SlideShare a Scribd company logo
1 of 6
MANET
(Mobile Ad-Hoc Network)
and
Routing Techniques and Protocols
How To Drop Unwanted Weight Super Fast! (MGID)
AUTHORS: Saptarshi Bhadra
Soumyadeep Ghosh
IntroductionRecent trends in wireless communications have expanded possible applications from simple voice
services in early cellular networks (firstand second generation,1Gand 2G) to new integrated data applications.4G
technologyis now new promising application ofmobile technology.It is basicallynew generation ofmobile devices.
Fig 1. Mobile ad-hoc network
In a MANET, the router connectivity may change frequently, leading to the multi-hop communication paradigm that
can allow communication withoutthe use of BS/AP, and provide alternative connections inside hotspotcells.A dual-
mode MS can operate in both the infrastructure (communicating directlyto a BS or AP) and MANET modes using the
WLAN interface. A MANET is a type of ad hoc network that can change locations and configure itselfon the fly. All
nodes in this network are mobile and they use wireless connections to communicate with various networks
Routing is one of the core problems ofnetworking for delivering data from one node to the other. Wireless ad-hoc
networks are also called Mobile ad-hoc multihop networks withoutpredetermined topologyor central control. This is
because MANETs can be characterized as having a dynamic,multihop,potentiallyrapid changing topology. The aim
of such networks is to provide communication capabilities to areas with limited or no existing communication
infrastructures.A MANET is usuallyformed by mobile nodes using wireless communications.It uses a peer-to-peer
multihop routing instead ofa static network infrastructure to provide network connectivity.
Some salientcharacteristics ofMANETs are:-
1. Dynamic topologies, 2.)Bandwidth constrained,variable capacitylinks,
3.) Energy constrained operation,and 4.) Limited physical security.
MANET has been a popular topic of research in recentyears with the advent and growth of wireless technology.Two
popular types of MANET are (i) VANET (Vehicular Ad-hoc network) and (ii) iMANET (Internet based ad-hoc
networks).
Several routing protocols have been suggested and used for MANET. Dynamic Source Routing (DSR), Ad Hoc On -
Demand DistanceVector Routing (AODV) and Destination Sequenced Distance-Vector (DSDV) have been
implemented.
There are several ways to study MANETs. One solution is the use of simulation tools like OPNET,NetSim and NS2.
Ns is a discrete event simulator targeted atnetworking research.Ns provides substantial supportfor simulation of
TCP, routing,and multicastprotocols over wired and wireless (local and satellite) networks.The core of ns-2 is also
written in C++, but the C++ simulation objects are linked to shadow objects in OTcl and variables can be linked
between both language realms.Simulation scripts are written in the OTcl language,an extension of the Tcl scripting
language.This structure permits simulations to be written and modified in an interpreted environmentwithouthaving
to resortto recompiling the simulator each time a structural change is made.
The general process ofcreating a simulation can be divided into several steps:-
1. Topology definition:- To ease the creation of basic facilities and define their interrelationships,ns -3 has a system of
containers and helpers thatfacilitates this process.
2. Model usage:- Models are added to simulation (for example,UDP,IPv4, point-to-pointdevices and links,
applications);mostofthe time this is done using helpers.
3. Node and link configuration:- Models settheir default values (for example,the size of packets sentby an application
or MTU of a point-to-pointlink);mostof the time this is done using the attribute system.
4. Execution:- Simulation facilities generate events,data requested by the user is logged.
5. Performance analysis:- After the simulation is finished and data is available as a time-stamped eventtrace. This
data can then be statisticallyanalysed with tools like R to draw conclusions.
6. Graphical Visualization:- Raw or processed data collected in a simulation can be graphed using tools
like Gnuplot, matplotlib or Xgraph. Xgraph is the plotting tool bundled with manyof the installation packages.
Comparative Study
Routing protocols for MANETs can be broadly classified[3]into three main categories:-
1.) Proactive routing protocols:- Every node in the network has one or more routes to any possible destination in its
routing table at any given time.
2.) Reactive routing protocols:-Every node in the network obtains a route to a destination on a demand fashion.
Reactive protocols do not maintain up-to-date routes to any destination in the network and do not generallyexchange
any periodic control messages.
3.) Hybrid routing protocols:-Every node acts reactively in the region close to its proximity and proactively outside of
that region,or zone.
Fig 1. Classification of routing protocols in mobile ad-hoc network.
Some Routing Algorithms in MANETS [7] :-
1. Ad Hoc On-Demand Distance Vector Routing (AODV) – uses traditional routing tables,one entry per
destination.This is in contrastto DSR, which can maintain multiple route cache entries for each destination.
Without source routing,AODV relies on routing table entries to propagate an RREP back to the source and,
subsequently,to route data packets to the destination.AODV uses sequence numbers maintained ateach
destination to determine freshness ofrouting information and to prevent routing loops.All routing packets carry
these sequence numbers.
2. Destination-Sequenced Distance Vector (DSDV)- The firstMANET algorithm thatwe implemented as partof this
work is called the Destination-Sequenced Distance Vector (DSDV) routing algorithm.It is a proactive routing
algorithm.The DSDV algorithm is a Distance Vector (DV) based routing algorithm designed for use in MANETs,
which are defined as the cooperative engagementofa collection ofMobile Hosts withoutthe required intervention
of any centralised Access Point(AP).
It operates each node as a specialised router which periodicallyadvertises its knowledge ofthe network with the
