SlideShare uma empresa Scribd logo
1 de 30
Introduction to Mobile Ad-Hoc
Network (MANET)
Introduction
• Mobility support such as Mobile IP, DHCP,
Cellular phone networks relies on existence of at
least some infrastructure.
• For example cellular phone network requires base
stations, infrastructure networks etc.
• Ad-hoc network is used in situations where users
of a network cannot rely on infrastructure, it is
expensive, or there is none at all.
• In these situations mobile ad-hoc network is used.
• Mobile ad-hoc networks should be mobile and use
wireless communications.
• Examples
• Single-hop: All partners max. one hop apart
• Bluetooth piconet, PDAs
in a room, gaming devices.
• Multi-hop: Cover larger distances,
circumvent obstacles
• Bluetooth scatternet,
TETRA police network,
car-to-car networks.
Applications
• Instant infrastructure: Unplanned meetings,
spontaneous interpersonal communication.
• Disaster relief: infrastructure break down in
disaster areas, hurricanes cut phone and power
lines. Flood destroy base stations. In these cases
extremely fast and reliable ad-hoc network can be
set-up.
• Remote areas: can be used where
infrastructure is expensive to set up ex. Sparsely
populated area
Mobile Ad-hoc Networking
And mobile IP
Fixed
Network
Mobile
Devices
Mobile
Router
Manet
Mobile IP,
DHCP
Router End system
Routing
• Routing of data is most difficult issues in ad-
hoc networks.
• In wireless network with infrastructure
support a base station always reaches mobile
nodes, but in ad-hoc network this is not the
case.
• Destination node may be out of range of a
source node transmitting packets.
• In ad-hoc network each node must be able to
forward data for other nodes.
• This create additional problems, such as Link
don't have same characteristics in both
direction
•
good link
weak link
time = t1 time = t2
N1
N4
N2
N5
N3
N1
N4
N2
N5
N3
Difference between wired networks
and ad-hoc wireless networks.
1. Asymmetric links: Quality of connection in
both direction may be different
2. Redundant links: Many redundant links
3. Interference:
4. Dynamic topology: frequent changes of
connections, connection quality, participants
Difficulties in design of ad-hoc routing
protocols
• Traditional algorithm know for wired network
may not work efficiently or fail completely
because these are not design with highly
dynamic topology, asymmetric links, or
interference in mind.
• Additional information such as connectivity or
interference is needed for finding best path.
• Centralized approach cannot be used.
Routing Algorithms
1.) Destination sequence distance vector(DSDV)
• Enhanced version of distance vector routing
for ad-hoc network.
• DVR is used as routing information protocol in
wired network.
• In DVR each node exchanges its routing table
periodically with its neighbor, this strategy is
not used in case of wireless ad-hoc networks,
due to rapidly changing topology.
• DSVR adds two things to distance vector
routing algorithm:
1. Sequence number :
2. Damping :
Part of routing table for DSDV
Destination Next hop Metric Sequence no. Instal time
N1 N1 0 S1–321 T4–001
N2 N2 1 S2–218 T4–001
N3 N2 2 S3–043 T4–002
N4 N4 1 S4–092 T4–001
N5 N4 2 S5–163 T4–002
2. Dynamic source routing
• DSR divide task of routing into two separate
problems
1. Route discovery: A node only tries to discover a
route to a destination if it has to send something
to this destination and there is currently no
known route
2. Route maintenance: If a node is continuously
sending packets via a route, it has to make sure
that the route is held upright. As soon as a node
detects problems with the current route, it has
to find an alternative
Working of DSR
• If a node needs to discover a route, it broadcasts a
route request with a unique identifier and the
destination address as parameters. Any node that
receives a route request does the following.
1. If the node has already received the request (which
is identified using the unique identifier), it drops the
request packet.
2. If the node recognizes its own address as the
destination, the request has reached its target.
3. Otherwise, the node appends its own address to a
list of traversed hops in the packet and broadcasts
this updated route request.
• Using this approach, the route request collects a list
of addresses representing a possible path on its way
towards the destination.
• As soon as the request reaches the destination, it can
return the request packet containing the list to the
receiver using this list in reverse order.
• condition for this is that the links work bi-
directionally. If this is not the case, and the
destination node does not currently maintain a route
back to the initiator of the request, it has to start a
route discovery by itself.
• The destination may receive several lists containing
different paths from the initiator. It could return the
best path, the first path, or several paths to offer the
initiator a choice.
Example
Applying route discovery to the example in fo a
route from N1 to N3 at time t1 results in the
following.
N1
N2
N3
good link
weak link
time = t1
N4
N5
Example
1. N1 broadcasts the request ((N1), id = 42, target = N3), N2 and
N4 receive this request.
2. N2 then broadcasts ((N1, N2), id = 42, target = N3), N4
broadcasts ((N1, N4), id = 42, target = N3). N3 and N5 receive
N2’s broadcast, N1, N2, and N5 receive N4’s broadcast.
3. N3 recognizes itself as target, N5 broadcasts ((N1, N2, N5), id
= 42, target = N3). N3 and N4 receive N5’s broadcast. N1, N2,
and N5 drop N4’s broadcast packet, because they all recognize
an already received route request (and N2’s broadcast reached
N5 before N4’s did).
