You are on page 1of 8

`MANET: A mobile ad hoc network (MANET) is generally defined as a network that has many

free or autonomous nodes, often composed of mobile devices or other mobile pieces, that
can arrange themselves in various ways and operate without strict top-down network
administration.
APPLICATIONS

Military Sector : Military equipment now routinely contains some sort of computer equipment. Ad-
hoc networking would allow the military to take advantage of commonplace network technology to
maintain an information network between the soldiers, vehicles, and military information
headquarters. The basic techniques of ad hoc network came from this field

Commercial Sector: Ad hoc can be used in emergency/rescue operations for disaster relief efforts,
e.g. in fire, flood, or earthquake. This may be because all of the equipment was destroyed, or
perhaps because the region is too remote. Rescuers must be able to communicate in order to make
the best use of their energy, but also to maintain safety. By automatically establishing a data
network with the communications equipment that the rescuers are already carrying, their job made
easier. Other commercial scenarios include e.g. ship-to-ship ad hoc mobile communication, law
enforcement, etc.

Low Level: Appropriate low level application might be in home networks where devices can
communicate directly to exchange information. Similarly in other civilian environments like taxicab,
sports stadium, boat and small aircraft, mobile ad hoc communications will have many applications.

Data Networks: A commercial application for MANETs includes ubiquitous computing. By allowing
computers to forward data for others, data networks may be extended far beyond the usual reach of
installed infrastructure. Networks may be made more widely available and easier to use.

Sensor Networks: This technology is a network composed of a very large number of small sensors.
These can be used to detect any number of properties of an area. Examples include temperature,
pressure, toxins, pollutions, etc. The capabilities of each sensor are very limited, and each must rely
on others in order to forward data to a central computer. Individual sensors are limited in their
computing capability and are prone to failure and loss. Mobile ad-hoc sensor networks could be the
key to future homeland security.
Challenges in MANET:

A. Autonomous- No centralized administration entity is available to manage the operation of the


different mobile nodes.

B. Dynamic topology- Nodes are mobile and can be connected dynamically in an arbitrary manner.
Links of the network vary timely and are based on the proximity of one node to another node.

C. Device discovery- Identifying relevant newly moved in nodes and informing about their existence
need dynamic update to facilitate automatic optimal route selection.

D. Bandwidth optimization- Wireless links have significantly lower capacity than the wired links.
Routing protocols in wireless networks always use the bandwidth in an optimal manner by keeping
the overhead as low as possible. The limited transmission range also imposes a constraint on routing
protocols in maintaining the topological information. Especially in MANETS due to frequent changes
in topology, maintaining the topological information at all nodes involves more control overhead
which, in turn, results in more bandwidth wastage.

E. Limited resources - Mobile nodes rely on battery power, which is a scarce resource. Also storage
capacity and power are severely limited.

F. Scalability- Scalability can be broadly defined as whether the network is able to provide an
acceptable level of service even in the presence of a large number of nodes.

G. Limited physical security- Mobility implies higher security risks such as peer-to- peer network
architecture or a shared wireless medium accessible to both legitimate network users and malicious
attackers. Eavesdropping, spoofing and denial-of-service attacks should be considered.

H. Infrastructure-less and self operated- Self healing feature demands MANET should realign itself to
blanket any node moving out of its range.

I. Poor Transmission Quality- This is an inherent problem of wireless communication caused by


several error sources that result in degradation of the received signal.

J. Ad hoc addressing- Challenges in standard addressing scheme to be implemented.

K. Network configuration- The whole MANET infrastructure is dynamic and is the reason for dynamic
connection and disconnection of the variable links.

L. Topology maintenance- Updating information of dynamic links among nodes in MANETs isa major
challenge.
DSR: The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed
specifically for use in multi-hop wireless ad hoc networks of mobile nodes.

DSR allows the network to be completely self-organizing and self-configuring, without the need for
any existing network infrastructure or administration.

It is a reactive protocol and all aspects of the protocol operate entirely on-demand basis. It works
on the concept of source routing. Source routing is a routing technique in which the sender of a
packet determines the complete sequence of nodes through which, the packets are forwarded.

Example

In the following example, the route discovery procedure is shown where


S1 is the source node and S7 is the destination node.

