Infrastructure less networks has found their significant place in the recent trends of engineering and technology. The research issues and challenges are paving the ways for the excellent research opportunities. In general, in wireless networking there are two main architectures: infrastructure (single-hop) networks and mobile ad hoc (multi-hop) networks. Even though users can handover between base stations or access points and roam among different networks, the conceit of mobility is limited within the coverage areas of the base stations or access points. MANET (Mobile Adhoc Network) denotes to a multi hop packet based wireless network collection of a set of mobile nodes that can have capability of communication and mobility at the same time, besides using any kind of fixed wired infrastructure. This network is really a self organizing and adaptive networks which can be formed and deformed on-the-fly without the essential of any centralized administration. In a MANET, available user's mobile devices are the network, since they must cooperatively provide the functionality usually provided by the network infrastructure (for e.g., routers, servers, switches). Most fundamental problems in adhoc networking is how to deliver data packets among the nodes capably lacking of predetermined topology or centralized control.
It is also important to provide the Quality of Service (QoS) when the protocols are used in communication. In this thesis, we proposed and implemented a QoS based framework for MANET for reliable communication.
MANET Architecture
Mobile Ad hoc network (MANET) is sometimes called a mobile mesh network which stands a self configuring network of mobile nodes associated by wireless links. The nodes are dynamic and arranged in the form of mobile topology. Each device in the MANET is open to move independently in any direction leads to change its link to other devices. Fig 1 shows the architecture of MANET.
A network without any base station is said to be infrastructure less network or multi-hop. MANET is a multi hop packet based wireless network which is a collection of two or more devices connected with network capability. Mobile ad hoc network supports the computation through anytime anywhere. There are two topologies in an ad hoc network.
Heterogeneous
Homogeneous
Fig 1.1. Heterogeneous structure of MANET
Fig 1.2. Homogeneous structure of MANET
Figures 1.1 and 1.2 shows the homogeneous and heterogeneous architecture of ad hoc network. Heterogeneous topology of network possesses difference in capabilities while Homogeneous topologies of the network, all the nodes have identical capabilities and responsibilities.
MANET USAGE AREA
The MANET is widely used in many areas:
Military scenarios - MANET supports tactical network for military communications and automated battle fields.
Rescue operations - It provides Disaster recovery, which means replacement of fixed infrastructure network in case of environmental disaster.
Conferences.
Sensor networks - It consists of devices that have the capability of sensing, task of computing and wireless networking. For instance, wireless sensor network combines the power of all three of them, include smoke detectors, gas, and electricity and water Meters.
Free internet connection sharing - It also allows us to share the internet with others.
Mobile devices.
Students on campus.
Data network - MANET provides support to the network for the exchange of data between mobile devices.
Device network - Device Networks supports the wireless connection between various mobile devices so that they can communicate.
TYPES OF MANET
Mobile ad hoc networks can be classified as:
Vehicular ad hoc network - Provides communication among roadside equipment.
Internet based mobile - These are one form of ad hoc networks which link mobile devices and static internet-gateway nodes.
Intelligent vehicular ad hoc network - It is a type of artificial intelligence which helps vehicles to perform in intelligent behaviors during vehicle to vehicle crashes, drunken driving, accidents.
CHARACTERISTICS OF MANET
Mobile Ad hoc Network is a set of independent mobile nodes which can communicate with each other via radio waves. However, the mobile nodes that are in transmission range of other can directly communicate, instead of others need the support of intermediate nodes to route their packets. The structure of this network are fully distributed, it can work at every place without the help of any type of infrastructure. Utilization of these networks is highly flexible and robust. The features of these networks are summarized as follows:
Nodes can accomplish the roles of both hosts and routers.
Dynamic network topology facilitates frequent routing updates.
Communication via wireless means.
No centralized controller and infrastructure.
Can be set up anywhere.
Autonomous, means no infrastructure needed.
Energy constraints.
