• 제목/요약/키워드: Protocols

검색결과 3,980건 처리시간 0.038초

Performance Variations of AODV, DSDV and DSR Protocols in MANET under CBR Traffic using NS-2.35

  • Chandra, Pankaj;Soni, Santosh
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.13-20
    • /
    • 2022
  • Basically Mobile Ad Hoc Network (MANET) is an autonomous system with the collection of mobile nodes, these nodes are connected to each other by using wireless networks. A mobile ad hoc network poses this quality which makes topology in dynamic manner. As this type of network is Ad Hoc in nature hence it doesn't have fixed infrastructure. If a node wishes to transfer data from source node to a sink node in the network, the data must be passed through intermediate nodes to reach the destination node, hence in this process data packet loss occurs in various MANET protocols. This research study gives a comparison of various Mobile Ad Hoc Network routing protocols like proactive (DSDV) and reactive (AODV, DSR) by using random topology with more intermediate nodes using CBR traffic. Our simulation used 50, 100, and 150 nodes variations to examine the performance of the MANET routing protocols. We compared the performance of DSDV, AODV and DSR, MANET routing protocols with the result of existing protocol using NS-2 environment, on the basis of different performance parameters like Packet Delivery Ratio, average throughput and average end to end delay. Finally we found that our results are better in terms of throughput and packet delivery ratio along with low data loss.

Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques- A Review

  • Amina Yaqoob;Alma Shamas;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.23-32
    • /
    • 2024
  • Mobile Ad hoc Network is a network of multiple wireless nodes which communicate and exchange information together without any fixed and centralized infrastructure. The core objective for the development of MANET is to provide movability, portability and extensibility. Due to infrastructure less network topology of the network changes frequently this causes many challenges for designing routing algorithms. Many routing protocols for MANET have been suggested for last few years and research is still going on. In this paper we review three main routing protocols namely Proactive, Reactive and Hybrid, performance comparison of Proactive such as DSDV, Reactive as AODV, DSR, TORA and Hybrid as ZRP in different network scenarios including dynamic network size, changing number of nodes, changing movability of nodes, in high movability and denser network and low movability and low traffic. This paper analyzes these scenarios on the performance evaluation metrics e.g. Throughput, Packet Delivery Ratio (PDR), Normalized Routing Load(NRL) and End To-End delay(ETE).This paper also reviews various network layer security attacks challenge by routing protocols, detection mechanism proposes to detect these attacks and compare performance of these attacks on evaluation metrics such as Routing Overhead, Transmission Delay and packet drop rates.

Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2$^{163}$ ) for ECC protocols

  • Park, Yong-Je;Kim, Ho-Won;Kim, Moo-Seop
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -1
    • /
    • pp.674-677
    • /
    • 2002
  • This paper describes the design of elliptic curve crypto (ECC) coprocessor over binary fields for ECC protocols. Our ECC processor provides the elliptic curve operations for Diffie-Hellman, EC Elgamal and ECDSA protocols. The ECC we have implemented is defined over the fieTd GF(2$\^$163/),which is a SEC-2 recommendation[6].

  • PDF

멀티미디어 회의 원형모델을 통한 다지점이진화일전송 프로토콜 설정 메카니즘 (A study on multipoint binary file transfer protocol protocol estabilishment mechanism throughout generic model)

  • 고기원;김영선
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1998년도 하계종합학술대회논문집
    • /
    • pp.729-732
    • /
    • 1998
  • ITU-T recommends T.120 for multimedia conferencing data protocols. In this paper, generic model of application protocols is shown for guaranteeting internetworking between application protocols in application users. And using generic conference control and multipoint communication service, multipoint binary file transfer application protocol is shown throughout application protocol generic model on public session environment.

