Unit V Mobile Computing - 250201 - 100612
Unit V Mobile Computing - 250201 - 100612
A MANET consists of a number of mobile devices that come together to form a network
as needed, without any support from any existing internet infrastructure or any other kind
of fixed stations.
A MANET can be defined as an autonomous system of nodes or MSs (also serving as
routers) connected by wireless links, the union of which forms a communication network
modeled in the form of an arbitrary communication graph.
This is in contrast to the well-known single hop cellular network model that supports the
needs of wireless communication between two mobile nodes relies on the wired backbone
and fixed base stations.
In a MANET, no such infrastructure exists and network topology may be changed
dynamically in an unpredictable manner since nodes are free to move and each node has
limiting transmitting power, restricting access to the node only in the neighboring range.
MANETs are basically peer-to-peer, multi-hop wireless networks in which information
packets are transmitted in a store and forward manner from a source to an arbitrary
destination, via intermediate nodes as given in the figure:
As nodes move, the connectivity may change based on relative locations of other
nodes. The resulting change in the network topology known at the local level must be
passed on to other nodes so that old topology information can be updated.
For example, as MS2 in the figure changes its point of attachment from MS3 to MS4,
other nodes that are part of the network should use this new route to forward packets to
MS2. In the figure, we assume that it is not possible to have all nodes within each
other's radio range. In case all nodes are closed by within each other's radio range, there
are no routing issues to be addressed.
In figures raise another issue, that of symmetric and asymmetric (bidirectional) and
asymmetric (unidirectional) links. Consider symmetric links with associative radio
range; for example, if MS1 is within radio range of MS3, then MS3 is also within
radio range of MS1. The communication links are symmetric. This assumption is not
always valid because of differences in transmitting power levels and the terrain.
Routing in asymmetric networks is relatively hard task. In certain cases, it is possible
to find routes that exclude asymmetric links, since it is cumbersome to find the return
path. The issue of efficient is one of the several challenges encountered in a MANET.
The other issue is varying the mobility patterns of different nodes. Some other nodes
are highly mobile, while others are primarily stationary. It is difficult to predict a
node's movement and direction of movement and numerous studies have been
performed to evaluate their performance using different simulators.
Characteristics of MANET
o Dynamic Topologies: nodes are free to move arbitrarily; thus the network topology
may be changed randomly and unpredictably and primarily consists of bidirectional
links. In some cases where the transmission power of two nodes is different, a
unidirectional link may exist.
o Bandwidth-constrained and variable capacity links: wireless links continue to have
significantly lower capacity than infrastructure networks.
o Energy-constrained operation: some or all of the MSs in a MANET may rely on
batteries or other exhaustible means for their energy. For these nodes or devices, the most
important system design optimization criteria may be energy conservation.
o Limited physical security: MANETs are generally more prone to physical security
threats than wireline networks. The increased possibility of eavesdropping, spoofing, and
denial of services (DoS) attacks should be considered carefully. To reduce security
threats, many existing link security techniques are often applied within wireless networks.
Applications of MANET
Some specific applications of adhoc networks include industrial and commercial applications
involving cooperative mobile data exchange. There are many existing and future military
networking requirements for robust, IP-compliant data services within mobile wireless
communication networks, with many of these networks consist of highly dynamic
autonomous topology segments. Advanced features of Mobile ad hoc networks, including
data rates compatible with multimedia applications global roaming capability, and
coordination with other network structures are enabling new applications.
Routing
Routing is the process of finding the best path for traffic in a network, or across multiple
networks. The role of routing is similar to the roadmap for a hotel. In both cases, we need to
deliver messages at proper location and in an appropriate way.
In a MANET, each node or device is expected to serve as a router, and each router is in
distinguishable from another in the sense that all routers execute the same routing algorithm to
compute paths through the entire network.
o Since centralized routing in a dynamic and even for small networks is impossible
therefore routing computation must be distributed.
o Route computation should not add many more nodes.
o If any host demands for the route, they must have quick access.
o Maintenance of a global state should not involve in the route computation.
o Each node should care about their destination node to its route and should not be
involved in frequent topology updates for those portions of the network that have no
traffic.
o Since broadcast can be time consuming for MANETs, it must be avoided as much as
possible.
o In routing there must have a backup route when the primary route has become stale.
