SlideShare a Scribd company logo
1 of 14
Mobile Adhoc Networks(MANETS
Prepared By
Dr.J.Jospin Jeya
Mobile Adhoc Networks(MANETS
• A MANET consists of a number of mobile devices that come
together to form a network as needed, without any support
from any existing Internet infrastructure or any other kind
of fixed stations.
• MANETs are basically peer-to-peer, multihop wireless
networks in which information packets are transmitted in a
store-and-forward manner from a source to an arbitrary
destination, via intermediate nodes
• As nodes move, the connectivity may change based on
relative locations of other nodes.
• The resulting change in the network topology known at the
local level must be passed on to the other nodes so that old
topology information can be updated.
Characteristics of MANETs
• Salient characteristics of ad hoc networks are as follows [13.1]: 1. Dynamic
topologies: Nodes are free to move arbitrarily; thus, the network topology
may change randomly and unpredictably and primarily consists of
bidirectional links. In some cases, where the transmission power of two nodes
is different, a unidirectional link may exist.
2. Bandwidth-constrained and variable capacity links: Wireless links continue
to have significantly lower capacity than infrastructured networks. In addition,
the realized throughput of wireless communications—after accounting for the
effects of multiple access, fading, noise, interference conditions, and so on— is
often much less than a radio’s maximum transmission rate. One effect of
relatively low to moderate link capacities is that congestion is typically the norm
rather than the exception (i.e., aggregate application demand could likely
approach or exceed network capacity frequently). As a MANET is often simply
an extension of the fixed network infrastructure, mobile ad hoc users would
demand similar services.
3. Energy-constrained operation: Some or all of the MSs in a MANET may
rely on batteries or other exhaustible means for their energy. For these
nodes, the most important system design optimization criteria may be
energy conservation.
4. Limited physical security: MANETs are generally more prone to physical
security threats than wireline networks. The increased possibility of
eavesdropping, spoofing, and denial of service (DoS) attacks should be carefully
considered. To reduce security threats, many existing link security techniques are
often applied within wireless networks. As a side benefit, the decentralized nature
of MANET control provides additional robustness against the single points of
failure of centralized approaches. In addition, some envisioned networks (e.g.,
mobile military networks or highway networks) may be very large (e.g., tens or
hundreds of nodes per routing area). Scalability is a serious concern in MANETs.
Routing
• Routing in a MANET depends on many factors,
including modeling of the topology, selection of
routers, initiation of a route request, and specific
underlying characteristics that could serve as heuristics
in finding the path efficiently.
• The low resource availability in MANETs necessitates
efficient resource utilization; hence the motivation for
optimal routing.
• Also, the highly dynamic nature of these networks
places severe restrictions on any routing protocol
specifically designed for them. A network configuration
is also called a network topology.
• There are three major goals when selecting a routing protocol: 1.
Provide the maximum possible reliability by selecting alternative
routes if a node connectivity fails.
2. Route network traffic through the path with least cost by minimizing
the actual length between the source and destination through use of
the lowest number of intermediate nodes.
3. Give the nodes the best possible response time and throughput.
This is especially important for interactive sessions between user
applications.
In a MANET, each node is expected to serve as a router, and each
router is
indistinguishable from another in the sense that all routers execute the
same routing algorithm to compute routing paths through the entire
network.
Need for Routing
• MANET routing typically has the following goals:
1. Route computation must be distributed, because centralized routing in a
dynamic network is impossible, even for fairly small networks. 2. Route
computation should not involve maintenance of a global state, or even
significant amounts of volatile nonlocal state. In particular, link state routing is
not feasible due to the enormous state propagation overhead when the network
topology changes.
3. As few nodes as possible must be involved in route computation and state
propagation, as this involves monitoring and updating at least some states in
the network. On the other hand, every host must have quick access to the
routes on demand.
4. Each node must care only about the routes to its destination and must not be
involved in frequent topology updates for those portions of the network that
have no traffic.
5. Stale routes must be either avoided or detected and eliminated
quickly.
6. Broadcasts must be avoided as much as possible, because
broadcasts can be time consuming for MANETs [13.1]. The simpler
function of multicasting is observed to be even more complex than
uncontrolled broadcasting [13.1].
7. If the topology stabilizes, then routes must converge to the optimal
routes.
