You are on page 1of 17

ROFEL BBA & BCA College, VAPI

Unit-3
Mobile Ad hoc
network
503 NETWORK TECHNOLOGIES

Asst. Prof. Zinkal Patel


ROFEL BBA & BCA COLLEGE VAPI
Unit-3 Mobile Ad hoc network

3.1 Concepts and types of MANET (Mobile Ad hoc network)


3.1.1 VANET (Vehicular Ad hoc Network)
3.1.2 Smart phone Ad hoc Network (SPANC)
3.1.3 Flying Ad hoc network (FANET)
3.2 Concepts of OSI (Open Source Interconnection) layers
3.2.1 Types of layers
3.2.2 Introduction of OSI layers and their purpose:
Physical layer, Data link layer, Network layer,
Transport layer and Session layer

Concepts and types of MANET (Mobile Ad hoc network)


 A mobile ad hoc network (MANET) is a continuously self-configuring, self-organizing,
infrastructure-less network of mobile devices connected without wires. It is
sometimes known as "on-the-fly" networks or "spontaneous networks".

 A MANET consists of a number of mobile devices that come together to form a


network as needed, without any support from any existing internet infrastructure or
any other kind of fixed stations.

 A MANET can be defined as an autonomous system of nodes or MSs(also serving as


routers) connected by wireless links, the union of which forms a communication
network modelled in the form of an arbitrary communication graph.

 This is in contrast to the well-known single hop cellular network model that supports
the needs of wireless communication between two mobile nodes relies on the wired
backbone and fixed base stations.

 In a MANET, no such infrastructure exists and network topology may be changed


dynamically in an unpredictable manner since nodes are free to move and each node
has limiting transmitting power, restricting access to the node only in the
neighbouring range.

Zinkal Patel Page 1


Unit-3 Mobile Ad hoc network

 MANETs are basically peer-to-peer, multi-hop wireless networks in which information


packets are transmitted in a store and forward manner from a source to an arbitrary
destination, via intermediate nodes as given in the figure:

Characteristics

 Dynamic Topologies: Network topology which is typically multi hop may change
randomly and rapidly with time, it can form unidirectional or bi-directional links.

 Bandwidth constrained, variable capacity links: Wireless links usually have lower
reliability, efficiency, stability, and capacity as compared to a wired network

 Autonomous Behaviour: Each node can act as a host and router, which shows its
autonomous behaviour.

 Energy Constrained Operation: As some or all the nodes rely on batteries or other
exhaustible means for their energy. Mobile nodes are characterized by less memory,
power, and lightweight features.

 Limited Security: Wireless networks are more prone to security threats. A centralized
firewall is absent due to the distributed nature of the operation for security, routing,
and host configuration.

Zinkal Patel Page 2


Unit-3 Mobile Ad hoc network

 Less Human Intervention: They require minimum human intervention to configure


the network, therefore they are dynamically autonomous in nature.

Applications

 Defence applications: Many defence applications require on the fly communications


set-up, and ad hoc/sensor networks are excellent candidates for use in battlefield
management.

 Crisis management applications: These arise, for example, as a result of natural


disasters in which the entire communication infrastructure is in disarray. Restoring
communications quickly is essential.

 Telemedicine: The paramedic assisting the victim of a traffic accident in a remote


location must access medical records (e.g. X-rays) and may need video conference
assistance from a surgeon for an emergency intervention. In fact, the paramedic may
need to instantaneously relay back to the hospital the victim's X-rays and other
diagnostic tests from the site of the accident.

 Tele-geo processing application: The combination of GPS, GIS (Geographical


Information Systems), and high-capacity wireless mobile systems enables a new type
of application referred to as tele- geo processing.

 Virtual Navigation: A remote database contains the graphical representation of


building, streets, and physical characteristics of a large metropolis. They may also
"virtually" see the internal layout of buildings, including an emergency rescue plan, or
find possible points of interest.

 Education via the internet: Educational opportunities available on the internet or


remote areas because of the economic infeasibility of providing expensive last-mile
wire line internet access in these areas to all subscribers.

Zinkal Patel Page 3


Unit-3 Mobile Ad hoc network

 Vehicular area network: This a growing and very useful application of adhoc network
in providing emergency services and other information. This is equally effective in
both urban and rural setup. The basic and exchange necessary data that is beneficial
in a given situation.

Advantages:

 Separation from central network administration.

