mobile ad hoc network (manet) by himansu

15
MOBILE AD HOC NETWORK (MANET) GUIDED BY: SAMBEET PATRO(IT LECT.) CENTURION UNIVERSITY TECHNOLGY & MANAGEMENT NAME: HIMANSU PARICHHA REGD. NO:0801213054 ID NO:B708008 BRANCH: INFORMATION TECHNOLOGY

Upload: himansuparichha

Post on 21-Jun-2015

264 views

Category:

Education


0 download

DESCRIPTION

this is himansu a software engineer in IT.it is help for a better presentation about MANET. please down load this & this will be a good project.

TRANSCRIPT

Page 1: Mobile ad hoc network  (manet) by himansu

MOBILE AD HOC NETWORK (MANET) GUIDED BY: SAMBEET PATRO(IT LECT.)

CENTURION UNIVERSITY TECHNOLGY & MANAGEMENT

NAME: HIMANSU PARICHHA

REGD. NO:0801213054

ID NO:B708008

BRANCH: INFORMATION TECHNOLOGY

Page 2: Mobile ad hoc network  (manet) by himansu

CONTENTS:

DEFINITION

CLASSIFICATION

ROUTE ALGORITHMS

ROUTE DISCOVERY

APPLICATIONS

DISTRIBUTION

RELATIONSHIP

Routing protocols

Page 3: Mobile ad hoc network  (manet) by himansu

Mobile Random and perhaps

constantly changingAd-hoc

Not engineeredNetworks

Elastic data applications which use networks to communicate

DEFINITION:

A "mobile ad hoc network" (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links --the union of which form an arbitrary graph. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably.Such a network may operate in a standalone fashion, or may be connected to the larger Internet. Sensor nodes consist of sensing, data processing, and communication components and typically form ad hoc networks.Due to a lack of infrastructure support, each node acts as a router, forwarding data packets for other nodes.

Page 4: Mobile ad hoc network  (manet) by himansu

Can be classified into twoServer: Contain the complete DBMS and bear primary responsibility for data broadcast and satisfying client queries.

Clients: Have sufficient resources to cache portions of the database as well as storing some DBMS query and processing modules.Practical Use : Whenever a temporary network with no infra structure needed.

Rescue situations: Rescue workers engaged in disaster relief investigate the extent of the damage around them and collaboratively work by sharing the information on their locations and findings.

Excavations: Members of a research project team engaged in an archeological excavation collect various phenomenal data from sensors and share the obtained data with other members to streamline work.

Criteria – node to be part of a network: To be connected to a network, a node should must be

within the area of influence of at least one node on the network.

A node with no remaining power, or one that is off, is not currently a part of the network.

Even if the source and the destination nodes are not within each other’s communication range, data packets are forwarded to the destination by relaying transmission through other nodes that exist between the two nodes.

Page 5: Mobile ad hoc network  (manet) by himansu

COMMON ALGORITHMS: Exploration

Network is explored to find possible routes Of which one is selected Example: IEEE 802.5 Source Routing

Bellman-Ford algorithm does this in a distributed manner Called "Distance Vector" these days Generates routes to a node from somewhere else

Shortest Path First (Ford, CACM, 1968) does this in a database

Djikstra applied to networks, 1972 Generates routes from a node to somewhere else

BASIS OF ROUTING: Bellman-Ford-Moore proof

In any graph there exists a spanning tree Ford (1956), Bellman (1958), Moore (1958)

Spanning tree: A set of arcs which visits every node in a graph exactly

once

AB A

B

Page 6: Mobile ad hoc network  (manet) by himansu

ROUTE DISCOVERY: A route between two nodes is

found by sending an Route Request

Route Request builds a source route on every path through the network

First Route Request to arrive is accepted; target responds on that path and tells initiator what the source route is

Source route is used on subsequent data traffic

B

H I J

GFE

D

A

C

K

Detected Source Route:(A, B, F, J, K)

Page 7: Mobile ad hoc network  (manet) by himansu

ROUTE DISCOVERY DYNAMICALLY:

A route between two nodes is found by sending an Route Request to a locality Initial locality small, grows with

failure After that, a little larger than

the locality target last found in Route Response sent

By target if necessary By neighboring routing node if

possible to “join” existing route Network stores the route

d

j k l

ihg

f

A

e

C

B

Page 8: Mobile ad hoc network  (manet) by himansu

APPLICATION:

Traffic networks: “Smart cars” and “smart roads” Onboard systems “talk” to the

“road”: Map obstacles and delays Obtain maps Inform the road of its actions

Combat regiment in the field Perhaps 4000-8000 objects in

constant unpredictable motion… Intercommunication of forces

Proximity, function, plan of battle Special issues

Low probability of detection Random association and

topology

Military applications:

Page 9: Mobile ad hoc network  (manet) by himansu

TOPOLOGY UPDATE DISTRIBUTION:

Topology information distributed to the set of systems that are deemed to need it. You need information

about a routing node if your routing would use it…

Therefore every routing node effectively calculates all routes from all nodes for which it has information

