You are on page 1of 28

SEMINAR REPORT

On
“MANET”

Submitted by

PATEL DHAIRAV
B.E (IV)-7th Sem, CO, Roll no -31

Under the guidance of

Ms. HEMLATA BENGANI

Computer Engineering Department


Sarvajanik College of Engineering & Technology
Surat-395 001, India
Nov-Dec 2010
SARVAJANIK COLLEGE OF ENGINEERING AND
TECHNOLOGY
Dr. R.K.DESAI MARG, ATHWALINES,
SURAT-395001

DEPARTMENT OF COMPUTER ENGINEERING

CERTIFICATE

This is to certify that Mr. PATEL DHAIRAV AMRUTBHAI student of B.E.IV


(CO), Semester-VII Roll no. 31 has successfully conducted his seminar on
MANET in accordance with technical and theoretical specifications under the
guidance of Ms. HEMLATA BENGANI for the year Nov-Dec 2010.

Signature of Signature of
Guide DIC
(Computer EnggDept.)

______________ ______________

Signature of Jury members:

____________ ____________ _____________ _________


ACKNOWLEDGEMENT

I take this opportunity to express my sincere thanks and deep sense of gratitude to my
guide Ms. HEMLATA BENGANI for imparting me valuable guidance during the preparation of
this seminar. She helped me by solving many doubts and suggesting many references. I am also
thankful to Prof. VAIKHARI DEODHAR, Department In-charge (DIC) of Computer
Engineering Department of Sarvajanik College Of Engineering And Technology, Surat.

I would also like to offer my gratitude towards faculty members of Computer


Engineering Department, who helped me by giving valuable suggestions and encouragement
which not only helped me in preparing this presentation but also in having a better insight in this
field.

Lastly, I express deep sense of gratitude towards my colleagues and also those who
directly or indirectly helped me while preparing this seminar.

By :- DHAIRAV A PATEL
B.E. 4th [C.O.]
Roll No :- 31

i
MANET

ABSTRACT

MOBILE AD HOC NETWORKS

A mobile ad hoc network (MANET), sometimes called a mobile mesh network, is a self-
configuring network of mobile devices connected by wireless links. Each device in a MANET is
free to move independently in any direction, and will therefore change its links to other devices
frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The
primary challenge in building a MANET is equipping each device to continuously maintain the
information required to properly route traffic. Such networks may operate by themselves or may
be connected to the larger Internet.

MANETs are a kind of wireless ad hoc networks that usually has a routable networking
environment on top of a Link Layer ad hoc network. They are also a type of mesh network, but
many mesh networks are not mobile or not wireless.

Minimal configuration and quick deployment make ad hoc networks suitable for
emergency situations like natural disasters or military conflicts. The presence of a dynamic and
adaptive routing protocol will enable ad hoc networks to be formed quickly.

1
MANET

INDEX

1.Intoduction……………………………..................................................................1
1.1 History…………………………………………………………….. .…….1
1.2 Mobile Ad-Hoc Network………………………….....................................2
1.3 Characteristics of MANET…………………………………………..........4

2. Network Infrastructure & Configuration………………………...……...……....5


2.1 Infrastructure………………………………………………………….…..5
2.2 Configuration…………………………………………..………………….7

3. Routing Protocols…………………………………………………..……….….11
3.1 Routing Concept…………………………………………………………11
3.2 Types of Protocols…………………………………………………….....12
3.3 Performance of Routing Protocol………………………………………..16

4. Application of MANET…………………………………………….…..………17

5. MANET Security……………………………………………..………...............19

6. Advantages……… ………………………………………………...…….…….20

7. Drawbacks……………………………………………………………….……..21

Conclusion

Bibliography

2
MANET

1 :- INTRODUCTION

Mobile Ad Hoc Networks (MANETs): - A MANET (Mobile Ad Hoc Network) is an


autonomous collection of mobile users that communicate over relatively bandwidth constrained
wireless links. It is a network architecture that can be rapidly deployed without relying on pre-
existing fixed network infrastructure. The nodes in a MANET can dynamically join and leave the
network, frequently, often without warning, and possibly without disruption to other nodes
communication

A meaning of ad-hoc is "For a particular purpose (improvised, made up in an instant)”.