other nodes in the network. It makes modifications to the basic Bellman-Ford routing algorithms,therebydoing away
with the count-to-infinityproblem.The algorithm is designed for portable computing devices such as laptops who
have energy and processing capabilities far beyond that of a typical WSN node.
1. Dynamic Source Routing (DSR)- It is a routing protocol for wireless mesh networks.It is similar to AODV in that it
forms a route on-demand when a transmitting computer requests one.However,it uses source routing instead of
relying on the routing table at each intermediate device.This protocol is truly based on source routing wherebyall
the routing information is maintained (continuallyupdated) atmobile nodes.It has only two major phases,which are
Route Discovery and Route Maintenance. Route Reply would only be generated ifthe message has reached the
intended destination node (route record which is initiallycontained in Route Requestwould be inserted into the
Route Reply). Therefore,it is an on-demand protocol designed to restrictthe bandwidth consumed bycontrol
packets in ad hoc wireless networks byeliminating the periodic table-update messages required in the table-driven
approach.The major difference between this and the other on-demand routing protocols is thatit is beacon-less
and hence does not require periodic hello packet(beacon) transmissions,which are used by a node to inform its
neighbors ofits presence.The basic approach ofthis protocol (and all other on-demand routing protocols) during
the route construction phase is to establish a route by flooding RouteRequestpackets in the network.The
destination node,on receiving a RouteRequestpacket,responds bysending a RouteReplypacketback to the
source,which carries the route traversed by the RouteRequestpacketreceived.
Related Work
Survey of applications of MANET [5]- We shall now get an overview of different types of MANET and their uses.
1. Pure general purpose MANET
The mostlydiscussed application scenario for pure general-purpose MANET is Battlefield or disaster-recovery
networks.However, these kinds ofnetworks have not yet achieved the envisaged impactin terms ofreal world
implementation and industrial deployment.
1. Mesh networks
Mesh networks are builtupon a mix of fixed and mobile nodes interconnected via wireless links to form a multihop ad
hoc network.Unlike pure MANETs, a mesh network introduces a hierarchyin the network architecture by adding
dedicated nodes (called mesh routers) thatcommunicate wirelesslyto constructa wireless backbone.An example is
MIT Roofnetproviding the city of Boston,with broadband access with an 802.11b-based wireless network backbone
infrastructure.
1. Opportunistic Networking (Delay Tolerant Networking)
(i)PocketSwitched Networks in the Haggle Project
It targets solutions for communication in autonomic/opportunistic networks.In this framework,researchers are
studying the properties ofPocket Switched Networks (PSNs),i.e., opportunistic networks thatcan exploit any
possible encountered device (e.g., cell phones and PDAs that users carry in their pockets) to forward messages.
(ii)Wildlife monitoring
Wildlife monitoring is an interesting application field for opportunistic networks.Itfocuses on tracking wild species to
deeply investigate their behavior and understand the interactions and influences on each other,as well as their
reaction to the ecosystem changes caused byhuman activities.
1. Vehicular ad hoc networks
VANETs use ad hoc communications for performing efficientdriver assistance and car safety. The communications
include data from the roadside and from other cars. VANET research aims to supplydrivers with information
regarding obstacles on the road and emergencyevents,mainlydue to line-of-sightlimitations and large processing
delays.VANET can be used to communicate premonitions,notification ofemergencies,and warnings abouttraffic
conditions.
1. Wireless sensor networks (WSN)
WSN benefit from the advances in computing technology,which led to the production ofsmall,wireless,battery
powered,smartsensor nodes.These nodes are active devices with computing and communication capabilities that
not only sample real world phenomena butalso can filter,share,combine,and operate on the data they sense.
Conclusion
This paper discusses the various aspects ofmobile ad-hoc networking,the differentrouting protocols used for
wireless sensor networks and the NS-2 network simulator.Also,we compared DSDVand AODV routing protocols
for ad hoc networks using ns-2 simulations.DSDVuses the proactive table-driven routing strategy while AODV uses
the reactive On-demand routing strategy. AODV performs better under high mobilitysimulations than DSDV. High
mobilityresults in frequentlink failures and the overhead involved in updating all the nodes with the new routing
information as in DSDV is much more than that involved AODV, where the routes are created as and when required.
AODV uses on -demand route discovery, but with different routing mechanics. AODV uses routing tables,one route
per destination,and destination sequence numbers,a mechanism to preventloops and to determine freshness of
routes.There are still many challenges facing wireless ad hoc networks.However because ofthese advantages,
wireless ad hoc networks are becoming more and more prevalentin the world.
References
[1] www.wikipedia.com
[2]www.ucmss.com
[3] Routing techniques for Mobile Ad Hoc Networks Classification and Qualitative/Quantitative Analysis, by Mr.
Ankur Khetrapal,Delhi University.
[4] Characterisation and Applications ofMANET,Routing Algorithms in Wireless Sensor Networks ,bySiddhu Warrier.
[5] A Survey on the Applications of MANET, by Jiazi YI,Polytech’Nantes .
[6] An Overview of Mobile Ad Hoc Networks:Applications and Challenges,by Jeroen Hoebeke,Ingrid Moerman,Bart
Dhoedtand Piet Demeester
[7] Performance Evaluation ofAd Hoc Routing Protocols Using NS2 Simulation, by Samyak Shah, Amit Khandre,
Mahesh Shirole and Girish Bhole
[8] Routing Protocols in Mobile Ad-hoc Networks,by Krishna Gorantala.
[9] An Efficient Scheme for MANET Domain Formation (ESMDF) by Adwan AbdelFattah.
[10] An Improved Approach for Working outside the MANET by Extending MANET Routing Protocol,by Rashween
Kaur Saluja.