8. It is desirable to have a backup route when the primary route has
become stale and is to be recomputed.
• One of the major challenges in designing a routing protocol [13.3]
for MANETs stems from the fact that, on the one hand, a node
needs to know at least the reachability information to its neighbors
for determining a packet route; on the otherhand, in a MANET, the
network topology can change very frequently.
Routing Classification
• Existing routing protocols can be classified either as proactive or reactive . • Proactive
protocols attempt to evaluate continuously the routes within the network, so that
when a packet needs to be forwarded, the route is already known and can be
immediately used.
• The family of distance vector protocols is an example of a proactive scheme.
Reactive protocols, on the other hand, invoke a route determination procedure
only on demand.
• Thus, when a route is needed, some sort of global search procedure is initiated. •
The family of classical flooding algorithms belongs to the reactive group. Examples of
reactive (also called on-demand) ad hoc network routing protocols include ad hoc
on-demand distance vector (AODV) and temporally ordered routing algorithm (TORA)
The advantage of the proactive schemes is that whenever a route is needed, there is
negligible delay in determining the route. In reactive protocols, because route
information may not be available at the time a datagram is received, the delay to
determine a route can be significant.
Ad Hoc On-Demand Distance Vector
Routing
• Ad hoc on-demand distance vector (AODV)
routing is built over the DSDV algorithm • AODV is a
significant improvement over DSDV. AODV is a
pure on-demand route acquisition algorithm. The
nodes that are not on a particular path do not
maintain routing information, nor do they
participate in the routing table exchanges. • As a
result, the number of broadcasts required to
create the routes on demand via AODV is
minimized rather than doing broadcasts to
maintain complete route information in DSDV.
• When a source needs to send a message to a destination and does not
have a valid route to the latter, the source initiates a route discovery
process.
• Source sends a route request (RREQ) packet to all its neighbors, the latter
forward the request to all their neighbors, and so on, until either the
destination or an intermediate node with a “fresh enough” route to the
destination is reached.Figure illustrates the propagation of the broadcast
RREQs across the network.
• Each node has a unique sequence number and a broadcast ID, which is
incremented each time the node initiates a RREQ.
• The broadcast ID, together with the node’s IP address, uniquely identifies
every RREQ. The initiator node includes in the RREQ the following: • Its own
sequence number
• The broadcast ID
• The most recent sequence number the initiator has for the destination
• Intermediate nodes reply only if they have a route to the
destination with a sequence number greater than or at
least equal to that contained in the RREQ.
• To optimize the route performance, intermediate nodes
record the address of the neighbor from which they receive
the first copy of the broadcast packet.
• This establishes the best reverse path. All subsequently
received copies of the RREQ are discarded.
• Once the RREQ reaches the destination or an intermediate
node with a fresh enough route to the destination, the
intermediate/destination node sends a unicast route-reply
(RREP) message back to the neighbor from which it
received the first copy of the RREQ
• As the RREP travels back on the reverse path, the
nodes on this path set up their forward route
entries to point to the node from which the RREP
has just been received.
• These forward route entries indicate the active
forward route.
• The RREP continues traveling back along the
reverse path till it reaches the initiator of the
route discovery. Thus, AODV can support only the
use of symmetric links.
• A route timer is associated with each route entry. This
timer triggers the deletion of the route entry if it is not
used within the specified lifetime.
• When a source node moves, it can reinitiate the route
discovery procedure to find new routes to the destination. •
If the nodes along the route move, their upstream neighbors
(nodes justbefore them enroute from source to destination)
notice the movement and propagate a link failure notification
to their own active upstream neighbors, and so on until the
source node is reached.
• A link failure notification is essentially a ROUTE ERROR with
infinite metric.
• The source node can now choose to reinitiate the route-discovery
procedure if a route to that destination is still desired. • Another
protocol followed in route maintenance is the use of hello messages,
periodic local broadcasts by a node to inform other nodes in its
neighborhood of its presence.
• Hello messages ensure local connectivity. Nodes listen for
retransmission of data packets to make certain that the next hop is
still within reach.
• If such a retransmission is not heard, a variety of techniques may be
used for recouping the path.
• One such method is the reception of hello messages to determine
whether the next hop is within the communication range. • The
hello messages may also list other nodes from which a node has
heard, thereby relaying more information about network
connectivity.

