SlideShare a Scribd company logo
1 of 27
MOBILE AD HOC
NETWORKS (MANETs)
  Jagdeep Matharu
  Brock University
Outline
  Mobile Ad hoc networks.
  Applications of ad hoc networks.

  Challenges in Ad hoc network.

  Media Access Control

  Routing algorithms for MANETs.

  Conclusion.
Mobile Ad hoc networks (MANETs)

   Mobile ad hoc networks are formed dynamically
    by an autonomous system of mobile nodes that
    are connected via wireless links.
   No existing fixed infrastructure or centralized
    administration – No base station.
   Mobile nodes are free to move randomly.
       Network topology changes frequently.
   May Operate as standalone fashion or also can
    be connected to the larger internet.
   Each node work as router.
MANETs




    MANETs




             WLAN
Applications
   Tactical networks
       Military communication, automated battlefields
   Emergency Services
       Search and rescue operations
       Disaster recovery – Earthquakes, hurricanes .
   Educational
       Virtual classrooms or conference rooms.
       Set up ad hoc communication during conferences, meeting, or lectures
   Home and Entertainment
       Home/office wireless networking.
       Personal Area network
       Multiuser games
       Outdoor internet access.
Challenges
   Infrastructure less
       Brings new network designing challenges.
   Dynamically changing topologies
       Cause route changes, frequent network partitions and packet
        loss.
   Physical layer limitations
       Limited Wireless range.
       Packet loss during transmission.
       Broadcast nature of the communication.
   Limitations of Mobile Nodes
       Short battery life
       Limited capacities.
   Network security.
Effects on the protocol stack
   Application Layer
       New applications, Authentication, Encryption.
   Transport Layer
       Congestion Control, Flow control.
   Network
       Host addressing, Routing, Multicasting.
   Data Link Layer
       Media Access
   Physical
       Spectrum usage/allocation
Media Access Control
   Since MANETs, use broadcasting and shared
    transmission media, introduces a probability of
    packet collisions and media contention.
   Since collision detection is not possible with
    half-duplex radio. This brings new challenges
    to conventional CSMA/CD-based and MAC
    based protocols.
   Among the top issues are the hidden-terminal
    and exposed-terminal problems.
Hidden-terminal problem
   When two terminals can not detect each
    other’s transmission due to being outside of
    each others range. The collision can occur.
Exposed-terminal problems.
   Occur when a permissible transmission from a
    node to another node has to be delayed due to
    the irrelevant transmission between two other
    nodes.
Solution
   A new protocol MACA (multiple access with
    collision avoidance protocol) is used to avoid
    the Hidden-terminal and Exposed-terminal
    problems.
   Use signalling packets to avoid collision.
     RTS   (Request to send)
       Senderrequest the right to send from a receiver with a
       short RTS packet before it sends a data packet.
     CTS   (Clear to send)
       Receiver grants the right to send as soon as it is ready
       to receive
Routing In MANETs
Routing in Ad Hoc Networks
   Mobile nodes operate as routers.
   Proactive Protocol – Table Based
     Maintain routes between every host pair all the time
     Shortest-path protocols
     Frequently update routing table; High routing
      overhead.
   Reactive Protocols – On-Demand
     On-demand
     Source initiates route discovery.
   Hybrid protocols
       Combination of proactive and reactive.
Destination-Sequenced Distance-
Vector (DSDV)
   Adapted from Routing Information Protocol(RIP).
       Adds new attribute- Sequence Number
   Each node maintains a routing table which stores
       Next hop
       Cost matric for each destination
       A sequence number that is create by destination itself.
   Each node advertises a monotonically increasing
    even sequence number.
       Used to update path to destination node.
       Odd sequence number used to represent broken path.
   Routing table updates are transmitted periodically.
   Routing information is transmitted by broadcast.
Dynamic Source Routing (DSR)
   DSR is a type of Reactive Routing Protocols.
   On demand Protocol
   Source node initiate route discovery.
   Source node floods Route Request (RREQ) in
    the network.
   Use broadcast method to send RREQ.
   Route request use a sequence number and path it
    traversed.
       Sequence number is used to identified the request; to
        avoid looping.
Cont’d
   The indented receiver sends a Route Reply
    (RREP).
   The receiver uses the reverse order of path in
    the Route Request to send the RREP.
   Source use received path to send data.
   Route may saved in source`s cache for future
    use.
DSR
DSR
DSR
DSR
DSR
DSR
DSR (Reply)
                                                          Y

                                                      Z
              S               RREP [S,E,F,J,D]
                          E
                                  F
      B
                  C                               M           L
                                          J
  A                           G
          H                                   D
                                      K
                      I                                   N
Zone Routing Protocol
   A Hybrid Protocol
   ZRP combines both proactive and reactive
    approach.
   Divide network into non- overlapping routing
    zones and use independent protocol on
    different zones.
     Intra-zone: Proactive protocols are used.
     Inter-zone: Reactive protocols are used.

