Preview

Ad Hoc Network Essay

Powerful Essays
Open Document
Open Document
12496 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ad Hoc Network Essay
ABSTRACT

Ad-hoc networks have opened a new dimension in wireless networks. It allows wireless nodes to communicate in absence of centralized support. It doesn‟t always follow any fixed infrastructure due to high mobility of nodes and multipath propagations. It is highly deployable, self configurable and has dynamically changing topologies. It may connect hundreds to thousands of mobile nodes. Routing protocols of mobile ad-hoc networks differ from the existing internet protocols which are designed for the fixed structure based wireless networks. MANET protocols have to face high challenges due to dynamically changing of topologies, low transmission power and asymmetric links. Due to link instability, node mobility and frequently changing topologies routing becomes one of the core issues in MANETs. A suitable and effective routing mechanism helps to extend the successful deployment of mobile ad-hoc networks. Currently existent routing protocols provide routing solutions up to a certain level and most of them are designed and implemented in small areas. Many researchers are still working on the developments of MANET routing protocols. In our thesis, we are going to concentrate on DSDV , AODV , TORA, LDR and ZRP routing.

-------------------------------------------------
Chapter 1

INTRODUCTION

1.1 INTRODUCTION TO MANET
Wireless networks are playing a major role in the area of communication. Now we are using wireless networks in military applications, industrial applications and even in personal area networks. Previously, the main difference between wireless and wired networks was only in communication channel. There exist physical medium in wired networks, while on the other side physical medium doesn‟t exist on the wireless networks. Wireless networks became very popular in different applications considering the following factors: ease of installation, reliability, cost, bandwidth, total required power, security and performance of network [3]. All



References: [3] K. Gorantala, “Routing Protocols in Mobile Ad-hoc Networks” Masters Thesis, Dept. of Computer Science, Umea University, June 15, 2006. [4] S [7] W. G. LOL, “An Investigation of the Impact of Routing Protocols on MANETs using Simulation Modeling” Master Thesis, School of Computing and Mathematical Science, Auckland university of Technology, 2008. [8] A [9] S. Mittal, P. Kaur, “Performance Comparison of AODV, DSR and ZRP Routing Protocols in MANET 'S” Intl. Conf. on Adv. in Comp., Control, and Telecom. Technologies, Trivandrum, Kerala, India, 28-29, December, 2009. [10] X [15] J. Schaumann “Analysis of the Zone Routing Protocol” Technical report, December, 2002. [16] A [17] C. Yang, L. Tseng “Fisheye Zone Routing Protocol for Mobile Ad-Hoc Networks” Multimedia Communications Laboratory, Second IEEE Consumer Communications and Networking Conference, Taiwan, 2005. [18] A [19] S. Ahmed, M. Bilal, U. Farooq, F. Hadi, “Performance Analysis of various routing strategies in Mobile Ad-hoc Network using QualNet simulator”, Int. Conf. on Emerging Technologies, ICET, Islamabad, 2007. [20] S DSR and TORA: A comprehensive survey on ZRP performance” 10th IEEE Conference Emerging Technologies and Factory Automation, Greece, 2005. [21] N [22] V. D. Park, M. S.Corson, “A highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks” Sixteenth Annual Joint Conf. of the IEEE Comp. and Comm. Societies. Proc., vol.3 pages 1405–1413, 1997. [23] N

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 7

    • 410 Words
    • 2 Pages

    AODV has pooled properties of both DSR and DSDV. It uses route discovery process for sustaining route information through the basis of routing table. It is a reactive protocol as it doesn’t need to establish or maintain routes to nodes that are not involved in the communication. AODV handles route discovery process with Route Request (RREQ) messages to broadcast to neighbour nodes. The message floods through the network till the desired destination is reached. Sequence number guarantees the loop freedom. The destination node at once receiving a RREQ unicasts a Route Reply (RREP) back to the source node. Node transmitting a RREP message creates routing table entries for forward route. For route maintenance, nodes send HELLO messages intermittently to neighbour nodes. If any node in the network miss the mark to receive three consecutive HELLO messages from its neighbour, it presumes that link to that particular node is down. A node that perceive a broken link directs a Route Error (RERR) message to any upstream node. At once a node receives a RERR message it will signpost a new source discovery process. The AODV protocol uses sequence numbers to determine the timeliness of each packet and to…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Basios, C. and Solidakis, M. "Current trends and challenges towards wireless Internet", Computer Systems and Applications, 2005. The 3rd ACS/IEEE International Conference on 2005 Page(s):77…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    Vehicular Ad hoc Network (VANET), a subclass deriving from Mobile Ad Hoc networks (MANET), is a promising approach for future intelligent transportation system…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Routing is the methodology of selecting way or path in a system and also to send network traffic in this path or way and route is the way to send the system traffic. There are two types of routes. One is static routing and other…

