SlideShare a Scribd company logo
1 of 17
Mobile Ad-Hoc Networks
1
Overview of Wireless Ad-Hoc Networks
Wireless mobile ad-hoc network (MANET) technology is designed
for the establishment of a network anywhere and anytime, without
any fixed infrastructure to support the mobility of the users in the
network.
In other words, a wireless ad-hoc network is a collection of mobile
nodes with a dynamic network infrastructure forming a temporary
network. Such networks no central server or base station for
providing connectivity, and all network intelligence must be placed
inside the mobile user devices.
2
Fig.1 Overview of Ad-Hoc Networks
Fig.1gives overview of an ad-hoc network, where wireless mobile
nodes have formed a network, with one node too far to reach.
3
For example, fig.2 illustrates an ad hoc network with three wireless
mobile hosts. Node 3 is not within the range of node 1’s wireless
transmitter (indicated by the circle around node 1) and vice versa. If
node 1 and node 3 wish to exchange packets, they must enlist the
services of node 2 to forward packets for them, since node 2 is within
the range overlap between node 1 and node 3.
Fig.2: Ad hoc network of three wireless mobile hosts
The situation in fig. of previous slide becomes more complicated
with the addition of more nodes. The addition of just one node, as
illustrated in fig.3 below, results in multiple paths existing between
nodes 1 and 3; packets may travel the path 1 - 2 - 3, 1 - 4 - 3, or even 1
- 4 - 2 - 3. An ad hoc routing protocol must be able to decide on a
single "best" path between any two nodes.
Fig.3: Ad hoc network with four wireless nodes
Another situation unique to wireless networks is illustrated in fig.4
below. In this example, node 1 has a large enough range to transmit
packets directly to node 3. However, node 3 has a much smaller range
and must enlist the help of node 2 in order to return packets to node 1.
This makes the link between node 1 and node 3 appear as a one-way or
unidirectional link. Most conventional routing protocols require
bidirectional links.
Fig.4: Ad hoc network with a one-way link
In such an environment, each mobile user acts as a routing node,
and a packet is routed from a source to its destination by
incorporating of other network users.
Since the topology of an ad-hoc network can change quickly and
unpredictably, it should be adaptable to changes, such as when a link
breaks, a node leaves the network, or a new node is attached to the
network.
Thus, unlike intradomain routing algorithm for regular networks, if
a node leaves an ad-hoc network, all affected nodes can discover new
routes. Ad-hoc networks have several types of applications
7
Rescue operations. In an emergency public disaster, such as an
earthquake, ad-hoc networks can beset up at a location where no
infrastructure is present. Ad-hoc networks can be used to support
network connectivity when no fixed network is available.
Military. Ad-hoc networks can be used in a battle zone, for a
military command and mobile units.
Law enforcement and security operations. An ad-hoc network
can be used in a temporary security operation, acting as a mobile
surveillance network.
Home networks. An ad-hoc network can be used to support
seamless (continuous) connectivity among various devices.
Conferencing. Ad-hoc networks can be set up for a presentation.
An audience can download a presentation, browse the slides on a
portable device, print them on the local printer, or e-mail the
presentation to an absent colleague.
8
Routing in Ad-Hoc Networks
The lack of a backbone infrastructure makes packet routing in ad-
hoc networks a challenging task. A routing protocol should be able to
automatically recover from any problem in a finite amount of time
without human intervention.
Identification of mobile terminals and correct routing of packets to
and from each terminal while moving are certainly challenging. Here
we will consider two routing protocols:
1. Destination-Sequenced Distance Vector (DSDV) Protocol
2. Cluster-Head Gateway Switch Routing Protocol
9
Routing Tables
In addition to the destination address and next hop address, routing
tables maintain the route metric (for example number of hops) and
the route sequence number.
Periodically, or immediately when network topology changes are
detected, each node will broadcast a routing table update packet. The
update packet starts out with a metric of one. This signifies to each
receiving neighbor they are one hop away from the node. The
neighbors will increment this metric (in this case, to two) and then
retransmit the update packet.
This process repeats itself until every node in the network has
received a copy of the update packet with a corresponding metric. If
a node receives duplicate update packets, the node will only pay
attention to the update packet with the smallest metric and ignore the
rest. 10
1. The Destination-Sequenced Distance Vector (DSDV) protocol is a
table-driven routing protocol
DSDV Packet Process Algorithm
If the new address has a higher sequence number, the node chooses
the route with the higher sequence number and discards the old
sequence number.
If the incoming sequence number is identical to the one belonging
to the existing route, a route with the least cost metric is chosen.
11
Fig.5 : A node receiving three update packets
To distinguish state update packets from valid ones, each update packet is tagged by the original node with a
sequence number. The sequence number is a monotonically increasing number which uniquely identifies each
update packet from a given node. Consequently, if a node receives an update packet from another node, the
sequence number must be equal to or greater than the sequence number already in the routing table; otherwise
the update packet is stale and ignored. If the sequence number matches the sequence number in the routing
table, then the metric is compared and updated as previously discussed.
Fig.6 shows a routing table for node 2, whose neighbors are nodes 1, 3, 4, and 8.
The dashed lines indicate no communications between any corresponding pair of
nodes. Therefore, node 2 has no information about node 8.
Fig.6 A DSDV routing table
13
The packet overhead of the DSDV protocol increases the total
number of nodes in the ad-hoc network. This fact makes DSDV
suitable for small networks. In large ad-hoc networks, the mobility
rate and therefore the overhead increase, making the network
unstable to the point that updated packets might not reach nodes on
time.
14
2. Cluster-Head Gateway Switch Routing Protocol
The Cluster-Head Gateway Switch Routing (CGSR) protocol is a
table-driven routing protocol. In a clustering system each predefined
number of nodes are formed into a cluster controlled by a cluster
head, which is assigned using a distributed clustering algorithm.
15
16
However, with the clustering scheme, a cluster head can be replaced
frequently by another node, for several reasons, such as lower-level energy
left in the node or a node moves out of contact.
With this protocol, each node maintains two tables: a cluster-member table
and a routing table. The cluster-member table records the cluster head for each
destination node, and the routing table contains the next hop to reach the
destination.
Fig.3 Communication with cluster head gateway switch routing
(CGSR) protocol
17
Fig.7 shows an example of routing in an area in which six clusters have been formed.
A node in cluster A is transmitting a packet to a node in cluster F.
Nodes within each cluster route their packets to their own associated clusters. The
transmitting node then sends its packet to the next hop, according to the routing table
entry associated with that cluster head. The cluster head transmits the packet to another
cluster head until the cluster head of the destination node is reached.

