SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 5 (May. - Jun. 2013), PP 07-11
www.iosrjournals.org
www.iosrjournals.org 7 | Page
An Overview of Mobile Ad hoc Network: Application, Challenges
and Comparison of Routing Protocols
Sukhpreet Kaur (M.Tech Student) ,Sukhpreet kaur (Asstt. Prof. of CSE Dept)
Chandan Sharma (Ph.D. Candidate)
Sri Guru Granth Sahib World University Fatehgarh Sahib ,
Guru Nanak Dev University of ,Amritsar, india (pb.)
Abstract: In the past few years, we have seen a rapid expansion in the field of mobile computing due to the
proliferation of inexpensive, widely available wireless devices A mobile ad hoc network (MANET) consists of
mobile wireless nodes in which the communication between nodes is carried out without any centralized
control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The
mobile nodes can receive and forward packets as a router. In this paper provides insight into the potential
applications of ad hoc networks and discusses the technological challenges that protocol designers and network
developers are faced with. In this paper also present the impact of comparison of different routing protocol in
term of different parameters.
I. Introduction
A wireless network is a growing new technology that will allow users to access services and
information electronically, irrespective of their geographic position. Wireless networks can be classified in two
types infrastructure network and infrastructure less (ad hoc) networks. Infrastructure network consists of a
network with fixed and wired gateways. A mobile host interacts with a bridge in the network (called base
station) within its communication radius. The mobile unit can move geographically while it is communicating.
When it goes out of range of one base station, it connects with new base station and starts communicating
through it. This is called handoff. Recent advancements such as Bluetooth introduced a fresh type of wireless
systems which is frequently known as mobile ad-hoc networks. Mobile ad-hoc networks or "short live"
networks control in the nonexistence of permanent infrastructure. Mobile ad-hoc network offers quick and
horizontal network deployment in conditions where it is not possible.
Ad-hoc is a Latinword, which means "for this or for this only." Early Ad-hoc network only designed
for the military application. In 1990’s this method will combined with the wireless LAN and Bluetooth. 1997
internet engineering group launched MANET with the routing protocols. They implement routing protocols
because to improve the data rate and the efficiency. At present there are more than fifty protocols are
implemented in the wireless environment. Mobile ad-hoc network is an autonomous system of mobile nodes
connected by wireless links; each node operates as an end system and a router for all other nodes in the network.
Mobile ad hoc network is a group of wireless mobile computers (or nodes); in which nodes collaborate by
forwarding packets for each other to allow them to communicate outside range of direct wireless transmission.
Ad hoc networks require no centralized administration or fixed network infrastructure such as base stations or
access points, and can be quickly and inexpensively set up as needed
Advantages of MANET
There are several advantages of using mobile ad hoc network:-
 Setting up a wireless system is easy and fast and it eliminates the need for pulling out the cables
through walls and ceilings.
 Network can be extended to places, which cannot be wired.
 Multiple paths increase reliability.
 Wireless network offers more flexibility and adapt easily to changes in the configuration of the
network.
Disadvantages of MANETS
 Asymmetric links: Most of the wired networks rely on the symmetric links, which are always fixed. But
this is not a case with ad-hoc networks as the nodes are mobile and constantly changing their position
within network. For example consider a MANET (Mobile Ad-hoc Network) where node B sends a signal to
node A but this does not tell anything about the quality of the connection in the reverse direction.
An overview of mobile adhoc network: application, challenges and Comparison of routing protocols
www.iosrjournals.org 8 | Page
 Routing Overhead: In wireless ad hoc networks, nodes often change their location within network. So,
some out-of-date routes are generated in the routing table, which leads to unnecessary routing
overhead.Interference: This is the major problem with mobile ad-hoc networks as links come and go
depending on the transmission characteristics, one transmission might interfere with another one and node
might overhear transmissions of other nodes and can corrupt the total transmission.
 Dynamic Topology: This is also the major problem with ad-hoc routing since the topology is not constant.
The mobile node might move or medium characteristics might change. In ad-hoc networks routing tables
must somehow reflect these changes in topology and routing algorithms have to be adapted. For example in
a fixed network routing table updating takes place for every 30sec. This updating frequency might be very
low for ad-hoc networks.
Characteristics of Mobile Ad Hoc Networks:-
Does not rely on a fixed infrastructure for its operation autonomous transitory association of mobile nodes.
 It can be rapidly deployed with user intervention.
 Need not to operate in a standalone fashion but can be attached to the Internet or Cellular networks.
 Devices are free to join or leave the network and they may randomly, possibly
 Resulting in rapid and unpredictable changes.
Working of MANET
In mobile ad-hoc networks where there is no infrastructure support and since a destination node might
be out of range of a source node transmitting packets, a routing procedure is always needed to find a path so as
to forward the packets appropriately between the source and the destination. A base station can reach all mobile
nodes without routing via broadcast in common wireless networks. In the case of ad-hoc networks, each node
must be able to forward data for other nodes.
Applications of MANETS
Table 1 Mobile ad hoc network applications
Application Possible scenarios
Tactical networks • Military communication and operations