   Routing zone diameter selected that optimized
    the routing.
Zone Routing Protocol
   Zone radius = 2
The End
References
   Basagni, Stefano, Marco Conti, Silvia
    Giordano, Ivan Stojmenović, et al. Mobile Ad
    Hoc Networking. Wiley-IEEE Press, 2004.
    Print.
   Iyer, Sridhar. Mobile Ad Hoc Networks.
    Bombay: 2000. Web.
    <www.it.iitb.ac.in/~sri/talks/manet.ppt>.

More Related Content

What's hot

Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDushhyant Kumar
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisonsITM Universe - Vadodara
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Mobility Management
Mobility ManagementMobility Management
Mobility ManagementHira Shaukat
 

What's hot (20)

Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Manet
ManetManet
Manet
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
 

Viewers also liked

Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Sockets in unix
Sockets in unixSockets in unix
Sockets in unixswtjerin4u
 
Inter process communication using Linux System Calls
Inter process communication using Linux System CallsInter process communication using Linux System Calls
Inter process communication using Linux System Callsjyoti9vssut
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Ravindra Raju Kolahalam
 
Inter process communication
Inter process communicationInter process communication
Inter process communicationMohd Tousif
 
Inter process communication
Inter process communicationInter process communication
Inter process communicationRJ Mehul Gadhiya
 

Viewers also liked (12)

Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)
 
Manet
ManetManet
Manet
 
SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)
 
Sockets in unix
Sockets in unixSockets in unix
Sockets in unix
 
Inter process communication using Linux System Calls
Inter process communication using Linux System CallsInter process communication using Linux System Calls
Inter process communication using Linux System Calls
 
Ipc ppt
Ipc pptIpc ppt
Ipc ppt
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
 
Inter process communication
Inter process communicationInter process communication
Inter process communication
 
Inter process communication
Inter process communicationInter process communication
Inter process communication
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process Communication
 

Similar to Mobile Ad hoc Networks

implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolAtul Atalkar
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...IDES Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 

Similar to Mobile Ad hoc Networks (20)

networking
networkingnetworking
networking
 
implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocol
 
Be31390392
Be31390392Be31390392
Be31390392
 
Ad hoc
Ad hocAd hoc
Ad hoc
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Research on performance of routing protocols in manet
Research on performance of routing protocols in manetResearch on performance of routing protocols in manet
Research on performance of routing protocols in manet
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
 
J011137479
J011137479J011137479
J011137479
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
F41023946
F41023946F41023946
F41023946
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 
Na2522282231
Na2522282231Na2522282231
Na2522282231
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 

