0% found this document useful (0 votes)
3 views8 pages

ASN1

The document discusses the challenges faced by Mobile Ad Hoc Networks (MANETs), including mobility, limited bandwidth, energy constraints, and security vulnerabilities. It also compares routing algorithms like DSR and AODV, describes the DREAM location service, and explains area-based broadcasting methods. Additionally, it outlines proactive, reactive, and hybrid routing approaches, as well as the AMRIS multicast protocol, highlighting their advantages and disadvantages.

Uploaded by

miryalaraghu369
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views8 pages

ASN1

The document discusses the challenges faced by Mobile Ad Hoc Networks (MANETs), including mobility, limited bandwidth, energy constraints, and security vulnerabilities. It also compares routing algorithms like DSR and AODV, describes the DREAM location service, and explains area-based broadcasting methods. Additionally, it outlines proactive, reactive, and hybrid routing approaches, as well as the AMRIS multicast protocol, highlighting their advantages and disadvantages.

Uploaded by

miryalaraghu369
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

ASN Assignment -1

1.Explain Major challenges to be addressed by adhoc networks

Ad hoc networks (MANETs) are wireless networks that are self-configuring and self-organizing,
without the need for any centralized infrastructure. This makes them ideal for a variety of
applications, such as disaster relief, battlefield communications, and sensor networks. However,
MANETs also face a number of challenges, including:

● Mobility: MANET nodes are typically mobile, which means that the network topology is
constantly changing. This makes it difficult to maintain routing and other network services.
● Limited bandwidth: MANET nodes typically have limited bandwidth, so it is important to
design efficient routing and transport protocols.
● Energy constraints: MANET nodes are often powered by batteries, so it is important to
design energy-efficient protocols.
● Hidden node problem: The hidden node problem occurs when two nodes are within
communication range of each other, but cannot communicate directly because of an
obstacle. This can lead to collisions when both nodes try to transmit at the same time.
● Exposed node problem: The exposed node problem occurs when a node is within
communication range of two other nodes, but cannot communicate with either of them
because they are both transmitting at the same time.
● Security: MANETs are vulnerable to a variety of security attacks, such as eavesdropping,
denial-of-service attacks, and routing attacks.

In addition to these challenges, MANETs may also face other challenges depending on their
specific application. For example, MANETs used for disaster relief may need to be able to operate
in harsh environments with limited resources.

Researchers are actively working to address the challenges of MANETs. There has been
significant progress in recent years, but there is still much work to be done.

Here are some specific examples of the challenges faced by MANETs:

● Routing: Routing protocols for MANETs need to be able to adapt to the dynamic network
topology and limited bandwidth. They also need to be energy-efficient and secure.
● Medium access control (MAC): MAC protocols for MANETs need to be able to handle
the hidden node and exposed node problems. They also need to be efficient and fair.
● Security: Security protocols for MANETs need to be able to protect against a variety of
attacks, such as eavesdropping, denial-of-service attacks, and routing attacks. They also
need to be efficient and scalable.

Despite the challenges, MANETs have the potential to revolutionize the way we communicate
and interact with the world around us. As the technology continues to mature, we can expect to
see MANETs deployed in a wide range of applications.

2.Compare and Contrast the two manet routing algorithms DSR and AODV

3.Write about DREAM Location Service

DREAM (Distance Routing Effect Algorithm for Mobility) is a proactive, flooding-based


location service protocol for mobile ad hoc networks (MANETs). DREAM is designed to be
scalable and efficient, and it is well-suited for use in dynamic and changing environments.
DREAM works by maintaining a routing table at each node in the network. The routing table
contains information about the distance to each other node in the network, as well as the next
hop on the path to each node. DREAM maintains this information by periodically flooding the
network with location messages.

Location messages contain the node's ID, its position, and a timestamp. When a node receives
a location message from another node, it updates its routing table with the new information.
DREAM also uses location messages to calculate the distance to each node in the network.