• Automated battlefields
Emergency services • Search and rescue operations
• Disaster recovery
• Replacement of fixed infrastructure in case of environmental
disasters
• Policing and fire fighting
• Supporting doctors and nurses in hospitals
Commercial and civilian
Environment
• E-commerce: electronic payments anytime and anywhere
environments • Business: dynamic database access, mobile offices
• Vehicular services: road or accident guidance, transmission of road
and weather conditions, taxi cab network, inter-vehicle networks
• Sports stadiums, trade fairs, shopping malls
• Networks of visitors at airports
Home and enterprises
Networking
• Home/office wireless networking
• Conferences, meeting rooms
• Personal area networks (PAN), Personal networks (PN)
• Networks at construction sites
Educations • Universities and campus settings
• Virtual classrooms
• Ad hoc communications during meetings or lectures
Entertainment • Universities and campus settings
• Virtual classrooms
• Ad hoc communications during meetings or lectures
Sensor network • Home applications: smart sensors and actuators embedded in
consumer electronics
• Body area networks (BAN)
• Data tracking of environmental conditions, animal
movements, chemical/biological detection
Context aware services • Follow-on services: call-forwarding, mobile workspace
• Information services: location specific services, time dependent
services
• Infotainment: touristic information
An overview of mobile adhoc network: application, challenges and Comparison of routing protocols
www.iosrjournals.org 9 | Page
Coverage extension • Extending cellular network access
• Linking up with the Internet, intranets, etc.
Challenges in Mobile Adhoc Network
Regardless of the attractive applications of MANET introduce several challenges that must be studied carefully
before a wide commercial deployment can be expected.
 Routing: Since the topology of the network is constantly changing, the issue of routing packets between any pair
of nodes becomes a challenging task. Most protocols should be based on reactive routing instead of proactive.
Multi cast routing is another challenge because the multi cast tree is no longer static due to the random movement
of nodes within the network. Routes between nodes may potentially contain multiple hops, which is more complex
than the single hop communication.
 Security and Reliability: In addition to the common vulnerabilities of wireless connection, an ad hoc network has
its particular security problems due to e.g. nasty neighbor relaying packets. The feature of distributed operation
requires different schemes of authentication and key management. Further, wireless link characteristics introduce
also reliability problems, because of the limited wireless transmission range, the broadcast nature of the wireless
medium (e.g. hidden terminal problem), mobility-induced packet losses, and data transmission errors.
 Quality of Service (QoS): Providing different quality of service levels in a constantly changing environment will
be a challenge. The inherent stochastic feature of communications quality in a MANET makes it difficult to offer
fixed guarantees on the services offered to a device. An adaptive QoS must be implemented over the traditional
resource reservation to support the multimedia services.
 Inter-networking: In addition to the communication within an ad hoc network, inter-networking between
MANET and fixed networks (mainly IP based) is often expected in many cases. The coexistence of routing
protocols in such a mobile device is a challenge for the harmonious mobility management.
 Power Consumption: For most of the light-weight mobile terminals, the communication-related functions should
be optimized for lean power consumption. Conservation of power and power-aware routing must be taken into
consideration. Multicast: Multicast is desirable to support multiparty wireless communications. Since the
multicast tree is no longer static, the multicast routing protocol must be able to cope with mobility including
multicast membership dynamics (leave and join).
 Location-aided Routing: Location-aided routing uses positioning information to define associated regions so that
the routing is spatially oriented and limited. This is analogous to associatively-oriented and restricted broadcast in
ABR.
Routing in Mobile Ad hoc Networks
Mobile Ad-hoc networks are self-organizing and self-configuring multihop wireless networks, where the
structure of the network changes dynamically. In mobile ad-hoc networks there is no infrastructure support as is
the case with wireless networks, and since a destination node might be out of range of a source node transferring
packets; so there is need of a routing procedure. This is always ready to find a path so as to forward the packets
appropriately between the source and the destination. In the case of ad-hoc networks, each node must be able to
forward data for other nodes. This creates additional problems along with the problems of dynamic topology
which is unpredictable connectivity changes
Problems in routing with Mobile Ad hoc Networks
 Asymmetric links: Most of the wired networks rely on the symmetric links which are always fixed. But
this is not a case with ad-hoc networks as the nodes are mobile and constantly changing their position
within network.
 Routing Overhead: In wireless ad hoc networks, nodes often change their location within network. So,
some stale routes are generated in the routing table which leads to unnecessary routing overhead.
 Interference: This is the major problem with mobile ad-hoc networks as links come and go depending on
the transmission characteristics, one transmission might interfere with another one and no de might
overhear transmissions of other nodes and can corrupt the total transmission.
 Dynamic Topology: This is also the major problem with ad-hoc routing since the topology is not constant.
The mobile node might move or medium characteristics might change. In ad-hoc networks, routing tables
must somehow reject these changes in topology and routing algorithms have to be adapted.
Classification of Routing Protocols in MANET:-
Routing protocol in MANET are classified into three different categories according to their functionality.
