A Study of Severe Attacks on Mobile Ad-hoc Network 1

Size: px
Start display at page:

Download "A Study of Severe Attacks on Mobile Ad-hoc Network 1"

Transcription

1 A Study of Severe Attacks on Mobile Ad-hoc Network 1 A Study of Severe Attacks on Mobile Ad-hoc Network Alok Upadhyay 1, Ravi Sharma 2, Manish Mahajan 3 1, 2, 3 Research Scholar 1, 2 Asst. Professor 3 MITM, Indore 1, 3, CIIT, Indore 2

2 A Study of Severe Attacks on Mobile Ad-hoc Network 2 Abstract Due to wireless environment, mobile ad-hoc network (MANET) is affected by many security threats. A severe threat to disrupt functionality of routing protocol is commonly called as wormhole attack. These attacks can be performed by two or more attackers who spread wrong routing information in the whole network, gaining un- authorized access or choosing the illegal way of communication. The main aim of attackers is to pass all traffic through them so that attacker can drop, modify or duplicate the packets. In the routing process, attacking node retains frequently occurrence of associated links and continuously drop the packets is more than the normal wireless link.in this paper, we are introducing the various types of network vulnerabilities attacks according to network layers in MANET, which affects the whole network working functionality. Keywords: Ad- Hoc network, SANET, MANET, Vulnerabilities, Network Attacks.

3 A Study of Severe Attacks on Mobile Ad-hoc Network 3 I. INTRODUCTION Network is a collection of two or more communicating devices which are connected to each other and can share data directly or indirectly. There are following two types of the networks wired and wireless network.wired Network is the type of network in which computer devices connects with each other with the help of cable or a wire. In this network the cable is the medium of communication for transmitting and receiving the data from source to destination. In the wireless network all the computer devices are connected to each other without the use of any wire or cables. They use the radio/electromagnetic signals for wireless communication. Destination device must lie within communication range. Wireless network is gaining more popularity than wired network because it allows mobility, simplicity and very affordable and cost saving installation to wireless devices. On the basis of connectivity, wireless network can be classified into two types such as infrastructure based network and infrastructure less or Ad-hoc network [1]. Infrastructure based networks consist of a network with fixed wired medium. A mobile host communicates with a base station within its communication area. In this approach the base stations are fixed. In wireless network, mobile nodes can move within geographical zone while it s communicating to other nodes. If it goes out of range of one base station, it connects with new base station automatically and communication starts through new base station. This is called hand-off. Ad-hoc networks don t have a base station or centralized authority, whereas entire node works as a router that follows specific routing protocols. II. AD-HOC NETWORK A network is a type of wireless network which does not depend on any fixed infrastructure or any control module. Mostly it is established; where infrastructure network is not possible [2]. That s why, it is also called infrastructure less (ad-hoc) network. All nodes in ad-hoc network are connected to each other and communicated through the wireless link. In the ad-hoc network all the node work as router and they do not have a restriction for participating or leaving the network. These networks have some conventional problem like limited bandwidth, battery power coverage area etc. Ad-hoc network can be classified into two categories Static Ad-hoc Network and Mobile Ad-hoc Network [2]. Static Ad-hoc Network (SANET) In SANET, geographical locations of all communicating nodes are fixed and they do not show mobility, so it is called static ad-hoc network.

4 A Study of Severe Attacks on Mobile Ad-hoc Network 4 Mobile Ad-hoc Network (MANET) Mobile ad-hoc network is collection of self-configuring, autonomous nodes connected with wireless links. The MANET is an open network that does not depends on any fixed infrastructure or base stations [3]. MANET can be easily deployed in environments where setup of wired fixed infrastructure is not possible. A simplified diagram of ad-hoc network is shown below Figure 1.1. Figure 1.1:- Mobile Ad-hoc Network In Wireless LAN all mobile nodes are connected to a fixed access point using a wireless link and these fixed access points connected to each other with wired link. These access points acts as router and forward packet to other access point in the network. The routing functionality of each node of a MANET makes function of routing complex. The wireless environment of MANET is affected by many security threats. The most common security threats are denial of service attack, rushing attack, black hole attack, wormhole attack, gray-hole attack etc. Thesee threats become severe when they target to routing protocol of network [3]. Proactive/table-driven and reactive/on-demand both type of routing protocol is vulnerable to these security attacks. The attacks on these routing protocols comprises of routing table overflow, routing table poisoning, packet replication, route cache poisoning, rushing attack etc. These attacks can either be performed by internal or external nodes. An external attacker is any unknownn node comes in vicinity of MANET and performs malicious activities and an internal attacker is a legitimate node compromised by attacker. The attack performed by internal attacker is difficult to detect because sometime they acts as malicious node and sometime behave as legitimate node. There are many research has been done to deal these security threats. In the MANET every node must participate in forwarding the packets.

5 A Study of Severe Attacks on Mobile Ad-hoc Network 5 III. VULENRABILITIES MANETs are vulnerable due the different types of security threats, which are as follows [4]: a. Dynamic Topology: In the MANET:Due to the dynamically changing topology, each and every node can move freely from one location to another location, also it may have leave and join the network any time. MANET does have any physical or wired protection. Due to this situation, attacker can takes the benefits, and can reduce the network performance. b. Wireless Links: The bandwidth used in wireless communication is less as compared to wired communication. This factor is attracts the most of the intruders prevent themselves for communication with nodes. c. Cooperative Network: all the nodes in the network is assume that nodes are communicating securely, but due to feature of cooperativeness, some nodes may be malicious which can destroy the data or affects the communication. d. Lack of Defense:In the MANET, there is no defense mechanism or clear line. Attacker can do un-wanted activity from any direction. e. Limited Resources: Different types of wireless device are consisting in MANET, with thedifferent storage capacity. And different processing speeds. This limitation may attract the attackers. IV. TYPES OF NETWORK ATTACKS Wormhole attack can also be created by some other following methods [5][6]: Communication network follow a standard and conceptual reference model called OSI (Open System Interconnection) model which defines the internal functionality of communication system. It is included seven numbers of logical layers. These seven layers of OSI model has been divided in to the two groups of three layers. First three layers define how the applications will communicate with each other and another three layers define the end to end data transmission in the network. There are various types of attack which distract the communication process. We can classify these types of attack in ad-hoc networking on the basis of different layers [7]. These attacks are as follows: Physical Layer All the physical specifications and quantities of the communication medium are defined by the physical layer. Pins, connectors, current, use of pins Connectors, pins, electrical currents, encoding, and light modulation are all part of different physical layer specifications.physical and MAC Layer attacks are performed with the help of hardware. These attacks can be easily

6 A Study of Severe Attacks on Mobile Ad-hoc Network 6 performed even the attackers don t have knowledge of communication technology. Eavesdropping and jamming attacks comes in this category. Eavesdropping: - To perform the eavesdropping an attacker comes in the vicinity of wireless network and intercepting the communication between two legitimate nodes. The main aim of such attacks is to obtain the confidential information that should be kept secret during the communication [7]. Jamming Attack: - Jamming attack is type of denial of service attack (Dos) in which the main aim of jammer is to interfere in legitimate communication. The attacker prevents sender from sending packets and receiver from receiving packet in legitimate communication. Data Link Layer: It is the 2 nd layer of OSI model out of seven layers which is able to transfer the data in adjacent nodes of network in WAN. It also works on error and flow check & its control mechanism.below attack of data link layer is follows. Traffic Analysis: - The attackers monitor the packet transmission to predict important information about the traffic flow in the network such as information password, sourcedestination pair, topology information etc. Network Layer It is the fourth layer of OSI model which provides both types of services connectionless and connection oriented.it determines the suitable route to the destination and also provides fragmentation of data packets into smaller data packets.the network layer protocols in MANET provide communication between distant nodes using intermediate nodes. Every individual node takes route decision to forward the packets, so it is very easy for malicious nodes to perform adversary effect. The basic idea behind network layer attacks is to inject itself in the active pathfrom source to destination or to absorb network traffic. The main attacks at network layer are as follows [6]. Wormhole Attack: - In the Wormhole attack control packets and data packets are used by routing protocol which is vulnerable to attacks. In the attacks, data packets can be modify, drop or misdirects by the attackers. The aim of attacker is to attract traffic by sending false routing information in whole network. In any proactive routing protocol these attackers may advertise false link in control packets or remove a legitimate link from topology control packet [8]. The attacker may misdirect traffic by creating a tunnel. The node at either end of tunnel will incorrectly believe that they are neighbour of each other. Hence wrong topology information

