Professional Documents
Culture Documents
MC Unit5
MC Unit5
MC Unit5
MANET stands for Mobile Adhoc Network also called a wireless Adhoc network or
Adhoc wireless network that usually has a routable networking environment on top of
a Link Layer ad hoc network.They consist of a set of mobile nodes connected
wirelessly in a self-configured, self-healing network without having a fixed
infrastructure. MANET nodes are free to move randomly as the network topology
changes frequently. Each node behaves as a router as they forward traffic to other
specified nodes in the network.
MANET may operate a standalone fashion or they can be part of larger internet. They
form a highly dynamic autonomous topology with the presence of one or multiple
different transceivers between nodes .
Characteristics of MANET –
Dynamic Topologies:
Network topology which is typically multihop may change randomly and
rapidly with time, it can form unidirectional or bi-directional links.
Bandwidth constrained, variable capacity links:
Wireless links usually have lower reliability, efficiency, stability, and
capacity as compared to a wired network
Autonomous Behavior:
Each node can act as a host and router, which shows its autonomous
behavior.
Energy Constrained Operation:
As some or all the nodes rely on batteries or other exhaustible means for
their energy. Mobile nodes are characterized by less memory, power, and
lightweight features.
Limited Security:
Wireless networks are more prone to security threats. A centralized
firewall is absent due to the distributed nature of the operation for
security, routing, and host configuration.
Less Human Intervention:
They require minimum human intervention to configure the network,
therefore they are dynamically autonomous in nature.
#Localization
Range-based: Utilizing measures like time of flight, signal strength, or angle of arrival to
estimate distances between nodes.
Range-free: Using connectivity information and relative positions of neighboring nodes
to estimate node locations.
Collaborative Localization: Nodes cooperate to determine their positions by
exchanging information with neighboring nodes.
Centroid Localization: Nodes estimate their positions based on the average position of
their neighbors.
Multidimensional Scaling (MDS): Based on pairwise distance measurements between
nodes.
Distributed Localization Algorithms: Nodes collaborate to iteratively refine their
positions using local information.
4. Challenges:
Routing: Efficient routing protocols can utilize location information for forwarding
packets.
Target Tracking: Localizing nodes can be used for tracking moving objects or targets
within the network.
Geographic Routing: Routing packets based on geographic location to optimize
communication paths.
2.Time-varying channel :
Time-varying channels include the three mechanisms for radio signal propagations
they are Reflection, Diffraction, and Scattering.
Reflection –
This occurs when a propagating wave carrying information intrudes( घुसपैठ) on an
object that has very large dimensions than the wavelength of the wave.
Diffraction –
This occurs when the radio path between the transmitter and the receiver is
collided by the surface with sharp edges. This is a phenomenon which causes the
diffraction of the wave from the targeted position.
Scattering –
This occurs when the medium through from the wave is traveling consists of some
objects which have dimensions smaller than the wavelength of the wave.
While transmitting the signal by the node these are time shifted and this is called
multipath propagation.
3. Burst channel errors :
Burst channel errors are called as a contiguous sequence of symbols, which are
received in a communication channel, in which the first and last symbols have an error
and there is no evidence of contiguous sub-sequence of corrected received symbols.
When time-varying channels are used then signals strengths are introduced due to
which errors are observed in transmission. For these channels in wireline networks,
the Bit rate is high as 10 -3.
# Routing
Routing is the process of finding the best path for traffic in a network, or across multiple
networks. The role of routing is similar to the road map for a hotel. In both cases, we
need to deliver messages at proper location and in an appropriate way.
Routing in a mobile ad-hoc network depends on many factors such as:
o Modeling of the topology,
o Selection of routers,
o Initiation of a route request,
o And specific underlying characteristics that could serve as heuristics in finding the
path effectively.
Routing Classification
Routing protocol can be classified as:
1. Proactive Protocol
2. Reactive Protocol
3. Hybrid Protocol
1. Proactive Protocol
Proactive protocols attempt to evaluate continuously the routes within the network. It
means proactive protocol continuously maintain the routing information, so that when a
packet needs to be forwarded, the path is known already and can be immediately used.
The family of distance vector protocols is an example of proactive scheme.
2 Reactive Protocols
Reactive protocols do not maintain routes but invoke a route determination procedure
only on demand or we can say reactive protocols build the routes only on demand.
Thus, when a route is required, some sort of global search procedure is initiated. The
family of classical flooding algorithms belongs to the reactive protocol group.
3. Hybrid Protocols
Hybrid protocols attempt to take advantage of best of reactive and proactive schemes.
The basic idea behind such protocols is to initiate route discovery on demand but at a
limited search cost. One of the popular hybrid protocols is zone routing protocol (ZRP).
