A REVIEW OF AD-HOC NETWORK

Similar documents
Survey of MANET based on Routing Protocols

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network

More Efficient Routing Algorithm for Ad Hoc Network

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Wireless Mesh Networks

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

Wireless Network Pricing Chapter 2: Wireless Communications Basics

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Mesh Networks. unprecedented coverage, throughput, flexibility and cost efficiency. Decentralized, self-forming, self-healing networks that achieve

Exhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol

Scalable Routing Protocols for Mobile Ad Hoc Networks

Wireless Internet Routing. IEEE s

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data

Performance Evaluation of MANET Using Quality of Service Metrics

Performance Comparison of AODV, DSDV and ZRP Routing Protocols

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

EFFECTIVE LOCALISATION ERROR REDUCTION IN HOSTILE ENVIRONMENT USING FUZZY LOGIC IN WSN

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network

Mobile Ad-Hoc Networks Part I. Based on presentation from Matthias Hollick (Technische Universität Darmstadt)

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu

PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE S WIRELESS MESH NETWORK

Papers. Ad Hoc Routing. Outline. Motivation

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

Introduction To Wireless Sensor Networks

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic

Achieving Network Consistency. Octav Chipara

Adaptive Technique to Improve Highway Safety Using WMDP in Vanet

for Vehicular Ad Hoc Networks

OLSR Standards. Emmanuel BACCELLI. INRIA / Hitachi

A Consolidated Analysis of MANET Routing Protocols

Engineering Project Proposals

ADHOC NETWORKS. By M.K.HAK

A survey on broadcast protocols in multihop cognitive radio ad hoc network

Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET

Dynamic Spectrum Access in Cognitive Radio Wireless Sensor Networks Using Different Spectrum Sensing Techniques

Chapter- 5. Performance Evaluation of Conventional Handoff

Class Information. CMPE 257: Wireless and Mobile Networking. Class Information (cont d) Course Objective

Chapter 1 Introduction

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2

Performance Evaluation of a Hybrid Sensor and Vehicular Network to Improve Road Safety

A 5G Paradigm Based on Two-Tier Physical Network Architecture

Keywords - Ad-hoc Networks, TCP variants, Routing Protocols, AODV, DSR.

DTN and Opportunistic Networking Concepts for EE Wireless Networks

AN OVERVIEW TO COGNITIVE RADIO SPECTRUM SHARING

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS

Accident prevention and detection using internet of Things (IOT)

PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS

Simulating AODV and DSDV For Adynamic Wireless Sensor Networks

Introduction to Mesh

B L E N e t w o r k A p p l i c a t i o n s f o r S m a r t M o b i l i t y S o l u t i o n s

Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas

A Wireless Smart Sensor Network for Flood Management Optimization

第 XVII 部 災害時における情報通信基盤の開発

An Introduction to Airline Communication Types

Estimation of System Operating Margin for Different Modulation Schemes in Vehicular Ad-Hoc Networks

Locali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall

Computer Networks II Advanced Features (T )

Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks

An Improved MAC Model for Critical Applications in Wireless Sensor Networks

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN

NETWORK CONNECTIVITY FOR IoT. Hari Balakrishnan. Lecture #5 6.S062 Mobile and Sensor Computing Spring 2017

Notations. Background

Airmux-5000 Mobility. Presented by: Larry Jacobs Director, Account Management (201) ,

PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS

Control issues in cognitive networks. Marko Höyhtyä and Tao Chen CWC-VTT-Gigaseminar 4th December 2008

Multiple Access Methods

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Connected Car Networking

Part I: Introduction to Wireless Sensor Networks. Alessio Di

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END

ACADEMIC YEAR

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Mobile Positioning in Wireless Mobile Networks

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks.

IMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

Sensitivity Analysis of EADARP Multicast Protocol

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks. Plenary Talk at: Jack H. Winters. September 13, 2005

techtip How to Configure Miracast Wireless Display Implementations for Maximum Performance

Transcription:

A REVIEW OF AD-HOC NETWORK Dr. N. Elamathi Asst. Professor, Dept.of Computer Science Trinity college for Women, Namakkal Dt., Tamilnadu, India ABSTRACT ---- This paper focus on the study of Ad hoc network its protocols and different types of network in detail. In Latin, ad hoc means for this or for this purpose. Recent advances in radio communication and computer technologies have led to the development of mobile computing environments. In mobile computing environments, user equipped with portable computers called mobile host, can change their locations while retaining network connections by utilizing wireless communication. As one of the research fields in mobile computing environments, there has been an increasing interest in ad hoc networks constructed by only mobile host. In ad hoc networks, every mobile host plays the role of a router, and communicates with each other. Even if the source and the destination are not in the communication range of the two mobile hosts, data packets are forwarded to the destination by relaying transmission through intermediate mobile hosts. Since no special infrastructures are required, many applications such as rescue affairs at disaster sites and inter-vehicle communication are expected to be developed in ad hoc networks. In ad hoc networks, since the network topology dynamically changes due to the movement of mobile hosts, different fundamental technologies from the conventional fixed networks are needed. Keyword --- Ad Hoc network, WMN, WSN, MANET. 1, INTRODUCTION A wireless ad-hoc network is a decentralized type of wireless network. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed wireless networks. Instead, each node participates in routing by forwarding data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectively. In addition to the classic routing, ad hoc networks can use flooding for forwarding the data. An ad hoc network typically refers to any set of networks where all devices have equal status on a network and are free to associate with any other ad hoc network devices in link range. Very often, ad hoc network refers to a mode of operation of IEEE 802.11 wireless networks. 1.1 Ad hoc NETWORK ROUTING PROTOCOL An Ad hoc routing protocol is a convention or standard that controls how nodes decide which way to route packets between computing devices in a mobile ad hoc network. In ad hoc networks, nodes are not familiar with the topology of their networks. Instead, it has to discover it. Typically, a new node announces its presence and listens for announcements broadcast by its neighbors. Each node learns about others nearby and how to reach them, and may announce that is too can reach them. Note that in a wider sense, ad hoc protocol can also be used literally, to mean an improvised and often impromptu protocol established for a specific purpose. Page 143

1.1.1 Table driven (proactive) routing This type of protocols maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network. The main disadvantages of such algorithms are: 1. Respective amount of data for maintenance. 2. Slow reaction on restricting and failures. Examples of proactive algorithms are: Optimized Link State Routing Protocol(OLSR) Destination Sequence Distance Vector(DSDV) 1.1.2 On demand (reactive) routing This type of protocol finds a route on demand by flooding the network with Route Request packets. The main disadvantages of such algorithms are: 1. High latency time in route finding. 2. Excessive flooding can lead to network clogging. Examples of on-demand algorithms are: Ad hoc On-demand Distance Vector (AODV) Dynamic Source Routing Flow State in the Dynamic Source Routing 1.1.3 Hybrid (both proactive and reactive) routing This type of protocol combines the advantages of proactive and reactive routing. The routing is initially established with come proactively prospected routes and the serves the demand from additionally activated nodes through reactive flooding. The main disadvantages of such algorithms are: 1. Advantage depends on number of other nodes activated. 2. Reaction to traffic demand depends on gradient of traffic volume. Examples of hybrid algorithms are: Zone Routing Protocol(ZRP) 1.1.4 Hierarchical routing protocols With this type of protocol the choice of proactive and of reactive routing depends on the hierarchic level in which a node resides. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding on the lower levels. The choice for one or the other method requires proper attribute for respective levels. The main advantages of such algorithms are: 1. Advantage depends on depends on depth of nesting and addressing scheme. 2. Reactive to traffic demand depends on meshing parameters. Examples of hierarchical routing algorithms are: Cluster Based Routing Protocol(CBRP) Fisheye State Routing Protocol(FSR) 1.1.5 Flow oriented routing This type of protocols finds a route on demand by following present flows. One option is to unicast consecutively when forwarding data while promoting a new link. The main disadvantages of such algorithms are: 1. Takes long time when exploring new routes without a prior knowledge. Page 144

