts as a slave in this piconet and no longer participates in its former piconet. To enable synchronization, a slave has to know the identity of the master that determines the hopping sequence of a piconet. Before leaving one piconet, a slave informs the current master that it will be unavailable for a certain amount of time. The remaining devices in the piconet continue to communicate as usual. * 85. Bluetooth Protocol Stack • The Bluetooth protocol stack can be divided into a core specification, which describes the protocols from physical layer to the data link control together with management functions, and profile specifications describing many protocols and functions needed to adapt the wireless Bluetooth technology to legacy and new applications. • A high-level view of the architecture is shown. The responsibilities of the layers in this stack are as follows: • The radio layer is the physical wireless connection. To avoid interference with other devices that communicate in the ISM band, the modulation is based on fast frequency hopping. Bluetooth divides the 2.4 GHz frequency band into 79 channels 1 MHz apart (from 2.402 to 2.480 GHz), and uses this spread spectrum to hop from one channel to another, up to 1600 • times a second. The standard wavelength range is 10 cm to 10 m, and can be extended to 100 m by increasing transmission power. * 86. * 87. • The baseband layer is responsible for controlling and sending data packets over the radio link. It provides transmission channels for both data and voice. The baseband layer maintains Synchronous Connection-Oriented (SCO) links for voice and Asynchronous Connectionless (ACL) links for data. SCO packets are never retransmitted but ACL packets are, to ensure data integrity. SCO links are point-to-point symmetric connections, where time slots are reserved to guarantee timely transmission. A slave device is allowed to respond during the time slot immediately following an SCO transmission from the master. A master can support up to three SCO links to a single slave or to multiple slaves, and a single slave can support up to two SCO links to different slaves. Data transmissions on ACL links, on the other hand, are established on a per-slot basis (using slots not reserved for SCO links). ACL links support point-to-multipoint transmissions. After an ACL transmission from the master, only a slave addressed specificallymay respond during the next time slot; if no device is addressed, the messageis treated as a broadcast. * 88. • by the application, or through certain support protocols provided to ease the burden on application programmers. • The Logical Link Control and Adaptation Protocol (L2CAP) receives application data and adapts it to the Bluetooth format. Quality of Service (QoS) parameters are exchanged at this layer. * 89. • Link Manager Protocol • The link manager protocol (LMP) manages various aspects of the radio link between a master and a slave and the current parameter setting of the devices. LMP enhances baseband functionality, but higher layers can still directly access the baseband. The following groups of functions are covered by the LMP: • Authentication, pairing, and encryption: Although basic authentication is handled in the baseband, LMP has to control the exchange of random numbers and signed responses. LMP is not directly involved in the encryption process, but sets the encryption mode (no encryption, point-to-point, or broadcast), key size, and random speed. • Synchronization: Precise synchronization is of major importance within a Bluetooth network. The clock offset is updated each time a packet is received from the master. • Capability negotiation: Not only the version of the LMP can be exchanged but also information about the supported features. Not all Bluetooth devices will support all features that are described in the standard, so devices have to agree the usage of, e.g., multi-slot packets, encryption, SCO links, voice encoding, park/sniff/hold mode, HV2/HV3 packets etc. • Quality of service negotiation: Different parameters control the QoS of a Bluetooth device at these lower layers. The poll interval, i.e., the maximum time between transmissions from a master to a particular slave, controls the latency and transfer capacity. A master can also limit the number of slots available for slaves’ answers to increase its own bandwidth. • Power control: A Bluetooth device can measure the received signal strength. Depending on this signal level the device can direct the sender of the measured signal to increase or decrease its transmit power. • Link supervision: LMP has to control the activity of a link, it may set up new SCO links, or it may declare the failure of a link. • State and transmission mode change: Devices might switch the master/slave role, detach themselves from a connection, or change the operating mode * 90. • Bluetooth defines several low-power states for a device. The following figure shows the major states of a Bluetooth device and typical transitions. Every device, which is currently not participating in a piconet (and not switched off), is in standby mode. This is a low-power mode where only the native clock is running. The next step towards the inquiry mode can happen in two different ways. Either a device wants to establish a piconet or a device just wants to listen to see if something is going on. * 91. * 92. • A device wants to establish a piconet: A user of the device wants to scan for other devices in the radio range. The device starts the inquiry procedure by sending an inquiry access code (IAC) that is common to all Bluetooth devices. The IAC is broadcast over 32 so- called wake-up carriers in turn. • Devices in standby that listen periodically: Devices in standby may enter the inquiry mode periodically to search for IAC messages on the wake-up carriers. As soon as a device detects an inquiry it returns a packet containing its device address and timing information required by the master to initiate a connection. From that moment on, the device acts as slave. * 93. * 94. • During the page state two different roles are defined. After finding all required devices the master is able to set up connections to each device, i.e., setting up a piconet. As soon as a device synchronizes to the hopping pattern of the piconet it also enters the connection state. The connection state comprises the active state and the low power states: park, sniff, and hold. In the active state the slave participates in the piconet by listening, transmitting, and receiving. ACL and SCO links can be used. A master periodically synchronizes with all slaves. All devices being active must have the 3-bit active member address (AMA). To save battery power, a Bluetooth device can go into one of three low power states: * 95. • L2CAP • The logical link control and adaptation protocol (L2CAP) is a data link control protocol on top of the baseband layer offering logical channels between Bluetooth devices with