Key Concepts
1. Routing Table: Each node maintains a routing table that contains the shortest distance and the
first hop to every other node in the network.
2. Sequence Numbers: Each entry in the routing table is tagged with a sequence number, which is
originated by the destination node. These sequence numbers are used to distinguish stale
routes from fresh ones, thus avoiding the formation of routing loops.
How It Works
1. Table Updates: Each node periodically transmits updates of its routing table to its
immediate neighbors. These updates can be:
Full Dump: A complete dump of the routing table, which is sent infrequently.
Incremental: Smaller updates that reflect changes since the last full dump, which are sent more
frequently.
Advantages of DSDV
Loop-Free: The use of sequence numbers ensures that routes are loop-free.
Timely Updates: Regular updates help maintain accurate routing information.
Simplicity: The protocol is straightforward to implement, making it suitable for dynamic
environments.
Disadvantages of DSDV
Overhead: Frequent updates can consume significant bandwidth and processing power,
especially in large networks.
Scalability: The protocol may not scale well in very large networks due to the overhead of
maintaining and propagating routing tables.
DSDV is well-suited for smaller networks with moderate mobility, where the overhead of
maintaining up-to-date routing information is manageable. For larger networks or those
with high mobility, on-demand routing protocols like AODV (Ad hoc On-Demand
Distance Vector) might be more efficient.
1. Dynamic Topology:
Nodes in a MANET move frequently, causing frequent changes in network topology. This makes
it difficult to maintain consistent paths for data transmission.
2. Limited Bandwidth:
Wireless communication in MANETs typically has lower bandwidth compared to wired networks.
The available bandwidth can also vary due to interference and node mobility.
3. Energy Constraints:
Mobile nodes are often battery-powered, making energy efficiency a critical concern. QoS
mechanisms must be designed to minimize energy consumption while maintaining service
quality.
4. Scalability:
Ensuring QoS in large-scale MANETs can be challenging due to the increased complexity of
managing resources and maintaining stable routes.
1. Routing Protocols:
Proactive Routing (Table-Driven): Maintain up-to-date routing information from each node to
every other node. Examples include OLSR (Optimized Link State Routing) and DSDV
(Destination-Sequenced Distance-Vector).
Reactive Routing (On-Demand): Find routes only when needed. Examples include AODV (Ad-
hoc On-Demand Distance Vector) and DSR (Dynamic Source Routing).
Hybrid Routing: Combine proactive and reactive approaches. An example is ZRP (Zone Routing
Protocol).
2. Resource Reservation:
Methods like RSVP (Resource Reservation Protocol) can be adapted for MANETs to reserve
resources along the path of the data flow.
3. Admission Control:
Mechanisms to determine whether the network has enough resources to accommodate a new
QoS request without affecting existing services.
# Application of manet
Mobile Ad Hoc Networks (MANETs) are self-configuring networks of mobile devices
connected by wireless links, without relying on any fixed infrastructure like routers or
access points. They offer a wide range of applications due to their flexibility, scalability,
and ease of deployment. Here are some key applications of MANETs:
1. Military Communication:
Search and Rescue Operations: MANETs facilitate coordination among rescue teams in
areas where the existing communication infrastructure is unavailable or destroyed.
Natural Disasters: During events like earthquakes, floods, or hurricanes, MANETs can
help establish temporary communication networks to aid emergency services and
humanitarian aid delivery.
3. Smart Agriculture:
Precision Farming: MANETs can support communication between various sensors and
devices in a smart farm, enabling better monitoring and management of agricultural
resources.
Livestock Monitoring: MANETs can be used to track the location and health of
livestock, providing real-time data to farmers.
4. Healthcare:
Mobile Health Units: In rural or remote areas, MANETs can connect mobile health units
to provide medical services and share patient data with central hospitals.
Patient Monitoring: Wearable devices can form a MANET to monitor patients' health
parameters and alert healthcare providers in case of emergencies.
6. Environmental Monitoring:
Wildlife Tracking: MANETs can be used to monitor and track wildlife movements,
helping in conservation efforts and studying animal behavior.
Pollution Monitoring: MANETs can support networks of sensors to monitor air and
water quality, providing data for environmental protection agencies.
Home Automation: MANETs can connect various smart devices in a home, allowing
them to communicate and coordinate tasks like security, energy management, and
entertainment.
IoT Networks: MANETs can serve as the backbone for Internet of Things (IoT)
applications, supporting communication among a wide range of smart devices.
8. Educational Institutions:
Campus Networks: Universities and schools can deploy MANETs to provide flexible and
temporary networking solutions for students and staff, especially during events or
outdoor classes.