More Related Content

What's hot

Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile ComputingKABILESH RAMAR
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR) Pradeep Kumar TS
 
Networking devices
Networking devicesNetworking devices
Networking devicesfrestoadi
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 

What's hot (20)

Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Wide area network (wan)
Wide area network (wan)Wide area network (wan)
Wide area network (wan)
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Frame relay
Frame relayFrame relay
Frame relay
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 

Similar to Mobile Ad-Hoc Network Overview

Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmIOSR Journals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDVRajesh Piryani
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...ijwmn
 

Similar to Mobile Ad-Hoc Network Overview (20)

Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV Algorithm
 
C0431320
C0431320C0431320
C0431320
 
E1073644
E1073644E1073644
E1073644
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
 

More from Md. Mashiur Rahman (20)

Rule for creating power point slide
Rule for creating power point slideRule for creating power point slide
Rule for creating power point slide
 
Advance DBMS
Advance DBMSAdvance DBMS
Advance DBMS
 
Final exam in advance dbms
Final exam in advance dbmsFinal exam in advance dbms
Final exam in advance dbms
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routing
 
Routing and switching question1
Routing and switching question1Routing and switching question1
Routing and switching question1
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworking
 
Lec 7 query processing
Lec 7 query processingLec 7 query processing
Lec 7 query processing
 
Lec 1 indexing and hashing
Lec 1 indexing and hashing Lec 1 indexing and hashing
Lec 1 indexing and hashing
 
Cloud computing lecture 7
Cloud computing lecture 7Cloud computing lecture 7
Cloud computing lecture 7
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1
 
parallel Questions & answers
parallel Questions & answersparallel Questions & answers
parallel Questions & answers
 