More Related Content

What's hot

Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...INFOGAIN PUBLICATION
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
 
Chapter 5 2 marks for PG PAWSN
Chapter 5 2 marks for PG PAWSNChapter 5 2 marks for PG PAWSN
Chapter 5 2 marks for PG PAWSNDhaya kanthavel
 
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...IRJET Journal
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorialtritv
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessAlexander Decker
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologiesshashi712
 
Design of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection NetworkDesign of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection NetworkIJMTST Journal
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETIOSRJECE
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 

What's hot (18)

Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...
 
Mane ts
Mane tsMane ts
Mane ts
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
Chapter 5 2 marks for PG PAWSN
Chapter 5 2 marks for PG PAWSNChapter 5 2 marks for PG PAWSN
Chapter 5 2 marks for PG PAWSN
 
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorial
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wireless
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologies
 
Design of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection NetworkDesign of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection Network
 
J0935461
J0935461J0935461
J0935461
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANET
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
E1073644
E1073644E1073644
E1073644
 

Viewers also liked

How To Use TV Advertising To Produce (and Reduce) Profit, David Poltrack
How To Use TV Advertising To Produce (and Reduce) Profit, David PoltrackHow To Use TV Advertising To Produce (and Reduce) Profit, David Poltrack
How To Use TV Advertising To Produce (and Reduce) Profit, David PoltrackSimulmedia, Inc.
 