In this example, the destination S7, gets the request through two paths. It chooses
one path based on the route records in the incoming packet and sends a reply
using the reverse path to the source node. At each hop, the best route with
minimum hop is stored. In this example, it is shown the route record status ate
each hop to reach the destination from the source node. Here, the chosen route is
S1-S2-S4-S5-S7.
AODV

 In Ad-Hoc On Demand Distance Vector Routing, the source node and


destination nodes IP addresses are already known.
 The goal is to identify, discover and maintain the optimal route between
source and destination node in order to send/receive data packets and
informative.
 Each node comprises of a routing table along with below mentioned
format of Route Request(RREQ) packet.

RREQ { Destination IP, Destination Sequence Number, Source IP, Source


Sequence Number, Hop Count}.

 Consider a network containing 5 nodes that are “X”, “Y”, “Z”,”T”,”D”


present at unit distance from each other, where “X” being the source
node and “D” being the destination node.

Ad-Hoc On Demand Distance Vector Routing : Sample Network

 The IP addresses of source node “X” and destination node “D” is


already known. Below mentioned steps will let you know how AODV
works and concept of Route Request(REREQ) and Route
Response(RRESP) is used.
o Step 1: Source node “X” will send Route Request i.e. RREQ
packet to its neighbours “Y” and “Z”.
o Step 2: Node “Y” & “Z” will check for route and will respond using
RRESP packet back to source “X”. Here in this case “Z” is the last
node but the destination. It will send the RREQ packet to “X”
stating “Route Not Found”. But node “Y” will send RRESP packet
stating “Route Found” and it will further broadcast the RRESP to
node “T”.
o Step 3: Now the field of net hop in the RREQ format will be
updated, Node “T” will send back the “Route Found” message to
Node “Y” and will update the next hop field further.
o Step 4: Then Node “T” will broadcast and RREQ packet to Node
“D”, which is the destination and the next hop field is further
updated. Then it will send RRES packet to “T” which will further
be sent back to the source node “X” via node “Y” and Node “T”
resulting in generation of an optimal path. The updated network
would be:

Ad-Hoc On Demand Distance Vector Routing : Network


DSDV

 In DSDV, nodes broadcasts their routing tables to


immediate neighbors with the sequence number. Every time any
broadcasting occurs, the sequence number is also updated along with
distances of nodes.
 Consider a network of 3 nodes having distances of “1” on each of the
edges respectively. Below mentioned steps will let you know how DSDV
works and routing tables are updated.

Destination Sequenced Distance Vector Routing : Sample Network

 Step-1: Draw separate tables for all the nodes “X”, “Y” & “ Z” along with
the distance and sequence number.
 If “Y” wants to broadcast the routing table. Then updated routing tables
of all the nodes in the network will look like as depicted in the below
tables where red marked cell denotes the change in sequence number.
J2ME

Sun Microsystems defines J2ME as "a highly optimized Java run-time environment targeting awide
range of consumer products, including pagers, cellular phones, screen-phones, digital set top boxes
and car navigation systems." J2ME brings the cross-platform functionality of the Java language to
smaller devices, allowing mobile wireless devices to share applications. Java 2 Micro Edition
maintains the qualities that Java technology has become known for:

built-in consistency across products in terms of running anywhere, anytime, on any device

the power of a high-level object-oriented programming language with a large developer base;

portability of code;

safe network delivery; and

upward scalability with J2SE and J2EE

While connected consumer devices such as cell phones, pagers, personal organizers and set-top
boxes have many things in common, they are also diverse in form, function and features.
Information appliances tend to be special-purpose, limited-function devices. To address this
diversity, an essential requirement for J2ME is not only small size but also modularity and
customizability. The J2ME architecture is modular and scalable so that it can support the kinds of
flexible deployment demanded by the consumer and embedded markets. To support this kindof
customizability and extensibility, two essential concepts are defined by J2ME:

Configuration. A J2ME configuration defines a minimum platform for a “horizontal” Category or


grouping of devices, each with similar requirements on total memory budget and processing power.

A configuration defines the Java language and virtual machine features and minimum class libraries
that a device manufacturer or a content provider can expect to be available on all devices of the
same category.

Profile. A J2ME profile is layered on top of (and thus extends) a configuration. A profile addresses
the specific demands of a certain “vertical” market segment or device family. The main goal of a
profile is to guarantee interoperability within a certain vertical device family or domain by defining a
standard Java platform for that market. Profiles typically include

You might also like