QoS properties. L2CAP is available for ACLs only. • L2CAP provides three different types of logical channels that are transported via the ACL between master and slave: • Connectionless: These unidirectional channels are typically used for broadcasts from a master to its slave(s). • Connection-oriented: Each channel of this type is bi- directional and supports QoS flow specifications for each direction. These flow specs follow RFC 1363 and define average/peak data rate, maximum burst size, latency, and jitter. * 96. • Signaling: This third type of logical channel is used to exchanging signaling messages between L2CAP entities. • Each channel can be identified by its channel identifier (CID). Signaling channels always use a CID value of 1, a CID value of 2 is reserved for connectionless channels. For connection-oriented channels a unique CID (>= 64) is dynamically assigned at each end of the channel to identify the connection. • The following figure shows the three packet types belonging to the three logical channel types. * 97. • The length field indicates the length of the payload (plus PSM for connectionless PDUs). The CID has the multiplexing/demultiplexing function. For connectionless PDUs a protocol/service multiplexor (PSM) field is needed to identify the higher layer recipient for the payload. For connection-oriented PDUs the CID already fulfills this function. Several PSM values have been defined, e.g., 1 (SDP), 3 (RFCOMM), 5 (TCS-BIN). Values above 4096 can be assigned dynamically. The payload of the signaling PDU contains one or more commands. Each command has its own code (e.g., for command reject, connection request, disconnection response etc.) and an ID that matches a request with its reply. The length field indicates the length of the data field for this command. * 98. • The first step, called pairing, is necessary if two Bluetooth devices have never met before. To set up trust between the two devices a user can enter a secret PIN into both devices. This PIN can have a length of up to 16 byte. Based on the PIN, the device address, and random numbers, several keys can be computed which can be used as link key for authentication. The authentication is a challenge-response process based on the link key, a random number generated by a verifier (the device that requests authentication), and the device address of the claimat (the device that is authenticated). * 99. • Based on the link key, and again a random number an encryption key is generated during the encryption stage of the security architecture. This key has a maximum size of 128 bits and can be individually generated for each transmission. Based on the encryption key, the device address and the current clock a payload key is generated for ciphering user data. The payload key is a stream of pseudo-random bits. The ciphering process is a simple XOR of the user data and the payload key. • All Bluetooth-enabled devices must implement the Generic Access Profile, which contains all the Bluetooth protocols and possible devices. This profile defines a security model that includes three security modes. * 100. Bluetooth Profiles • Bluetooth profiles are intended to ensure interoperability among Bluetooth-enabled devices and applications from different manufacturers and vendors. A profile defines the roles and capabilities for specific types of applications. Profiles represent default solutions for a certain usage model. They use a selection of protocols and parameter set to form a basis for interoperability. Protocols can be seen as horizontal layers while profiles are vertical slices as shown below: * 101. . • The following basic profiles have been specified: generic access, service discovery, cordless telephony, intercom, serial port, headset, dialup networking, fax, LAN access, generic object exchange, object push, file transfer, and synchronization. Additional profiles are: advanced audio distribution, PAN, audio video remote control, basic printing, basic imaging, extended service discovery, generic audio video distribution, hands-free, and hardcopy cable replacement. Some of the profiles are given below: • The Generic Access Profile defines connection procedures, device discovery, and link management. It also defines procedures related to use of different security models and common format requirements for parameters accessible on the user interface level. At a minimum all Bluetooth devices must support this profile. * 102. Java 2 Micro Edition (J2ME) • Sun Microsystems defines J2ME as "a highly optimized Java run- time environment targeting a wide range of consumer products, including pagers, cellular phones, screen-phones, digital set-top boxes and car navigation systems." J2ME brings the cross-platform functionality of the Java language to smaller devices, allowing mobile wireless devices to share applications. Java 2 Micro Edition maintains the qualities that Java technology has become known for: • built-in consistency across products in terms of running anywhere, anytime, on any device • the power of a high-level object-oriented programming language with a large developer base; • portability of code; • safe network delivery; and • upward scalability with J2SE and J2EE * 103. • class libraries that are far more domain- specific than the class libraries provided in a configuration. * 104. Configurations • A configuration is a subset of profile. A configuration defines a Java platform for a ―horizontal‖category or grouping of devices with similar requirements on total memory budget and other hardware capabilities. More specifically, a configuration: • specifies the Java programming language features supported, • specifies the Java virtual machine features supported, • specifies the basic Java libraries and APIs supported. • To avoid fragmentation, there will be a very limited number of J2ME configurations. Currently, the goal is to define two standard J2ME configurations: * 105. Thank you Jetzt herunterladen ALS UNANGEMESSEN MELDEN Wählen Sie Ihren Grund dafür aus, dass Sie diese Präsentation als unangemessen melden.*Grund auswählenDiffamierendGewaltdarstellung oder TerrorpropagandaHassrede oder DiskriminierungDrohungen oder BeleidigungenPornografischSpam oder Betrug*erforderlich Melden Copyright-Beschwerde 0 GEFÄLLT MIR Sei der Erste, dem dies gefälltMehr anzeigen VIEWS Aufrufe insgesamt70 Auf Slideshare0 Aus Einbettungen0 Anzahl der Einbettungen0 DIESER GESPEICHERTE EINTRAG IST AUCH IN EINER LISTE. Das Entfernen aus „Gespeichert“ löscht den Titel auch aus Ihren Listen. AbbrechenLöschen ZU EINER NEUEN LISTE HINZUFÜGEN Wie möchten Sie diese Liste nennen?* *erforderlich0/50 Liste privat machen AbbrechenSpeichern InfoSupportAGBPrivacyDatenschutzCookie-EinstellungenMeine persönlichen Daten nicht verkaufen oder weitergebenEverand Deutsche English Español Portugues Français Aktuelle SpracheDeutsche -------------------------------------------------------------------------------- © 2024 SlideShare von Scribd