SlideShare a Scribd company logo
1 of 27
MOBILE AD HOC
NETWORKS (MANETs)
  Jagdeep Matharu
  Brock University
Outline
  Mobile Ad hoc networks.
  Applications of ad hoc networks.

  Challenges in Ad hoc network.

  Media Access Control

  Routing algorithms for MANETs.

  Conclusion.
Mobile Ad hoc networks (MANETs)

   Mobile ad hoc networks are formed dynamically
    by an autonomous system of mobile nodes that
    are connected via wireless links.
   No existing fixed infrastructure or centralized
    administration – No base station.
   Mobile nodes are free to move randomly.
       Network topology changes frequently.
   May Operate as standalone fashion or also can
    be connected to the larger internet.
   Each node work as router.
MANETs




    MANETs




             WLAN
Applications
   Tactical networks
       Military communication, automated battlefields
   Emergency Services
       Search and rescue operations
       Disaster recovery – Earthquakes, hurricanes .
   Educational
       Virtual classrooms or conference rooms.
       Set up ad hoc communication during conferences, meeting, or lectures
   Home and Entertainment
       Home/office wireless networking.
       Personal Area network
       Multiuser games
       Outdoor internet access.
Challenges
   Infrastructure less
       Brings new network designing challenges.
   Dynamically changing topologies
       Cause route changes, frequent network partitions and packet
        loss.
   Physical layer limitations
       Limited Wireless range.
       Packet loss during transmission.
       Broadcast nature of the communication.
   Limitations of Mobile Nodes
       Short battery life
       Limited capacities.
   Network security.
Effects on the protocol stack
   Application Layer
       New applications, Authentication, Encryption.
   Transport Layer
       Congestion Control, Flow control.
   Network
       Host addressing, Routing, Multicasting.
   Data Link Layer
       Media Access
   Physical
       Spectrum usage/allocation
Media Access Control
   Since MANETs, use broadcasting and shared
    transmission media, introduces a probability of
    packet collisions and media contention.
   Since collision detection is not possible with
    half-duplex radio. This brings new challenges
    to conventional CSMA/CD-based and MAC
    based protocols.
   Among the top issues are the hidden-terminal
    and exposed-terminal problems.
Hidden-terminal problem
   When two terminals can not detect each
    other’s transmission due to being outside of
    each others range. The collision can occur.
Exposed-terminal problems.
   Occur when a permissible transmission from a
    node to another node has to be delayed due to
    the irrelevant transmission between two other
    nodes.
Solution
   A new protocol MACA (multiple access with
    collision avoidance protocol) is used to avoid
    the Hidden-terminal and Exposed-terminal
    problems.
   Use signalling packets to avoid collision.
     RTS   (Request to send)
       Senderrequest the right to send from a receiver with a
       short RTS packet before it sends a data packet.
     CTS   (Clear to send)
       Receiver grants the right to send as soon as it is ready
       to receive
Routing In MANETs
Routing in Ad Hoc Networks
   Mobile nodes operate as routers.
   Proactive Protocol – Table Based
     Maintain routes between every host pair all the time
     Shortest-path protocols
     Frequently update routing table; High routing
      overhead.
   Reactive Protocols – On-Demand
     On-demand
     Source initiates route discovery.
   Hybrid protocols
       Combination of proactive and reactive.
Destination-Sequenced Distance-
Vector (DSDV)
   Adapted from Routing Information Protocol(RIP).
       Adds new attribute- Sequence Number
   Each node maintains a routing table which stores
       Next hop
       Cost matric for each destination
       A sequence number that is create by destination itself.
   Each node advertises a monotonically increasing
    even sequence number.
       Used to update path to destination node.
       Odd sequence number used to represent broken path.
   Routing table updates are transmitted periodically.
   Routing information is transmitted by broadcast.
Dynamic Source Routing (DSR)
   DSR is a type of Reactive Routing Protocols.
   On demand Protocol
   Source node initiate route discovery.
   Source node floods Route Request (RREQ) in
    the network.
   Use broadcast method to send RREQ.
   Route request use a sequence number and path it
    traversed.
       Sequence number is used to identified the request; to
        avoid looping.
Cont’d
   The indented receiver sends a Route Reply
    (RREP).
   The receiver uses the reverse order of path in
    the Route Request to send the RREP.
   Source use received path to send data.
   Route may saved in source`s cache for future
    use.
DSR
DSR
DSR
DSR
DSR
DSR
DSR (Reply)
                                                          Y

                                                      Z
              S               RREP [S,E,F,J,D]
                          E
                                  F
      B
                  C                               M           L
                                          J
  A                           G
          H                                   D
                                      K
                      I                                   N
Zone Routing Protocol
   A Hybrid Protocol
   ZRP combines both proactive and reactive
    approach.
   Divide network into non- overlapping routing
    zones and use independent protocol on
    different zones.
     Intra-zone: Proactive protocols are used.
     Inter-zone: Reactive protocols are used.