 Each node can play both the roles ie. of router and host showing autonomous nature.

 Self-configuring and self-healing nodes do not require human intervention.

 Highly scalable and suits the expansion of more network hub.

Disadvantages:

 Resources are limited due to various constraints like noise, interference conditions,
etc.

 Lack of authorization facilities.

 More prone to attacks due to limited physical security.

 High latency i.e. there is a huge delay in the transfer of data between two sleeping
nodes.

Types of MANET

 Vehicular Ad hoc Network (VANETs) –

 It can be defined as an intelligent component of transport system as vehicle are able


to communicate with each other as well as roadside base station. Intelligent vehicular
ad hoc networks(InVANETs) deals with another vehicle or with roadside equipment.

Zinkal Patel Page 4


Unit-3 Mobile Ad hoc network

 a network created in an ad-hoc manner where different moving vehicles and other
connecting devices come in contact over a wireless medium and exchange useful
information to one another

 Whatever information the nodes possess is transferred to all other nodes. Similarly all
the nodes after transferring their set of data receive the data being transmitted by
other nodes. After accumulating all of such data, nodes then work to generate useful
information out of the data and then again transmit the information to other devices.

 The communication between devices expands in such as way that the where nodes
are free to join and leave the network i.e. it is an open network.

Smart Phone Ad hoc Network (SPANC) –

 Smartphone ad hoc networks (SPANs) are wireless ad hoc networks that


use smartphones. Once embedded with ad hoc networking technology, a group of
smartphones in close proximity can together create an ad hoc network.

 Smart phone ad hoc networks use the existing hardware (primarily Bluetooth and Wi-
Fi) in commercially available smartphones to create peer-to-peer networks without
relying on cellular carrier networks, wireless access points, or traditional network
infrastructure.

 Here peers can join or leave the network without destroying it.

Flying Ad hoc Network (FANETs) – This is composed of unmanned aerial vehicles


(commonly known as drones). Provides links to remote areas and mobility.

Zinkal Patel Page 5


Unit-3 Mobile Ad hoc network

Concepts of OSI (Open Source Interconnection) layers

Introduction to OSI model with all Layers


 An ISO standard cover all aspect of network communications is the Open Systems
Interconnection model. It was first introduced in the 1970. An open system is a set of
protocols that allow ant two different system to communicate.
 The purpose of OSI model is to show how to facilitate communication between
different systems without requiring changes to the logic of the underlying hardware
and software.
 Actually OSI model is for understanding and designing a network architecture that is
flexible, robust and interoperable.
 The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer system.
 The OSI model is composed of following seven ordered layers: physical (layer 1), data
link (layer 2), network (layer 3), transport (layer 4), and session (layer 5), and
presentation (layer 6), and application (layer 7).

 Following figure shows the layers involved when a message is sent from device A to
device B. As the message travels from A to B, it may pass through many intermediate
nodes. These intermediate nodes usually involve only first three layers of OSI model.

Zinkal Patel Page 6


Unit-3 Mobile Ad hoc network

 Within a single machine, each layer calls upon the services of the layer just below it.
E.g., layer 3 uses the services provided by layer 2 and provide services for layer 4.
 At the machine A the entire package is converted to a form that can be transmitted to
the receiving device. At the receiving machine, the message is unwrapped layer by
layer, with each process receiving and removing the data meant for it.
 E.g., layer 2 remove the data meant for it, then passes the rest to layer 3. Layer 3 the
remove the data meant for it and passes the rest to layer 4 and so on.
 The seven layers can be thought of as belonging to three subgroups. Layer 1, 2 and 3-
physical, data link and network are the network support layer. They deal with the
physical aspect of moving data from one device to another.
 Layer 5, 6 and 7- session, presentation and application can be as the user support
layers.
 Layer 4, the transport layer link the two subgroups and ensure that what the lower
layers have transmitted is in a form that the upper layers can be use.

Zinkal Patel Page 7


Unit-3 Mobile Ad hoc network

 The upper OSI layer are almost implemented in software, lower layers are a
combination of hardware and software except for the physical layer, which is mostly
hardware.
 Following figure gives an overall view of the OSI layers.
 D7 means the data unit at layer 7, D6 means the data unit at layer 6, and so on.
 The process start at layer 7 that is application layer, then moves from layer to layer in
descending, sequential order.
 At each layer header and possible trailer, can be added to the data unit.
 Commonly, the trailer is added only at layer 2. When the formatted data unit passes
through the layer 1 that is physical layer. Then it change into electromagnetic signal
and transported along a physical link.

 Upon reaching its destination, the signal passes into layer 1 and it is transformed back
into digital form.
 The data unit then moves back up through the OSI layers. As each block of data
reaches the next higher layer, the header and trailers attached to it at the
corresponding sending layer are removed.
 By the time it reaches layer 7, the message is again in a form appropriate to the
application and it is available to recipient.

Zinkal Patel Page 8


Unit-3 Mobile Ad hoc network

Layers in the OSI model


1. Physical Layer :
 Physical layer is responsible for movements of individual bits from one node to the
next node.
 The physical layer coordinates the functions required to carry a bit stream over a
physical medium.
 It also defines the procedures and functions that physical devices and interfaces
have to perform for transmission.
 Following figure shows the position of the physical layer with respect to the
transmission medium and the data link layer.

 The physical layer is also concerned with the following activity :

o Physical characteristics of interfaces and medium. Physical layer define the


characteristics of the interface between the device and the transmission
medium. It also defines the type of transmission medium.

o It represent bit. The physical layer consists of a stream of bits and to


transmit that bit must be encoded into electrical signals or optical signals.

o Data rate. The transmission rate- the number of bits send per each second is
also defined by the physical layer.

Zinkal Patel Page 9


Unit-3 Mobile Ad hoc network

o Synchronization of bits. The sender and receiver not only must use the
same bit rate but also must be synchronized at the bit level. In other words,
the sender and the receiver clocks must be synchronized.
o Line configuration. The physical layer is concerned with the connection of
devices to the media. In a point to point configuration, two devices are
connected through a dedicated link. In a multipoint configuration, a link is
shared among several devices.

o Physical topology. The physical topology defines how devices are connected
to make a network. Devices can be connected using a mesh topology, a star
topology, a ring topology, a bus topology or a hybrid topology.

o Transmission mode. The physical layer also defines the direction of


transmission between two devices.
 Simplex: in simplex mode, only one device can send, the other can
receive. It is one way communication.
 Half - duplex: in half duplex mode two devices can send and receive,
but not at the same time.
 Full - duplex: in full duplex mode two devices can send and receive at
the same time.
 Protocols : Ethernet, IEEE 802.11, ISDN(Integrated Service Digital Network)
 Devices: Hub, Repeater, MAU, NIC, Transceiver

2. Data link Layer :


 The data link layer is responsible for moving frames from one node to the next
node.
 The data link layer transforms the physical layer to a reliable link. It makes the
physical layer appear error-free to the upper layer that is network layer.

Zinkal Patel Page 10


Unit-3 Mobile Ad hoc network

 The data link layer has two sublayers:


o The logical link control (LLC) sub layer
o The media access control (MAC) sub layer.
 The role of the LLC sub layer is to establish and maintain link between
communicating devices and it also control data flow among various applications
and services, as well as provide acknowledgement and error notification
mechanisms.
 MAC sub layer control the multiple devices for sharing and control access to the
physical media for transport. It is also responsible for the physical addressing of
frames.
 Following figure shows the relationship of the data link layer to the network layer
and physical layer.

 Other responsibilities of the data link layer include the following :

o Framing : The data link layer divides the stream of bits received from the
network layer into manageable data units called frames.

o Physical addressing : If frames are to be distributed to different systems on


the network, the data link layer adds a header to the frame to define the
sender and/or receiver of the frames. If the frame is intended for a system
outside the sender’s network, the receiver address is the address of the
device that connects the network to the next node.

Zinkal Patel Page 11


Unit-3 Mobile Ad hoc network

o Flow control : If the rate at which the data are absorbed by the receiver is
less than the rate at which data are produced in the sender, the data link
layer apply a flow control mechanism to avoid overwhelming the receiver.

o Error control : The data link layer adds reliability to the physical layer by
adding mechanisms to detect and retransmit damaged or lost frames. It also
uses a mechanism to recognize duplicate frames. Error control is normally
achieved through a trailer added to the end of the frame.

o Access control : When two or more devices are connected to the same link,
data link layer protocols are necessary to determine which device has
control over the link at any given time.
 Protocols: PPP, 802.1, 802.2
 Devices: Bridge, Switch, NIC

3. Network Layer :
 The network layer is responsible for the delivery of individual packets from the
source pc to the destination pc.
 The network layer is responsible for the source to destination delivery of a packet,
possibly across multiple networks (links). Whereas the datalink layer oversees the
delivery of the packet between two systems on the same network (links), the
network layer ensures that each packet gets from its point of origin to its final
destination.
 If two systems are connected to the same link, there is usually no need for a
network layer. However, if the two systems are attached to different networks
(links) with connecting devices between the networks (links), there is often a need
for the network layer to accomplish source to destination delivery.