Recently uploaded

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Mobile Ad hoc Networks

  • 1. MOBILE AD HOC NETWORKS (MANETs) Jagdeep Matharu Brock University
  • 2. Outline  Mobile Ad hoc networks.  Applications of ad hoc networks.  Challenges in Ad hoc network.  Media Access Control  Routing algorithms for MANETs.  Conclusion.
  • 3. Mobile Ad hoc networks (MANETs)  Mobile ad hoc networks are formed dynamically by an autonomous system of mobile nodes that are connected via wireless links.  No existing fixed infrastructure or centralized administration – No base station.  Mobile nodes are free to move randomly.  Network topology changes frequently.  May Operate as standalone fashion or also can be connected to the larger internet.  Each node work as router.
  • 4. MANETs MANETs WLAN
  • 5. Applications  Tactical networks  Military communication, automated battlefields  Emergency Services  Search and rescue operations  Disaster recovery – Earthquakes, hurricanes .  Educational  Virtual classrooms or conference rooms.  Set up ad hoc communication during conferences, meeting, or lectures  Home and Entertainment  Home/office wireless networking.  Personal Area network  Multiuser games  Outdoor internet access.
  • 6. Challenges  Infrastructure less  Brings new network designing challenges.  Dynamically changing topologies  Cause route changes, frequent network partitions and packet loss.  Physical layer limitations  Limited Wireless range.  Packet loss during transmission.  Broadcast nature of the communication.  Limitations of Mobile Nodes  Short battery life  Limited capacities.  Network security.
  • 7. Effects on the protocol stack  Application Layer  New applications, Authentication, Encryption.  Transport Layer  Congestion Control, Flow control.  Network  Host addressing, Routing, Multicasting.  Data Link Layer  Media Access  Physical  Spectrum usage/allocation
  • 8. Media Access Control  Since MANETs, use broadcasting and shared transmission media, introduces a probability of packet collisions and media contention.  Since collision detection is not possible with half-duplex radio. This brings new challenges to conventional CSMA/CD-based and MAC based protocols.  Among the top issues are the hidden-terminal and exposed-terminal problems.
  • 9. Hidden-terminal problem  When two terminals can not detect each other’s transmission due to being outside of each others range. The collision can occur.
  • 10. Exposed-terminal problems.  Occur when a permissible transmission from a node to another node has to be delayed due to the irrelevant transmission between two other nodes.
  • 11. Solution  A new protocol MACA (multiple access with collision avoidance protocol) is used to avoid the Hidden-terminal and Exposed-terminal problems.  Use signalling packets to avoid collision.  RTS (Request to send)  Senderrequest the right to send from a receiver with a short RTS packet before it sends a data packet.  CTS (Clear to send)  Receiver grants the right to send as soon as it is ready to receive
  • 13. Routing in Ad Hoc Networks  Mobile nodes operate as routers.  Proactive Protocol – Table Based  Maintain routes between every host pair all the time  Shortest-path protocols  Frequently update routing table; High routing overhead.  Reactive Protocols – On-Demand  On-demand  Source initiates route discovery.  Hybrid protocols  Combination of proactive and reactive.
  • 14. Destination-Sequenced Distance- Vector (DSDV)  Adapted from Routing Information Protocol(RIP).  Adds new attribute- Sequence Number  Each node maintains a routing table which stores  Next hop  Cost matric for each destination  A sequence number that is create by destination itself.  Each node advertises a monotonically increasing even sequence number.  Used to update path to destination node.  Odd sequence number used to represent broken path.  Routing table updates are transmitted periodically.  Routing information is transmitted by broadcast.
  • 15. Dynamic Source Routing (DSR)  DSR is a type of Reactive Routing Protocols.  On demand Protocol  Source node initiate route discovery.  Source node floods Route Request (RREQ) in the network.  Use broadcast method to send RREQ.  Route request use a sequence number and path it traversed.  Sequence number is used to identified the request; to avoid looping.
  • 16. Cont’d  The indented receiver sends a Route Reply (RREP).  The receiver uses the reverse order of path in the Route Request to send the RREP.  Source use received path to send data.  Route may saved in source`s cache for future use.
  • 17. DSR
  • 18. DSR
  • 19. DSR
  • 20. DSR
  • 21. DSR
  • 22. DSR
  • 23. DSR (Reply) Y Z S RREP [S,E,F,J,D] E F B C M L J A G H D K I N
  • 24. Zone Routing Protocol  A Hybrid Protocol  ZRP combines both proactive and reactive approach.  Divide network into non- overlapping routing zones and use independent protocol on different zones.  Intra-zone: Proactive protocols are used.  Inter-zone: Reactive protocols are used.  Routing zone diameter selected that optimized the routing.
  • 25. Zone Routing Protocol  Zone radius = 2
  • 27. References  Basagni, Stefano, Marco Conti, Silvia Giordano, Ivan Stojmenović, et al. Mobile Ad Hoc Networking. Wiley-IEEE Press, 2004. Print.  Iyer, Sridhar. Mobile Ad Hoc Networks. Bombay: 2000. Web. <www.it.iitb.ac.in/~sri/talks/manet.ppt>.