More Related Content

Similar to manet.pdf

Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocolsmita gupta
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Sitamarhi Institute of Technology
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxkapss043
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)inventionjournals
 

Similar to manet.pdf (20)

Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
 
unit-4
unit-4 unit-4
unit-4
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Br31467472
Br31467472Br31467472
Br31467472
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptx
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)
 

More from JJospinJeya

More from JJospinJeya (9)

GPRS.pdf
GPRS.pdfGPRS.pdf
GPRS.pdf
 
bluetooth protocol stack.pptx
bluetooth protocol stack.pptxbluetooth protocol stack.pptx
bluetooth protocol stack.pptx
 
cell splitting.ppt
cell splitting.pptcell splitting.ppt
cell splitting.ppt
 
co channel.ppt
co channel.pptco channel.ppt
co channel.ppt
 
cell area.ppt
cell area.pptcell area.ppt
cell area.ppt
 
Bluetooth(1).ppt
Bluetooth(1).pptBluetooth(1).ppt
Bluetooth(1).ppt
 
DSSS.pdf
DSSS.pdfDSSS.pdf
DSSS.pdf
 
ss2.pdf
ss2.pdfss2.pdf
ss2.pdf
 
ss1.pdf
ss1.pdfss1.pdf
ss1.pdf
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 

