Académique Documents
Professionnel Documents
Culture Documents
Souvik Paul1, Digbijay Guha2, Atrayee Chatterjee3, Samarth Metha4, Ayushi Shah5
1,2 Assistant Professor, BCA Department of The Heritage Academy, West Bengal, India
3 Lecturer, BCA Department of The Heritage Academy, West Bengal, India
4, 5 Student, BCA Department of The Heritage Academy, West Bengal, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract Ad-Hoc Networks are inherently self-forming, survive longer. The principle behind ad hoc network is multi-
self-arranging and their nodes are free to move arbitrarily and hop relaying. The use of ad hoc voice communication was
organize themselves at random. Router is a networking device used in many ancient/tribal societies with the help of a string
that sends messages or data packets between computer of repeaters of drums, trumpets, or horns.
networks. Network Bridge is a computer networking
device which makes a single combined network from The security issue in ad hoc network is dynamic topology,
multiple communication networks or network segments. bandwidth, small device size and limited battery life. Due to
Repeater is an electronic device which receives a signal and the dynamic nature, it is difficult to maintain secured
retransmits it. Artificial Neural Networks are computing transmission in the network (Papadimitratos and Haas,
systems inspired by the Biological Neural Networks that 2002). The ad hoc network does not depend on any pre-
constitute animal brains. This paper aims at achieving a existing infrastructure so that the node can leave and join the
comparative study among Artificial Neural Network, Ad-Hoc network in such a situation where security may fall down.
Networks, Router, Bridge, and Repeater. On the basis of that a Two types of attack occur in ad hoc network, first is passive
case study is generated to test the validation of these. attack, this attack does not change the transmitted data in
the network. But, it can allow unauthorized user to discover
Key Words: Artificial Neural Network, Ad-Hoc Network, the message. Second, is active attack, it is a severe attack and
Router, Bridge, Repeater prevents the message flow between the node in the network.
It may allow the unauthorized user to modify the message.
1. INTRODUCTION Dropped packet, battery drained, bandwidth consumption,
unreliable packets, delay, connection break and false routing
Ad-Hoc Wireless Networks are inherently self-forming, self- can identify the malicious node.
arranging and self-administering. The nodes are free to move
arbitrarily and organize themselves at random. The biggest With the increased number of lightweight devices as well as
challenge in these kinds of networks is finding the path evolution in wireless communication, the ad hoc networking
between the communication end points of nodes that are technology is gaining effort with the increasing number of
movable. Because of restricted transmission range of widespread applications. Ad hoc networking can be used
wireless interfaces, the communication traffic has to be anytime, anywhere with limited or no communication
extended over a number of intermediate nodes to facilitate infrastructure. The preceding infrastructure is fancy or
the communication between two nodes. Thus, these kinds of annoying to use. The ad hoc network architecture can be
networks are also called as multi-hop ad-hoc networks. used in real time business applications, corporate companies
Every node acts as both, a host and as a router. to increase the productivity and profit.
The rapid development in ad hoc technology is widely used The ad hoc networks can be classified according to their
in portable computing such as laptop, mobile phone used to application as Mobile Ad hoc Network (MANET) that is a self-
access the web services, telephone calls when the user are in arranging infrastructure less network of mobile devices
travelling. Development of self-organizing network decreases communicated through wireless link. Vehicular Ad hoc
the communication cost. The growth of 4G technologies Network (VANET) uses travelling cars as nodes in a network
enhances anytime, anywhere, anyhow communication in ad to create a mobile network. Wireless Sensor Network (WSN)
hoc network. Ad hoc network is simple to design and install. consists of autonomous sensors to control the environmental
The ad hoc networks are self-forming, self-maintaining, self- actions.
healing architecture. The challenges are, no fixed access
point, dynamic network topology, contrary environment and The importance of ad hoc network has been highlighted in
irregular connectivity. Ad hoc network immediately forms many fields which are described below:
and accommodate the modification and limited power.
The limitation associated with wireless devices is the power Military Arena: An ad hoc networking will allow the
constraint of the nodes i.e. each node has only limited battery military battleground to maintain an information
power which should be used judiciously for the node to
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1795
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
network among the soldiers, vehicles and headquarters supplies, to minimize a cost function while fulfilling certain
(Bangnan et al., 2003). transport and application layer communication demands.
Provincial Level: Ad hoc networks can build instant link
between multimedia network using notebook computers 1.2 Routing in Ad Hoc Wireless Networks
or palmtop computers to spread and share information
among participants (e.g. Conferences). As the nodes in a wireless ad hoc network can be
Personal Area Network: A personal area network is a connected in a dynamic and arbitrary manner, the nodes
short range, localized network where nodes are usually themselves must behave as routers and take part in
associated with a given range. discovery and maintenance of routes to other nodes in the
Industry Sector: Ad hoc network is widely used for network.
commercial applications. Ad hoc network can also be
used in emergency situation such as disaster relief. The The goal of a routing algorithm is to devise a scheme for
rapid development of non-existing infrastructure makes transferring a packet from one node to another. One
the ad hoc network easily to be used in emergency challenge is to define/choose which criteria to base the
situation. routing decisions on. Examples of such criteria include hop
Bluetooth: Bluetooth can provide short-range length, latency, and bandwidth and transmission power.
communication between the nodes such as a laptop and
mobile phone. Some challenges in designing a routing protocol for ad hoc
wireless networks, and a brief overview of these is given
below:
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1796
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
This type of protocols maintains fresh lists of destinations ZRP (Zone Routing Protocol)
and their routes by periodically distributing routing tables ZRP uses IARP as pro-active and IERP as reactive
throughout the network. component.
