1.2.10.2 QoS provisioning

A network or a service provider offers the QoS to be the performance level of services the user in terms of many performance metrics of QoS such as packet delivery, the average end-to-end delay, and available bandwidth. Between the network and the host, negotiation is mostly needed when providing QoS (i.e. QoS provision). More specifically, this demand is based on the call admission control, resource reservation schemes and priority scheduling. Therefore, when different levels of QoS are provided in a highly changeable environment, an important issue takes place for this provision. (Chakrabarti and Mishra, 2001).

In MANETs, the provision of QoS is made to be more difficult than providing it in fixed wired networks. This difficulty is due to a high change in network topology, the presence of additional bandwidth, and medium and linked constraints. Static constraints such as memory, processing power and bandwidth, will be only taken into account (Basagni et al., 2004). An implementation must be performed for an adaptive QoS within the traditional resource reservation techniques (Ilyas, 2003), in order that multimedia services in MANETs could be efficiently supported.

#### 1.2.10.3 Security

Security attacks consider Ad hoc networks to be highly vulnerable to it. In the matter fact, this is taken into account to be as the main challenges of the developers of MANET. Particular security problems are involved in a MANET. This is referred to several reasons, such as insecure operating environment, shared broadcast radio channel, malicious attacks of a neighbor node, lack of central authority, limited availability of resources, lack of association among nodes, and physical vulnerability. Integrity, availability, confidentiality, non-repudiation and authentication are the most common attributes of MANETs security system (Ilyas, 2003) (Makki et al., 2007).

Survivability of network services despite the denial of service attacks is ensured by the Availability. Certain information is never disclosed to unauthorized entities. This is ensured by confidentiality. A corruption is never happened for a message being sent. This is ensured by Integrity. In order to ensure the identity of the peer node for communications, a node is enabled by authentication. Finally, the message being sent cannot be denied by the origin of a message. This is guaranteed by non-repudiation (Buttyan and Hubaux, 2007). The major security threats that are available in MANETs are denial of service, passive eavesdropping, signaling attacks, resource of service, host impersonation and information disclosure.

#### 1.2.10.4 Multicasting

Multicast is another significant issue of MANETs because the multicast tree is not static in MANETs due to the random movement of nodes in the network. Multiple hops are potentially contained by routes of each pair of nodes. The single hop communication type is less complex than this type of communication. When multicast packets should be sent to groups in several networks, multicast routing becomes essentially. In MANETs, a vital role is played by multicasting through several applications such as in emergency, military operations and rescue operations. Node mobility with the power and bandwidth constraints make multicast routing very challenging in MANETs (Ritvanen, 2004).

#### **1.2.11 Application of MANETs**

Mobile ad hoc networks (MANETs) are very flexible networks and suitable for a lot of types of potential applications applied on the Ad hoc networks, as they allow the

18 Will-be-set-by-IN-TECH

A network or a service provider offers the QoS to be the performance level of services the user in terms of many performance metrics of QoS such as packet delivery, the average end-to-end delay, and available bandwidth. Between the network and the host, negotiation is mostly needed when providing QoS (i.e. QoS provision). More specifically, this demand is based on the call admission control, resource reservation schemes and priority scheduling. Therefore, when different levels of QoS are provided in a highly changeable environment, an important

In MANETs, the provision of QoS is made to be more difficult than providing it in fixed wired networks. This difficulty is due to a high change in network topology, the presence of additional bandwidth, and medium and linked constraints. Static constraints such as memory, processing power and bandwidth, will be only taken into account (Basagni et al., 2004). An implementation must be performed for an adaptive QoS within the traditional resource reservation techniques (Ilyas, 2003), in order that multimedia services in MANETs

Security attacks consider Ad hoc networks to be highly vulnerable to it. In the matter fact, this is taken into account to be as the main challenges of the developers of MANET. Particular security problems are involved in a MANET. This is referred to several reasons, such as insecure operating environment, shared broadcast radio channel, malicious attacks of a neighbor node, lack of central authority, limited availability of resources, lack of association among nodes, and physical vulnerability. Integrity, availability, confidentiality, non-repudiation and authentication are the most common attributes of MANETs security

Survivability of network services despite the denial of service attacks is ensured by the Availability. Certain information is never disclosed to unauthorized entities. This is ensured by confidentiality. A corruption is never happened for a message being sent. This is ensured by Integrity. In order to ensure the identity of the peer node for communications, a node is enabled by authentication. Finally, the message being sent cannot be denied by the origin of a message. This is guaranteed by non-repudiation (Buttyan and Hubaux, 2007). The major security threats that are available in MANETs are denial of service, passive eavesdropping, signaling attacks, resource of service, host impersonation and information disclosure.