To locate another node, a node sends a location request message to the node it wants to locate.
The location request message contains the node's ID and the ID of the node it wants to locate.
The node that receives the location request message responds with its location.

DREAM is a relatively simple protocol, but it is effective in locating nodes in MANETs.


DREAM is scalable and efficient, and it can be used in a variety of environments.

Here are some of the advantages of DREAM:

● Scalability: DREAM can scale to large networks with a large number of nodes.
● Efficiency: DREAM is efficient in terms of bandwidth and processing overhead.
● Accuracy: DREAM provides accurate location information, even in dynamic and
changing environments.
● Simplicity: DREAM is a relatively simple protocol to implement.

DREAM has been used in a variety of applications, including disaster relief, battlefield
communications, and sensor networks.

Here are some of the disadvantages of DREAM:

● Overhead: DREAM can generate a significant amount of overhead traffic, especially


in large networks.
● Security: DREAM is vulnerable to a variety of security attacks.
Overall, DREAM is a robust and effective location service protocol for MANETs. It is
scalable, efficient, and accurate. However, it is important to be aware of the overhead and
security concerns associated with DREAM before deploying it in a production environment.

4.Explain the concept in area based methods for broadcast

Area-based methods for broadcast in mobile ad hoc networks (MANETs) are designed to
reduce the overhead and improve the performance of broadcast by dividing the network into
areas and limiting the rebroadcast of broadcast packets to a subset of nodes in each area.

One common approach to area-based broadcasting is to use a distributed algorithm to divide


the network into overlapping areas. Each node in the network then maintains a list of its
neighbors in each of its areas. When a node needs to broadcast a packet, it sends the packet to
all of its neighbors in all of its areas. Each neighbor then rebroadcasts the packet to its
neighbors, but only if the neighbor is not already in the area where the packet was originally
broadcast.

Another approach to area-based broadcasting is to use a centralized algorithm to divide the


network into areas. In this approach, a central node maintains a map of the network and divides
the network into areas based on the map. Each node in the network is then assigned to one or
more areas. When a node needs to broadcast a packet, it sends the packet to the central node.
The central node then rebroadcasts the packet to all of the nodes in the area(s) where the packet
was originally broadcast.

Area-based broadcasting methods can significantly reduce the overhead and improve the
performance of broadcast in MANETs. However, they can also be complex to implement and
manage.

Here are some of the advantages of area-based methods for broadcast:


● Reduced overhead: Area-based methods can significantly reduce the overhead of
broadcast by limiting the rebroadcast of broadcast packets to a subset of nodes in each
area.
● Improved performance: Area-based methods can improve the performance of
broadcast by reducing the number of collisions and improving the delivery ratio of
broadcast packets.
● Scalability: Area-based methods are scalable to large networks with a large number of
nodes.

Here are some of the disadvantages of area-based methods for broadcast:

● Complexity: Area-based methods can be complex to implement and manage.


● Single point of failure: In centralized area-based methods, the central node is a single
point of failure. If the central node fails, the entire network may be unable to broadcast.

Overall, area-based methods for broadcast can be a very effective way to reduce the overhead
and improve the performance of broadcast in MANETs. However, it is important to be aware
of the complexity and potential for failure associated with area-based methods before
deploying them in a production environment.

5.Explain Proactive,reactive and hybrid routing approaches of routing in manet with


suitable example routing protocol in each category

Mobile Ad Hoc Networks (MANETs) are wireless networks consisting of mobile nodes that
communicate with each other without the need for a fixed infrastructure. Routing in MANETs
is a challenging task due to the dynamic nature of the network topology. There are three main
approaches to routing in MANETs: Proactive, Reactive, and Hybrid.
1. Proactive Routing:

● Definition: Proactive routing, also known as table-driven routing, involves maintaining


up-to-date routing information for all possible destinations in the network. The routing
tables are continuously updated to reflect changes in the network topology.
● Example Protocol: Optimized Link State Routing (OLSR)
● Explanation: OLSR is a proactive routing protocol for MANETs that utilizes a
proactive approach. It forms a Multi-Point Relays (MPR) network, where selected
nodes act as relays for broadcasting control messages. This helps in reducing the
overhead of flooding control messages across the network.

