Unit 3
Unit 3
UNIT-3
MOBILE AD HOC NETWORK
MANET may operate a standalone fashion or they can be part of larger internet. They
form a highly dynamic autonomous topology with the presence of one or multiple
different transceivers between nodes. The main challenge for the MANET is to
equip each device to continuously maintain the information required to properly
route traffic. MANETs consist of a peer-to-peer, self- forming, self-healing network
MANET’s circa 2000-2015 typically communicate at radio frequencies (30MHz-
5GHz). This can be used in road safety, ranging from sensors for the environment,
home, health, disaster rescue operations, air/land/navy defense, weapons, robots, etc.
Characteristics of MANET –
Improvement in MANET:
1. Quality of Service (QoS): Researchers are working to improve the quality of
service of MANET by developing efficient routing protocols that provide
better bandwidth, throughput, and latency.
2. Security: To ensure the security of the MANET, researchers are developing
efficient security mechanisms that provide encryption, authentication, and
authorization facilities.
3. Power management: To enhance the lifetime of MANET nodes, researchers are
working on developing efficient power management techniques that reduce
the energy consumption of nodes.
4. Multimedia support: Researchers are working to provide multimedia support to
MANET by developing efficient routing protocols that can handle multimedia
traffic efficiently.
5. Standardization: To ensure the interoperability of different MANET devices,
researchers are working on developing standard protocols and interfaces that can
be used by different MANET devices.
Mobile Adhoc Network (MANET) is a wireless network made up of a collection of
mobile nodes connected wirelessly and free of any fixed infrastructure. It is self-
configuring and self-healing. MANET provides a lot of benefits, but it also has
several drawbacks that need to be fixed. Researchers are always trying to make
MANET’s features better in order to get over these constraints. Future
Advantages:
Flexibility: MANETs are highly flexible, as they can be easily deployed in various
environments and can be adapted to different applications and scenarios. This makes
them ideal for use in emergency situations or military operations, where there may not
be a pre-existing network infrastructure.
Scalability: MANETs can easily scale to accommodate a large number of nodes,
making them suitable for large-scale deployments. They can also handle dynamic
changes in network topology, such as the addition or removal of nodes.
Cost-effective: Since MANETs do not require any centralized infrastructure, they are
often more cost-effective than traditional wired or wireless networks. They can also be
used to extend the range of existing networks without the need for additional
infrastructure.
Rapid Deployment: MANETs can be rapidly deployed in areas where infrastructure is
not available, such as disaster zones or rural areas.
Disadvantages:
Types of MANET –
Uses: Smart Phone Ad hoc Network (SPANC) can be used for a variety of
applications, including:
Emergency communication: In the event of a natural disaster or other
emergency, SPANCs can be used to establish a communication network quickly,
allowing people to contact emergency services or stay in touch with loved ones.
Remote areas: SPANCs can be useful in remote areas where traditional wireless
networks are not available, such as rural communities or wilderness areas.
Event networking: SPANCs can be used to create a temporary network for
events or gatherings, allowing attendees to communicate and share information.
Military and emergency services: SPANCs can be used by military and
emergency services to establish a quick and reliable communication network in
the field.
Content sharing: SPANCs can be used to share various types of content such as
pictures and videos, as well as other forms of multimedia.
Research and Development: SPANCs can be used in various research and
development projects such as security, routing, and energy consumption.
Crowd sourcing: SPANCs can be used to gather data from a large group of
people, such as in a survey or study.
Advertising and marketing: SPANCs can be used to deliver targeted advertising
and marketing messages to a specific group of people.
Advantages:
Enables communication without relying on traditional network infrastructure or
wireless access points.
Provides a decentralized network without the need for a central infrastructure.
Disadvantages:
Limited coverage area, as SPANCs rely on the range of smartphone Wi-Fi
capabilities.
Requires a large number of smartphones to form an effective network.
Vulnerable to attacks and security breaches.
Advantages:
Provides flexibility and mobility as the network can be set up and moved
quickly.
Suitable for disaster response, search and rescue operations, and remote sensing
applications.
Can cover large areas with minimal infrastructure requirements.
Can operate in harsh environments where traditional communication
infrastructure is not available.
Disadvantages:
Limited endurance of the flying platforms.
Communication range is affected by weather conditions.
Lack of standardization in FANETs technology.
Difficult to maintain and manage due to the dynamic nature of the network.
An open system is a model that allows any two different systems to communicate.
1. Physical Layer
2. Data link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
As the message travel from A to B, it may pass through many intermediate nodes.
Theseintermediate nodes normally involve only the first three layers of OSI
model.
In developing the model, the designers distilled the process of transmitted data to its
most fundamental elements. They identify which networking function had
related uses and collected those function into discrete groups that became the
layers.
Each layer defines a family of function distinct from those of the layers. By
defining andlocalizing in the fashion, the designer created an architecture that is both
compressive and flexible.
OSI Layers
Within a single machine, each layer calls upon the services of the layer just below it.
