SlideShare a Scribd company logo
1 of 27
MOBILE AD HOC
NETWORKS (MANETs)
  Jagdeep Matharu
  Brock University
Outline
  Mobile Ad hoc networks.
  Applications of ad hoc networks.

  Challenges in Ad hoc network.

  Media Access Control

  Routing algorithms for MANETs.

  Conclusion.
Mobile Ad hoc networks (MANETs)

   Mobile ad hoc networks are formed dynamically
    by an autonomous system of mobile nodes that
    are connected via wireless links.
   No existing fixed infrastructure or centralized
    administration – No base station.
   Mobile nodes are free to move randomly.
       Network topology changes frequently.
   May Operate as standalone fashion or also can
    be connected to the larger internet.
   Each node work as router.
MANETs




    MANETs




             WLAN
Applications
   Tactical networks
       Military communication, automated battlefields
   Emergency Services
       Search and rescue operations
       Disaster recovery – Earthquakes, hurricanes .
   Educational
       Virtual classrooms or conference rooms.
       Set up ad hoc communication during conferences, meeting, or lectures
   Home and Entertainment
       Home/office wireless networking.
       Personal Area network
       Multiuser games
       Outdoor internet access.
Challenges
   Infrastructure less
       Brings new network designing challenges.
   Dynamically changing topologies
       Cause route changes, frequent network partitions and packet
        loss.
   Physical layer limitations
       Limited Wireless range.
       Packet loss during transmission.
       Broadcast nature of the communication.
   Limitations of Mobile Nodes
       Short battery life
       Limited capacities.
   Network security.
Effects on the protocol stack
   Application Layer
       New applications, Authentication, Encryption.
   Transport Layer
       Congestion Control, Flow control.
   Network
       Host addressing, Routing, Multicasting.
   Data Link Layer
       Media Access
   Physical
       Spectrum usage/allocation
Media Access Control
   Since MANETs, use broadcasting and shared
    transmission media, introduces a probability of
    packet collisions and media contention.
   Since collision detection is not possible with
    half-duplex radio. This brings new challenges
    to conventional CSMA/CD-based and MAC
    based protocols.
   Among the top issues are the hidden-terminal
    and exposed-terminal problems.
Hidden-terminal problem
   When two terminals can not detect each
    other’s transmission due to being outside of
    each others range. The collision can occur.
Exposed-terminal problems.
   Occur when a permissible transmission from a
    node to another node has to be delayed due to
    the irrelevant transmission between two other
    nodes.
Solution
   A new protocol MACA (multiple access with
    collision avoidance protocol) is used to avoid
    the Hidden-terminal and Exposed-terminal
    problems.
   Use signalling packets to avoid collision.
     RTS   (Request to send)
       Senderrequest the right to send from a receiver with a
       short RTS packet before it sends a data packet.
     CTS   (Clear to send)
       Receiver grants the right to send as soon as it is ready
       to receive
Routing In MANETs
Routing in Ad Hoc Networks
   Mobile nodes operate as routers.
   Proactive Protocol – Table Based
     Maintain routes between every host pair all the time
     Shortest-path protocols
     Frequently update routing table; High routing
      overhead.
   Reactive Protocols – On-Demand
     On-demand
     Source initiates route discovery.
   Hybrid protocols
       Combination of proactive and reactive.
Destination-Sequenced Distance-
Vector (DSDV)
   Adapted from Routing Information Protocol(RIP).
       Adds new attribute- Sequence Number
   Each node maintains a routing table which stores
       Next hop
       Cost matric for each destination
       A sequence number that is create by destination itself.
   Each node advertises a monotonically increasing
    even sequence number.
       Used to update path to destination node.
       Odd sequence number used to represent broken path.
   Routing table updates are transmitted periodically.
   Routing information is transmitted by broadcast.
Dynamic Source Routing (DSR)
   DSR is a type of Reactive Routing Protocols.
   On demand Protocol
   Source node initiate route discovery.
   Source node floods Route Request (RREQ) in
    the network.
   Use broadcast method to send RREQ.
   Route request use a sequence number and path it
    traversed.
       Sequence number is used to identified the request; to
        avoid looping.
Cont’d
   The indented receiver sends a Route Reply
    (RREP).
   The receiver uses the reverse order of path in
    the Route Request to send the RREP.
   Source use received path to send data.
   Route may saved in source`s cache for future
    use.
DSR
DSR
DSR
DSR
DSR
DSR
DSR (Reply)
                                                          Y

