Do you want to publish a course? Click here

Mobile Ad-Hoc Networks are used for data transfer. The nodes of such networks do not require presetting. They are characterized by dynamic data transfer during their movement of the nodes. MANET could be targeted by potential security breaches. Bl ack hole attack is one of the serious attacks targeting wireless AD_HOC networks through a false point whichcan absorb data and send them to another place or neglect them. This is due to the lack of central control node which is able to manage communications. This research investigates the effects of the black hole on the performance of hybrid routing protocol Temporally Ordered Routing Algorithm (TORA) and proactive routing protocol Optimized Link State Routing (OLSR) for a variable number of mobile nodes in different speeds in a high load environment.
Ad-hoc networks has opened a new dimension in wireless networks. It allows wireless communication in the absence of central support of the contract. In these networks, there are no fixed infrastructure because the mobile nodes are continuously mak ing continuous and dynamic change in the topology. Routing protocols of mobile ad-hoc networks differ from the existing internet protocols which are designed for the fixed structure based wireless networks. MANET protocols have to face high challenges due to dynamically changing of topologies, low transmission power and asymmetric links. Due to link instability, node mobility and frequently changing topologies routing becomes one of the core issues in MANETs. Currently existent routing protocols provide routing solutions up to a certain level and most of them are designed and implemented in small areas. Many researchers are still working on the developments of MANET routing protocols. With the increase in the types of routing protocols used in mobile network it has become necessary to study the effectiveness of each type of protocols In this papper we compared between the most famous species (proactive, Reactive, hybrid) and choose a protocol to be representative of all species previously mentioned and the network performance assessment each type in terms of Throughput, dynamic routing routing, load, delay and determine which of these protocols appropriate for each case.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا