Professional Documents
Culture Documents
On
“MANET”
Submitted by
PATEL DHAIRAV
B.E (IV)-7th Sem, CO, Roll no -31
CERTIFICATE
Signature of Signature of
Guide DIC
(Computer EnggDept.)
______________ ______________
I take this opportunity to express my sincere thanks and deep sense of gratitude to my
guide Ms. HEMLATA BENGANI for imparting me valuable guidance during the preparation of
this seminar. She helped me by solving many doubts and suggesting many references. I am also
thankful to Prof. VAIKHARI DEODHAR, Department In-charge (DIC) of Computer
Engineering Department of Sarvajanik College Of Engineering And Technology, Surat.
Lastly, I express deep sense of gratitude towards my colleagues and also those who
directly or indirectly helped me while preparing this seminar.
By :- DHAIRAV A PATEL
B.E. 4th [C.O.]
Roll No :- 31
i
MANET
ABSTRACT
A mobile ad hoc network (MANET), sometimes called a mobile mesh network, is a self-
configuring network of mobile devices connected by wireless links. Each device in a MANET is
free to move independently in any direction, and will therefore change its links to other devices
frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The
primary challenge in building a MANET is equipping each device to continuously maintain the
information required to properly route traffic. Such networks may operate by themselves or may
be connected to the larger Internet.
MANETs are a kind of wireless ad hoc networks that usually has a routable networking
environment on top of a Link Layer ad hoc network. They are also a type of mesh network, but
many mesh networks are not mobile or not wireless.
Minimal configuration and quick deployment make ad hoc networks suitable for
emergency situations like natural disasters or military conflicts. The presence of a dynamic and
adaptive routing protocol will enable ad hoc networks to be formed quickly.
1
MANET
INDEX
1.Intoduction……………………………..................................................................1
1.1 History…………………………………………………………….. .…….1
1.2 Mobile Ad-Hoc Network………………………….....................................2
1.3 Characteristics of MANET…………………………………………..........4
3. Routing Protocols…………………………………………………..……….….11
3.1 Routing Concept…………………………………………………………11
3.2 Types of Protocols…………………………………………………….....12
3.3 Performance of Routing Protocol………………………………………..16
4. Application of MANET…………………………………………….…..………17
5. MANET Security……………………………………………..………...............19
6. Advantages……… ………………………………………………...…….…….20
7. Drawbacks……………………………………………………………….……..21
Conclusion
Bibliography
2
MANET
1 :- INTRODUCTION
1.1 :- HISTORY
The whole life-cycle of ad-hoc networks could be categorized into the first, second, and
the third generation ad-hoc networks systems. Present ad-hoc networks systems are considered
the third generation.
1
MANET
The first generation goes back to 1972. At the time, they were called PRNET (Packet
Radio Networks). In conjunction with ALOHA (Areal Locations of Hazardous Atmospheres)
and CSMA (Carrier Sense Medium Access), approaches for medium access control and a kind of
distance-vector routing PRNET were used on a trial basis to provide different networking
capabilities in a combat environment.
The second generation of ad-hoc networks emerged in 1980s, when the ad-hoc network
systems were further enhanced and implemented as a part of the SURAN (Survivable Adaptive
Radio Networks) program. This provided a packet switched network to the mobile battlefield in
an environment without infrastructure. This program proved to be beneficial in improving the
radios' performance by making them smaller, cheaper, and resilient to electronic attacks.
In the 1990s, the concept of commercial ad-hoc networks arrived with notebook
computers and other viable communications equipment. At the same time, the idea of a
collection of mobile nodes was proposed at several research conferences.
The IEEE 802.11 subcommittee had adopted the term "ad-hoc networks" and the research
community had started to look into the possibility of deploying ad-hoc networks in other areas of
application.
Many international conferences and workshops have been held by e.g. IEEE and ACM.
For instance, MobiHoc (The ACM Symposium on Mobile Ad Hoc Networking & Computing)
has been one of the most important conferences of ACM SIGMOBILE (Special Interest Group
on Mobility of Systems, Users, Data and Computing). Research in the area of ad hoc networking
is receiving more attention from academia, industry, and government. Since these networks pose
many complex issues, there are many open problems for research and significant contributions.