7 A Study of Severe Attacks on Mobile Ad-hoc Network 7 distributes in the network. They analyse different attacks on both proactive and reactive routing protocols. They conclude that periodic update of routing information makes proactive routing protocol inherently more secure than reactive routing protocol. High Power: -In this method, received route request is broadcast at increased power level. In another words when a single attacker node receives the route request, it will broadcast with high range of power. Malicious node has a capability to transfer the data with high power, which has not available to another participating node. This broadcasted request is heard by a node with high range, will rebroadcast to the destination. By this method, attackers may increase the chance to attack on the network. Out of Band: - It is another mode of creation of wormhole attack. This mode of attack uses the out of band channel. In the network two malicious nodes creates a long range directional link between them. When a node sends the route request to another node, malicious node receives this request and sends that request with high speed to another malicious node [9]. Second malicious node broadcast this request to their neighbours including destination node. So the destination node always chooses this path because of it is faster and too short than another ways. Packet Relay: -In the packet relay, attackers node convince the two distant node that they are neighbours [9]. In this mode attacker node relays packets between two far away nodes. More cooperating nodes expand their victim nodes. For creation of wormhole attack, an intruder node is putted within transmission range of two distant nodes which are in range of each other. This intruder tunnels them to each other, and convinces both the distant nodes are the neighbours. This condition may create a chance to misdirect the network. Protocol Deviation: -Protocol deviation is also useful to attackers for creation of wormhole.for reduction of collision at MAC layer, nodes take a back off before forwarding the route request. Normal nodes use this back off for reducing the collision at the MAC layer. This factor is very beneficial to attackers so that they broadcast the route request without backing off. Because of this attacking mode, nodes only forward the first arriving packets. Blackhole Attack: - In the black hole attack malicious node advertises itself as having the shortest route to any destination. These fake responses can be made to divert network traffic through a malicious node for eavesdropping or simply to drive traffic to it to perform denial of service attack by dropping packets received. There is a more subtle form of these attacks when an attacker selectively forwards packets. An attacker suppresses or modifies packets originating

8 A Study of Severe Attacks on Mobile Ad-hoc Network 8 from some nodes, while leaving the data from the other nodes unaffected, which limits the suspicion of its wrongdoing. Replay Attack: - In replay attack the attacker records control messages of other nodes and resend them later in the network. This attack usually targets the freshness of routes, but can also be used to undermine badly designed security solutions. This attack results in other nodes to record their routing table with stale routes. These replay attacks are later misused to disturb the routing operation in a MANET. Resource Consumption Attack: - In resource consumption attack, a compromised node can attempt to consume battery life by requesting excessive route discovery, or by forwarding unnecessary packets to the victim. Rushing Attack: - Rushing attacks are mainly against the on-demand routing protocols. These types of attacks subvert the route discovery process. On-demand routing protocols that use duplicate suppression during the route discovery process are vulnerable to this attack when compromised node receives a route request packet from the source node, it floods the packet quickly throughout the network before other nodes, which also receive the same route request packet can react[10]. Transport Layer Transport Layer is the fourth layer of OSI model. Transport layer is responsible for establishing connection between the end-to end nodes and also responsible for sequencing and flow control. It provides reliable and unreliable data delivery. Transport layer Performs error correction before retransmission of data.this layer is affected by following attacks: Session Hijacking: - In session hijacking once a session is setup, attacker spoofs the victim node s IP address and finds the current sequence number expected by target. After this attacker launches DoS attack on victim node and continue session with target. In this attack, the malicious node tries to collect secure data (passwords, secret keys, login names etc.) and other information from nodes. SYN Flooding Attack: -The SYN flooding attacks are the type of DoS attacks, in which attacker creates a large number of half opened TCP connection with victim node. These half opened connections are never completes the handshake to fully open the connection. Application Layer It is an abstraction layer reserved for communication protocols. It was designed for process to process communications. This layer is responsible for displaying the information like

9 A Study of Severe Attacks on Mobile Ad-hoc Network 9 image and videos to the user which can be recognised by human, and to interface with the presentation layer.application layer protocols are also vulnerable to many threats. Some of them are as follows: Malicious Code Attacks: -Malicious code attacks include, Viruses, Worms, Spywares, and Trojan horses, can attack both operating system and user application. Repudiation Attacks: - The main aim of this attack is to denial of participation in the communication. V. CONCLUSION As discussed in this survey work, we have introduced many types of network attacks according to the particular layer of OSI model. In this work we have described the different ways to attack on the network. Due to badly design the security system and vulnerabilities of network, malicious nodes or attacker can attack on the network system and disrupts the routing functionality and drop or modify the data transmitted in the network. The next scope is to study and evaluate the performance on these attacks the different routing protocols in MANET. REFERENCES [1] ShimaMohseni et.al Comparative Review Study of Reactive and Proactive Routing Protocols in MANET 4th IEEE International Conference on Digital Ecosystems and Technologies pp IEEE [2] QianFeng et.al A Performance Comparison of the Ad Hoc Network Protocols International Workshop on Computer Science and Engineering pp IEEE [3] Pradip M. Jawandhiyaet. al. A Survey of Mobile Ad-hoc Network Attacks, International Journal of Engineering Science and Technology Vol. 2(9), , [4] Hrituparna Paul et. al. A study and comparison of OLSR, AODV and ZRP routing protocols in ad hoc networks pp Vol. 02 Issue: 08, ISSN Aug [5] Marianne Azeret. al. A Full Image of the Wormhole Attacks Towards Introducing Complex Wormhole Attacksin wireless Ad Hoc Networks IJCSIS Vol. 1, No. 1, pp May [6] H.S. Chiu et. al. Wormhole detection mechanism for ad-hoc wireless networks 1st International Symposium on Wireless Pervasive Computing, pp. 6 11, January [7] P.Yau et al, Malicious attacks on ad-hoc network routing protocols [8] Jain M. et. al. A Survey on Complex Wormhole Attack in Wireless Ad-hoc Networks in International Conference on Advances in Computing, Control, and Telecommunication Technologies, [9] Y.C. Hu et. al. Packet Leashes: A Defence against Wormhole Attacks in Wireless Ad Hoc Networks In IEEE INFOCOM, Vol.3, pp , Apr.2003.

