IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 440-446

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Modified AODV Routing Protocol for Traffic Control in MANET Preeti Research Scholor, Deptt. Of CSE Doon Valley Instiitute of Engg. & Tech., Karnal [email protected] Parikshit Singla Assistant Professor, Deptt. Of CSE Doon Valley Instiitute of Engg. & Tech., Karnal [email protected] ABSTRACT In Mobile Ad hoc Networks blockage occurs due to heavy load on network which causes the packet loss In this paper, we are using adaptive routing with congestion control technique for mobile ad hoc networks. In this technique predictive congestion index of a node is used. As we increase the number of connections there will be increase in capacity of nodes to connect with more numbers of requested nodes in a given region. As the requirement of all nodes will fulfill, there will be no delay and no blockage so no congestion will be occur. We have implement this technique using AODV routing protocol with increased length of Gate Size of nodes to avoid congestion in Ad hoc Networks. By simulation results, we have shown that our proposed technique attains high delivery ratio and high performance, low control overhead and reduced delay with relative speed when compared with the existing AODV protocol. Performance of the proposed protocol is implemented on OMNET++ Simulator. I. INTRODUCTION A. Mobile Ad-hoc Network (MANET) Mobile Ad-hoc network (MANET) is an independent system of mobile hosts connected by wireless links. There is no static infrastructure such as base stations. If two hosts are not within radio range, all communication messages between them must pass through one or more intermediate hosts that act as routers. These hosts move around randomly, thus change the network topology dynamically. Such networks are very useful in military and other tactical applications such as emergency rescue or exploration missions, where fixed network infrastructure is not available. A MANET is required in situations where a fixed communication infrastructure, wired or wireless, does not exist or has been destroyed. A Mobile Ad hoc Network generally does not have any infrastructure and each mobile host also acts as a router. Communication between various hosts takes place through wireless links. Direct communication can take place between hosts that are within the communication range of the antennas of the respective hosts; otherwise, communication is achieved through multihop routing. B. Characteristics of MANET Ad hoc networks have several salient characteristics: •

• •

Infrastructure less, decentralized operation: Usually, ad hoc networks do not rely on any kind of infrastructure support for routing, network management, etc. In other words, ad hoc networks are basically self-organizing and self-managing networks. The lack of centralized control in ad hoc networks requires more sophisticated distributed algorithms to perform all networkrelated functions. Dynamic topologies: Nodes are free to move arbitrarily; thus, the network topology which is typically multihop may change randomly and rapidly at unpredictable times, and may consist of both bidirectional and unidirectional links. Mobility: Mobility causes frequent change in network topology when new nodes join in, some nodes leave or some links break down.

Preeti, IJRIT- 440

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 440-446





• • • •

Limited physical security: Mobile wireless networks are generally more prone to physical security threats than are fixedcable nets. The increased possibility of eavesdropping, spoofing and denial-of-service attacks should be carefully considered. Existing link security techniques are often applied within wireless networks to reduce security threats. As a benefit, the decentralized nature of network control in MANETs provides additional robustness against the single points of failure of more centralized approaches. Multi-hop routing: A node may want to connect to a distant node that is out of its transmission range. Because each node in ad hoc networks can route traffic for the others, multi-hopping is possible. Multi-hopping is a desirable capability in an ad hoc network because a single-hop ad hoc network does not scale large, thus limiting the communications among the nodes. Energy-constrained operation: Some or all of the nodes in a MANET may rely on batteries or other exhaustible means for their energy. For these nodes, the most important system design criteria for optimization may be energy conservation. Heterogeneity: Each node may have different capabilities. In some cases, to be able to connect to an infrastructure-based network (to form a hybrid network), some nodes can communicate with more than one type of network. Link asymmetry: In a wireless environment, communication between two nodes may not work equally well in both directions. In other words, even if node n is within the transmission range of node m, the reverse may not be true. Bandwidth-constrained, variable capacity links: Wireless links will continue to have significantly lower capacity than their hardwired counterparts. In addition, the realized throughput of wireless communications is often much less than a radio’s maximum transmission rate because of the effects of multiple access, fading, noise, and interference conditions, etc. One effect of the relatively low to moderate link capacities is that congestion is typically the norm rather than the exception.