An Ad-hoc network, or "spontaneous network", is especially useful when dealing with wireless
devices in which some of the devices are part of the network only for the duration of a
communications session and the need for a dynamic network topology is eminent (famous).
Since wireless computing devices are becoming more portable, network-oriented and popular,
the interest in ad hoc networking is growing.

1.1 :- HISTORY

A Mobile Ad Hoc Networks (MANETs) is used as a technology for dynamic wireless


networks, it has been deployed in military since 1970s. Commercial interest in such networks has
recently grown due to the advances in wireless communications. A new working group for
MANET has been formed within the Internet Engineering Task Force (IETF), aiming to
investigate and develop candidate standard Internet routing support for mobile, wireless IP
autonomous segments and develop a framework for running IP based protocols in ad hoc
networks. The recent IEEE standard 802.11 has increased the research interest in the field.

The whole life-cycle of ad-hoc networks could be categorized into the first, second, and
the third generation ad-hoc networks systems. Present ad-hoc networks systems are considered
the third generation.

1
MANET
The first generation goes back to 1972. At the time, they were called PRNET (Packet
Radio Networks). In conjunction with ALOHA (Areal Locations of Hazardous Atmospheres)
and CSMA (Carrier Sense Medium Access), approaches for medium access control and a kind of
distance-vector routing PRNET were used on a trial basis to provide different networking
capabilities in a combat environment.

The second generation of ad-hoc networks emerged in 1980s, when the ad-hoc network
systems were further enhanced and implemented as a part of the SURAN (Survivable Adaptive
Radio Networks) program. This provided a packet switched network to the mobile battlefield in
an environment without infrastructure. This program proved to be beneficial in improving the
radios' performance by making them smaller, cheaper, and resilient to electronic attacks.

In the 1990s, the concept of commercial ad-hoc networks arrived with notebook
computers and other viable communications equipment. At the same time, the idea of a
collection of mobile nodes was proposed at several research conferences.

The IEEE 802.11 subcommittee had adopted the term "ad-hoc networks" and the research
community had started to look into the possibility of deploying ad-hoc networks in other areas of
application.

Many international conferences and workshops have been held by e.g. IEEE and ACM.
For instance, MobiHoc (The ACM Symposium on Mobile Ad Hoc Networking & Computing)
has been one of the most important conferences of ACM SIGMOBILE (Special Interest Group
on Mobility of Systems, Users, Data and Computing). Research in the area of ad hoc networking
is receiving more attention from academia, industry, and government. Since these networks pose
many complex issues, there are many open problems for research and significant contributions.

2
MANET

1.2 :- Mobile Ad-hoc Networks

A "Mobile Ad hoc Network" is usually called a MANET.A mobile ad hoc network is “a


transitory association of mobile nodes which do not depend upon any fixed support
infrastructure & Connection and disconnection is controlled by the distance among nodes
and by willingness to collaborate in the network”.

A MANET consists of mobile platforms (e.g., a router with multiple hosts and wireless
communications devices)--herein simply referred to as 'nodes'--which are free to move about
arbitrarily. The nodes may be located in or on airplanes, ships, trucks, cars, perhaps even on
people or very small devices, and there may be multiple hosts per router. A MANET is an
autonomous system of mobile nodes. The system may operate in isolation, or may have gateways
to and interface with a fixed network. It is network without specific user administration or
configuration. In other words, ad hoc networking allows an arbitrary collection of MN (mobile
nodes) to create a network on demand. A node in the ad hoc network can be a laptop,
autonomous agent, or sensor is in charge of routing information between its neighbors, thus
maintaining connectivity of the network. All the nodes in network works on same Radio
frequency.

3
MANET

1.3 :- Characteristics of MANET

Some of the characteristics that mobile ad-hoc network has are as under.