Generally, mobility nature of communication terminals makes the topology of the distributed network time varying. Furthermore, the dynamical nature of the network arrangements increases the challenges of the scheme of ad hoc networks. Individual radio terminal (RT) is usually powered by an energy limited power source (taken as rechargeable batteries). Consumption of power of every radio terminal might be divided generally into three parts as follows:
Power consumption for data processing within the RT.
Power consumption to transmit its specific information to the destination.
Power consumption once the RT is used as a router, which is forwarding the information to a different RT in the network.
The most critical issue in the design of ad hoc networks is the energy consumption. The mobile devices generally have limited storage and small computational capabilities. Since, they deeply depend on other hosts then resources for data access and information handling. Reliability in network topology must be guaranteed through efficient and secure routing protocols for Ad hoc networks. Table 1.1 shows the most important characteristics of MANET.
Important characteristics of MANET
Description
Energy Constraints
may rely on batteries or other exhaustible means
for their energy. The most important system
design optimization criteria may be energy
conservation for these nodes.
Mobile wireless networks are generally more
prone to physical security threats than fixed
cable nets. Possibility of eavesdropping,
minimization of denial-of-service type attacks
should be considered carefully.
Dynamic Topologies
Nodes are free to move arbitrarily with different
speeds and thus the network topology may
change randomly and at unpredictable times.
Limited Bandwidth
Wireless links continue to have significantly
lower capacity than
infra structured
networks.
Additionally, the realized throughput of wireless
communication after accounting for the effects
of multiple access, noise, fading, and
interference conditions is often much less than a
radio's maximum transmission rate.
Table 1.1. Important characteristics of MANET
APPLICATIONS OF MANET
The field of wireless networking emerges from the combination of cellular technology, personal computing, and therefore the web. The actual fact is because of the increasing interactions between communications and computing, access info every place at any time. Commercially massive kind of networks exist, this can be ranging from the well-known arrangement of cellular networks towards non-infrastructure wireless ad-hoc networks.
Technological improvements within the mounted wireless network on-the-fly networks or wireless ad-hoc area unit characterized by the shortage of infrastructure. Characteristics of nodes in a mobile ad-hoc network unit free to move and establish themselves in an absolute fashion. Thus every user is liberal to roam concerning whereas communication with others. There exists a path between every pair of the users could have multiple links, and conjointly the radio between them are often heterogeneous. It permits an association of several links to be a district of an equivalent network. Specifically, Mobile ad-hoc networks will operate in a complete fashion or may probably be connected to a bigger network like the net.
In many situations, Ad-hoc networks are suited for use where an infrastructure is unavailable or to arrange one is not cost effective. Some of various possible benefits of mobile ad-hoc networks are for some business environments, need for collective computing might be more significant outside the office environment than inside, like involving in a business meeting. Process of work has been processing on to introduce the basic ideas of game theory and its uses in communications. This Game theory initiates from economics and has been applied in various fields.
A mobile ad-hoc network can similarly use to organize for disaster recovery operation, since the entire communication infrastructure is destroyed and restoring communication is also crucial. With the help of MANET, the infrastructure could be set up very easily in hours.
In an educational application, by using MANET virtual classrooms or conference rooms were setup. Also facilitates ad hoc communication environment during conferences, lectures and meeting.
MANET ROUTING PROTOCOLS
Mobile ad hoc network's routing protocols are typically subdivided into three main categories like Proactive protocols, Reactive routing protocols and hybrid routing protocols. Fig 1.3 shows the Routing Protocols in Mobile Ad hoc network.
Hybrid
Protocols
Proactive
Protocols
Reactive
Protocols
MANET
Routing Protocol
AODV
DSR
ACOR
ABR
WRP
OGSR
ARPAM
OLSR
ZRP
DSDV
TORA
OORP
DYMO
FSR
Fig 1.3.Routing Protocols in MANET.
The efficient routing protocols can provide important benefits to mobile ad hoc networks which in terms of both performance and reliability.
