Mobile Adhoc Network
Mobile Adhoc Network
27 (2014)
© Research India Publications; httpwww.ripublication.comijaer.htm
Abstract: This paper presents fundamental introduction about mobile adhoc network.
Keywords: routing, mobile adhoc network, mobile node
1. Introduction
An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. In
traditional wireless and mobile networks, mobile nodes communicate with a centralized structure. An ad hoc
network operates without the use of existing network infrastructure. The main application for ad hoc networks has
long been considered as the military tactical communication known as packet radio networks. Soldiers, tanks and
planes were able to relay information for situational awareness on battlefield in an ad hoc network. An ad hoc
network also could have commercial applications, such as, using laptop computers to participate in an interactive
lecture, business associates sharing information during a meeting or conference, etc.
9711
International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.9 No.27 (2014)
© Research India Publications; httpwww.ripublication.comijaer.htm
2004) per router. A MANET is an autonomous system of mobile nodes. The system may operate in isolation, or
may have gateways to and interface with a fixed network.
9712
International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.9 No.27 (2014)
© Research India Publications; httpwww.ripublication.comijaer.htm
radio condition and the resulting network topology, multicast routing has to develop novel solutions for it to be
efficient and function correctly.
b) Scalability: A typical ad hoc network is expected to include thousands of nodes, and future generation of wireless
networks will connect millions of people with mobile data communication devices. Managing a multi-hop wireless
network (Shiwen Mao et al. 2003) of this size is a great challenge. Address allocation or naming of the nodes in such
a large network is non-trivial issue. Throughput and packet latency along a path with multiple wireless hops may be
unsatisfactory. Theoretical study on capacity of such networks has concluded that as the number of nodes goes
toward infinity, the capacity of the connection between any two nodes will decrease. In a large network, the routing
path between any two nodes is long, and is subject to breakage due to node mobility (Jean-Mare S.A et al. 1993).
Timely updation of the routing path with minimum control overhead is necessary to maintain connectivity in the
network.
c) Security: Signal travels in open air, and radio wave propagates both to the intended destination and to an
unwanted area. Wireless networks (VikasKawadia et al. 2003.) are more subject to fading, and attacks can be
launched easily. To assure the wide adoption, ad hoc networks need to protect the information to be transported by
the network and identify possible cause of attacks. If a network is deployed to carry out a critical task, the network
(Young-BaeKo et al. 2000) needs to verify the integrity of each node, as well as the information reported from each
node.
9713
International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.9 No.27 (2014)
© Research India Publications; httpwww.ripublication.comijaer.htm
buffer for a single packet. In case additional packets to the same destination are sent to ARP, the earlier
buffered packet is dropped. Once the hardware address of a packet's next hop is known, the packet is inserted
into the interface queue.
o Interface Queue
The Interface queue is implemented as a priority queue, which gives priority to routing protocol packets,
inserting them at the head of the queue. It supports running a filter over all packets in the queue and removes
those with a specified destination address.
o Mac Layer
Depending on the type of physical layer, the MAC layer must contain a certain set of functionalities such as:
carrier sense, collision detection and collision avoidance. Since these functionalities affect both the sending and
receiving sides, they are implemented in a single Mac object. For sending, the Mac object must follow a certain
medium access protocol before transmitting the packet on the channel. For receiving, the MAC layer is
responsible for delivering the packet to the link layer.
The IEEE 802.11 distributed coordination function (DCF) Mac protocol has been implemented. It uses a
RTS/CTS/DATA/ACK pattern for all unicast packets and simply sends out DATA for all broadcast packets.
The implementation uses both physical and virtual carrier sense.
o Network Interfaces (Physical layer)
The Network Interface layer serves as a hardware interface which is used by mobile node to access the channel.
This interface subject to collisions and the radio propagation model receives packets transmitted by other node
interfaces to the channel. The interface stamps each transmitted packet with the meta-data related to the
transmitting interface like the transmission power, wavelength etc. This meta-data in packet header is used by
the propagation model in receiving network interface to determine if the packet has minimum power to be
received and/or captured and/or detected (carrier sense) by the receiving node. The Network interface in NS
approximates the DSSS radio interface (Lucent WaveLan direct-sequence spread-spectrum).
o Radio Propagation Model
These models are used to predict the received signal power of each packet. At the physical layer of each
wireless node, there is a receiving threshold. When a packet is received, if its signal power is below the
receiving threshold, it is marked as error and dropped by the MAC layer. NS supports the free space model (at
near distances), two-ray ground reflection model (at far distances) and the shadowing model (includes fading)
o Antenna
An omni-directional antenna having unity gain is used by mobile nodes.
2. Conclusion
This paper has given a basic introduction about mobile adhoc network. Its applications are vast. Many
improvements can be done on the performance of mobile adhoc network.
