Tuesday, June 11, 2019

Mesh Networks Coursework Example | Topics and Well Written Essays - 10000 words

Mesh Networks - Coursework ExampleAs organizations are relying more on high-speed radio set meshworks, gage is a vital factor. Wireless security is a framework that emphasizes on prevention of workstations or networks from unauthorized access. An automated system known as mobile ad-hoc network (MANET) is integrated within the radiocommunication networks to establish communication between wireless nodes or access points. However, MANET does not pass centralized administration. MANET is defined as Mobile Ad Hoc Network (MANET) refers to a type of mobile network in which each node has the ability to act as a router, permitting adap tabular array multi-hop communications 3. The ad-hoc on demand removed(p) vector protocol (AODV) that is operated by MANET provides loopholes for the hackers to gain access to the network or the system via a wireless network. AODV is widely used due to its significant advantages much(prenominal) as lower network overhead with a complex algorithm. Howev er, AODV does not maintain the database for routing information in the router. This is the area where there is a possibility of the hackers to survive in the network. This paper will discuss the details associated with attacks incorporated with AODV. Moreover, other type of threats that may affect the domestic wireless network operating on an 802.11 will also be defined and discussed. 3. Introduction MANET is constructed on multiple routers knows as multi hop communication paths, these multi hop communication paths, can be unconnected any time and in any direction. The routing protocols that are associated with MANET are categorized in to hybrid, table-driven and demand-driven routing protocols 1. Table-driven protocols attempt to synchronize routing information with the routing table for each wireless router. For example, last Sequenced Distance Vector (DSDV) and Wireless Routing Protocol (WRP) protocols fall under the category of table-driven protocols. Demand-driven protocols are associated with AODV and dynamic source routing protocol (DSR). Hybrid routing protocols interlinks with the other two protocols i.e. table driven and demand driven routing protocols. The wireless MANET network is associated with protocols that are not well designed in terms of network security, as there is no centralized administration to monitor or configure MANET. However, most of the wireless network protocols associated with MANET is designed for optimum bandwidth utilization but not for optimal security. These factors have made the wireless network vulnerable for the hackers and cyber criminals. One of the examples of mesh networks are illustrated in Fig. 1. Figure 1 Source (Siraj and Bakar 1263-1271) One of the latest examples for mesh network is the youtube architecture, as shown Fig 1.2. Figure 2 Source (Staehle et al. 144-148) In this competitive and evolutionary world of technological advancements, threats and vulnerabilities are a great concern. Similarly, any wirele ss protocol must address security issues during the design phase. The protocol must add

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.