4. N4 drops N5’s broadcast, N3 recognizes (N1, N2, N5) as an
alternate, but longer route.
5. N3 now has to return the path (N1, N2, N3) to N1. This is
simple assuming symmetric links working in both directions. N3
can forward the information using the list in reverse order.
The assumption of bi-directional links holds for many ad-hoc
networks. However, if links are not bi-directional, the
scenario gets more complicated. The algorithm has to be
applied again, in the reverse direction if the target does not
maintain a current path to the source of the route request.
1. N3 has to broadcast a route request ((N3), id = 17,
target = N1). Only N5 receives this request.
2. N5 now broadcasts ((N3, N5), id = 17, target = N1),
N3 and N4 receive the broadcast.
3. N3 drops the request because it recognizes an
already known id. N4 broadcasts ((N3, N5, N4), id = 17,
target = N1), N5, N2, and N1 receive the broadcast.
4. N5 drops the request packet, N1 recognizes itself as
target, and N2 broadcasts((N3, N5, N4, N2), id = 17,
target = N1). N3 and N5 receive N2’s broadcast.
5. N3 and N5 drop the request packet
• Now N3 holds the list for a path from N1 to
N3, (N1, N2, N3), and N1 knows the path
from N3 to N1, (N3, N5, N4, N1). But N1 still
does not know how to send data to N3! The
only solution is to send the list (N1, N2, N3)
with the broadcasts initiated by N3 in the
reverse direction. This example shows clearly
how much simpler routing can be if links are
symmetrical.
Route maintenance is DSR
• After a route has been discovered, it has to be
maintained for as long as the node sends packets along
this route. Depending on layer two mechanisms,
different approaches can be taken:
1. If the link layer uses an acknowledgement (as, for
example, IEEE 802.11) the node can interpret this
acknowledgement as an intact route.
2. If possible, the node could also listen to the next
node forwarding the packet, so getting a passive
acknowledgement
3. A node could request an explicit acknowledgement.
Conclusion of DSR
Dynamic source routing offers benefits
compared to other algorithms by being much
more bandwidth efficient, problems arise if the
topology is highly dynamic and links are
asymmetrical.
Overview of ad-hoc routing protocols
• Hong (2002) separates routing algorithms into
three categories:
1. flat routing,
2. hierarchical routing,
3. geographic-position-assisted routing.
Flat ad-hoc routing
• Flat ad-hoc routing protocols comprise those
protocols that do not set up hierarchies with
clusters of nodes, special nodes acting as the
head of a cluster, or different routing algorithms
inside or outside certain regions.
• All nodes in this approach play an equal role in
routing.
• The addressing scheme is flat.
• This category again falls into two subcategories:
proactive and reactive protocols.
• Proactive type of protocols maintains fresh lists
of destinations and their routes by periodically
distributing routing tables throughout the
network.
• The main disadvantages of such algorithms are:
1. Respective amount of data for maintenance.
2. Slow reaction on restructuring and failures.
• Examples of proactive algorithms are:
1. Optimized Link State Routing Protocol (OLSRP)
2. Destination Sequence Distance Vector (DSDV)
• reactive protocols finds a route on demand by
flooding the network with Route Request
packets.
• The main disadvantages of such algorithms are:
1. High latency time in route finding.
2. Excessive flooding can lead to network clogging.
• Examples of on-demand algorithms are:
1. Ad hoc On-demand Distance Vector(AODV)
2. Dynamic Source Routing
3. Flow State in the Dynamic Source Routing
Hierarchical ad-hoc routing
• Algorithms such as DSDV, AODV, and DSR only
work for a smaller number of nodes and depend
heavily on the mobility of nodes.
• For larger networks, clustering of nodes and
using different routing algorithms between and
within clusters can be a scalable and efficient
solution.
• The advantage is that if the topology within a
cluster changes, only nodes of the cluster have to
be informed. Nodes of other clusters only need
to know how to reach the cluster.
Clustering of ad-hoc networks
Internet
Super cluster
Cluster
Base station
Cluster head
• Clusters can be combined to form super clusters etc.,
building up a larger hierarchy.
• Using this approach, one or more nodes can act as
cluster heads, representing a router for all traffic
to/from the cluster.
• All nodes within the cluster and all other cluster heads
use these as gateway for the cluster.
• Figure shows an ad-hoc network with interconnection
to the internet via a base station. This base station
transfers data to and from the cluster heads. In this
example, one cluster head also acts as head of the
super cluster, routing traffic to and from the super
cluster.
• Different routing protocols may be used inside and
outside clusters.
• Some are
1. CGSR – Clusterhead-Gateway Switch
Routing
2. HSR – Hierarchical State Routing
3. LANMAR – Landmark Ad Hoc Routing
4. ZRP – Zone Routing Protocol
Geographic-position-assisted ad-hoc
routing
• If mobile nodes know their geographical position this can
be used for routing purposes.
• This improves the overall performance of routing
algorithms .
• One way to acquire position information is via the global
positioning system (GPS).
• Mauve (2001) gives an overview of several position-based
ad-hoc routing protocols.
• some of them are
1. DREAM – Distance Routing Effect Algorithm for Mobility
2. GeoCast – Geographic Addressing and Routing
3. GPSR – Greedy Perimeter Stateless Routing
4. LAR – Location-Aided Routing
Introduction to mobile ad hoc network (m.a.net)