For example, Layer 3 uses the service provided by Layer 2 and provides
services forLayer 4.
This communication is done by protocols.
The processes of each machine that communicate at given layer are called Peer
to Peer processes.
The passing of the data and network down through the layers of the sending machine
and backup through the layers of the receiving machine is made possible by an
interface betweeneach pair of the layer.
The seven layers divided into three subgroups. Layer 1, 2, and 3 that is physical,
data link and network are the network support layers; they deal with the physical
aspects of movin gdata from one device to another. Layer 5, 6 and 7 that is
session, presentation and application are the users support layer’s, they allow
interoperability among unrelated software system. Layer 4 the support layer,
ensure reliable data transmission.
In above figure gives the overall view of the OSI layers, L7 data means the data unit at
layer7, L6 data means the data unit at layer 6 and so on. The process start out at
layer 7 that is application layer then moves from layer to layer in descending
sequential order.
At each layer, a header is added to the data unit. At layer 2 a trailer is added as
well.When the formatted data unit through the physical layer, it is change into an
electromagnetic signal and transported along a physical link.
As a reaching its destination, the signal passes into layer 1 and is transformed
back into bits. The data units then move back up through the OSI layers. As each
block reaches the next higher layer, the headers and attached to it at the
SDJ International College Page 10
Network Technologies 2024
corresponding sending layer are removed and actions appropriate to that layer are
taken. By the time it reaches layer 7, the
1. Physical Layer
1. The physical layer is the first layer of OSI model. It deals with the
mechanical and electrical specifications of the interface and transmission
medium.
The physical layer receives a data unit from the data into signal that can be
transmitted on a transmission medium.
The physical layer is concerned with following:
Physical Layer Devices: NIC [Network Interface Card], Transceiver, Hub, MAU
[Multisession Access Unit], Repeaters.
The Data link Layer is the second layer of the OSI model. When the data link layer
accepts the data from the network, it adds meaningful bits at the beginning and
end of the data. This bit known as the header and trailer.
1. Framing: The data link layer divided the stream of bits received from the
network layer into manageable data units called frames.
3. Flow Control: If the rate at which the data are absorbed by the receiver is less
than the rate produced in the sender, the data link layer force a flow control
mechanism to prevent over traffic to the receiver.
4. Error Control: The data link layer adds reliability to the physical layer by
detecting and retransmits damage or lost frame, it also use to prevent duplication
of frames. Error control is achieved by trailer.
5. Access Control: When two devices are connected to the same link, data link
layer protocol determines which device has control.
The data link layer detects the logical topology that is the way packet move through a
network, There are three media access method are used at data link layer that is
CSMA/CD.
3. Network Layer
The network layer is third layer of OSI model. This layer provides services for routing
and logical addressing. Routing is a process of selecting the best path of the
available path inordered to send the packet.A message is different into server
packets.A packet can be sent through diffraction path. Each packet may take different
route to the destination.
At the destination this packet are collected reassemble into the original order. The
Process of routing requires addition of header. This header holds the source and the
SDJ International College Page 14
Network Technologies 2024
destination address of the packets. The network layer ensures that each packet gets
fromorigin to its final destination.
If two systems are connected to the same link, there is usually no need for
network layer. If the two system are attached to a different networks, there is
often a need for a network layer to accomplish source to destination delivery
network layer has a followingresponsibility.
1. Logical Address: The physical addressing implemented by the data link layer
handles theaddressing problem locally. If a packet passes a network boundary we
need another addressing system to define the source and destination system. The
network layer header tothe packet coming from the upper layer, which includes
logical address of sender and receiver. (IPAddress)
Network Layer
4. Transport Layer
The transport layer is the fourth layer of OSI model. The transport layer is
responsible for source to destination delivery of entire message. The network
layer ensures end to enddelivery of individual packets. Where it does not
recognize any relationship between those packets. The transport layer on the
other hand, ensures that the whole messagearrives in order.
For added security, the transport layer may create a connection between the
two endports. Creating a connection involves three steps:
1. Connection establishment
2. data transfer
3. connection release
The transport layer divides each messages into segments and assigns a sequence
numberto each segment, so when the message is being received by the clients, it is
sequentially arranged.
1. Service point addressing: Computer often runs program at the same time. For this
reason, source to destination delivery means delivery not only form one computer to
the next but also from specific process or running program on one computer to a
SDJ International College Page 16
Network Technologies 2024
specific a processor running program on other. The transport layer header
therefore must include a type ofaddress called a service point address (or port
address or socket address).The network layer gets each packet to the correct
computer and the transport layer the entire message to the process on that computer.
3. Connection Control: The transport layers can either connection less or connection
oriented. A connection less transport layer treats each segment as independent
packets and deliversit at the destination machine. A connection oriented transport
layer makes packets. After data are transferred, the connection is terminated.
4. Flow control: Like the data link layer, the transport layer is responsible for flow
control. Flow control at this layer is performed end to end rather across a single
network or signal.