Mitigating Routing behavior in Mobile wireless network with various types of routing attacks

Mitigating Routing behavior in Mobile wireless network with various types of routing attacks Mitigating Routing behavior in Mobile wireless network with various types of routing attacks M Jhansi Assistant Professor, Department of Computer Science & Engineering, MLR Institute of Technology, Hyderabad,

More information

REVIEW: A STUDY OF ETHICAL HACKING

REVIEW: A STUDY OF ETHICAL HACKING REVIEW: A STUDY OF ETHICAL HACKING 1 REVIEW: A STUDY OF ETHICAL HACKING Alok Upadhyay 1, Ravi Sharma 2, Manish Mahajan 3 Alokupadhyay1706@gmail.com 1,rvisharma1103@gmail.com 2, mahajan_manawar@yahoo.com

More information

Dr. S. S. Tyagi Professor and Head, Department of computer science & Engineering, MRIU, Faridabad, India.

Dr. S. S. Tyagi Professor and Head, Department of computer science & Engineering, MRIU, Faridabad, India. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Study of MANET:

More information

Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks

Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security

More information

Advanced Computer Networks

Advanced Computer Networks Introduction to Mobile Ad hoc Networks (MANETs) Advanced Computer Networks Outline Ad hoc networks Differences to other networks Applications Research areas Routing Other research areas Enabling Technologies

More information

Cryptographic Approaches for Securing Routing Protocols. Why Secure Routing?

Cryptographic Approaches for Securing Routing Protocols. Why Secure Routing? Cryptographic Approaches for Securing Routing Protocols Adrian Perrig perrig@cmu.edu Why Secure Routing? Current routing protocols assume trusted environment! Even misconfigurations severely disrupt Internet

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Computer Networks. Introduction to Computer Networks and Data Communications. Dr Yvan Petillot

Computer Networks. Introduction to Computer Networks and Data Communications. Dr Yvan Petillot Computer Networks Introduction to Computer Networks and Data Communications Dr Yvan Petillot A bit of history 1980: Networks are an academic curiosity 1988: All networks wires are copper based 1988: Networks

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Comparison of Layer-Wise Attacks in MANETS

Comparison of Layer-Wise Attacks in MANETS Proc. of Int. Conf. on Emerging Trends in Engineering and Technology Comparison of Layer-Wise Attacks in MANETS Shekhar Saini, Rajesh Kumar A.P Department of CSE/IT, GIMT Kanipla,Kurukshetra M.tech(CSE),

More information

Keywords: MANET, ACO, Pheromone, AODV, DSR, DSDV

Keywords: MANET, ACO, Pheromone, AODV, DSR, DSDV Different routing protocol for MANET : A survey Akshay Horane*, Amutha Jeyakumar**,Sagar Patkar*** *(Department of Electrical, VJTI, Mumbai) ** (Department of Electrical, VJTI, Mumbai) ***(Department of

More information

CHAPTER 4 FLOODING REDUCED - DESTINATION SEQUENCED DISTANCE VECTOR ROUTING PROTOCOL

CHAPTER 4 FLOODING REDUCED - DESTINATION SEQUENCED DISTANCE VECTOR ROUTING PROTOCOL 111 CHAPTER 4 FLOODING REDUCED - DESTINATION SEQUENCED DISTANCE VECTOR ROUTING PROTOCOL 4.1 INTRODUCTION The chapter two describes the analysis and implementation on the impact of broadcast mechanism in

More information

Classical Network Security Attacks

Classical Network Security Attacks Classical Network Security Attacks Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Port Scanning Port scan: is a program that when

More information

Data communication I. Local Area Networks (LANs) Lecture 8 LANs

Data communication I. Local Area Networks (LANs) Lecture 8 LANs Data communication I Lecture 8 LANs Local Area Networks (LANs) Topologies Transmission Media LAN protocol architecture LAN networking devices High speed LANs Ethernet Fibre Channel 1 WAN (Wide Area Network)

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Computer Networks I. Computer Networks I

Computer Networks I. Computer Networks I Networks A network s connection structure is known as its network topology. Host nodes source and destination of messages Communication nodes where messages pass through; can be routers/hubs/switches,

More information

Keywords DDoS, security attacks, Packet delivery ratio, Wireless mobile adhoc network, defense mechanisms.