 New members can join and leave the network any time.
 No Base Station to provide connectivity to backbone hosts or to other Mobile hosts.
 No need for handover and location management.
 Each Mobile Host acts as a router, forwarding packets from one Mobile Host to another.

4
MANET

2 :- NETWORK INFRASTRUCTURE & CONFIGRATION

2.1 Infrastructure

Networking topologies:

 Flat infrastructure (zero-tier)


o All nodes have equivalent routing roles
o No hierarchy

 Hierarchical infrastructure (N-tier)


o Cluster nodes have different routing roles
o Control the traffic between cluster and other clusters 

Flat-Routed Infrastructure:

In this topology all the nodes are identical in terms of responsibility, and there is no
concept of special gateways. Each node has same priority. Each node works as router

Fig 2.1 Flat-Routed Infrastructure

5
MANET
Fig 2.1 shows the flat Routed AdHoc mobile Network Infrastructure. In this type of
Infrastructure there is no concept like Backbone node. All nodes are responsible to deliver the
packets to other node.

Hierarchical Network Infrastructure:

This approach partitions the whole network into sub networks. Each of the sub networks
then dynamically elects a node among themselves which acts as gateway to the other sub
network. This builds a hierarchy among the nodes. This hierarchy can be one-tier or multiple
tier one. However, a flat ad hoc network has poor scalability. In theoretical analysis implies
that even under the optimal circumstances, the throughput for each node declines rapidly toward
zero while the number of nodes is increased. Simulation results also demonstrated that while
routing protocols are applied, their control overhead would consume most available bandwidth
when the traffic is heavy. Besides limitation of available bandwidth, the “many hops” paths in
large-scale network are prone to break and cause many packet drops. Packet drops can be treated
as waste of bandwidth and worsen network performance.

Fig 2.1.2 Hierarchical network Infrastructure

6
MANET
All these issues prevent the flat ad hoc network from scaling to large scale. Thus, a new
methodology is needed for building a large-scale ad hoc network. An emerging promising
solution is to build a physically hierarchical ad hoc network and mobile wireless backbones. Our
proposed hierarchical ad hoc network structure is called an ad hoc network with mobile
backbones (MBN). Among the mobile nodes, some nodes, named backbone Nodes (BNs) have
an additional powerful radio to establish wireless links among themselves. Thus, they form a
higher-level network called a backbone network. Since the backbone nodes are also moving and
join or leave the backbone network dynamically, the backbone network is exactly an ad hoc
network running in a different radio level. Multilevel MBNs can be formed recursively in the
same way.

All these issues prevent the flat ad hoc network from scaling to large scale. Thus, a new
methodology is needed for building a large-scale ad hoc network. An emerging promising
solution is to build a physically hierarchical ad hoc network and mobile wireless backbones. Our
proposed hierarchical ad hoc network structure is called an ad hoc network with mobile
backbones (MBN). Among the mobile nodes, some nodes, named backbone Nodes (BNs) have
an additional powerful radio to establish wireless links among themselves. Thus, they form a
higher-level network called a backbone network. Since the backbone nodes are also moving and
join or leave the backbone network dynamically, the backbone network is exactly an ad hoc
network running in a different radio level. Multilevel MBNs can be formed recursively in the
same way.

2.2 :- Configuration

A mobile ad hoc network (MANET) is a group of mobile, wireless nodes which


cooperatively and spontaneously form an IP-based network. This network is independent of
any fixed infrastructure or centralized administration. A node communicates directly with nodes
within its wireless communication range. Nodes that are part of the MANET, but beyond each
other’s wireless range communicate using a multi-hop route through other nodes in the
network. These multi-hop routes changes with the network topology and are determined using a