2
MANET
A MANET consists of mobile platforms (e.g., a router with multiple hosts and wireless
communications devices)--herein simply referred to as 'nodes'--which are free to move about
arbitrarily. The nodes may be located in or on airplanes, ships, trucks, cars, perhaps even on
people or very small devices, and there may be multiple hosts per router. A MANET is an
autonomous system of mobile nodes. The system may operate in isolation, or may have gateways
to and interface with a fixed network. It is network without specific user administration or
configuration. In other words, ad hoc networking allows an arbitrary collection of MN (mobile
nodes) to create a network on demand. A node in the ad hoc network can be a laptop,
autonomous agent, or sensor is in charge of routing information between its neighbors, thus
maintaining connectivity of the network. All the nodes in network works on same Radio
frequency.
3
MANET
Some of the characteristics that mobile ad-hoc network has are as under.
New members can join and leave the network any time.
No Base Station to provide connectivity to backbone hosts or to other Mobile hosts.
No need for handover and location management.
Each Mobile Host acts as a router, forwarding packets from one Mobile Host to another.
4
MANET
2.1 Infrastructure
Networking topologies:
Flat-Routed Infrastructure:
In this topology all the nodes are identical in terms of responsibility, and there is no
concept of special gateways. Each node has same priority. Each node works as router
5
MANET
Fig 2.1 shows the flat Routed AdHoc mobile Network Infrastructure. In this type of
Infrastructure there is no concept like Backbone node. All nodes are responsible to deliver the
packets to other node.
This approach partitions the whole network into sub networks. Each of the sub networks
then dynamically elects a node among themselves which acts as gateway to the other sub
network. This builds a hierarchy among the nodes. This hierarchy can be one-tier or multiple
tier one. However, a flat ad hoc network has poor scalability. In theoretical analysis implies
that even under the optimal circumstances, the throughput for each node declines rapidly toward
zero while the number of nodes is increased. Simulation results also demonstrated that while
routing protocols are applied, their control overhead would consume most available bandwidth
when the traffic is heavy. Besides limitation of available bandwidth, the “many hops” paths in
large-scale network are prone to break and cause many packet drops. Packet drops can be treated
as waste of bandwidth and worsen network performance.
6
MANET
All these issues prevent the flat ad hoc network from scaling to large scale. Thus, a new
methodology is needed for building a large-scale ad hoc network. An emerging promising
solution is to build a physically hierarchical ad hoc network and mobile wireless backbones. Our
proposed hierarchical ad hoc network structure is called an ad hoc network with mobile
backbones (MBN). Among the mobile nodes, some nodes, named backbone Nodes (BNs) have
an additional powerful radio to establish wireless links among themselves. Thus, they form a
higher-level network called a backbone network. Since the backbone nodes are also moving and
join or leave the backbone network dynamically, the backbone network is exactly an ad hoc
network running in a different radio level. Multilevel MBNs can be formed recursively in the
same way.
All these issues prevent the flat ad hoc network from scaling to large scale. Thus, a new
methodology is needed for building a large-scale ad hoc network. An emerging promising
solution is to build a physically hierarchical ad hoc network and mobile wireless backbones. Our
proposed hierarchical ad hoc network structure is called an ad hoc network with mobile
backbones (MBN). Among the mobile nodes, some nodes, named backbone Nodes (BNs) have
an additional powerful radio to establish wireless links among themselves. Thus, they form a
higher-level network called a backbone network. Since the backbone nodes are also moving and
join or leave the backbone network dynamically, the backbone network is exactly an ad hoc
network running in a different radio level. Multilevel MBNs can be formed recursively in the
same way.
2.2 :- Configuration
7
MANET
routing protocol. These protocols are DSR (Distance Source Routing) or DVSR (distance vector
source routing).
Creation of MANET
We assume that the MANET starts with a single node initiating the configuration process.
Once that node gets configured, other nodes can subsequently join and leave the network and the
MANET can grow and shrink in size. Hence, MANET initiation is an important task.
8
MANET
MANET Initialization:
When the very first node (requester) wishes to join the network, as part of its
initialization process, it broadcasts its NeighborQuery message and starts the
Neighborreplytimer. The requester expects to hear a response from at least one MANET node
willing to act as the initiator for assigning an IP address to the requester. If the requester is the
very first node in the MANET it is not going to receive any response to the NeighborQuery
message. When the neighborreplytimer expires, the requester repeats the process a threshold
number of times waiting for at least one response from an initiator. If all the attempts fail (timer
expiration), the requester concludes that it is the only node in the network and configures itself
with an IP address. Thus the MANET is initialized.
