Professional Documents
Culture Documents
Unit-3
Mobile Ad hoc
network
503 NETWORK TECHNOLOGIES
This is in contrast to the well-known single hop cellular network model that supports
the needs of wireless communication between two mobile nodes relies on the wired
backbone and fixed base stations.
Characteristics
Dynamic Topologies: Network topology which is typically multi hop may change
randomly and rapidly with time, it can form unidirectional or bi-directional links.
Bandwidth constrained, variable capacity links: Wireless links usually have lower
reliability, efficiency, stability, and capacity as compared to a wired network
Autonomous Behaviour: Each node can act as a host and router, which shows its
autonomous behaviour.
Energy Constrained Operation: As some or all the nodes rely on batteries or other
exhaustible means for their energy. Mobile nodes are characterized by less memory,
power, and lightweight features.
Limited Security: Wireless networks are more prone to security threats. A centralized
firewall is absent due to the distributed nature of the operation for security, routing,
and host configuration.
Applications
Vehicular area network: This a growing and very useful application of adhoc network
in providing emergency services and other information. This is equally effective in
both urban and rural setup. The basic and exchange necessary data that is beneficial
in a given situation.
Advantages:
Each node can play both the roles ie. of router and host showing autonomous nature.
Disadvantages:
Resources are limited due to various constraints like noise, interference conditions,
etc.
High latency i.e. there is a huge delay in the transfer of data between two sleeping
nodes.
Types of MANET
a network created in an ad-hoc manner where different moving vehicles and other
connecting devices come in contact over a wireless medium and exchange useful
information to one another
Whatever information the nodes possess is transferred to all other nodes. Similarly all
the nodes after transferring their set of data receive the data being transmitted by
other nodes. After accumulating all of such data, nodes then work to generate useful
information out of the data and then again transmit the information to other devices.
The communication between devices expands in such as way that the where nodes
are free to join and leave the network i.e. it is an open network.
Smart phone ad hoc networks use the existing hardware (primarily Bluetooth and Wi-
Fi) in commercially available smartphones to create peer-to-peer networks without
relying on cellular carrier networks, wireless access points, or traditional network
infrastructure.
Here peers can join or leave the network without destroying it.
Following figure shows the layers involved when a message is sent from device A to
device B. As the message travels from A to B, it may pass through many intermediate
nodes. These intermediate nodes usually involve only first three layers of OSI model.
Within a single machine, each layer calls upon the services of the layer just below it.
E.g., layer 3 uses the services provided by layer 2 and provide services for layer 4.
At the machine A the entire package is converted to a form that can be transmitted to
the receiving device. At the receiving machine, the message is unwrapped layer by
layer, with each process receiving and removing the data meant for it.
E.g., layer 2 remove the data meant for it, then passes the rest to layer 3. Layer 3 the
remove the data meant for it and passes the rest to layer 4 and so on.
The seven layers can be thought of as belonging to three subgroups. Layer 1, 2 and 3-
physical, data link and network are the network support layer. They deal with the
physical aspect of moving data from one device to another.
Layer 5, 6 and 7- session, presentation and application can be as the user support
layers.
Layer 4, the transport layer link the two subgroups and ensure that what the lower
layers have transmitted is in a form that the upper layers can be use.
The upper OSI layer are almost implemented in software, lower layers are a
combination of hardware and software except for the physical layer, which is mostly
hardware.
Following figure gives an overall view of the OSI layers.
D7 means the data unit at layer 7, D6 means the data unit at layer 6, and so on.
The process start at layer 7 that is application layer, then moves from layer to layer in
descending, sequential order.
At each layer header and possible trailer, can be added to the data unit.
Commonly, the trailer is added only at layer 2. When the formatted data unit passes
through the layer 1 that is physical layer. Then it change into electromagnetic signal
and transported along a physical link.
Upon reaching its destination, the signal passes into layer 1 and it is transformed back
into digital form.
The data unit then moves back up through the OSI layers. As each block of data
reaches the next higher layer, the header and trailers attached to it at the
corresponding sending layer are removed.
By the time it reaches layer 7, the message is again in a form appropriate to the
application and it is available to recipient.
o Data rate. The transmission rate- the number of bits send per each second is
also defined by the physical layer.
o Synchronization of bits. The sender and receiver not only must use the
same bit rate but also must be synchronized at the bit level. In other words,
the sender and the receiver clocks must be synchronized.
o Line configuration. The physical layer is concerned with the connection of
devices to the media. In a point to point configuration, two devices are
connected through a dedicated link. In a multipoint configuration, a link is
shared among several devices.
o Physical topology. The physical topology defines how devices are connected
to make a network. Devices can be connected using a mesh topology, a star
topology, a ring topology, a bus topology or a hybrid topology.
o Framing : The data link layer divides the stream of bits received from the
network layer into manageable data units called frames.
o Flow control : If the rate at which the data are absorbed by the receiver is
less than the rate at which data are produced in the sender, the data link
layer apply a flow control mechanism to avoid overwhelming the receiver.
o Error control : The data link layer adds reliability to the physical layer by
adding mechanisms to detect and retransmit damaged or lost frames. It also
uses a mechanism to recognize duplicate frames. Error control is normally
achieved through a trailer added to the end of the frame.
o Access control : When two or more devices are connected to the same link,
data link layer protocols are necessary to determine which device has
control over the link at any given time.
Protocols: PPP, 802.1, 802.2
Devices: Bridge, Switch, NIC
3. Network Layer :
The network layer is responsible for the delivery of individual packets from the
source pc to the destination pc.
The network layer is responsible for the source to destination delivery of a packet,
possibly across multiple networks (links). Whereas the datalink layer oversees the
delivery of the packet between two systems on the same network (links), the
network layer ensures that each packet gets from its point of origin to its final
destination.
If two systems are connected to the same link, there is usually no need for a
network layer. However, if the two systems are attached to different networks
(links) with connecting devices between the networks (links), there is often a need
for the network layer to accomplish source to destination delivery.
Following figure shows the relationship of the network layer to the data link and
transport layer.
4. Transport Layer :
The transport layer is responsible for the delivery of a message from one process
to another process.
The transport layer is responsible for process to process delivery of the entire
message. A process is an application program running on a host. Whereas the
network layer oversees source to destination delivery of individual packets, it does
not recognize any relationship between those packets.
o Flow control: Like the data link layer, the transport layer is responsible for
flow control. However flow control at this layer is performed end to end
rather than across a single link.
o Error control: Like the data link layer, the transport layer is responsible for
error control. However, error control at this layer is performed process to
process rather than across a single link. The sending transport layer makes
sure that the entire message arrives at the receiving transport layer without
error (damage, loss, duplication). Error correction is usually achieved
through retransmission.
Protocols: TCP
Devices: Brouter, Gateway
5. Session Layer :
The session layer is responsible for dialog control and synchronization.
The services provided by the first three layer (physical, data link and network) are
not sufficient for some processes. The session layer is the network dialog
controller.
It establishes, maintains and synchronizes the interaction among communicating
systems.
Following figure represents the relationship of the session layer to the transport
and presentation layers.
o Dialog control: The session layer allows two system to enter into a dialog. It
allows the communication between two processes to take place in either
half duplex or full duplex mode.
o Synchronization: The session layer allows a process to add checkpoints, or
synchronization points, to a stream of data. E.g., if a system is sending a file
of 2000 pages, it is advisable to insert checkpoints after every 100 pages to
ensure that each 100 page unit is received and acknowledged
independently. In this case, if a crash happens during the transmission of
page 523, the only pages that need to be resent after system recovery are
pages 501 to 523. Pages previous to 501 need not be resent.