EDUCBA

EDUCBA

MENUMENU
  • Free Tutorials
  • Free Courses
  • Certification Courses
  • 600+ Courses All in One Bundle
  • Login

Mobile Ad Hoc Network

By Priya PedamkarPriya Pedamkar

Home » Software Development » Software Development Tutorials » Network Security Tutorial » Mobile Ad Hoc Network

Mobile-AD-Hoc-Network

Introduction to Mobile Ad Hoc Network

The term “Ad Hoc” (temporary or when needed) in the phrase Ad-Hoc network itself tells us the meaning of Ad-hoc network. It means a network that is temporary or setup immediately when needed for random temporary access. So an Ad Hoc network is a group of “locally-available” devices that can connect and talk to each other directly whenever needed without the need of any router or server. This network breaks when the connected devices go out of the network i.e. disconnect from the network, so the network breaks with the closing of the Ad-Hoc connection. Mobile Ad Hoc Network or MANET can be explained as a transportable network that can be created and implemented as & when required based on the requirement set on the scenario, and hence the name has ‘ad hoc’ in it. It is extensively chosen due to its significant characteristics like the auto configuring ability, ability to function as a cordless or wireless network, self-diagnosing capability when an issue arises in connectivity, etc.

These networks use device-to-device communication instead of using the hardware used in traditional networks. These networks skip or avoid the hardware of a traditional network. These are local area networks (LANs) that allow devices in a range of each other to connect wirelessly, instead of using a fixed server or router to act as a central hub for connected devices.

Start Your Free Software Development Course

Web development, programming languages, Software testing & others

What is a Network?

A network, in terms of electronics, is a group of devices or nodes like a PC, a cellphone, a tablet, etc. Which are connected to each other in such a way so that they are able to share resources and data with each other for communication in order to benefit the end-user i.e. us

What is Mobile Ad Hoc Networks?

We just need to add the term “mobile” with them which will lead us to MANET i.e. Mobile Ad-hoc Networks. Thus, MANETs can be defined as the Ad Hoc networks which use mobile devices i.e. movable wireless devices (laptops, smartphones, iPads, etc.) as their nodes of connection and communication.

An example of MANET is a VANET (Vehicular Ad-hoc Network) in which communication devices are installed inside vehicles to share data of traffic among the cars. Also, wireless sensor networks are an example of MANETs.

MANETs Features

Below are some of the features.

  • No hardware or fixed infrastructure, the mobile devices involved talk and transfer data directly to each other autonomously.
  • Self-repairing.
  • Auto configured.
  • Also known as Wireless Ad-hoc Network (WANET), on the fly networks or spontaneous networks.
  • Each device itself acts as a router and transfers data packets to another device/node.

Working of MANETs

The working of MANETs are as follows.

  • Work as an individual exclusively or in a group as a part of a huge network like the internet.
  • No access point or hardware.
  • Direct & autonomous communication between mobile devices.
  • The devices search each other themselves and start communicating.
  • If a node is far away, then the nodes between the source and destination nodes act as routers and transfer data one by one to make it reach the destination node.
  • The devices can join or leave the network anytime i.e. dynamic node addition or removal happens.
  • The devices have their own backups of energy like they have batteries for power.

Application of Mobile Ad-hoc Networks

MANETs are used in various fields like:

  • Gaming Services: For collaborative gaming in local area networks in schools, competitions, etc.
  • Military Services: For immediately sending information to all remote troops or battalions, for meetings, etc.
  • Commercial Use: Local Conferences, Events, Seminars.
  • Industrial sector.
  • Emergency services like earthquakes, disaster relief, fire fighting, natural disasters which need services without infrastructure.
  • Education Sector: In classrooms, labs of schools, colleges, etc. for sharing lectures, etc.
  • Bluetooth communication.

Characteristics of Mobile Ad-Hoc Networks

Following are the characteristics explained below.

  • No Centralized Control: The working is completely dependent on the behavior and support of the participating devices.
  • Random Change of Devices: Devices keep on coming and leaving the network at a huge pace and voluntarily.
  • Frequent changes in network topology i.e. the arrangement of devices in the network
  • Limited battery power
  • Limite human interference
  • Less Security: These networks have bigger threats than on wired networks.
  • The devices involved in these networks being so smaller nowadays can easily be a victim of theft.
  • They can be attacked easily.
  • Each device acts as a router as well as ahead of the network, so each device plays twofold or double roles.
  • Limited Bandwidth: These networks have very little capacity and range of data transmission.
  • Low resources such as memory power, battery power, backups, etc.
  • Performance is high with low expenses and scalability advantages.