                                                      Z
              S               RREP [S,E,F,J,D]
                          E
                                  F
      B
                  C                               M           L
                                          J
  A                           G
          H                                   D
                                      K
                      I                                   N
Zone Routing Protocol
   A Hybrid Protocol
   ZRP combines both proactive and reactive
    approach.
   Divide network into non- overlapping routing
    zones and use independent protocol on
    different zones.
     Intra-zone: Proactive protocols are used.
     Inter-zone: Reactive protocols are used.

   Routing zone diameter selected that optimized
    the routing.
Zone Routing Protocol
   Zone radius = 2
The End
References
   Basagni, Stefano, Marco Conti, Silvia
    Giordano, Ivan Stojmenović, et al. Mobile Ad
    Hoc Networking. Wiley-IEEE Press, 2004.
    Print.
   Iyer, Sridhar. Mobile Ad Hoc Networks.
    Bombay: 2000. Web.
    <www.it.iitb.ac.in/~sri/talks/manet.ppt>.

More Related Content

What's hot

Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile CommunicationNoushad Hasan
 
Improving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systemsImproving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systemsTarek Nader
 
Localization &amp; calling
Localization  &amp; callingLocalization  &amp; calling
Localization &amp; callingRUpaliLohar
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMANajeeb Khan
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 

What's hot (20)

Presentation on CDMA
Presentation on CDMAPresentation on CDMA
Presentation on CDMA
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Handoff in Mobile Communication
Handoff in Mobile CommunicationHandoff in Mobile Communication
Handoff in Mobile Communication
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
 
Improving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systemsImproving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systems
 
Localization &amp; calling
Localization  &amp; callingLocalization  &amp; calling
Localization &amp; calling
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMA
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Outdoor propagatiom model
Outdoor propagatiom modelOutdoor propagatiom model
Outdoor propagatiom model
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Cordless Technology
Cordless TechnologyCordless Technology
Cordless Technology
 

Viewers also liked

Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Sockets in unix
Sockets in unixSockets in unix
Sockets in unixswtjerin4u
 
Inter process communication using Linux System Calls
Inter process communication using Linux System CallsInter process communication using Linux System Calls
Inter process communication using Linux System Callsjyoti9vssut
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Ravindra Raju Kolahalam
 
Inter process communication
Inter process communicationInter process communication
Inter process communicationMohd Tousif
 
Inter process communication
Inter process communicationInter process communication
Inter process communicationRJ Mehul Gadhiya
 

Viewers also liked (13)

Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)MOBILE Ad-Hoc NETWORK (MANET)
MOBILE Ad-Hoc NETWORK (MANET)
 
Manet
ManetManet
Manet
 
SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)SPACE DIVISION MULTIPLEXING (SDMA)
SPACE DIVISION MULTIPLEXING (SDMA)
 
Sockets in unix
Sockets in unixSockets in unix
Sockets in unix
 
Inter process communication using Linux System Calls
Inter process communication using Linux System CallsInter process communication using Linux System Calls
Inter process communication using Linux System Calls
 
Ipc ppt
Ipc pptIpc ppt
Ipc ppt
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
 
Inter process communication
Inter process communicationInter process communication
Inter process communication
 
Inter process communication
Inter process communicationInter process communication
Inter process communication
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process Communication
 

Similar to Mobile Ad hoc Networks

implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolAtul Atalkar
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...IDES Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 

