Академический Документы
Профессиональный Документы
Культура Документы
Group Members
CH.V.V. CHAKRAVARTHY A.MAHENDER P.KRISHNA GOPAL K.MAHESH KUMAR 09UJ1A1223 09UJ1A1220 09UJ1A1230 09UJ1A1226
Internal Head
Miss. J. VASAVI
INTRODUCTION
In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices. Digital radio technology has tremendous impact on todays mobile computing.
Wireless Networks
Infrastructure- based Networks: Traditional cellular Systems(base station infrastructure) Wireless LANs: Infrared or radio links. very flexible within the reception area. Low bandwidth compared to wired networks. Ad hoc networks: Useful when infrastructure not available. Military applications, rescue, home networking.
DEFINITION
A mobile ad hoc network is an autonomous collection of mobile devices (laptops, smart phones &sensors) that communicate with each other over the wireless links.
EXISTING SYSTEM the throughput for each node degrades as the number of nodes increases under the competitiondriven view of network. These network can be characterized as one-to-one and one-many communications. PROPOSED SYSTEM Many to Many Communication.
By using this approach MPTs and MPRs occur simultaneously. Receiver complexity of all nodes increases.
Mobility of nodes.
Single and Multi hop communication.
CHARACTERISTICS
Nodes are act as both Host and Routers. No centralized server and infrastructure. Dynamic network topology, frequent routing updates. Limited Security
MANETs has the capability of establishing networks quicker and faster. Electromagnetic waves are used to access the information. Remotely connected to the network from your laptop.
MANET node has ability of computing, switching and communicating independently. Nodes responsible for forwarding packets form one node to another node.
Wireless transmission links consume very less power. Disadvantages Higher error rates.
Lower bandwidth
More Frequent Disconnections.
Media Access Routing Multicasting Energy Efficiency TCP Performance Security and privacy
Exposed terminals
B sends to A, C wants to send to another terminal (not A or B) C senses carrier, finds medium in use and has to wait A is outside the radio range of C, therefore waiting is not necessary C is exposed to B
MACA Solutions
MACA avoids the problem of hidden terminals
A and C want to send to B A sends RTS first C waits after receiving CTS from B
RTS
A
CTS
B
CTS
A
CTS
End-to-end semantics
Receiver sends cumulative acknowledgements for in-sequence packets Receiver sends duplicate acknowledgements for out-of-sequence packets
Difficult to identify a single scheme that will perform well in all environments Several relevant studies [Broch98Mobicom, Das9ic3n, Johansson99Mobicom, Das00Infocom, Jacquet00Inria]
Mobile TCP
Improve overall Throughput and lower delay rate. It Maintains TCP end-end semantics.
Routing in MANET
Each route is tagged with a sequence number; routes with greater sequence numbers are preferred Each node advertises a monotonically increasing even sequence number for itself When a node decides that a route is broken, it increments the sequence number of the route and advertises it with infinite metric Destination advertises new sequence number
A
Dest. Next Metric A A 0 B B 1 C B 3 2
1
Dest. A B C
B
Next Metric A 1 B 0 C 1
C
Dest. Next Metric A B 3 2 B B 1 C C 0