manet.pdf

  • 2. Mobile Adhoc Networks(MANETS • A MANET consists of a number of mobile devices that come together to form a network as needed, without any support from any existing Internet infrastructure or any other kind of fixed stations. • MANETs are basically peer-to-peer, multihop wireless
  • 3. networks in which information packets are transmitted in a store-and-forward manner from a source to an arbitrary destination, via intermediate nodes • As nodes move, the connectivity may change based on relative locations of other nodes. • The resulting change in the network topology known at the local level must be passed on to the other nodes so that old topology information can be updated. Characteristics of MANETs
  • 4. • Salient characteristics of ad hoc networks are as follows [13.1]: 1. Dynamic topologies: Nodes are free to move arbitrarily; thus, the network topology may change randomly and unpredictably and primarily consists of bidirectional links. In some cases, where the transmission power of two nodes is different, a unidirectional link may exist. 2. Bandwidth-constrained and variable capacity links: Wireless links continue to have significantly lower capacity than infrastructured networks. In addition, the realized throughput of wireless communications—after accounting for the effects of multiple access, fading, noise, interference conditions, and so on— is often much less than a radio’s maximum transmission rate. One effect of relatively low to moderate link capacities is that congestion is typically the norm rather than the exception (i.e., aggregate application demand could likely approach or exceed network capacity frequently). As a MANET is often simply an extension of the fixed network infrastructure, mobile ad hoc users would demand similar services. 3. Energy-constrained operation: Some or all of the MSs in a MANET may rely on batteries or other exhaustible means for their energy. For these nodes, the most important system design optimization criteria may be energy conservation. 4. Limited physical security: MANETs are generally more prone to physical security threats than wireline networks. The increased possibility of eavesdropping, spoofing, and denial of service (DoS) attacks should be carefully
  • 5. considered. To reduce security threats, many existing link security techniques are often applied within wireless networks. As a side benefit, the decentralized nature of MANET control provides additional robustness against the single points of failure of centralized approaches. In addition, some envisioned networks (e.g., mobile military networks or highway networks) may be very large (e.g., tens or hundreds of nodes per routing area). Scalability is a serious concern in MANETs. Routing • Routing in a MANET depends on many factors, including modeling of the topology, selection of routers, initiation of a route request, and specific underlying characteristics that could serve as heuristics in finding the path efficiently. • The low resource availability in MANETs necessitates efficient resource utilization; hence the motivation for optimal routing. • Also, the highly dynamic nature of these networks
  • 6. places severe restrictions on any routing protocol specifically designed for them. A network configuration is also called a network topology. • There are three major goals when selecting a routing protocol: 1. Provide the maximum possible reliability by selecting alternative routes if a node connectivity fails. 2. Route network traffic through the path with least cost by minimizing the actual length between the source and destination through use of the lowest number of intermediate nodes. 3. Give the nodes the best possible response time and throughput. This is especially important for interactive sessions between user applications. In a MANET, each node is expected to serve as a router, and each router is indistinguishable from another in the sense that all routers execute the same routing algorithm to compute routing paths through the entire network.
  • 7. Need for Routing • MANET routing typically has the following goals: 1. Route computation must be distributed, because centralized routing in a dynamic network is impossible, even for fairly small networks. 2. Route computation should not involve maintenance of a global state, or even significant amounts of volatile nonlocal state. In particular, link state routing is not feasible due to the enormous state propagation overhead when the network topology changes. 3. As few nodes as possible must be involved in route computation and state propagation, as this involves monitoring and updating at least some states in the network. On the other hand, every host must have quick access to the routes on demand. 4. Each node must care only about the routes to its destination and must not be involved in frequent topology updates for those portions of the network that have no traffic. 5. Stale routes must be either avoided or detected and eliminated quickly. 6. Broadcasts must be avoided as much as possible, because
  • 8. broadcasts can be time consuming for MANETs [13.1]. The simpler function of multicasting is observed to be even more complex than uncontrolled broadcasting [13.1]. 7. If the topology stabilizes, then routes must converge to the optimal routes. 8. It is desirable to have a backup route when the primary route has become stale and is to be recomputed. • One of the major challenges in designing a routing protocol [13.3] for MANETs stems from the fact that, on the one hand, a node needs to know at least the reachability information to its neighbors for determining a packet route; on the otherhand, in a MANET, the network topology can change very frequently. Routing Classification • Existing routing protocols can be classified either as proactive or reactive . • Proactive protocols attempt to evaluate continuously the routes within the network, so that when a packet needs to be forwarded, the route is already known and can be immediately used.
  • 9. • The family of distance vector protocols is an example of a proactive scheme. Reactive protocols, on the other hand, invoke a route determination procedure only on demand. • Thus, when a route is needed, some sort of global search procedure is initiated. • The family of classical flooding algorithms belongs to the reactive group. Examples of reactive (also called on-demand) ad hoc network routing protocols include ad hoc on-demand distance vector (AODV) and temporally ordered routing algorithm (TORA) The advantage of the proactive schemes is that whenever a route is needed, there is negligible delay in determining the route. In reactive protocols, because route information may not be available at the time a datagram is received, the delay to determine a route can be significant. Ad Hoc On-Demand Distance Vector Routing • Ad hoc on-demand distance vector (AODV) routing is built over the DSDV algorithm • AODV is a significant improvement over DSDV. AODV is a pure on-demand route acquisition algorithm. The
  • 10. nodes that are not on a particular path do not maintain routing information, nor do they participate in the routing table exchanges. • As a result, the number of broadcasts required to create the routes on demand via AODV is minimized rather than doing broadcasts to maintain complete route information in DSDV. • When a source needs to send a message to a destination and does not have a valid route to the latter, the source initiates a route discovery process. • Source sends a route request (RREQ) packet to all its neighbors, the latter forward the request to all their neighbors, and so on, until either the destination or an intermediate node with a “fresh enough” route to the destination is reached.Figure illustrates the propagation of the broadcast RREQs across the network. • Each node has a unique sequence number and a broadcast ID, which is incremented each time the node initiates a RREQ.
  • 11. • The broadcast ID, together with the node’s IP address, uniquely identifies every RREQ. The initiator node includes in the RREQ the following: • Its own sequence number • The broadcast ID • The most recent sequence number the initiator has for the destination • Intermediate nodes reply only if they have a route to the destination with a sequence number greater than or at least equal to that contained in the RREQ.
  • 12. • To optimize the route performance, intermediate nodes record the address of the neighbor from which they receive the first copy of the broadcast packet. • This establishes the best reverse path. All subsequently received copies of the RREQ are discarded. • Once the RREQ reaches the destination or an intermediate node with a fresh enough route to the destination, the intermediate/destination node sends a unicast route-reply (RREP) message back to the neighbor from which it received the first copy of the RREQ • As the RREP travels back on the reverse path, the nodes on this path set up their forward route entries to point to the node from which the RREP has just been received. • These forward route entries indicate the active
  • 13. forward route. • The RREP continues traveling back along the reverse path till it reaches the initiator of the route discovery. Thus, AODV can support only the use of symmetric links. • A route timer is associated with each route entry. This timer triggers the deletion of the route entry if it is not used within the specified lifetime. • When a source node moves, it can reinitiate the route discovery procedure to find new routes to the destination. • If the nodes along the route move, their upstream neighbors (nodes justbefore them enroute from source to destination) notice the movement and propagate a link failure notification to their own active upstream neighbors, and so on until the source node is reached.
  • 14. • A link failure notification is essentially a ROUTE ERROR with infinite metric. • The source node can now choose to reinitiate the route-discovery procedure if a route to that destination is still desired. • Another protocol followed in route maintenance is the use of hello messages, periodic local broadcasts by a node to inform other nodes in its neighborhood of its presence. • Hello messages ensure local connectivity. Nodes listen for retransmission of data packets to make certain that the next hop is still within reach. • If such a retransmission is not heard, a variety of techniques may be used for recouping the path. • One such method is the reception of hello messages to determine whether the next hop is within the communication range. • The hello messages may also list other nodes from which a node has heard, thereby relaying more information about network connectivity.