Similar to Mobile Ad hoc Networks (20)

networking
networkingnetworking
networking
 
implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocol
 
Be31390392
Be31390392Be31390392
Be31390392
 
Ad hoc
Ad hocAd hoc
Ad hoc
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Research on performance of routing protocols in manet
Research on performance of routing protocols in manetResearch on performance of routing protocols in manet
Research on performance of routing protocols in manet
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
 
J011137479
J011137479J011137479
J011137479
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
F41023946
F41023946F41023946
F41023946
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 
Na2522282231
Na2522282231Na2522282231
Na2522282231
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

Mobile Ad hoc Networks

  • 1. MOBILE AD HOC NETWORKS (MANETs) Jagdeep Matharu Brock University
  • 2. Outline  Mobile Ad hoc networks.  Applications of ad hoc networks.  Challenges in Ad hoc network.  Media Access Control  Routing algorithms for MANETs.  Conclusion.
  • 3. Mobile Ad hoc networks (MANETs)  Mobile ad hoc networks are formed dynamically by an autonomous system of mobile nodes that are connected via wireless links.  No existing fixed infrastructure or centralized administration – No base station.  Mobile nodes are free to move randomly.  Network topology changes frequently.  May Operate as standalone fashion or also can be connected to the larger internet.  Each node work as router.
  • 4. MANETs MANETs WLAN
  • 5. Applications  Tactical networks  Military communication, automated battlefields  Emergency Services  Search and rescue operations  Disaster recovery – Earthquakes, hurricanes .  Educational  Virtual classrooms or conference rooms.  Set up ad hoc communication during conferences, meeting, or lectures  Home and Entertainment  Home/office wireless networking.  Personal Area network  Multiuser games  Outdoor internet access.
  • 6. Challenges  Infrastructure less  Brings new network designing challenges.  Dynamically changing topologies  Cause route changes, frequent network partitions and packet loss.  Physical layer limitations  Limited Wireless range.  Packet loss during transmission.  Broadcast nature of the communication.  Limitations of Mobile Nodes  Short battery life  Limited capacities.  Network security.
  • 7. Effects on the protocol stack  Application Layer  New applications, Authentication, Encryption.  Transport Layer  Congestion Control, Flow control.  Network  Host addressing, Routing, Multicasting.  Data Link Layer  Media Access  Physical  Spectrum usage/allocation
  • 8. Media Access Control  Since MANETs, use broadcasting and shared transmission media, introduces a probability of packet collisions and media contention.  Since collision detection is not possible with half-duplex radio. This brings new challenges to conventional CSMA/CD-based and MAC based protocols.  Among the top issues are the hidden-terminal and exposed-terminal problems.
  • 9. Hidden-terminal problem  When two terminals can not detect each other’s transmission due to being outside of each others range. The collision can occur.
  • 10. Exposed-terminal problems.  Occur when a permissible transmission from a node to another node has to be delayed due to the irrelevant transmission between two other nodes.
  • 11. Solution  A new protocol MACA (multiple access with collision avoidance protocol) is used to avoid the Hidden-terminal and Exposed-terminal problems.  Use signalling packets to avoid collision.  RTS (Request to send)  Senderrequest the right to send from a receiver with a short RTS packet before it sends a data packet.  CTS (Clear to send)  Receiver grants the right to send as soon as it is ready to receive
  • 13. Routing in Ad Hoc Networks  Mobile nodes operate as routers.  Proactive Protocol – Table Based  Maintain routes between every host pair all the time  Shortest-path protocols  Frequently update routing table; High routing overhead.  Reactive Protocols – On-Demand  On-demand  Source initiates route discovery.  Hybrid protocols  Combination of proactive and reactive.
  • 14. Destination-Sequenced Distance- Vector (DSDV)  Adapted from Routing Information Protocol(RIP).  Adds new attribute- Sequence Number  Each node maintains a routing table which stores  Next hop  Cost matric for each destination  A sequence number that is create by destination itself.  Each node advertises a monotonically increasing even sequence number.  Used to update path to destination node.  Odd sequence number used to represent broken path.  Routing table updates are transmitted periodically.  Routing information is transmitted by broadcast.
  • 15. Dynamic Source Routing (DSR)  DSR is a type of Reactive Routing Protocols.  On demand Protocol  Source node initiate route discovery.  Source node floods Route Request (RREQ) in the network.  Use broadcast method to send RREQ.  Route request use a sequence number and path it traversed.  Sequence number is used to identified the request; to avoid looping.
  • 16. Cont’d  The indented receiver sends a Route Reply (RREP).  The receiver uses the reverse order of path in the Route Request to send the RREP.  Source use received path to send data.  Route may saved in source`s cache for future use.
  • 17. DSR
  • 18. DSR
  • 19. DSR
  • 20. DSR
  • 21. DSR
  • 22. DSR
  • 23. DSR (Reply) Y Z S RREP [S,E,F,J,D] E F B C M L J A G H D K I N
  • 24. Zone Routing Protocol  A Hybrid Protocol  ZRP combines both proactive and reactive approach.  Divide network into non- overlapping routing zones and use independent protocol on different zones.  Intra-zone: Proactive protocols are used.  Inter-zone: Reactive protocols are used.  Routing zone diameter selected that optimized the routing.
  • 25. Zone Routing Protocol  Zone radius = 2
  • 27. References  Basagni, Stefano, Marco Conti, Silvia Giordano, Ivan Stojmenović, et al. Mobile Ad Hoc Networking. Wiley-IEEE Press, 2004. Print.  Iyer, Sridhar. Mobile Ad Hoc Networks. Bombay: 2000. Web. <www.it.iitb.ac.in/~sri/talks/manet.ppt>.