Multicast is another significant issue of MANETs because the multicast tree is not static in MANETs due to the random movement of nodes in the network. Multiple hops are potentially contained by routes of each pair of nodes. The single hop communication type is less complex than this type of communication. When multicast packets should be sent to groups in several networks, multicast routing becomes essentially. In MANETs, a vital role is played by multicasting through several applications such as in emergency, military operations and rescue operations. Node mobility with the power and bandwidth constraints make multicast

Mobile ad hoc networks (MANETs) are very flexible networks and suitable for a lot of types of potential applications applied on the Ad hoc networks, as they allow the

issue takes place for this provision. (Chakrabarti and Mishra, 2001).

1.2.10.2 QoS provisioning

could be efficiently supported.

system (Ilyas, 2003) (Makki et al., 2007).

routing very challenging in MANETs (Ritvanen, 2004).

1.2.10.3 Security

1.2.10.4 Multicasting

**1.2.11 Application of MANETs**


Table 6. Illustrates some of the application for the ad hoc networks

establishment of temporary communication without any pre-installed infrastructure, the application such as the European telecommunications standard institute (ETSI) also the HIPERLAN/2 standard (Masella, 2001) (Habetha et al., 2001), IEEE 802.11 wireless LAN standard family (Crow. B et al., 1997) and Bluetooth (Bluetooth, 2001) the ad hoc network are very important area in this time and very useful for the military (battlefield) and for the disasters (flood, fire and earthquake and so on),meetings or conventions in which people wish to quickly share information (Chlamtac et al., 2003). And then use it in the emergency search-and-rescue operations, recovery, home networking etc. Nowadays, ad hoc network became so important in our circle life, because can be applied anywhere where there is little or without communication infrastructure or may be the existing infrastructure is expensive to use. The ad hoc networking allows to nodes or devices to keep the connections to the network for as long as it's easy to add and to remove to the end of the network. And there are a lot of varieties of applications for the mobile ad hoc networks, ranging large scale such as dynamic network and mobile and small fixed-constrained energy sources. As well as legacy applications that move from the traditional environment to the Ad Hoc infrastructure environments, a great deal of new services can and will be generated for the new environment, finally as the result the mobile Ad Hoc Network is the important technique for the future and to became for the fourth generation (4G), and the main goals for that to provide propagation the computer environments, that support the users to achieved the tasks to get the information and communicate at anytime, anyplace and from any nodes or devices. And now will present some of these practical applications has been arranged in Table 6.

These are many applications on ad hoc networks as we mentioned above and in Table 6 provide an overview of present and future MANET applications. However, the following is a summary of the major applications in MANETs such as tactical networks (military battlefield), home and enterprise network (personal area network) etc.


#### **1.2.12 MANET layers**

The network architecture can be described using a reference the model. More obviously, the layers of software and hardware are described by this model so that data could be sent among two points, besides, to make it capable for interpellating of multiple devices/applications in a network. In order to increase compatibility in the network between different components from different manufacturers, reference models are required for so (White, 2002). Seven layers are contained in the International Organization for Standardization (ISO/IEC, 2003) which proposed the Open Systems Interconnection (OSI) reference model. In the matter of fact, these layers are ordered from the lowest to the highest layer. The lowest layer represents layer one whereas the highest layer represents layer seven as shown in Figure 9. In other words, these layers are respectively ordered as: application layer, presentation layer, session layer, transport layer, network layer, data link layer and physical layer (from the highest to the

Fig. 9. Illustrates of the original International Organizations for Standardization (ISO) and Open Systems Interconnection (OSI) reference model.

lowest). The transmission of bits is handled by the physical layer through a communications channel. In addition, other physical specifications are taken into account.Such specifications comprise; modulation techniques, connectors and media choice. The access of multiple nodes is coordinated by the functions of data link layer along to a shared medium, control and address information, error detection code, flow control, Medium Access Control (MAC) addressing and so on. Network layer is responsible for creating, maintaining and ending network connection. It transfers a data packet from node to node within the network. In other words, it is responsible for congestion control, IP addressing, and internet working. The transport layer provides an end to end error-free network connection, and makes sure the data arrives at the destination exactly as it left the source. In order to establish sessions between users, the session layer is the layer that controls such a process. At the same time, a series of functions necessary for presenting the data package properly to the sender or receiver are performed by the presentation layer, for example, such as compression and encryption. The application layer is considered to be as the highest layer that provides the user the ability to efficiently access the network. Frequent reconnection and disconnection with peer applications are handled by this layer as a main role of it. Another role of it is to have services and data transmission among users supported, such as, electronic mail and remote file transfer.