Routing Classification
1. Proactive Protocol
2. Reactive Protocol
3. Hybrid Protocol
1. Proactive Protocol
Proactive protocols attempt to evaluate continuously the routes within the network. It means
proactive protocol continuously maintain the routing information, so that when a packet
needs to be forwarded, the path is known already and can be immediately used. The family of
distance vector protocols is an example of proactive scheme.
The advantage of the proactive schemes is that whenever a route is needed, there is negligible
delay in determining the route.
2. Reactive Protocols
Reactive protocols do not maintain routes but invoke a route determination procedure only on
demand or we can say reactive protocols build the routes only on demand. Thus, when a route
is required, some sort of global search procedure is initiated. The family of classical flooding
algorithms belongs to the reactive protocol group. Examples of reactive ad-hoc network
routing protocols include ad hoc on demand distance vector (AODV) and temporally ordered
routing algorithm (TORA).
3. Hybrid Protocols
Hybrid protocols attempt to take advantage of best of reactive and proactive schemes. The
basic idea behind such protocols is to initiate route discovery on demand but at a limited
search cost. One of the popular hybrid protocols is zone routing protocol (ZRP).
1. Table-driven protocols
2. Source initiated on –demand protocols
o These protocols are called table-driven because each node is required to maintain one
or more tables containing routing information on every other node in the network.
o They are proactive in nature so that the routing information is always consistent and
up to date.
o The protocols respond to changes in network topology by propagating the updates
throughput the network so that every node has a consistent view of the network.
For example the routing table of Node A from the above network is:
A A 0 A46 001000
B B 1 B36 001200
C B 2 C28 001500
Basically the tables to res description of all possible paths reachable by node A, along with the
hop, number of hops, sequence number and install time.
Advantages
o Destination sequenced distance vector routing was one of the early algorithms
available. It is suitable for creating ad-hoc networks with small no. of nodes.
Disadvantage
o Destination sequenced distance vector routing requires a regular update of its routing
tables, which uses more battery power and a small amount of bandwidth even when
the network is idle.
o This algorithm is not suitable for highly dynamic networks.
:
o AODV is a routing protocol for MANETs (mobile adhoc networks) and other
wireless ad hoc networks.
o It is a reactive routing protocol; it means it establishes a route to a destination
only on demand.
o AODV routing is built over the DSDV algorithm. It is a significant
improvement over DSDV.
o The devices that are not on a particular path do not maintain routing
information, nor do they participate in the routing table exchanges.
o When a source requires sending a message to a destination and does not have
a valid route to the latter, the source initiates a route discovery process.
o Source sends a route request (RREQ) packet to all its neighbors, the latter
forward he request to all their neighbors, and so on, until either the
destination or an intermediate mobile (node) with a "fresh enough" route to
the destination is reached.
The above figure illustrates the propagation of the broadcast request (RREQs) across the
network. Since in DSDV, destination sequence numbers are used to ensure that all routes are
loop free and contain the most recent route information. Each node has a unique sequence
number and a broadcast ID, which is incremented each time the node, initiates RREQ.
The broadcastID, together with the IP address of node, uniquely identifies every RREQ.
Intermediate mobile reply only if they have a route to the destination with a sequence number
greater than or at least equal to that contained in the RREQ. To optimize the route
performance, intermediate nodes record the address.
From the above figure, since RREP (route reply packet) travels back on the reverse path, the
nodes on this path set up their forward route entries to point to the node from which RREP
had just been received. These forward route records indicate the active forward route. The
RREP continues traveling back along the reverse path till it reaches the initiator of the route
discovery. Thus, AODV can support only the use of symmetric links.
C. Next Hop Table: It contains the information about the immediate neighbor
of particular node.
