Professional Documents
Culture Documents
free or autonomous nodes, often composed of mobile devices or other mobile pieces, that
can arrange themselves in various ways and operate without strict top-down network
administration.
APPLICATIONS
Military Sector : Military equipment now routinely contains some sort of computer equipment. Ad-
hoc networking would allow the military to take advantage of commonplace network technology to
maintain an information network between the soldiers, vehicles, and military information
headquarters. The basic techniques of ad hoc network came from this field
Commercial Sector: Ad hoc can be used in emergency/rescue operations for disaster relief efforts,
e.g. in fire, flood, or earthquake. This may be because all of the equipment was destroyed, or
perhaps because the region is too remote. Rescuers must be able to communicate in order to make
the best use of their energy, but also to maintain safety. By automatically establishing a data
network with the communications equipment that the rescuers are already carrying, their job made
easier. Other commercial scenarios include e.g. ship-to-ship ad hoc mobile communication, law
enforcement, etc.
Low Level: Appropriate low level application might be in home networks where devices can
communicate directly to exchange information. Similarly in other civilian environments like taxicab,
sports stadium, boat and small aircraft, mobile ad hoc communications will have many applications.
Data Networks: A commercial application for MANETs includes ubiquitous computing. By allowing
computers to forward data for others, data networks may be extended far beyond the usual reach of
installed infrastructure. Networks may be made more widely available and easier to use.
Sensor Networks: This technology is a network composed of a very large number of small sensors.
These can be used to detect any number of properties of an area. Examples include temperature,
pressure, toxins, pollutions, etc. The capabilities of each sensor are very limited, and each must rely
on others in order to forward data to a central computer. Individual sensors are limited in their
computing capability and are prone to failure and loss. Mobile ad-hoc sensor networks could be the
key to future homeland security.
Challenges in MANET:
B. Dynamic topology- Nodes are mobile and can be connected dynamically in an arbitrary manner.
Links of the network vary timely and are based on the proximity of one node to another node.
C. Device discovery- Identifying relevant newly moved in nodes and informing about their existence
need dynamic update to facilitate automatic optimal route selection.
D. Bandwidth optimization- Wireless links have significantly lower capacity than the wired links.
Routing protocols in wireless networks always use the bandwidth in an optimal manner by keeping
the overhead as low as possible. The limited transmission range also imposes a constraint on routing
protocols in maintaining the topological information. Especially in MANETS due to frequent changes
in topology, maintaining the topological information at all nodes involves more control overhead
which, in turn, results in more bandwidth wastage.
E. Limited resources - Mobile nodes rely on battery power, which is a scarce resource. Also storage
capacity and power are severely limited.
F. Scalability- Scalability can be broadly defined as whether the network is able to provide an
acceptable level of service even in the presence of a large number of nodes.
G. Limited physical security- Mobility implies higher security risks such as peer-to- peer network
architecture or a shared wireless medium accessible to both legitimate network users and malicious
attackers. Eavesdropping, spoofing and denial-of-service attacks should be considered.
H. Infrastructure-less and self operated- Self healing feature demands MANET should realign itself to
blanket any node moving out of its range.
K. Network configuration- The whole MANET infrastructure is dynamic and is the reason for dynamic
connection and disconnection of the variable links.
L. Topology maintenance- Updating information of dynamic links among nodes in MANETs isa major
challenge.
DSR: The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed
specifically for use in multi-hop wireless ad hoc networks of mobile nodes.
DSR allows the network to be completely self-organizing and self-configuring, without the need for
any existing network infrastructure or administration.
It is a reactive protocol and all aspects of the protocol operate entirely on-demand basis. It works
on the concept of source routing. Source routing is a routing technique in which the sender of a
packet determines the complete sequence of nodes through which, the packets are forwarded.
Example
In this example, the destination S7, gets the request through two paths. It chooses
one path based on the route records in the incoming packet and sends a reply
using the reverse path to the source node. At each hop, the best route with
minimum hop is stored. In this example, it is shown the route record status ate
each hop to reach the destination from the source node. Here, the chosen route is
S1-S2-S4-S5-S7.
AODV
Step-1: Draw separate tables for all the nodes “X”, “Y” & “ Z” along with
the distance and sequence number.
If “Y” wants to broadcast the routing table. Then updated routing tables
of all the nodes in the network will look like as depicted in the below
tables where red marked cell denotes the change in sequence number.
J2ME
Sun Microsystems defines J2ME as "a highly optimized Java run-time environment targeting awide
range of consumer products, including pagers, cellular phones, screen-phones, digital set top boxes
and car navigation systems." J2ME brings the cross-platform functionality of the Java language to
smaller devices, allowing mobile wireless devices to share applications. Java 2 Micro Edition
maintains the qualities that Java technology has become known for:
built-in consistency across products in terms of running anywhere, anytime, on any device
the power of a high-level object-oriented programming language with a large developer base;
portability of code;
While connected consumer devices such as cell phones, pagers, personal organizers and set-top
boxes have many things in common, they are also diverse in form, function and features.
Information appliances tend to be special-purpose, limited-function devices. To address this
diversity, an essential requirement for J2ME is not only small size but also modularity and
customizability. The J2ME architecture is modular and scalable so that it can support the kinds of
flexible deployment demanded by the consumer and embedded markets. To support this kindof
customizability and extensibility, two essential concepts are defined by J2ME:
A configuration defines the Java language and virtual machine features and minimum class libraries
that a device manufacturer or a content provider can expect to be available on all devices of the
same category.
Profile. A J2ME profile is layered on top of (and thus extends) a configuration. A profile addresses
the specific demands of a certain “vertical” market segment or device family. The main goal of a
profile is to guarantee interoperability within a certain vertical device family or domain by defining a
standard Java platform for that market. Profiles typically include