#### **1.2.13 Summary**

20 Will-be-set-by-IN-TECH

• Military battlefield, Military equipment currently is equipped with the state of the art computer equipment. Ad hoc networking help the military with the commonplace network technology to maintain information network between military personnel's, vehicles, and military information head quarters. The basic techniques of ad hoc network

• Commercial sector, ad hoc network can be applied in emergency or rescue operations for disaster relief efforts for example in fire, flood, or earthquake and so on. Emergency rescue operations will go to places where communications are impermissible. Therefore proper infrastructure and rapid deployment of a communication network is badly needed. Information is relayed from one rescue team member to another over a small handheld device. Other commercial application includes for instance ship to ship ad hoc mobile

• Local level, ad hoc networks can autonomously link immediate and temporary multimedia network by using notebook or palmtop computers to distribute and allocate information among conference or classroom participants. Besides, it can also be applied for home networks where devices can be link; other examples include taxicab, sports stadium, boat

• Personal Area Network (PAN), short-range MANET can simplify the intercommunication between a lot of mobile devices such as a PDA, a laptop, and a cellular phone and there are a lot of new devices in this for MANETs. Wired cables can easily be replaced with wireless connections. Ad hoc network enhances the access to the Internet or other networks by means of Wireless LAN (WLAN), GPRS, and UMTS. The PAN is an upcoming application

• Wireless Mesh Networks (very reliable networks that are closely related to MANETs, the

• Hybrid Wireless Networks (the goal is to cost savings, enhanced resilience to failures and

• Wireless Sensor Networks (a very active research area of ad hoc networking which includes

The network architecture can be described using a reference the model. More obviously, the layers of software and hardware are described by this model so that data could be sent among two points, besides, to make it capable for interpellating of multiple devices/applications in a network. In order to increase compatibility in the network between different components from different manufacturers, reference models are required for so (White, 2002). Seven layers are contained in the International Organization for Standardization (ISO/IEC, 2003) which proposed the Open Systems Interconnection (OSI) reference model. In the matter of fact, these layers are ordered from the lowest to the highest layer. The lowest layer represents layer one whereas the highest layer represents layer seven as shown in Figure 9. In other words, these layers are respectively ordered as: application layer, presentation layer, session layer, transport layer, network layer, data link layer and physical layer (from the highest to the

field of MANET for the future computing technology.

nodes of a mesh network generally are not mobile).

fixed networks or mobile sensors (Sarkar et al., 2008).

• Conferencing (i.e. using mobile nodes). • Home Network (almost used for PANs).

performance improvements).

**1.2.12 MANET layers**

• Personal communications (i.e. cell phones, laptops and ear phone).

• Cooperative environments (i.e. meeting rooms, sports stadiums, boats etc.).

originated from this field.

communication and so on.

and small aircraft.

In this chapter, described the necessary an overview for the current literature of Mobile Ad Hoc Network (MANET), covering the main concepts of MANET and the existing wireless mobile network approaches, wireless ad hoc networks, wireless mobile approaches, characteristic, applications, challenges, MANET layers and MANET issues. In particular, mobile ad hoc networks have been classified into two types, MANET and mobile ad hoc sensor network. The traffic types in ad hoc networks which include the Infrastructure wireless LAN and ad hoc wireless LAN are presented in Section 1.2.5. In Section 1.2.6 highlight the relevant details about the ad hoc network routing protocol performance issues. The types of ad hoc protocols such as (Table-driven, On-demand and Hybrid) and Compare between Proactive versus Reactive and Clustering versus Hierarchical are in Section 1.2.7. And Section 1.2.8 respectively. The existing ad hoc protocols are presented in Section 1.2.9. The four important issues significant in MANET are Mobility, QoS Provisioning, Multicasting and Security is presented in Section 1.2.10. Furthermore, in Section 1.2.11 and Section 1.2.12 shows the practical application and the layers of the MANET.

#### **2. Appendix A**

(i) ZRP a routing zone with radius = 2 (hops) (j) ZRP interzone operation

Fig. 10. illustrates the exiting Mobile ad Hoc network Protocols

#### **3. References**

22 Will-be-set-by-IN-TECH

(b) AODV reverse path

(d) DSR route request (e) DSR route reply (f) TORA route maintenance

(c) AODV forward path

formation

(h) CEDAR core broadcast

(j) ZRP interzone operation

formation

**2. Appendix A**

node 8

move.

(a) CGSR routing from node 1 to

(g) ABR route maintenance Route maintenance for a source move. (B) Router maintenance for a destination

> (i) ZRP a routing zone with radius = 2 (hops)

Fig. 10. illustrates the exiting Mobile ad Hoc network Protocols


networks. in Proceedings of 5th World Multiconference on Systemics, Cybernetics and Informatics, Orlando, USA, pp. 33-40.


