Académique Documents
Professionnel Documents
Culture Documents
ABSTRACT
In the recent years communication technology and services have
advanced. Mobility has become very important, as people want to communicate
anytime from and to anywhere. In the areas where there is little or no
infrastructure is available or the existing wireless infrastructure is expensive and
inconvenient to use, Mobile Ad hoc NETworks, called MANETs, are becoming
useful. They are going to become integral part of next generation mobile services.
A MANET is a collection of wireless nodes that can dynamically form a network
to exchange information without using any pre-existing fixed network
infrastructure. The special features of MANET bring this technology great
opportunities together with severe challenges. The military tactical and other
security-sensitive operations are still the main applications of ad hoc networks,
although there is a trend to adopt ad hoc networks for commercial uses due to their
unique properties. However, they face a number of problems. In this paper, we
describes the fundamental problems of ad hoc networking by giving its related
research background including the concept, features, status, and applications of
MANET. Some of the technical challenges MANET poses are also presented
based on which the paper points out the related kernel barrier. Some of the key
research issues for ad hoc networking technology are discussed in detail that are
expected to promote the development and accelerate the commercial applications
of the MANET technology.
1. INTRODUCTION
1) Infrastructured:-
Wireless mobile networks have traditionally been based on the
cellular concept and relied on good infrastructure support, in which mobile devices
communicate with access points like base stations connected to the fixed network
infrastructure. Typical examples of this kind of wireless networks are GSM,
UMTS, WLL, WLAN, etc.
2) Infrastructureless:-
As to infrastructureless approach, the mobile wireless network is
commonly known as a mobile ad hoc network (MANET) [1, 2]. A MANET is a
collection of wireless nodes that can dynamically form a network to exchange
information without using any pre-existing fixed network infrastructure. It has
many important applications, because in many contexts information exchange
between mobile units cannot rely on any fixed network infrastructure, but on rapid
configuration of a wireless connections on-the-fly. Wireless ad hoc networks
themselves are an independent, wide area of research and applications, instead of
being only just a complement of the cellular system.
Seminar Report 2004 MANET:-The Art of Networking without a
Network
Dept. of Electronics & Communication,Govt. Engg. College,Thrissur. 3
2. RELATED BACKGROUND
interact with another MN located in the same group,routing is the same as in a flat
ad hoc network. However, if an MN in group A wants to communicate with
another MN in group B, more advanced routing techniques incorporating the
higher tiers must be implemented. For the purposes of this thesis, further reference
to ad hoc networks assumes a flat architecture.
The traffic types in ad hoc networks are quite different from those in an
infrastructured wireless network [3], including:
1) Peer-to-Peer:-
Communication between two nodes which are within one hop.
Network traffic (Bps) is usually consistent.
2) Remote-to-Remote:-
Communication between two nodes beyond a single hop but which
maintain a stable route between them. This may be the result of several nodes
staying within communication range of each other in a single area or possibly
moving as a group. The traffic is similar to standard network traffic.
3) Dynamic Traffic:-
This occurs when nodes are dynamic and moving around. Routes must
be reconstructed. This results in a poor connectivity and network activity in short
bursts.
1) Autonomous terminal:-
In MANET, each mobile terminal is an autonomous node, which may
function as both a host and a router. In other words, besides the basic processing
2) Distributed operation:-
Since there is no background network for the central control of the
network operations, the control and management of the network is distributed
among the terminals. The nodes involved in a MANET should collaborate
amongst themselves and each node acts as a relay as needed, to implement
functions e.g. security and routing.
3) Multihop routing:-
Basic types of ad hoc routing algorithms can be single-hop and
multihop, based on different link layer attributes and routing protocols. Single-hop
MANET is simpler than multihop in terms of structure and implementation, with
the cost of lesser functionality and applicability. When delivering data packets
from a source to its destination out of the direct wireless transmission range, the
packets should be forwarded via one or more intermediate nodes.
6) Light-weight terminals:-
In most cases, the MANET nodes are mobile devices with less CPU
processing capability, small memory size, and low power storage. Such devices
Seminar Report 2004 MANET:-The Art of Networking without a
Network
Dept. of Electronics & Communication,Govt. Engg. College,Thrissur. 10
need optimized algorithms and mechanisms that implement the computing and
communicating functions.
1) Military battlefield:-
Military equipment now routinely contains some sort of computer
equipment. Ad hoc networking would allow the military to take advantage of
commonplace network technology to maintain an information network between
the soldiers, vehicles, and military information head quarters. The basic techniques
of ad hoc network came from this field.
2) Commercial sector:-
Ad hoc can be used in emergency/rescue operations for disaster relief
efforts, e.g. in fire, flood, or earthquake. Emergency rescue operations must take
place where non-existing or damaged communications infrastructure and rapid
deployment of a communication network is needed. Information is relayed from
one rescue team member to another over a small handheld. Other commercial
scenarios include e.g. ship-to-ship ad hoc mobile communication, law enforcement,
etc.
