You are on page 1of 8

B.A.T.M.A.N.: Better Approach To Mobile AD-HOC Networks.

Mechanical Engg., #2 Electronics & Telecom Engg G. H. Raisoni College Of Engineering, CRPF Gate, Digdoh Hills, Nagpur, Maharastra, India.
1

Mr. Abhijeet Khandagale#1, Mr. Gaurav Gupta#2


#1

abhijeetkhan@gmail.com

gaurav.gupta2288@gmail.com +91-97660723081 +91-94221767742

ABSTRACT
In the next generation of wireless communication systems, there will be a need for the rapid deployment of independent mobile users. Significant examples include establishing survivable, efficient, dynamic communication for emergency/rescue operations, disaster relief efforts, and military networks. Such network scenarios cannot rely on centralized and organized connectivity, and can be conceived as applications of Mobile Ad Hoc Networks. In B.A.T.M.A.N. we bring forth the new arenas of applied MANETs, i.e. Mobile AdHoc Networks. The smart technologies intertwined with the existing, but unknown wireless networks, has been tapped to produce a new approach towards these AdHoc networks. The factors affecting them are discussed as well as the futuristic applications, which is a part of a hands-on project. MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. The set of applications for MANETs is diverse, ranging from small, static networks that are constrained by power sources, to large-scale, mobile, highly dynamic networks. The design of network protocols for these networks is a complex issue. Factors such as variable wireless link quality, propagation path loss, fading, multiuser interference, power expended, and

topological changes, become relevant issues. The network is able to adaptively alter the routing paths to alleviate any of these effects. Military networks are designed to maintain a low probability of intercept and/or a low probability of detection. The Better Approach To Mobile Ad-Hoc Networking, or B.A.T.M.A.N., is a routing protocol which is currently under development by the Freifunk-Community. B.A.T.M.A.N.'s crucial point is the decentralization of the knowledge about the best route through the network. B.A.T.M.A.N. has been shown to exhibit high levels of stability but slightly slow convergence times in real-world conditions; this is confirmed by theoretical analysis. Using this technique in our ongoing research on Communicating Robots or as we call them - COMBOTS; we attempt to demonstrate techniques which allow realistic explorations concerning the evolution of robot intelligence to respond to real world entities. Our knowledge about the scope of MANETs has been applied to incorporate the current traffic control system with the applications of Ad-Hoc Networks using trans-receiver sets. The current traffic system works on timed coding which needs to be altered if a situation arises, which is not viable every time. Hence we propose to switch to a more flexible method using B.A.T.M.A.N.

The age of the smart tech is in. So this scenario can be applied virtually as well physically in any environment. The range though contained for a device has a limit, this concept has limitless possibilities. Here dawns the age of the B.A.T.M.A.N.!!

Medium Access), approaches for medium access control and a kind of distance-vector routing PRNET were used on a trial basis to provide different networking capabilities in a combat environment. The second generation of ad-hoc networks emerged in 1980s, when the ad-hoc network systems were further enhanced and implemented as a part of the SURAN (Survivable Adaptive Radio Networks) program. This provided a packet-switched network to the mobile battlefield in an environment without infrastructure. This program proved to be beneficial in improving the radios' performance by making them smaller, cheaper, and resilient to electronic attacks. In the 1990s, the concept of commercial adhoc networks arrived with notebook computers and other viable communications equipment. At the same time, the idea of a collection of mobile nodes was proposed at several research conferences. The IEEE 802.11 subcommittee had adopted the term "ad-hoc networks" and the research community had started to look into the possibility of deploying ad-hoc networks in other areas of application. III. Operation B.A.T.M.A.N. does have elements of classical routing protocols: It detects other B.A.T.M.A.N. nodes and finds the best way (route) to these. It also keeps track of new nodes and informs its neighbours about their existence. In static networks, network administrators or technicians decide which computer is reached via which way or cable. As radio networks undergo constant changes and low participation-thresholds are a vital part of the Freifunk-networks' foundation this task has to be automated as far as possible. On a regular basis, every node sends out a so called broadcast (a general message to all)