REACTIVE ROUTING PROTOCOLS
Reactive MANET protocols search a route towards the destination node after there is a necessity to send data. Initially, sender will begin by transmitting route requests in the entire network. The source node will wait for the destination or an intermediate node to reply with a list of intermediate nodes among the source and destination. Communication in this way is known as the global flood search, possibly brings about significant delay formerly the packet can be transmitted. These protocols also require the transmission of a significant quantity of control traffic. Hence, the reactive MANET protocols are most suitable for networks with high node mobility or wherever the nodes transmit data rarely.
The following are the reactive protocols:
Ad hoc on demand distance vector (AODV)
Dynamic MANET On demand (DYMO)
Dynamic source routing (DSR)
Associatively based routing (ABR)
Admission control enabled on demand routing (ACOR)
SourceCharacteristics
Destination
Routing Information
On demand Some Some or all of the nodes in an ad hoc network
NodeSecurity Threats
Fig1.4. On demand routing protocol
If on demand routing protocols are used, whenever data is to be routed to a destination, it requires a source node to initiate a search for the destination. When the network is large, there occurs significant latency before the destination is found. The advantage of employing this protocol in a network environment is as follows:
The Adhoc on-demand Distance Vector routing protocol consists of a number of messages which it uses for route discovery, neighbor detection, route maintenance and repair.
There is a number of implementation AODV available for the Linux platform.
The main drawback in this protocol is the development of ad-hoc routing protocols has been slow because current operating systems do not provide adequate direct system services for their implementation.
PROACTIVE ROUTING PROTOCOLS
These protocols are table driven which actively determine the layout of the network. Through the continuous and consistent interchange of network topology packets among the nodes in the network, also a whole picture of the network is preserved at every single node. This in turn leads to slight delay in defining the route to be taken. This criterion is especially important for time-critical traffic. On the other hand, the drawback to a proactive MANET protocols exists that the life span of a link remains significantly short. However, this phenomenon is carried about through the improved mobility of the nodes, which in turn extract the routing information in the table worthless quickly. By analyzing overall, proactive protocols performs best in networks that have small node mobility before the nodes transmit data frequently. The following are the proactive routing protocols.
Destination Sequence Distance Vector (DSDV)
Optimized Link State Routing (OLSR)
Fisheye State Routing (FSR)
Cluster Head Gate Way Switch Routing (CGSR)
Wireless Routing Protocol (WRP)
Proactive
Routing
Protocol
Destination
Routing Information
Node
Fig 1.5. Table driven protocol
When proactive routing protocols are employed a node would possess routing information to a destination before it would actually need to route data to that destination. Routing tables are maintained for this purpose. Route updates are exchanged periodically to reflect the changes in topological information. The proactive routing protocols usually require the maintenance of routing tables, since the mobile ad hoc network changes dynamically, nodes would need to exchange routing updates periodically. Furthermore, exchange of route updates would consume bandwidth and if the work is large, such control messages could contribute to a significant amount of overhead. The advantages of using this protocol in mobile ad hoc network are as follows:
Access up-to-date network - By evaluating the known and attempting to discover new routes updated, they try to maintain most recent network.
Efficiency - The protocol efficiently forward packets, since the route is known when the packet arrives at the node.
HYBRID ROUTING PROTOCOL
An approach both proactive and reactive routing protocols every work finest in oppositely dissimilar scenarios, valid reason and chance to develop hybrid routing protocols ( combination of both proactive and reactive). However, these hybrid protocols can be used to search a stability among the proactive and reactive protocols. The abstract plan behind the hybrid routing protocols is to usage of the proactive routing mechanisms in certain areas of the network at definite times and reactive routing applied for the rest of the network. The operation done through proactive routing is limited to a lesser domain in order to diminish the control overheads and delays. Protocol of this type is used to locate the nodes outside this domain, because of more bandwidth efficient in a regularly changing network.
The following are hybrid routing protocols:
Zone routing protocol (ZRP)
Order one routing protocol (OORP)
Temporary ordered routing algorithm (TORA)
MANET features
Mobile ad hoc network possesses the following features:
Distributed operation:
Subsequently there is no background setup for the central control of the network methods, both the management and control of the network is disseminated among the terminals. Moreover, the nodes concerned in a MANET would collaborate amongst themselves and every node turns as a relay when needed, which in turn leads to implement functions such as security and routing.
