Professional Documents
Culture Documents
INTRODUCTION
computing devices have raised the importance of mobile and wireless networking.
Mobile Ad-hoc Networks (MANET) are specific network configurations that appear
in the context of these networks. They provide a powerful paradigm for modelling
fourth generation mobile networks. In recent years, Ad-Hoc Networks have seen a
application needs together with the availability of low cost peripherals (laptops,
1.1. Motivation
between mobile users is becoming more popular than before. This is due to recent
between two hosts. The first is to let the existing cellular network infrastructure carry
data as well as voice. Most of the wireless mobile computing applications today
require single hop wireless connectivity to the wired network. This is the traditional
cellular network model, which supports the current mobile computing needs by
installing Base Stations (BSs) and access points. In such networks, communications
between two mobile hosts completely rely on the wired backbone and the fixed BSs.
1
A mobile host is only one hop away from a BS. The major problems include the
problem of handoff, which tries to handle the situation when a connection should be
smoothly handed from one station to another base station without noticeable delay or
packet loss. The other problem is that networks based on the cellular structure are
limited to places.
The second approach is to form an Ad-Hoc network among all users wanting
may be available for use by a group of mobile hosts. Also there might be situations in
which setting up fixed access points is not a viable solution due to cost, convenience
and performance considerations. Still the group of mobile users may need to
communicate with each other and share information between them. In such situations,
network to which the hosts may normally be connected (Johnson, 1994). This means
that all users participating in the ad-hoc network must be willing to forward data
packets to make sure that packets are delivered from source to the destination. This
form of network is limited in range by the individual nodes transmission ranges and is
typically smaller compared to the range of cellular systems. This does not mean that
the cellular approach is better than the ad-hoc network approach. Ad-hoc networks
advantages include:
• On demand setup
• Fault tolerance
2
• Unconstrained connectivity
Ad-hoc networks are created, for example, when a group of people come
together and use wireless communication for some computer based collaborative
hoc networks can also be useful at conferences where people participating in the
conference can form a temporary network without engaging the services of any pre-
existing network. Since the nodes are forwarding packets for each other, some sort of
communication, the number of applications for ad-hoc networks has increased. Ad-
hoc networking can be applied anywhere where there are wireless devices connected
hoc network could be used by a group of wireless mobile hosts. This can be the case
destroyed.
3
Other examples include business associates wishing to share files in an airport
scenarios where attendees want to be able to easily share files. If each mobile host
wishing to communicate is equipped with a wireless local area network interface, the
groups of mobile host form an ad-hoc network. Ad-hoc networks are also suitable for
collection in open fields and sensor networks. Access to the internet and access to the
resources in networks such as printers are features that probably will also be
supported.
Mobile nodes have many unique characteristics that make traditional routing
topology due to the fact that nodes change their physical location by moving around.
This favours routing protocols that dynamically discover routes over conventional
routing algorithm like distance vector and link state (Peterson and Davie, 1999).
Another characteristic is that a host/node has very limited CPU capacity, storage
capacity, battery power and bandwidth, also referred to as a “thin client”. This means
that the power usage limits the radio transmission range. The access media, the radio
environment, also has special characteristics that must be considered when designing
protocols for ad-hoc networks. One example of this may be unidirectional links.
These links arise when for example two nodes have different strength on their
transmitters, allowing only one of the hosts to hear the other, but can also arise from
4
disturbances from the surroundings. Multihop in a radio environment may result in an
overall transmit capacity gain and power gain, due to the squared relation between
coverage and required output power. By using multihop, nodes can transmit the
packets with much lower output power. The protocol should be self starting and it
should be loop free at all times, because even a temporary routing loop wastes the
scare bandwidth. Routing protocol is necessary in ad-hoc network, if two hosts wishes
routing protocols have been proposed (Royer and Toh 1999; Sisodia et al 2002) which
were derived from distance vector or link state (Tanenbaum 2002) based on classical
routing algorithms.
Figure 1.1 illustrates an ad-hoc network with three mobile hosts. Node C is not
packets with node C, then it makes use of node B to forward packets, since node B is
an overlap between node A and node C. This situation becomes more complicated if
more nodes are added within the network. An Ad-hoc routing protocol must be able to
decide the best path between nodes, minimize the bandwidth overhead to enable
proper routing, minimize the time required to converge after the topology changes.
5
1.4. Taxonomy
according to several criteria as shown in Figure 1.2, reflecting the fundamental design
• Communication model
• Structure
• State information
• Scheduling
combines channel assignment and routing functionality. Such protocols are used in
Time Division Multiple Access (TDMA) or Code Division Multiple Access (CDMA)
(CGSR).