   Routing zone diameter selected that optimized
    the routing.
Zone Routing Protocol
   Zone radius = 2
The End
References
   Basagni, Stefano, Marco Conti, Silvia
    Giordano, Ivan Stojmenović, et al. Mobile Ad
    Hoc Networking. Wiley-IEEE Press, 2004.
    Print.
   Iyer, Sridhar. Mobile Ad Hoc Networks.
    Bombay: 2000. Web.
    <www.it.iitb.ac.in/~sri/talks/manet.ppt>.

More Related Content

What's hot

Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overviewpriya Nithya
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and materialSDMCET DHARWAD
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile CommunicationNoushad Hasan
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Haya Saani
 

What's hot (20)

Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Dsdv
DsdvDsdv
Dsdv
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)
 

Viewers also liked

Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Sockets in unix
Sockets in unixSockets in unix
Sockets in unixswtjerin4u
 
Inter process communication using Linux System Calls
Inter process communication using Linux System CallsInter process communication using Linux System Calls
Inter process communication using Linux System Callsjyoti9vssut
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Ravindra Raju Kolahalam
 
Inter process communication
Inter process communicationInter process communication
Inter process communicationMohd Tousif
 
Inter process communication
Inter process communicationInter process communication
Inter process communicationRJ Mehul Gadhiya
 

Viewers also liked (12)

Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)
 
Manet
ManetManet
Manet
 
SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)
 
Sockets in unix
Sockets in unixSockets in unix
Sockets in unix
 
Inter process communication using Linux System Calls
Inter process communication using Linux System CallsInter process communication using Linux System Calls
Inter process communication using Linux System Calls
 
Ipc ppt
Ipc pptIpc ppt
Ipc ppt
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
 
Inter process communication
Inter process communicationInter process communication
Inter process communication
 
Inter process communication
Inter process communicationInter process communication
Inter process communication
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process Communication
 

Similar to Mobile Ad hoc Networks

implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolAtul Atalkar
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...IDES Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 

Similar to Mobile Ad hoc Networks (20)

networking
networkingnetworking
networking
 
implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocol
 
Be31390392
Be31390392Be31390392
Be31390392
 
Ad hoc
Ad hocAd hoc
Ad hoc
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Research on performance of routing protocols in manet
Research on performance of routing protocols in manetResearch on performance of routing protocols in manet
Research on performance of routing protocols in manet
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
 
J011137479
J011137479J011137479
J011137479
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
F41023946
F41023946F41023946
F41023946
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 
Na2522282231
Na2522282231Na2522282231
Na2522282231
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 

Recently uploaded

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 

Recently uploaded (20)