Autonomous terminal:
In MANET, each and every mobile terminal is an autonomous node, it act and function as a host and a router. Put differently, besides the basic processing aptitude as a host, the mobile nodes which also perform switching purpose as router. Hence, endpoints and switches are usually indistinguishable in MANET.
Multi hop routing
The fundamental types of adhoc routing procedures can be split into single-hop and multi hop, on the basis of different link layer attributes and routing protocols. However, Single-hop MANET is simpler than multi-hop in terms of structure and implementation, in comparison with the cost of smaller functionality and applicability. When data packets are delivering after a source to its destination available to the direct wireless communication range, available packets must be sent through one or more intermediate nodes.
Fluctuating link capacity
The nature of high bit error rates of wireless construction strength be more profound in a MANET. Several sessions shares the one end-to-end path. The channel over which the terminals communicate depends on to noise, interference and fading and has a lesser amount of bandwidth than a wired network. Sometimes the path among any pair of users which traverse multiple links while the link themselves can be heterogeneous.
Dynamic network topology
Since the nodes are mobile in MANET, the topology followed in network may change rapidly, randomly and the connectivity among the terminals may differ with time. Design principles in MANET should adjust to the traffic, the propagation environments and the mobility patterns of the mobile network nodes. Mobile ad hoc network form their own network on the fly by which the mobile nodes can dynamically create routing among themselves as they change about. Furthermore, a user in the MANET could not only function within the ad hoc network, necessity occurs sometimes that require access to a public fixed network (for e.g. Internet). In some scenarios, the MANET nodes are mobile devices with a lesser amount of CPU processing capability, low power storage and small memory size. Such devices need optimized algorithms, mechanisms that process the computing and communicating functions.
UNIPATH ROUTING IN MANET
Routing protocols are used to find and maintain routes between source and destination nodes. As mentioned earlier in section 1.2, there are two main classes of adhoc routing protocols which include table-based and on-demand protocols. In table-based protocols, each node maintains a routing table containing routes to all nodes in the network. Nodes participated in network must periodically exchange messages with routing information to keep routing tables up-to-date. Hence, the routes between nodes are computed and stored, besides when they are not needed. Because of the dynamic nature of ad hoc networks, there is a possibility for considerable number of routing messages may have to be exchanged in order to keep routing information accurate or up-to-date.
In case of on-demand protocols, all participated nodes can compute routes only when they are needed. On this feature, on-demand protocols are more scalable to dynamic, and highly suitable for large networks. In particular, whenever a node needs a route to another node, it then initiates a route discovery process to find a route.
There are two main phases in On-demand protocols.
1. Route discovery - It is the process of finding a route between two nodes.
2. Route maintenance - Itis the process of repairing a broken route or finding a new route in the presence of a route failure.
Some of the most currently proposed routing protocols for ad hoc networks are unipath routing protocols. Normally, unipath routing requires only a single route is used between a source and destination node. Dynamic Source Routing and Adhoc On-demand Distance Vector protocols are the two most widely used unipath routing protocols. AODV and DSR are both on-demand protocols.
DYNAMIC SOURCE ROUTING
DSR is an on-demand routing protocol meant for ad hoc networks. Compare with any source routing protocol, in case of DSR the source includes the complete route in the packets header. However, the intermediate nodes make use of this to sent packets towards the destination and keep a route cache containing routes to other nodes. Following are the two phases:
Route discovery:Consider a scenario if the source does not have a route towards the destination in its route cache, then it broadcasts a route request (RREQ) message identifying the destination node intended for which the route is requested. The information encrypt in this RREQ message contains a route record which identifies the sequence of nodes traversed by the message. In a case, when an intermediate node obtains a RREQ, it then checks to see if it is previously in the route record. If record presented already, it drops the message. This process is done to prevent routing loops. The intermediate node sends the RREQ to the succeeding hop according to the route specified in the header. Afterwards, when the destination receives the RREQ, it then sends back a route reply message. Whenever, the destination has a route towards the source in its route cache, later it can send a route response (RREP) message along this route. In other words, the RREP message can be directed along the reverse route back to the source. For instance, intermediate nodes may also use their route cache to reply to RREQs.
