SlideShare a Scribd company logo
MANET
(Mobile Ad-Hoc Network)
and
Routing Techniques and Protocols
How To Drop Unwanted Weight Super Fast! (MGID)
AUTHORS: Saptarshi Bhadra
Soumyadeep Ghosh
IntroductionRecent trends in wireless communications have expanded possible applications from simple voice
services in early cellular networks (firstand second generation,1Gand 2G) to new integrated data applications.4G
technologyis now new promising application ofmobile technology.It is basicallynew generation ofmobile devices.
Fig 1. Mobile ad-hoc network
In a MANET, the router connectivity may change frequently, leading to the multi-hop communication paradigm that
can allow communication withoutthe use of BS/AP, and provide alternative connections inside hotspotcells.A dual-
mode MS can operate in both the infrastructure (communicating directlyto a BS or AP) and MANET modes using the
WLAN interface. A MANET is a type of ad hoc network that can change locations and configure itselfon the fly. All
nodes in this network are mobile and they use wireless connections to communicate with various networks
Routing is one of the core problems ofnetworking for delivering data from one node to the other. Wireless ad-hoc
networks are also called Mobile ad-hoc multihop networks withoutpredetermined topologyor central control. This is
because MANETs can be characterized as having a dynamic,multihop,potentiallyrapid changing topology. The aim
of such networks is to provide communication capabilities to areas with limited or no existing communication
infrastructures.A MANET is usuallyformed by mobile nodes using wireless communications.It uses a peer-to-peer
multihop routing instead ofa static network infrastructure to provide network connectivity.
Some salientcharacteristics ofMANETs are:-
1. Dynamic topologies, 2.)Bandwidth constrained,variable capacitylinks,
3.) Energy constrained operation,and 4.) Limited physical security.
MANET has been a popular topic of research in recentyears with the advent and growth of wireless technology.Two
popular types of MANET are (i) VANET (Vehicular Ad-hoc network) and (ii) iMANET (Internet based ad-hoc
networks).
Several routing protocols have been suggested and used for MANET. Dynamic Source Routing (DSR), Ad Hoc On -
Demand DistanceVector Routing (AODV) and Destination Sequenced Distance-Vector (DSDV) have been
implemented.
There are several ways to study MANETs. One solution is the use of simulation tools like OPNET,NetSim and NS2.
Ns is a discrete event simulator targeted atnetworking research.Ns provides substantial supportfor simulation of
TCP, routing,and multicastprotocols over wired and wireless (local and satellite) networks.The core of ns-2 is also
written in C++, but the C++ simulation objects are linked to shadow objects in OTcl and variables can be linked
between both language realms.Simulation scripts are written in the OTcl language,an extension of the Tcl scripting
language.This structure permits simulations to be written and modified in an interpreted environmentwithouthaving
to resortto recompiling the simulator each time a structural change is made.
The general process ofcreating a simulation can be divided into several steps:-
1. Topology definition:- To ease the creation of basic facilities and define their interrelationships,ns -3 has a system of
containers and helpers thatfacilitates this process.
2. Model usage:- Models are added to simulation (for example,UDP,IPv4, point-to-pointdevices and links,
applications);mostofthe time this is done using helpers.
3. Node and link configuration:- Models settheir default values (for example,the size of packets sentby an application
or MTU of a point-to-pointlink);mostof the time this is done using the attribute system.
4. Execution:- Simulation facilities generate events,data requested by the user is logged.
5. Performance analysis:- After the simulation is finished and data is available as a time-stamped eventtrace. This
data can then be statisticallyanalysed with tools like R to draw conclusions.
6. Graphical Visualization:- Raw or processed data collected in a simulation can be graphed using tools
like Gnuplot, matplotlib or Xgraph. Xgraph is the plotting tool bundled with manyof the installation packages.
Comparative Study
Routing protocols for MANETs can be broadly classified[3]into three main categories:-
1.) Proactive routing protocols:- Every node in the network has one or more routes to any possible destination in its
routing table at any given time.
2.) Reactive routing protocols:-Every node in the network obtains a route to a destination on a demand fashion.
Reactive protocols do not maintain up-to-date routes to any destination in the network and do not generallyexchange
any periodic control messages.
3.) Hybrid routing protocols:-Every node acts reactively in the region close to its proximity and proactively outside of
that region,or zone.
Fig 1. Classification of routing protocols in mobile ad-hoc network.
Some Routing Algorithms in MANETS [7] :-
1. Ad Hoc On-Demand Distance Vector Routing (AODV) – uses traditional routing tables,one entry per
destination.This is in contrastto DSR, which can maintain multiple route cache entries for each destination.
Without source routing,AODV relies on routing table entries to propagate an RREP back to the source and,
subsequently,to route data packets to the destination.AODV uses sequence numbers maintained ateach
destination to determine freshness ofrouting information and to prevent routing loops.All routing packets carry
these sequence numbers.
2. Destination-Sequenced Distance Vector (DSDV)- The firstMANET algorithm thatwe implemented as partof this
work is called the Destination-Sequenced Distance Vector (DSDV) routing algorithm.It is a proactive routing
algorithm.The DSDV algorithm is a Distance Vector (DV) based routing algorithm designed for use in MANETs,
which are defined as the cooperative engagementofa collection ofMobile Hosts withoutthe required intervention
of any centralised Access Point(AP).
It operates each node as a specialised router which periodicallyadvertises its knowledge ofthe network with the
other nodes in the network. It makes modifications to the basic Bellman-Ford routing algorithms,therebydoing away
with the count-to-infinityproblem.The algorithm is designed for portable computing devices such as laptops who
have energy and processing capabilities far beyond that of a typical WSN node.
1. Dynamic Source Routing (DSR)- It is a routing protocol for wireless mesh networks.It is similar to AODV in that it
forms a route on-demand when a transmitting computer requests one.However,it uses source routing instead of
relying on the routing table at each intermediate device.This protocol is truly based on source routing wherebyall
the routing information is maintained (continuallyupdated) atmobile nodes.It has only two major phases,which are
Route Discovery and Route Maintenance. Route Reply would only be generated ifthe message has reached the
intended destination node (route record which is initiallycontained in Route Requestwould be inserted into the
Route Reply). Therefore,it is an on-demand protocol designed to restrictthe bandwidth consumed bycontrol
packets in ad hoc wireless networks byeliminating the periodic table-update messages required in the table-driven
approach.The major difference between this and the other on-demand routing protocols is thatit is beacon-less
and hence does not require periodic hello packet(beacon) transmissions,which are used by a node to inform its
neighbors ofits presence.The basic approach ofthis protocol (and all other on-demand routing protocols) during
the route construction phase is to establish a route by flooding RouteRequestpackets in the network.The
destination node,on receiving a RouteRequestpacket,responds bysending a RouteReplypacketback to the
source,which carries the route traversed by the RouteRequestpacketreceived.
Related Work
Survey of applications of MANET [5]- We shall now get an overview of different types of MANET and their uses.
1. Pure general purpose MANET
The mostlydiscussed application scenario for pure general-purpose MANET is Battlefield or disaster-recovery
networks.However, these kinds ofnetworks have not yet achieved the envisaged impactin terms ofreal world
implementation and industrial deployment.
1. Mesh networks
Mesh networks are builtupon a mix of fixed and mobile nodes interconnected via wireless links to form a multihop ad
hoc network.Unlike pure MANETs, a mesh network introduces a hierarchyin the network architecture by adding
dedicated nodes (called mesh routers) thatcommunicate wirelesslyto constructa wireless backbone.An example is
MIT Roofnetproviding the city of Boston,with broadband access with an 802.11b-based wireless network backbone
infrastructure.
1. Opportunistic Networking (Delay Tolerant Networking)
(i)PocketSwitched Networks in the Haggle Project
It targets solutions for communication in autonomic/opportunistic networks.In this framework,researchers are
studying the properties ofPocket Switched Networks (PSNs),i.e., opportunistic networks thatcan exploit any
possible encountered device (e.g., cell phones and PDAs that users carry in their pockets) to forward messages.
(ii)Wildlife monitoring
Wildlife monitoring is an interesting application field for opportunistic networks.Itfocuses on tracking wild species to
deeply investigate their behavior and understand the interactions and influences on each other,as well as their
reaction to the ecosystem changes caused byhuman activities.
1. Vehicular ad hoc networks
VANETs use ad hoc communications for performing efficientdriver assistance and car safety. The communications
include data from the roadside and from other cars. VANET research aims to supplydrivers with information
regarding obstacles on the road and emergencyevents,mainlydue to line-of-sightlimitations and large processing
delays.VANET can be used to communicate premonitions,notification ofemergencies,and warnings abouttraffic
conditions.
1. Wireless sensor networks (WSN)
WSN benefit from the advances in computing technology,which led to the production ofsmall,wireless,battery
powered,smartsensor nodes.These nodes are active devices with computing and communication capabilities that
not only sample real world phenomena butalso can filter,share,combine,and operate on the data they sense.
Conclusion
This paper discusses the various aspects ofmobile ad-hoc networking,the differentrouting protocols used for
wireless sensor networks and the NS-2 network simulator.Also,we compared DSDVand AODV routing protocols
for ad hoc networks using ns-2 simulations.DSDVuses the proactive table-driven routing strategy while AODV uses
the reactive On-demand routing strategy. AODV performs better under high mobilitysimulations than DSDV. High
mobilityresults in frequentlink failures and the overhead involved in updating all the nodes with the new routing
information as in DSDV is much more than that involved AODV, where the routes are created as and when required.
AODV uses on -demand route discovery, but with different routing mechanics. AODV uses routing tables,one route
per destination,and destination sequence numbers,a mechanism to preventloops and to determine freshness of
routes.There are still many challenges facing wireless ad hoc networks.However because ofthese advantages,
wireless ad hoc networks are becoming more and more prevalentin the world.
References
[1] www.wikipedia.com
[2]www.ucmss.com
[3] Routing techniques for Mobile Ad Hoc Networks Classification and Qualitative/Quantitative Analysis, by Mr.
Ankur Khetrapal,Delhi University.
[4] Characterisation and Applications ofMANET,Routing Algorithms in Wireless Sensor Networks ,bySiddhu Warrier.
[5] A Survey on the Applications of MANET, by Jiazi YI,Polytech’Nantes .
[6] An Overview of Mobile Ad Hoc Networks:Applications and Challenges,by Jeroen Hoebeke,Ingrid Moerman,Bart
Dhoedtand Piet Demeester
[7] Performance Evaluation ofAd Hoc Routing Protocols Using NS2 Simulation, by Samyak Shah, Amit Khandre,
Mahesh Shirole and Girish Bhole
[8] Routing Protocols in Mobile Ad-hoc Networks,by Krishna Gorantala.
[9] An Efficient Scheme for MANET Domain Formation (ESMDF) by Adwan AbdelFattah.
[10] An Improved Approach for Working outside the MANET by Extending MANET Routing Protocol,by Rashween
Kaur Saluja.

More Related Content

DOCX
CHAPTER-1234
PDF
Analysis of Multicast Routing Protocols: Puma and Odmrp
PDF
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
PDF
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
PPTX
Ad hoc network
PDF
Lecture 1 mobile and adhoc network- introduction
PDF
Routing Algorithm for Heterogeneous Wireless Network in Vanet
PPT
Adhoc network
CHAPTER-1234
Analysis of Multicast Routing Protocols: Puma and Odmrp
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Ad hoc network
Lecture 1 mobile and adhoc network- introduction
Routing Algorithm for Heterogeneous Wireless Network in Vanet
Adhoc network

What's hot (18)

PDF
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
PDF
3 a survey analysis on manet routing protocols and mobility models for variou...
PPTX
Mane ts
PDF
Improved AODV based on Load and Delay for Route Discovery in MANET
DOCX
Chapter 5 2 marks for PG PAWSN
PDF
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
PPT
Wmn Tutorial
PDF
Active path updation for layered routing (apular) in wireless
PDF
Advanced Networking on GloMoSim
PPSX
Adhoc technologies
PDF
Design of an Efficient Communication Protocol for 3d Interconnection Network
PDF
J0935461
PPT
Adhoc wireless
PPTX
Mobile ad-hoc network [autosaved]
PDF
An Even Data-Distribution Protocolfor Highly Dynamic VANET
PDF
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
PDF
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
PDF
E1073644
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
3 a survey analysis on manet routing protocols and mobility models for variou...
Mane ts
Improved AODV based on Load and Delay for Route Discovery in MANET
Chapter 5 2 marks for PG PAWSN
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
Wmn Tutorial
Active path updation for layered routing (apular) in wireless
Advanced Networking on GloMoSim
Adhoc technologies
Design of an Efficient Communication Protocol for 3d Interconnection Network
J0935461
Adhoc wireless
Mobile ad-hoc network [autosaved]
An Even Data-Distribution Protocolfor Highly Dynamic VANET
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
E1073644
Ad

Viewers also liked (18)

PDF
Báo cáo PCI năm 2012
PPTX
How To Use TV Advertising To Produce (and Reduce) Profit, David Poltrack
PDF
Vicb qt-10 procedure-for_qms_audit_checked_-_translation_0
PPT
Mark zuckerberg
PDF
The Ninefold Path to Marketing Transformation, Bill Harvey
PPTX
THE ART OF NON SURGICAL SKIN REJUVENATION
PPSX
BOTOX.ADVANCED COURSE.PART ONE. WHAT YOU SHOULD KNOW ABOUT IT?
PPSX
Msi skin resurfacing (rejuvenating) peel
PPTX
LASER TATTOO REMOVAL. THE SAVIOR
PPSX
ADVANCED BOTOX COURSE.PART II. HOW TO INJECT BOTOX SAFELY?
PPSX
THE ART OF NON SURGICAL SKIN REJUVENATION. MULTIPLE APPROACHES
PPSX
Heat in skin rejuvenation. Light, Laser, Radiofrequency
PPSX
Laser Hair removal. Is it Permanent?
PPSX
Radiofrequency. a new tool for non surgical skin tightening
PPSX
Acne Treatment. What is New?
PPSX
The Art of Liquid Face Lift (Botox)
PPSX
The Art of Liquid Face Lift (Dermal Fillers)
PDF
3G basic good
Báo cáo PCI năm 2012
How To Use TV Advertising To Produce (and Reduce) Profit, David Poltrack
Vicb qt-10 procedure-for_qms_audit_checked_-_translation_0
Mark zuckerberg
The Ninefold Path to Marketing Transformation, Bill Harvey
THE ART OF NON SURGICAL SKIN REJUVENATION
BOTOX.ADVANCED COURSE.PART ONE. WHAT YOU SHOULD KNOW ABOUT IT?
Msi skin resurfacing (rejuvenating) peel
LASER TATTOO REMOVAL. THE SAVIOR
ADVANCED BOTOX COURSE.PART II. HOW TO INJECT BOTOX SAFELY?
THE ART OF NON SURGICAL SKIN REJUVENATION. MULTIPLE APPROACHES
Heat in skin rejuvenation. Light, Laser, Radiofrequency
Laser Hair removal. Is it Permanent?
Radiofrequency. a new tool for non surgical skin tightening
Acne Treatment. What is New?
The Art of Liquid Face Lift (Botox)
The Art of Liquid Face Lift (Dermal Fillers)
3G basic good
Ad

Similar to Manet algo (20)

PDF
PDF
Survey of Routing Scheme in MANET with Clustering Techniques
PDF
Ijarcet vol-2-issue-7-2281-2286
PDF
Ijarcet vol-2-issue-7-2281-2286
PDF
Mobile ad hoc networks (MANET) for KTU
PDF
Mobile ad hoc networks (manet)
PPSX
Adhoc and routing protocols
PDF
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
PDF
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PDF
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
PDF
Review on security issues of AODV routing protocol for MANETs
PDF
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
PPT
20CS501Mobile Computing Unit 4 Mobile Ad-Hoc Networks.ppt
PDF
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
PDF
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
PDF
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
PDF
10.1.1.258.7234
PDF
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Survey of Routing Scheme in MANET with Clustering Techniques
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (manet)
Adhoc and routing protocols
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
Review on security issues of AODV routing protocol for MANETs
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
20CS501Mobile Computing Unit 4 Mobile Ad-Hoc Networks.ppt
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
10.1.1.258.7234
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s

Recently uploaded (20)

PPTX
Sustainable Sites - Green Building Construction
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT
Project quality management in manufacturing
PPTX
OOP with Java - Java Introduction (Basics)
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Digital Logic Computer Design lecture notes
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Geodesy 1.pptx...............................................
DOCX
573137875-Attendance-Management-System-original
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
PPT on Performance Review to get promotions
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPT
Mechanical Engineering MATERIALS Selection
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Internet of Things (IOT) - A guide to understanding
Sustainable Sites - Green Building Construction
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Project quality management in manufacturing
OOP with Java - Java Introduction (Basics)
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Digital Logic Computer Design lecture notes
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Geodesy 1.pptx...............................................
573137875-Attendance-Management-System-original
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT on Performance Review to get promotions
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
R24 SURVEYING LAB MANUAL for civil enggi
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
bas. eng. economics group 4 presentation 1.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mechanical Engineering MATERIALS Selection
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Internet of Things (IOT) - A guide to understanding

Manet algo

  • 1. MANET (Mobile Ad-Hoc Network) and Routing Techniques and Protocols How To Drop Unwanted Weight Super Fast! (MGID) AUTHORS: Saptarshi Bhadra Soumyadeep Ghosh IntroductionRecent trends in wireless communications have expanded possible applications from simple voice services in early cellular networks (firstand second generation,1Gand 2G) to new integrated data applications.4G technologyis now new promising application ofmobile technology.It is basicallynew generation ofmobile devices. Fig 1. Mobile ad-hoc network In a MANET, the router connectivity may change frequently, leading to the multi-hop communication paradigm that can allow communication withoutthe use of BS/AP, and provide alternative connections inside hotspotcells.A dual- mode MS can operate in both the infrastructure (communicating directlyto a BS or AP) and MANET modes using the WLAN interface. A MANET is a type of ad hoc network that can change locations and configure itselfon the fly. All nodes in this network are mobile and they use wireless connections to communicate with various networks Routing is one of the core problems ofnetworking for delivering data from one node to the other. Wireless ad-hoc networks are also called Mobile ad-hoc multihop networks withoutpredetermined topologyor central control. This is because MANETs can be characterized as having a dynamic,multihop,potentiallyrapid changing topology. The aim of such networks is to provide communication capabilities to areas with limited or no existing communication
  • 2. infrastructures.A MANET is usuallyformed by mobile nodes using wireless communications.It uses a peer-to-peer multihop routing instead ofa static network infrastructure to provide network connectivity. Some salientcharacteristics ofMANETs are:- 1. Dynamic topologies, 2.)Bandwidth constrained,variable capacitylinks, 3.) Energy constrained operation,and 4.) Limited physical security. MANET has been a popular topic of research in recentyears with the advent and growth of wireless technology.Two popular types of MANET are (i) VANET (Vehicular Ad-hoc network) and (ii) iMANET (Internet based ad-hoc networks). Several routing protocols have been suggested and used for MANET. Dynamic Source Routing (DSR), Ad Hoc On - Demand DistanceVector Routing (AODV) and Destination Sequenced Distance-Vector (DSDV) have been implemented. There are several ways to study MANETs. One solution is the use of simulation tools like OPNET,NetSim and NS2. Ns is a discrete event simulator targeted atnetworking research.Ns provides substantial supportfor simulation of TCP, routing,and multicastprotocols over wired and wireless (local and satellite) networks.The core of ns-2 is also written in C++, but the C++ simulation objects are linked to shadow objects in OTcl and variables can be linked between both language realms.Simulation scripts are written in the OTcl language,an extension of the Tcl scripting language.This structure permits simulations to be written and modified in an interpreted environmentwithouthaving to resortto recompiling the simulator each time a structural change is made. The general process ofcreating a simulation can be divided into several steps:- 1. Topology definition:- To ease the creation of basic facilities and define their interrelationships,ns -3 has a system of containers and helpers thatfacilitates this process. 2. Model usage:- Models are added to simulation (for example,UDP,IPv4, point-to-pointdevices and links, applications);mostofthe time this is done using helpers. 3. Node and link configuration:- Models settheir default values (for example,the size of packets sentby an application or MTU of a point-to-pointlink);mostof the time this is done using the attribute system. 4. Execution:- Simulation facilities generate events,data requested by the user is logged. 5. Performance analysis:- After the simulation is finished and data is available as a time-stamped eventtrace. This data can then be statisticallyanalysed with tools like R to draw conclusions. 6. Graphical Visualization:- Raw or processed data collected in a simulation can be graphed using tools like Gnuplot, matplotlib or Xgraph. Xgraph is the plotting tool bundled with manyof the installation packages. Comparative Study
  • 3. Routing protocols for MANETs can be broadly classified[3]into three main categories:- 1.) Proactive routing protocols:- Every node in the network has one or more routes to any possible destination in its routing table at any given time. 2.) Reactive routing protocols:-Every node in the network obtains a route to a destination on a demand fashion. Reactive protocols do not maintain up-to-date routes to any destination in the network and do not generallyexchange any periodic control messages. 3.) Hybrid routing protocols:-Every node acts reactively in the region close to its proximity and proactively outside of that region,or zone. Fig 1. Classification of routing protocols in mobile ad-hoc network. Some Routing Algorithms in MANETS [7] :- 1. Ad Hoc On-Demand Distance Vector Routing (AODV) – uses traditional routing tables,one entry per destination.This is in contrastto DSR, which can maintain multiple route cache entries for each destination. Without source routing,AODV relies on routing table entries to propagate an RREP back to the source and, subsequently,to route data packets to the destination.AODV uses sequence numbers maintained ateach destination to determine freshness ofrouting information and to prevent routing loops.All routing packets carry these sequence numbers. 2. Destination-Sequenced Distance Vector (DSDV)- The firstMANET algorithm thatwe implemented as partof this work is called the Destination-Sequenced Distance Vector (DSDV) routing algorithm.It is a proactive routing algorithm.The DSDV algorithm is a Distance Vector (DV) based routing algorithm designed for use in MANETs, which are defined as the cooperative engagementofa collection ofMobile Hosts withoutthe required intervention of any centralised Access Point(AP). It operates each node as a specialised router which periodicallyadvertises its knowledge ofthe network with the other nodes in the network. It makes modifications to the basic Bellman-Ford routing algorithms,therebydoing away with the count-to-infinityproblem.The algorithm is designed for portable computing devices such as laptops who
  • 4. have energy and processing capabilities far beyond that of a typical WSN node. 1. Dynamic Source Routing (DSR)- It is a routing protocol for wireless mesh networks.It is similar to AODV in that it forms a route on-demand when a transmitting computer requests one.However,it uses source routing instead of relying on the routing table at each intermediate device.This protocol is truly based on source routing wherebyall the routing information is maintained (continuallyupdated) atmobile nodes.It has only two major phases,which are Route Discovery and Route Maintenance. Route Reply would only be generated ifthe message has reached the intended destination node (route record which is initiallycontained in Route Requestwould be inserted into the Route Reply). Therefore,it is an on-demand protocol designed to restrictthe bandwidth consumed bycontrol packets in ad hoc wireless networks byeliminating the periodic table-update messages required in the table-driven approach.The major difference between this and the other on-demand routing protocols is thatit is beacon-less and hence does not require periodic hello packet(beacon) transmissions,which are used by a node to inform its neighbors ofits presence.The basic approach ofthis protocol (and all other on-demand routing protocols) during the route construction phase is to establish a route by flooding RouteRequestpackets in the network.The destination node,on receiving a RouteRequestpacket,responds bysending a RouteReplypacketback to the source,which carries the route traversed by the RouteRequestpacketreceived. Related Work Survey of applications of MANET [5]- We shall now get an overview of different types of MANET and their uses. 1. Pure general purpose MANET The mostlydiscussed application scenario for pure general-purpose MANET is Battlefield or disaster-recovery networks.However, these kinds ofnetworks have not yet achieved the envisaged impactin terms ofreal world implementation and industrial deployment. 1. Mesh networks Mesh networks are builtupon a mix of fixed and mobile nodes interconnected via wireless links to form a multihop ad hoc network.Unlike pure MANETs, a mesh network introduces a hierarchyin the network architecture by adding dedicated nodes (called mesh routers) thatcommunicate wirelesslyto constructa wireless backbone.An example is MIT Roofnetproviding the city of Boston,with broadband access with an 802.11b-based wireless network backbone infrastructure. 1. Opportunistic Networking (Delay Tolerant Networking) (i)PocketSwitched Networks in the Haggle Project It targets solutions for communication in autonomic/opportunistic networks.In this framework,researchers are studying the properties ofPocket Switched Networks (PSNs),i.e., opportunistic networks thatcan exploit any
  • 5. possible encountered device (e.g., cell phones and PDAs that users carry in their pockets) to forward messages. (ii)Wildlife monitoring Wildlife monitoring is an interesting application field for opportunistic networks.Itfocuses on tracking wild species to deeply investigate their behavior and understand the interactions and influences on each other,as well as their reaction to the ecosystem changes caused byhuman activities. 1. Vehicular ad hoc networks VANETs use ad hoc communications for performing efficientdriver assistance and car safety. The communications include data from the roadside and from other cars. VANET research aims to supplydrivers with information regarding obstacles on the road and emergencyevents,mainlydue to line-of-sightlimitations and large processing delays.VANET can be used to communicate premonitions,notification ofemergencies,and warnings abouttraffic conditions. 1. Wireless sensor networks (WSN) WSN benefit from the advances in computing technology,which led to the production ofsmall,wireless,battery powered,smartsensor nodes.These nodes are active devices with computing and communication capabilities that not only sample real world phenomena butalso can filter,share,combine,and operate on the data they sense. Conclusion This paper discusses the various aspects ofmobile ad-hoc networking,the differentrouting protocols used for wireless sensor networks and the NS-2 network simulator.Also,we compared DSDVand AODV routing protocols for ad hoc networks using ns-2 simulations.DSDVuses the proactive table-driven routing strategy while AODV uses the reactive On-demand routing strategy. AODV performs better under high mobilitysimulations than DSDV. High mobilityresults in frequentlink failures and the overhead involved in updating all the nodes with the new routing information as in DSDV is much more than that involved AODV, where the routes are created as and when required. AODV uses on -demand route discovery, but with different routing mechanics. AODV uses routing tables,one route per destination,and destination sequence numbers,a mechanism to preventloops and to determine freshness of routes.There are still many challenges facing wireless ad hoc networks.However because ofthese advantages, wireless ad hoc networks are becoming more and more prevalentin the world. References [1] www.wikipedia.com [2]www.ucmss.com [3] Routing techniques for Mobile Ad Hoc Networks Classification and Qualitative/Quantitative Analysis, by Mr. Ankur Khetrapal,Delhi University. [4] Characterisation and Applications ofMANET,Routing Algorithms in Wireless Sensor Networks ,bySiddhu Warrier.
  • 6. [5] A Survey on the Applications of MANET, by Jiazi YI,Polytech’Nantes . [6] An Overview of Mobile Ad Hoc Networks:Applications and Challenges,by Jeroen Hoebeke,Ingrid Moerman,Bart Dhoedtand Piet Demeester [7] Performance Evaluation ofAd Hoc Routing Protocols Using NS2 Simulation, by Samyak Shah, Amit Khandre, Mahesh Shirole and Girish Bhole [8] Routing Protocols in Mobile Ad-hoc Networks,by Krishna Gorantala. [9] An Efficient Scheme for MANET Domain Formation (ESMDF) by Adwan AbdelFattah. [10] An Improved Approach for Working outside the MANET by Extending MANET Routing Protocol,by Rashween Kaur Saluja.