IJRIT International Journal of Research in Information Technology, Volume 2, Issue 7, July 2014, Pg: 09-14

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Study on Characteristics of Ad hoc Networks and TCP/IP Model S.Dinakar1, Dr.J.Shanthini2 1

PG Scholar, Department of Information Technology, SNS College of Technology, Coimbatore, TamilNadu. 2

Associate Professor, Department of Information Technology, SNS College of Technology, Coimbatore, TamilNadu.

Abstract - Presently the devices are portable, but the user’s needs to communicate to the networks which can only be achieved through wireless. It allows the users to access the network anytime and anywhere without any restrictions. The ultimate aim of the study is to analyze the factors which foster the importance of wireless communication over wired and also the protocol stack of ad hoc networks has also been studied in order to get a clear view of how the devices communicate among themselves to achieve a communication through the help of these networks. Keywords – Portable, Wireless, Network, Communication, Protocol Stack.

1. Introduction Due to the technological advancement the increased demands and flexibility in our day to day life lead to the transmission from wired communication to wireless communication techniques. The wireless communication technology plays a vital role in the life of every mankind. They make use of these techniques in their day to day activities such as mobile phones, PDA, wireless computer parts, satellite televisions, etc. The wireless communication involves transmission of information without the help of cables and can be transmitted ranging from few hundred meters to over a wide range of kilometers. They make use of electromagnetic waves to transport data called the radio waves. The greatest achievement of these technologies enables the users to access their personal devices anywhere and anytime. These communication techniques hold the following merits as, a) Information can be communicated to the destination quickly. b) The personal devices can be accessed by the users anywhere and anytime. c) It is greatly helpful to the users in remote areas to get in touch through wireless communication. d) It can withstand disasters and provides support in times of urgent situations. e) The key merit is that it does not involve high cost for installation. In addition to all these merits the communication involves threats to mankind by allowing intruders to gain access to the message but by making suitable preventive measures they can be easily overcome. S.Dinakar,IJRIT

9

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 7, July 2014, Pg: 09-14

2. Setting Up Wireless Communication The wireless communication can be established using two modes as, a) Infrastructure It requires an infrastructure to build the network and provides access to other networks through access point. Here the communication happens between the access point and wireless node since, no two wireless nodes can communicate with each other. It acts as a bridge between wired and wireless networks. b) Ad hoc Networks A mobile ad hoc network is a continuously self-configuring, infrastructure-less network. It consists of mobile devices connected without wires. In Latin, meaning of “ad hoc” stands “for this purpose”. Every device acts as a node in MANET that is free to move independently in any direction and therefore it changes it links to other devices frequently. Every node can send/receive packets among themselves and can act as router. The key challenge in building MANET is making each device capable enough to continuously monitor the information to properly route the packets. They operate by themselves (or) may be connected to a larger network. MANET does not need any central controller. The main aim is to study the mobile ad hoc networks since it serves for variety of applications and supports communications among wide variety of devices. 2.1 Purpose of MANET The main purpose of MANET is mobility which involves, a) User Mobility It refers to the user who has access to the network at different places. b) Device Mobility It refers to the movement of communication devices. 2.2 Advantages of Wireless Compared to Wired Communication a) Flexibility - The devices can communicate within the radio coverage without any restriction. b) Planning - Since the mode of communication is wireless it do not require any prior planning. c) Design - It allows easy design for independent devices. d) Robustness - These networks can withstand disasters enabling communications. e) Remote Areas - The wired communications in remote areas can be costly but ad hoc involves low cost solutions. f) Cost - It does not involve cost as compared to wired communication but in case of adding additional devices to the network can add up costs. The following are some of the merits of MANET but it is not limited to the above and it is being expanding upon the technological advancements. These characteristics plays a major role for developing interest in studying about MANET for which its layer functionalities are also been studied.

S.Dinakar,IJRIT

10

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 7, July 2014, Pg: 09-14

3. Charactristics of Wireless Communication Devices The way of accessing the network is through electromagnetic waves through air. The following are the characteristics of wireless communication devices. a) Fixed and Wired - Static devices make use of these networks. Ex: Desktop. b) Mobile and Wired - Dynamic devices make use of these networks. Ex: Laptop connected using a modem. c) Fixed and Wireless - These networks are installed in historical building to avoid damage caused due to wiring. d) Mobile and Wireless - It does not require the device to be connected to any sort of fixed networks and they can roam anywhere and anytime to access the networks. The wireless and mobile characteristics of MANET have been chosen for a clear study.

4. Protocol Stack of Ad hoc Neetworks The Open Standard Interconnections Model is a theoretical model for characterizing and controlling the internal functions in a communication system. The communication functions are partitioned into seven layers serving each other. This model works well for stations within a mutual communication range where it does not asatisfy the functions of an ad hoc network since it is created without any proper planning. The ad hoc wireless network protocol design is based on the layered TCP/IP approach. (Figure 1) Each layer in the protocol stack serves the layers directly above it (or) the one directly below it. The layers in these protocol stack are independently designed and operated with static interfaces between layers that are independent of different network constraints and applications.

Figure 1: TCP/IP Model The functions of TCP/IP layer for ad hoc networks cannot be subjected to a single layer. But these can be implemented as a whole by concatenating the mechanisms implemented in all the layers. The functions of every layers are implemented solely while the advantages of all these layers can be utilized by integrating them in a hierarchial framework (Figure 2). This is called cross layer design. The deisgn should not eliminate the advantages of layering for which some sort of separation is used allowing the layers to interact between layers. Each layer will be associated with some key parameters which are passed on to the adjacent layers.

S.Dinakar,IJRIT

11

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 7, July 2014, Pg: 09-14

Figure 2: Hierarchial Framework 4.1 Functions of TCP/IP Model a) Routing It involves transferring packets from the data link layer of source network to the data link layer of the correct destination network is called routing. It includes decision making at each intermediate node on where to send the packet next in order to reach the destination. This functionality is performed by the router. The router requires some addressing schemes for the identification by the network layer. b) Inter-Networking It holds connection between two physically different networks for communication where the packets arrive at the data link layer of the node which connects these two physically different networks. Then the header of the packets will be removed and passed on to the network layer. This network layer is responsible for transferring this data to the data link layer of the other two networks. c)

Congestion Control

Congestion occurs when the outgoing rate of the packets is higher than the incoming rate in any router. Factors Influencing Congestion •

Lower bandwidth



Poor performance by the router’s CPU.



Routers memory capacity may be high.



Lack of Memory.



Queuing Packets.

d) Energy Management The main reason for the development of ad hoc wireless networks is to provide a communication in environments where the setting up of a fixed infrastructure is unworkable. Ad hoc wireless networks have very limited energy resources. The increasing gap between the power consumption requirements and power availability adds to the importance of energy management. Sometimes it becomes very difficult to replace or recharge the S.Dinakar,IJRIT

12

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 7, July 2014, Pg: 09-14

batteries of the devices. Hence, energy conservation is essential in such scenarios. Batteries tend to increase the size and weight of a mobile node. The capacity of the battery tends to reduce according to the size of the battery which, in turn, decreases the active duration of the node. Hence, in additionally for reducing the size of the battery, techniques for energy management are necessary for consuming the battery capacity in the best possible way. e) Mobility Management In mobile adhoc network, nodes of position change due to autonomous nature. It is needed to observe the activities and location of the nodes on the regular basis. For rest of the study purpose routing is chosen since it involves routing packets between devices. The techniques, protocols, algorithms, merits, demerits were planned for the forthcoming study.

5. Conclusion The main aim of the study is to choose a communication mode in wireless technology along with protocol stack to picture all the underlying functions. Based upon the study the network layer was chosen and its functionalities were studied from which the promising one is chosen for the later studies.

TABLE 1: Summary of TCP/IP Layer Functions Layers

Functions

Description Transfer of packets from source to

Routing

destination It concatenates two physically

Network Interface

Inter-Networking

Internet

communication

Transport Application

different networks for the purpose of

It occurs when the outgoing of packets Collision Control

is higher than the incoming rate. It involves conservation of energy

Energy Management

resources. It involves the position change of the

Mobility Management

node (i.e) Autonomous

6. References 1. Characterisation and Applications of MANET,Routing Algorithms in Wireless Sensor Networks, by Siddhu Warrier. 2. A Survey on the Applications of MANET, by Jiazi YI,Polytech’Nantes . 3. An Overview of Mobile Ad Hoc Networks: Applications and Challenges, by Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester. S.Dinakar,IJRIT

13

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 7, July 2014, Pg: 09-14

4. www.wikipedia.com. 5. ITU-T X-Series Recommendations. 6. Jochen Schiller, “Mobile Communications”, PHI, Second Edition, 2003. 7. B.S. Charulatha, A text book on “Mobile Computing”, Edition 2, July 2009. 8. "Publicly Available Standards". Standards.iso.org. 2010-07-30. Retrieved 2010-09-11. 9. D.Prabakar,Dr.M.Marikkannan ,Dr.S.Karthik ,"A study on Recent and development Research Issues in Wireless Communications" INTERNATIONAL JOURNAL OF ADVANCED AND INNOVATIVE RESEARCH (IJAIR),ISSN: 2278-7844 December 2012 Volume 1 Issue 7, pp 204-207. 10. X.800 : Security architecture for Open Systems Interconnection for CCITT applications 11. "ITU-T Recommendation X.224 (11/1995) ISO/IEC 8073". 12. Grigonis, Richard (2000). Computer telephony encyclopedia. CMP. p. 331.ISBN 9781578200450. 13. ITU-T Recommendation Q.1400 (03/1993), Architecture framework for the development of signaling and OA&M protocols using OSI concepts, pp 4, 7. 14. ITU Rec. X.227 (ISO 8650), X.217 (ISO 8649) 15. Ronda Hauben. "From the ARPANET to the Internet". TCP Digest (UUCP). Retrieved 2007-07-05.