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 

Mobile Ad hoc Networks

  • 1. MOBILE AD HOC NETWORKS (MANETs) Jagdeep Matharu Brock University
  • 2. Outline  Mobile Ad hoc networks.  Applications of ad hoc networks.  Challenges in Ad hoc network.  Media Access Control  Routing algorithms for MANETs.  Conclusion.
  • 3. Mobile Ad hoc networks (MANETs)  Mobile ad hoc networks are formed dynamically by an autonomous system of mobile nodes that are connected via wireless links.  No existing fixed infrastructure or centralized administration – No base station.  Mobile nodes are free to move randomly.  Network topology changes frequently.  May Operate as standalone fashion or also can be connected to the larger internet.  Each node work as router.
  • 4. MANETs MANETs WLAN
  • 5. Applications  Tactical networks  Military communication, automated battlefields  Emergency Services  Search and rescue operations  Disaster recovery – Earthquakes, hurricanes .  Educational  Virtual classrooms or conference rooms.  Set up ad hoc communication during conferences, meeting, or lectures  Home and Entertainment  Home/office wireless networking.  Personal Area network  Multiuser games  Outdoor internet access.
  • 6. Challenges  Infrastructure less  Brings new network designing challenges.  Dynamically changing topologies  Cause route changes, frequent network partitions and packet loss.  Physical layer limitations  Limited Wireless range.  Packet loss during transmission.  Broadcast nature of the communication.  Limitations of Mobile Nodes  Short battery life  Limited capacities.  Network security.
  • 7. Effects on the protocol stack  Application Layer  New applications, Authentication, Encryption.  Transport Layer  Congestion Control, Flow control.  Network  Host addressing, Routing, Multicasting.  Data Link Layer  Media Access  Physical  Spectrum usage/allocation
  • 8. Media Access Control  Since MANETs, use broadcasting and shared transmission media, introduces a probability of packet collisions and media contention.  Since collision detection is not possible with half-duplex radio. This brings new challenges to conventional CSMA/CD-based and MAC based protocols.  Among the top issues are the hidden-terminal and exposed-terminal problems.
  • 9. Hidden-terminal problem  When two terminals can not detect each other’s transmission due to being outside of each others range. The collision can occur.
  • 10. Exposed-terminal problems.  Occur when a permissible transmission from a node to another node has to be delayed due to the irrelevant transmission between two other nodes.
  • 11. Solution  A new protocol MACA (multiple access with collision avoidance protocol) is used to avoid the Hidden-terminal and Exposed-terminal problems.  Use signalling packets to avoid collision.  RTS (Request to send)  Senderrequest the right to send from a receiver with a short RTS packet before it sends a data packet.  CTS (Clear to send)  Receiver grants the right to send as soon as it is ready to receive
  • 13. Routing in Ad Hoc Networks  Mobile nodes operate as routers.  Proactive Protocol – Table Based  Maintain routes between every host pair all the time  Shortest-path protocols  Frequently update routing table; High routing overhead.  Reactive Protocols – On-Demand  On-demand  Source initiates route discovery.  Hybrid protocols  Combination of proactive and reactive.
  • 14. Destination-Sequenced Distance- Vector (DSDV)  Adapted from Routing Information Protocol(RIP).  Adds new attribute- Sequence Number  Each node maintains a routing table which stores  Next hop  Cost matric for each destination  A sequence number that is create by destination itself.  Each node advertises a monotonically increasing even sequence number.  Used to update path to destination node.  Odd sequence number used to represent broken path.  Routing table updates are transmitted periodically.  Routing information is transmitted by broadcast.
  • 15. Dynamic Source Routing (DSR)  DSR is a type of Reactive Routing Protocols.  On demand Protocol  Source node initiate route discovery.  Source node floods Route Request (RREQ) in the network.  Use broadcast method to send RREQ.  Route request use a sequence number and path it traversed.  Sequence number is used to identified the request; to avoid looping.
  • 16. Cont’d  The indented receiver sends a Route Reply (RREP).  The receiver uses the reverse order of path in the Route Request to send the RREP.  Source use received path to send data.  Route may saved in source`s cache for future use.
  • 17. DSR
  • 18. DSR
  • 19. DSR
  • 20. DSR
  • 21. DSR
  • 22. DSR
  • 23. DSR (Reply) Y Z S RREP [S,E,F,J,D] E F B C M L J A G H D K I N
  • 24. Zone Routing Protocol  A Hybrid Protocol  ZRP combines both proactive and reactive approach.  Divide network into non- overlapping routing zones and use independent protocol on different zones.  Intra-zone: Proactive protocols are used.  Inter-zone: Reactive protocols are used.  Routing zone diameter selected that optimized the routing.
  • 25. Zone Routing Protocol  Zone radius = 2
  • 27. References  Basagni, Stefano, Marco Conti, Silvia Giordano, Ivan Stojmenović, et al. Mobile Ad Hoc Networking. Wiley-IEEE Press, 2004. Print.  Iyer, Sridhar. Mobile Ad Hoc Networks. Bombay: 2000. Web. <www.it.iitb.ac.in/~sri/talks/manet.ppt>.