Mis 8
Mis 8Mis 8
Mis 8
 
Mis 3
Mis 3Mis 3
Mis 3
 
Mis 1
Mis 1Mis 1
Mis 1
 
Mis 5
Mis 5Mis 5
Mis 5
 
Mis 2
Mis 2Mis 2
Mis 2
 
Mis 9
Mis 9Mis 9
Mis 9
 
Mis 6
Mis 6Mis 6
Mis 6
 
Mis 7
Mis 7Mis 7
Mis 7
 
Mis 4
Mis 4Mis 4
Mis 4
 

Recently uploaded

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

Mobile Ad-Hoc Network Overview

  • 2. Overview of Wireless Ad-Hoc Networks Wireless mobile ad-hoc network (MANET) technology is designed for the establishment of a network anywhere and anytime, without any fixed infrastructure to support the mobility of the users in the network. In other words, a wireless ad-hoc network is a collection of mobile nodes with a dynamic network infrastructure forming a temporary network. Such networks no central server or base station for providing connectivity, and all network intelligence must be placed inside the mobile user devices. 2
  • 3. Fig.1 Overview of Ad-Hoc Networks Fig.1gives overview of an ad-hoc network, where wireless mobile nodes have formed a network, with one node too far to reach. 3
  • 4. For example, fig.2 illustrates an ad hoc network with three wireless mobile hosts. Node 3 is not within the range of node 1’s wireless transmitter (indicated by the circle around node 1) and vice versa. If node 1 and node 3 wish to exchange packets, they must enlist the services of node 2 to forward packets for them, since node 2 is within the range overlap between node 1 and node 3. Fig.2: Ad hoc network of three wireless mobile hosts
  • 5. The situation in fig. of previous slide becomes more complicated with the addition of more nodes. The addition of just one node, as illustrated in fig.3 below, results in multiple paths existing between nodes 1 and 3; packets may travel the path 1 - 2 - 3, 1 - 4 - 3, or even 1 - 4 - 2 - 3. An ad hoc routing protocol must be able to decide on a single "best" path between any two nodes. Fig.3: Ad hoc network with four wireless nodes
  • 6. Another situation unique to wireless networks is illustrated in fig.4 below. In this example, node 1 has a large enough range to transmit packets directly to node 3. However, node 3 has a much smaller range and must enlist the help of node 2 in order to return packets to node 1. This makes the link between node 1 and node 3 appear as a one-way or unidirectional link. Most conventional routing protocols require bidirectional links. Fig.4: Ad hoc network with a one-way link
  • 7. In such an environment, each mobile user acts as a routing node, and a packet is routed from a source to its destination by incorporating of other network users. Since the topology of an ad-hoc network can change quickly and unpredictably, it should be adaptable to changes, such as when a link breaks, a node leaves the network, or a new node is attached to the network. Thus, unlike intradomain routing algorithm for regular networks, if a node leaves an ad-hoc network, all affected nodes can discover new routes. Ad-hoc networks have several types of applications 7
  • 8. Rescue operations. In an emergency public disaster, such as an earthquake, ad-hoc networks can beset up at a location where no infrastructure is present. Ad-hoc networks can be used to support network connectivity when no fixed network is available. Military. Ad-hoc networks can be used in a battle zone, for a military command and mobile units. Law enforcement and security operations. An ad-hoc network can be used in a temporary security operation, acting as a mobile surveillance network. Home networks. An ad-hoc network can be used to support seamless (continuous) connectivity among various devices. Conferencing. Ad-hoc networks can be set up for a presentation. An audience can download a presentation, browse the slides on a portable device, print them on the local printer, or e-mail the presentation to an absent colleague. 8