    • 1266 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    LYT2 Task2

    • 4061 Words
    • 12 Pages

    This book provides generic approach architecture for the implementation of the wireless sensor networks. It proposes for a move into the routing protocols and improvement of networks through routing optimization, medium access and control of power while at the same time fulfilling the daily goals. It emphasizes on the importance to node information in the many wireless sensor network applications as well as the communication protocol. This solution can be applicable in the case of NHS since the use of wireless sensor networks can greatly help in transferring large data files, including the imaging files to…

    • 4061 Words
    • 12 Pages
    Satisfactory Essays
  • Good Essays

    Hsc300 Week 2 Assignment

    • 866 Words
    • 4 Pages

    This week we covered some additional information in regards to the data layer, more specifically the MAC layer, and went into the network layer of the OSI model. As part of that we discussed different routing protocols and systems.…

    • 866 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    15. What are the four key issues in dynamic routing protocols?Path determination, Metric, Convergence, Load Balancing…

    • 1575 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Mark Twain Character Analysis Mark Twain is a humorous man who often pokes fun at himself and others. For example, in his autobiography, he would never have published his first book had there not been "some industrial person" to gather his sketches for him. Later, on the second page, he pokes fun about the fact that he had fantasized often about killing Carleton in "new and increasingly cruel and increasing inhumane ways". In the second article, "Accidental Plagiarism", he pokes fun at when he recalls he had wished to "prepare the mans remains for burial". In the same paragraph he remarks on how his admirers had told him he had a basketful of brains, though he poked fun at himself by suggesting the basket was not very big.…

    • 492 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Bs311 Unit 3 Essay

    • 3508 Words
    • 15 Pages

    Designing secure key distribution in an ad-hoc network might be an extremely hard task. Any reliance on a certificate of authority is not trivial at all, for the same reasons that reliance in any centralized authority is problematic. Additional problems include the increased packet sizes required by authentication extensions, unicast/multicast routing, Quality of Service support and power aware routing. Furthermore, due to the limited transmission range of wireless network interfaces, multiple hops may be needed to exchange data between nodes in the network (c.f.…

    • 3508 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    (c) Data throughput in sensor networks is a bigger concern than that in mobile ad hoc networks.…

    • 1413 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Misra, S., Misra, S. C., & Woungang, I. (2010). Selected topics in communication networks and distributed systems. Singapore: World Scientific.…

    • 682 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Food safety

    • 3135 Words
    • 9 Pages

    Infrastructure-based wireless networks provide convenient access to the Internet, and are becoming increasingly popular in spite of their costly wired deployment. On the other hand, mobile ad hoc networks (MANETs) eliminate the need for infrastructure, decreasing deployment time and alleviating network construction costs. However, having routing functions on all nodes in a MANET complicates the design of networking devices. The fact that MANET usage is typically limited to military and specialized civilian applications also hinders its growth. By combining an infrastructure-based wireless network and a MANET, a wireless mesh network (WMN) presents a low-cost and fast deployment solution compared to an infrastructure.…

    • 3135 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    IESCCA

    • 899 Words
    • 4 Pages

    Over the past few years, we have witnessed a significant amount of interest in the study of ad-hoc and sensor networks. Unlike cellular networks, these networks can use other nodes as relays to deliver data from different sources to destinations. The relaying functionality adds a complex dimension to the performance analysis of multi-hop networks. The additional traffic imposed by relaying diminishes a node’s ability to transmit its own data. The relays could also induce hot spots (or congested areas) in the network, which in turn result in reducing the overall throughput in the case of battery-limited networks. In this paper, we analyze the impact of straight line routing in large homogeneous multi-hop wireless networks. We estimate the nodal load, which is defined as the number of packets served at a node, induced by straight line routing. For a given total offered load on the network, our analysis shows that the nodal load at each node is a function of the node’s Voronoi cell, the node’s location in the network, and the traffic pattern specified by the source and destination randomness and straight line routing. In which we calculate each node’s probability that the node serves a packet arriving to the network approaches the products of half the length of the Voronoi cell perimeter and the load density function .Based on this density function we generate the straight line path.…

    • 899 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    juniper

    • 185777 Words
    • 1143 Pages

    JNCIA Juniper™ Networks Certified Internet Associate Study Guide by Joseph M. Soricelli with John L. Hammond, Galina Diker Pildush, Thomas E. Van Meter, and Todd M. Warble This book was originally developed by Juniper Networks Inc. in conjunction with Sybex Inc. It is being offered in electronic format because the original book (ISBN: 0-7821-4071-8) is now out of print.…

    • 185777 Words
    • 1143 Pages
    Powerful Essays
  • Powerful Essays

    Handbook of Wireless Networks and Mobile Computing, Edited by Ivan Stojmenovic ´ Copyright © 2002 John Wiley & Sons, Inc. ISBNs: 0-471-41902-8 (Paper); 0-471-22456-1 (Electronic)…

    • 20863 Words
    • 84 Pages
    Powerful Essays

Related Topics