Keywords DDoS, security attacks, Packet delivery ratio, Wireless mobile adhoc network, defense mechanisms. Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementing DoS

More information

Communication Protocols and Internet Architectures Harvard University CSCI E-40

Communication Protocols and Internet Architectures Harvard University CSCI E-40 Communication Protocols and Internet Architectures Harvard University CSCI E-40 Homework Assignment #2 Solutions Total points: 24 Question 1) 5 points total 1a, 1b and 1c, Explain in detail what is meant

More information

Performance Analysis of Routing Protocols in Mobile AD-HOC Networks (MANETs)

Performance Analysis of Routing Protocols in Mobile AD-HOC Networks (MANETs) IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. IV (Jan. 2014), PP 12-17 Performance Analysis of Routing Protocols in Mobile AD-HOC Networks

More information

To Study the Various Attacks and Protocols in MANET

To Study the Various Attacks and Protocols in MANET International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 To Study the Various Attacks and Protocols in MANET Harkiranpreet Kaur 1* and Rasneet

More information

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

A Hybrid Dynamic Clustering Based Approach for Malicious Nodes Detection in AODV Based Manets

A Hybrid Dynamic Clustering Based Approach for Malicious Nodes Detection in AODV Based Manets A Hybrid Dynamic Clustering Based Approach for Malicious Nodes Detection in AODV Based Manets Alka Sachdeva 1, Ameeta 2, Babita 3 1 Department of ECE, PCET, Lalru Mandi PTU Jalandhar, Punjab 2 Asst. Professor,

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Scenario based Performance Analysis of AODV and OLSR in Mobile Ad hoc Networks

Scenario based Performance Analysis of AODV and OLSR in Mobile Ad hoc Networks Scenario based Performance Analysis of AODV and OLSR in Mobile Ad hoc Networks Scenario based Performance Analysis of AODV and OLSR in Mobile Ad hoc Networks S. Gowrishankar, T.G. Basavaraju, M. Singh,

More information

2. Focus on attacks on the network infrastructure, i.e. misuse of network features to attack other users.

2. Focus on attacks on the network infrastructure, i.e. misuse of network features to attack other users. CS261 Lecture 2007-10-09 Network Security Next two weeks focus on network security. Network security is a funny topic. Two kinds of network attacks: 1. Attacks that use the network as a conduit, e.g. traverse

More information

Tema 5.- Seguridad. Problemas Soluciones

Tema 5.- Seguridad. Problemas Soluciones Tema 5.- Seguridad Problemas Soluciones Wireless medium is easy to snoop on Routing security vulnerabilities Due to ad hoc connectivity and mobility, it is hard to guarantee access to any particular node

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 4 Network Vulnerabilities and Attacks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 4 Network Vulnerabilities and Attacks Security+ Guide to Network Security Fundamentals, Third Edition Chapter 4 Network Vulnerabilities and Attacks Objectives Explain the types of network vulnerabilities List categories of network attacks

More information

How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols 1,2

How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols 1,2 How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols 1,2 Peng Ning and Kun Sun Cyber Defense Laboratory, Computer Science Department, North Carolina State University,

More information

Security of Network Routing Protocols. December 12, 2003 Final Project Presentation William M. Banick III

Security of Network Routing Protocols. December 12, 2003 Final Project Presentation William M. Banick III Security of Network Routing Protocols December 12, 2003 Final Project Presentation William M. Banick III Background - Networks Subnet Subnet 1 1 Subnet Subnet 3 3 LAN LAN LAN LAN Layer 3 Addressing Layer

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

A Secure Routing Protocol for Ad Hoc Wireless Networks. Pramod Gurunath Xiong Yunli

A Secure Routing Protocol for Ad Hoc Wireless Networks. Pramod Gurunath Xiong Yunli A Secure Routing Protocol for Ad Hoc Wireless Networks Pramod Gurunath Xiong Yunli Outline Introduction to Ad-hoc wireless networks Routing Protocol AODV Security concerns Authenticated Routing for Ad

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

CHAPTER 5 IMPLEMENTATION OF NEURO FUZZY SCHEDULING BASED CONNECTED DOMINATING SET IN WIRELESS MESH NETWORK

CHAPTER 5 IMPLEMENTATION OF NEURO FUZZY SCHEDULING BASED CONNECTED DOMINATING SET IN WIRELESS MESH NETWORK 63 CHAPTER 5 IMPLEMENTATION OF NEURO FUZZY SCHEDULING BASED CONNECTED DOMINATING SET IN WIRELESS MESH NETWORK 5.1 Introduction Neuro fuzzy logic method is taken in wireless mesh network to increase a network

More information

QUALITY OF SERVICES (QOS) EVALUATION IN ADHOC NETWORKS USING SOURCE-INITIATED ON-DEMAND ROUTING ALGORITHMS

QUALITY OF SERVICES (QOS) EVALUATION IN ADHOC NETWORKS USING SOURCE-INITIATED ON-DEMAND ROUTING ALGORITHMS International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN 2249-6831 Vol. 3, Issue 1, Mar 2013, 117-122 TJPRC Pvt. Ltd. QUALITY OF SERVICES (QOS) EVALUATION

More information

Working at a Small-to-Medium Business or ISP Chapter 8

Working at a Small-to-Medium Business or ISP Chapter 8 ISP Responsibilities Working at a Small-to-Medium Business or ISP Chapter 8 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials

More information

The OSI Model. Level 3 Unit 9 Computer Networks

The OSI Model. Level 3 Unit 9 Computer Networks The OSI Model The OSI Seven-Layer Model As shown to the right, the OSI reference model is built, bottom to top, physical, data link, network, transport, session, presentation, and application. The physical

More information

WI-FI (802.11) SECURITY ISSUES AND ITS SOLUTION

WI-FI (802.11) SECURITY ISSUES AND ITS SOLUTION International Journal of Computer Science, Systems Engineering and Information Technology, 4(2), 2011, pp. 129-133 WI-FI (802.11) SECURITY ISSUES AND ITS SOLUTION D. M. Gharge 1, & S. V. Halse 2, 1 Asst.

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 1, January 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of

More information

IT 3123 Hardware and Software Concepts

IT 3123 Hardware and Software Concepts IT 3123 Hardware and Software Concepts Overview of Data Communications June 30 Notice: This session is being recorded. Copyright 2014 by Bob Brown Portions Copyright 2010 John Wiley & Sons, Inc. Quiz 1

More information

Cisco CCNA (ICND1, ICND2) Bootcamp

Cisco CCNA (ICND1, ICND2) Bootcamp Cisco CCNA (ICND1, ICND2) Bootcamp CCNA: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills needed

More information

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

NS2 Simulator to Evaluate the Effective of Nodes Number and Simulation Time on the Reactive Routing Protocols in MANET

NS2 Simulator to Evaluate the Effective of Nodes Number and Simulation Time on the Reactive Routing Protocols in MANET NS2 Simulator to Evaluate the Effective of Nodes Number and Simulation Time on the Reactive Routing Protocols in MANET M.A. Jubair*, R. C. Muniyandi** * Research Center for Software Technology and Management,

More information

Security Threats in Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant

More information

Implementation of DSR Protocol in NS2 simulator University of Bonn, Informatik Department IV Venkatapathy Ragunath

Implementation of DSR Protocol in NS2 simulator University of Bonn, Informatik Department IV Venkatapathy Ragunath Implementation of DSR Protocol in NS2 simulator University of Bonn, Informatik Department IV Venkatapathy Ragunath Abstract-- The Dynamic Source Routing protocol (DSR) is a simple and efficient Routing

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

Vampire Attacks on Wireless Ad Hoc Sensor Networks

Vampire Attacks on Wireless Ad Hoc Sensor Networks Vampire Attacks on Wireless Ad Hoc Sensor Networks Tushar Thosar 1, Anuradha Joshi 2 P.G. Student, Department of EXTC Engineering, VIT College of Engineering, Wadala, Maharashtra, India 1 Associate Professor,

More information

New Variants of Wormhole Attacks for Sensor Networks

New Variants of Wormhole Attacks for Sensor Networks New Variants of Wormhole Attacks for Sensor Networks Waqqas Sharif Department of Computer Science and Software Engineering The University of Melbourne Melbourne, Australia sharifw@unimelb.edu.au Christopher

More information

Implementing and Comparing DSR and DSDV Routing Protocols of Mobile Ad-Hoc Networks using NS2 Simulator

Implementing and Comparing DSR and DSDV Routing Protocols of Mobile Ad-Hoc Networks using NS2 Simulator Implementing and Comparing and Routing Protocols of Mobile Ad-Hoc Networks using NS2 Simulator Charu Bhatia Mona Nandwani Nidhi Vandana Negi Kavita Sheoran ABSTRACT MANETs consists of mobile nodes that

More information

Computer Security CS 426

Computer Security CS 426 Computer Security CS 426 Lecture 33 Network Security (1) CS426 Fall 2010/Lecture 33 1 Network Protocols Stack Application Transport Application protocol TCP protocol Application Transport Network IP protocol

More information

6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches?