Vicb qt-10 procedure-for_qms_audit_checked_-_translation_0
Vicb qt-10 procedure-for_qms_audit_checked_-_translation_0Vicb qt-10 procedure-for_qms_audit_checked_-_translation_0
Vicb qt-10 procedure-for_qms_audit_checked_-_translation_0Hung Nguyen
 
The Ninefold Path to Marketing Transformation, Bill Harvey
The Ninefold Path to Marketing Transformation, Bill HarveyThe Ninefold Path to Marketing Transformation, Bill Harvey
The Ninefold Path to Marketing Transformation, Bill HarveySimulmedia, Inc.
 
THE ART OF NON SURGICAL SKIN REJUVENATION
THE ART OF NON SURGICAL SKIN REJUVENATIONTHE ART OF NON SURGICAL SKIN REJUVENATION
THE ART OF NON SURGICAL SKIN REJUVENATIONOsama Moawad
 
BOTOX.ADVANCED COURSE.PART ONE. WHAT YOU SHOULD KNOW ABOUT IT?
BOTOX.ADVANCED COURSE.PART ONE. WHAT YOU SHOULD KNOW ABOUT IT?BOTOX.ADVANCED COURSE.PART ONE. WHAT YOU SHOULD KNOW ABOUT IT?
BOTOX.ADVANCED COURSE.PART ONE. WHAT YOU SHOULD KNOW ABOUT IT?Osama Moawad
 
Msi skin resurfacing (rejuvenating) peel
Msi skin resurfacing (rejuvenating) peelMsi skin resurfacing (rejuvenating) peel
Msi skin resurfacing (rejuvenating) peelOsama Moawad
 
LASER TATTOO REMOVAL. THE SAVIOR
LASER TATTOO REMOVAL. THE SAVIORLASER TATTOO REMOVAL. THE SAVIOR
LASER TATTOO REMOVAL. THE SAVIOROsama Moawad
 
ADVANCED BOTOX COURSE.PART II. HOW TO INJECT BOTOX SAFELY?
ADVANCED BOTOX COURSE.PART II. HOW TO INJECT BOTOX SAFELY?ADVANCED BOTOX COURSE.PART II. HOW TO INJECT BOTOX SAFELY?
ADVANCED BOTOX COURSE.PART II. HOW TO INJECT BOTOX SAFELY?Osama Moawad
 
THE ART OF NON SURGICAL SKIN REJUVENATION. MULTIPLE APPROACHES
THE ART OF NON SURGICAL SKIN REJUVENATION. MULTIPLE APPROACHESTHE ART OF NON SURGICAL SKIN REJUVENATION. MULTIPLE APPROACHES
THE ART OF NON SURGICAL SKIN REJUVENATION. MULTIPLE APPROACHESOsama Moawad
 
Heat in skin rejuvenation. Light, Laser, Radiofrequency
Heat in skin rejuvenation. Light, Laser, RadiofrequencyHeat in skin rejuvenation. Light, Laser, Radiofrequency
Heat in skin rejuvenation. Light, Laser, RadiofrequencyOsama Moawad
 
Laser Hair removal. Is it Permanent?
Laser Hair removal. Is it Permanent?Laser Hair removal. Is it Permanent?
Laser Hair removal. Is it Permanent?Osama Moawad
 
Radiofrequency. a new tool for non surgical skin tightening
Radiofrequency. a new tool for  non surgical skin tighteningRadiofrequency. a new tool for  non surgical skin tightening
Radiofrequency. a new tool for non surgical skin tighteningOsama Moawad
 
Acne Treatment. What is New?
Acne Treatment. What is New?Acne Treatment. What is New?
Acne Treatment. What is New?Osama Moawad
 
The Art of Liquid Face Lift (Botox)
The Art of Liquid Face Lift (Botox)The Art of Liquid Face Lift (Botox)
The Art of Liquid Face Lift (Botox)Osama Moawad
 
