StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Impact of Mobility on Enactment of Routing Protocols Associated with Ad Hoc Networks - Term Paper Example

Cite this document
Summary
This term paper "Impact of Mobility on Enactment of Routing Protocols Associated with Ad Hoc Networks" discusses the details associated with attacks incorporated with AODV. Other types of threats that may affect the domestic wireless network operating on an 802.11 will also be defined and discussed…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
Impact of Mobility on Enactment of Routing Protocols Associated with Ad Hoc Networks
Read Text Preview

Extract of sample "Impact of Mobility on Enactment of Routing Protocols Associated with Ad Hoc Networks"

Download file to see previous pages

 An automated system known as a mobile ad-hoc network (MANET) is integrated within the wireless networks to establish communication between wireless nodes or access points. However, MANET does not have a centralized administration. MANET is defined as “Mobile Ad Hoc Network (MANET) refers to a type of mobile network in which each node has the ability to act as a router, permitting adaptable multi-hop communications” [3]. The ad-hoc on-demand distant vector protocol (AODV) that is operated by MANET provides loopholes for hackers to gain access to the network or the system via a wireless network.

AODV is widely used due to its significant advantages such as lower network overhead with a complex algorithm. However, AODV does not maintain the database for routing information in the router. This is the area where there is a possibility of hackers breaking in the network. IntroductionMANET is constructed on multiple routers knows as multi-hop communication paths, these multi-hop communication paths can be dislocated any time and in any direction. The routing protocols that are associated with MANET are categorized into hybrid, table-driven, and demand-driven routing protocols [1].

Table-driven protocols attempt to synchronize routing information with the routing table for each wireless router. For example, Destination Sequenced Distance Vector (DSDV) and Wireless Routing Protocol (WRP) protocols fall under the category of table-driven protocols. Demand-driven protocols are associated with AODV and dynamic source routing protocol (DSR). Hybrid routing protocols interlinks with the other two protocols i.e. table-driven and demand-driven routing protocols. The wireless MANET network is associated with protocols that are not well designed in terms of network security, as there is no centralized administration to monitor or configure MANET.

However, most of the wireless network protocols associated with MANET is designed for optimum bandwidth utilization but not for optimal security. These factors have made the wireless network vulnerable to hackers and cybercriminals. One of the examples of mesh networks is illustrated in Fig. 1. Figure 1 Source: (Siraj and Bakar 1263-1271) One of the latest examples for mesh networks is the youtube architecture, as shown in Fig 1.2. Figure 2 Source: (Staehle et al. 144-148) In this competitive and evolutionary world of technological advancements, threats and vulnerabilities are a great concern.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Mesh Networks Coursework Example | Topics and Well Written Essays - 10000 words”, n.d.)
Mesh Networks Coursework Example | Topics and Well Written Essays - 10000 words. Retrieved from https://studentshare.org/information-technology/1401086-mesh-networks
(Mesh Networks Coursework Example | Topics and Well Written Essays - 10000 Words)
Mesh Networks Coursework Example | Topics and Well Written Essays - 10000 Words. https://studentshare.org/information-technology/1401086-mesh-networks.
“Mesh Networks Coursework Example | Topics and Well Written Essays - 10000 Words”, n.d. https://studentshare.org/information-technology/1401086-mesh-networks.
  • Cited: 0 times

CHECK THESE SAMPLES OF Impact of Mobility on Enactment of Routing Protocols Associated with Ad Hoc Networks

Network Organization, Addressing, and Routing Protocols

OSPF also has a functionality of link state technology that exchange router information associated with routing information.... Name of the Author Name of the Professor Course 10 February 2012 Network Organization, Addressing, and routing protocols The best routing protocol for this scenario is Open shortest Path First OSPF routing protocol.... Moreover, OSPF is considered as an adaptive routing technique that synchronizes with business networks via Internet Protocol and provides link state routing....
3 Pages (750 words) Research Paper

The BlackBerry Network Architecture

Bluetooth connectivity synchronizes the device with other external devices and can be used to create an ad hoc network for file and resource sharing.... Blackberry devices connect wirelessly to networks using various transport architectures, and all devices have a specific transport mode that it associates with.... Wi-Fi transport architecture provides internet connection to mobile devices, of a link to private networks.... The BlackBerry Network Architecture Network architecture is the layout that includes the hardware, software components, the means of data transfer, and the communication protocols governing data transfer....
6 Pages (1500 words) Case Study

Sensor Network Secure Routing Protocols

Recently, there have been many developments as concerns mounting secure routing protocols for ad hoc networks incorporating a significant number of on-demand secure routing protocols to shield a number of probable attacks.... This study proposes a number of ad hoc network protocols that will operate during an on-demand basis or situations because on-demand protocols are known to have faster reactions and lower overhead compared to other routing protocols considering proactive mechanisms....
18 Pages (4500 words) Coursework

Mobility Management

A mobility management method for a wireless data network having a plurality of routing areas, each routing area having a plurality of cells, the wireless data network performing mobility management by finite state machines in a mobile device and a network apparatus, the finite state machine having a standby state, a ready state and an idle state, each of the mobile device and the network apparatus having a ready counter, the method determining a... The aim of mobility management is to track where the subscribers are, so that calls, SMS and other mobile phone services can be delivered to them....
4 Pages (1000 words) Essay

Simulation Of Routing Protocols

According to the latest research, Multihop, wireless, ad hoc networking has been the focal point of numerous current research and expansion labors for its applications in military, commercial, and instructive environments such as wireless LAN links in the office, networks of appliances at home, and special sensor networks. … A amount of routing protocols have been projected to make available multi-hop communication in wireless, ad hoc networks.... ims: The major aim of this project is to evaluate the performance of the StarLogo environment by simulating a variety of routing protocols in an Ad hoc network....
5 Pages (1250 words) Essay

Temporally-Ordered Routing Algorithm

The paper "Temporally-Ordered Routing Algorithm" tells us about the algorithm for routing data across Wireless Mesh networks.... ) name the TORA protocol as one of a family of protocols which they term "link reversal" algorithms.... The protocol builds a loop-free, multipath routing structure that is used as the basis for forwarding traffic to a given destination.... The protocol can simultaneously support both source-initiated, on-demand routing for some destinations and destination-initiated, proactive routing for other destinations....
10 Pages (2500 words) Essay

Critical Analysis on Route Reservation in Ad Hoc Networks

This paper "Critical Analysis on Route Reservation in ad hoc networks" presents the scalable resource reser¬vation scheme (SRRS) and the constraint-based deflection routing with backtracking and bifurcation (CD/BB) for QoS management over the next-generation Internet.... A problem with such protocols in future broadband networks is that the round-trip or one-way propagation delay required for establishing a connection is non-negligible compared to the time required to transmit the data, which leads to low link utilization since the required capacity is reserved long be-fore it is actually used, considerably affecting the maximum achievable throughput (Fig....
11 Pages (2750 words) Research Paper

The BlackBerry Network Architecture

Bluetooth connectivity synchronizes the device with other external devices and can be used to create an ad hoc network for file and resource sharing.... lackberry devices connect wirelessly to networks using various transport architectures, and all devices have a specific transport mode that it associates with.... Wi-Fi transport architecture provides internet connection to mobile devices, of a link to private networks.... etwork architecture is the layout that includes the hardware, software components, the means of data transfer, and the communication protocols governing data transfer....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us