7
MANET
routing protocol. These protocols are DSR (Distance Source Routing) or DVSR (distance vector
source routing).

A node in an IP-based network is configured with an IP address, a net mask and a


default gateway (the node to which packets for destinations not having an explicit entry in the
routing table are sent). In addition, the network configuration may include information about
DNS servers, etc. Existing MANET literature bypasses the issue of node configuration by
assuming that nodes in MANETs are configured a priority, before they become a part of the
network. This introduces an element of centralized control that limits the ability to spontaneously
form a network. In a MANET, nodes should be able to enter and leave the network at will. Thus,
the nodes should be capable of being dynamically configured by the network upon their entry
into it. It may be argued that MANET nodes also belong to some home network, and could
continue to use their home network IP address in the MANET. However, in several instances a
node does not permanently own an IP address. An IP address is assigned to the node when it
boots up, and the node releases it on leaving the network. Dynamic configuration in a wired
network is accomplished using the Dynamic Host Configuration Protocol (DHCP). However,
this requires the presence of a centralized DHCP server, which maintains the configuration
information of all nodes in the network.
The network configuration parameter that is required to be unique for each node in the
network is its IP address. Our distributed protocol ensures that no two nodes in the MANET
acquire the same IP address. We describe enhancements to the solution that can handle problems
that may arise due to node failures, message losses, mobility of the nodes, or multiple concurrent
initiations of node configuration, and network partitioning and merger.

Creation of MANET

We assume that the MANET starts with a single node initiating the configuration process.
Once that node gets configured, other nodes can subsequently join and leave the network and the
MANET can grow and shrink in size. Hence, MANET initiation is an important task.

8
MANET
 MANET Initialization:

When the very first node (requester) wishes to join the network, as part of its
initialization process, it broadcasts its NeighborQuery message and starts the
Neighborreplytimer. The requester expects to hear a response from at least one MANET node
willing to act as the initiator for assigning an IP address to the requester. If the requester is the
very first node in the MANET it is not going to receive any response to the NeighborQuery
message. When the neighborreplytimer expires, the requester repeats the process a threshold
number of times waiting for at least one response from an initiator. If all the attempts fail (timer
expiration), the requester concludes that it is the only node in the network and configures itself
with an IP address. Thus the MANET is initialized.

 New Node Joining the MANET:

Let a node i (other than the very first node to enter the MANET) broadcast the
NeighborQuery message. At least one neighbor that is already part of the MANET responds
with a NeighborReply message before the timeout expires. Node i select one of the responders, j,
as its initiator and ignore the responses from other nodes. Node i then sends a Requester Request
message to the chosen initiator node j. Node j maintains the following data structures:

 Allocated:

As per node j’s knowledge, this is the set of all IP addresses in use in the MANET.

 Allocate Pending:

As per node j’s knowledge, this is the set of IP addresses for which address allocation has
been initiated, but not yet completed. The entries in this set are a two tuple of the form {address,
initiator}. The entries in this set have timeouts associated with them, and are purged from the list
on timer expiration. On receiving the Requester Request message from i, node j selects an
address, x, that is neither in Allocated, nor in Allocate Pending. Node j adds a tuple (x, j) to
9
MANET
Allocate Pending j and floods an Initiator Request message to all other configured nodes in the
MANET. The purpose of this message is to seek permission to grant address x to the requester.
A recipient node, k, of this message replies in the affirmative to j if x is neither in Allocated k,
nor is there an entry (x, 1) in Allocated Pending k, where l is an IP address. Otherwise, k sends a
negative reply. The nodes that send the affirmative reply also add (x,j) to their respective
Allocate Pending sets. If the replies from all the nodes are in the affirmative, the initiator j does
three tasks:

I. Assigns address x to requester node i.


II. Add x to allocated.
III. Floods this information in the MANET so that all other nodes can also add x to their
respective allocated sets. If at least one response is negative, another address x' is selected and
another attempt is initiated to assign x' to the requester. If initiator request retry number of
attempts fail, the initiator sends an abort message to the requester indicating that it is not
possible to configure the requester. Here, initiator request retry is a constant.