Let a node i (other than the very first node to enter the MANET) broadcast the
NeighborQuery message. At least one neighbor that is already part of the MANET responds
with a NeighborReply message before the timeout expires. Node i select one of the responders, j,
as its initiator and ignore the responses from other nodes. Node i then sends a Requester Request
message to the chosen initiator node j. Node j maintains the following data structures:
Allocated:
As per node j’s knowledge, this is the set of all IP addresses in use in the MANET.
Allocate Pending:
As per node j’s knowledge, this is the set of IP addresses for which address allocation has
been initiated, but not yet completed. The entries in this set are a two tuple of the form {address,
initiator}. The entries in this set have timeouts associated with them, and are purged from the list
on timer expiration. On receiving the Requester Request message from i, node j selects an
address, x, that is neither in Allocated, nor in Allocate Pending. Node j adds a tuple (x, j) to
9
MANET
Allocate Pending j and floods an Initiator Request message to all other configured nodes in the
MANET. The purpose of this message is to seek permission to grant address x to the requester.
A recipient node, k, of this message replies in the affirmative to j if x is neither in Allocated k,
nor is there an entry (x, 1) in Allocated Pending k, where l is an IP address. Otherwise, k sends a
negative reply. The nodes that send the affirmative reply also add (x,j) to their respective
Allocate Pending sets. If the replies from all the nodes are in the affirmative, the initiator j does
three tasks:
10
MANET
3 :- ROUTING PROTOCOLS
In an ad-hoc mobile network where mobile hosts are acting as routers and have both
power and bandwidth constraints, conventional protocols that employ periodic broadcast are
unlikely to be suitable. An ad-hoc mobile network has no base station to provide connectivity to
backbone hosts or to other mobile hosts. There is no need for handover and location management
at all. In such a network, each mobile host acts as a router, forwarding packets from one mobile
host to another. The communication connectivity is "weak", as any migration by mobile hosts
participating in one or more route to become invalid. The mobile hosts should not spend most of
its time updating and computing routes in sympathy with the mobile hosts’ movements. Such
schemes are highly impractical, inefficient and result in low data throughout. Hence, a novel
routing scheme is required to provide efficient and high throughput communication among ad-
hoc mobile hosts. Prior to that, the possible types of ad-hoc mobile communications are
examined.
If only two hosts, located closely together, are involved in the ad hoc network, no real
routing protocol or routing decisions are necessary. In many ad hoc networks, though, two hosts
that want to communicate may not be within wireless transmission range of each other, but
could communicate if other hosts between them also participating in the
11
MANET
Ad hoc network are willing to forward packets for them. For example, in the network
illustrated in Figure 1, mobile host C is not within the range of host A’s wireless transmitter
(indicated by the circle around A) and host A is not within the range of host C’s wireless
transmitter. If A and C wish to exchange packets, they may in this case enlist the services of host
B to forward packets for them, since B is within the overlap between A’s range and C’s
range.
In the Ad hoc Mobile Networks classify into two types on the basis of when routes are
determined.
Reactive Routing
12
MANET
These are continuously learning the topology of the network by exchanging topological
information among the network nodes. Thus, when there is a need for a route to a destination,
such route information is available immediately. So, In these types of algorithms try to evolve
the route to the destination only when they need it to transmit a data packet to the destination.
Usually a route discovery phase precedes the actual send phase. This on the fly reaction may take
a long time for transmission of the first packet, but is efficient in terms of the data packet to
routing control packet ratio saving battery power in the mobile nodes. The protocol used for this
is DSR (Dynamic Source Routing).
13
MANET
Node A broadcast a route request to discover a route to D. All intermediate nodes will add
their IDs into a node list in the Request and re-broadcast it. Node D will uncials (source routing
based on that node list) a reply Back to Node A. Then A Sends the packet as the information as it has
get by request to path towards D.
Proactive Routing
Proactive routing are updates the routing information only when necessaryThese are
based on some type of "query-reply" dialog. Reactive protocols do not attempt to continuously
maintain the up-to-date topology of the network. Rather, when the need arises, a reactive
protocol invokes a procedure to find a route to the destination; such a procedure involves some
sort of flooding the network with the route query. As such, such protocols are often also referred
to as on demand.
14
MANET
These algorithms maintain a route to the destination much like the traditional fixed
networks. When the packet is to be transmitted it just picks up a root from the cache and uses it.
This leads to the instant transmission of the first packet, but the nodes have to work hard in the
background wasting precious radio resources. The protocol used for this is OLSR (Optimized
Link State Routing).
OLSR is a proactive routing protocol for mobile ad hoc networks. The protocol inherits
the stability of a link state algorithm and has the advantage of having routes immediately
available when needed due to its proactive nature. OLSR is an optimization over the classical
link state protocol, tailored for mobile ad hoc networks. OLSR is designed to work in a
completely distributed manner and does not depend on any central entity. The protocol does
NOT REQUIRE reliable transmission of control messages: each node sends control messages
periodically, and can therefore sustain a reasonable loss of some such messages. Such losses
occur frequently in radio networks due to collisions or other transmission problems. The
Optimized Link State Routing Protocol (OLSR) is developed for mobile ad hoc networks. It
operates as a table driven, proactive protocol, i.e., exchanges topology information with other
nodes of the network regularly. Each node selects a set of its neighbor nodes as 'multi-point
relays' (MPR). In OLSR, only nodes, selected as such MPRs are responsible for forwarding
control traffic, intended for diffusion into the entire network. MPRs provide an efficient
mechanism for flooding control traffic by reducing the number of transmissions required.
15
MANET
Each node builds a small neighbor set, which covers all its 2-hop Neighbors, as its Multipoint
Relay Node. Nodes that select a node as a member of their MPR form the MPR selector (MPRS) set
of those node. All nodes with non-empty MPRS will broadcast their MPRSes as Topology control
messages. Nodes will re-broadcast first-seen topology Control messages sent by nodes in their
MPRSes.
The performance is the major factor whenever any protocol is to be used in real
application. All this MANET protocols are evaluated on major three factors as described below:
So, from above three factors it is obvious that Reactive protocol sounds better than
proactive protocols. Because the protocol overhead is less in reactive compared to proactive
protocols. Also data packet delivery ratio is higher in reactive compared to proactive.
16
MANET
4 :- APPLICATIONS OF MANET
Military battlefield. Military equipment now routinely contains some sort of computer
equipment. Ad hoc networking would allow the military to take advantage of
commonplace network technology to maintain an information network between the
soldiers, vehicles, and military information head quarters. The basic techniques of ad hoc
network came from this field.
Local level. Ad hoc networks can autonomously link an instant and temporary
multimedia network using notebook computers or palmtop computers to spread and share
information among participants at an e.g. conference or classroom. Another appropriate
local level application might be in home networks where devices can communicate
17
MANET
directly to exchange information. Similarly in other civilian environments like taxicab,
sports stadium, boat and small aircraft, mobile ad hoc communications will have many
applications.
18
MANET
5 :- MANET SECURITY
5.1:-Security Issues
Storing large keys is not practical but smaller keys reduce the security.
More complicated algorithms increase security but drain energy.
Sharing security keys between neighbors with changing membership (due to node
failure or addition) needs a scaleable key distribution and key management scheme that
is resilient to adversary attacks.
Challenge is to provide security that meets the application security requirements while
conserve energy.
19
MANET
6 :- ADVANTAGES
20
MANET
7 :- DRAWBACKS
All communications between all network entities in ad-hoc networks are carried over the
wireless medium. Additionally, as the wireless bandwidth is limited, its use should be
minimized.
Though ad hoc networks are attractive, they are more difficult to implement than fixed
networks.
First, they proactively distribute network topology information among the nodes, and
each node pre-computes routes through that topology using relatively inexpensive
algorithms.
Second, fixed networks embed routing hints in node addresses because the complete
topology of a large network is too unwieldy to process or distribute globally. Neither of
these techniques works well for networks with mobile nodes because movement
invalidates topology information and permanent node addresses cannot include dynamic
location information.
The idea of packet forwarding although works well in the case of small network, as
and when the network size increases each node has to devote a significant amount of
computing power for forwarding other node's packets. In the coming time these networks
will need to support multimedia traffic such as voice, video and data. To fulfill these
requirements, networks carrying data in real time and having high throughput, low delay
and fault tolerance are desired which can not be provided using existing methods.
21
MANET
CONCLUSION
With MANET, Network can be created On Demand without any Fixed Infrastructure.
Route maintenance and host enumeration are key requirement for an Adhoc Network.
Discovering links and building paths across the mobile Ad hoc network are also challenging
problems. On the whole challenge is development of a multi-mode routing protocol that adapts
to (and becomes effective for) any Ad hoc Mobile Networking environment from small networks
with low mobility nodes to large networks with highly mobile nodes, including multi-class
networks.
22
MANET
BIBLIOGRAPHY
1. http://en.wikipedia.org/wiki/Manet/
2. http://www.wikinvest.com/concept/Manet/
3. http://www.salesforce.com/Manet/
4. http://www.vmware.com/solutions/Manet/
23