ZHLS (Zone-based Hierarchical Link State Routing
The main disadvantages of such algorithms are: Protocol)
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1797
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
2. ROUTER
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1798
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
gateway. With the advent of the Internet, usages of Multiport Bridging: A multiport bridge connects
access server type routers are expanded. Firstly it is multiple networks and operates transparently to decide
used with dial-up access and another resurrection with on a frame-by-frame basis whether and where to forward
voice phone service. traffic. Like the simple bridge, a multiport bridge typically
Multilayer Switches: Larger networks commonly use uses store and forward operation. The multiport bridge
Multilayer Switches. Layer 3 devices are used to function serves as the basis for network switches.
interconnect multiple subnets within the same security Transparent Bridging: A transparent bridge uses a
zone. Higher layer switches are used to forwarding database to send frames across network
do filtering, translation, load balancing or other higher segments. The forwarding database starts empty. Entries
level functions especially between zones. in the database are built as the bridge receives frames. If
an address entry is not found in the forwarding database,
3. BRIDGE the frame is flooded to all other ports of the bridge,
flooding the frame to all segments except the one from
A Network Bridge is a computer networking device which which it was received. By means of these flooded frames,
makes a single combined network from the destination network will respond and a forwarding
multiple communication networks or network segments. database entry will be created.
This task is called Network Bridging. Bridging is different Source Route Bridging: Source route bridging is used
from routing. Routing allows multiple different networks to on token ring networks. The operation of the bridge is
communicate independently while remaining separate. In simpler and much of the bridging functions are
the OSI model, bridging is performed in the first two layers performed by the end systems, particularly the sources,
(Physical Layer, Data Link Layer), below the Network giving rise to its name. The source-route bridging
Layer (layer 3). If one or more segments of the bridged algorithm was developed by IBM and was proposed to
network are wireless the device is known as a Wireless the IEEE 802.5 committee as the means to bridge
Bridge and the task is known as as Wireless Bridging. between all the LANS.
Source Route Transparent Bridging: It is a hybrid
of source routing and transparent bridging. It allows
source routing and transparent bridging to coexist on the
same bridged network by using source routing with hosts
that support it and transparent bridging otherwise.
4. REPEATER
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1799
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
(postsynaptic) neuron activates and propagates a signal of to Precisely speaking, this is the diagrammatic
downstream neurons connected to it. representation of a neural network. The input and the output
nodes are given, and the hidden nodes are those functions
Typically, neurons are organized in layers. Signals travel that generate the actual predicted output.
from the first (input), to the last (output), possibly after
traversing the layers multiple times. In addition to receiving 2) Error Handling:
and sending signals, units may have state, generally
represented by real numbers, typically between 0 and 1. A
threshold or limiting function may govern each connection
and neuron, such that the signal must exceed the limit before
propagating.
Neural networks have been used on a variety of tasks, Fig -8: ANN Layers with Parameters
including computer vision, speech recognition, machine
translation, social network filtering, playing board and video This image signifies the occurrence of the error which is
games, medical diagnosis and in many other domains. represented by delta. This delta as we see from the diagram
As of 2017, neural networks typically have a few thousand to is back tracked to its initial roots to check for the occurrence
a few million units and millions of connections. Their of the error. More the strength and connectivity higher the
computing power is similar to a worm brain several orders chances are for an error to creep in.
of magnitude simpler than a human brain. Despite this, they
can perform functions (e.g., playing chess) that are far 5.2 A Case Study
beyond a worm's capacity.
A case study based on breast cancer data set that was
5.1 ANN Algorithm available on Kaggle to predict the form of Cancer that an
individual was having, i.e. Malignant or Benign.
The Ann Algorithm has precisely three different elements:
the input node, the output node and the hidden node. A description about the Data set is given below.
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1801
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
Attribute Information: The mean, standard error and "worst" or largest (mean of
the three largest values) of these features were computed for
1) ID number 2) Diagnosis (M = malignant, B = benign) each image, resulting in 30 features. For instance, field 3 is
3-32) Mean Radius, field 13 is Radius SE, and field 23 is Worst
Radius.
Ten real-valued features are computed for each cell All feature values are recoded with four significant digits.
nucleus: Missing attribute values: none
Class distribution: 357 benign, 212 malignant
a) radius (mean of distances from center to points on the
perimeter) b) texture (standard deviation of gray-scale So from the result set neural net on R, with a configuration of
values) c) perimeter d) area e) smoothness (local variation in 30-8-2-1 to get the desired result and I got an MSE of 0
radius lengths) f) compactness (perimeter^2 / area - 1.0) g) signifying the perfect execution of the Network.
concavity (severity of concave portions of the contour) h)
concave points (number of concave portions of the contour)
i) symmetry j) fractal dimension ("coastline approximation" -
1)
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1802
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
All plotted lines which are best fit to see whether or not cannot use redundant paths. While two bridges can connect
getting a perfect 45 degree line or not for getting best result. two networks, risk of sending packets in an endless loop
between the two networks. This behavior eventually
saturates the network, renders it unusable.
The drawback to a routers inherent intelligence is their
speed. Because these process so much information, routers
tend to be slower than bridges. Artificial Neural Network is
the real life simulation of the human brain. This paper dwells
into decrypting ANN and analyzes the same algorithm on a
data set of Cancer. The advantages of ANN are the detailed
analysis it provides on a varied sets of inputs giving us the
perfect set of results.
REFERENCES
3. CONCLUSIONS