International Journal of Scientific & Engineering Research, Volume 5, Issue 12, December-2014 1476

ISSN 2229-5518

MANET’s great challenges in the general field of networking

*Kailash Pareek, D. Panwar, Mahila Mahavidyalaya, IASE (D) University, Sardarshahar

(Email- pareek271@gmail.com)

Abstract

A mobile ad hoc network is a continuously self-configuring, infrastructure- less network of mobile devices connected without wires. A wireless Adhoc network is a collect ion o f mobile nodes wit h no pre-established Infrastructure. Laptop computers and personal digital assistants that communicate direct ly with each other are some examples of nodes in an Adhoc network. Each of the nodes has a wireless interface and co mmunicates with o thers over either radio or infrared channels.
Keywords : Mobile, Network, MANET

Introduction:

A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure- less network of mobile devices connected without wires. Ad hoc is Latin and means "for this purpose". A wireless Adhoc network is a collect ion of mobile nodes wit h no pre- established Infrastructure[5]. Laptop computers and personal digital assistants that communicate direct ly with each other are some examples of nodes in an Adhoc network. Each of the nodes has a wireless interface and communicates with o thers over either radio or infrared channels. Nodes in the Adhoc network are often mobile, but can also consist of stationary node. Figure shows a simple Adhoc network. The outermost nodes are not within reception range of each other and thus cannot communicate direct ly. However, the middle node can be used to forward packets between the outermost nodes[1].

This enables all three nodes to share information and results in an Adhoc network. An Adhoc network uses no centralized administration. This ensures that the network will not cease functioning just because one of the mobile nodes moves out of the
range of the others. Nodes should be able to enter and leave the network as they wish.

IJSER © 2014 http://www.ijser.org

International Journal of Scientific & Engineering Research, Volume 5, Issue 12, December-2014 1477

ISSN 2229-5518

Because of the limited transmitter range of the nodes, mult iple hops are generally needed to reach other nodes.
There are two different types of wireless networks: The easiest network topology is where each node is able to reach all the other nodes with a traditional radio relay system with a big range. Users of connected technology, which is an ever growing number of people and machines, are getting more and more accustomed with constantly being able to have access to different on line services. It may be e-mail or on line dictionar y services, ticket booking, or travelling information such as road maps and driving directions. The netwo rks for mobile phones are usually available in most inhabited areas.

Material and Method :

Routing is the process of selecting best paths in a network. In the past, the term routing was also used to mean forwarding network traffic among networks[8]. However this latter function is much better described as simply forwarding.



The routing protocol’s main functions are the selection of routes for various source destination pairs and the deliver y of messages to their correct destination. In wireless networks, due to host mobilit y, network topology may change from time to time. It is critical for the routing protocol to deliver packets efficiently between source and destination. Routing protocols can be divided based on when and how the routes are discovered into two categories: Table-Driven and On-Demand routing. In table-driven routing protocols, each node maintains one or more tables containing routing
information to every other node in the network. All nodes update these tables so as to

IJSER © 2014 http://www.ijser.org

International Journal of Scientific & Engineering Research, Volume 5, Issue 12, December-2014 1478

ISSN 2229-5518

maintain a consistent and up-to-date view of the network. When the network topology changes the nodes propagate update messages throughout the network in order to maintain consistent and up-to-date routing information about the whole network. Routing protocols in this category differ in the method by which the topology change information is distributed across the network and the number of necessary routing- related tables[3]. The two main t ypes of table- driven routing are: Distance Vector and Link State.

Properties of Adhoc Networks

• Adhoc networks do not rely o n pre-existing infrastructure and this may be their most distinguishing attribute.
• Adhoc networks can be characterized as autonomous in the sense that most commonly they offer connectivity between the participating nodes and not connectivit y to external LANs or internets.
• Another ver y important property of Adhoc networks is their dynamic topology.
• The devices that are usually emplo yed in the Adhoc networks have their own limitations. Since, the only hardware component that is required to connect a device in an Adhoc network is a wireless interface, PDAs and mobile telephones can be utilized. Adhoc networks suffer from limited hardware resources like limited battery, constrained CPUs and small memory capacit y.