A. Proactive
B. Reactive
C. Hybrid
An overview of mobile adhoc network: application, challenges and Comparison of routing protocols
www.iosrjournals.org 10 | Page
Proactive Protocols:- In contrast to table driven routing protocols, on demand compute the route to a specific
destination only when needed, so a routing table containing all the nodes as entries does not have to be
maintained in each node. When a source wants to send packet to a destination, it invokes a route discovery
mechanism to find the path to the destination. The route remains valid till the destination is reachable or until
the route is no longer needed.
Table 2
Proactive Routing protocols
Proactive protocols Predecessor Protocol Enhancement regarding predecessor
DSDR DBF Provide single shortest path
WRP DBF Performance/Count-to-infinity problem
FSR FS Improved Flooding
CGSR DSDR Reduces network traffic load
Reactive protocols:-These protocols are also called reactive protocols since they don't maintain routing
information or routing activity at the network nodes if there is no communication. If a node wants to send a
packet to another node then this protocol searches for the route in an on-demand manner and establishes the
connection in order to transmit and receive the packet. The route discovery usually occurs by flooding the route
request packets throughout the network.
Table: 3
Reactive Routing Protocols
Reactive protocols Predecessor Protocols Enhancement regarding predecessor
AODV DSDV Minimize broadcast message
TORA LMR Converges quicker in portioned network
DSR -- --
SSR ABR Enhance stability
Hybrid protocols: - Since proactive and reactive protocols each work best in oppositely different scenarios,
hybrid method uses both. It is used to find a balance between both protocols. Proactive operations are restricted
to small domain, whereas, reactive protocols are used for locating nodes outside those domains.
Table 4
Summary of wireless mobile adhoc routing protocols classification
Proactive Reactive Hybrid
Network organization Flat / Hierarchical flat Hierarchical
Topology dissemination periodical On-demand Both
Route letancy Always Availble Available when needed Both
Communication overhead High low Medium
II. Comparison Of Routing Protocols
Based on imperative parameters and features of routing protocol, a variety of table-driven (Proactive) routing
protocols are compared in Table 5
Table 5
COMPARISON TABLE FOR PROACTIVE ROUTING PROTOCOL
DSDV WRP FSR CGSR
Route selection Link state Shortest path Shortest path Shortest path
Route single single Single or multiple Single or multiple
Topoloagy structure flat flat hierarachical Hierarchical
Route computation distributed distributed distributed Distributed
method broadcast broadcast broadcast Broadcast
Loop free yes Yes, but not
instantaneous
yes Yes
An overview of mobile adhoc network: application, challenges and Comparison of routing protocols
www.iosrjournals.org 11 | Page
Based on imperative parameters and features of routing protocol, a variety of On Demand (Reactive) routing
protocols are compared in Table 6
Table 6
COMPARISON TABLE FOR REACTIVE ROUTING PROTOCOL
AODV TORA DSR SSR
route selection Shortest and
updated path
Shortest path Shortest and
updated path
Associativity and
Stability
Route multiple multiple multilple Single
Topology flat flat flat Flat
Route computation Broadcast Broadcast Broadcast Broadcast
Method Unicast Broadcast Unicast Broadcast
Loop free Yes NO (not short
lived loop)
Yes Yes
III. Conclusion
Mobile ad hoc network is decentralised, self-organised, “anytime, anywhere” network and provide
cheap communications. In this paper discuss the an overview of different aaplication of the mobile adhoc
metwork and various challenges faced by the developer and designer. As there are still many challenges facing
wireless ad hoc networks, it is not clear that any particular algorithm or class of algorithm is the best for all
scenarios, each protocol has their own merits and demerits and is well suited for certain situations. In this paper
also discuss the classification of routing protocols and done comparative analysis for wireless ad hoc networks
routing protocols viz. AODV, CGSR, DSR, WRP,DSDV and SSR etc. All the routing protocols are doing good
performance in wireless network but reactive protocol doing better performance. Because this reactive protocol
path finding protocol perform new path discovery and path maintenance.
References
[1]. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, “An Overview of Mobile Ad Hoc Networks: Applications and
Challenges
[2]. Chander Diwaker and Anju Gill “Comparative Analysis of Routing in MANET” International Journal of Advanced Research in
Computer Science and Software Engineering , july 2012.
[3]. Sankalp Bahadur Singh , Bharat Pesswani “A Performance Analysis Between AODV & DSR Routing Protocol” IJCTA | July-August
2012
[4]. Anju yadav, “Simulation Study and Implementation on Routing Protocols in MANET” International Journal of Computer Science &
Management Studies, 2012
[5]. P. Misra, “Routing Protocols for Ad Hoc Mobile Wireless Networks”, http://www.cis.ohio-state.edu/~jain/cis788-
[6]. Shweta, Vinit Kumar, Anish Mittal, Dr. Pankaj Gupta, Deepak Goel“Analysis of Routing in Mobile Ad-hoc Networks”, International
Journal of Computer Science & Management Studies, 2012
[7]. A.K. Gupta, Dr. H. Sadawarti and Dr. A. K. Verma, “Performance analysis of AODV, DSR & TORA Routing Protocols” in
proceeding of IACSIT International Journal of Engineering and Technology, Vol.2, No.2, April 2010
[8]. Swati Saxena, Birbal Saran, Mr. Vijendra Singh, “SIMULATION AND PERFORMANCE ANALYSIS OF DSDV, OLSR, DSR
AND ZRP ROUTING PROTOCOLS IN MANETs” , International Journal of Computer Trends and Technology-2012
[9]. C. Siva Ram Murthy and B.S Manoj, “Mobile Ad Hoc Networks- Architectures & Protocols”, Pearson Education, New Delhi, 2004
[10]. Chlamtac, I., Conti, M., and Liu, J. J.-N. Mobile ad hoc networking: imperatives and challenges. Ad Hoc
Networks, 1(1), 2003, pp. 13–6.
[11]. HaoYang, Haiyun & Fan Ye ― Security in mobile ad-hoc networks : Challenges and solutions,‖, Pg. 38-
47, Vol 11, issue 1, Feb 2004.