Mais conteúdo relacionado

Mais procurados

Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)Netwax Lab
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manetshiujinghan
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Ali Habeeb
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentationApoorva Nagaraj
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSjuno susi
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsShawn Zandi
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithmBasit Hussain
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44Jisc
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
 

Mais procurados (20)

Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)
 
Dsdv
DsdvDsdv
Dsdv
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentation
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
MANET VS VANET
MANET VS VANETMANET VS VANET
MANET VS VANET
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
WLAN
WLANWLAN
WLAN
 

Destaque

Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETtelecomsutra
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introductionChandra Meena
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksIISTech2015
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16Spiro Vellore
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)eSAT Journals
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksKishan Patel
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetyatin1988
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc networkitsjadu
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologiesshashi712
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsAman Gupta
 
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsMobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsSushant Kushwaha
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkTarun Varshney
 

Destaque (20)

Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNET
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introduction
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networks
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)
 
IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manet
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
 
Manet
ManetManet
Manet
 
Mymanet
MymanetMymanet
Mymanet
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologies
 
Ad hoc
Ad hocAd hoc
Ad hoc
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsMobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) Applications
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
 

Semelhante a Introduction to mobile ad hoc network (m.a.net)

UNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDVUNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDVHemalathaR31
 
implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolAtul Atalkar
 
Module-4 Short notes.pptx
Module-4 Short notes.pptxModule-4 Short notes.pptx
Module-4 Short notes.pptxAzmiNizar1
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Routing Presentation
Routing PresentationRouting Presentation
Routing PresentationMohsin Ali
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptanushaj46
 
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxHirazNor
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksNarendra Singh Yadav
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptxkarthiksmart21
 
A Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETSA Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETSSabrina Ball
 

Semelhante a Introduction to mobile ad hoc network (m.a.net) (20)

UNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDVUNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDV
 
manet.pdf
manet.pdfmanet.pdf
manet.pdf
 
implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocol
 
Module-4 Short notes.pptx
Module-4 Short notes.pptxModule-4 Short notes.pptx
Module-4 Short notes.pptx
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 ppt
 
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
Mona
MonaMona
Mona
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networks
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
A Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETSA Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETS
 

Último

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Último (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Introduction to mobile ad hoc network (m.a.net)