10
MANET

3 :- ROUTING PROTOCOLS

In an ad-hoc mobile network where mobile hosts are acting as routers and have both
power and bandwidth constraints, conventional protocols that employ periodic broadcast are
unlikely to be suitable. An ad-hoc mobile network has no base station to provide connectivity to
backbone hosts or to other mobile hosts. There is no need for handover and location management
at all. In such a network, each mobile host acts as a router, forwarding packets from one mobile
host to another. The communication connectivity is "weak", as any migration by mobile hosts
participating in one or more route to become invalid. The mobile hosts should not spend most of
its time updating and computing routes in sympathy with the mobile hosts’ movements. Such
schemes are highly impractical, inefficient and result in low data throughout. Hence, a novel
routing scheme is required to provide efficient and high throughput communication among ad-
hoc mobile hosts. Prior to that, the possible types of ad-hoc mobile communications are
examined.

3.1 :- Routing Concept

If only two hosts, located closely together, are involved in the ad hoc network, no real
routing protocol or routing decisions are necessary. In many ad hoc networks, though, two hosts
that want to communicate may not be within wireless transmission range of each other, but
could communicate if other hosts between them also participating in the

11
MANET

Fig 3.1 A Simple Adhoc Network of three Wireless mobile hosts

Ad hoc network are willing to forward packets for them. For example, in the network
illustrated in Figure 1, mobile host C is not within the range of host A’s wireless transmitter
(indicated by the circle around A) and host A is not within the range of host C’s wireless
transmitter. If A and C wish to exchange packets, they may in this case enlist the services of host
B to forward packets for them, since B is within the overlap between A’s range and C’s
range.

3.2 :- Types of Protocols

In the Ad hoc Mobile Networks classify into two types on the basis of when routes are
determined.

 Reactive Routing protocols.


 Proactive Routing protocols.

Reactive Routing

12
MANET

These are continuously learning the topology of the network by exchanging topological
information among the network nodes. Thus, when there is a need for a route to a destination,
such route information is available immediately. So, In these types of algorithms try to evolve
the route to the destination only when they need it to transmit a data packet to the destination.
Usually a route discovery phase precedes the actual send phase. This on the fly reaction may take
a long time for transmission of the first packet, but is efficient in terms of the data packet to
routing control packet ratio saving battery power in the mobile nodes. The protocol used for this
is DSR (Dynamic Source Routing).

DSR (Dynamic Source Routing):

Dynamic source routing protocol offers a number of potential advantages over


Conventional routing protocols such as distance vector in an ad hoc network. First, unlike
conventional routing protocols, our protocol uses no periodic routing advertisement messages,
thereby reducing network bandwidth overhead, particularly during periods when little or no
significant host movement is taking place. Battery power is also conserved on the mobile hosts,
both by not sending the advertisements and by not needing to receive they (since a host could
otherwise reduce its power usage by putting itself into “sleep” or “standby” mode when not
busy with other tasks). Distance vector and link state routing, on the other hand, must continue to
send advertisements even when nothing changes, so that other mobile hosts will continue to
consider those routes or network links as valid. In addition, many of the “links” between routers
seen by the routing algorithm may be redundant. Wired networks are usually explicitly
configured to have only one (or a small number) of routers connecting any two networks, but
there are no explicit links in an ad hoc network, and all communication is by broadcast
transmissions. The redundant paths in a wireless environment unnecessarily increase the size of
routing updates that must be sent over the network, and increase the CPU overhead required to
process each update and to compute new routes.

13
MANET

Fig 3.2.1 DSR Protocol Implementation

Node A broadcast a route request to discover a route to D. All intermediate nodes will add
their IDs into a node list in the Request and re-broadcast it. Node D will uncials (source routing
based on that node list) a reply Back to Node A. Then A Sends the packet as the information as it has
get by request to path towards D.

Proactive Routing

Proactive routing are updates the routing information only when necessaryThese are
based on some type of "query-reply" dialog. Reactive protocols do not attempt to continuously
maintain the up-to-date topology of the network. Rather, when the need arises, a reactive
protocol invokes a procedure to find a route to the destination; such a procedure involves some
sort of flooding the network with the route query. As such, such protocols are often also referred
to as on demand.