C. Issues in MANET • Dynamic topology: The nodes are mobile and hence the network is self-organizing. Because of this, the topology of the network keeps changing over time. Consequently, the routing protocols designed for such networks must also be adaptive to the topology changes. • Addressing scheme:The network topology keeps changing dynamically and hence the addressing scheme used is quite significant. A dynamic network topology requires a ubiquitous addressing scheme, which avoids any duplicate addresses. In wireless WAN environments, Mobile IP is being used. • Mobility: The mobility of nodes results in frequent path brakes, packet collisions, transient loops and difficulty in resource reservation. A good routing protocol should be able to efficiently solve all the above issues. • Security and Privacy: The routing protocol in ad hoc wireless networks must be resilient to threats and vulnerabilities .Security in an ad hoc network is extremely important in scenarios such as a battlefield [7]. • Congestion: In these networks, congestion occurs in any intermediate node when data packets travel from source to destination and they incur high packet loss and long delay, which cause the performance degradations of a network. • Energy Management: Energy management is defined as the process of managing the resources and consumers of energy in a node or in the network as a whole for enhancing the lifetime of the network. D. The Congestion Problem When the requirements become greater than maximum capability of the communication link particularly multiple hosts attempting to access a shared media, congestion occurs in the network at any intermediate node when data packets travel from source to destination and they incur high packet loss and long delay, which cause the performance degradations of a network. Congestion may also be caused during the following conditions. • When the load in the link goes beyond the carrying capacity. • When the broadcasting packets are surplus in nature • When more number of packets field has becomes time out and retransmitted. • When the number of node increases. E. Traffic Control The main objective of traffic control is to limit the delay and buffer overflow caused by network congestion and provide better performance of the network. To maintain and allocate network resources effectively and fairly among a collection of users is a major issue. The resources shared mostly are the bandwidth of the links and the queues on the routers or switches. Packets are queued in these queues awaiting transmission. When too many packets are contending for the same link, the queue overflows and packets have to be dropped. When such drops become common events, the network is said to be congested [11]. In Ad-hoc networks, since there is no fixed infrastructure there are no separate network elements called routers and hence the mobile nodes themselves act as the routers (i.e. they are responsible for routing the packets). Congestion control methods [10] can be router centric or host/node centric. In existing congestion control methods, the source is informed about the congestion in the network so that either it may slow down the packet transmission rate or find an alternate route which may not necessarily be an optimal route F. Problem Discovery and proposed Protocol Ad-hoc networks are characterized by a need of infrastructure, and by a random and quickly varying network topology; thus the need for a robust dynamic routing protocol that can accommodate such an environment. Recital comparison between two routing algorithms, AODV, from the immediate family and DSDV, from the proactive family. Both protocols were simulated using the ns-2 and were compared in terms

Preeti, IJRIT- 441

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 440-446

of average throughput, packet loss ratio, and routing overhead, while changeable number of nodes, speed and pause time. Simulation exposed that although DSDV completely scales to small networks with low node speeds, AODV is favoured due to its more efficient use of bandwidth [1]. In wire line networks, congestion control is implemented at the transport layer and is often designed separately from functions of other layers. However, these results do not apply directly to Ad hoc networks because the Ad hoc networks result in large amount of packet loss, high delay, unfair scenarios and low throughputs. In Ad hoc networks, each mobile node has limited transmission capacity and buffer and they mostly intercommunicate by multi-hop relay. The random behavior of Ad-hoc networks cause the topology of wireless network to be changed rapidly and unpredictably. As a result, traditional congestion control mechanism, applied by the Transport Control Protocol (TCP) is unable to catch up the network dynamics of ad hoc networks [3]. In case of ad hoc networks packet losses are due to congestion in the network and due to frequent link failures or the instance of a timeout, backing-off its retransmission timeout (RTO).This results in unnecessary reduction of transmission rate because of which throughput of the whole network degrades. On-demand Routing Protocols such as AODV is used for this performance analysis. This type of routing protocol creates routes only when requested by a source node. When a node wants to establish a route to a destination, it initiates a route discovery process within the network. Once the route has been established, it is maintained until either destination becomes inaccessible or the route is no longer desired. we will analyze the performance of on-demand routing protocols for ad hoc networks, name Ad Hoc On-demand Distance Vector (AODV) routing protocol with proposed modified AODV Routing Protocol for Traffic Controlbased on traffic flows. II.

Literature Survey

Vishnu Kumar Sharma et al [1] proposed an agent based congestion control technique for MANETs. They have used agent based congestion control technique in which the information about network congestion is collected and distributed by Mobile Agents (MA). With support of Mobile Agents, the nodes can get dynamic network topology in time. By simulation result they have shown their proposed technique attained high delivery ratio and throughput with reduced delay when compared with different existing techniques. P. Rama Devi et al [2] proposed a congestion adaptive multi path routing protocol for load balancing in MANET. Their protocol assists in avoiding congestion control with the reactive route discovery technique, where the multiple paths are established using multi path Dijkstra algorithm. When any node detects congestion has occurred, it intimates source with Congestion Notice (CN) message. By Simulation results they have shown that their proposed approach alleviates the network congestion. S. Karunakaran et al [4] have presented a Cluster Based Congestion (CBCC) protocol that consists of scalable and distributed clusterbased mechanisms for supporting congestion control in mobile ad hoc networks.. The clusters autonomously and proactively monitor congestion with its localized scope. By simulation they have shown that their CBCC protocol is highly efficient in dealing multiple flows by achieving good delivery ratio and throughput with low delay. Senthil Kumaran et al [5] presented the Congestion Free Routing in Ad hoc networks (CFR) , based on dynamically estimated mechanism to monitor network congestion by calculating the average queue length at the node level. They have used a novel way called the dynamic congestion estimation technique, which analyzed the traffic fluctuation and categorized the congestion perfectly. After estimating the congestion status at the node level along a path, the CFR controls the congestion by alternative path. By simulation they have shown that CFR mechanism outperforms the AODV in terms of decreasing End to End delay, reduced routing overhead and increased packet delivery ratio. Geetha Jayakumar et al [9] proposed that Ad hoc networks are characterized by multi-hop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols plays an important role. Author compare the performance of two prominent on-demand routing protocols for mobile ad hoc networks: Dynamic Source Routing (DSR), Ad Hoc On demand distance Vector Routing (AODV). Author demonstrates that even though DSR and AODV share similar on-demand behavior, the differences in the protocol mechanisms can lead to significant performance differentials. In this paper author examine two on demand routing protocols AODV and DSR based on packet delivery ratio, normalized routing load, normalized MAC load, average end to end delay by varying the number of sources, speed and pause time. The simulation results bring out some important characteristic of differences between the two on demand routing protocols. Kazuya Nishimura et al [12] have discussed a routing protocol that uses multi-agents to reduce network congestion for a mobile Ad hoc Network. They have extended a dynamic routing protocol using mobile agent’s protocol to be more generic, so that it can be effective in the face of network congestion. They have developed both simulation environment and protocols and performed simulation under different conditions of mobility and traffic patterns to demonstrate the effectiveness of their approach. III.

Modified AODV Routing Protocol for Traffic Control Congestion adaptive routing has been examined in several studies. Estimating the level of the intermediate nodes using load or delay measurement, is the common approach. The favorable path is established based upon the collected information, which helps in avoiding the existing and developing congested nodes. The performance of routing protocols is affected by the service type of the traffic carried by the intermediate nodes. But no research has stated this so far. Before presenting themselves as aspirant to route traffic to the destination, the MANETs do not take the status of the load on network into account, for the route discovery process. AODV is a reactive and stateless protocol that establishes routes only as desired by a source node using route request (RREQ) and route reply (RREP) messages. Because of the newly arriving traffic face packet loss, long delays, and fail to transmit packets to the already queuing traffic. The mobile ad hoc networks performance degrades due to the congestion problem. A routing algorithm and a flow control scheme, includes the congestion control scheme can enhanced performance and give better solution to the problem of congestion.

Preeti, IJRIT- 442

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 440-446

METHODOLOGY 1. Initialize the MANET module, having 20 random mobility nodes approximately. 2. In this, we have implemented AODV routing approach, where Source node S wants to send a message to Destination node D, S searches its route table for a route to D. If there is no route, S initiates a RREQ message. 3. The overhead packets in AODV are due to RREQ, RREP and RERR messages (which Create Congestion). 4. Traffic Calculation: Condition 1: According to the routing Table, Node is not linked to other node Or Neighbour Table has one node is in 1 HOP range. Active Phase: Movement of any mobile node is > 50m (out of range) to any neighbor node, Then No Change in Gate Size. Condition 2: If node is linked to other nodes. Or Neighbour Table has multiple nodes in 1 HOP range. Active Phase: Movement of any mobile node < 50m (in range) to any neighbour node, Add the link into the routing table of every node within range and Increase the Gate Size by 1. At the starting of session initialize mobile nodes (10,20,30,40,60,80,100). After initialization provide speed to mobile nodes and refresh interval. Then movement of mobile nodes will be start. After moving calculation of distance covered by each mobile node will be start. During mobility, when a mobile node comes in range (with in 50 meters) of the mobile node then gate size will be increased by 1 to make 1 hop range connection. Gates are the input and output interfaces of modules. IV.

Simulation Environment

A. Simulation model and parameters We have use OMNET++ Version 4.1 to simulate our proposed technique. OMNeT++ is an object-oriented modular discrete event simulator. In the simulation, mobile nodes move in a 800 meter x 600 meter region. The number of nodes can be 10, 20, 40, and 50 according to need. Initial locations and movements of the nodes are obtained using random waypoint (RWP) model. It is assumed that each node moves independently with the same average speed. All nodes have same transmission range of 50 meters. The node speed is 5 m/s. TableI. Simulation Parameters

No. of Nodes Area Size MAC Radio Range Simulation Time Routing Protocol Mbility Model Speed Simulation Run

10,20,40,50,60,80 800 X 600 802.11e 50 m 50 sec AODV Random Way Point 5 m/s 1100 Events

B. Performance metrics In simulation the different types of scenarios are considered based upon traffic density. The proposed work involves the measurement of control overhead, relative speed, event density. In this paper a comparison between modified AODV Routing Protocol for Traffic Control and AODV is made.The performance is evaluated mainly according to following metrics. • • • •

Performance: Events processed per second Relative Speed: Simulated seconds processed per second Event Density: Events per Simulated Seconds Control Overhead: ratio of the control information sent to the actual data

The results show the Performance of Modified AODV Routing Protocol for Traffic Controlin Mobile Ad-hoc Networks. The Performance of this routing protocol is improving as the session going on one after another. (Session 1=1100Events). The same improvement is going on in case of Relative Speed and Event Density. When no. of nodes is increasing we can say that the traffic is increasing.

Preeti, IJRIT- 443

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 440-446

1) Effect on Performance, Relative Speed, Event De Density In the initial experiment, we measure the performance of the proposed technique by varying theNumber of nodes as 10,20,30,40,60,80,100.

Table 1.

Performance (no of nodes VS Time)

Table 2.

Relative Speed (no of nodes VS Time)

Table 3.