6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches? TUTORIAL 2 (EKT 332) 6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches? Why broadcast network? -The computers in a LAN are separated by a short

More information

Ad hoc networks: Overview, applications and routing issues

Ad hoc networks: Overview, applications and routing issues Ad hoc networks: Overview, applications and routing issues Kristoffer Karlsson IT3 Billy Ho IT3 Chalmers University of Technology kriskarl@student.chalmers.se, billy@student.chalmers.se Abstract This paper

More information

Malicious attacks on ad hoc network routing protocols

Malicious attacks on ad hoc network routing protocols Malicious attacks on ad hoc network routing protocols PO-WAH YAU, SHENGLAN HU and CHRIS J. MITCHELL Information Security Group, Royal Holloway, University of London Egham, Surrey TW20 0EX, UK {P.Yau, S.Hu,

More information

Caching of Routes in Ad hoc On-Demand Distance Vector Routing for Mobile Ad hoc Networks

Caching of Routes in Ad hoc On-Demand Distance Vector Routing for Mobile Ad hoc Networks Caching of Routes in Ad hoc On-Demand Distance Vector Routing for Mobile Ad hoc Networks Gautam Barua Manish Agarwal Indian Institute of Technology Guwahati, India gb@iitg.ernet.in manishag_iitg@yahoo.com

More information

A Survey on: Resource Consumption Index of Denial of Service Attack in MANET

A Survey on: Resource Consumption Index of Denial of Service Attack in MANET A Survey on: Resource Consumption Index of Denial of Service Attack in MANET Pranita Joshi Sri Satya Sai Institute of Science & Technology, Sehore Gajendra Singh Chandel Sri Satya Sai Institute of Science

More information

Understand Network Topologies and Access Methods

Understand Network Topologies and Access Methods Understand Network Topologies and Access Methods Lesson Overview In this lesson, you will learn about: Network topologies and access methods Star Mesh Ring Bus Anticipatory Set We previously discussed

More information

Introduction OSI Model Open Systems Interconnection OSI OSI Seven Layer Model

Introduction OSI Model Open Systems Interconnection OSI OSI Seven Layer Model OSI MODEL 1 Introduction Open Systems Interconnection Basic Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design.

More information

ARP Poisoning An investigation into spoofing the Address Resolution Protocol

ARP Poisoning An investigation into spoofing the Address Resolution Protocol www.harmonysecurity.com info@harmonysecurity.com ARP Poisoning An investigation into spoofing the Address Resolution Protocol By Stephen Fewer Contents 1 Introduction... 2 2 Protocol Overview... 2 3 Protocol

More information

CTS2134 Introduction to Networking. Module 03 Networking Devices

CTS2134 Introduction to Networking. Module 03 Networking Devices CTS2134 Introduction to Networking Module 03 Networking Devices NIC (Network Adapter) A NIC (network adapter) is responsible for transmitting frames from a host on to the networking medium. NICs are: architecture

More information

Lecture 3.1 : An Overview of the DSR Protocol. Lecture 3.2 : Routing Details and Performance of the DSR Protocol

Lecture 3.1 : An Overview of the DSR Protocol. Lecture 3.2 : Routing Details and Performance of the DSR Protocol Lecture 3 : The Dynamic Source Routing Protocol Lecture 3.1 : An Overview of the DSR Protocol. Lecture 3.2 : Routing Details and Performance of the DSR Protocol Dynamic Source Routing (DSR) Protocol Mobile

More information

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!

More information

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly

More information

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7 20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic

More information

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

An Implementation of Secure Wireless Network for Avoiding Black hole Attack An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,

More information

Protocol TCP/IP and Wifi

Protocol TCP/IP and Wifi Corentin Corde 2015-2016 Polytech GE5A Protocol TCP/IP and Wifi 802.11 Contents 1.1 Introduction................................ 3 1.2 TCP/IP Model.............................. 3 1.3 Protocols of TCP/IP...........................

More information

Lecture #10 Networks in more detail

Lecture #10 Networks in more detail KTH ROYAL INSTITUTE OF TECHNOLOGY Lecture #10 Networks in more detail Fabian Hohn In this series Lecture #9 Communication protocol basics The OSI model Relationship between OSI and SGAM

More information

Part 4. Routing Protocols

Part 4. Routing Protocols Part 4. Routing Protocols 1. Routing for Mobile Ad hoc NETworks (MANETs) Routing in MANETs is difficult since mobility causes frequent network topology changes and requires more robust and flexible mechanisms

More information

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY Nadher M. A. Al_Safwani, Suhaidi Hassan, and Mohammed M. Kadhum Universiti Utara Malaysia, Malaysia, {suhaidi, khadum}@uum.edu.my, nadher@internetworks.com

More information

DATA ENCRYPTION WITH FRIEND BASED ROUTING TO ESTABLISH SECURITY IN MANET

DATA ENCRYPTION WITH FRIEND BASED ROUTING TO ESTABLISH SECURITY IN MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

SYSTEM ADMINISTRATION USING CISCO (41)

SYSTEM ADMINISTRATION USING CISCO (41) PAGE 1 OF 12 CONTESTANT ID# 12 Pages Time Rank SYSTEM ADMINISTRATION USING CISCO (41) Regional 2013 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1.