The Art of Liquid Face Lift (Dermal Fillers)
The Art of Liquid Face Lift (Dermal Fillers)The Art of Liquid Face Lift (Dermal Fillers)
The Art of Liquid Face Lift (Dermal Fillers)Osama Moawad
 

Viewers also liked (18)

Báo cáo PCI năm 2012
Báo cáo PCI năm 2012Báo cáo PCI năm 2012
Báo cáo PCI năm 2012
 
How To Use TV Advertising To Produce (and Reduce) Profit, David Poltrack
How To Use TV Advertising To Produce (and Reduce) Profit, David PoltrackHow To Use TV Advertising To Produce (and Reduce) Profit, David Poltrack
How To Use TV Advertising To Produce (and Reduce) Profit, David Poltrack
 
Vicb qt-10 procedure-for_qms_audit_checked_-_translation_0
Vicb qt-10 procedure-for_qms_audit_checked_-_translation_0Vicb qt-10 procedure-for_qms_audit_checked_-_translation_0
Vicb qt-10 procedure-for_qms_audit_checked_-_translation_0
 
Mark zuckerberg
Mark zuckerbergMark zuckerberg
Mark zuckerberg
 
The Ninefold Path to Marketing Transformation, Bill Harvey
The Ninefold Path to Marketing Transformation, Bill HarveyThe Ninefold Path to Marketing Transformation, Bill Harvey
The Ninefold Path to Marketing Transformation, Bill Harvey
 
THE ART OF NON SURGICAL SKIN REJUVENATION
THE ART OF NON SURGICAL SKIN REJUVENATIONTHE ART OF NON SURGICAL SKIN REJUVENATION
THE ART OF NON SURGICAL SKIN REJUVENATION
 
BOTOX.ADVANCED COURSE.PART ONE. WHAT YOU SHOULD KNOW ABOUT IT?
BOTOX.ADVANCED COURSE.PART ONE. WHAT YOU SHOULD KNOW ABOUT IT?BOTOX.ADVANCED COURSE.PART ONE. WHAT YOU SHOULD KNOW ABOUT IT?
BOTOX.ADVANCED COURSE.PART ONE. WHAT YOU SHOULD KNOW ABOUT IT?
 
Msi skin resurfacing (rejuvenating) peel
Msi skin resurfacing (rejuvenating) peelMsi skin resurfacing (rejuvenating) peel
Msi skin resurfacing (rejuvenating) peel
 
LASER TATTOO REMOVAL. THE SAVIOR
LASER TATTOO REMOVAL. THE SAVIORLASER TATTOO REMOVAL. THE SAVIOR
LASER TATTOO REMOVAL. THE SAVIOR
 
ADVANCED BOTOX COURSE.PART II. HOW TO INJECT BOTOX SAFELY?
ADVANCED BOTOX COURSE.PART II. HOW TO INJECT BOTOX SAFELY?ADVANCED BOTOX COURSE.PART II. HOW TO INJECT BOTOX SAFELY?
ADVANCED BOTOX COURSE.PART II. HOW TO INJECT BOTOX SAFELY?
 
THE ART OF NON SURGICAL SKIN REJUVENATION. MULTIPLE APPROACHES
THE ART OF NON SURGICAL SKIN REJUVENATION. MULTIPLE APPROACHESTHE ART OF NON SURGICAL SKIN REJUVENATION. MULTIPLE APPROACHES
THE ART OF NON SURGICAL SKIN REJUVENATION. MULTIPLE APPROACHES
 
Heat in skin rejuvenation. Light, Laser, Radiofrequency
Heat in skin rejuvenation. Light, Laser, RadiofrequencyHeat in skin rejuvenation. Light, Laser, Radiofrequency
Heat in skin rejuvenation. Light, Laser, Radiofrequency
 
Laser Hair removal. Is it Permanent?
Laser Hair removal. Is it Permanent?Laser Hair removal. Is it Permanent?
Laser Hair removal. Is it Permanent?
 
