Ad Hocnetwork
1 Follower
Recent papers in Ad Hocnetwork
Mobile Ad Hoc networks are networks in which users, regardless of geographical locations, can have access to its information and services. These networks are divided into 2 categories: network with structure and network without structure... more
Mobile Ad Hoc networks are networks in which users, regardless of geographical locations, can have access to its information and services. These networks are divided into 2 categories: network with structure and network without structure or Ad Hoc. Network structures are composed of fixed gates and wired networks. A mobile host can communicate with the other through a bridge called base station. A
mobile host can move geographically while communicating when the host is out of the domain of a base station, it will be connected to another base station and will continue the communication,in this method the base stations are fixed. In contrast to a network structure, all nodes are portable in an Ad Hoc network and communicate dynamically and with a preferred method. All of the nodes in this network act as a router and engage in discovering and route a intenance[1].The major problem of these networks designing is that these are vulnerable to security attacks. In this paper, the threats aAd Hocnetwork and also security objectives against these threats will be reviewed and some important routing protocols for
these kinds of networks, are compared and evaluated. This comparison, unlike previous comparisons, covers wide range of protocols and develops software NS2.
mobile host can move geographically while communicating when the host is out of the domain of a base station, it will be connected to another base station and will continue the communication,in this method the base stations are fixed. In contrast to a network structure, all nodes are portable in an Ad Hoc network and communicate dynamically and with a preferred method. All of the nodes in this network act as a router and engage in discovering and route a intenance[1].The major problem of these networks designing is that these are vulnerable to security attacks. In this paper, the threats aAd Hocnetwork and also security objectives against these threats will be reviewed and some important routing protocols for
these kinds of networks, are compared and evaluated. This comparison, unlike previous comparisons, covers wide range of protocols and develops software NS2.
Mobile Ad Hoc networks are networks in which users, regardless of geographical locations, can have access to its information and services. These networks are divided into 2 categories: network with structure and network without structure... more
Mobile Ad Hoc networks are networks in which users, regardless of geographical locations, can have access to its information and services. These networks are divided into 2 categories: network with structure and network without structure or Ad Hoc. Network structures are composed of fixed gates and wired networks. A mobile host can communicate with the other through a bridge called base station. A mobile host can move geographically while communicating when the host is out of the domain of a base station, it will be connected to another base station and will continue the communication,in this method the base stations are fixed. In contrast to a network structure, all nodes are portable in an Ad Hoc network and communicate dynamically and with a preferred method. All of the nodes in this network act as a router and engage in discovering and route a intenance[1].The major problem of these networks designing is that these are vulnerable to security attacks. In this paper, the threats a...