Page 1 of 10
European Journal of Business &
Social Sciences
Available at https://ejbss.org/
ISSN: 2235-767X
Volume 07 Issue 01
January 2019
Available online: https://ejbss.org/ P a g e | 83
MANETS: A Study of Schemes in Routing and Multicasting Routes in
Ad hoc networks
Saroj
Vocational Teacher in Computer Science
Govt. Sr. Sec. School, Jhumpa Khurd, Bhiwani.
Background and Motivation
Ad hoc Networks: With the advance of wireless communication technology, portable computers with
radios are being increasing deployed in common activities. Applications such as conferences, meetings,
lectures, crowd control, search and rescue, disaster recovery, and automated battlefields typically do not
have central administration or infrastructure available.
The Ad Hoc Network is defined as a collection of mobile hosts forming a temporary network without
the aid of any centralized administration or standard support services. In Latin, ad hoc literally means
"for this," further meaning "for this purpose only," and thus usually temporary. Ad hoc networks
represent complex distributed systems that comprise wireless mobile nodes that can freely and
dynamically self-organize into arbitrary and temporary, ‘‘ad-hoc’’ network topologies, allowing people
and devices to seamlessly inter-network in areas with no pre-existing communication infrastructure.
Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of
mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices, i.e.
mobile phone, laptop, personal digital assistance, MP3 player, and personal computer that are
participating in the network and are mobile. These nodes have the ability to configure themselves and
because of their self-configuration ability, they can be deployed urgently without the need of any
infrastructure. “Internet Engineering Task Force (IETF) has a MANET working group (WG) that is
devoted to developing IP routing protocols. Routing protocols is one of the challenging and interesting
research areas. Many routing protocols have been developed for MANETS, i.e. AODV, OLSR, DSR
etc” [1].
Security is the Cry of the Day: MANETs must have a secure way for transmission and
communication and this is a quite challenging and vital issue as there is increasing threats of attack on
Page 2 of 10
European Journal of Business &
Social Sciences
Available at https://ejbss.org/
ISSN: 2235-767X
Volume 07 Issue 01
January 2019
Available online: https://ejbss.org/ P a g e | 84
the Mobile Networks. Security is the cry of the day. In order to provide secure communication and
transmission, the engineers must understand different types of attacks and their effects on the
MANETs. “ Wormhole attack, Black hole attack, Sybil attack, flooding attack, routing table overflow
attack, Denial of Service (DoS) , selfish node misbehaving, impersonation attack are kind of attacks
that a MANET can suffer from”.[2]
The Role of Multicast in Adhoc Network
Recently, mobile computing has become a hot topic in research. Although computers and
communication devices are be- coming smaller and more powerful, mobility still challenges
applications of mobile computing especially in the area of ad hoc networking. A mobile ad hoc network
consists of mobile hosts that communicate via wireless links. Due to mobility, the topology of the
network changes continuously and wireless links break down and reestablish frequently. Moreover, an
ad hoc network operates in the absence of fixed infrastructure, forcing the hosts to organize the
exchange of information decent rally.
We believe that the best applications of inter-vehicle communication are to provide improved comfort
and additional safety in driving. Our aim is to make these applications feasible by enabling the
dissemination of information among participating vehicles. In contrast to applications in “Cooperative
driving” [3] and “Platooning and automated highways.” [4] We are able to relax the requirements of
high bandwidth, “expensive equipment and infrastructure” [5] and “Most importantly 100 %
deployment.” [6, 7]
Tests with relatively “cheap off-the-shelf devices have shown the general feasibility of radio modems
in the 2.4 GHz industrial, scientific, and medical (ISM) band”.[8] As an example application, “an
equipped vehicle identifies itself as crashed by vehicular sensors that detect events like airbag ignition
.” [9] Then, it can report the accident instantly to equip vehicles nearby. Thus, we intend to help the
driver cope with a potentially dangerous or inconvenient situation.
Role-Based Multicast
Page 3 of 10
European Journal of Business &
Social Sciences
Available at https://ejbss.org/
ISSN: 2235-767X
Volume 07 Issue 01
January 2019
Available online: https://ejbss.org/ P a g e | 85
Many studies in ad hoc networking “Propose mobility patterns in a two-dimensional plane.” [10, 11]
There, the hosts change their “Speed and direction more or less randomly”. [12] However, “vehicles in
road traffic typically follow the road, which allows us to reduce mobility to dimension.” [13, 14]
Furthermore, vehicles on a highway often drive at 130km/h and more which is much faster than the
papers, presume. “Hong et. Al has shown the impact of mobility patterns on performance measures of
ad hoc network protocols.” [15, 16]
Challenges in Routing and Multicasting Routes in ad hoc networks
Challenges in Routing and Multicasting Routes in ad hoc networks are multihop because of the limited
propagation range (250 meters in an open field) of wireless radios. Since nodes in the network move
freely and randomly, routes often get disconnected. Routing protocols are thus responsible for
maintaining and reconstructing the routes in a timely manner as well as establishing the durable routes.
In addition, routing protocols are required to perform all the above tasks without generating excessive
control message overhead. Control packets must be utilized efficiently to deliver data packets, and be
generated only when necessary. Reducing the control overhead can make the routing protocol efficient
in bandwidth and energy consumption.
Multipoint communications have emerged as one of the most researched bare as in the field of
networking. As the technology and popularity of the Internet grow, applications, such as video
conferencing, that require multicast support are becoming more widespread. In a typical ad hoc
environment, network hosts work in groups to carry out a given task.
The Role of Multicast in Adhoc Network
Therefore, multicast plays an important role in ad hoc networks. Multicast protocols used in static
networks (e.g., Distance Vector Multicast Routing Protocol (DVMRP), Multicast Open Shortest Path
First (MOSPF), Core Based Trees (CBT), and Protocol Independent Multicast (PIM) do not perform
well in wireless adhoc networks because multicast tree structures are fragile and must be readjusted as
connectivity changes. Furthermore, multicast trees usually require a global routing substructure such as
link state or distance vector. Hence, the tree structures used in static networks must be modified, or a