14
MANET
These algorithms maintain a route to the destination much like the traditional fixed
networks. When the packet is to be transmitted it just picks up a root from the cache and uses it.
This leads to the instant transmission of the first packet, but the nodes have to work hard in the
background wasting precious radio resources. The protocol used for this is OLSR (Optimized
Link State Routing).

Optimized Link State Routing (OLSR)

OLSR is a proactive routing protocol for mobile ad hoc networks. The protocol inherits
the stability of a link state algorithm and has the advantage of having routes immediately
available when needed due to its proactive nature. OLSR is an optimization over the classical
link state protocol, tailored for mobile ad hoc networks. OLSR is designed to work in a
completely distributed manner and does not depend on any central entity. The protocol does
NOT REQUIRE reliable transmission of control messages: each node sends control messages
periodically, and can therefore sustain a reasonable loss of some such messages. Such losses
occur frequently in radio networks due to collisions or other transmission problems. The
Optimized Link State Routing Protocol (OLSR) is developed for mobile ad hoc networks. It
operates as a table driven, proactive protocol, i.e., exchanges topology information with other
nodes of the network regularly. Each node selects a set of its neighbor nodes as 'multi-point
relays' (MPR). In OLSR, only nodes, selected as such MPRs are responsible for forwarding
control traffic, intended for diffusion into the entire network. MPRs provide an efficient
mechanism for flooding control traffic by reducing the number of transmissions required.

Fig 3.2.2 OLSR Implementation & Table

15
MANET

Each node builds a small neighbor set, which covers all its 2-hop Neighbors, as its Multipoint
Relay Node. Nodes that select a node as a member of their MPR form the MPR selector (MPRS) set
of those node. All nodes with non-empty MPRS will broadcast their MPRSes as Topology control
messages. Nodes will re-broadcast first-seen topology Control messages sent by nodes in their
MPRSes.

3.3 :- Performance of Routing Protocol

The performance is the major factor whenever any protocol is to be used in real
application. All this MANET protocols are evaluated on major three factors as described below:

1. Data packet delivery ratio


2. End-to-End delivery
3. Protocol overhead.

So, from above three factors it is obvious that Reactive protocol sounds better than
proactive protocols. Because the protocol overhead is less in reactive compared to proactive
protocols. Also data packet delivery ratio is higher in reactive compared to proactive.

16
MANET

4 :- APPLICATIONS OF MANET

With the increase of portable devices as well as progress in wireless communication, ad


hoc networking is gaining importance with the increasing number of widespread applications.
Ad hoc networking can be applied anywhere where there is little or no communication
infrastructure or the existing infrastructure is expensive or inconvenient to use. Ad hoc
networking allows the devices to maintain connections to the network as well as easily adding
and removing devices to and from the network. The set of applications for MANETs is diverse,
ranging from large-scale, mobile, highly dynamic networks, to small, static networks that are
constrained by power sources. Besides the legacy applications that move from traditional
infrastructured environment into the adhoc context, a great deal of new services can and will be
generated for the new environment. Typical applications include:

 Military battlefield. Military equipment now routinely contains some sort of computer
equipment. Ad hoc networking would allow the military to take advantage of
commonplace network technology to maintain an information network between the
soldiers, vehicles, and military information head quarters. The basic techniques of ad hoc
network came from this field.

 Commercial sector. Ad hoc can be used in emergency/rescue operations for disaster


relief efforts, e.g. in fire, flood, or earthquake. Emergency rescue operations must take
place where non-existing or damaged communications infrastructure and rapid
deployment of a communication network is needed. Information is relayed from one
rescue team member to another over a small handheld. Other commercial scenarios
include e.g. ship-to-ship ad hoc mobile communication, law enforcement, etc.

 Local level. Ad hoc networks can autonomously link an instant and temporary
multimedia network using notebook computers or palmtop computers to spread and share
information among participants at an e.g. conference or classroom. Another appropriate
local level application might be in home networks where devices can communicate

17
MANET
directly to exchange information. Similarly in other civilian environments like taxicab,
sports stadium, boat and small aircraft, mobile ad hoc communications will have many
applications.