I. Introduction With recent performance advancements in computer and wireless communications technologies, advanced mobile wireless computing is expected to see increasingly widespread use and application, much of which will involve the use of the Internet Protocol (IP) suite. Such networks are envisioned to have dynamic, sometimes rapidly-changing, random, multihop topologies which are likely composed of relatively bandwidth-constrained wireless links. A mobile ad-hoc network is a collection of mobile nodes forming an adhoc network without the assistance of any centralized structures. These networks introduced a new art of network establishment and can be well suited for an environment where either the infrastructure is lost or where deploy an infrastructure is not very cost effective. The whole life-cycle of ad-hoc networks could be categorized into the first, second, and the third generation adhoc networks systems. Present ad-hoc networks systems are considered the third generation. II. History The task was to create a protocol which was to be as easy, as small and as fast as possible. It seemed therefore sensible to split the development in several phases and implement complex functions using an iterative process: The first generation goes back to 1972. At the time, they were called PRNET (Packet Radio Networks). In conjunction with ALOHA (Areal Locations of Hazardous Atmospheres) and CSMA (Carrier Sense

thereby informing all its neighbours about its existence. The neighbours then relay this message to their neighbours and so on and so forth. This carries the information to every node in the network. In order to find the best way to a certain node, B.A.T.M.A.N counts the originator-messages received and logs which neighbour the message came in through. Like distance-vector protocols, but unlike link-state protocols, B.A.T.M.A.N does not try to determine the whole way, but, by using the originator-messages, only the package's first step in the right direction. The data is handed over to the next neighbour in that direction, who in turn uses the same mechanism. This process is repeated until the data reaches its destination. Besides for radio networks, B.A.T.M.A.N can also be used with common cable connections, such as Ethernet. i. Version one In the first phase, the routing algorithm was implemented and tested for its practicality and suitability for the task at hand. For the sending and receiving of originator-messages (information about existence) the UDP port 1966 was chosen. ii. Version two The version one algorithm made a significant assumption: As soon as a node receives existence data from another node, it assumes it can also send data back. In radio networks however, it may very well be that only oneway communication is possible. A mechanism was incorporated into the protocol to allow for this and to solve the arising problems. The mechanism enables the node to determine whether a neighbouring node provides bidirectional communication, only bidirectional nodes being considered part of the network, oneway nodes are no longer fully included.

iii. Version three The greatest innovation in this version is B.A.T.M.A.N's support of multiple network devices. Now a computer or router running B.A.T.M.A.N can be deployed on a central point, like a church or another high building, and have several wired or wireless network interfaces attached to it. When so deployed, B.A.T.M.A.N can relay network data in more than one direction without any retransmission delay. Certain unusual phenomena and special circumstances could appear during the determination of the best route through the network. These have been tackled and counteracted to prevent circular routing (which can prevent data reaching its destination) from occurring. A node can now inform the network that it provides access to the Internet. Other nodes use that information to evaluate whether there is a connection to the Internet close to them and what bandwidth is available. They can either use a specific gateway or allow B.A.T.M.A.N to determine which gateway to use, based on criteria such as connection speed. Announcing devices not running B.A.T.M.A.N themselves was also included in this version. Usually this method is used to connect house-networks to meshnetworks. An antenna installation on the roof will connect to the wireless network through B.A.T.M.A.N and the rest of the house will simply be announced thus also be reachable. IV. Application At present, as wireless-communication technology for intelligent transport systems (ITS), various techniques are being actively researched. "Vehicle-to-vehicle communication" (i.e., between similar carmounted devices fitted with wirelesscommunication functions such as wireless LAN and mobile phones in cars) and "road-

to-vehicle communication" (i.e., from service-centre servers connected through the internet via base stations located along the roadside to provide information delivery and remote-diagnosis services for cars) are being demanded (see Figure 1).