Editor's Notes

  1. mobile ad hoc networks are self-organizing network of mobile nodes that use wireless links to form a network. This network is a temporarily network that can be formed or destroyed anytime. These network formed dynamically and share common wireless links. As in tradition networks there is not basic fixed structure. There is not central enetry to contolteopration of the networks. Nodes are free to move randomly and can leave or join the network on the fly.
  2. Because ad hoc networks are flexible networks that can be set up anywhere at any time,Without infrastructure, administration. There are lots of applications of MANETs. MANETS have primarily been used for tactical related applications to improve battlefield communications. Mantes can also be used in emergency situations like earthquake, hurricanes, fire etc. Where fixed infrastructure is destroyed. And can be used for retrieval and transmission of patient data from/to hospital. Can also be used as a replacement for fixed infrastructure in emergency situations. Can be used for educational purposed for example creating virtual classrooms, campus communication, conferences or creating ad hoc networks Manets can be also used for entertainment and in other home networks.Uses include home/office wireless networking where it could be used with existing internet infrastructure. Other useful applications include personal area network, multiuser gaming and outdoor internet access. HHistorically, mobile ad hoc networks have primarily been used for tactical network-relatedApplications to improve battlefield communications and survivability. The dynamicThe nature of military operations means it is not possible to rely on access to a fixed replacedCommunication infrastructure on the battlefield.
  3. Ad hoc networks do not have any fixed infrastructure. All the modes in the ad hoc network are multihop. This brings new channels including how to manage nodes. All nodes are using wireless links to communicate. Eat the pie1.3.3.1. They are Infrastructure less. Mobile ad hoc networks are multihop infrastructure lessWireless networks. This lack of fixed infrastructure in addition to being wireless,Generate new design issues compared with fixed networks. Also, lack of a centralizedEntity means network management has to be distributed across different nodes, whichBrings an added difficulty in fault detection and management.1.3.3.2. Dynamically Changing Network Topologies. In mobile ad hoc networks,Since nodes can move arbitrarily, the network topology, which is typically multihop, canChange frequently and unpredictably, resulting in route changes, frequent network partitions,And, possibly, packet losses [12, 36].1.3.3.3. Physical Layer Limitation. The radio interface at each node uses broadcastingFor transmitting traffic and usually has limited wireless transmission range, resultingIn specific mobile ad hoc network problems like hidden terminal problems, exposed terminalProblem, and so on. Collisions are inherent to the medium, and there is a higherProbability of packet losses due to transmission errors compared to wire-line systems.
  4. Issues associated with each layer. Since there are central managements and fixed infrastructure our communication protocol stack face different challenges. At application layer: - new kind of application required due to the network structure, new authentication and encryption methods required. For transport layer : - since there is not central management of the nodes so issues related to congestion control, flow control etc needs to be address.At the network layer new types of protocols will be required.A new media access techniques will be required as we will see in further slides. At the physical lever different wireless link related issues needs to address for example spectrum usage, aloocation of spectrum etc.