6
Figure 1.2 Classification of MANET
7
A larger class of protocols assumes that nodes communicate over a single
logical wireless channel. These protocols are Carrier Sense Multiple Access
(CSMA)/Collision Avoidance (CA) oriented, where they relay on specific link layer
behaviours. Some MANET routing protocols are based on specific link layer
used by popular IEEE 802.11, MAC layers to avoid collisions due to hidden and
exposed terminals. There are few protocols, which are based on physical layer
information such as signal strength, or geographic position into the routing algorithm.
1.4.2. Structure
Uniform protocols: In a uniform protocol, none of the nodes take a distinguished role
in routing scheme; each node sends and responds to routing control messages in same
neighbours
8
1.4.3. State information
• Topology based
• Destination based
Topology based protocol: These protocols are based on link state protocols. Nodes
Destination based protocols: These protocols are Distance Vector protocols, where
each node maintain a distance and vector (next hop) to a destination. Each node
exchanges its distance estimates for all other network nodes with each of its
immediate neighbours. Such algorithms behave poorly leading to routing loops and
maintains distance vector routing information for active destination to which they are
1.4.4. Scheduling
• Proactive protocols
9
• On-demand protocols
Proactive protocols: These are table driven, routing protocols, which maintain routing
information for all destination at every source. Fixed network routing protocols are
On-Demand protocols: These are class of reactive protocols where routes are
discovered based on demand. These protocols consist of “route discovery”, and “route
maintenance”.
Route discovery: This process is initiated when a source needs a route to the
receiving the requests records the link from which it has received and rebroadcasts it.
When the request reaches the destination, a route reply is sent back to the source
through the intermediate nodes. Once the reply reaches the source, data traffic is sent
to the destination. To ensure route request reaches the destination, flooding the
network with route request messages. This may lead to “broadcast storm problem”.
10
• Using sequence we can hop limit the route request.
rebroadcasters.
Route maintenance: Is a process which deletes failed routes and re-initiates route
discovery in case of topology change. If failure is in the upper layer, route discovery
must be initiated at the source node. If it is a hop by hop failure then passive
acknowledgements are used for route discovery process to repair the broken route.
If the conventional routing protocols do not meet our demands, we need a new
routing protocol. The question is what properties should such protocols have? The
following are some of the desired properties (Corson M.S, and Macker J, 1999) that
are desirable
reliability. When all nodes are mobile, it is unacceptable to have a centralized routing
protocol. Each node should be intelligent enough to make routing decisions using
idea.
11
Loop free: To improve the overall performance, it is necessary that the routing
protocol must guarantee the routes supplied are loop free. This avoids bandwidth
Demand based operation: The routing algorithm should adapt to traffic on demand
for efficient utilization of network energy and bandwidth resources. This means that
the protocol should only react when needed and that the protocol should not
Unidirectional link support: The radio environment can cause the formation of
unidirectional links. Instead of depending only on bidirectional links these links also
security measures. Authentication and encryption is probably the way to go. But
distributing the keys among the nodes in the ad-hoc network becomes an issue. There
are also discussions about using IP-Sec that uses tunnelling to transport all packets.
12
Power consumption: The nodes in an ad-hoc network can be laptops and thin clients
such as PDAs that are very limited in battery power and therefore uses some sort of
stand-by mode to save power. It is therefore important that the routing protocol has
Multiple routes: Multiple routes could be used to reduce the number of reactions to
topological changes and congestion. If one route has become invalid, it is possible
that another stored route could be still valid and thus saving the routing protocol from
into the routing protocol which will depend on the utilisation of these networks. For
None of the proposed protocol from MANET has all these properties, but it is
necessary to remember that the protocols are still under development and will
different mobility models. On demand routing protocols do not need to keep any entry
for each destination router in the routing table and maintain the information by
periodic updates of the routing table. The overhead of storage and channel utilization
limits the scalability of MANETs where each mobile node is a router. By maintaining
13
only the active entries on an on-demand basis one can reduce overhead, thus
improving performance and scalability. There are currently two popular on-demand
simulator, NS-2
• Insight into where areas of improvement can be made in the area of mobility
normalized routing load, end to end delay for the routing protocols based on different
between any two nodes transferring data and on the duration of interconnections
between nodes of a data path containing n-nodes. These parameters which are
14
Figure 1.3 Relationship between protocol performance and mobility model
The mobility of the nodes affects the number of average connected paths
which in turn affect the performance of the routing algorithm as shown in Figure 1.3.
Moreover the applicability and suitability of the routing protocols in urban and
military deployment set up scenario will also be considered. The simulation will take
into consideration the constraints that are experienced by military operations and the
environment.
15