Upload
himansuparichha
View
261
Download
0
Tags:
Embed Size (px)
DESCRIPTION
this is himansu a software engineer in IT.it is help for a better presentation about MANET. please down load this & this will be a good project.
Citation preview
MOBILE AD HOC NETWORK (MANET) GUIDED BY: SAMBEET PATRO(IT LECT.)
CENTURION UNIVERSITY TECHNOLGY & MANAGEMENT
NAME: HIMANSU PARICHHA
REGD. NO:0801213054
ID NO:B708008
BRANCH: INFORMATION TECHNOLOGY
CONTENTS:
DEFINITION
CLASSIFICATION
ROUTE ALGORITHMS
ROUTE DISCOVERY
APPLICATIONS
DISTRIBUTION
RELATIONSHIP
Routing protocols
Mobile Random and perhaps
constantly changingAd-hoc
Not engineeredNetworks
Elastic data applications which use networks to communicate
DEFINITION:
A "mobile ad hoc network" (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links --the union of which form an arbitrary graph. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably.Such a network may operate in a standalone fashion, or may be connected to the larger Internet. Sensor nodes consist of sensing, data processing, and communication components and typically form ad hoc networks.Due to a lack of infrastructure support, each node acts as a router, forwarding data packets for other nodes.
Can be classified into twoServer: Contain the complete DBMS and bear primary responsibility for data broadcast and satisfying client queries.
Clients: Have sufficient resources to cache portions of the database as well as storing some DBMS query and processing modules.Practical Use : Whenever a temporary network with no infra structure needed.
Rescue situations: Rescue workers engaged in disaster relief investigate the extent of the damage around them and collaboratively work by sharing the information on their locations and findings.
Excavations: Members of a research project team engaged in an archeological excavation collect various phenomenal data from sensors and share the obtained data with other members to streamline work.
Criteria – node to be part of a network: To be connected to a network, a node should must be
within the area of influence of at least one node on the network.
A node with no remaining power, or one that is off, is not currently a part of the network.
Even if the source and the destination nodes are not within each other’s communication range, data packets are forwarded to the destination by relaying transmission through other nodes that exist between the two nodes.
COMMON ALGORITHMS: Exploration
Network is explored to find possible routes Of which one is selected Example: IEEE 802.5 Source Routing
Bellman-Ford algorithm does this in a distributed manner Called "Distance Vector" these days Generates routes to a node from somewhere else
Shortest Path First (Ford, CACM, 1968) does this in a database
Djikstra applied to networks, 1972 Generates routes from a node to somewhere else
BASIS OF ROUTING: Bellman-Ford-Moore proof
In any graph there exists a spanning tree Ford (1956), Bellman (1958), Moore (1958)
Spanning tree: A set of arcs which visits every node in a graph exactly
once
AB A
B
ROUTE DISCOVERY: A route between two nodes is
found by sending an Route Request
Route Request builds a source route on every path through the network
First Route Request to arrive is accepted; target responds on that path and tells initiator what the source route is
Source route is used on subsequent data traffic
B
H I J
GFE
D
A
C
K
Detected Source Route:(A, B, F, J, K)
ROUTE DISCOVERY DYNAMICALLY:
A route between two nodes is found by sending an Route Request to a locality Initial locality small, grows with
failure After that, a little larger than
the locality target last found in Route Response sent
By target if necessary By neighboring routing node if
possible to “join” existing route Network stores the route
d
j k l
ihg
f
A
e
C
B
APPLICATION:
Traffic networks: “Smart cars” and “smart roads” Onboard systems “talk” to the
“road”: Map obstacles and delays Obtain maps Inform the road of its actions
Combat regiment in the field Perhaps 4000-8000 objects in
constant unpredictable motion… Intercommunication of forces
Proximity, function, plan of battle Special issues
Low probability of detection Random association and
topology
Military applications:
TOPOLOGY UPDATE DISTRIBUTION:
Topology information distributed to the set of systems that are deemed to need it. You need information
about a routing node if your routing would use it…
Therefore every routing node effectively calculates all routes from all nodes for which it has information
NEIGHBOR RELATIONSHIPS
Each device emits a periodic “Hello” Advertise itself to its
neighborsDetermine who else is thereSelect some systems to act
as Multi-Point Relays
MULTI-POINT RELAYS Passes Topology Information
Acts as router between hosts, in wired parlance
Minimizes information retransmission
Forms a routing backbone
Routing protocols:Contents: 1 Pro-active (table-driven) routing
2 Reactive (on-demand) routing3 Flow-oriented routing4 Adaptive (situation-aware) routing5 Hybrid (both pro-active and reactive) routing6 Hierarchical routing protocols7 Host Specific Routing protocols8 Geographical routing protocols9 Power-aware routing protocols10 Multicast routing11 Geographical multicast protocols (Geocasting)Destination Sequenced Distance Vector (DSDV)Protocol
Latest protocols:
Ad-hoc On-Demand Distance Vector (AODV) ProtocolThe study reveals that, DSDV routing protocol consumes more bandwidth, because of the frequent broadcasting of routing updates. While the AODV is better than DSDV as it doesn’t maintain any routing tables at nodes which results in less overhead and more bandwidth. From the above, chapters, it can be assumed that DSDV routing protocols works better for smaller networks but not for larger networks. So, my conclusion is that, AODV routing protocol is best suited for general mobile ad-hoc networks as it consumes less bandwidth and lower overheadwhen compared with DSDV routing protocol.