  • 1. Introduction to Mobile Ad-Hoc Network (MANET)
  • 2. Introduction • Mobility support such as Mobile IP, DHCP, Cellular phone networks relies on existence of at least some infrastructure. • For example cellular phone network requires base stations, infrastructure networks etc. • Ad-hoc network is used in situations where users of a network cannot rely on infrastructure, it is expensive, or there is none at all. • In these situations mobile ad-hoc network is used.
  • 3. • Mobile ad-hoc networks should be mobile and use wireless communications. • Examples • Single-hop: All partners max. one hop apart • Bluetooth piconet, PDAs in a room, gaming devices. • Multi-hop: Cover larger distances, circumvent obstacles • Bluetooth scatternet, TETRA police network, car-to-car networks.
  • 4. Applications • Instant infrastructure: Unplanned meetings, spontaneous interpersonal communication. • Disaster relief: infrastructure break down in disaster areas, hurricanes cut phone and power lines. Flood destroy base stations. In these cases extremely fast and reliable ad-hoc network can be set-up. • Remote areas: can be used where infrastructure is expensive to set up ex. Sparsely populated area
  • 5. Mobile Ad-hoc Networking And mobile IP Fixed Network Mobile Devices Mobile Router Manet Mobile IP, DHCP Router End system
  • 6. Routing • Routing of data is most difficult issues in ad- hoc networks. • In wireless network with infrastructure support a base station always reaches mobile nodes, but in ad-hoc network this is not the case. • Destination node may be out of range of a source node transmitting packets.
  • 7. • In ad-hoc network each node must be able to forward data for other nodes. • This create additional problems, such as Link don't have same characteristics in both direction • good link weak link time = t1 time = t2 N1 N4 N2 N5 N3 N1 N4 N2 N5 N3
  • 8. Difference between wired networks and ad-hoc wireless networks. 1. Asymmetric links: Quality of connection in both direction may be different 2. Redundant links: Many redundant links 3. Interference: 4. Dynamic topology: frequent changes of connections, connection quality, participants
  • 9. Difficulties in design of ad-hoc routing protocols • Traditional algorithm know for wired network may not work efficiently or fail completely because these are not design with highly dynamic topology, asymmetric links, or interference in mind. • Additional information such as connectivity or interference is needed for finding best path. • Centralized approach cannot be used.
  • 10. Routing Algorithms 1.) Destination sequence distance vector(DSDV) • Enhanced version of distance vector routing for ad-hoc network. • DVR is used as routing information protocol in wired network. • In DVR each node exchanges its routing table periodically with its neighbor, this strategy is not used in case of wireless ad-hoc networks, due to rapidly changing topology.
  • 11. • DSVR adds two things to distance vector routing algorithm: 1. Sequence number : 2. Damping : Part of routing table for DSDV Destination Next hop Metric Sequence no. Instal time N1 N1 0 S1–321 T4–001 N2 N2 1 S2–218 T4–001 N3 N2 2 S3–043 T4–002 N4 N4 1 S4–092 T4–001 N5 N4 2 S5–163 T4–002
  • 12. 2. Dynamic source routing • DSR divide task of routing into two separate problems 1. Route discovery: A node only tries to discover a route to a destination if it has to send something to this destination and there is currently no known route 2. Route maintenance: If a node is continuously sending packets via a route, it has to make sure that the route is held upright. As soon as a node detects problems with the current route, it has to find an alternative
  • 13. Working of DSR • If a node needs to discover a route, it broadcasts a route request with a unique identifier and the destination address as parameters. Any node that receives a route request does the following. 1. If the node has already received the request (which is identified using the unique identifier), it drops the request packet. 2. If the node recognizes its own address as the destination, the request has reached its target. 3. Otherwise, the node appends its own address to a list of traversed hops in the packet and broadcasts this updated route request.
  • 14. • Using this approach, the route request collects a list of addresses representing a possible path on its way towards the destination. • As soon as the request reaches the destination, it can return the request packet containing the list to the receiver using this list in reverse order. • condition for this is that the links work bi- directionally. If this is not the case, and the destination node does not currently maintain a route back to the initiator of the request, it has to start a route discovery by itself. • The destination may receive several lists containing different paths from the initiator. It could return the best path, the first path, or several paths to offer the initiator a choice.
  • 15. Example Applying route discovery to the example in fo a route from N1 to N3 at time t1 results in the following. N1 N2 N3 good link weak link time = t1 N4 N5
  • 16. Example 1. N1 broadcasts the request ((N1), id = 42, target = N3), N2 and N4 receive this request. 2. N2 then broadcasts ((N1, N2), id = 42, target = N3), N4 broadcasts ((N1, N4), id = 42, target = N3). N3 and N5 receive N2’s broadcast, N1, N2, and N5 receive N4’s broadcast. 3. N3 recognizes itself as target, N5 broadcasts ((N1, N2, N5), id = 42, target = N3). N3 and N4 receive N5’s broadcast. N1, N2, and N5 drop N4’s broadcast packet, because they all recognize an already received route request (and N2’s broadcast reached N5 before N4’s did). 4. N4 drops N5’s broadcast, N3 recognizes (N1, N2, N5) as an alternate, but longer route. 5. N3 now has to return the path (N1, N2, N3) to N1. This is simple assuming symmetric links working in both directions. N3 can forward the information using the list in reverse order.