Mais conteúdo relacionado

Mais procurados

An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...IOSR Journals
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...INFOGAIN PUBLICATION
 
Ijeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksIjeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksKumar Goud
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...ijsrd.com
 
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsMobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsSushant Kushwaha
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkSanjeev Kumar Jaiswal
 
MobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH NetworksMobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH Networksacapone
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEEMEMTECHSTUDENTPROJECTS
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 

Mais procurados (15)

An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...
 
Unit 7
Unit 7Unit 7
Unit 7
 
Ijeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksIjeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networks
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
 
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsMobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) Applications
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
 
MobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH NetworksMobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH Networks
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networksIEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Autonomous mobile-mesh-networks
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 

Destaque

Social network analysis: an overview
Social network analysis: an overviewSocial network analysis: an overview
Social network analysis: an overviewsociamigo
 
It application social network twitter
It application social network twitterIt application social network twitter
It application social network twitterzeref17
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.Mangesh Vasu
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applicationsjajinekkanti
 
Network in Computer Application in Business
Network in Computer Application in BusinessNetwork in Computer Application in Business
Network in Computer Application in BusinessNethan P
 
Application and Network Orchestration using Heat & Tosca
Application and Network Orchestration using Heat & ToscaApplication and Network Orchestration using Heat & Tosca
Application and Network Orchestration using Heat & ToscaNati Shalom
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application PerformanceShumon Huque
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application LayerYaser Rahmati
 
The Application Layer
The Application LayerThe Application Layer
The Application Layeradil raja
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocolsbhavanatmithun
 
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003  -may10_-_lect01a_-_intro_to_network_applications_servicesUccn1003  -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_servicesShu Shin
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layerHasam Panezai
 
Asynchronous, Event-driven Network Application Development with Netty
Asynchronous, Event-driven Network Application Development with NettyAsynchronous, Event-driven Network Application Development with Netty
Asynchronous, Event-driven Network Application Development with NettyErsin Er
 
Communication networks
Communication networksCommunication networks
Communication networksYuvraj Gupta
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and ProtocolsSachii Dosti
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsAbdelkhalik Mosa
 
Communication Networks
Communication NetworksCommunication Networks
Communication Networksiswaryasriram
 

Destaque (20)

Social network analysis: an overview
Social network analysis: an overviewSocial network analysis: an overview
Social network analysis: an overview
 