algorithm to recalculate the whole topologygraph (a particularly challenging task for the limited capabilities of embedded router HW), the limits of this algorithm have become a challenge. Recalculating the whole topology graph once in an actual mesh with 450 nodes takes several seconds on a small embedded CPU. The approach of the B.A.T.M.A.N algorithm is to divide the knowledge about the best end-to-end paths between nodes in the mesh to all participating nodes. Each node perceives and maintains only the information about the best next hop towards all other nodes. Thereby the need for a global knowledge about local topology changes becomes unnecessary. Additionally, an event-based but timelessfootnote{timeless in the sense that B.A.T.M.A.N never schedules nor timeouts topology information for optimising it's routing decisions} flooding mechanism prevents the accruement of contradicting topology information (the usual reason for the existence of routing loops) and limits the amount of topology messages flooding the mesh (thus avoiding overly overhead of control-traffic). The algorithm is designed to deal with networks that are based on unreliable links. The protocol algorithm of B.A.T.M.A.N can be described (simplified) as follows. Each node transmits broadcast messages (we call them originator messages or OGMs) to inform the neighbouring nodes about its existence. These neighbours are rebroadcasting the OGMs According to specific rules to inform their neighbours about the existence of the original initiator of this message and so on and so forth. Thus the network is flooded with originator messages. OGMs are small; the typical raw packet size is 52 byte including IP and UDP overhead. OGMs contain at least the address of the originator, the address of the node transmitting the packet, a TTL and a sequence number.

These Vehicle to vehicle communication better can be defined as P2P Communication ranges from cars to aircrafts. The MANETs have applications in our household, offices, roads and every single place we can think of, which has multiple things or networks around it. Households and offices use cordless phones, intranet, LAN, etc. Roads use smart driving techniques and navigation systems. V. B.A.T.M.A.N. Overview The problem with classical routing protocols is that they are typically not well suited for wireless ad-hoc networks. This is because such networks are unstructured, dynamically change their topology, and are based on an inherently unreliable medium. OLSR, the currently most employed protocol for such scenarios, has undergone a number of changes from its original specification in order to deal with the challenges imposed by city-wide wireless mesh networks. While some of its components proved to be unsuitable in practice (like MPR and Hysterese) new mechanisms have been added (like Fish-eye and ETX). However, due to the constant growth of existing community mesh networks and because of the inherent requirement of a link-state

OGMs that follow a path where the quality of wireless links is poor or saturated will suffer from packetloss or delay on their way through the mesh. Therefore OGMs that travel on good routes will propagate faster and more reliable. In order to tell if an OGM has been received once or more than once it contains a sequence number, given by the originator of the OGM. Each node re-broadcasts each received OGM at most once and only those received from the neighbour which has been identified as the currently best next hop (best ranking neighbour) towards the original initiator of the OGM. This way the OGMs are flooded selectively through the mesh and inform the receiving nodes about other node's existence. A node X will learn about the existence of a node Y in the distance by receiving it's OGMs?, when OGMs of node Y are rebroadcasted by its single hop neighbours. If node X has more than one neighbour, it can tell by the number of originator messages it receives quicker and more reliable via one of its single hop neighbours, which neighbour it has to choose to send data to the distant node. The algorithm then selects this neighbour as the currently best next hop to the originator of the message and configures its routing table respectively. VI. The B.A.T.M.A.N. The applications of these networks are seemingly unlimited. From household appliances to offices and from the traffic scenario to battlefields these networks prove to be a boon. A sensor network is collaborated with the Ad-Hoc network to simplify human effort providing security factor inbuilt. Household appliances and devices can be connected using any type of wired or unwired network. Say, Bluetooth or for larger areas; Wi-Fi. These networks can be programmed to identify a master switch

which can be a mobile phone, wristwatch or a chip inserted in the human body via a simple surgery. The on identifying the master switch in the vicinity of their network can be used to perform tasks in a preprogrammed fashion.