  • 17. The assumption of bi-directional links holds for many ad-hoc networks. However, if links are not bi-directional, the scenario gets more complicated. The algorithm has to be applied again, in the reverse direction if the target does not maintain a current path to the source of the route request. 1. N3 has to broadcast a route request ((N3), id = 17, target = N1). Only N5 receives this request. 2. N5 now broadcasts ((N3, N5), id = 17, target = N1), N3 and N4 receive the broadcast. 3. N3 drops the request because it recognizes an already known id. N4 broadcasts ((N3, N5, N4), id = 17, target = N1), N5, N2, and N1 receive the broadcast. 4. N5 drops the request packet, N1 recognizes itself as target, and N2 broadcasts((N3, N5, N4, N2), id = 17, target = N1). N3 and N5 receive N2’s broadcast. 5. N3 and N5 drop the request packet
  • 18. • Now N3 holds the list for a path from N1 to N3, (N1, N2, N3), and N1 knows the path from N3 to N1, (N3, N5, N4, N1). But N1 still does not know how to send data to N3! The only solution is to send the list (N1, N2, N3) with the broadcasts initiated by N3 in the reverse direction. This example shows clearly how much simpler routing can be if links are symmetrical.
  • 19. Route maintenance is DSR • After a route has been discovered, it has to be maintained for as long as the node sends packets along this route. Depending on layer two mechanisms, different approaches can be taken: 1. If the link layer uses an acknowledgement (as, for example, IEEE 802.11) the node can interpret this acknowledgement as an intact route. 2. If possible, the node could also listen to the next node forwarding the packet, so getting a passive acknowledgement 3. A node could request an explicit acknowledgement.
  • 20. Conclusion of DSR Dynamic source routing offers benefits compared to other algorithms by being much more bandwidth efficient, problems arise if the topology is highly dynamic and links are asymmetrical.
  • 21. Overview of ad-hoc routing protocols • Hong (2002) separates routing algorithms into three categories: 1. flat routing, 2. hierarchical routing, 3. geographic-position-assisted routing.
  • 22. Flat ad-hoc routing • Flat ad-hoc routing protocols comprise those protocols that do not set up hierarchies with clusters of nodes, special nodes acting as the head of a cluster, or different routing algorithms inside or outside certain regions. • All nodes in this approach play an equal role in routing. • The addressing scheme is flat. • This category again falls into two subcategories: proactive and reactive protocols.
  • 23. • Proactive type of protocols maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network. • The main disadvantages of such algorithms are: 1. Respective amount of data for maintenance. 2. Slow reaction on restructuring and failures. • Examples of proactive algorithms are: 1. Optimized Link State Routing Protocol (OLSRP) 2. Destination Sequence Distance Vector (DSDV)
  • 24. • reactive protocols finds a route on demand by flooding the network with Route Request packets. • The main disadvantages of such algorithms are: 1. High latency time in route finding. 2. Excessive flooding can lead to network clogging. • Examples of on-demand algorithms are: 1. Ad hoc On-demand Distance Vector(AODV) 2. Dynamic Source Routing 3. Flow State in the Dynamic Source Routing
  • 25. Hierarchical ad-hoc routing • Algorithms such as DSDV, AODV, and DSR only work for a smaller number of nodes and depend heavily on the mobility of nodes. • For larger networks, clustering of nodes and using different routing algorithms between and within clusters can be a scalable and efficient solution. • The advantage is that if the topology within a cluster changes, only nodes of the cluster have to be informed. Nodes of other clusters only need to know how to reach the cluster.
  • 26. Clustering of ad-hoc networks Internet Super cluster Cluster Base station Cluster head
  • 27. • Clusters can be combined to form super clusters etc., building up a larger hierarchy. • Using this approach, one or more nodes can act as cluster heads, representing a router for all traffic to/from the cluster. • All nodes within the cluster and all other cluster heads use these as gateway for the cluster. • Figure shows an ad-hoc network with interconnection to the internet via a base station. This base station transfers data to and from the cluster heads. In this example, one cluster head also acts as head of the super cluster, routing traffic to and from the super cluster.
  • 28. • Different routing protocols may be used inside and outside clusters. • Some are 1. CGSR – Clusterhead-Gateway Switch Routing 2. HSR – Hierarchical State Routing 3. LANMAR – Landmark Ad Hoc Routing 4. ZRP – Zone Routing Protocol
  • 29. Geographic-position-assisted ad-hoc routing • If mobile nodes know their geographical position this can be used for routing purposes. • This improves the overall performance of routing algorithms . • One way to acquire position information is via the global positioning system (GPS). • Mauve (2001) gives an overview of several position-based ad-hoc routing protocols. • some of them are 1. DREAM – Distance Routing Effect Algorithm for Mobility 2. GeoCast – Geographic Addressing and Routing 3. GPSR – Greedy Perimeter Stateless Routing 4. LAR – Location-Aided Routing