Page 1 of 10

European Journal of Business &

Social Sciences

Available at https://ejbss.org/

ISSN: 2235-767X

Volume 07 Issue 01

January 2019

Available online: https://ejbss.org/ P a g e | 83

MANETS: A Study of Schemes in Routing and Multicasting Routes in

Ad hoc networks

Saroj

Vocational Teacher in Computer Science

Govt. Sr. Sec. School, Jhumpa Khurd, Bhiwani.

Background and Motivation

Ad hoc Networks: With the advance of wireless communication technology, portable computers with

radios are being increasing deployed in common activities. Applications such as conferences, meetings,

lectures, crowd control, search and rescue, disaster recovery, and automated battlefields typically do not

have central administration or infrastructure available.

The Ad Hoc Network is defined as a collection of mobile hosts forming a temporary network without

the aid of any centralized administration or standard support services. In Latin, ad hoc literally means

"for this," further meaning "for this purpose only," and thus usually temporary. Ad hoc networks

represent complex distributed systems that comprise wireless mobile nodes that can freely and

dynamically self-organize into arbitrary and temporary, ‘‘ad-hoc’’ network topologies, allowing people

and devices to seamlessly inter-network in areas with no pre-existing communication infrastructure.

Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of

mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices, i.e.

mobile phone, laptop, personal digital assistance, MP3 player, and personal computer that are

participating in the network and are mobile. These nodes have the ability to configure themselves and

because of their self-configuration ability, they can be deployed urgently without the need of any

infrastructure. “Internet Engineering Task Force (IETF) has a MANET working group (WG) that is

devoted to developing IP routing protocols. Routing protocols is one of the challenging and interesting

research areas. Many routing protocols have been developed for MANETS, i.e. AODV, OLSR, DSR

etc” [1].

Security is the Cry of the Day: MANETs must have a secure way for transmission and

communication and this is a quite challenging and vital issue as there is increasing threats of attack on

Page 2 of 10

European Journal of Business &

Social Sciences

Available at https://ejbss.org/

ISSN: 2235-767X

Volume 07 Issue 01

January 2019

Available online: https://ejbss.org/ P a g e | 84

the Mobile Networks. Security is the cry of the day. In order to provide secure communication and

transmission, the engineers must understand different types of attacks and their effects on the

MANETs. “ Wormhole attack, Black hole attack, Sybil attack, flooding attack, routing table overflow

attack, Denial of Service (DoS) , selfish node misbehaving, impersonation attack are kind of attacks

that a MANET can suffer from”.[2]

The Role of Multicast in Adhoc Network

Recently, mobile computing has become a hot topic in research. Although computers and

communication devices are be- coming smaller and more powerful, mobility still challenges

applications of mobile computing especially in the area of ad hoc networking. A mobile ad hoc network

consists of mobile hosts that communicate via wireless links. Due to mobility, the topology of the

network changes continuously and wireless links break down and reestablish frequently. Moreover, an

ad hoc network operates in the absence of fixed infrastructure, forcing the hosts to organize the

exchange of information decent rally.

We believe that the best applications of inter-vehicle communication are to provide improved comfort

and additional safety in driving. Our aim is to make these applications feasible by enabling the

dissemination of information among participating vehicles. In contrast to applications in “Cooperative

driving” [3] and “Platooning and automated highways.” [4] We are able to relax the requirements of

high bandwidth, “expensive equipment and infrastructure” [5] and “Most importantly 100 %

deployment.” [6, 7]

Tests with relatively “cheap off-the-shelf devices have shown the general feasibility of radio modems

in the 2.4 GHz industrial, scientific, and medical (ISM) band”.[8] As an example application, “an

equipped vehicle identifies itself as crashed by vehicular sensors that detect events like airbag ignition

.” [9] Then, it can report the accident instantly to equip vehicles nearby. Thus, we intend to help the

driver cope with a potentially dangerous or inconvenient situation.

Role-Based Multicast

Page 3 of 10

European Journal of Business &

Social Sciences

Available at https://ejbss.org/

ISSN: 2235-767X

Volume 07 Issue 01

January 2019

Available online: https://ejbss.org/ P a g e | 85

Many studies in ad hoc networking “Propose mobility patterns in a two-dimensional plane.” [10, 11]

There, the hosts change their “Speed and direction more or less randomly”. [12] However, “vehicles in

road traffic typically follow the road, which allows us to reduce mobility to dimension.” [13, 14]

Furthermore, vehicles on a highway often drive at 130km/h and more which is much faster than the

papers, presume. “Hong et. Al has shown the impact of mobility patterns on performance measures of

ad hoc network protocols.” [15, 16]

Challenges in Routing and Multicasting Routes in ad hoc networks

Challenges in Routing and Multicasting Routes in ad hoc networks are multihop because of the limited

propagation range (250 meters in an open field) of wireless radios. Since nodes in the network move

freely and randomly, routes often get disconnected. Routing protocols are thus responsible for

maintaining and reconstructing the routes in a timely manner as well as establishing the durable routes.

In addition, routing protocols are required to perform all the above tasks without generating excessive

control message overhead. Control packets must be utilized efficiently to deliver data packets, and be

generated only when necessary. Reducing the control overhead can make the routing protocol efficient

in bandwidth and energy consumption.

Multipoint communications have emerged as one of the most researched bare as in the field of

networking. As the technology and popularity of the Internet grow, applications, such as video

conferencing, that require multicast support are becoming more widespread. In a typical ad hoc

environment, network hosts work in groups to carry out a given task.

The Role of Multicast in Adhoc Network

Therefore, multicast plays an important role in ad hoc networks. Multicast protocols used in static

networks (e.g., Distance Vector Multicast Routing Protocol (DVMRP), Multicast Open Shortest Path

First (MOSPF), Core Based Trees (CBT), and Protocol Independent Multicast (PIM) do not perform

well in wireless adhoc networks because multicast tree structures are fragile and must be readjusted as

connectivity changes. Furthermore, multicast trees usually require a global routing substructure such as

link state or distance vector. Hence, the tree structures used in static networks must be modified, or a