Adhoc Routing Protocols

In Adhoc networking environments an application packet from a specific node may have to travel several hops in order to reach its destination. The main function of a routing protocol is to form and maintain a routing table with information relevant to which the next hop for this packet should be in order to reach its ultimate destination[6]. All the nodes have their own routing tables that they consu lt to forward the routing traffic that it is not destined for them.
Although the problem of routing is not a new one in computer networks, routing in Adhoc networks due to its unique requirements cannot be successfully handled by utilizing existing routing schemes such as traditional link-state and distance vector routing protocols. One of the reasons that for example OSPF and RIP cannot be used in Adhoc networks is that these protocols where originally designed to operate in
environments with relatively static topology. However, the nature of the Adhoc

IJSER © 2014 http://www.ijser.org

International Journal of Scientific & Engineering Research, Volume 5, Issue 12, December-2014 1479

ISSN 2229-5518

networks allows the participating nodes to move freely in and out of the network. Another issue that contributes to the fact that the available routing protocols cannot operate in Adhoc mode is that t hey were designed with the assumption that all the links are bidirectional. In mobile Adhoc networks this is not always the case. The differences o f t he wireless networking hardware of the nodes or the radio signal fluctuations may result in some links becoming unidirectional. Finally, both OSPF and RIP attempt to maintain routes to all the reachable destinations, but in Adhoc networks with high densit y this may lead in having very large numbers of routing entries imposing performance overhead. Therefore, there is a need for special routing protocols that will be able to cope with the unique attributes and limitations of mobile wireless Adhoc networks[7].

Challenges with Adhoc Networks

As we have seen in the previous sections there are many different approaches to the routing dilemma in fast changing topology networks as mobile Adhoc networks. Even though there are a lot of different approaches to consider they fit well into different needs. On the commercial market the use of Adhoc networking techniques have only started to be available in some networks[4]. Most notably within the companies own wireless networks or building to building links. The use in more everyday products such as mobile phones have low commercial interest since the operators of the networks probably will lose some of the traffic. Also, not everyo ne is happy wit h having their mobile phone forwarding traffic for someone else. Not because of the traffic itself but because the battery power drain. The largest possibilit y for the commercial breakthrough is probably within the wireless local area networks where the standards already has support for some limited Adhoc connections, or peer to peer support.
The use of multi hop wireless networks can help keeping the power consumption down due to lowering the link length. However, the need to make the routing protocols power aware and not waste too much power on control messages instead of actual information traffic is essential. Also, multi hop networks are dependent on the intermediate nodes being available even though that node may not be in transceiver mode. The use of multiple available routes might be a solution where some nodes can go down in power saving mode while others peek up now and then to sense the communications.
When all the traffic starts to flow around between everybody seemingly

IJSER © 2014 http://www.ijser.org

International Journal of Scientific & Engineering Research, Volume 5, Issue 12, December-2014 1480

ISSN 2229-5518

uncontrolled the need for security and authentication arises.
Conclusion:
The Mobile Adhoc Networking paradigm poses great challenges in the general field of networking. Parameters such as network size, mobility and traffic load have a great impact on the suitabilit y of each protocol. In the case of a mobile Adhoc network the topology is highly d ynamic. This leads to quickly changing link states. Some links get broken while other links are created by other pairs of routers as is depicted. The routing algorithms used in the wired case have problems with topology changes, and if these happen often the problems are just getting worse. Another problem that arises in wireless networks that is not as common in wired routing is the asymmetrical links. That is, one node can reach another but the return path is not the same.
References:
1. C. Barrett et al., "Characterizing the Interaction Between Routing and MAC Protocols in Ad-hoc Networks," Proc. MobiHoc 2002 , pp. 92-103
2. C. Elliott and B. Heile, "Self-Organizing, Self-Healing Wireless Networks," Proc. 2000 IEEE Int'l Conf. on Personal Wireless Comm., pp. 355-362.
3. D. Wang, M. Hu, H. Zhi, “A Survey of Secure Routing in Ad Hoc Networks” IEEE Ninth International Conference on Web-Age Information Management,
2008, (WAIM '08), pp.482-486, July 2008.
4. Imrich Chlamtac a , Marco Conti b,*, Jennifer J.-N. Liu c, 2003 Elsevier B.V.
5. K.P. Yadav, K. Pareek, A New Algorithm For Secure Routing Protocols For Moble Adhoc Networks, International Journal of Latest Research In Engineering and Computing (IJLREC) ISSN:2347-6540 Volume 1, Issue 2 : Page No26-33, November-December 2013.
6. L. M. Feeney, "A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks," Swedish Institute of Computer Science Technical Report T99/07, October 2006.
7. Nitin H. Vaidya, Texas A & M Universit y, "Mobile Ad-Hoc Networks: Routing,
Mac and Transport issues".
8. P. Michiardi, R. Molva, “Ad hoc networks security,” IEEE Press Wiley, New
York, 2003

IJSER © 2014 http://www.ijser.org