2. May refer to entitative existing traffic to compensate for missing knowledge on routes. 1.1.6. Host specific routing protocol This type of protocols requires through administration to tailor the routing to a certain network layout and distinct flow strategy. The main disadvantages of such algorithms are: 1. Advantages depend on quality of administration addressing scheme. 2. Proper reaction to changes in topology demands reconsidering all parametrizing. 1.1.7 Back pressure routing This type of routing does not pre-compute paths. It chooses next-hops dynamically as a packet is in progress toward its destination. These decisions are based on congestion gradients of neighbor nodes. 1.1.8 Power-aware routing protocol Energy required to transmit a signal is approximately proportional to dα, where d is the distance and α >=2 is the attenuation factor path loss exponent, which depends on the transmission medium. When α=2 (which is the optimal case), transmitting a signal half the distance requires one fourth of the energy and if there is a node in the middle willing to spend another fourth of its energy for the second half, data would be transmitted for half of the energy than through a direct transmission-a fact that follows directly from the inverse square law of physics. The main advantages of such algorithms are: 1. This method induces a delay for each transmission. 2. No relevant for energy network powered transmission operated via sufficient repeater infrastructure. 1.2 CLASSIFICATION OF Ad Hoc NETWORK: Wireless ad hoc networks can be further classified by their application: 1.2.1 Wireless Mesh Network (WMN) A Wireless mesh network is a communication network made up of radio nodes organized in a mesh topology. It is also form of wireless ad hoc network. Wireless mesh networks often consist of mesh clients, mesh routes and gateways. The mesh clients are often laptops, cell phones and other wireless devices while the mesh routes forward traffic to and from the gateways which may, but need not, connect to the internet. The coverage area of the radio nodes working as single network is sometimes called a mesh cloud. Access to this mesh cloud is dependent on the radio nodes working in harmony with each other to create a radio network. A mesh network is reliable and offers redundancy. When one node can no longer operate, the rest of the nodes can still communicate with each other, directly or through one or more intermediate nodes. Wireless mesh networks can self form and self heal. Wireless mesh networks can be implemented with various wireless technology including 802.11, 802.15, 802.16, cellular technologies or combinations of more than one type. Application of wireless mesh network Mesh network may involve either fixed or mobile devices. The solutions are as diverse as communication needs, for example in difficult environments such as emergency situations, tunnels, oil rigs, battlefield surveillance, high speed mobile video applications on board public transport or real time racing car telemetry. An Page 145

important possible application for wireless mesh networks is VoIP. By using a quality of service scheme, the wireless mesh may support local telephone calls to be routed the mesh. Some current applications: US military forces are now using wireless mesh networking to connect their computers, mainly ruggedized laptops, in field operations. Electric meters now being deployed on residences transfer their readings from one to another and eventually to the central office for billing without the need for human meter readers or the need to connect the meters with cables. The laptops in the one laptop per child program use wireless mesh networking to enable students to exchange files and get on the internet even though they lack wired or cell phone or other physical connections on their area. The 66-satellite iridum constellation operates as a mesh network, with wireless links between adjacent satellites. Calles between two satellite phones is routed through the mesh, from one satellite to another across the constellation, without having to go through an earth station. This makes for a smaller travel distance for the signal, reducing latency, and also allows for the constellation to operate with far fewer earth stations that would be required for 66 traditional communications satellites. 1.2.2 Wireless Sensor Network (WSN) WSN sometimes called a Wireless Sensor and Actor Network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring and so on. Application of wireless sensor Network: Area monitoring Area monitoring is a common application of WSNs. In area monitoring, the WSN is deployed over a region where some phenomenon is to be monitored. A military example is the use of sensors detect enemy intrusion, a civilian example is the geo-fencing of gas or oil pipelines. Health care monitoring The medical applications can be two types: wearable and implanted. Wearable devices are used on the body surface of a human or just at close proximity of the user. The implantable medical devices are those that are inserted inside human body. Natural disaster prevention Wireless sensor networks can effectively act to prevent the consequences of natural disasters, like floods. Wireless nodes have successfully been deployed in rivers where changes of the water levels have to be monitored in real time. Page 146

