School Of Engineering And Technology
Permanent URI for this communityhttps://kr.cup.edu.in/handle/32116/78
Browse
4 results
Search Results
Item A Comprehensive Review on Performance of AODV Protocol for Wormhole Attack(IJRET, 2014) Kaur, Gurmeet; Kaur, AmanpreetWireless Networking is becoming very popular and interesting technology especially in these days as everyone wants wireless connectivity at anywhere anytime. It contains numerous wireless network technologies such as WiFi, WiMax, HSDPA and WiBro etc. Based on structural arrangement, wireless networks are categorized into two main categories: fixed infrastructure wireless networks and infrastructure less wireless networks. Mobile Ad-Hoc Networks (MANETs) come under the category of infrastructure less wireless networks, which is an autonomous system of mobile hosts connected by wireless links. Nodes are free to move and can join or leave the network at any time whenever required. Wireless ad hoc networks eradicate various problems which may come out while setting up the infrastructure. Communication among nodes in these networks is accomplished via different routing protocols. But these protocols have different security flaws and using these flaws, an attacker can launch many kinds of attacks. Wormhole attack is one of the serious attack in the context of mobile ad-hoc network, which can disrupt any routing channel completely. In this work, an attempt has been made to compare the performance of on-demand reactive routing protocol: Ad hoc On Demand Distance Vector (AODV) with two approaches: normal and attack. The performance metrics evaluated for the two examined approaches are Throughput, Packet Delivery Ratio, Delay and Jitter.Item Improved 2ACK scheme for reducing routing overhead in manet's(Central University of Punjab, 2014) Dhiman, Deepika; Sood,NehaAn autonomous collection of mobile nodes communicating with each other via wireless links either directly or indirectly or relying on other nodes forms the mobile adhoc network (MANET). The routing protocols in MANET are designed based on the assumption that all the participating nodes co-operate. Due to certain issues like open structure and limited energy supply, the nodes sometimes misbehave and act in a selfish manner. 2ACK scheme serves as an add-on technique on few routing protocols (e.g. DSR) to detect such misbehaviour and to mitigate their adverse effect. The major limitation of this 2ACK scheme is additional routing overhead due to authenticated 2ACK packets. Thus, this dissertation work focuses on reducing the routing overhead and end-to-end delay by modifying the authentication mechanism in existing 2ACK scheme. Analytical and simulation results have been presented for evaluating the performance of the work done.Item Mobility model based performance analysis of DSDV mobile ad hoc routing protocol(Institute of Electrical and Electronics Engineers Inc., 2014) Kaur, AmandeepWireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access a wide pool of resources and information irrespective of the physical location of the devices used by them across the globe. Mobile ad hoc networks are a kind of infrastructure less wireless networks in which all the nodes act as peers and share information as well as resources. Mobile ad hoc networks are an open area of research since these have not been deployed widely yet. Every research in the field of networking focuses on the efficient, accurate, reliable, secure and immediate delivery of data. Therefore, the routing of data across the mobile ad hoc network is a major concern of researchers all over the world. Several routing protocols have been proposed and implemented to send data efficiently across mobile ad hoc networks. The performance evaluation of these protocols has been going on since a long time. In most of the studies, the focus has been on the variations in pause times and network size to measure the performance of various mobile ad hoc network routing protocols. A very few work has been done on the performance analysis of protocols by varying the underlying mobility models. Through this paper, investigations have been made into the behavior of DSDV mobile ad hoc routing protocol by varying the underlying mobility models. The metrics used to analyze the performance are Throughput, Average End to End delay, Routing overhead and Packet Delivery Ratio. ? 2014 IEEE.Item A review of De-facto MAC standard: IEEE 802.11 DCF(Institute of Electrical and Electronics Engineers Inc., 2014) Hans, S.; Nayyar, A.Advancement in the wireless networking technologies has drastically changed our world and has led us to new direction of 'Infrastructure-less networking- Mobile Adhoc Networks'. MANETs is a troupe of mobile nodes tied by wireless links in peer to peer fashion. Mobile nodes in MANETs often struggle for the wireless medium access. IEEE have defines certain rules for the medium access control (MAC). IEEE 802.11 DCF is a de-facto MAC standard. These rules have been laid down at MAC sub layer of link layer of TCP/IP reference model. One interesting research area in MANETs is MAC. This article provides a brief review of IEEE 802.11 DCF MAC standard. ? 2014 IEEE.