5. Error Control: Like the data link layer, the transport layer is responsible for error
control. Error control at this layer is performed end to end rather across a single
network or signal link. The sending transport layer makes sure that the entire
message arrives at the receivingtransport layer without error.
5. Session Layer
It controls the communication between the applications on the host. The session
layer isresponsible to validate and establish a connection between the users.
1. Dialog Control: This session layer control which user will send data and at what
time. It allows the communication between two processes to take place either in
half-duplex or full-duplex.
3. Closing the session: ensure that the data transfer is completed before the session close.
Session Layer
6. Presentation
Layer
Presentation Layer
The presentation layer is the sixth layer of the OSI model. This layer responds to the
requestsend by the application layer.
7. Application layer
Application Layer
The application layer is the top most layer of OSI model. The application layer act as a
link between the user and presentation layer. The application layer enables the user,
whether human or software to access the network. It provides user interface and
support for servicessuch as an electronic-mail, remote file access and transfer,
shared database management and other types of distributed information services.
1. File transfer, access and management [FTAM]: This application allows a user to
access files in a remote computer to retrieve files from, a remote computer and to
manage or controlfiles a remote computer.
2. Mail services: this application provides the base for email forwarding and storage.
The OSI Model we just looked at is just a reference/logical model. It was designed to
describe the functions of the communication system by dividing the communication
procedure into smaller and simpler components. But when we talk about the TCP/IP
model, it was designed and developed by Department of Defense (DoD) in 1960s
and is based on standard protocols. It stands for Transmission Control
Protocol/Internet Protocol.The TCP/IP model is a concise (smaller) version of the OSI
model. It contains four layers, unlike seven layers in the OSI model. The layers are:
1. Process/Application Layer
2. Host-to-Host/Transport Layer
3. Internet Layer/Network Access Layer
4. Link Layer/ Physical Layer
The diagrammatic comparison of the TCP/IP and OSI model is as follows:
TCP/IPmodel layers
TCP/IP functionality is divided into four layers, each of which includes specific
protocols.
The application layer provides applications with standardized data exchange.
Its protocols include the Hypertext Transfer Protocol (HTTP), File Transfer
Protocol (FTP), Post Office Protocol 3 (POP3), Simple Mail Transfer Protocol
(SMTP) and Simple Network Management Protocol (SNMP).
The transport layer is responsible for maintaining end-to-end communications
across thenetwork. TCP handles communications between hosts and provides flow
control, multiplexing and reliability. The transport protocols include TCP and
User Datagram Protocol (UDP), which is sometimes used instead of TCP for
special
SDJ International College Page 24
Network Technologies 2024
purposes.
The network layer, also called the internet layer, deals with packets and connects
independent networks to transport the packets across network boundaries. The network
layer protocols are the IP and the Internet Control Message Protocol (ICMP),
which is used for error reporting.
The physical layer consists of protocols that operate only on a link -- the
network component that interconnects nodes or hosts in the network. The
protocols in this layer include Ethernet for local area networks (LANs) and
the Address Resolution Protocol (ARP).
TCP / IP OSI
TCP / IP refers to Transmission Control OSI refers to Open Systems
Protocol / Internet Protocol. Interconnection.
TCP/IP has 4 layers. OSI has 7 layers.
TCP/IP is more reliable OSI is less reliable
TCP/IP follows a horizontal approach. OSI follows a vertical approach.
TCP/IP uses both session and presentation OSI uses different session and
Layer in the application layer itself. Presentation layers.
TCP/IP developed protocols then model. OSI developed model then protocol.
TCP/IP model is based on protocols and OSI provides layer functioning and also
Protocols are not flexible with other layers. Defines Functions of all the layers.
Data communication Model, Digital and Analog data and signals, Bit rate, Baud
rate,Bandwidth, Nyquist Bit Rate
Data – Information presented in whatever form agreed upon by parties creating and using
theData.
Data Communications – Exchange of data between two devices via some form of
transmission medium.
Dataflow
Types of Connection
Point-to-point: Dedicated link between the two devices. The entire capacity of the link
is reserved for the only two devices on it.
Digital Signal
A digital signal - a must for computer processing - is described as using binary (0s and
1s).As illustrated in the graphic below, digital signals retain a uniform structure,
providing a constant and consistent signal. Because of the reliability of the digital
signal, technology using it is rapidly replacing a large percentage of analog
applications and devices. For example, the wristwatch, showing the time of day, with
its minute, hour, and sweeping second hands, is being replaced by the digital watch,
which offers the time of day and other information using a numerical display. A
typical digital signal is represented below. Note the equally dispersed 1s and 0s.It is
used when bandwidth is high.
Bit Rate - The number of bits per second that can be transmitted along a digital network.
(Rate at which data is
sent)BR = D ÷ T
Where:
BR = Bit Rate
D = Amount of Data
Bandwidth
Nyquist Bit Rate - Nyquist gives the upper bound for the bit rate of a
transmission system by calculating the bit rate directly from the number of bits
in a symbol (or signallevels) and the bandwidth of the system. (calculate by bit
rate & bandwidth)