A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sinha, Gitanjali
- Performance Evaluation and Analysis of Table Driven and On–Demand Routing Protocols for MANETS based on Traffic Models
Authors
1 School of Studies in Computer Science and IT, Pt. Ravishankar Shukla University, Raipur, Chhattisgarh, IN
Source
Research Journal of Engineering and Technology, Vol 3, No 3 (2012), Pagination: 232-236Abstract
Wireless network that can be formed without the need for any pre-existing infrastructure in which each node can act as a router. One of the main challenges of MANET is the design of robust routing algorithms that adapt to the frequent and randomly changing network topology. A variety of routing protocols have been proposed and several of them have been extensively simulated or implemented as well. In this paper we evaluated the performances includes the characterization study of traffic mode on CBR and TCP in MANET environment with respect to AOMDV, DSR, OLSR routing protocols. In this study investigate that routing protocols corresponding to packet delivery ratio, normalized routing load, average end-to-end delay and throughput.Keywords
Ad-Hoc Networks, Routing Protocols, Simulation, Performance Evaluation.- A Novel Review IDS on MANETs
Authors
1 SOS in Computer Science, Pt. Ravishankar University, Raipur, Chhattisgarh, IN
Source
International Journal of Technology, Vol 1, No 1 (2011), Pagination: 20-22Abstract
A mobile ad hoc network (MANET) is an independent system of mobile stations connected by wireless connection to form a network. Intrusion detection has, over the last few years, assumed principal importance within the broad area of network security. Wireless ad hoc networks have been in focus within the wireless research community. Essentially, these are networks that do not have an essential fixed infrastructure. Mobile hosts "join" on the fly and create a network on their own. With the network topology changing dynamically and the lack of a centralized network management functionality, these networks tend to be vulnerable to a number of attacks.
This paper presents a brief survey of current research in Intrusion detection for wireless ad-hoc networks. To support these ideas, a discussion regarding attacks, and intrusion detection architectures that deployed for wireless ad-hoc network infrastructures.