You are on page 1of 10

A Project based on Mobile Ad-hoc Network (MANET)

Author: S M OHIDUL ALAM


Study Field: Software Engineering
University Malaysia Sarawak


















A Project based on Mobile Ad-hoc Network (MANET)
2








Table of Contents

i. Introduction----------------------------------------------------------------------------------------- 3
ii. History of Mobile Ad-hoc Network Technology-------------------------------------------- 3
iii. Characteristics of the MANETs Technology----------------------------------------------- 4
Dynamic topologies---------------------------------------------------- 4
Limited Bandwidth---------------------------------------------------- 4
Security Threats------------------------------------------------------- 4
Differences between ad hoc and wireless sensor networks---- 4
Differences between ad hoc and WiFi----------------------------- 4
iv. The Underlying Network Architecture for MANETs------------------------------------ 5
v. Advantages / Disadvantages / Issues of MANETs ----------------------------------------- 6
Advantages-------------------------------------------------------------- 6
Disadvantages------------------------------------------------------------6
Important issues---------------------------------------------------------7
vi. Current Deployment of MANETs Technology in Malaysia------------------------------7
vii. How the MANETs Technology can be used in UNIMAS--------------------------------8
viii. Conclusion----------------------------------------------------------------------------------------9
Reference-----------------------------------------------------------------------------------------------10







A Project based on Mobile Ad-hoc Network (MANET)
3

i. Introduction:
Mobile Ad-hoc Networks (MANET) are created of composite distributed
systems which connect wireless nodes. These nodes can generously and dynamically self in
mobile network topologies. Since the nodes are mobile, the network topology may change
rapidly and unpredictably over time. The network is decentralized, where all network activity
including discovering the topology and delivering messages must be executed by the nodes
themselves, i.e., routing functionality will be incorporated into mobile nodes. MANETs need
efficient distributed algorithms to determine network organization, link scheduling, and routing.
However, determining viable routing paths and delivering messages in a decentralized
environment where network topology fluctuates is not a well-defined problem. While the
shortest path (based on a given cost function) from a source to a destination in a static network is
usually the optimal route, this idea is not easily extended to MANETs. Factors such as variable
wireless link quality, propagation path loss, fading, multiuser interference, power expended, and
topological changes, become relevant issues. The network should be able to adaptively alter the
routing paths to alleviate any of these effects.



ii. History of Mobile Ad-hoc Network Technology:
The lifecycle of Ad-hoc networks can be
divided into first, second and third generation Ad-hoc network systems. Right now, we are using
the network is considered as third generation.

In 1970s DoD1-sponsored Packet Radio Network (PRNET) research was implemented for
military purpose. That evolved into the survivable Adaptive Radio Networks (SURAN) program
in early 1980s. (Ankur O. Bang, 2013)

The second generation of ad-hoc networks emerged in 1980s, when the ad-hoc network systems
were further enhanced and implemented as a part of the SURAN (Survivable Adaptive Radio
Networks) program. This provided a packet-switched network to the mobile battlefield in an
environment without infrastructure. This program proved to be beneficial in improving the
radios' performance by making them smaller, cheaper, and resilient to electronic attacks. In the
1990s, the concept of commercial ad-hoc networks arrived with note-book computers and other
viable communications equipment. At the same time, the idea of a collection of mobile nodes
was proposed at several research conferences. Since mid 1990s, a lot of work has been done on
the ad hoc standards.(Magnus & Peter,2000)

In 1990,the invention of notebook computer and viable communication devices based on radio
waves concept. IETF created MANET (Mobile Ad Hoc Networking) working group, looking for
standardizing the relevant aspects of ad hoc networks to use in commercial applications.

Many academic papers evaluate protocols and their abilities, assuming varying degrees of
mobility within a bounded space, usually with all nodes within a few hops of each other.
Different protocols are then evaluated based on measures such as the packet drop rate, the
overhead introduced by the routing protocol, end-to-end packet delays, network throughput etc.

A Project based on Mobile Ad-hoc Network (MANET)
4

iii. Characteristics of the MANETs Technology:

Below some characteristics of MANETS have been given,
Autonomous and infrastructure less
low power consumption
low level of physical security n broadcast physical medium
distributed operation (ability to work independently)
mobile terminal
dynamic network topology (do not require network infrastructure/host n user move frequently)
using multi-hop communications
limited bandwidth
support anytime n anywhere computing
Network scalability
Self-creation, self-organization and self-administration
Device heterogeneity

Dynamic topologies- nodes are free to move arbitrarily with different speeds; thus, the network
topology may change randomly and at unpredictable times. Energy-Constrained Operation-some
or all the nodes in an ad hoc network may rely on batteries or other exhaustible means for their
energy, For these nodes, the most important system design optimization criteria may be energy
conservation.

