Manet
Upcoming SlideShare
Loading in...5
×
 

Manet

on

  • 3,469 views

 

Statistics

Views

Total Views
3,469
Views on SlideShare
3,469
Embed Views
0

Actions

Likes
3
Downloads
294
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Manet Manet Presentation Transcript

  • Mobile Ad-Hoc Networks(MANET) SEMINAR BY Vinit pareek B.TECH(ECE-8 th sem.) FINAL YEAR(S.B.C.E.T)
  • Organization
    • Introduction to Mobile Ad hoc networks (MANETs)
    • Routing in MANETs
    • Virtual Backbone Routing
    • Security
    • Performance measures
  • Introducing MANETs
    • Cellular Networks
        • Infrastructure dependent
        • High setup costs
        • Large setup time
        • Reliable
        • MANETs
        • (RFC2051 of IETF)
        • No infrastructure is used
        • Fast setup
        • Flexible and dynamic
  • Applications of MANETs
    • Some motivating applications:
    • Casual conferencing
        • low set-up time, cost preferred
    • Battlefield operations/disaster relief
        • infrastructure unavailable
    • Personal area networking
        • devices around the home/office
    • Cellular networks are not preferred.
  • Mobile Ad hoc Networks
        • First ad-hoc network was dev. By ARPA called “Packet
        • Radio Networks” had 138 mobile nodes.
        • multi-hop routes between nodes.
  • Characteristics of MANETs
        • Dynamic topology
          • links formed and broken with mobility
        • uni-directional links and bi-directional links
        • Constrained resources
          • battery power
          • wireless transmitter range
        • Network partitions
    A B A B
  • Dynamic Source Routing (DSR)
    • Routing is through source routing
      • complete path with each packet
    • Route discovery
      • flooding RREQ till a node replies
    • Route maintainance
      • explicit link breakage notification
      • Mobility of a node can break routes passing through it.
  • Route Discovery
    • A route between two nodes is found by sending an Route Request
    • Route Request builds a source route on every path through the network
    • First Route Request to arrive is accepted; target responds on that path and tells initiator what the source route is
    • Source route is used on subsequent data traffic
    B H I J G F E D A C K Detected Source Route: (A, B, F, J, K)
  • Destination Sequenced Distance Vector (DSDV)
    • Modified Distance Vector protocol
      • periodic DV updates
    • High frequency of DV updates
      • topology is dynamic
    • Does not scale well
      • size of DV updates increase
      • high routing overheads
  • Clusterhead Gateway Switch Routing (CGSR)
    • A clusterhead is able to control a group of ad-hoc hosts
    • Each node maintains 2 tables:
      • A cluster member table, containing the cluster head for each destination node
      • A DV-routing table, containing the next hop to the destination
  • Clusterhead Gateway Switch Routing (CGSR)
  • Associativity-Based Routing (ABR)
    • Free from loops, deadlock, and packet duplicates, and defines a new routing metric for ad-hoc mobile networks
    • Hello message exchange periodically b/w neighbours
    • With the temporal stability and the associativity table the nodes are able to classify each neighbor link as stable or unstable.
  • Associativity-Based Routing (ABR)
  • Signal Stability Routing (SSR)
    • Based on ABR
    • It selects routes based on signal strength.
    • Can be dynamic or static
    • Advantages: to select strong connection leads to fewer route reconstruction.
    • Drawbacks: long delay since intermediate nodes can’t answer the path (unlike AODV, DSR)
  • Security in MANET
    • Access control
    • Kerberos
    • Cryptographyic schemes
    • Packet retransmission
    • Intrusion Detection System(IDS)
  • Performance Issues
    • Network size
    • Route acqusition time
    • Connectivity
    • Average no. of data transmitted
    • Fraction of sleeping nodes
    • Routing protocol used
  • The Dynamic Virtual Backbone
      • The dynamic virtual backbone is a concept wherein a set of relatively stable routes are formed despite nodes being mobile.
      • a possible way is to abstract mobility through aggregation
  • References
    • Wikipedia.org
    • RFC document of IETF.
    • Mobile Computing By Johan Schillar
  • THANK YOU ALL