It application social network twitter
It application social network twitterIt application social network twitter
It application social network twitter
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
Network in Computer Application in Business
Network in Computer Application in BusinessNetwork in Computer Application in Business
Network in Computer Application in Business
 
Application and Network Orchestration using Heat & Tosca
Application and Network Orchestration using Heat & ToscaApplication and Network Orchestration using Heat & Tosca
Application and Network Orchestration using Heat & Tosca
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application Performance
 
Ecommerce Chap 07
Ecommerce Chap 07Ecommerce Chap 07
Ecommerce Chap 07
 
Chapter 10 - Application Layer
Chapter 10 - Application LayerChapter 10 - Application Layer
Chapter 10 - Application Layer
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
Webservices
WebservicesWebservices
Webservices
 
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003  -may10_-_lect01a_-_intro_to_network_applications_servicesUccn1003  -may10_-_lect01a_-_intro_to_network_applications_services
Uccn1003 -may10_-_lect01a_-_intro_to_network_applications_services
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Asynchronous, Event-driven Network Application Development with Netty
Asynchronous, Event-driven Network Application Development with NettyAsynchronous, Event-driven Network Application Development with Netty
Asynchronous, Event-driven Network Application Development with Netty
 
Communication networks
Communication networksCommunication networks
Communication networks
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
 
Communication Networks
Communication NetworksCommunication Networks
Communication Networks
 
Application Layer
Application Layer Application Layer
Application Layer
 

Semelhante a Mobile Ad Hoc Network Applications and Routing Protocols

Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Vinish Alikkal
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksjake henry
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification DocumentationSambit Dutta
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Natasha Barnett
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 

Semelhante a Mobile Ad Hoc Network Applications and Routing Protocols (20)

Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Mobile computing Mobile Adhoc Networks (MANETs)
Mobile computing Mobile Adhoc Networks (MANETs)Mobile computing Mobile Adhoc Networks (MANETs)
Mobile computing Mobile Adhoc Networks (MANETs)
 
Mobile adhoc
Mobile adhocMobile adhoc
Mobile adhoc
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
A0110104
A0110104A0110104
A0110104
 
Manet
ManetManet
Manet
 
H010524049
H010524049H010524049
H010524049
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
eaodv
eaodveaodv
eaodv
 
Mane ts
Mane tsMane ts
Mane ts
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
MANET.pptx
MANET.pptxMANET.pptx
MANET.pptx
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfadeyimikaipaye
 
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdfLivre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdfsaad175691
 
Introduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptxIntroduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptxPoonam60376
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliStructural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliNimot Muili
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptxMel Paras
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
ADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studyADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studydhruvamdhruvil123
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...arifengg7
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfShreyas Pandit
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier Fernández Muñoz
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptxAdityaGoogle
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 

Último (20)

Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
 
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdfLivre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
 
Introduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptxIntroduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptx
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliStructural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
ASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductosASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductos
 
1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
ADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studyADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain study
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdf
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptx
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
Versatile Engineering Construction Firms
Versatile Engineering Construction FirmsVersatile Engineering Construction Firms
Versatile Engineering Construction Firms
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 