2. Reactive Routing:

● Definition: Reactive routing, also known as on-demand routing, establishes a route to


a destination only when it is needed. It does not maintain a complete and up-to-date
routing table for all destinations in the network under normal conditions.
● Example Protocol: Ad Hoc On-Demand Distance Vector (AODV)
● Explanation: AODV is a reactive routing protocol widely used in MANETs. When a
node needs to send data to a destination for which it does not have a route, it initiates a
route discovery process. During this process, nodes collaboratively determine a route
to the destination, and this route is then maintained until it is no longer needed.

3. Hybrid Routing:

● Definition: Hybrid routing combines elements of both proactive and reactive


approaches to take advantage of their strengths. It maintains routes to some frequently
used destinations proactively, while establishing routes on demand for less frequently
used destinations.
● Example Protocol: Zone Routing Protocol (ZRP)
● Explanation: ZRP divides the network into zones. Within each zone, a proactive routing
algorithm is used, ensuring that routes within the zone are always available. When a
destination is outside the node's zone, a reactive approach is employed to discover a
route on demand. This combination aims to strike a balance between the overhead of
proactive protocols and the latency of reactive protocols.

In summary, proactive protocols maintain routes at all times, reactive protocols establish routes
on demand, and hybrid protocols combine elements of both to achieve a balance between
proactive and reactive approaches. Each type of routing has its advantages and disadvantages,
and the choice of a routing protocol depends on the specific requirements and characteristics
of the MANET.

6.Explain the Routing of AMRIS, A Multicast protocol

AMRIS (Ad hoc Multicast Routing protocol utilizing Increasing id-numberS) is a multicast
routing protocol for mobile ad hoc networks (MANETs). AMRIS is a source-based protocol,
which means that the source node is responsible for maintaining and advertising the multicast
delivery tree. AMRIS uses a unique id-number assignment scheme to ensure that the multicast
delivery tree is loop-free and efficient.

AMRIS works by assigning each node in the multicast session a unique id-number. The id-
numbers are assigned in increasing order, starting from the source node. Each node in the
multicast session maintains a list of its neighbors and their id-numbers. When a node receives
a multicast data packet, it forwards the packet to all of its neighbors with a higher id-number.
This ensures that the multicast data packet is propagated throughout the multicast delivery tree
in a loop-free and efficient manner.
AMRIS also uses a join protocol to allow new nodes to join the multicast session. When a new
node wants to join the multicast session, it sends a join request message to the source node.
The source node then assigns the new node a unique id-number and sends the new node a join
reply message. The join reply message contains the id-numbers of the new node's neighbors in
the multicast delivery tree. The new node then uses this information to update its list of
neighbors and start forwarding multicast data packets.

AMRIS is a robust and efficient multicast routing protocol for MANETs. AMRIS is well-
suited for a variety of multicast applications, such as video streaming, audio conferencing, and
data sharing.

Here are some of the advantages of AMRIS:

● Robustness: AMRIS is robust to node failures and link failures.


● Efficiency: AMRIS is efficient in terms of bandwidth and processing overhead.
● Scalability: AMRIS can scale to large networks with a large number of nodes.
● Simplicity: AMRIS is a relatively simple protocol to implement.

Here are some of the disadvantages of AMRIS:

● Overhead: AMRIS can generate a significant amount of overhead traffic, especially in


large networks.
● Security: AMRIS is vulnerable to a variety of security attacks.

Overall, AMRIS is a robust and efficient multicast routing protocol for MANETs. It is well-
suited for a variety of multicast applications, but it is important to be aware of the overhead
and security concerns associated with AMRIS before deploying it in a production environment.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy