260 likes | 610 Views
MANET : M obile A d-hoc NET work. Prepared by : Sneha. A. Pandya . M.E. Sem-I [CSE] Exam number: 5011. Guided by : Prof. K.R.Parmar. CONTENTS. DRAWBACKS OF EXSISTING NETWORKS. SOLUTION TO IT : ‘ MANET ’ CONCEPT OF MANET & ITS ATTRIBUTES. ROUTING W.R.F. TO MANET.
E N D
MANET : Mobile Ad-hoc NETwork Prepared by: Sneha. A. Pandya. M.E. Sem-I [CSE] Exam number: 5011. Guided by: Prof. K.R.Parmar.
CONTENTS DRAWBACKS OF EXSISTING NETWORKS. SOLUTION TO IT : ‘MANET’ CONCEPT OF MANET & ITS ATTRIBUTES. ROUTING W.R.F. TO MANET. PROTOCOLS FOR ROUTING. SECURITY : THREATS & SOLUTIONS. APPLICATIONS OF MANETs. SHORTCOMINGS of MANETs. CONCLUSION.
Existing networks Networking : to share the resources & exchange the information among all the nodes which are interconnected. LAN MAN WAN DRAWBACKS: Setting up of fixed access points and backbone infrastructure is not always viable/possible. Infrastructure may not be present everywhere.. i.e. in a disaster area or battle-field or in a remote area.
MANET: Mobile Ad-hoc NETwork “A mobile ad hoc network is a collection of wireless nodes that can be dynamically set up ANYWHERE and ANYTIME, without using any pre-existing network infrastructure & which can form any arbitrary topology.” B’coz of its characteristics, MANETs make network available ALL THE TIME & EVERY WHERE……
Why Ad Hoc Networks ? Ease of deployment. Speed of deployment. Decreased dependence on infrastructure. Dynamic topology. User flexibility.
ROUTING Routing means to guide the data within the n/w from source to destination efficiently. Router does this by acquiring enough knowledge of the topology of the network. The following tasks should be taken care off : - Minimize the number of hops (path-length) - Minimize delay - Minimize packet loss - Minimize cost
Why is Routing in MANET Different? Nodes themselves behave as routers & they are free to move at any speed, in any direction and they can organize themselves randomly. Host mobility : Link failure/repair due to mobility Rate of link failure/repair is higher when nodes move fast Distributed Environment No centralized routing possible b’coz of the highly dynamic nature of the network. Route stability must be ensured despite mobility.
DSDV : Destination-Sequenced Distance-Vector Routing A table driven type of protocol based on BALLAMAN-FORDrouting algorithm. Each node maintains a routing table which contains: route to every possible destination number of hops to the destination a sequence number assigned by the destination node.
DSDV routing updates Each node periodically transmits updates, which includes its own sequence number & its own routing table updates. When two routes to a destination received from two different neighbors then Chooses the one with greatest destination sequence number. If equal, chooses the smaller metric (hop count).
AODV: Ad-hoc On-demand Distance Vector Routing. Pure on-demand routing protocol A node does not perform route discovery or maintenance until it needs a route to another node or it offers its services as an intermediate node. Nodes that are not on active paths do not maintain routing information and do not participate in routing table exchanges. Uses a broadcast route discovery mechanism. Uses hop-by-hop routing.
IN AODV: Source node floods Route Request (RREQ) to its neighbors. All node addtheir own identifier while forwarding RREQ further to their neighbors. When the intended destination receives a Route Request, it replies by sending aRoute Reply (RREP) Route Reply travels along the reverse path set-up when Route Request is forwarded.
ATTACKER IS IN THE PROXIMITY, BUT NOT A TRUSTED NODE OF THE N/W. ATTACKERS ARE THE WILLING PARTICIPANTS OF THE N/W. SECURITY THREATS ATTACKS EXTERNAL INTERNAL ATTACKS ON ROUTING PROTOCOL ATTACKS ON PACKET DELIVERY
PREVENTION TO SECURITY THREATS • EXTERNAL ATTACKS: • Encryption • Authentication • Key management • INTERNAL ATTACKS: Security Routing Protocol based on DSR Protocol (on-demand): - set of security extensions are applied to protocols. SEAD Protocol based on DSDV Protocol (table driven): -security is provided on hop-to-hop basis. Ariadne Prtocol based on DSR Protocol (on-demand): -security is provided on point-to-point basis
Search-and-rescue applications in disaster situations. Defense(army, navy & air force) applications. Health Care applications. Academic environment applications. Industrial or corporate environment applications. APPLICATIONS OF MANETs
SHORTCOMINGSOF MANET Battery constraints : network life limited by battery life. Mobility-induced route changes/packet losses. The radio interference. Packet collisions
Key Research Issues Related to MANET QoS Supporting model. Security, Reliability & Availability. Internetworking mechanism.
CONCLUSION MANETS are the networks established in an arbitrary fashion. Operate in the absence of a fixed infrastructure. They can be used to provide network facilities in places where it isn't possible to form a fixed network or where it isn't cost effective to do so. Although there are numerous benefits of the MANETs, due to their nature, they are vulnerableand not deployable on a large scale because of the limits of technology.
REFERENCES Books: Subir Kumar Sarkar,T G Basavaraju & C Puttamadappa, Ad Hoc Mobile Wireless Networks, Auerbach Publications. Prashant Mohapatra & Srikanth V. Krishnamurthy, Ad-hoc Networks : Technologies and Protocols; Springer Publication. Dharmaprakash Agarwal & Qing-in-Zing, Wireless and Mobile systems; Thomson Publications. Kaveh Pahlavan & Prashant Krishnamurthy ; Principles of Wireless Networks, PHI Publication. Web sites: www.ietf.org/mail-archive/web/manet/current/msg07065.html http//www.computingunplugged.com/issues. J. Broch, D. Maltz, D. Johnson, Y-C. Hu, and J. Jetcheva. “A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols”. In Proceedings of IEEE/ACM MobiCom, pages 85–97, 1998.