Our current innovation is using this network in the traffic scenario. Using simple sensors like photodiode, photo transistor, L.D.R., ultrasonic and IRs etc. The distance between two vehicles is to be measured. The critical distance is to be pre-programmed, which can be a length of 1m-3m as a standard. If the critical level is crossed, an override is functioned along with connection from a local server. On examining the complete scenario, either of the cars is made to recede or speed up until the critical levels are crossed back. Using further research, the vehicles can be made to communicate between themselves and resolve these issues. VII. The Gizmo With a smart home, you could quiet all of these worries with a quick trip online. When you're home, the house takes care of you by playing your favourite song whenever you walk in or instantaneously dimming the lights for a movie. Is it magic? No, it's home automation. Smart homes connect all the devices and appliances in your home so they can communicate with each other and with you. Anything in your home that uses electricity can be put on the home network and at your command. Whether you give that command

by voice, remote control or computer, the home reacts. Most applications relate to lighting, home security, home theatre and entertainment and thermostat regulation. VIII. Smart Technology Home Software and

meaning there's more than one way for the message to get to its destination. The green and red dots represent devices that could be connected to your smart home network. Z-Wave uses a Source Routing Algorithm to determine the fastest route for messages. Each Z-Wave device is embedded with a code, and when the device is plugged into the system, the network controller recognizes the code, determines its location and adds it to the network. When a command comes through, the controller uses the algorithm to determine how the message should be sent. Because this routing can take up a lot of memory on a network, Z-Wave has developed a hierarchy between devices: Some controllers initiate messages, and some are "slaves," which means they can only carry and respond to messages. ZigBee's name illustrates the mesh networking concept because messages from the transmitter zigzag like bees, looking for the best path to the receiver. While Z-Wave uses a proprietary technology for operating its system, ZigBee's platform is based on the standard set by the Institute for Electrical and Electronics Engineers (IEEE) for wireless personal networks. This means any company can build a ZigBee-compatible product without paying licensing fees for the technology behind it, which may eventually give ZigBee an advantage in the marketplace. Like Z-Wave, ZigBee has fully functional devices (or those that route the message) and reduced function devices (or those that don't). Using a wireless network provides more flexibility for placing devices, but like electrical lines, they might have interference. Insteon offers a way for your home network to communicate over both electrical wires and radio waves, making it a dual mesh network. If the message isn't getting through on one platform, it will try the other. Instead of routing the message, an Insteon device

Smart home technology was developed in 1975, when a company in Scotland developed X10. X10 allows compatible products to talk to each other over the already existing electrical wires of a home. All the appliances and devices are receivers, and the means of controlling the system, such as remote controls or keypads, are transmitters. If you want to turn off a lamp in another room, the transmitter will issue a message in numerical code that includes the following:

An alert to the system that it's issuing a command, An identifying unit number for the device that should receive the command and A code that contains the actual command, such as "turn off."

All of this is designed to happen in less than a second, but X10 does have some limitations. Communicating over electrical lines is not always reliable because the lines get "noisy" from powering other devices. An X10 device could interpret electronic interference as a command and react, or it might not receive the command at all. While X10 devices are still around, other technologies have emerged to compete for your home networking dollar. Instead of going through the power lines, some systems use radio waves to communicate, which is also how WiFi and cell phone signals operate. However, home automation networks don't need all the juice of a WiFi network because automation commands are short messages. The two most prominent radio networks in home automation are ZigBee and Z-Wave. Both of

will broadcast the message, and all devices pick up the message and broadcast it until the command is performed. The devices act like peers, as opposed to one serving as an instigator and another as a receptor. This means that the more Insteon devices that are installed on a network, the stronger the message will be. IX. Smart Traffic, Smart Planet In 2007, the world crossed an epochal threshold. For the first time in history, the majority of the human population lived in cities. And this urbanisation is accelerating. By 2010, there will be 59 metropolitan areas with populations greater than five million up 50% from 2001.

