Mobile Ad-Hoc Networks are used for data transfer. The nodes of such
networks do not require presetting. They are characterized by dynamic
data transfer during their movement of the nodes. MANET could be
targeted by potential security breaches. Bl
ack hole attack is one of the
serious attacks targeting wireless AD_HOC networks through a false
point whichcan absorb data and send them to another place or neglect
them. This is due to the lack of central control node which is able to
manage communications. This research investigates the effects of the
black hole on the performance of hybrid routing protocol Temporally
Ordered Routing Algorithm (TORA) and proactive routing protocol
Optimized Link State Routing (OLSR) for a variable number of mobile
nodes in different speeds in a high load environment.
Ad-hoc networks has opened a new dimension in wireless networks. It allows
wireless communication in the absence of central support of the contract. In these
networks, there are no fixed infrastructure because the mobile nodes are continuously
mak
ing continuous and dynamic change in the topology.
Routing protocols of mobile ad-hoc networks differ from the existing internet
protocols which are designed for the fixed structure based wireless networks. MANET
protocols have to face high challenges due to dynamically changing of topologies, low
transmission power and asymmetric links. Due to link instability, node mobility and
frequently changing topologies routing becomes one of the core issues in MANETs.
Currently existent routing protocols provide routing solutions up to a certain level
and most of them are designed and implemented in small areas. Many researchers are still
working on the developments of MANET routing protocols.
With the increase in the types of routing protocols used in mobile network it has
become necessary to study the effectiveness of each type of protocols In this papper we
compared between the most famous species (proactive, Reactive, hybrid) and choose a
protocol to be representative of all species previously mentioned and the network
performance assessment each type in terms of Throughput, dynamic routing routing, load,
delay and determine which of these protocols appropriate for each case.