Download Current State Of The Literature Related To The Proposed Topic

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

IEEE 1355 wikipedia , lookup

Internet protocol suite wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Network tap wikipedia , lookup

Distributed firewall wikipedia , lookup

Peering wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Computer network wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Wireless security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Peer-to-peer wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Routing wikipedia , lookup

Airborne Networking wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
Optimization In Routing Protocols For Mobile Ad Hoc Networks
Synopsis for Admission to Ph. D. Programme
Submitted by
PRABHAT KUMAR YADAV
Roll Number:- R10012375
Submitted to
Under the Guidance of Dr. Zaheeruddin.
Department of Electrical Engineering
Faculty of Natural Sciences
Jamia Millia Islamia
New Delhi-11 0025
Optimization In Routing Protocols For Mobile Ad Hoc Networks
Objective:The 1990s have seen a rapid growth of research interests in mobile ad hoc networking. The
infrastructure less and the dynamic nature of these networks demands new set of networking
strategies to be implemented in order to provide efficient end-to-end communication. This, along with
the diverse application of these networks in many different scenarios such as battlefield and disaster
recovery, has seen MANETs being researched by many different organizations and institutes.
MANETs employ the traditional TCP/IP structure to provide end-to-end communication between
nodes. However, due to their mobility and the limited resource in wireless networks, each layer in the
TCP/IP model require redefinition or modifications to function efficiently in MANETs. One
interesting research area in MANET is routing. Routing in the MANETs is a challenging task and has
received a tremendous amount of attention from researches. This has led to development of many
different routing protocols for MANETs, and each author of each proposed protocol argues that the
strategy proposed provides an improvement over a number of different strategies considered in the
literature for a given network scenario. Therefore, it is quite difficult to determine which protocols
may perform best under a number of different network scenarios, such as increasing node density and
traffic. In this paper, we provide an overview of a wide range of routing protocols proposed in the
literature. We also provide a performance comparison of all routing protocols and suggest which
protocols may perform best in large networks.
Current State Of The Literature Related To The Proposed Topic:In recent years, mobile computing has enjoyed a tremendous rise in popularity. The continued
minimization of mobile computing devices and the extraordinary rise of processing power available
in mobile laptop computers combine to put more and better computer-based applications into the
hands of a growing segment of the population. At the same time, the markets for wireless telephones
and communication devices are experiencing rapid growth. Projections have been made that, in
nowadays there are more than billion wireless devices in use. Therefore, the wireless mobile
computers or Mobile Ad Hoc Networks (MANET) have become very necessary.
A wireless ad hoc network is a collection of autonomous nodes or terminals that communicate with
each other by forming a multi-hop radio network and maintaining connectivity in a decentralized
manner. Since the nodes communicate over wireless links they have to contend with the effects of
radio communication, such as noise, fading, and interference. In addition, the links typically have less
bandwidth than in a wired network. Each node in a wireless ad hoc network functions as both a host
and a router, and the control of the network is distributed among the nodes.
The network topology is in general dynamic, because the connectivity among the nodes may vary
with time due to node departures, new node arrivals, and the possibility of having mobile nodes.
Hence, there is a need for efficient routing protocols to allow the nodes to communicate over multihop paths consisting of possibly several links in a way that does not use any more of the network
"resources" than necessary. Some of these features are characteristic of the type of packet radio
networks that were studied extensively in the 1970s and 1980s. To provide routes in such dynamic
environments, many routing protocols have been proposed over the last few years. These protocols
can be broadly classified onto three categories, namely, proactive, reactive, and hybrid. Yet, research
in the area of ad hoc networking is receiving much attention from academia, industry, and
government. Since these networks pose many complex issues, there are many open problems for
research and opportunities for making significant contributions; one of these issues is the secure
communication during the route discovery.
The Research Proposal:This proposal is concerns with the development and evaluation of Optimum/Mitigate routes discovery
between a source node and a destination in the MANET, which provides secure and safe
communication path. As we know, Mobile Ad hoc Network (MANET) is a kind of wireless ad-hoc
network, and is a self-configuring network of mobile routers (and associated hosts) connected by
wireless links the union of which forms an arbitrary topology. The routers are free to move randomly
and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and
unpredictably. Such a network may operate in a standalone fashion, or may be connected to the larger
Internet.
The inherent features (such as-open medium, dynamically changing network topology, lack of
centralized monitoring and management point, and lack of a clear line of defense) of the MANET
make it vulnerable to a wide range of attacks. There is no guarantee that a communication path is free
from malicious or compromised nodes which deliberately wish to disrupt the network
communication. So protecting the mobile ad-hoc network from malicious attacks is very important
and challenging issue.
Methodology:- Studying and investigating the current protocols of ad hoc wireless networks.
- Assessing the difficulties faced by other routing protocols.
- Designing algorithms needed to implement the idea of this proposal (The Optimum/Mitigated
Routing Algorithm.), and achieve the following goals:
• Less congestion control, overhead control and communication cost.
• High speed during route discovery, update and data maintenance.
• Setting up a communication path which provides secure packet transmission.
• Optimum bandwidth for data packet transmission.
- Navigating features of software tools that will use in implementation, testing and comprising,
such as (C++, Ns2 simulator, TCL and TK).
References:1.
2.
3.
4.
5.
6.
7.
8.
9.
E.M. Royer, C.-K. Toh, A review of current routing protocols for ad hoc mobile wireless networks, IEEE Personal
Communications 6 (2) (1999) 46–55.
C.-C. Chiang, Routing in clustered multihop mobile wireless networks with fading channel, in: Proceedings of IEEE SICON,
April 1997, pp. 197–211.
G. Aggelou, R. Tafazolli, RDMAR: a bandwidth-efficient routing protocol for mobile ad hoc networks, in: ACM International
Workshop on Wireless Mobile Multimedia (WoWMoM), 1999, pp. 26–33.
S. Radhakrishnan, N.S.V Rao, G. Racherla, C.N. Sekharan, S.G. Batsell, DST––A routing protocol for ad hoc networks using
distributed spanning trees, in: IEEE Wireless Communications and Networking Conference, New Orleans, 1999.
S.-C. Woo, S. Singh, Scalable routing protocol for ad hoc networks, Wireless Networks 7 (5) (2001) 513–529.
Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention Yang-Seo Choi ; Jin-Tae Oh ; Jong-Soo
Jang ; Jae-Cheol Ryou Information Technology Convergence and Services (ITCS), 2010 .
DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics Yuan Tao ; Shui Yu Trust, Security and
Privacy in Computing and Communications (TrustCom), 2013 12th IEEE .
SVM Based Scheme for Predicting Number of Zombies in a DDoS Attack Agrawal, P.K. ; Gupta, B.B. ; Jain, S. Intelligence and
Security Informatics Conference (EISIC), 2011 European.
V.Priyadharshini1 , Dr.K.Kuppusamy Prevention of DDOS Attacks Using New Cracking Algorithm Dept of Computer Science
& Engg Alagappa University, Karaikudi,Tamilnadu,India , International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622,May-June 2012.