Zinkal Patel Page 12


Unit-3 Mobile Ad hoc network

 Following figure shows the relationship of the network layer to the data link and
transport layer.

 Other responsibility of the network layer include the following :

o Logical addressing: The physical addressing implemented by the data link


layer and it handles the addressing problem locally. If a packet passes the
network boundary, we need another addressing system to help distinguish
the source and destination systems. The network layer adds a header to the
packet coming from the upper layer that, among other things, includes the
logical addresses of the sender and receiver.
o Routing: when independent networks or links are connected to create
internetworks (networks of networks) or a large network, the connecting
devices (called routers or switches) route or switch the packets to their final
destination.
 Protocols: IP, ICMP, ARP
 Devices: Router, Brouter, Layer3 switch

4. Transport Layer :
 The transport layer is responsible for the delivery of a message from one process
to another process.
 The transport layer is responsible for process to process delivery of the entire
message. A process is an application program running on a host. Whereas the
network layer oversees source to destination delivery of individual packets, it does
not recognize any relationship between those packets.

Zinkal Patel Page 13


Unit-3 Mobile Ad hoc network

 It treats each one independently, as though each piece belonged to a separate


message, whether or not it does.
 The transport layer, on the other hand, ensures that the whole message arrives
intact and in order, overseeing both error control and flow control at the source to
destination level.
 Following figure shows the relationship of the transport layer to the network and
session layers.

 Transport layer include the following responsibilities :

o Service- point addressing: computers often run several programs at the


same time. For this reason, source to destination delivery means delivery
not only from one computer to the next but also from a specific process
(running program) on one computer to a specific process (running program)
on the other computer. The transport layer header must therefore include a
type of address called a service-point address (or port address). The network
layer gets each packet to the correct computer. The transport layer gets the
entire message to the correct process on that computer.
o Segmentation and reassembly: A message is divided into transmittable
segments, with each segment containing a sequence number. These
numbers enable the transport layer to reassemble the message correctly
upon arriving at the destination and to identify and replace packets that
were lost in transmission.

Zinkal Patel Page 14


Unit-3 Mobile Ad hoc network

o Connection control: The transport layer can be either connectionless or


connection oriented. A connectionless transport layer treats each segment
as an independent packet and delivers it to the transport layer at the
destination machine. A connection oriented transport layer makes a
connection with the transport layer at the destination machine first before
delivering the packets. After all the data are transferred, the connection is
terminated.

o Flow control: Like the data link layer, the transport layer is responsible for
flow control. However flow control at this layer is performed end to end
rather than across a single link.

o Error control: Like the data link layer, the transport layer is responsible for
error control. However, error control at this layer is performed process to
process rather than across a single link. The sending transport layer makes
sure that the entire message arrives at the receiving transport layer without
error (damage, loss, duplication). Error correction is usually achieved
through retransmission.
 Protocols: TCP
 Devices: Brouter, Gateway

5. Session Layer :
 The session layer is responsible for dialog control and synchronization.
 The services provided by the first three layer (physical, data link and network) are
not sufficient for some processes. The session layer is the network dialog
controller.
 It establishes, maintains and synchronizes the interaction among communicating
systems.

Zinkal Patel Page 15


Unit-3 Mobile Ad hoc network

 Following figure represents the relationship of the session layer to the transport
and presentation layers.

 The session layer include the following responsibilities :

o Dialog control: The session layer allows two system to enter into a dialog. It
allows the communication between two processes to take place in either
half duplex or full duplex mode.
o Synchronization: The session layer allows a process to add checkpoints, or
synchronization points, to a stream of data. E.g., if a system is sending a file
of 2000 pages, it is advisable to insert checkpoints after every 100 pages to
ensure that each 100 page unit is received and acknowledged
independently. In this case, if a crash happens during the transmission of
page 523, the only pages that need to be resent after system recovery are
pages 501 to 523. Pages previous to 501 need not be resent.

Zinkal Patel Page 16

You might also like