More information

Networking Devices Comparison of the Network layer at which Switch Router Hub Bridge Repeater operate Wireless Access

Networking Devices Comparison of the Network layer at which Switch Router Hub Bridge Repeater operate Wireless Access Networking Devices Network devices are components used to connect computers or other electronic devices together so that they can share files or resources like printers or fax machines. Devices used to

More information

Main Types of Attacks in Wireless Sensor Networks

Main Types of Attacks in Wireless Sensor Networks Main Types of Attacks in Wireless Sensor Networks TEODOR-GRIGORE LUPU* *Department of Computer and Software Engineering University Politehnica of Timisoara, Faculty of Automatics and Computers Vasile Parvan

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 7 Administering a Secure Network

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 7 Administering a Secure Network Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 7 Administering a Secure Network Objectives List and describe the functions of common network protocols Explain how network administration

More information

Telecommunication Protocols Laboratory Course

Telecommunication Protocols Laboratory Course Telecommunication Protocols Laboratory Course Lecture 1 G721 (KTF) March 4, 2004 http://www.abo.fi/~lpetre/teleprot/teleprot.html 1 Behind the name Telecommunication: the science and technology of transmitting

More information

Routing in HF Ad-Hoc WANs

Routing in HF Ad-Hoc WANs Routing in Ad-Hoc WANs Eric E. Johnson, Zibin Tang, Manikanden Balakrishnan, Huiyan Zhang, and Srugun Sreepuram Klipsch School of Electrical and Computer Engineering 1 New Mexico State University ABSTRACT

More information

A Hybrid Local Broadcast Algorithm in Wireless Ad Hoc Networks using Dynamic Approach

A Hybrid Local Broadcast Algorithm in Wireless Ad Hoc Networks using Dynamic Approach A Hybrid Local Broadcast Algorithm in Wireless Ad Hoc Networks using Dynamic Approach R.Madhanmohan, K.Parkavi Abstract Broadcasting is a commonly used feature in wireless ad hoc networks. It is a common

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #4 Wireless Link Security Wireless link security Agenda General wireless link layer issues WiFi link security Link/MAC Layer The wireless

More information

2-1 LAYERED TASKS. Topics discussed in this section: Sender, Receiver, and Carrier Hierarchy 2.2

2-1 LAYERED TASKS. Topics discussed in this section: Sender, Receiver, and Carrier Hierarchy 2.2 2.1 Network Models 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example, let us consider two friends who communicate through postal mail. The process of sending a letter to a

More information

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

LECTURE NOTES-Computer Network BCA-IVth Semester

LECTURE NOTES-Computer Network BCA-IVth Semester LECTURE NOTES-Computer Network BCA-IVth Semester Lecture 4 NETWORK TOPOLOGIES Prepared For RIMT BCA Program Prem Parashar NETWORK TOPOLOGIES 2 NETWORK TOPOLOGIES The followings are the most commonly used

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 8. Network Design

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 8. Network Design Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Lab # 8 Network Design Network Lab # 8 Network Design Introduction A computer network is a collection of computers

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

AOMDV- Multipath Routing Protocol in Mobile Networks to Enhance Network Security

AOMDV- Multipath Routing Protocol in Mobile Networks to Enhance Network Security AOMDV- Multipath Routing Protocol in Mobile Networks to Enhance Network Security G. Siva Brindha 1, M. Rajeswari 2 Department of Computers Science, Hindusthan College of Arts and Science, Coimbatore 641

More information

Module 4. Switched Communication Networks

Module 4. Switched Communication Networks Module 4 Switched Communication Networks Lesson 2 Switching Techniques: Circuit Switching 4.2.0 Specific Instructional Objectives At the end of this lesson the student will be able to: Explain the need

More information

TCP/IP MODEL. Upendra Sharma

TCP/IP MODEL. Upendra Sharma 1 TCP/IP MODEL Upendra Sharma Introduction to TCP/IP Model The current Internet is based on a TCP/IP reference model. 2 TCP and IP are two protocols of this model. TCP stands for Transmission Control Protocol

More information

Chapter 9. VLANs. Concept Questions

Chapter 9. VLANs. Concept Questions Chapter 9 VLANs This chapter introduces virtual LANs (VLANs) and switched internetworking, compares traditional shared LAN configurations with switched LAN configurations, and discusses the benefits of

More information