Event Density (no of nodes VS Time)

From Figure 1 We can see that as 10 nodes takes 17 sec for first session, for no of nodes 40 it takes 4.98 sec so on. Performance of Propos Proposed protocol is improving as the session going on one after another. From Figure 2 we can see that when no. of nodes iss increasing we can say that the traffic is increasing. It means the data will take more time to reach at the destination but in our proposed protocol, data is taking less time to reach at the destination, as the traffi traffic is increasing. From Figure 3 As we can see that with increasing the number of nodes it will take less time. When numbers of nodes are around 60 to 80 then more events will occur. 2) Effect on Performance In the next experiment, we compare our proposed technique by varying the number of nodes aass 10, 20, 30,40,60,80,100.

Preeti, IJRIT- 444

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 440-446

Table 4.

Comparison of Performance of Modified AODV Routing Protocol for Traffic ControlWith With AODV

From Figure 4 we can see that Performance of Proposed Technique is more as compared to AODV protocol. 3) Effect on Control Overhead In the next experiment, we compare our proposed technique by varying the number of nodes as 10, 20,30,40,50.

Table 5.

Comparison of Control Overhead of Proposed Flexible CongestionControl Protocol with AODV

From Figure 5 we can see that Proposed Technique have less overhead as compare to AODV. V.

CONCLUSION

The main purpose of this paper, to control congestion by the means of controlling traffic in Mobile Ad-hoc hoc networks. In this paper we discuss how the proposed technique affect the high delivery ratio and high performance and reduced delay with relative speed and low control overhead when compared with the existing AODV protocol. According to the Performance of Predictive Congestion control and Flexible AODV Routing in Mobile Ad-hoc hoc Networks the conclusion is: as the session going on one after another, we are increasing the no of nodes in case of Performance, Relative Speed and Event Density. It means we are increasing the message overhead and traffic traffi as well but our new protocol, otocol, is taking less time in all three cases. VI.

FUTURE WORK

In future work, we can also add the energy parameter, such as how much energy is consumed by proposed protocol when it increases the gate size and also we can calculate the control overhead means number of route request or route reply packet can be handled by the proposed protocol. Topology control in ad-hoc hoc networks is the problem of adjusting the transmission power at network nodes in order to achieve the optimal topology that maximizes network performance. Several related works have shown that the optimal throughput per unit energy performance can be achieved when the network topology is minimally connected. REFERENCES [1] Vishnu kumar Sharma, Dr. Sarita Singh Bhadhuria “Mobile Agent Based Congestion Control using AODV Routing Protocol Technique for MANET” International Journal of Wireless and Mobile networks(IJWMIN) , Vol. 4, No. 2, April 2012. [2] P. Rama Devi and Dr. D. Srinivasa ivasa Rao “ Congestion Adaptive Hybrid Multi Multi-path path Routing Protocol for Load Balancing in Mobile Ad Hoc Networks” International Journal of Computer C Science and Telecommunications, elecommunications, Vol. 2, December 2012.