Mobile Ad Hoc Network Applications and Routing Protocols

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 5 (May. - Jun. 2013), PP 07-11 www.iosrjournals.org www.iosrjournals.org 7 | Page An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison of Routing Protocols Sukhpreet Kaur (M.Tech Student) ,Sukhpreet kaur (Asstt. Prof. of CSE Dept) Chandan Sharma (Ph.D. Candidate) Sri Guru Granth Sahib World University Fatehgarh Sahib , Guru Nanak Dev University of ,Amritsar, india (pb.) Abstract: In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices A mobile ad hoc network (MANET) consists of mobile wireless nodes in which the communication between nodes is carried out without any centralized control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router. In this paper provides insight into the potential applications of ad hoc networks and discusses the technological challenges that protocol designers and network developers are faced with. In this paper also present the impact of comparison of different routing protocol in term of different parameters. I. Introduction A wireless network is a growing new technology that will allow users to access services and information electronically, irrespective of their geographic position. Wireless networks can be classified in two types infrastructure network and infrastructure less (ad hoc) networks. Infrastructure network consists of a network with fixed and wired gateways. A mobile host interacts with a bridge in the network (called base station) within its communication radius. The mobile unit can move geographically while it is communicating. When it goes out of range of one base station, it connects with new base station and starts communicating through it. This is called handoff. Recent advancements such as Bluetooth introduced a fresh type of wireless systems which is frequently known as mobile ad-hoc networks. Mobile ad-hoc networks or "short live" networks control in the nonexistence of permanent infrastructure. Mobile ad-hoc network offers quick and horizontal network deployment in conditions where it is not possible. Ad-hoc is a Latinword, which means "for this or for this only." Early Ad-hoc network only designed for the military application. In 1990’s this method will combined with the wireless LAN and Bluetooth. 1997 internet engineering group launched MANET with the routing protocols. They implement routing protocols because to improve the data rate and the efficiency. At present there are more than fifty protocols are implemented in the wireless environment. Mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links; each node operates as an end system and a router for all other nodes in the network. Mobile ad hoc network is a group of wireless mobile computers (or nodes); in which nodes collaborate by forwarding packets for each other to allow them to communicate outside range of direct wireless transmission. Ad hoc networks require no centralized administration or fixed network infrastructure such as base stations or access points, and can be quickly and inexpensively set up as needed Advantages of MANET There are several advantages of using mobile ad hoc network:-  Setting up a wireless system is easy and fast and it eliminates the need for pulling out the cables through walls and ceilings.  Network can be extended to places, which cannot be wired.  Multiple paths increase reliability.  Wireless network offers more flexibility and adapt easily to changes in the configuration of the network. Disadvantages of MANETS  Asymmetric links: Most of the wired networks rely on the symmetric links, which are always fixed. But this is not a case with ad-hoc networks as the nodes are mobile and constantly changing their position within network. For example consider a MANET (Mobile Ad-hoc Network) where node B sends a signal to node A but this does not tell anything about the quality of the connection in the reverse direction.
  • 2. An overview of mobile adhoc network: application, challenges and Comparison of routing protocols www.iosrjournals.org 8 | Page  Routing Overhead: In wireless ad hoc networks, nodes often change their location within network. So, some out-of-date routes are generated in the routing table, which leads to unnecessary routing overhead.Interference: This is the major problem with mobile ad-hoc networks as links come and go depending on the transmission characteristics, one transmission might interfere with another one and node might overhear transmissions of other nodes and can corrupt the total transmission.  Dynamic Topology: This is also the major problem with ad-hoc routing since the topology is not constant. The mobile node might move or medium characteristics might change. In ad-hoc networks routing tables must somehow reflect these changes in topology and routing algorithms have to be adapted. For example in a fixed network routing table updating takes place for every 30sec. This updating frequency might be very low for ad-hoc networks. Characteristics of Mobile Ad Hoc Networks:- Does not rely on a fixed infrastructure for its operation autonomous transitory association of mobile nodes.  It can be rapidly deployed with user intervention.  Need not to operate in a standalone fashion but can be attached to the Internet or Cellular networks.  