International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1795
Comparison between Conventional Network and ANN with Case Study
Souvik Paul
1
, Digbijay Guha
2
, Atrayee Chatterjee
3,
Samarth Metha
4,
Ayushi Shah
5
1,2
Assistant Professor, BCA Department of The Heritage Academy, West Bengal, India
3
Lecturer, BCA Department of The Heritage Academy, West Bengal, India
4, 5
Student, BCA Department of The Heritage Academy, West Bengal, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Ad-Hoc Networks are inherently self-forming,
self-arranging and their nodes are free to move arbitrarily and
organize themselves at random. Router is a networking device
that sends messages or data packets between computer
networks. Network Bridge is a computer networking
device which makes a single combined network from
multiple communication networks or network segments.
Repeater is an electronic device which receives a signal and
retransmits it. Artificial Neural Networks are computing
systems inspired by the Biological Neural Networks that
constitute animal brains. This paper aims at achieving a
comparative study among Artificial Neural Network, Ad-Hoc
Networks, Router, Bridge, and Repeater. On the basis of that a
case study is generated to test the validation of these.
Key Words: Artificial Neural Network, Ad-Hoc Network,
Router, Bridge, Repeater
1. INTRODUCTION
Ad-Hoc Wireless Networks are inherently self-forming, self-
arranging and self-administering. The nodes are free to move
arbitrarily and organize themselves at random. The biggest
challenge in these kinds of networks is finding the path
between the communication end points of nodes that are
movable. Because of restricted transmission range of
wireless interfaces, the communication traffic has to be
extended over a number of intermediate nodes to facilitate
the communication between two nodes. Thus, these kinds of
networks are also called as multi-hop ad-hoc networks.
Every node acts as both, a host and as a router.
The rapid development in ad hoc technology is widely used
in portable computing such as laptop, mobile phone used to
access the web services, telephone calls when the user are in
travelling. Development of self-organizing network decreases
the communication cost. The growth of 4G technologies
enhances anytime, anywhere, anyhow communication in ad
hoc network. Ad hoc network is simple to design and install.
The ad hoc networks are self-forming, self-maintaining, self-
healing architecture. The challenges are, no fixed access
point, dynamic network topology, contrary environment and
irregular connectivity. Ad hoc network immediately forms
and accommodate the modification and limited power.
The limitation associated with wireless devices is the power
constraint of the nodes i.e. each node has only limited battery
power which should be used judiciously for the node to
survive longer. The principle behind ad hoc network is multi-
hop relaying. The use of ad hoc voice communication was
used in many ancient/tribal societies with the help of a string
of repeaters of drums, trumpets, or horns.
The security issue in ad hoc network is dynamic topology,
bandwidth, small device size and limited battery life. Due to
the dynamic nature, it is difficult to maintain secured
transmission in the network (Papadimitratos and Haas,
2002). The ad hoc network does not depend on any pre-
existing infrastructure so that the node can leave and join the
network in such a situation where security may fall down.
Two types of attack occur in ad hoc network, first is passive
attack, this attack does not change the transmitted data in
the network. But, it can allow unauthorized user to discover
the message. Second, is active attack, it is a severe attack and
prevents the message flow between the node in the network.
It may allow the unauthorized user to modify the message.
Dropped packet, battery drained, bandwidth consumption,
unreliable packets, delay, connection break and false routing
can identify the malicious node.
With the increased number of lightweight devices as well as
evolution in wireless communication, the ad hoc networking
technology is gaining effort with the increasing number of
widespread applications. Ad hoc networking can be used
anytime, anywhere with limited or no communication
infrastructure. The preceding infrastructure is fancy or
annoying to use. The ad hoc network architecture can be
used in real time business applications, corporate companies
to increase the productivity and profit.
The ad hoc networks can be classified according to their
application as Mobile Ad hoc Network (MANET) that is a self-
arranging infrastructure less network of mobile devices
communicated through wireless link. Vehicular Ad hoc
Network (VANET) uses travelling cars as nodes in a network
to create a mobile network. Wireless Sensor Network (WSN)
consists of autonomous sensors to control the environmental
actions.
The importance of ad hoc network has been highlighted in
many fields which are described below:
Military Arena: An ad hoc networking will allow the
military battleground to maintain an information