Skip to content
Related Articles

Related Articles

Improve Article

MANET Full Form

  • Last Updated : 30 Apr, 2020
Geek Week

MANET stands for Mobile Ad Hoc Network. Because MANETS are mobile, they use wireless connections to connect to various networks. This can be a standard Wi-Fi connection, or another medium, such as a cellular or satellite transmission. MANET is a self arrangement of a network of mobile routers connected through wireless links without an access point.


Every mobile device in a network is autonomous. The mobile devices are free to move randomly and organize themselves. Nodes in the MANET share the wireless medium and the way in which the constituent parts are interrelated of the network changes irregularly and dynamically. In MANET, it is very frequent of breaking communication link, because the nodes are free to move anywhere.


MANET is categorized into first, second, and third generations. The first generation was stood with “packet radio” networks (PRNET) and were sponsored by DARPA in early 1970. The second generation came in the 1980s when SURAN (Survivable Adaptive Radio Networks) significantly (above microscopic observation) had been improved upon the radios, scalability of algorithms, and flexibility/elasticity to electronic attacks. Important developments during that period include GloMo (Global Mobile Information System) and NTDR ( Near Term Digital Radio) which is the observation that time according to need and requirements.
The third generation came in the 1990s which was also termed as commercial network with the arrival of Notebooks computers, open-source software, and tools based on RF and infrared. IEEE 802.11 subcommittee marked the term “ad hoc networks.” And the concept of commercial (non-military) ad hoc networking had arrived. Within the IETF, the Mobile Ad Hoc Networking (MANET) working group was horn and sought to standardize routing protocols for ad hoc networks.

Attacks in MANET

MANET security LayerAttacks
Application LayerMalicious code, Repudiation
Transport LayerSession hijacking, SYN Flooding
Network LayerFlooding, Black Hole, Grey Hole.
Worm Hole, Link Spoofing etc.
Data Link LayerTraffic analysis and monitoring.
Physical LayerTraffic Jamming, Eavesdropping

Application Areas

  • Military or police exercises.
  • Disaster relief operations.
  • Mine site operations.
  • Urgent Business meetings.
  • Personal area network.


  • Router Free Connection to the internet without any wireless router is the main advantage of using a mobile ad hoc network. Because of this, running an ad hoc network can be more affordable than a traditional network.
  • Fault Tolerance MANET supports connection failures because routing and transmission protocols are designed to manage these situations.
  • Mobile Ad hoc Network is a collection of autonomous and mobile elements such as laptops, smartphones, wearable computers, tablets, PC, PDA, etc.
  • The mobile nodes can dynamically self-organize in an arbitrary temporary network topology.


  • Energy management is the process of managing the sources and consumers of energy in the node or in the network as a whole for enhancing the lifetime of the network.
  • Security in Mobile Adhoc Network is very important, especially in military applications.
  • During deployment of Adhoc wireless network involves actions different from the wired network. The good amount of planning and estimation of future traffic growth becomes important as their need.
My Personal Notes arrow_drop_up
Recommended Articles
Page :