MANET Literature Review
MANET Literature Review
MANET Literature Review
Multihop routing capability. Because the wireless transmission range of mobile nodes is often limited, sources and destinations may typically not be within direct transmission range of each other. Hence, the routing protocol must be able to discover multihop routes between sources and destinations so that communication between those nodes is possible. Dynamic topology maintenance. Once a route is established, it is likely that some link in the route will break due to node movement. In order for a source to communicate with a destination, a viable routing path must be maintained, even while the intermediate nodes, or even the source or destination nodes, are moving. Further, because link breaks on ad hoc networks are common, link breaks must be handled quickly with a minimum of associated overhead. Loop prevention. Routing loops occur when some node along a path selects a next hop to the destination is also a node that occurred earlier in the path. When a routing loop exists, data and control packets may traverse the path multiple times until either the path is fixed and the loop is eliminated, or until the time to live (TTL) of the packet reaches zero. Because bandwidth is scarce and packet processing and forwarding is expensive, routing loops are extremely wasteful of resources and are detrimental to the network. Even a transitory routing loop will have a negative impact on the network. Hence, loops should be avoided at all times.
are sensitive to packet loss and delay and may have minimum bandwidth requirements Consequently, the best-effort service may not be suitable for these applications. Technically, there are two ways in which QoS can be achieved: (1) over-provisioning and (2) traffic engineering. Over provisioning utilizes the best-effort approach and simply increases the available resources (e.g. bandwidth, buffers etc.). For example, network designers could simply increase the capacity of a congestion link or network from 10 to 100 Mb. The second approach, traffic engineering, tries to utilize resources efficiently and to make the network QoS-aware. This could include additional service classes, admission control, resource reservations and so on. In this paper, we focus on the traffic-engineering approach. Research and development efforts are under way to enhance the Internet with QoS components that will allow the transport of real-time data (e.g. digitized audio and video). However, these enhancements may not be suitable for ad hoc networks. For example, current QoS routing algorithms require accurate link state (e.g. available bandwidth, packet loss rate, estimated delay etc.) and topology information. The time varying capacity of wireless links, limited resources and node mobility make maintaining accurate routing information very difficult if not impossible in an ad hoc networking environment. Thus, while providing QoS support in addition to flexibility and mobility is a tremendously challenging task for the Internet as well as cellular networks, in which the mobile node is only a single hop from a wired fixed infrastructure, supporting QoS in ad hoc networks is an even more difficult challenge. 2.3 AD HOC NETWORKS APPLICATIONS In this section, we present some applications of ad hoc networks [25]: Conferencing :Mobile conferencing is without a doubt one of the most recognized applications. Establishment of an ad hoc network is essential for mobile users where they need to collaborate in a project outside the typical office environment. Emergency Services: Responding to emergency situations such as disaster recovery is yet another naturally fitting application in the ad hoc networking domain. During the time of emergencies, several mobile users (policeman, firefighters, first response personnel) with
different types of wireless devices need to not only communicate but also maintain the connectivity for long periods of time. Home Networking. The wireless computers at home can also create an ad hoc network where each node can communicate with the others without taking their original point of attachment into consideration. This approach is alternative to assigning multiple IP addresses to each wireless device in order to be identified. Embedded Computing Applications. Several ubiquitous computing [26] internetworking machines offer flexible and efficient ways of establishing communication methods with the help of ad hoc networking. Many of the mobile devices already have add-on inexpensive wireless components, such as PDAs with wireless ports and Bluetooth radio devices. Sensor Dust. This application can be considered a combination of ad hoc and sensor networks. In hazardous or dangerous situations, it makes sense to distribute a group of sensors with wireless transceivers to obtain critical information about the unknown site by the creation of ad hoc networks of these sensors.
from the general goal of IP layer routing, but the underlying design assumption of wireless interfaces and possibly mobile routing nodes presents increased technical challenges.
Figure 2.1 Dynamic routing in a changing topology The traditional link-state and distance-vector algorithm do not scale in large MANETs. This is because periodic or frequent route updates in large networks may consume significant part of the available bandwidth, increase channel contention and may require each node to frequently recharge their power supply. To overcome the problems associated with the link-state and distance-vector algorithms a number of routing protocols have been proposed for MANETs. These protocols can be classified into three different groups: global/proactive, ondemand/reactive and hybrid. In proactive routing protocols, the routes to all the destination (or parts of the network) are determined at the start up, and maintained by using a periodic route update process. In reactive protocols, routes are determined when they are required by the source using a route discovery process. Hybrid routing protocols combine the basic properties of the first two classes of protocols into one. That is, they are both reactive and proactive in nature. Each group has a number of different routing strategies, which employ a flat or a hierarchical routing structure.
Even though a node does not have accurate information about distant nodes, the packets are routed correctly because the route information becomes more and more accurate as the packet moves closer to the destination.
In AODV, each node maintains its own sequence number and a broadcast ID. Each RREQ message contains the sequence numbers of the source and destination nodes and is uniquely identified by the source nodes address and a broadcast ID. AODV utilizes dest ination sequence numbers to ensure loop-free routing and use of up-to-date route information. Intermediate nodes can reply to the RREQ message only if they have a route to the destination whose destination sequence number is greater or equal to that contained in the RREQ message. So that a reverse path can be set up, each intermediate node records the address of the neighbor from which it received the first copy of the RREQ message, and additional copies of the same RREQ message are discarded. Once the RREQ message reaches the destination (or an
(b) RREP message sent back to source Figure 2.2 Route discovery in AODV intermediate node with a fresh route) the destination (or the intermediate node) responds by sending a route reply (RREP) packet back to the neighbour from which it first received the RREQ message. As the RREP message is routed back along the reverse path, nodes along this path set up forward path entries in their routing tables (Figure 2.2(b)). When a node detects a link failure or a change in neighbor-hood, a route maintenance procedure is invoked: If a source node moves, it can restart the route discovery procedure to find a new route to the destination. If a node along the route moves so that it is no longer contactable, its upstream neighbour sends a link failure notification message to each of its active upstream neighbors. These nodes in turn forward the link failure notification to their upstream neighbours until the link failure notification reaches the source node.
Each node in the network keeps a cache of the source routes that it has learned. When a node needs to send a packet to some destination, it first checks its route cache to determine whether it already has an up-to-date route to the destination. If no route is found, the node initiates the route discovery procedure by broadcasting a route request message to neighbouring nodes. This route request message contains the address of the source and destination nodes, a unique identification number generated by the source node, and a route record to keep track of the sequence of hops taken by the route request message as it is propagated through the network. When an intermediate node receives a route discovery request, it checks whether its own address is already listed in the route record of the route request message. If not, it appends its address to the route record and forwards the route request to its neighbours. Figure 2.3(a) illustrates the formation of the route record as the route request propagates through the network. When the destination node receives the route request, it appends its address to the route record and returns it to the source node within a new route reply message. If the destination already has a route to the source, it can use that route to send the reply; otherwise, it can use the route in the route request message to send the reply. The first case is for situations where a network might be using unidirectional links and so it might not be possible to send the reply using the same route taken by the route request message. If symmetric links are not supported, the destination node may initiate its own route discovery message to the source node and piggyback the route reply on the new route request message. Figure 2.3(b) shows the transmission of route record back to the source node. Route maintenance uses route error messages and acknowledgement messages. If a node detects a link failure when forwarding data packets, it creates a route error message and sends it to the source of the data packets. The route error message contains the address of the node that generates the error and the next hop that is unreachable. When the source node receives the route error message, it removes all routes from its route cache that have the address of the node in error. It may initiate a route discovery for a new route if needed. In addition to route error message, acknowledgements are used to verify the correct operation of links. To reduce the route search overhead, an important optimization is allowing an intermediate node to send a route reply to the source node if it already has an upto-date route to the destination.
In ZHLS, when a route to a remote destination is required (i.e. the destination is in another zone), the source node broadcast a zonelevel location request to all other zones, which generates significantly lower overhead when compared to the flooding approach in reactive protocols. Another advantage of ZHLS is that the routing path is adaptable to the changing topology since only the node ID and the zone ID of the destination is required for routing. This means that no further location search is required as long as the destination does not migrate to another zone. However, in reactive protocols any intermediate link breakage would invalidate the route and may initiate another route discovery procedure. The Disadvantage of ZHLS is that all nodes must have a preprogrammed static zone map in order to function. This may not feasible in applications where the geographical boundary of the network is dynamic. Nevertheless, it is highly adaptable to dynamic topologies and it generates far less overhead than pure reactive protocols, which means that it may scale well to large networks.