Conclusion

MANETs have so much dynamism into them which makes them a necessary technology for the rapid changes happening in the world of communication. With the increase of mobile devices such as laptops, cellphones, ipads & pdas, etc., such networks like MANETs are of huge significance and cannot be avoided completely.

Recommended Articles

This has been a guide to Mobile Ad Hoc Network. Here we discuss the main features, working, application and characteristics of Mobile Ad Hoc Network. You may also have a look at the following articles to learn more –

  1. Daisy Chain Network
  2. DNN Neural Network
  3. Feedforward Neural Networks
  4. What is VLAN Network?

All in One Software Development Bundle (600+ Courses, 50+ projects)

Popular Course in this category
All in One Software Development Bundle (600+ Courses, 50+ projects)600+ Online Courses | 3000+ Hours | Verifiable Certificates | Lifetime Access
4.6 (3,144 ratings)
Course Price

View Course

Related Courses
CDN Training (2 Courses)OSPF Training Program (2 Courses)Penetration Testing Training Program (2 Courses)

600+ Online Courses

3000+ Hours

Verifiable Certificates

Lifetime Access

Learn More

0 Shares
Share
Tweet
Share
Primary Sidebar
Network Security Tutorial
  • Basics
    • Security Consultant Definition
    • Security Policies
    • What is Network Security
    • What is Data Security?
    • What is Cryptography
    • Cryptography Techniques
    • Cryptography Tools
    • Data Security Techniques and Privacy
    • Digital Signature Cryptography
    • Java Cryptography
    • Basics of Cybersecurity
    • What is Network Topology
    • Algorithms and Cryptography
    • HTTP Methods
    • Security Technologies
    • Security Architecture
    • Network Topologies
    • What is a Physical Address?
    • Logical Address
    • What is Storage Area Network?
    • Mobile Ad Hoc Network
    • What is Computer Networks?
    • Security Principles
    • What is Remote Access?
  • Protocols
    • What is TCP Protocol
    • What is TCP/IP
    • How do IP Addresses Work?
    • Routing Protocols Types
    • What is Telnet
    • What is TFTP
    • What is DHCP
    • What is SFTP
    • Address Resolution Protocol
    • Internet Control Message Protocol
    • Simple Mail Transfer Protocol
    • Internet Security Protocols
    • SMTP Protocol
    • Types of Networking Protocols
    • User Datagram Protocol
    • Data Link Layer
    • Data Link Layer Services
    • Network Layer
    • Transport Layer Protocols
    • What Is Networking Protocols
    • TFTP
    • What is ARP
    • Basic Fundamental Of Networking
    • What is IPv4
    • What is IPv6
    • CIFS Protocol
    • What is SMB?
    • What is EIGRP
    • What is LLDP?
  • Routing
    • What is Router
    • Types of Routers
    • Dynamic Routing
    • Routing Algorithms
    • Routing Protocol
    • What is Routing
    • What is Static Routing
    • Important Types of DNS Servers (Powerful)
  • Attacks
    • Types of Network Attacks
    • What is Trojan Horse Virus
    • What is DOS
    • Types of DOS Attacks
    • DDos Attack Mitigation
    • Ransomware Attack  
    • Types of Cyber Attack
    • What is a Brute Force Attack
    • What is a Phishing Attack
    • What is Cyber Attack
    • What is DDoS Attack
    • What is Man In The Middle Attack
    • What is Man In The Middle Attack
    • What is Ransomware
    • What is Pharming
    • What is Phishing
    • What is CSRF
    • DNS Amplification Attack
    • Denial of Service Attack
  • Algorithm
    • IDEA Algorithm
    • MD5 Algorithm
    • Symmetric Algorithms
    • Diffie Hellman Key Exchange Algorithm
    • Digital Signature Algorithm
    • Encryption Algorithm
    • Advanced Encryption Standard
    • Asymmetric Encryption
    • ElGamal Encryption
    • HMAC
    • DES Algorithm
    • Brute Force Algorithm
    • SHA Algorithm
    • RSA Algorithm
    • What is Digital Certificate?
    • Certificate Revocation
    • RC5
  • Encryption/ Decryption
    • Encryption process
    • Public Key Encryption