  5. Mobile ad hoc networks use broadcast by nature. The wireless process uses half duplex transmission. And slll node share the same media therefore collion can accure. This is different from the LAN or Wlan. Because the other collision detection system will not work properly. A new type of congesion control protocol required.
  6. The exposed-terminal problem results from situations in which a permissible transmissionfrom a mobile station (sender) to another station has to be delayed due to the irrelevanttransmission activity between two other mobile stations within sender’s transmission range.Depicts a typical scenario in which the exposed-terminal problem may occur.Let us assume that terminals A and C can hear transmissions from B, but terminal ACannot hear transmissions from C. Let us also assume that terminal B is transmitting toTerminal A, and terminal C have a frame to be transmitted to D. According to the CSMAscheme, C senses the medium and finds it busy because of B’s transmission, and, therefore,refrains from transmitting to D, although this transmission would not cause a collisionat A. The exposed-terminal problem may thus result in loss of throughput.
  7. The early access protocol such CSMA/CD does not work properly.A new algorithm is used MACA (Multiple access with collision avoidence).The key ideas behind these protocols invoke sending RTS (Request to send ) and CTS (Clear To Send) packets before the data transmission has actully taken place. What a node wished to transmit a packet to a neighbour, it first transmits a RTS oacket. The reciever then consents to the communication by replying with CTS packet. On hearing the CTS, the sender can transmit its data packet.
  8. Mobile nodes operate as routers, forwarding packets for other mobile nodes that may not be within direct wireless transmission range.Mobile nodes participate in an ad hoc routing protocol to discover ‘multi-hop’ paths through the network to any other node.DV – Distributed Bellman-Ford (DBF), Routing Information Protocol (RIP)Hop-by-hop DVProactive: table driven; continuously evaluates routes; no latency in route discovery; periodic control messages needed; large network capacity to keep information up-to-date; most routing info may never be usedReactive: on demand; route discovery by global search; drawback-latency of route discovery; may not be appropriate for real time communicationEach route is tagged with a sequence number originated by destination so nodes can quickly distinguish stale routes from new ones and avoid formation of routing loops.Many different protocols have be proposed for unicasting routing protocols Some specifically invented for MANET and other are adopted from wired networks. No single protocol works well in all evviourments. Due to dynamic nature of mobile ad hoc networks results in frequent changes and unpredictability in network topologies, adds difficult and complexity to routing among the nodes.Those complexity and importence of routin make the routing are most active The primary objactive of routing proticols us to correnct and efficent route establishment between a pair of nodes so that message may be delivered reliably and in a timely manner. Route contructionsould be dome with minimum overhead bandwidth consumption. Existing distance-vector and link-state-based routing protocols are designed for static enviourments, resulting in degradation in performance, including slow route static enviourment,
  9. a proactive protocol that works on the principles of distance vectors.Its basically a extension of RIP protocol. where each node in a network maintains a distance table that contains the shortestdistance and the address of the next hop router.When a change occurs in the network,each node updates its directly connected neighbours to the least cost distancevector. This process continues until convergence.Addition to the