 Personal Area Network (PAN). Short-range MANET can simplify the


intercommunication between various mobile devices (such as a PDA, a laptop, and a
cellular phone). Tedious wired cables are replaced with wireless connections. Such an ad
hoc network can also extend the access to the Internet or other networks by mechanisms
e.g. Wireless LAN (WLAN), GPRS, and UMTS. The PAN is potentially a promising
application field of MANET in the future pervasive computing context.

18
MANET

5 :- MANET SECURITY

 Mobile networks are physically insecure.


 Distributed management means overall security is dependent on individual node
security.
 MANET security considerations.
o Confidentiality – prevent eavesdropping
o Access control – protecting the wireless infrastructure
o Data integrity – preventing tampering of traffic
o Denial of service

5.1:-Security Issues

 Storing large keys is not practical but smaller keys reduce the security.
 More complicated algorithms increase security but drain energy.
 Sharing security keys between neighbors with changing membership (due to node
failure or addition) needs a scaleable key distribution and key management scheme that
is resilient to adversary attacks.
 Challenge is to provide security that meets the application security requirements while
conserve energy.

19
MANET

6 :- ADVANTAGES

 It is possible to construct large networks of fixed nodes today. Prominent examples


include the telephone system and the Internet. The cellular telephone network shows
how these wired networks can be extended to include large numbers of mobile nodes.
However, these networks require a large investment in fixed infrastructure before
they are useful central offices, trunks, and local loops in the case of the telephone
system, radio towers for the cellular network.
 Furthermore, upgrading these networks to meet increasing bandwidth requirements has
proven expensive and slow whereas MANET is fast.
 The fact that large fixed communication infrastructures already exist might seem to limit
the usefulness of any competing approach. There are, however, a number of situations in
which ad hoc networks are desirable.
 These networks prove to be economical in sparse areas. In emergency services such as
disaster recovery these networks are the only possible options.
 These networks are a valid substitution for local area networks as well.
 Nodes in an Ad hoc Mobile Network forward packets to establish a virtual network
backbone. The idea of forwarding each other's packets eliminates the need for a fixed
network for communication.

20
MANET

7 :- DRAWBACKS

 All communications between all network entities in ad-hoc networks are carried over the
wireless medium. Additionally, as the wireless bandwidth is limited, its use should be
minimized.
 Though ad hoc networks are attractive, they are more difficult to implement than fixed
networks.
 First, they proactively distribute network topology information among the nodes, and
each node pre-computes routes through that topology using relatively inexpensive
algorithms.
 Second, fixed networks embed routing hints in node addresses because the complete
topology of a large network is too unwieldy to process or distribute globally. Neither of
these techniques works well for networks with mobile nodes because movement
invalidates topology information and permanent node addresses cannot include dynamic
location information.
 The idea of packet forwarding although works well in the case of small network, as
and when the network size increases each node has to devote a significant amount of
computing power for forwarding other node's packets. In the coming time these networks
will need to support multimedia traffic such as voice, video and data. To fulfill these
requirements, networks carrying data in real time and having high throughput, low delay
and fault tolerance are desired which can not be provided using existing methods.

21
MANET

CONCLUSION

With MANET, Network can be created On Demand without any Fixed Infrastructure.
Route maintenance and host enumeration are key requirement for an Adhoc Network.
Discovering links and building paths across the mobile Ad hoc network are also challenging
problems. On the whole challenge is development of a multi-mode routing protocol that adapts
to (and becomes effective for) any Ad hoc Mobile Networking environment from small networks
with low mobility nodes to large networks with highly mobile nodes, including multi-class
networks.

22
MANET

BIBLIOGRAPHY

1. http://en.wikipedia.org/wiki/Manet/
2. http://www.wikinvest.com/concept/Manet/
3. http://www.salesforce.com/Manet/
4. http://www.vmware.com/solutions/Manet/

23

You might also like