24 Will-be-set-by-IN-TECH

[20] Hekmat, R. (2006) Ad-hoc Networks: Fundamental Properties and NetworkTopologies,

[21] IEEE (2004) Std 802.16-2004 TM, IEEE Standard for Local and Metropolitan Area Networks - Part 16: Air Interface for Fixed Broadband Wireless Access Systems. [22] IEEE (2005a) Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access

[23] IEEE (2005b) Std 802.16e-2005TM, IEEE Standard for Local and Metropolitan Area Networks, Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access

[24] IEEE (2011) 802 Working group. [Online] http://www.ieee802.org/IEEE 802

[25] IETF-MANET IETF MANET Working Group. http:// www.ietf.org/ html.charters/

[26] IETF-MANET IETF Working Group: Mobile Adhoc Networks (manet). http://www.

[27] IETF (1999) RFC 2501 - Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. http://www.faqs.org /rfcs

[28] Ilyas, M. (2003) The Handbook of Ad Hoc Wireless Networks (Electrical Engineering

[29] ISO/IEC (2003) Draft ITU-T Recommendation and Final Draft International Standardof Joint Video Specification (ITU-T Rec. H.264 | ISO/IEC 14496-10 AVC). Joint Video Team

[30] Iwata, A., Chiang, C.-C., PEI, G., Gerla, M. and Chen, T.-W. (2002) Scalable Routing Strategies for Ad Hoc Wireless Networks. IEEE Journal on Selected Areas in Communications, Special Issue on Ad-Hoc Networks, Vol. 17, Issue. 8, pp.1369 - 1379. [31] Broch. J, Johnson. D and D. Maltz, T. (2004) he Dynamic Source Protocol for Mobile Ad hoc Networks. http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr- 10.txt, IETF

[32] Jiang, M., Li, J. and Tay, Y. C. (1999) Cluster Based Routing Protocol. August 1999 IETF Draft. http://www.ietf.org/internet-drafts/draft-ietf-manetcbrp-spec-01.txt. [33] Johnson, J. B. D. B. and Maltz, D. A. (1999.) The dynamic source routing protocol for mobile ad hoc networks. IETF MANET Working Group, Internet-Draft, October 1999. [34] Jubin, J. and Tornow, J. D. (1987) The DARPA Packet Radio Network Protocols.

[35] Saleh Ali AL-OMARI, and Putra Sumari. (2010) AN OVERVIEW OF MOBILE AD HOC NETWORKS FOR THE EXISTING PROTOCOLS AND APPLICATIONS International journal on applications of graph theory in wireless ad hoc networks and sensor

[36] LEHR, W. and MCKNIGHT, L. W. (2003) Wireless Internet Access: 3G vs. WiFi?

[37] Leiner, B., Ruth, R. and Sastry. A. R (1996)" Goals and challenges of the DARPA GloMo program. IEEE Personal Communications, December 1996., Vol. 3, No. 6, pp. 34-43. [38] Li, X. (2006) Multipath Routing and QoS Provisioning in Mobile Ad hoc Networks. Department of Electronic Engineering. Queen Mary, University of London, PhD thesis. [39] Liu, C.-H. and Chang, S.-S. (2009) The study of effectiveness for ad-hoc wireless network. Proceedings of the 2nd International Conference on Interaction Sciences:

Information Technology, Culture and Human, Vol. 403, No.6, pp.412-417.

proceedings of the IEEE, January, 1987, vol. 75, no. 1, pp.21-32.

Telecommunication Policy, Vol. 27,No.5, pp. 351-370.

Informatics, Orlando, USA, pp. 33-40.

Systems. IEEE 806.16e, IEEE P802.16e/D12.

ietf.org/html. charters /manetcharter.html.

Handbook) [Hardcover], CRC Press 2003.

of ITU-T and ISO/IEC JTC 1, JVT G050r1.

Internet draft , 19 July 2004.

networks, Vol. 2, No.1, pp. 87-110.

LAN/MAN Standards Committee.

A book published by Springer.

Systems, Feb 2006.

manetcharter.html.

/rfc-sidx26.html.

networks. in Proceedings of 5th World Multiconference on Systemics, Cybernetics and


26 Will-be-set-by-IN-TECH

596 Wireless Communications and Networks – Recent Advances

[60] Sinha .P , R.Sivakumar, V. Bharghavan,"CEDAR: a Core-Extraction Distributed Ad hoc

[61] Satyanarayanan, M. (2001) IEEE Pervasive Computing:Vision and Challenges. Personal

[62] White, C. (2002) Data Communications and Computer Networks, Published by

[63] Wu, S.-L., Yu-chee and TSENG (2007) Wireless Ad Hoc Networking. Auerbach

Routing algorithm". IEEE INFOCOM'99, Vol 4, No.2, pp. 120-127.

Communication, Vol. 8, No. 2, pp. 10 -17.

Publications -Taylor and Francis Group.

Thomson, Third Edition, 2002.