  • PDF

지형기반 이동성모델을 이용한 Ad Hoc망에서의 경로배정 프로토콜 성능분석 (Performance Evaluation of Mobile Ad Hoc Network Routing Protocols Using Geography Based Mobility Model)

  • 박범진;안홍영
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 I
    • /
    • pp.153-156
    • /
    • 2003
  • Conventional simulations for mobile ad hoc network so far are based on the "random walk" of the mobile nodes, which are not constrained by their surrounding spatial environments. In this paper, we present a geography-based mobility model, which reflects more realistic movements of the real world. This mobility model is used for performance evaluation of MANET routing protocols.protocols.

  • PDF

Multi-Hop Cooperative Transmission Using Fountain Codes over Rayleigh Fading Channels

  • Duy, Tran Trung;Anpalagan, Alagan;Kong, Hyung-Yun
    • Journal of Communications and Networks
    • /
    • 제14권3호
    • /
    • pp.267-272
    • /
    • 2012
  • In this paper, we study multi-hop cooperative transmission protocols using fountain codes. The proposed protocols can reduce the end-to-end delay and number of stages compared to those in conventional multi-hop transmission. VariousMonte-Carlo simulations are presented to evaluate and compare performance of the protocols over Rayeigh fading channels.

우리별 위성 패킷 통신 프로토콜의 모델링과 검증 (MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS)

  • 이영로;성단근
    • Journal of Astronomy and Space Sciences
    • /
    • 제13권2호
    • /
    • pp.134-148
    • /
    • 1996
  • 본 논문은 우리별 1, 2호에 탑재된 패킷 통신 프로토콜을 이론적으로 검증하기 위해, 먼저 AX.25 프로토콜과 PACSAT 프로토콜을 확장형 페트리 네트로 모델링하고, 도달성 나무 기법을 이용하여 패킷 프로토콜에 대한 정확성, 제한성, 생존성, 그리고 데드록 없음 등을 검증한다.

  • PDF

MAC Protocols for Ad Hoc Networks with Directional Antennas: Overview and Comparison

  • Khatiwada, Bipula;Moh, Sang-Man
    • 정보와 통신
    • /
    • 제28권12호
    • /
    • pp.69-82
    • /
    • 2011
  • In recent years, the employment of directional antennas in ad hoc networks has significantly increased. MAC protocols for ad hoc networks with directional antennas have the potentiality of spatial reuse, large coverage range and network capacity, which mitigates the negative effects associated with omnidirectional antenna systems. However, they suffer from some issues such as hidden terminal problems, deafness, neighbor discovery, flaws with directional carrier sensing, etc. In this paper, we have surveyed the MAC protocols for ad hoc networks with directional antennas, which have been published in the literature, and compared them qualitatively in terms of major characteristics and network performances.

검증 가능한 자체인증 개인식별 및 키분배 프로토콜 (Verifiable Self-Certified Identification and Key-Distribution Protocols)

  • 김경국;유준석;원동호
    • 한국정보처리학회논문지
    • /
    • 제6권10호
    • /
    • pp.2722-2727
    • /
    • 1999
  • In this paper we propose verifiable self-certified identification and key distribution protocols which has advantages of certificate-based scheme and Girault's self-certified public key. The security of the proposed protocols is based on ${\gamma}$\ulcorner-residuosity problem and discrete logarithm problem.

  • PDF

Comparison of Anonymous Authentication Protocols

  • Kim, Jongseong;Kim, Kwangjo
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2002년도 종합학술발표회논문집
    • /
    • pp.369-372
    • /
    • 2002
  • An anonymous authentication scheme allows a user to identify himself as a member of a group of users in a secure and anonymous way. It seems to be crucial and indispensable components in English auction, electronic voting and open procurement, which are getting very popular business areas in E-commerce. First, we briefly describe the previous anonymous authentication protocols how to work and what cryptographic techniques adopted to increase performance and achieve anonymity. Second, we compare those protocols from the viewpoint of the communication and computation complexity and the specific cryptographic techniques used in their protocols.

  • PDF