Route maintenance: Analyzing this scenario, when a node finds a broken link while trying to send a packet to the next hop, this can sends a route error (RERR) message back to the source enclosing the link in error. The time when an RERR message is received, all other routes having the link in error are removed at that node.
AD HOC ON-DEMAND DISTANCE VECTOR
AODV is an on-demand routing protocol in adhoc networks. As compared to DSR, that uses source routing protocol, AODV uses hop-by-hop routing by maintaining routing table entries at intermediate nodes.
Route Discovery: The route discovery process is initiated when a source needs a route to a destination and it does not have a route in its routing table. The route discovery can be initiated, by means of source floods the network with a RREQ packet specifying the destination for which the route is requested. Sequentially, when a node receives an RREQ packet, the node checks to see whether it is the destination or whether it has a route to the destination. Whenever, an either case is true, RREP packet is generated by the node, which is sent back to the source along the reverse path. However, each node along the reverse path makes a forward pointer towards the node it received the RREP from. This entire process sets up a forward path from the source to the destination. Scenario likes if the node is not the destination and does not have a route towards the destination, and then it rebroadcasts the RREQ packet. Duplicate RREQ packets are discarded at the intermediate nodes. When the source node receives the first RREP, then it can begin sending data to the destination. Each entry in the node routing table and all RREQ and RREP packets are tagged with a destination sequence number to determine the relative degree out-of-datedness of routes. A larger destination sequence number indicates a more current (or more recent) route. Continuously receiving an RREQ or RREP packet, each node updates its routing information to set up the reverse or forward path, as respectively, only when the route contained in the RREQ or RREP packet is more current than its own route.
Route Maintenance: Sometimes a node detects a broken link while attempting to forward a packet to the succeeding hop, such time it generates a RERR packet that is sent to all sources using the broken link. However, this RERR packet erases all routes using the link along the way. On the other hand, if a source receives a RERR packet and a route to the destination is still required, then it initiates a new route discovery process. Routes from the routing table are also deleted if they are unused for a certain amount of time.
In literature, many multipath routing protocols have been proposed. Most of these protocols are an extension of either DSR or AODV.
MULTIPATH ROUTING IN MANET
Standard routing protocols in ad hoc wireless networks like AODV and DSR, which are mainly intended to discover a single route between a source and destination node. To find multiple routes between a source and destination node multipath routing is used. These multiple paths between source and destination node pairs can be used to compensate for the dynamic and unpredictable nature of ad hoc networks.
BENEFITS OF MULTIPATH ROUTING
As mentioned above, multiple paths can provide load balancing, higher aggregate bandwidth, and fault-tolerance. Load balancing can be achieved by spreading the traffic along multiple routes. However, it can alleviate congestion and bottlenecks. In a perspective of fault tolerance, multipath routing can provide route resilience. Because of bandwidth limitation in a wireless network, the possible routing along a single path may not provide enough bandwidth for a connection. However, if simultaneously used multiple paths to route data, the more aggregate bandwidth of the paths may satisfy the bandwidth requirement of the application. Furthermore, there exist more bandwidth available, achieves smaller end-to-end delay. Evaluation results show that using multipath routing in ad hoc networks of high density results in better throughput than using unipath routing.
ISSUES IN MOBILE AD HOC NETWORK
Scalability is one of the most significant open problems. The problem of scalability in adhoc networks can be generally defined as whether the network is capable to provide an adequate level of service to packets even in the presence of a huge number of nodes in the network. In case of wired network, such capability is closely related as to how quickly network protocol control overhead increases as a purpose of an increase in the number of nodes and link changes.
Ad hoc network do not assume the accessibility of a fixed infrastructure, since it follows individual nodes may have to rely on limited power sources and portability. The capability of fixed and wireless networks to satisfy quality of service (QoS) requirement is an important problem in ad hoc networks.