Devices are free to join or leave the network and they may randomly, possibly  Resulting in rapid and unpredictable changes. Working of MANET In mobile ad-hoc networks where there is no infrastructure support and since a destination node might be out of range of a source node transmitting packets, a routing procedure is always needed to find a path so as to forward the packets appropriately between the source and the destination. A base station can reach all mobile nodes without routing via broadcast in common wireless networks. In the case of ad-hoc networks, each node must be able to forward data for other nodes. Applications of MANETS Table 1 Mobile ad hoc network applications Application Possible scenarios Tactical networks • Military communication and operations • Automated battlefields Emergency services • Search and rescue operations • Disaster recovery • Replacement of fixed infrastructure in case of environmental disasters • Policing and fire fighting • Supporting doctors and nurses in hospitals Commercial and civilian Environment • E-commerce: electronic payments anytime and anywhere environments • Business: dynamic database access, mobile offices • Vehicular services: road or accident guidance, transmission of road and weather conditions, taxi cab network, inter-vehicle networks • Sports stadiums, trade fairs, shopping malls • Networks of visitors at airports Home and enterprises Networking • Home/office wireless networking • Conferences, meeting rooms • Personal area networks (PAN), Personal networks (PN) • Networks at construction sites Educations • Universities and campus settings • Virtual classrooms • Ad hoc communications during meetings or lectures Entertainment • Universities and campus settings • Virtual classrooms • Ad hoc communications during meetings or lectures Sensor network • Home applications: smart sensors and actuators embedded in consumer electronics • Body area networks (BAN) • Data tracking of environmental conditions, animal movements, chemical/biological detection Context aware services • Follow-on services: call-forwarding, mobile workspace • Information services: location specific services, time dependent services • Infotainment: touristic information
  • 3. An overview of mobile adhoc network: application, challenges and Comparison of routing protocols www.iosrjournals.org 9 | Page Coverage extension • Extending cellular network access • Linking up with the Internet, intranets, etc. Challenges in Mobile Adhoc Network Regardless of the attractive applications of MANET introduce several challenges that must be studied carefully before a wide commercial deployment can be expected.  Routing: Since the topology of the network is constantly changing, the issue of routing packets between any pair of nodes becomes a challenging task. Most protocols should be based on reactive routing instead of proactive. Multi cast routing is another challenge because the multi cast tree is no longer static due to the random movement of nodes within the network. Routes between nodes may potentially contain multiple hops, which is more complex than the single hop communication.  Security and Reliability: In addition to the common vulnerabilities of wireless connection, an ad hoc network has its particular security problems due to e.g. nasty neighbor relaying packets. The feature of distributed operation requires different schemes of authentication and key management. Further, wireless link characteristics introduce also reliability problems, because of the limited wireless transmission range, the broadcast nature of the wireless medium (e.g. hidden terminal problem), mobility-induced packet losses, and data transmission errors.  Quality of Service (QoS): Providing different quality of service levels in a constantly changing environment will be a challenge. The inherent stochastic feature of communications quality in a MANET makes it difficult to offer fixed guarantees on the services offered to a device. An adaptive QoS must be implemented over the traditional resource reservation to support the multimedia services.  Inter-networking: In addition to the communication within an ad hoc network, inter-networking between MANET and fixed networks (mainly IP based) is often expected in many cases. The coexistence of routing protocols in such a mobile device is a challenge for the harmonious mobility management.  Power Consumption: For most of the light-weight mobile terminals, the communication-related functions should be optimized for lean power consumption. Conservation of power and power-aware routing must be taken into consideration. Multicast: Multicast is desirable to support multiparty wireless communications. Since the multicast tree is no longer static, the multicast routing protocol must be able to cope with mobility including multicast membership dynamics (leave and join).  Location-aided Routing: Location-aided routing uses positioning information to define associated regions so that the routing is spatially oriented and limited. This is analogous to associatively-oriented and restricted broadcast in ABR. Routing in Mobile Ad hoc Networks Mobile Ad-hoc networks are self-organizing and self-configuring multihop wireless networks, where the structure of the network changes dynamically. In mobile ad-hoc networks there is no infrastructure support as is the case with wireless networks, and since a destination node might be out of range of a source node transferring packets; so there is need of a routing procedure. This is always ready to find a path so as to forward the packets appropriately between the source and the destination. In the case of ad-hoc networks, each node must be able to forward data for other nodes. This creates additional problems along with the problems of dynamic topology which is unpredictable connectivity changes Problems in routing with Mobile Ad hoc Networks  Asymmetric links: Most of the wired networks rely on the symmetric links which are always fixed. But this is not a case with ad-hoc networks as the nodes are mobile and constantly changing their position within network.  Routing Overhead: In wireless ad hoc networks, nodes often change their location within network. So, some stale routes are generated in the routing table which leads to unnecessary routing overhead.  Interference: This is the major problem with mobile ad-hoc networks as links come and go depending on the transmission characteristics, one transmission might interfere with another one and no de might overhear transmissions of other nodes and can corrupt the total transmission.  Dynamic Topology: This is also the major problem with ad-hoc routing since the topology is not constant. The mobile node might move or medium characteristics might change. In ad-hoc networks, routing tables must somehow reject these changes in topology and routing algorithms have to be adapted. Classification of Routing Protocols in MANET:- Routing protocol in MANET are classified into three different categories according to their functionality. A. Proactive B. Reactive C. Hybrid