1.2.3 Mobile ad hoc Network (MANET) MANET is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. Such networks may operate by themselves or may be connected to the larger internet. It may contain one or multiple and different transceivers between nodes. This results in a highly dynamic, autonomous topology. Different protocols are then evaluated based on measures such as the packet drop rate, the overhead introduced by the routing protocol, end-to-end packet delays, network throughput, ability to scale etc. The mobile ad hoc network has the following typical features Unreliability of wireless links between nodes. Constantly changing topology. 1.2.3.1 Types of MANET Internet based Mobile Ad-hoc Networks (imanet) Internet based Mobile Ad-hoc Networks that link mobile nodes and fixed internet gateway nodes. In such type of networks normal ad hoc algorithms don t apply directly. Wireless networks can generally be classified as wireless fixed networks and wireless, or mobile adhoc networks. MANET s are based on the idea of establishing a network without taking any support from a centralized structure. By nature these types of networks are suitable for situations where either no fixed infrastructure exists, or to deploy one is not possible. Vehicular Ad-hoc Networks (VANETs) VANETs are used for communication between vehicles and roadside equipment. It uses cars as mobile nodes in a MANET to create a mobile network. A VANET turns every participating car into a wireless router or nodes, allowing cars approximately 100 to 300 meters of each other to connect and, in turn, create a network with a wide range. As cars fall out of the signal range and drop out of the network, other cars cab join in, connecting vehicles to one another so that a mobile internet is created. It is estimated that the first systems that will integrate this technology are police and fire vehicles to communicate with each other for safety purpose. Automotive companies like general Motors, Toyota, Nissan, Daimlerchrysler, BMW and Ford promote this term. Internet based mobile ad hoc networks (invanet) InVANET are a kind of artificial intelligence that helps vehicles to behave in intelligent manners during vehicle-to-vehicle collisions, accidents. It uses WIFI IEEE 802.11p and WiMAX IEEE 802.16 for easy and effective communication between vehicles with dynamic mobility. Effective measures such as media communication between vehicles can be enabled as well methods to track automotive vehicles. Automotive vehicular information can be viewed on electronic maps using the internet or specialized software. The advantage of WiFi based navigation system function is that it can effectively locate a vehicle which is inside big campuses like universities, airports, and tunnels. InVANET can be used as part of automotive electronics, which has to identify an optimally minimal path for navigation with minimal Page 147

traffic intensity. The system can also be used as a city guide to locate and identify landmarks in a new city. It can be viewed as component of the Intelligent Transportation Systems (ITS). Smart Phone Ad hoc Network (SPAN) SPAN leverage the existing hardware in commercially available smart phones to create peerto-peer networks without relying on cellular carrier networks, wireless access points, or traditional network infrastructure. SPAN differ from traditional hub and spoke networks, such as Wi-Fi Direct, in that they support multi-hop relays and there is no notion of a group leader so peers can join leave at will without destroying the network. CONCLUSION In this paper, we study about Ad hoc networks, its different protocols, different types of network namely WMN, WSN, MANET and various features and advantages of these networks explained. Further types of MANET networks which explains the concept if moving nodes in networks also discussed in detail. So the study of this network will be helpful to understand Ad hoc networks and its various application areas. The future scope of this research paper is to concentrates on improving more accurate and effective communication of these different networks. REFERENCES [1]. Vani A and Rao D, Providing of Secure Routing against Attacks in MANETs International Journal of Computer Applications (0975 8887) Volume 24 No.8, June 2011. [2]. Senthilkumar P., Baskar M. and Saravanan K., A Study on Mobile Ad-Hock Networks (MANETS), JMS, Vol. No.1, Issue No.1, September 2011. [3]. Satria Mandala, Md. Asri Ngadi and A.Hanan Abdullah, A Survey on MANET Intrusion Detection IJCSS, Vol No 2, Issue 1, 2007. [4]. Ruchi R., Dawra M., Performance characterization of AODV protocol in MANET, IJARCET, Vol No 1, Issue No 3, May2012. [5]. Sreerama M and Venkat D., Performance Evalution of MANET Routing Protocols using Reference Point Group Mobility and Random WayPoint Models, IJASUC Vol No.2, Issue No.1, March 2011. [6]. Murty S, Dastagiraiah C. and Kumar A, Analysis of MANET routing Protocols Using Random waypoint Model in DSR, IJASUC Vol No.2, Issue No.4, December 2011. [7]. Chaudhary D., Bee-Inspired Routing Protocols for mobile Ad HOC Network (MANET), JETWI, VOL No. 2, Issue No. 2, MAY 2010. [9]. Sukumaran S, Venkatesh. J and Arunkorath, A Survey of Methods to mitigate Selfishness in Mobile Ad hoc Networks IJICT, Vol 1, Issue No. 2, June 2011. Page 148

Powered by TCPDF (www.tcpdf.org) International Journal of Advanced Research in BIOGRAPHY Dr.N.Elamathi received her Ph.D degree from Mother Teresa Women s University, Kodaikanal in 2013, Bachelor s degree from the University of Bharathidasan, Trichy, Tamilnadu in 1995, M.Sc(CS) from the university of Alagappa University, Karikudi in 1998, and M.Phil(CS) from the University of Manonmaniam sundaranar University,Tirunelveli 2003. Page 149