Limited Bandwidth- Wireless links continue to have significantly lower capacity than
infrastructured networks. In addition, the realized throughput of wireless communications-after
accounting for the effects of multiple access, fading, noise, and interference conditions, etc., is
often much less than a radios maximum transmission rate.

Security Threats- Mobile wireless networks are generally more prone to physical security
threats than fixed-cable nets. The increased possibility of eavesdropping, spoofing, and
minimization of denial-of-service type attacks should be carefully considered.

Differences between ad hoc and wireless sensor networks- MANETs are usually close to
humans, in the sense that most nodes in the network are devices that are meant to be used by
human beings (e.g., laptop computers, PDAs, mobile radio terminals, etc.); conversely, sensor
networks do not focus on human interaction but instead focus on interaction with the
environment. Indeed, nodes in a sensor network are usually embedded in the environment to
sense some phenomenon and possibly actuate upon it; this is why some people say that WSNs
can be considered as a macro scope. (Magnus Frodigh,2000)

Differences between ad hoc and WiFi- Wi-Fi Direct is not the same as ad-hoc networking: The
most significant difference between traditional ad-hoc wireless networking (traditional peer-to-
peer networking) and Wi-Fi Direct is security. In Windows ad-hoc networks, the highest level of
security supported is WEP in mixed client environments (Windows 7 will support WPA2
provided all adapters support it, as well). Wi-Fi Direct, as mentioned, supports WPA2. Another
A Project based on Mobile Ad-hoc Network (MANET)
5

difference, Wi-Fi Direct devices can also simultaneously connect to existing wireless networks.
More granular control and better discovery of devices also differentiate Wi-Fi Direct from ad-
hoc networking.


iv. The Underlying Network Architecture for MANETs:

In ad-hoc networks, an user can enter, leave or move inside the network with no need for prior
configuration. The support of multimedia applications that require very high bit-rates in this
network. Here, a Centralized Ad-Hoc Network Architecture (CANA) is proposed, capable of
efficiently supporting those applications in low mobility environments, while at the same time a
standard wireless LAN environment is maintained for fast moving users. CANA is based on an
enhanced Hyper-LAN/2 protocol architecture that supports a dual mode of operation at 5 GHz
and 60 GHz. In this system architecture, several ad-hoc specific functionalities are included such
as neighborhood discovery, clustering and routing. Among them, switching between different
modes of operation has a large impact on the achievable performance of CANA.

There are several diagrams that we can see in MANET:-
Network Architecture

Routing in CANA

Inter-cluster data session
A Project based on Mobile Ad-hoc Network (MANET)
6


Enhanced Hyper-LAN/2 Protocol Stack for CANA support

Switching strategies




v. Advantages / Disadvantages / Issues of MANETs:

Advantages
Networks can be set up at any place and time.
Independence from central network administration.
Self-configuring, nodes are also routers.
A Project based on Mobile Ad-hoc Network (MANET)
7

Self-healing through continuous re-configuration.
Provide access to information and services regardless of geographic position.
People able to access the Internet from many different locations.
Networks work out without any pre-existing infrastructure.
Disadvantages
Limited resources and limited physical security.
Lack of authorization facilities.
Volatile network topology makes it hard to detect malicious nodes.
Security protocols for wired networks cannot work for ad hoc networks.
Cannot count on infrastructure.
Each node must have full performance.
Throughput is affected by system loading.
Reliability requires a sufficient number of available nodes.
Sparse networks can have problems.
Large networks can have excessive latency, which affects some applications.

Important Issues (Performance of Ad Hoc Networks)
Critical factors which are affecting the performance of an ad hoc network.
Number of nodes in the network
Network size and density
Traffic pattern and load
Unidirectional links
Terrestrial limitations
Load balancing
Mobility model and rate



vi. Current Deployment of MANETs Technology in Malaysia:
In the past few years, we have
seen a rapid expansion in the field of mobile computing in Malaysia due to the proliferation of
inexpensive, widely available wireless devices. However, current devices, applications and
protocols are solely focused on cellular or wireless local area networks (WLANs), not taking into
account the great potential offered by mobile ad hoc networking.

In various sectors we can easily see the implementation of MANETs technology. Some of
MANETs technology examples we will describe below:

Home and Enterprise Networking- In home or office whole over Malaysia we can easily see
the adaptation of wireless networking. MANETs technology tools are used in conferences and
meeting rooms. Some professionals create their own Personal Area Networks (PAN). In case of
construction sites, the MANETs idea is applied successfully which have lead the works to be
easier.

A Project based on Mobile Ad-hoc Network (MANET)
8

Applications of MANETs in Entertainment Sectors- Gaming have been a most common
scenario in Malaysia. Most of the people specially youth are very fond of gaming. For playing
multiplayer games, wireless, peer-to-peer, Bluetooth and other MANETs technologies are being
used. We also see the use of MANETs networking in outdoor internet access. Robotic pets and
theme parks also got the concept in using MANETs topologies.

Applications in Commercial and Civilian Environments- For ecommerce purposes like
mobile payment in anywhere MANETs network layer out is used such as payment processor,
PayPal, MEPS, VISA, MasterCard. By MANETs network applications we have come to an idea
of getting road and weather conditions which is helping us greatly. And it is also using in sports
stadium, trade fairs, shopping malls, airport in whole Malaysia.

Coverage Extensions- People are now more used to with sharing their internet into peer-to-peer
connects. Such as we can think about WiFi hotspot, VPN, ad-hoc internet and others way to
share and make a MANETs network layer out. This has come out with an extension in cellular
network access. And people are linking up with the internet, intranets and etc.


vii. How the MANETs Technology can be used in UNIMAS:
MANETs can be implemented
in UNIMAS in a great way. The network topology of MANETs has a useful interface which can
be easily established for education purpose. In teaching method, this technology can help much
such as meeting with the lecturers, taking digital classes etc. We see implementations of
MANETs already have taken place in UNIMAS. But still there is much scope of improving it. In
this sector we are going to come up with all these ideas which maybe legible of application.

Through MANETs technology idea we can have a own network inside UNIMAS, which can
help to connect all faculties and administrative in a single network. This will help to decrease a
lot of pressures from depending on websites technology. Via instant texting system without a
internet connection but with a connection of UNIMAS MANETs network all can connect to each
other. It is faster and responsive than previous technology.

This technology can be used in teaching method also. Such as classes can be broadcasted through
the network and can be opened for all. Student can easily access to the network and join the class
digitally without being present in the class physically.

MANETS network can come with up an idea of indoor positioning system in university, which
can help the students and others to locate themselves wherever they are inside university. This
will help the new students to know all areas coming every semester.

Curriculum activities can be done through this network, it will work like a medium. Student can
have their own storage of database, files and other things in this network which will be totally
different from web based internet system. And also emergency broadcasting, announcement this
MANETs network system can work great inside UNIMAS.


A Project based on Mobile Ad-hoc Network (MANET)
9



viii. Conclusion:
Evolution in mobile computing is creating a new alternative way for mobile
communication, in which mobile devices make a self-creating, self-organizing and self-
administering wireless network, called a mobile ad hoc network. We can easily predict an
essential part of upcoming future pervasive computing environments. The seamless inclusion of
mobile ad hoc networks will be a reason of evolution towards future fourth generation networks.
But still a lot of way to go in this sectors regarding technical, protocols, applications, services
and strategy issues. We have try to draw a discussion in this project to show that how the
MANETs research community and fast progress are taking place quickly, but a lot of challenging
technical issues remain unanswered too. In the end, proper business scenarios, applications and
economical models need to be identified together with technological facilities, creating a
conversion of ad hoc networks to world in commercial viable.
































A Project based on Mobile Ad-hoc Network (MANET)
10

References:

-Ankur O. Bang and Prabhakar L. Ramteke,MANET : History,Challenges And Applications,
Volume 2, Issue 9, September 2013

-E. Royer and C.-K. Toh, "A Review of Current Routing 'Protocols for Ad Hoc Mobile Wireless
Networks," IEEE Pers. Common., vol. 6, no. 4, Apr. 1999, pp 46-55.

-J.Jubin and J.D.Tornow, "The DARPA packet radio network protocol," Proc. Of the IEEE, vol
75, No.1, Jan 1987, pp.21-32.

-Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, An Overview of Mobile Ad
Hoc Networks: Applications and Challenges,session 4,page-61,2002

-Magnus Frodigh, Per Johansson and Peter Larsson. Wireless ad hoc Networking The art of
networking without a network: Ericsson Review No.4, 2000

-Madhavi W Subbarao. Ad Hoc Networking Critical Features and Performance Metrics:
Wireless Communication Technology Group, NIST Oct 7, 1999

-R. Ramanathan and J. Redi. A Brief Overview of Ad Hoc Networks: Challenges and
Directions. IEEE Communications Magazine 50th Anniversary Commemorative Issue/May
2002.

You might also like