  • 4. An overview of mobile adhoc network: application, challenges and Comparison of routing protocols www.iosrjournals.org 10 | Page Proactive Protocols:- In contrast to table driven routing protocols, on demand compute the route to a specific destination only when needed, so a routing table containing all the nodes as entries does not have to be maintained in each node. When a source wants to send packet to a destination, it invokes a route discovery mechanism to find the path to the destination. The route remains valid till the destination is reachable or until the route is no longer needed. Table 2 Proactive Routing protocols Proactive protocols Predecessor Protocol Enhancement regarding predecessor DSDR DBF Provide single shortest path WRP DBF Performance/Count-to-infinity problem FSR FS Improved Flooding CGSR DSDR Reduces network traffic load Reactive protocols:-These protocols are also called reactive protocols since they don't maintain routing information or routing activity at the network nodes if there is no communication. If a node wants to send a packet to another node then this protocol searches for the route in an on-demand manner and establishes the connection in order to transmit and receive the packet. The route discovery usually occurs by flooding the route request packets throughout the network. Table: 3 Reactive Routing Protocols Reactive protocols Predecessor Protocols Enhancement regarding predecessor AODV DSDV Minimize broadcast message TORA LMR Converges quicker in portioned network DSR -- -- SSR ABR Enhance stability Hybrid protocols: - Since proactive and reactive protocols each work best in oppositely different scenarios, hybrid method uses both. It is used to find a balance between both protocols. Proactive operations are restricted to small domain, whereas, reactive protocols are used for locating nodes outside those domains. Table 4 Summary of wireless mobile adhoc routing protocols classification Proactive Reactive Hybrid Network organization Flat / Hierarchical flat Hierarchical Topology dissemination periodical On-demand Both Route letancy Always Availble Available when needed Both Communication overhead High low Medium II. Comparison Of Routing Protocols Based on imperative parameters and features of routing protocol, a variety of table-driven (Proactive) routing protocols are compared in Table 5 Table 5 COMPARISON TABLE FOR PROACTIVE ROUTING PROTOCOL DSDV WRP FSR CGSR Route selection Link state Shortest path Shortest path Shortest path Route single single Single or multiple Single or multiple Topoloagy structure flat flat hierarachical Hierarchical Route computation distributed distributed distributed Distributed method broadcast broadcast broadcast Broadcast Loop free yes Yes, but not instantaneous yes Yes
  • 5. An overview of mobile adhoc network: application, challenges and Comparison of routing protocols www.iosrjournals.org 11 | Page Based on imperative parameters and features of routing protocol, a variety of On Demand (Reactive) routing protocols are compared in Table 6 Table 6 COMPARISON TABLE FOR REACTIVE ROUTING PROTOCOL AODV TORA DSR SSR route selection Shortest and updated path Shortest path Shortest and updated path Associativity and Stability Route multiple multiple multilple Single Topology flat flat flat Flat Route computation Broadcast Broadcast Broadcast Broadcast Method Unicast Broadcast Unicast Broadcast Loop free Yes NO (not short lived loop) Yes Yes III. Conclusion Mobile ad hoc network is decentralised, self-organised, “anytime, anywhere” network and provide cheap communications. In this paper discuss the an overview of different aaplication of the mobile adhoc metwork and various challenges faced by the developer and designer. As there are still many challenges facing wireless ad hoc networks, it is not clear that any particular algorithm or class of algorithm is the best for all scenarios, each protocol has their own merits and demerits and is well suited for certain situations. In this paper also discuss the classification of routing protocols and done comparative analysis for wireless ad hoc networks routing protocols viz. AODV, CGSR, DSR, WRP,DSDV and SSR etc. All the routing protocols are doing good performance in wireless network but reactive protocol doing better performance. Because this reactive protocol path finding protocol perform new path discovery and path maintenance. References [1]. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, “An Overview of Mobile Ad Hoc Networks: Applications and Challenges [2]. Chander Diwaker and Anju Gill “Comparative Analysis of Routing in MANET” International Journal of Advanced Research in Computer Science and Software Engineering , july 2012. [3]. Sankalp Bahadur Singh , Bharat Pesswani “A Performance Analysis Between AODV & DSR Routing Protocol” IJCTA | July-August 2012 [4]. Anju yadav, “Simulation Study and Implementation on Routing Protocols in MANET” International Journal of Computer Science & Management Studies, 2012 [5]. P. Misra, “Routing Protocols for Ad Hoc Mobile Wireless Networks”, http://www.cis.ohio-state.edu/~jain/cis788- [6]. Shweta, Vinit Kumar, Anish Mittal, Dr. Pankaj Gupta, Deepak Goel“Analysis of Routing in Mobile Ad-hoc Networks”, International Journal of Computer Science & Management Studies, 2012 [7]. A.K. Gupta, Dr. H. Sadawarti and Dr. A. K. Verma, “Performance analysis of AODV, DSR & TORA Routing Protocols” in proceeding of IACSIT International Journal of Engineering and Technology, Vol.2, No.2, April 2010 [8]. Swati Saxena, Birbal Saran, Mr. Vijendra Singh, “SIMULATION AND PERFORMANCE ANALYSIS OF DSDV, OLSR, DSR AND ZRP ROUTING PROTOCOLS IN MANETs” , International Journal of Computer Trends and Technology-2012 [9]. C. Siva Ram Murthy and B.S Manoj, “Mobile Ad Hoc Networks- Architectures & Protocols”, Pearson Education, New Delhi, 2004 [10]. Chlamtac, I., Conti, M., and Liu, J. J.-N. Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks, 1(1), 2003, pp. 13–6. [11]. HaoYang, Haiyun & Fan Ye ― Security in mobile ad-hoc networks : Challenges and solutions,‖, Pg. 38- 47, Vol 11, issue 1, Feb 2004.