Radiofrequency. a new tool for non surgical skin tightening
Radiofrequency. a new tool for  non surgical skin tighteningRadiofrequency. a new tool for  non surgical skin tightening
Radiofrequency. a new tool for non surgical skin tightening
 
Acne Treatment. What is New?
Acne Treatment. What is New?Acne Treatment. What is New?
Acne Treatment. What is New?
 
The Art of Liquid Face Lift (Botox)
The Art of Liquid Face Lift (Botox)The Art of Liquid Face Lift (Botox)
The Art of Liquid Face Lift (Botox)
 
The Art of Liquid Face Lift (Dermal Fillers)
The Art of Liquid Face Lift (Dermal Fillers)The Art of Liquid Face Lift (Dermal Fillers)
The Art of Liquid Face Lift (Dermal Fillers)
 
3G basic good
3G basic good3G basic good
3G basic good
 

Similar to Manet algo

Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesIJMER
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Vinish Alikkal
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
Mobile Adhoc Network (MANET) Routing Protocols Analytical StudyMobile Adhoc Network (MANET) Routing Protocols Analytical Study
Mobile Adhoc Network (MANET) Routing Protocols Analytical StudyIOSR Journals
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...acijjournal
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Natasha Barnett
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...ijceronline
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 

Similar to Manet algo (20)

Aodv
AodvAodv
Aodv
 
eaodv
eaodveaodv
eaodv
 
Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering Techniques
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
Mobile Adhoc Network (MANET) Routing Protocols Analytical StudyMobile Adhoc Network (MANET) Routing Protocols Analytical Study
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 