References
1. Broch J., Maltz D., Johnson D., Y.-C.Hu and Jetcheva J. (1998), ‘A Performance Comparison of Multi-Hop
Wireless Ad Hoc Network Routing Protocols’, In Proceedings of the IEEE/ACM MOBICOM, pp. 85-97.
2. Garcia-Luna-Aceves J.J. (1999), ‘The Core-Assisted Mesh Protocol’, IEEE Journal on Selected Areas in
Communications, Vol.17, No.8, pp.1-15.
3. Holland G. and Vaidya N.H. (1999), ‘Analysis of TCP Performance over Mobile Ad Hoc Networks’, In
Proceedings of the IEEE/ACM MOBICOM, pp.219-230.
4. Holland G., Vaidya N. and Bahl P. (2001), ‘A rate-adaptive MAC protocol for multi-hop wireless
networks’, in Proceedings of ACM/IEEE MOBICOM’01, Rome, Italy, pp.236-251.
5. Jean-Marie A. and Gun L. (1993), ‘Parallel queues with re-sequencing’, Journal of ACM, Vol.40, No.5,
pp.1188-1208.
6. Johnson D.B. and D.A. Maltz D.A. (1996), ‘Protocols for Adaptive wireless and Mobile Networking’,
IEEE Personal Communications, Vol.3, No.1, pp.32-42.
7. Jugmin So and NitinVaidhya (2004), ‘Multi Channel MAC for ADHOC Networks: Handling Multi
Channel Hidden Terminals using A Single Transceiver’, MobiHoc’04, pp.222-233.
8. Lawrence Klos, Golden G. Richard III (2005), ‘Reliable Adhoc Group Communication using Local
Neighbourhoods’, IEEE, pp.361-368.
9714
International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.9 No.27 (2014)
© Research India Publications; httpwww.ripublication.comijaer.htm
9. Lei Chen and Adel Ben Mnaover (2004), ‘Performance Evaluation of New Hybrid Multicast Routing
Protocols for Adhoc Networks’, IEEE, pp.70-74.
10. Makansi T. (1987), ‘Transmitter-Oriented Code Assignment for Multihop Radio Net-works. IEEE
Transactions on Communications’, Vol.35, No.12, pp.1379-82.
11. Royer E. and Toh C-K. (1999), ‘A Review of Current Routing Protocols for Ad Hoc Mobile Wireless
Networks’, IEEE Personal Communications, pp.46-55.
12. Samir R. Das, Robert Casta˜neda, Jiangtao Yan and RimliSengupta (1998), ‘Comparative Performance
Evaluation of Routing Protocols for Mobile Ad hoc Networks’,7th International Conference on Computer
Communications and Networks (IC3N), pp.153-161.
13. Shiwen Mao, Shunan Lin, Shivendra S. Panwar, Yao Wangand EmreCelebi (2003), ‘Video Transport Over
Ad Hoc Networks: Multistream Coding with Multipath Transport’, IEEE Journal on Selected Areas in
Communications, Vol.21, No.10, pp.1721-1737.
14. VikasKawadia, Yongguang Zhang and Binita Gupta (2003), ‘System Services for Ad-Hoc Routing:
Architecture, Implementation and Experiences’,Proceedings of MobiSys 2003: The First International Conference
on Mobile Systems, Applications and Services, pp.99-112.
15. Wu S.-L, Lin C.-Y, Tseng Y.-C. andSheu J.-P. (2000), ‘A new multichannel MAC protocol with on-
demand channel assignment for multi-hop mobile ad hoc networks’, In Proceedings of IEEE WCNC’00, pp.1-26.
16. Young-BaeKo and Nitin H. Vaidya (2000), ‘Location-Aided Routing (LAR) in mobile ad hoc
networks’,Wireless Networks 6 (2000) Ó J.C. Baltzer AG, Science Publishers, pp. 307-321.
17. Zhao S., Tepe K., Seskar I. and Ray Chaudhuri D. (2002), ‘Routing Protocols for Self-Organizing
Hierarchical Ad-Hoc Wireless Networks’, NJ Commission of Science and Technology Grant #03-2042-007-12,
pp.1-4.
Sathishkumar G has completed his Dr.S.Purushothaman completed his Dr.P.Rajeswari completed her PhD
MTech from Vellore Institute of PhD from Indian Institute of in Mother Teresa Women’s
Technology Vellore, India in 2005. Technology Madras, India in 1995. University, Kodaikanal, India in
He has 9 years of experience in He has 156 publications to his 2014. She has 24 papers to her
developing software applications credit. He has 21 years of teaching credit. Her areas of research interest
for various Telecom devices. experience. Presently he is working is Intelligent Computing. Presently
Presently he is working as technical as Associate Professor in Institute she is working as Lecturer in
Lead for Ericsson Global India, of Technology, Haramaya Department of ECE, Institute of
Bangalore, India. University, Ethiopia. Technology, Haramaya University,
Ethiopia.
9715