S.Dinakar,IJRIT

14

Study on Characteristics of Ad hoc Networks and TCP/IP Model - IJRIT

the transmission from wired communication to wireless communication techniques. .... are necessary for consuming the battery capacity in the best possible way. ... Internet. Transport. Application. Routing. Transfer of packets from source to.

696KB Sizes 2 Downloads 115 Views

Recommend Documents

Study on Characteristics of Ad hoc Networks and TCP/IP Model - IJRIT
e) The key merit is that it does not involve high cost for installation. ... e) Remote Areas - The wired communications in remote areas can be costly but ad hoc involves low cost solutions. f) Cost - It does ... Ex: Laptop connected using a modem.

Regularity, Interference, and Capacity of Large Ad Hoc Networks
Moreover, even if the complete set of nodes constitutes a PPP, the subset of active nodes (e.g., transmitters in a given timeslot or sentries in a sensor network), ...

On-demand Multipath Distance Vector Routing in Ad Hoc Networks
On-demand routing protocols for ad hoc networks discover and maintain only the ... An ad hoc network is a mobile, multihop wireless network with no stationary infrastructure. ...... Conf. on Computer Communications and Networks ... Workshop on Mobile

Regularity, Interference, and Capacity of Large Ad Hoc Networks
alytical tools from stochastic geometry are used, including the probability generating functional of Poisson cluster processes, the Palm characterization of Poisson cluster ..... Let Cl(ϵ, T) and Cu(ϵ, T) denote lower and upper bounds to the transm

On-Demand Multipath Routing for Mobile Ad Hoc Networks Asis ...
Division of Computer Science ... A mobile, ad hoc network is an autonomous system of ... route set up and maintenance in a packet radio network with moderate ...

On Self-Organization in Mobile Ad Hoc Networks
(cellular networks) ... Networks. • Mobile ad hoc networks (MANETs). • No base station and rapidly .... Coverage Condition (Wu and Dai, ICDCS 2003).

Comparison of Existing Routing Techniques for Mobile Ad-Hoc ... - IJRIT
Mobile ad hoc networks re wireless networks formed by wireless devices in sharing or PAN ... Nodes in turn respond to these changes and direct packets on the.

Comparison of Existing Routing Techniques for Mobile Ad-Hoc ... - IJRIT
mobility, bandwidth issues of this specialized hoc architecture. However all protocols ... routes as computed by the packets as per the stored network map data.

Routing in Ad-Hoc Networks
generate a significant amount of network control traffic when the topology of the network changes frequently. Lastly, packets can .... time, which happens very often in radio networks due to collisions or other transmission problems. In addition, OLS

wireless ad hoc networks pdf
Loading… Page 1. Whoops! There was a problem loading more pages. wireless ad hoc networks pdf. wireless ad hoc networks pdf. Open. Extract. Open with.

P2P Cache-and-Forward Mechanisms for Mobile Ad Hoc Networks
network area where user devices are equipped with a data cache and communicate according to an ad hoc networking paradigm. We assume that users create ...

Joint Scheduling and Power Control for Wireless Ad Hoc Networks
Abstract—In this paper, we introduce a cross-layer design framework to the multiple access problem in contention-based wireless ad hoc networks.

HierHybNET: Capacity scaling of ad hoc networks with ...
networks consisting of both wireless ad hoc nodes and in- frastructure .... 3 It was shown that the HC scheme is order-optimal in a dense network even with ...... cessing, mobile computing, big data analytics, and online social networks analysis.

performance of network coding in ad hoc networks
Computer Science Department, University of California, Los Angeles ... Laboratory for Information and Decision Systems, Massachusetts Institute of Technology.

A Review on Prevention of Wormhole Attack in Mobile Ad-hoc ... - IJRIT
3.8 Malicious Code Attacks: Malicious code, such as viruses, worms, spywares, and Trojan Horses, can attack both operating systems and user applications. These malicious programs usually spread themselves through the network and cause the computer sy

Modelling cooperation in mobile ad hoc networks: a ...
one. However, the general approach followed was proposing a mechanism or a protocol ... network with probability one. ... nodes from all the network services.

Mitigating starvation in Wireless Ad hoc Networks: Multi ...
sage indicating the transmission power Pd. Upon receiving the ATIM-ACK, node S ..... mation Computing Development Program through the Na- tional Research ...

Overhearing-aided Data Caching in Wireless Ad Hoc Networks
Abstract—The wireless ad hoc network is a promising networking technology to provide users with various network services anywhere anytime. To cope with resource constraints of wireless ad hoc networks, data caching is widely used to efficiently red