Recently uploaded

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 

Manet algo

  • 1. MANET (Mobile Ad-Hoc Network) and Routing Techniques and Protocols How To Drop Unwanted Weight Super Fast! (MGID) AUTHORS: Saptarshi Bhadra Soumyadeep Ghosh IntroductionRecent trends in wireless communications have expanded possible applications from simple voice services in early cellular networks (firstand second generation,1Gand 2G) to new integrated data applications.4G technologyis now new promising application ofmobile technology.It is basicallynew generation ofmobile devices. Fig 1. Mobile ad-hoc network In a MANET, the router connectivity may change frequently, leading to the multi-hop communication paradigm that can allow communication withoutthe use of BS/AP, and provide alternative connections inside hotspotcells.A dual- mode MS can operate in both the infrastructure (communicating directlyto a BS or AP) and MANET modes using the WLAN interface. A MANET is a type of ad hoc network that can change locations and configure itselfon the fly. All nodes in this network are mobile and they use wireless connections to communicate with various networks Routing is one of the core problems ofnetworking for delivering data from one node to the other. Wireless ad-hoc networks are also called Mobile ad-hoc multihop networks withoutpredetermined topologyor central control. This is because MANETs can be characterized as having a dynamic,multihop,potentiallyrapid changing topology. The aim of such networks is to provide communication capabilities to areas with limited or no existing communication
  • 2. infrastructures.A MANET is usuallyformed by mobile nodes using wireless communications.It uses a peer-to-peer multihop routing instead ofa static network infrastructure to provide network connectivity. Some salientcharacteristics ofMANETs are:- 1. Dynamic topologies, 2.)Bandwidth constrained,variable capacitylinks, 3.) Energy constrained operation,and 4.) Limited physical security. MANET has been a popular topic of research in recentyears with the advent and growth of wireless technology.Two popular types of MANET are (i) VANET (Vehicular Ad-hoc network) and (ii) iMANET (Internet based ad-hoc networks). Several routing protocols have been suggested and used for MANET. Dynamic Source Routing (DSR), Ad Hoc On - Demand DistanceVector Routing (AODV) and Destination Sequenced Distance-Vector (DSDV) have been implemented. There are several ways to study MANETs. One solution is the use of simulation tools like OPNET,NetSim and NS2. Ns is a discrete event simulator targeted atnetworking research.Ns provides substantial supportfor simulation of TCP, routing,and multicastprotocols over wired and wireless (local and satellite) networks.The core of ns-2 is also written in C++, but the C++ simulation objects are linked to shadow objects in OTcl and variables can be linked between both language realms.Simulation scripts are written in the OTcl language,an extension of the Tcl scripting language.This structure permits simulations to be written and modified in an interpreted environmentwithouthaving to resortto recompiling the simulator each time a structural change is made. The general process ofcreating a simulation can be divided into several steps:- 1. Topology definition:- To ease the creation of basic facilities and define their interrelationships,ns -3 has a system of containers and helpers thatfacilitates this process. 2. Model usage:- Models are added to simulation (for example,UDP,IPv4, point-to-pointdevices and links, applications);mostofthe time this is done using helpers. 3. Node and link configuration:- Models settheir default values (for example,the size of packets sentby an application or MTU of a point-to-pointlink);mostof the time this is done using the attribute system. 4. Execution:- Simulation facilities generate events,data requested by the user is logged. 5. Performance analysis:- After the simulation is finished and data is available as a time-stamped eventtrace. This data can then be statisticallyanalysed with tools like R to draw conclusions. 6. Graphical Visualization:- Raw or processed data collected in a simulation can be graphed using tools like Gnuplot, matplotlib or Xgraph. Xgraph is the plotting tool bundled with manyof the installation packages. Comparative Study
  • 3. Routing protocols for MANETs can be broadly classified[3]into three main categories:- 1.) Proactive routing protocols:- Every node in the network has one or more routes to any possible destination in its routing table at any given time. 2.) Reactive routing protocols:-Every node in the network obtains a route to a destination on a demand fashion. Reactive protocols do not maintain up-to-date routes to any destination in the network and do not generallyexchange any periodic control messages. 3.) Hybrid routing protocols:-Every node acts reactively in the region close to its proximity and proactively outside of that region,or zone. Fig 1. Classification of routing protocols in mobile ad-hoc network. Some Routing Algorithms in MANETS [7] :- 1. Ad Hoc On-Demand Distance Vector Routing (AODV) – uses traditional routing tables,one entry per destination.This is in contrastto DSR, which can maintain multiple route cache entries for each destination. Without source routing,AODV relies on routing table entries to propagate an RREP back to the source and, subsequently,to route data packets to the destination.AODV uses sequence numbers maintained ateach destination to determine freshness ofrouting information and to prevent routing loops.All routing packets carry these sequence numbers. 2. Destination-Sequenced Distance Vector (DSDV)- The firstMANET algorithm thatwe implemented as partof this work is called the Destination-Sequenced Distance Vector (DSDV) routing algorithm.It is a proactive routing algorithm.The DSDV algorithm is a Distance Vector (DV) based routing algorithm designed for use in MANETs, which are defined as the cooperative engagementofa collection ofMobile Hosts withoutthe required intervention of any centralised Access Point(AP). It operates each node as a specialised router which periodicallyadvertises its knowledge ofthe network with the other nodes in the network. It makes modifications to the basic Bellman-Ford routing algorithms,therebydoing away with the count-to-infinityproblem.The algorithm is designed for portable computing devices such as laptops who