Editor's Notes

  1. mobile ad hoc networks are self-organizing network of mobile nodes that use wireless links to form a network. This network is a temporarily network that can be formed or destroyed anytime. These network formed dynamically and share common wireless links. As in tradition networks there is not basic fixed structure. There is not central enetry to contolteopration of the networks. Nodes are free to move randomly and can leave or join the network on the fly.
  2. Because ad hoc networks are flexible networks that can be set up anywhere at any time,Without infrastructure, administration. There are lots of applications of MANETs. MANETS have primarily been used for tactical related applications to improve battlefield communications. Mantes can also be used in emergency situations like earthquake, hurricanes, fire etc. Where fixed infrastructure is destroyed. And can be used for retrieval and transmission of patient data from/to hospital. Can also be used as a replacement for fixed infrastructure in emergency situations. Can be used for educational purposed for example creating virtual classrooms, campus communication, conferences or creating ad hoc networks Manets can be also used for entertainment and in other home networks.Uses include home/office wireless networking where it could be used with existing internet infrastructure. Other useful applications include personal area network, multiuser gaming and outdoor internet access. HHistorically, mobile ad hoc networks have primarily been used for tactical network-relatedApplications to improve battlefield communications and survivability. The dynamicThe nature of military operations means it is not possible to rely on access to a fixed replacedCommunication infrastructure on the battlefield.
  3. Ad hoc networks do not have any fixed infrastructure. All the modes in the ad hoc network are multihop. This brings new channels including how to manage nodes. All nodes are using wireless links to communicate. Eat the pie1.3.3.1. They are Infrastructure less. Mobile ad hoc networks are multihop infrastructure lessWireless networks. This lack of fixed infrastructure in addition to being wireless,Generate new design issues compared with fixed networks. Also, lack of a centralizedEntity means network management has to be distributed across different nodes, whichBrings an added difficulty in fault detection and management.1.3.3.2. Dynamically Changing Network Topologies. In mobile ad hoc networks,Since nodes can move arbitrarily, the network topology, which is typically multihop, canChange frequently and unpredictably, resulting in route changes, frequent network partitions,And, possibly, packet losses [12, 36].1.3.3.3. Physical Layer Limitation. The radio interface at each node uses broadcastingFor transmitting traffic and usually has limited wireless transmission range, resultingIn specific mobile ad hoc network problems like hidden terminal problems, exposed terminalProblem, and so on. Collisions are inherent to the medium, and there is a higherProbability of packet losses due to transmission errors compared to wire-line systems.
  4. Issues associated with each layer. Since there are central managements and fixed infrastructure our communication protocol stack face different challenges. At application layer: - new kind of application required due to the network structure, new authentication and encryption methods required. For transport layer : - since there is not central management of the nodes so issues related to congestion control, flow control etc needs to be address.At the network layer new types of protocols will be required.A new media access techniques will be required as we will see in further slides. At the physical lever different wireless link related issues needs to address for example spectrum usage, aloocation of spectrum etc.
  5. Mobile ad hoc networks use broadcast by nature. The wireless process uses half duplex transmission. And slll node share the same media therefore collion can accure. This is different from the LAN or Wlan. Because the other collision detection system will not work properly. A new type of congesion control protocol required.
  6. The exposed-terminal problem results from situations in which a permissible transmissionfrom a mobile station (sender) to another station has to be delayed due to the irrelevanttransmission activity between two other mobile stations within sender’s transmission range.Depicts a typical scenario in which the exposed-terminal problem may occur.Let us assume that terminals A and C can hear transmissions from B, but terminal ACannot hear transmissions from C. Let us also assume that terminal B is transmitting toTerminal A, and terminal C have a frame to be transmitted to D. According to the CSMAscheme, C senses the medium and finds it busy because of B’s transmission, and, therefore,refrains from transmitting to D, although this transmission would not cause a collisionat A. The exposed-terminal problem may thus result in loss of throughput.
  7. The early access protocol such CSMA/CD does not work properly.A new algorithm is used MACA (Multiple access with collision avoidence).The key ideas behind these protocols invoke sending RTS (Request to send ) and CTS (Clear To Send) packets before the data transmission has actully taken place. What a node wished to transmit a packet to a neighbour, it first transmits a RTS oacket. The reciever then consents to the communication by replying with CTS packet. On hearing the CTS, the sender can transmit its data packet.
  8. Mobile nodes operate as routers, forwarding packets for other mobile nodes that may not be within direct wireless transmission range.Mobile nodes participate in an ad hoc routing protocol to discover ‘multi-hop’ paths through the network to any other node.DV – Distributed Bellman-Ford (DBF), Routing Information Protocol (RIP)Hop-by-hop DVProactive: table driven; continuously evaluates routes; no latency in route discovery; periodic control messages needed; large network capacity to keep information up-to-date; most routing info may never be usedReactive: on demand; route discovery by global search; drawback-latency of route discovery; may not be appropriate for real time communicationEach route is tagged with a sequence number originated by destination so nodes can quickly distinguish stale routes from new ones and avoid formation of routing loops.Many different protocols have be proposed for unicasting routing protocols Some specifically invented for MANET and other are adopted from wired networks. No single protocol works well in all evviourments. Due to dynamic nature of mobile ad hoc networks results in frequent changes and unpredictability in network topologies, adds difficult and complexity to routing among the nodes.Those complexity and importence of routin make the routing are most active The primary objactive of routing proticols us to correnct and efficent route establishment between a pair of nodes so that message may be delivered reliably and in a timely manner. Route contructionsould be dome with minimum overhead bandwidth consumption. Existing distance-vector and link-state-based routing protocols are designed for static enviourments, resulting in degradation in performance, including slow route static enviourment,
  9. a proactive protocol that works on the principles of distance vectors.Its basically a extension of RIP protocol. where each node in a network maintains a distance table that contains the shortestdistance and the address of the next hop router.When a change occurs in the network,each node updates its directly connected neighbours to the least cost distancevector. This process continues until convergence.Addition to the