Page 10: Mobile ad hoc network  (manet) by himansu

NEIGHBOR RELATIONSHIPS

Each device emits a periodic “Hello” Advertise itself to its

neighborsDetermine who else is thereSelect some systems to act

as Multi-Point Relays

Page 11: Mobile ad hoc network  (manet) by himansu

MULTI-POINT RELAYS Passes Topology Information

Acts as router between hosts, in wired parlance

Minimizes information retransmission

Forms a routing backbone

Page 12: Mobile ad hoc network  (manet) by himansu

Routing protocols:Contents: 1 Pro-active (table-driven) routing

2 Reactive (on-demand) routing3 Flow-oriented routing4 Adaptive (situation-aware) routing5 Hybrid (both pro-active and reactive) routing6 Hierarchical routing protocols7 Host Specific Routing protocols8 Geographical routing protocols9 Power-aware routing protocols10 Multicast routing11 Geographical multicast protocols (Geocasting)Destination Sequenced Distance Vector (DSDV)Protocol

Latest protocols:

Ad-hoc On-Demand Distance Vector (AODV) ProtocolThe study reveals that, DSDV routing protocol consumes more bandwidth, because of the frequent broadcasting of routing updates. While the AODV is better than DSDV as it doesn’t maintain any routing tables at nodes which results in less overhead and more bandwidth. From the above, chapters, it can be assumed that DSDV routing protocols works better for smaller networks but not for larger networks. So, my conclusion is that, AODV routing protocol is best suited for general mobile ad-hoc networks as it consumes less bandwidth and lower overheadwhen compared with DSDV routing protocol.

Page 13: Mobile ad hoc network  (manet) by himansu

To be able to combine Web Services and mobile ad hoc networks(MANETs).We suggest that a peer-to-peer (p2p)architecture is used .this decision is based on the fact that many p2p networks are content driven and therefore participants in these kinds of networks search for services instead of addresses as in MANET.

Conclusion:

The load on the network can be issue if the network gets too extensive, since every peer produces traffic by sending out advertisements, requests etc. As we have not made any simulations in the work, it is hard to estimate how an extensive network is defined. Due to this it is difficult to predict how this will affect the communication.

Page 14: Mobile ad hoc network  (manet) by himansu

•[1] T. Hara, ``Effective replica allocation in ad hoc networks for improving data accessibility,'' Proc. IEEE Infocom 2001, pp.1568-1576, 2001.•[2] T. Hara, ``Replica allocation methods in ad hoc networks with data update,'' ACM-Kluwer Journal on Mobile Networks and Applications, Vol.8, No.4, pp.343-354, 2003.•[3] T. Hara and S.K. Madria, ``Dynamic data replication schemes for mobile ad-hoc network based on aperiodic updates,'' Proc. Int'l Conf. on Database Systems for Advanced Applications (DASFAA 2004), pp.869-881, 2004. •[4] T. Hara, N. Murakami, and S. Nishio: ``Replica Allocation for Correlated Data Items in Ad-Hoc Sensor Networks,'' ACM SIGMOD Record, Vol.33, No.1, pp.38-43, 2004.•[5] H. Hayashi, T. Hara, and S. Nishio, ``Cache Invalidation for Updated Data in Ad Hoc Net-works,'' Proc. Int'l Conf. on Cooperative Information Systems (CoopIS'03), pp.516-535, 2003.•[6] G. Cao, L. Yin, C.R. Das, ``Cooperative Cache-Based Data Access in Ad Hoc Networks,'' IEEE Computer Magagine, Vol.37, No.2, pp. 32-39, 2004.•[7] L.D. Fife and L. Gruenwald, ``Research issues for data communication in mobile ad-hoc network database systems,'' ACM SIGMOD Record, Vol.32, No.2, pp.42-47, 2003.•[8] G. Karumanchi, S. Muralidharan, and R. Prakash, ``Information dissemination in partitionable mobile ad hoc networks,'' Proc. Symposium on Reliable Distributed Systems (SRDS'99), pp.4-13, 1999.•[9] J. Luo, J.P. Hubaux, and P. Eugster, ``PAN: Providing reliable storage in mobile ad hoc networks with probabilistic quorum systems,'' Proc. ACM MobiHoc 2003, pp.1-12, 2003.•[10] K. Rothermel, C. Becker, and J. Hahner, ``Consistent update diffusion in mobile ad hoc networks,'' Technical Report 2002/04, Computer Science Department, University of Stuttgart, 2002.•[11] F. Sailhan and V. Issarny, ``Cooperative caching in ad hoc networks,'' Proc. Int'l Conf. on Mobile Data Management (MDM'03), pp.13-28, 2003.•[12] K. Wang and B. Li, ``Efficient and guaranteed service coverage in partitionable mobile ad-hoc networks,'' Proc. IEEE Infocom'02, Vol.2, pp.1089-1098, 2002.•[13] http://www3.ietf.org/proceedings/00mar/47th-ietf-00mar-96.html

References

Page 15: Mobile ad hoc network  (manet) by himansu

Any queries ?Thank you