D. Distance Table: It contain the distance of a node from all the nodes in network
1. Advantages
1. Higher accuracy of GSR in generating optimal path as compared to LSR.
2. Broadcasting reduces error rate as compare to flooding used in LSR.
2. Disadvantages
1. Large Bandwidth consumption
2. Higher operational cost
3. Large message size resulting in more time consumption
Temporally-Ordered Routing Algorithm (TORA)
• TORA is a source initiated on demand routing protocol.
• It was invented by Vincent Park and M. Scott Corson from university of Maryland
in 1997 for wireless ad hoc network.
• TORA is a highly adaptive, efficient, loop-free and scalable routing protocol based
on link reversal algorithm.
• Highly adaptive, loop-free, distributed routing algorithm based on the concept of
link reversal
• TORA decouples the generation of potentially far-reaching control messages from
the rate of topological changes.
• TORA works in three main phases:
• Route creation: Route creation from source to destination.
• Route maintenance: Maintenance of the route.
• Route erasure: Erasing of the route when the route is no longer valid.
• TORA attempts to build a separate directed acyclic graph (DAG) by each node to every
destination. When a route to a particular destination is required, the source node
broadcasts a QUERY packet containing the address of the destination. The route query
propagates via the network till it reaches either the destination or an intermediate node
containing the route to the destination.
• TORA contains a quintuple metric which consists of:
• Logical time of link failure.
• Unique ID of the node that defines the new reference level.
• A reflection indicator bit.
• A propagation ordering parameter.
• Unique ID of the node.
• Advantages: provides loop free paths at all instants and multiple routes so that if
one path is not available, other is readily available. It establishes routes quickly so
that they may be used before the topology changes.
• Drawbacks: exhibits instability behavior similar to "count-to-infinity" problem in
distance vector routing protocols.
QoS MANET: Following are quality of service parameters in MANEt
Given the dynamic topology of mobile ad hoc networks (MANETs) and the limited bandwidth available, supplying
quality of service (QoS) is a major challenge. Several research projects are currently underway with the aim of
providing QoS on the Internet and in other network architectures, but most of the proposed solutions are
incompatible with ad hoc networks. The study of QoS for ad hoc networks is important, as QoS would enable more
sensitive network administration and more equal resource sharing, optimizing network costs.
For QoS to be supported, link information such as delay, available bandwidth, cost, and error levels needs to be
available and controllable. However, it is difficult to obtain this kind of information in ad hoc networks as the radio
link changes according to environmental circumstances. Limited resources and node mobility complicate the task
still further.
The standardization of routing protocols for ad hoc networks has aroused growing interest among research groups
in the field, which aim to improve performance and satisfy application constraints. A number of drafts have
appeared on the subject, notably from the MANET, HIPERCOM, and Nokia searching center (NSC) groups. They
deal with different ad hoc protocols in great detail, including ad hoc on-demand distance-vector (AODV), dynamic
source routing, optimized link-state routing (OLSR), and TBRPF
Multiple Access Control : Issues
1. Mobility of Nodes
This issue frequently occurs while transmitting the data through MAC channel as any
controlling while data is being exchanged among nodes might affect the mobility of nodes in its
environment.
Another issue that occurs most frequently is the hidden terminal problem. The hidden
terminal issue occurs when:
Consider three mobile nodes sharing a single MAC channel then:
o “A” & “B” and “B” & “C” can transmit data to each other but “A” is not in the
range to connect to “C” and “B” is the common node of transmission between
“A” and “C”.
o At a particular time, if “A” sends data packets to “B” and “C” sends data packets
to “B” collision will occur and this problem of non-coordination among the
nodes is known as hidden terminal issue. Here, “A”, “B” & “C” are mobile
nodes/devices.
Exposed terminal problem arise when, for an on-going data transmission between two nodes and
other nodes want to share the data but due to unavailability of information of which nodes are
currently in connect, data transmission does not occur even if the other nodes are free.
The problem is:
o “A” and “B” are transmitting the data.
o “A” can transmit data to “B” only and “C” wants to wants to share the data to “d”, it
might not be able to share data to “D” because it might think that “B” & “D” are
transmitting data but that will not be the actual case and it will result in prevention of
data transmission and delay.