BIBLIOGRAPHY [1] C. Chaudet, I. Guerin-Lassous: BRuIT: Bandwidth Reservation under InTerferences influence, in European Wireless (EW), p. 466-472, 2002. [2] S-B. Lee, G-S. Ahn, X. Zhang, A.T. Campbell: INSIGNIA: An IP-Based Quality of Service Framework for Mobile ad Hoc Networks, in Journal of Parallel and Distributed Computing, NN60, pp.374-406, 2000. [3] C. E. Perkins, E. M. Belding-Royer, and S. Das. Ad hoc On- Demand Distance Vector (AODV) Routing. RFC 3561, July 2003. [4] C. E. Perkins and E. M. Royer. The Ad hoc On-Demand Distance Vector Protocol. In C. E. Perkins, editor, Ad hoc Networking, pages 173.219. Addison-Wesley, 2000. [5] Extensions to OSPF to Support Mobile Ad Hoc Networking, Madhavi Chandra, Abhay Roy, Mar-10, RFC 5820 [6] R. de Renesse, M. Ghassemian Qos Enabled Routing in Mob International Conference on 3G pp. 678-682 (2004) [7] Nur Idawati Md Enzai, Farhat A Study of QoS-Enabled AODV Conference on May, 2008. [8] Nityananda Sarma, Sukumar in Route Recovery for QAODV ,The International conference on Symposium and Networks, DOI 10.1109/I-SP [9] X. Li, L. Cuthbert, "MultiPath QoS Routing for supporting DiffServ in Mobile Ad Hoc Networks, 6th International Conference on Software Engineering, Artificial Intelligence, and [10] Spilios Giannoulis, Christos Antonopoulos, Evangelos Topalis, Stavros Koubias ZRP versus DSR and TORA: A comprehensive survey on ZRP performance, Emerging Technologies and Factory Automation, 2005. ETFA 2005, vol. 1, September 2005. [11] A. Duran and C.-C. Shen, "Mobile ad hoc P2P file sharing," WCNC 2004 - IEEE Wireless Communications and Networking Conference, Vol. 5, No. 1, March 2004, pp. 114-119.
[12] J. Mischke and B. Stiller, "Efficient protocol specification and implementation for a highly scalable peer-to-peer search infrastructure," NOMS 2004 - IEEE/IFIP Network Operations and Management Symposium, Vol. 9, No. 1, Apr 2004, pp. 411-424. [13]Proceedings of the World Congress on Engineering and Computer Science 2011 Vol II WCECS 2011, October 19-21, 2011, San Francisco, USA. Computing, pp. 308 -313 [14] IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 11, NO. 4, FOURTH QUARTER 2009 [15] Chang-Woo Ahn, Sang-Hwa Chung, Tae-Hun Kim, and Su-Young Kang. A node-disjoint multipath routing protocol based on aodv in mobile ad hoc networks. In Information Technology: New Generations (ITNG), 2010 Seventh International Conference on, pages 828 833, april 2010. [16] Shunli Ding and Liping Liu. A node-disjoint multipath routing protocol based on aodv. In Distributed Computing and Applications to Business Engineering and Science (DCABES), 2010 Ninth International Symposium on, pages 312 316, aug. 2010. [17] Fubao Yang and Baolin Sun. Ad hoc on-demand distance vector multipath routing protocol with path selection entropy. In Consumer Electronics, Communications and Networks (CECNet), 2011 International Conference on, pages 4715 4718, april 2011. [18] E. Mourad, B. Azzedine, and E. Hisham, "Performance analysis of a distributed comparison-based selfdiagnosis protocol for wireless ad-hoc networks," in Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems. Terromolinos, Spain: ACM Press, 2006. [19] S. Carl-Fredrik, rensen, W. Maomao, S. Thirunavukkarasu, S. B. Gordon, O. Paul, F. Adrian, and D.-L. Hector, "A context-aware middleware for applications in mobile Ad Hoc environments," in Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing. Toronto, Ontario, Canada: ACM Press, 2004. Parallel Distributed
[20]. Swati et al. Exploiting Temporal Stability and Low-Rank Structure for Localization in Mobile Networks, MobiCom10, September 20 24, 2010, Chicago, Illinois, USA. Copyright 2010 ACM 978-1-4503-0181-7/10/09. [21]. Hamid Mehdi MOBILITY PREDICTION WITH LLT ALGORITHM IN WIRELESS NETWORKS 2010 International Conference on Information, Networking and Automation (ICINA) 978-1-4244-8106-4/$26.00 CD 2010 IEEE. [22] Pranav Kumar Singh, Kapang Lego, Themrichon Tuithung, (March 2011) Network Centric Approach using MOVE &Application Centric Approach using TraNS for protocols and safety in VANET, International Journal of Research and Reviews in Computer Science (IJRRCS), Vol. 2, No. 1 . [23]C. Perkins and E. Royer. Ad hoc on-demand distance vector routing. 1999. [24]J.Broch, D.Johnson, and D. Maltz, The Dynamic Source Protocol for Mobile Ad hoc Networks, http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr- 10.txt, IETF Internet draft , 19 July 2004. [25] Standard for part 15.4: Wireless MAC and PHY specifications for low rate WPAN. IEEEStd 802.15.4, IEEE, New York, October 2003. [26]J. A. Gutierrez, E. H. Callaway, Jr., and R. L. Barrett, Jr. Low-Rate Wireless Personal Area Networks, IEEE Press, New York, 2004. [27] C. E. Perkins and P. Bhagwat, Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers, In Proceedings of ACM SIGCOMM, pages 234-244, 1994. [28] S. Murthy and J.J. Garcia-Luna-Aceves, An efficient routing protocol for wireless networks, ACM Mobile Networks and Applications Journal, pp.183-197, 1996.
[29] T. Chen and M. Gerla, Global state routing: A new routing scheme for ad hoc wireless networks, in Proceedings of IEEE ICC98, Volume 1, 7-11 June 1998 Page(s):171 - 175 vol.1
[30] A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, and T.-W. Chen, "Scalable Routing Strategies for Ad Hoc Wireless Networks" IEEE Journal on Selected Areas in Communications, Special Issue on Ad-Hoc Networks, Aug. 1999, pp.1369- 79. [31] A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, and T.-W. Chen, "Scalable Routing Strategies for Ad Hoc Wireless Networks" IEEE Journal on Selected Areas in Communications, Special Issue on Ad-Hoc Networks, Aug. 1999, pp.1369- 79. [32] Zygmunt J. Haas, Marc R. Pearlman, The Zone Routing Protocol (ZRP) for Ad Hoc Networks, Internet draft, http://www.ics.uci.edu/~atm/adhoc/papercollection/ haas-draft-ietfmanet-zone-zrp-00.txt [33] M. Joa-Ng and I-Tai Lu, A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks, IEEE on Selected Areas in Communications, vol.17, no. 8, pp.1415-1425, 1999. [34] J. N. Boshoff, A. S. J. Helberg, Improving End-to-End Delay for Real-time Multimedia Services in Mobile Ad-hoc Networks, SATNAC 2007, 2007. [35] J. Burbank, P. Chimento, B. Haberman, and W. Kasch, Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology, IEEE Communications Magazine, 2006. [36] S. Radhakrishnan, N.S.V Rao, G. Racherla, C.N. Sekharan, S.G. Batsell, DSTA routing protocol for ad hoc networks using distributed spanning trees, in: IEEE Wireless Communications and Networking Conference, New Orleans, 1999. [37] Z.J. Hass, R. Pearlman, Zone routing protocol for ad-hoc networks, Internet Draft, draft-ietfmanet-zrp-02.txt, work in progress, 1999. [38]M. Joa-Ng, I.-T. Lu, A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks, IEEE Journal on Selected Areas in Communications 17 (8) (1999) 14151425.
[39] Perkin, C.E. Royer, E.M., Das S.R., Ad Hoc On -demand Distance Vector Routing, Internet-draft, draft-ietf-manet-aodv-10.txt, Jan 2002. [40] Y.H. Sun, P.B. Si, Y.H. Zhang, H. Wang, Practical Realization of Ad hoc Network based on DSR Protocol Considering QoS for Multimedia Services. Second International Conference on MultiMedia and Information Technology, 2010. [41] Kumar, Rakesh, Misra, Manoj, Sarje, Anil K. A Routing Protocol for Delay-Sensitive Applications in Mobile Ad Hoc Networks. Ad Hoc and Ubiquitous Computing, 2006. [42] S. Singh, M.Woo, and C.S. Raghavendra. Power-aware routing in mobile ad-hoc networks. ACM/IEEE International Conference on Mobile Computing and Networking, pp. 181-190, October 1998. [43] C.K. Toh, Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks, IEEE Communication Magazine, pp. 2-11, June 2001. [44] R. Asokan, M. Pushpavalli and A.M. Natarajan, Delay and throughput aware proactive QoS routing in mobile adhoc networks. Proceedings of the International Conference on Advanced Communication System (ICACs-2007) pp 1-6, January 2007. [45] K. Kim and K. G. Shin, Accurate Measurement of Link Quality in Multi -hop Wireless Mesh Networks, Proceedings of 12th ACM Mobicom, 2006. [46] W. Wei and A. Zakhor, Path selection for multi-path streaming in wireless ad-hoc networks, in Proc. of International Conference on Image transmit, January 2006. [47] C. Koksal and H. Balakrishnan, Quality-aware routing metrics for time-varying wireless mesh networks, JSAC, 2006. [48] Morten Lindeberg, Stein Kristiansen, Thomas Plagemann, and Vera Goebel. Challenges and techniques for video streaming over mobile ad hoc networks. Multimedia Systems, 17:5182. [49] C. Perkins and E. Royer. Ad hoc on-demand distance vector routing. 1999. [50] tools.ietf.org/html/draft-cole-manet-olsrv2-mib-00.
[51] M.R. Pearlman and Z.J. Haas. Determining the optimal configuration for the zone routing protocol. Selected Areas in Communications, IEEE Journal on, 17(8):1395 1414, aug 1999. [52]S. Saunders (1999). Antennas and propagation for wireless communication systems concepts and design. Wiley. [53] Yaling Yang and Kravets, R. (2005). Contention-aware admission control for ad hoc
networks. Mobile Computing, IEEE Transactions, july-aug, 4, 363 377. [54] Chakrabarti, S. and Mishra, A. (2001). QoS issues in ad hoc wireless networks. Communications Magazine, IEEE, Feb, 39, 142 -148. [55] Neely, M.J. and Modiano, E. (2005). Capacity and delay tradeoffs for ad hoc mobile networks. Information Theory, IEEE Transactions, june, 51, 1917 1937. [56]Haenggi, M. and Puccinelli, D. (2005). Routing in ad hoc networks: a case for long hops.Communications Magazine, IEEE, Oct, 43, 93 101. [57] N. Sharma and S. Sharma. Provisioning of quality of service in manets by performance analysis and comparison of aodv and olsr. In Com- puter Science and Network Technology (ICCSNT), 2011 International Conference on, volume 4, pages 2341 2344, dec. 2011. [58] Video Trace:. http://trace.eas.asu.edu/. [59] S. Rimac-Drlje, O. Nemcic, and M. Vranjes. Scalable video coding extension of the h.264/avc standard. In ELMAR, 2008. 50th International Symposium, volume 1, pages 9 12, sept. 2008. [60] C.T. Calafate, M.P. Malumbres, and P. Manzoni. Performance of h.264 compressed video streams over 802.11b based manets. In Distributed Computing Systems Workshops, 2004. Proceedings. 24th International Conference on, pages 776 781, march 2004. [61] Crawley, E. and Nair, R. and Rajagopalan, B. and Sandick, H. (1998). A Framework for QoS-based Routing in the Internet. RFC2386, IETF.
[62] Reddy, T. Bheemarjuna and Karthigeyan, I. and Manoj, B. S. and Murthy, C. Siva Ram. (2006). Quality of service provisioning in ad hoc wireless networks: a survey of issues and solutions. Ad Hoc Networks, Jan, 4, 83-124. [63] Shigang Chen and Nahrstedt, K. (1999). Distributed quality-of-service routing in ad hoc networks. Selected Areas in Communications, IEEE Journal, aug, 17, 1488 -1505.