  • 9. Routing in Ad-Hoc Networks The lack of a backbone infrastructure makes packet routing in ad- hoc networks a challenging task. A routing protocol should be able to automatically recover from any problem in a finite amount of time without human intervention. Identification of mobile terminals and correct routing of packets to and from each terminal while moving are certainly challenging. Here we will consider two routing protocols: 1. Destination-Sequenced Distance Vector (DSDV) Protocol 2. Cluster-Head Gateway Switch Routing Protocol 9
  • 10. Routing Tables In addition to the destination address and next hop address, routing tables maintain the route metric (for example number of hops) and the route sequence number. Periodically, or immediately when network topology changes are detected, each node will broadcast a routing table update packet. The update packet starts out with a metric of one. This signifies to each receiving neighbor they are one hop away from the node. The neighbors will increment this metric (in this case, to two) and then retransmit the update packet. This process repeats itself until every node in the network has received a copy of the update packet with a corresponding metric. If a node receives duplicate update packets, the node will only pay attention to the update packet with the smallest metric and ignore the rest. 10 1. The Destination-Sequenced Distance Vector (DSDV) protocol is a table-driven routing protocol
  • 11. DSDV Packet Process Algorithm If the new address has a higher sequence number, the node chooses the route with the higher sequence number and discards the old sequence number. If the incoming sequence number is identical to the one belonging to the existing route, a route with the least cost metric is chosen. 11
  • 12. Fig.5 : A node receiving three update packets To distinguish state update packets from valid ones, each update packet is tagged by the original node with a sequence number. The sequence number is a monotonically increasing number which uniquely identifies each update packet from a given node. Consequently, if a node receives an update packet from another node, the sequence number must be equal to or greater than the sequence number already in the routing table; otherwise the update packet is stale and ignored. If the sequence number matches the sequence number in the routing table, then the metric is compared and updated as previously discussed.
  • 13. Fig.6 shows a routing table for node 2, whose neighbors are nodes 1, 3, 4, and 8. The dashed lines indicate no communications between any corresponding pair of nodes. Therefore, node 2 has no information about node 8. Fig.6 A DSDV routing table 13
  • 14. The packet overhead of the DSDV protocol increases the total number of nodes in the ad-hoc network. This fact makes DSDV suitable for small networks. In large ad-hoc networks, the mobility rate and therefore the overhead increase, making the network unstable to the point that updated packets might not reach nodes on time. 14
  • 15. 2. Cluster-Head Gateway Switch Routing Protocol The Cluster-Head Gateway Switch Routing (CGSR) protocol is a table-driven routing protocol. In a clustering system each predefined number of nodes are formed into a cluster controlled by a cluster head, which is assigned using a distributed clustering algorithm. 15
  • 16. 16 However, with the clustering scheme, a cluster head can be replaced frequently by another node, for several reasons, such as lower-level energy left in the node or a node moves out of contact. With this protocol, each node maintains two tables: a cluster-member table and a routing table. The cluster-member table records the cluster head for each destination node, and the routing table contains the next hop to reach the destination.
  • 17. Fig.3 Communication with cluster head gateway switch routing (CGSR) protocol 17 Fig.7 shows an example of routing in an area in which six clusters have been formed. A node in cluster A is transmitting a packet to a node in cluster F. Nodes within each cluster route their packets to their own associated clusters. The transmitting node then sends its packet to the next hop, according to the routing table entry associated with that cluster head. The cluster head transmits the packet to another cluster head until the cluster head of the destination node is reached.