also the key to its solution. We need to stop focusing only on pieces of the problem: adding a new bridge, widening a road, putting up signs, establishing commuter lanes, encouraging carpooling or deploying traffic copters. Instead, we need to look at relationships across the entire system - and all the other systems that are touched by it: our supply chains, our environment, our companies...the way people and cities live and work. Traffic isn't just a line of cars: it's a web of connections. "Smart traffic" isn't yet the normbut it's not some far-off vision of tomorrow. In many places, IBM is helping to make it happen today. In Stockholm, a dynamic toll system based on the flow of vehicles into and out of the city has reduced traffic by 20%, decreased wait time by 25% and cut emissions by 12%. In Singapore, controllers receive real-time data through sensors to model and predict traffic scenarios with 90% accuracy. And in Kyoto, city planners simulate large-scale traffic situations involving millions of vehicles to analyse urban impact. All of this is possible because cities can infuse intelligence into their entire transportation systemstreets, bridges, intersections, signs, signals and tolls, which can all be interconnected and made smarter. Smarter traffic systems can improve drivers' commutes, give better information to city planners, increase the productivity of businesses and raise citizens' quality of life. They can reduce congestion, shrink fuel use and cut CO2 emissions. Our rapidly urbanising planet depends on getting people and things from here to there. In the 20th century, that meant freeways from state to state and nation to nation. In the 21st century, "smart" traffic systems can be the new milestone of progress.

Many of those new city dwellers will be driving cars, and the products they consume will be arriving in trucks. So if you think your day is plagued by gridlock now, what might the future hold? Quite simply, our transportation infrastructure and management approaches can't handle the world's traffic. In the U.S. alone, 3.7 billion hours are lost to people sitting in traffic every year, and 2.3 billion gallons of fuel - enough to fill 58 supertankersburn needlessly, at a cost of $78 billion per year. This isn't smartbut it can become so. The systemic nature of urban transportation is

X. Conclusions We have used a simple RF module working at 434MHz for point to point as well as point to multi-point communication. Using a motor driver in the circuit helps to control any type of motor at its optimum value. The transmitter contains the RF chip, ICMultiplexer. The receiver end has the receiver and two ICs, demultiplexer and the motor driver IC. The multiplexer acts as the encoder and demux acts as the decoder. The encoder sends in encrypted signals to the decoder via the RF. These signals are then appropriately processed by the decoder. Using simple circuits, it is thus possible to provide robotic artificial intelligence to these circuits which have limitless uses. We are using two frequencies 434MHz and 312MHz. Efforts are on to take this to 2.4GHz. This will induce security feature and transmission can be encrypted. XI. References www.antd.nist.gov http://www.open-mesh.net/ http://www.pcmag.com/encyclopedia _term/0,2542,t=mobile+ad+hoc+net work&i=47135,00.asp.htm

and Pervasive. Cti M G Hill 2005 Computing, McGraw Hill, 2005. Tomas Krag and Sebastian Bettrich (2004-01-24). "Wireless Mesh Networking". O'Reilly Wireless Dev Center. http://www.oreillynet.com/pub/a/wire less/2004/01/22/wirelessmesh.html. Retrieved 2009-01-20. M. Abolhasan, B. Hagelstein, J. C.-P. Wang (2009). Real-world performance of current proactive multi-hop mesh protocols. http://ro.uow.edu.au/infopapers/736/. J. Chroboczek. "A few comments on the BATMAN routing protocol". http://lists.alioth.debian.org/pipermail /babel-users/2008August/000151.html. http://www07.ibm.com/ibm/ideasfromibm/in/sm arterplanet/opinions/opinion_200812 01.html

M. Abolhasan, B. Hagelstein, J. C.-P. Wang (2009). Real-world performance of current proactive multi-hop mesh protocols. http://ro.uow.edu.au/infopapers/736/. J. Chroboczek. "A few comments on the BATMAN routing protocol". http://lists.alioth.debian.org/pipermail /babel-users/2008August/000151.html. Chapters 8-11, F. Adelstein, S.K.S. Gupta, G.G. Richard III and L. Schwiebert, Fundamentals of Mobile

You might also like