3) Local level:-
Ad hoc networks can autonomously link an instant and temporary
multimedia network using notebook computers or palmtop computers to spread
and share information among participants at a e.g. conference or classroom.
Another appropriate local level application might be in home
networks where devices can communicate directly to exchange information.
Similarly in other civilian environments like taxicab, sports stadium, boat and
small aircraft, mobile ad hoc communications will have many applications.
Global State Routing (GSR), Fisheye State Routing (FSR), and Hierarchical State
Routing (HSR) etc. The various on-demand routing protocols are Cluster-Based
Routing (CBR), Ad hoc On-demand Distance Vector (AODV) routing, Dynamic
Source Routing (DSR), Temporally Ordered Routing Algorithm (TORA),
Associativity-Based Routing (ABR), and Signal Stability Routing (SSR) protocol
etc. In this paper following two on-demand and two table-driven protocols have
been studied.
Let S(X) and S(Y) denote the destination sequence number for node Z as stored at
node X, and as sent by node Y with its routing table to node X, respectively.
Node X takes the following steps:
-If S(X) > S(Y), then X ignores the routing information received from Y
-If S(X) = S(Y), and cost of going through Y is smaller than the route known to
X, then X sets Y as the next hop to Z
-If S(X) < S(Y), then X sets Y as the next hop to Z, and S(X) is updated to
equal S(Y)
vi) A node may also learn a route when it overhears Data packets
i) When node S learns that a route to node D is broken, it uses another route from
its local cache, if such a route to D exists in its cache. Otherwise, node S
initiates route discovery by sending a route request
ii)Node X on receiving a Route Request for some node D can send a Route Reply
if node X knows a route to node D
1) Packet header size grows with route length due to source routing
2) Flood of route requests may potentially reach all nodes in the network
4) Increased contention if too many route replies come back due to nodes replying
using their local cache
-Route Reply Storm problem
-Reply storm may be eased by preventing a node from sending RREP if it
hears another RREP with a shorter route
5) An intermediate node may send Route Reply using a stale cached route, thus
polluting other caches
iv)Route Reply travels along the reverse path set-up when Route Request is
forwarded.
v)On receiving the RREP the sourge will send the data packet to the destination
similar to that in DSR.
vii)To determine whether the path known to an intermediate node is more recent,
destination sequence numbers are used.
viii)The likelihood that an intermediate node will send a Route Reply when using
AODV not as high as DSR.A new Route Request by node S for a destination is
assigned a higher destination sequence number. An intermediate node which
knows a route, but with a smaller sequence number, cannot send Route Reply.
Timeouts in AODV
ii)When the next hop link in a routing table entry breaks, all active neighbors are
informed.
iii)Link failures are propagated by means of Route Error messages, which also
update destination sequence numbers.
vii)When node S receives the RERR, it initiates a new route discovery for D using
destination sequence number at least as large as N.
vii)When node D receives the route request with destination sequence number N,
node D will set its sequence number to N, unless it is already larger than N.
i)To avoid using old/broken routes and to determine which route is newer.
-Assume that A does not know about failure of link C-D because RERR sent
by C is lost
-Now C performs a route discovery for D. Node A receives the RREQ (say, via
-path C-E-A)
Summary: AODV
ii)Nodes maintain routing tables containing entries only for routes that are in
active use
iii)At most one next-hop per destination maintained at each node in AODV where
as in DSR may maintain several routes for a single destination
1) Routing:-
Since the topology of the network is constantly changing, the issue
of routing packets between any pair of nodes becomes a challenging task. Most
protocols should be based on reactive routing instead of proactive. Multicast
routing is another challenge because the multicast tree is no longer static due to the
random movement of nodes within the network. Routes between nodes may
6. CONCLUSIONS
7. REFERENCES
[1] M. Frodigh, P. Johansson, and P. Larsson. “Wireless ad hoc networking:
the art of networking without a network,” Ericsson Review, No.4, 2000, pp.
248-263.
[5] E.M. Royer and C.K. Toh, “A review of current routing protocols for ad
hoc mobile wireless networks,” IEEE Personal Communications, 1999, 6(2),
pp. 46-55.
[7] S.-J. Lee, M. Gerla, and C.-K. Toh, “A simulation study of table-driven
and on-demand routing protocols for mobile ad-hoc networks,” IEEE
Network, 1999, 13(4), pp. 48-54.
[8] M. Joa-Ng and I.-T. Lu, “A peer-to-peer zone-based two-level link state
routing for mobile ad hoc networks,”. IEEE Journal on Selected Areas in
Communications, 1999, 17(8), pp. 1415-1425.
[9] L. Ji, M. Ishibashi, and M.S. Corson, “An approach to mobile ad hoc
network protocol kernel design,” In Proceedings of IEEE WCNC’99, New
Orleans, LA, Sep. 1999, pp. 1303-1307.