To be able to combine Web Services and mobile ad hoc networks(MANETs).We suggest that a peer-to-peer (p2p)architecture is used .this decision is based on the fact that many p2p networks are content driven and therefore participants in these kinds of networks search for services instead of addresses as in MANET.
Conclusion:
The load on the network can be issue if the network gets too extensive, since every peer produces traffic by sending out advertisements, requests etc. As we have not made any simulations in the work, it is hard to estimate how an extensive network is defined. Due to this it is difficult to predict how this will affect the communication.
•[1] T. Hara, ``Effective replica allocation in ad hoc networks for improving data accessibility,'' Proc. IEEE Infocom 2001, pp.1568-1576, 2001.•[2] T. Hara, ``Replica allocation methods in ad hoc networks with data update,'' ACM-Kluwer Journal on Mobile Networks and Applications, Vol.8, No.4, pp.343-354, 2003.•[3] T. Hara and S.K. Madria, ``Dynamic data replication schemes for mobile ad-hoc network based on aperiodic updates,'' Proc. Int'l Conf. on Database Systems for Advanced Applications (DASFAA 2004), pp.869-881, 2004. •[4] T. Hara, N. Murakami, and S. Nishio: ``Replica Allocation for Correlated Data Items in Ad-Hoc Sensor Networks,'' ACM SIGMOD Record, Vol.33, No.1, pp.38-43, 2004.•[5] H. Hayashi, T. Hara, and S. Nishio, ``Cache Invalidation for Updated Data in Ad Hoc Net-works,'' Proc. Int'l Conf. on Cooperative Information Systems (CoopIS'03), pp.516-535, 2003.•[6] G. Cao, L. Yin, C.R. Das, ``Cooperative Cache-Based Data Access in Ad Hoc Networks,'' IEEE Computer Magagine, Vol.37, No.2, pp. 32-39, 2004.•[7] L.D. Fife and L. Gruenwald, ``Research issues for data communication in mobile ad-hoc network database systems,'' ACM SIGMOD Record, Vol.32, No.2, pp.42-47, 2003.•[8] G. Karumanchi, S. Muralidharan, and R. Prakash, ``Information dissemination in partitionable mobile ad hoc networks,'' Proc. Symposium on Reliable Distributed Systems (SRDS'99), pp.4-13, 1999.•[9] J. Luo, J.P. Hubaux, and P. Eugster, ``PAN: Providing reliable storage in mobile ad hoc networks with probabilistic quorum systems,'' Proc. ACM MobiHoc 2003, pp.1-12, 2003.•[10] K. Rothermel, C. Becker, and J. Hahner, ``Consistent update diffusion in mobile ad hoc networks,'' Technical Report 2002/04, Computer Science Department, University of Stuttgart, 2002.•[11] F. Sailhan and V. Issarny, ``Cooperative caching in ad hoc networks,'' Proc. Int'l Conf. on Mobile Data Management (MDM'03), pp.13-28, 2003.•[12] K. Wang and B. Li, ``Efficient and guaranteed service coverage in partitionable mobile ad-hoc networks,'' Proc. IEEE Infocom'02, Vol.2, pp.1089-1098, 2002.•[13] http://www3.ietf.org/proceedings/00mar/47th-ietf-00mar-96.html
References
Any queries ?Thank you