    • Symmetric Key Encryption
    • What is Encryption
    • What is Decryption
    • Types of Cipher
    • Transposition Techniques
    • What is Steganography
    • One Time Pad
    • Steganography Techniques
  • Hosting
    • Types of Web Hosting
    • Free Web Hosting Sites
    • What is Hosting
    • What is VPS Hosting
    • What is Web Hosting
    • Types of Domain
    • VPN Applications for PC
    • Why we use VPN?
    • What is Virtual Host?
  • Firewalls
    • What is a Firewall?
    • Types of Firewalls
    • Firewall Devices
    • Firewall Uses
  • Advanced
    • Cryptosystems
    • Configuring DHCP Server
    • Block Cipher modes of Operation
    • TCP/IP Model
    • Types of Network
    • Types of Network Devices
    • Types of Network Topology
    • Types of Intrusion Prevention System
    • Types of Proxy Servers
    • Types of Websites
    • Types of NAT 
    • Mobile IP
    • Career in Automobile Design
    • What is TFS
    • What is NAT
    • What is OSI Model
    • Data Link Layer OSI Model
    • What is Cross Site Scripting
    • Applications of Sensors
    • ARP Packet Format
    • Asymmetric Information
    • Autoencoders
    • What is FTP Server?
    • IPS Tools
    • IPv4 Header Format
    • IPv6 Header Format
    • Authentication Header
    • Kerberos
    • Network Mapper
    • Network Scanning Tools
    • Network Mapping Tools
    • Network Access Control
    • Vulnerability Assessment Tools
    • Network Sniffer
    • Networking Commands
    • Networking Devices
    • Networking Strategies
    • Digital Certificate
    • What is a Digital Signature?
    • Digital Signature Softwares
    • Digital Signature Types
    • Digital Signature vs Digital Certificate
    • PKCS
    • What is FTP
    • FTP Commands
    • What is MIME?
    • What is Smart Card?
    • Networking Ports
    • Mutual Authentication
    • Password Authentication
    • Data Masking 
    • Authentication Tokens
    • Biometric Authentication
    • What is IP?
    • IPSec
    • Secure Electronic Transaction
    • What is CIDR
    • Static Binding and Dynamic Binding
    • What is SSL
    • PKIX
    • Public Key Infrastructure
    • What is Wireshark
    • Daisy Chain Topology
    • Markov Logic Network
    • Security engineering
    • SNMP Monitoring Tools
    • Network Analysis Tools
    • Server Monitoring Tools
    • Network Discovery Tools
    • Network Management Tool
    • SIEM Tools
    • OSINT Tools
    • Multiple Ping Tool
  • Interview Questions
    • Network Security Interview Questions
    • Networking Interview Questions
    • EIGRP Interview Questions

Related Courses

CDN Training

OSPF Certification Training

Penetration Training Course

Footer
About Us
  • Blog
  • Who is EDUCBA?
  • Sign Up
  • Corporate Training
  • Certificate from Top Institutions
  • Contact Us
  • Verifiable Certificate
  • Reviews
  • Terms and Conditions
  • Privacy Policy
  •  
Apps
  • iPhone & iPad
  • Android
Resources
  • Free Courses
  • Java Tutorials
  • Python Tutorials
  • All Tutorials
Certification Courses
  • All Courses
  • Software Development Course - All in One Bundle
  • Become a Python Developer
  • Java Course
  • Become a Selenium Automation Tester
  • Become an IoT Developer
  • ASP.NET Course
  • VB.NET Course
  • PHP Course

© 2020 - EDUCBA. ALL RIGHTS RESERVED. THE CERTIFICATION NAMES ARE THE TRADEMARKS OF THEIR RESPECTIVE OWNERS.

EDUCBA Login

Forgot Password?

EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you
Book Your One Instructor : One Learner Free Class

Let’s Get Started

This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy. By closing this banner, scrolling this page, clicking a link or continuing to browse otherwise, you agree to our Privacy Policy

EDUCBA

*Please provide your correct email id. Login details for this Free course will be emailed to you
EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you

Special Offer - All in One Software Development Bundle (600+ Courses, 50+ projects) Learn More