Preview

Nt1330 Unit 7 Exercise 1

Good Essays
Open Document
Open Document
489 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 7 Exercise 1
The proposed method is illustrated as a flow chart in Fig 3. First, the source node broadcast the RREQ to neighbor nodes. The neighbor nodes forward the Route Request (RREQ) to the destination node. Destination node stores the neighbor RREQ in a table and checks the RREQ. If RREQ is from the true Source node address, then the system is regular and begins to transmit test data packets otherwise repeat the process. Next, it will check the packet delivery ratio if packet delivery ratio drops to threshold then Send Bait RREQ. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source node selects one-hop neighbor node nr as the destination node and sends the RREQ to that node. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also reply with RREP. It indicates that there is an Attacker in Reply routing. If the only nr sent RREP then …show more content…
The neighbor nodes forward the Route Request (RREQ) to the destination node. If Rushing attacks send duplicate Route Request (RREQ) to the neighbor node. If Request RREQ is from the true source address, then the system is regular and begins to transmit data packets otherwise repeat the process. This process is illustrated in Fig 1.

Check threshold value: Next check the packet delivery ratio, if packet delivery ratio drops to threshold then move to next step. The threshold value is calculated using dynamic threshold algorithm indicated in [3]. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source nodes select one-hop neighbor node nr as the destination and send the RREQ to that node as shown in Fig 2. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also Reply RREP. It indicates that there is Attacker in Reply

You May Also Find These Documents Helpful

  • Good Essays

    Network activity test: The failover node monitors the health of the firewalls by testing network activity. If all packets are not received with in 5 seconds of interval it detects failure (cisco 2008).…

    • 480 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ones we have known about nodes in the network and links between them, then to analyze this network some SNA Measures are used. These measures are mathematical aggregation functions which calculates various aspects related to each node and also some of them can calculate some of the aspects with respect to the whole network .…

    • 596 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Exercise 1.1

    • 1895 Words
    • 8 Pages

    Newly arriving calls influence the load on nodes, which will influence the ants by means of the delay mechanism. Ants influence the routes represented by the pheromone tables, which in their turn determine the routing of new calls. These relationships are illustrated in Figure 5. One needs to realize that the pheromone table by which an individual ant is influenced, is a different table than the pheromone table that will be updated by this ant. The load on the network at any given time influences which calls can subsequently be placed on the network and which calls will fail; which of course determines the load at a later…

    • 1895 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 410 Words
    • 2 Pages

    AODV has pooled properties of both DSR and DSDV. It uses route discovery process for sustaining route information through the basis of routing table. It is a reactive protocol as it doesn’t need to establish or maintain routes to nodes that are not involved in the communication. AODV handles route discovery process with Route Request (RREQ) messages to broadcast to neighbour nodes. The message floods through the network till the desired destination is reached. Sequence number guarantees the loop freedom. The destination node at once receiving a RREQ unicasts a Route Reply (RREP) back to the source node. Node transmitting a RREP message creates routing table entries for forward route. For route maintenance, nodes send HELLO messages intermittently to neighbour nodes. If any node in the network miss the mark to receive three consecutive HELLO messages from its neighbour, it presumes that link to that particular node is down. A node that perceive a broken link directs a Route Error (RERR) message to any upstream node. At once a node receives a RERR message it will signpost a new source discovery process. The AODV protocol uses sequence numbers to determine the timeliness of each packet and to…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. BY 12/4 THE DEALER HAD NOT MADE CONTACT, INSTEAD GOT A CALL FROM MS. MELTON.…

    • 596 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 3 Assignment 1

    • 6320 Words
    • 26 Pages

    “A ring network is a network topology in which each node connects exactly to two other nodes, forming a single continual pathway for each node - a ring” (Conjecture Corporation, 2003). In a ring network data travels from each node to the other node/s with each node handling every packet. A ring network provides only a pathway between any two nodes at one time. Ring networks may be disrupted by the failure of a link. A node failure or cable break will isolate every node attached…

    • 6320 Words
    • 26 Pages
    Powerful Essays
  • Satisfactory Essays

    Netw310 Week6

    • 372 Words
    • 2 Pages

    5. Examine the statistics for the client node. Have the packet drops affected anything on the client that you can tell?…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    We present the ALTP(Avoid loops with test packet) scheme to avoid that loops and packet drops in the whole network of SDN. We used the Test packets to check the status of the links between the two domains by using STP. It will select the optimal link among two domains before sending the data from Source to destination. We will discuss below that at which condition the test packet working is useful.…

    • 694 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    show that the proposed framework is fast (two rounds of communication among nodes, regardless of network size) and outperforms an existing method.…

    • 8009 Words
    • 33 Pages
    Good Essays
  • Good Essays

    The key to this question is that ARP is a layer 2 protocol. Since it is a layer 2 protocol, it can route to anything within the same network. In this case, only the hosts are in the same network, so we can only ARP poison the hosts. Node4 is subnetted,…

    • 2570 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Routing and Hint Read

    • 761 Words
    • 4 Pages

    Copy and Paste the following screenshots from your A Simple Network Using RIP Protocol lab below.…

    • 761 Words
    • 4 Pages
    Good Essays
  • Better Essays

    We have produced a demo video showing how to get the most out of this protocol in the lab, available at https://www.youtube.com/watch?v=eIEJ0FfB-VI…

    • 2046 Words
    • 9 Pages
    Better Essays
  • Better Essays

    The two RIP router types in which participants are divided are activate gateways and passive host. Active participants broadcast their routes to others every 30 seconds whereas passive participants listen and update their routine tables relying on other routers advertisements as they do not advertise. In terms of RIP operations, initially routers are configured with directly connected network addresses, whereby the packets are being routed by the classful routing protocol and are interpreted according to the subnet masks locally configured on the routers interfaces. Therefore all subnet masks within a major, class-level network must be consistent. RIP broadcast request retrieves RIP information on each RIP-enabled interface whereas the RIP table received is compared to its own table causing the routers to add new entries…

    • 1294 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Misra, S., Misra, S. C., & Woungang, I. (2010). Selected topics in communication networks and distributed systems. Singapore: World Scientific.…

    • 682 Words
    • 3 Pages
    Good Essays