  • 4. have energy and processing capabilities far beyond that of a typical WSN node. 1. Dynamic Source Routing (DSR)- It is a routing protocol for wireless mesh networks.It is similar to AODV in that it forms a route on-demand when a transmitting computer requests one.However,it uses source routing instead of relying on the routing table at each intermediate device.This protocol is truly based on source routing wherebyall the routing information is maintained (continuallyupdated) atmobile nodes.It has only two major phases,which are Route Discovery and Route Maintenance. Route Reply would only be generated ifthe message has reached the intended destination node (route record which is initiallycontained in Route Requestwould be inserted into the Route Reply). Therefore,it is an on-demand protocol designed to restrictthe bandwidth consumed bycontrol packets in ad hoc wireless networks byeliminating the periodic table-update messages required in the table-driven approach.The major difference between this and the other on-demand routing protocols is thatit is beacon-less and hence does not require periodic hello packet(beacon) transmissions,which are used by a node to inform its neighbors ofits presence.The basic approach ofthis protocol (and all other on-demand routing protocols) during the route construction phase is to establish a route by flooding RouteRequestpackets in the network.The destination node,on receiving a RouteRequestpacket,responds bysending a RouteReplypacketback to the source,which carries the route traversed by the RouteRequestpacketreceived. Related Work Survey of applications of MANET [5]- We shall now get an overview of different types of MANET and their uses. 1. Pure general purpose MANET The mostlydiscussed application scenario for pure general-purpose MANET is Battlefield or disaster-recovery networks.However, these kinds ofnetworks have not yet achieved the envisaged impactin terms ofreal world implementation and industrial deployment. 1. Mesh networks Mesh networks are builtupon a mix of fixed and mobile nodes interconnected via wireless links to form a multihop ad hoc network.Unlike pure MANETs, a mesh network introduces a hierarchyin the network architecture by adding dedicated nodes (called mesh routers) thatcommunicate wirelesslyto constructa wireless backbone.An example is MIT Roofnetproviding the city of Boston,with broadband access with an 802.11b-based wireless network backbone infrastructure. 1. Opportunistic Networking (Delay Tolerant Networking) (i)PocketSwitched Networks in the Haggle Project It targets solutions for communication in autonomic/opportunistic networks.In this framework,researchers are studying the properties ofPocket Switched Networks (PSNs),i.e., opportunistic networks thatcan exploit any
  • 5. possible encountered device (e.g., cell phones and PDAs that users carry in their pockets) to forward messages. (ii)Wildlife monitoring Wildlife monitoring is an interesting application field for opportunistic networks.Itfocuses on tracking wild species to deeply investigate their behavior and understand the interactions and influences on each other,as well as their reaction to the ecosystem changes caused byhuman activities. 1. Vehicular ad hoc networks VANETs use ad hoc communications for performing efficientdriver assistance and car safety. The communications include data from the roadside and from other cars. VANET research aims to supplydrivers with information regarding obstacles on the road and emergencyevents,mainlydue to line-of-sightlimitations and large processing delays.VANET can be used to communicate premonitions,notification ofemergencies,and warnings abouttraffic conditions. 1. Wireless sensor networks (WSN) WSN benefit from the advances in computing technology,which led to the production ofsmall,wireless,battery powered,smartsensor nodes.These nodes are active devices with computing and communication capabilities that not only sample real world phenomena butalso can filter,share,combine,and operate on the data they sense. Conclusion This paper discusses the various aspects ofmobile ad-hoc networking,the differentrouting protocols used for wireless sensor networks and the NS-2 network simulator.Also,we compared DSDVand AODV routing protocols for ad hoc networks using ns-2 simulations.DSDVuses the proactive table-driven routing strategy while AODV uses the reactive On-demand routing strategy. AODV performs better under high mobilitysimulations than DSDV. High mobilityresults in frequentlink failures and the overhead involved in updating all the nodes with the new routing information as in DSDV is much more than that involved AODV, where the routes are created as and when required. AODV uses on -demand route discovery, but with different routing mechanics. AODV uses routing tables,one route per destination,and destination sequence numbers,a mechanism to preventloops and to determine freshness of routes.There are still many challenges facing wireless ad hoc networks.However because ofthese advantages, wireless ad hoc networks are becoming more and more prevalentin the world. References [1] www.wikipedia.com [2]www.ucmss.com [3] Routing techniques for Mobile Ad Hoc Networks Classification and Qualitative/Quantitative Analysis, by Mr. Ankur Khetrapal,Delhi University. [4] Characterisation and Applications ofMANET,Routing Algorithms in Wireless Sensor Networks ,bySiddhu Warrier.
  • 6. [5] A Survey on the Applications of MANET, by Jiazi YI,Polytech’Nantes . [6] An Overview of Mobile Ad Hoc Networks:Applications and Challenges,by Jeroen Hoebeke,Ingrid Moerman,Bart Dhoedtand Piet Demeester [7] Performance Evaluation ofAd Hoc Routing Protocols Using NS2 Simulation, by Samyak Shah, Amit Khandre, Mahesh Shirole and Girish Bhole [8] Routing Protocols in Mobile Ad-hoc Networks,by Krishna Gorantala. [9] An Efficient Scheme for MANET Domain Formation (ESMDF) by Adwan AbdelFattah. [10] An Improved Approach for Working outside the MANET by Extending MANET Routing Protocol,by Rashween Kaur Saluja.