Editor's Notes

  1. mobile ad hoc networks are self-organizing network of mobile nodes that use wireless links to form a network. This network is a temporarily network that can be formed or destroyed anytime. These network formed dynamically and share common wireless links. As in tradition networks there is not basic fixed structure. There is not central enetry to contolteopration of the networks. Nodes are free to move randomly and can leave or join the network on the fly.
  2. Because ad hoc networks are flexible networks that can be set up anywhere at any time,Without infrastructure, administration. There are lots of applications of MANETs. MANETS have primarily been used for tactical related applications to improve battlefield communications. Mantes can also be used in emergency situations like earthquake, hurricanes, fire etc. Where fixed infrastructure is destroyed. And can be used for retrieval and transmission of patient data from/to hospital. Can also be used as a replacement for fixed infrastructure in emergency situations. Can be used for educational purposed for example creating virtual classrooms, campus communication, conferences or creating ad hoc networks Manets can be also used for entertainment and in other home networks.Uses include home/office wireless networking where it could be used with existing internet infrastructure. Other useful applications include personal area network, multiuser gaming and outdoor internet access. HHistorically, mobile ad hoc networks have primarily been used for tactical network-relatedApplications to improve battlefield communications and survivability. The dynamicThe nature of military operations means it is not possible to rely on access to a fixed replacedCommunication infrastructure on the battlefield.
  3. Ad hoc networks do not have any fixed infrastructure. All the modes in the ad hoc network are multihop. This brings new channels including how to manage nodes. All nodes are using wireless links to communicate. Eat the pie1.3.3.1. They are Infrastructure less. Mobile ad hoc networks are multihop infrastructure lessWireless networks. This lack of fixed infrastructure in addition to being wireless,Generate new design issues compared with fixed networks. Also, lack of a centralizedEntity means network management has to be distributed across different nodes, whichBrings an added difficulty in fault detection and management.1.3.3.2. Dynamically Changing Network Topologies. In mobile ad hoc networks,Since nodes can move arbitrarily, the network topology, which is typically multihop, canChange frequently and unpredictably, resulting in route changes, frequent network partitions,And, possibly, packet losses [12, 36].1.3.3.3. Physical Layer Limitation. The radio interface at each node uses broadcastingFor transmitting traffic and usually has limited wireless transmission range, resultingIn specific mobile ad hoc network problems like hidden terminal problems, exposed terminalProblem, and so on. Collisions are inherent to the medium, and there is a higherProbability of packet losses due to transmission errors compared to wire-line systems.
  4. Issues associated with each layer. Since there are central managements and fixed infrastructure our communication protocol stack face different challenges. At application layer: - new kind of application required due to the network structure, new authentication and encryption methods required. For transport layer : - since there is not central management of the nodes so issues related to congestion control, flow control etc needs to be address.At the network layer new types of protocols will be required.A new media access techniques will be required as we will see in further slides. At the physical lever different wireless link related issues needs to address for example spectrum usage, aloocation of spectrum etc.
  5. Mobile ad hoc networks use broadcast by nature. The wireless process uses half duplex transmission. And slll node share the same media therefore collion can accure. This is different from the LAN or Wlan. Because the other collision detection system will not work properly. A new type of congesion control protocol required.
  6. The exposed-terminal problem results from situations in which a permissible transmissionfrom a mobile station (sender) to another station has to be delayed due to the irrelevanttransmission activity between two other mobile stations within sender’s transmission range.Depicts a typical scenario in which the exposed-terminal problem may occur.Let us assume that terminals A and C can hear transmissions from B, but terminal ACannot hear transmissions from C. Let us also assume that terminal B is transmitting toTerminal A, and terminal C have a frame to be transmitted to D. According to the CSMAscheme, C senses the medium and finds it busy because of B’s transmission, and, therefore,refrains from transmitting to D, although this transmission would not cause a collisionat A. The exposed-terminal problem may thus result in loss of throughput.
  7. The early access protocol such CSMA/CD does not work properly.A new algorithm is used MACA (Multiple access with collision avoidence).The key ideas behind these protocols invoke sending RTS (Request to send ) and CTS (Clear To Send) packets before the data transmission has actully taken place. What a node wished to transmit a packet to a neighbour, it first transmits a RTS oacket. The reciever then consents to the communication by replying with CTS packet. On hearing the CTS, the sender can transmit its data packet.
  8. Mobile nodes operate as routers, forwarding packets for other mobile nodes that may not be within direct wireless transmission range.Mobile nodes participate in an ad hoc routing protocol to discover ‘multi-hop’ paths through the network to any other node.DV – Distributed Bellman-Ford (DBF), Routing Information Protocol (RIP)Hop-by-hop DVProactive: table driven; continuously evaluates routes; no latency in route discovery; periodic control messages needed; large network capacity to keep information up-to-date; most routing info may never be usedReactive: on demand; route discovery by global search; drawback-latency of route discovery; may not be appropriate for real time communicationEach route is tagged with a sequence number originated by destination so nodes can quickly distinguish stale routes from new ones and avoid formation of routing loops.Many different protocols have be proposed for unicasting routing protocols Some specifically invented for MANET and other are adopted from wired networks. No single protocol works well in all evviourments. Due to dynamic nature of mobile ad hoc networks results in frequent changes and unpredictability in network topologies, adds difficult and complexity to routing among the nodes.Those complexity and importence of routin make the routing are most active The primary objactive of routing proticols us to correnct and efficent route establishment between a pair of nodes so that message may be delivered reliably and in a timely manner. Route contructionsould be dome with minimum overhead bandwidth consumption. Existing distance-vector and link-state-based routing protocols are designed for static enviourments, resulting in degradation in performance, including slow route static enviourment,
  9. a proactive protocol that works on the principles of distance vectors.Its basically a extension of RIP protocol. where each node in a network maintains a distance table that contains the shortestdistance and the address of the next hop router.When a change occurs in the network,each node updates its directly connected neighbours to the least cost distancevector. This process continues until convergence.Addition to the