Preview

Routing in Manets

Best Essays
Open Document
Open Document
2804 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Routing in Manets
Routing in MANETs: Proactive vs Reactive
Chigbogu Samuel Nwanjah K1161430
Network Security Coursework Network and Information Security January/February 2012 K1161430@kingston.ac.uk, zacchybros@gmail.com Abstract – This report aims at presenting an evaluation of Proactive and Reactive routing protocols using some performance statistics as it applies to Mobile Ad hoc NETworks (MANETs). This report also presents an evaluation of these protocols based on the result of the simulations carried out as part of this work. The simulations were done using ViSim (a visual MANET simulator). But first, the concept of MANET is described which includes its modus operandi. The theories behind the routing protocols are also briefly presented. The report is concluded with recommendations based on the analysis of the simulation results. Reactive routing protocols with focus on the particular routing protocols that will be used for the simulation; Section 4 presents the simulation software and a description of the scenario that was simulated; Section 5 presents the analysis of the simulation results; and the conclusion is presented in Section 6.

2. WHAT ARE MANETS?
MANETs are made up of independent nodes that can relate directly with each other through a collaborative communication scheme. MANETs are developed to be deployed in situations or places where there are no communication infrastructures. MANETs can also be deployed at locations with communication infrastructures that have been saturated due to emergency situations. MANETs deployed in such scenarios are termed as emergency MANETs – eMANETs [1]. For a typical MANET communication cycle, the node that needs to send a message must be linked to the recipient either directly or through intermediate nodes. These intermediate nodes act as mobile routers (in a multi-hop pattern) in scenarios where the sending node cannot directly connect to the recipient node. It does not necessarily mean that the role a particular node plays in

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 7

    • 410 Words
    • 2 Pages

    AODV has pooled properties of both DSR and DSDV. It uses route discovery process for sustaining route information through the basis of routing table. It is a reactive protocol as it doesn’t need to establish or maintain routes to nodes that are not involved in the communication. AODV handles route discovery process with Route Request (RREQ) messages to broadcast to neighbour nodes. The message floods through the network till the desired destination is reached. Sequence number guarantees the loop freedom. The destination node at once receiving a RREQ unicasts a Route Reply (RREP) back to the source node. Node transmitting a RREP message creates routing table entries for forward route. For route maintenance, nodes send HELLO messages intermittently to neighbour nodes. If any node in the network miss the mark to receive three consecutive HELLO messages from its neighbour, it presumes that link to that particular node is down. A node that perceive a broken link directs a Route Error (RERR) message to any upstream node. At once a node receives a RERR message it will signpost a new source discovery process. The AODV protocol uses sequence numbers to determine the timeliness of each packet and to…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    Vehicular Ad hoc Network (VANET), a subclass deriving from Mobile Ad Hoc networks (MANET), is a promising approach for future intelligent transportation system…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Better Essays

    EIGRP stands for Enhances Interior Gateway Routing Protocol; EIGRP is an enhanced distance vector protocol, relying on the Diffused Update Algorithm (DUAL) to calculate the shortest path to a destination within a network. (CISCO, 2005) OSPF (Open Shortest Path First) is a classless, link-state routing protocol. The current version of OSPF for IPv4 is OSPFv2 introduced in RFC 1247 and updated in RFC 2328 by John Moy. In 1999, OSPFv3 for IPv6 was published in RFC 2740. (The Open University, 2014)…

    • 1307 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Jain, Samir. "Routing and Remote Access Blog." Blogs. June 26, 2006. Accessed September 10, 2014.http://blogs.technet.com/b/rrasblog/archive/2006/06/26/438823.aspx.…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    3. Identify the problems you expect to encounter (with different metrics, security, etc.) when you redistribute.…

    • 693 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Routing

    • 843 Words
    • 4 Pages

    Each answer is worth 1 point each, 50 questions = 50 total points. Type answers in the appropriate cell; text will automatically wrap. Post your completed assignment to the dropbox.…