PROBLEM DEFINITION
MANET is a difficult task to define, however most important challenges in MANET are to provide quality of service in multimedia. Through resource limitation, contention for bandwidth, time varying links, etc. QoS is hard for ad hoc environment. Quality of service is usually defined as a set of service requirements that needs to be met by the network at the time of transporting a stream of data from source to destination. Expectation on network topology to guarantee a set of measurable service attributes to the user in terms of reliable communication through increase throughput, packet delivery fraction and decrease end to end delay.
Reliablity
Energy constraint
Network lifetime
Link failure
Delay
EXISTING METHODOLOGY
On-demand routing protocols in particular, are widely studied because they consume less bandwidth than proactive protocols. Ad Hoc On-demand Distance Vector and Dynamic Source Routing and Dynamic Manet On-demand are the three most frequently studied and analyzed on-demand ad hoc routing protocols. Previous literatures have shown certain limitations of the three protocols. The main reason is that all three of them are built and rely on a unipath route for each data session. These three routing protocols have to invoke a route discovery process at the time of link break on the active route.
On-demand multipath routing protocols can alleviate these problems by establishing many paths between a source and a destination in a single route discovery. Discovery of new route is invoked only when all of its routing paths and lack of security and also produce the non-reliable communication. Plenty of existing work relates the combination of proactive and reactive routing protocols like SHARP, ZRP etc. But the most important issue in MANET environment is to provide the Quality of Service (QoS) when the protocols are used in communication. In this thesis, we proposed and implemented a QoS based framework for MANET for reliable communication. The proposed scheme is to operate Consecutive routing process (CRP), the three routing protocol in the same network. Background of the network is chosen as reactive protocol. Whereas the reactive, proactive and hybrid protocols are operate in same network. FSR, DYMO, ZRP are the proactive, reactive and hybrid protocols used in our proposed scheme. The design of the framework is also supported by the coded algorithm.
OBJECTIVE OF THE THESIS
The objective of the thesis is to bring out Quality of Service (QoS) mobile ad hoc network environment for reliable communication. The specific objective of the thesis is to increase throughput, packet delivery fraction and decrease end-to-end delay of the network scenario under consideration. Furthermore, the framework also provides the following:
Communication reliability is achieved using the newly devised algorithm, which allows the repeated interactive and non-interactive simulation runs for various node densities.
Utilization of Consecutive routing protocols in the network renders most prominent performance.
Reliable communication check is done with the help of proposed framework which follow the proper request, discovery and maintenance of route.
High delivery with respect of both packet delivery fraction and throughput is accomplished through this framework.
The algorithm allows faster understanding of node communication of any specified network conditioning.
MAJOR CONTRIBUTIONS
The main focus of this research is to make meaningful involvement in the improvement of QoS in MANETs in application layer. The thesis has made the following contributions in effective way to achieve reliable communication in MANET environment.
EDYMO which deals with the energy constraint for reducing the energy consumption, increasing life time and deliver better performance
Network set up module consists of IEEE 802.11 DCF (Distributed Co-ordination Function) for MAC layer, Random Way point Model (RWM) for Mobility variations and Random Early Detection (RED) for congestion control purposes.
Routing module consists of Consecutive routing protocol study of EDYMO, FSR and ZRP routing protocols which are significant for bringing out reliable communication standards for network scenario. The corresponding methodologies were also included in the linked study phase for each protocol individually.
Performance analysis module which is a group of QoS metrics for better performance of network scenario, reliability for communication ease and security to avoid malicious attacks.
ORGANIZATION OF THE THESIS
The work reported in this thesis is organized into six chapters. In Chapter 1, the background of MANET, the objectives are discussed and explain the challenges and problem definition of MANET and literature survey of manet and related works. In Chapter 2, , discussion about various routing protocols important for the analysis necessary for the proposal and an algorthmic approach for the design of QoS based Mobile ad hoc network framework for reliable communication is presented. In Chapter 3 analysis and comparison the results and describtion on the major contributions of this research work and the scope for future work are summarized. Illustrative examples are included in each chapter to demonstrate the effectiveness of the proposed framework.