    • 843 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Topic 12: Routing Protocols Topic 13: IP Addressing & Routing Topic 14: Information System Security Topic 15: Project Management Process Topic 1: The Input /Output Process Level 3: Troubleshooting questions…

    • 4261 Words
    • 28 Pages
    Good Essays
  • Powerful Essays

    1.What’s a routing table? Keeps track of the routes to use for forwarding datat to its destination…

    • 1575 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    In this document, I will be showing how simple and useful the WAN is. The WAN is used like the LAN that most are used to using now, but are unable to connect to another location thru the Internet. Security is a big concern to most companies so I will be examining this network design in detail with the (WTLS) Wireless Transport Layer Security. This safeguard protects against an attack by monitoring computers settings in and around the network. With Acme the company is based in various locations geographically and expanding I will be showing how this WANS operates.…

    • 1101 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    This case study is a practical application of all of the knowledge you have acquired from your courses in the networking curriculum over the past two years. It will allow you to demonstrate both your knowledge and experience in networking both academically and hands-on. It will also allow you to draw on what you have learned as you worked your way through the online Microsoft IT Academy Security course. It is intended to be used as first a mid-term examination and then will also be continued as your end of class project and final exam. It presents a thorough review of concepts and applications presented in courses you have taken while at JSRCC. To complete this case study, read the scenario below and perform the tasks that follow. You will perform many of these tasks in teams of two but your final reports will be written individually. In addition to your analysis you are required to submit a formal written proposal that makes specific recommendations. You will be provided additional instructions regarding the format of your project report and other requirements.…

    • 5277 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    631 research paper

    • 1926 Words
    • 7 Pages

    References: 3. Comparison of VPN Protocols . (n.d.). Comparison of VPN Protocols . Retrieved April 22, 2014, from http://teal.gmu.edu/courses/ECE543/project/reports_2001/arveal.pdf…

    • 1926 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Final Paper Introduction

    • 578 Words
    • 2 Pages

    First invented in the 1950s by the United State Military during the Cold War, the dynamics of the Internet have gone through a complete transformation. The World Wide Web combined with modern day technology including smart phones, tablet, and laptops, every corner in the globe is open for instant communication. Moreover, combine the ease of use with the…

    • 578 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Existing work presented Cooperative Opportunistic Routing in MANET (CORMAN) where the nodes use lightweight proactive source routing to determine intermediate node lists for data route (to destination). Data broadcast from upstream node reach downstream nodes are en-routed to its destination by cooperative communication at link and network layers. Nodes running CORMAN, forward data packets in fragments. This increased hop length between source and destination cause nodes at different segment of the route to operate simultaneously. This needs a pipeline of data transportation.…

    • 3080 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The first is V2V (vehicle to vehicle) type in which a vehicle user communicates with another directly which is the purest form of infrastructure-less characteristic of ad hoc networks. The other is V2R (vehicle to RSU) type where a vehicle communicates with RSU which is a fixed infrastructure. These vehicles communicate using the Dedicated Short Range Communication (DSRC) protocol [3]. The RSU, OBU and TA communicate using this protocol which is based on the IEEE 802.11p radio technology. The vehicles can access the wireless channel either using a directional antenna or a unidirectional antenna. Because of this wireless access VANETs are vulnerable to many attacks due to collision, eavesdropping, interference, jamming and other problems. To avoid these attacks only we introduce a concept of security in VANET. The intention of providing security is to maintain confidentiality among users by grouping them together and to efficiently provide authentication services. In many literature systems all the authentication services, key storage and updating services are performed by the authority. This imposes a huge overhead on the authority. Also this situation results in a scenario where it becomes easier to an attacker to attack only the authority end and collapse the whole system. It is inefficient if the authority is attacked that results to handing over the control to an attacker. This issue must be…

    • 1582 Words
    • 7 Pages
    Good Essays