Preeti, IJRIT- 445

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 440-446

[3] Robin Choudhary, Niraj Singhal “A Novel Approach for Congestion Control in MANET” International Journal of Engineering and Innovative Technology (IJEIT), Vol. 2, November 2012. [4] S.Karunakaran, P.Thangaraj “A Cluster Based Congestion Control Protocol For Mobile Ad hoc Networks” International Journal of Information Technology and Knowledge Management, Vol. 2, No. 2, December 2010. [5] T. Senthil Kumaran, V. Sankaranarayanan “Early congestion detection and adaptive routing in MANET” Egyptian Informatics Journal , December 2012. [6] Xiaoqin Chen, Haley M. Jones, A.D.S Jayalath “Congestion Aware Routing Protocol for Mobile Ad-hoc Networks”, Department of Information Engineering, National University, Canberra. [7] T. G. Basavaragu, Subir Kumar Sarakar “Ad-hoc Mobile Wireless Network” Averbach Publications (2008). [8] OMNeT++ website, www.omnetpp.org. [9] Geetha Jayakumar and Gopinath Ganapathy “Performance Comparison of Mobile Ad-hoc Network Routing Protocol” , International Journal of Computer Science and Network Security (IJCSNS), Vol. 7, No.11,November 2007. [10] Raju Kumar, Riccardo Crepaldi, Hosam Rowaihy, Albert F. Harris III, GuohongCao, Michele Zorzi, Thomas F. La Porta”Mitigating Performance Degradation in Congested Sensor Networks”, IEEE Transactions on Mobile Computing, Vol. 7, No. 6,June 2008. [11] Xiaoqin Chen, Haley M. Jones, A.D.S Jayalath ”Congestion Aware Routing Protocol for Mobile Ad-hoc Networks”, Department of Information Engineering, National University, Canberra. [12] Kazuya NISHIMURA and Kazuko TAKAHASHI School of Science and Department Kwansei Gakuin University “A Multi-Agent Routing Protocol with Congestion Control for MANET”, School of Science and Department Kwansei Gakuin University.

Preeti, IJRIT- 446

Modified AODV Routing Protocol for Traffic Control in ...

using adaptive routing with congestion control technique for mobile ad hoc networks. .... Energy Management: Energy management is defined as the process of ...

462KB Sizes 1 Downloads 289 Views

Recommend Documents

Prevention of Blackhole Attacks on Aodv Routing Protocol In ... - IJRIT
1Assistant Professor, Dept. of Computer Applications, Pachaiyappa's College, ... protocol(DSDV), Wireless Routing Protocol (WRP), Cluster-Head Gateway.

Prevention of Blackhole Attacks on Aodv Routing Protocol In ... - IJRIT
and destination with minimum overhead and minimum bandwidth consumption so that packets are delivered in a timely manner. .... We deploy a credit mechanism to check the next hop whether it can be trusted or not. .... other wireless networks, and the

A Security Enhanced AODV Routing Protocol Based On ...
Abstract—Ad Hoc networks are characterized by open medium, dynamic topology ... provide secure and reliable data forwarding services, nodes should priorly ...

A Survey on Routing Protocol Routing Protocol Routing ... - IJRIT
The infrastructure less and the dynamic nature .... faster convergence, it employs a unique method of maintaining information regarding the shortest distance to.

A Survey on Routing Protocol Routing Protocol Routing ... - IJRIT
CGSR Cluster head Gateway Switch Routing protocol [9] is a multichannel operation ..... protocols of mobile ad-hoc networks”, International Journal of Computer ...

AODV-BR: Backup Routing in Ad hoc Networks
Computer Science Department. University ... A recent trend in ad hoc network routing is the reactive on-demand ... Mobile Information Systems (GloMo) program.

On Securing MANET Routing Protocol Against Control Packet Dropping
For ex- ample, simply by dropping RREQ (Route Request) packets a selfish ... This way, data packets will be sent only through .... special set we call a suspicious set. ... ios. The curves presented hereafter represent the averaged values for those c

Performance Enhancement of Routing Protocol in MANET
Ghaziabad, U.P., India ... Service (QoS) support for Mobile Ad hoc Networks (MANETs) is an exigent task due to dynamic topology and limited resource. To support QoS, the link state ... Mobile ad hoc network (MANET) is a collection of mobile devices,

Modified Bloom Filter for Efficient Congestion Control in Wireless ...
in access points of a Wireless Network based on DiffServ ... Bloom filters find application ..... between a customer and a service provider that specifies the.

Traffic dynamics based on local routing protocol on a ...
Feb 10, 2006 - Complex networks can describe a wide range of systems in nature and ..... lations are not well confirmed with the analytic predictions for large .

A Quick Guide to AODV Routing
AODV is a method of routing messages between mobile computers. It allows these mobile computers, or nodes, to pass messages through their neighbors to.

Cross-Layer Routing and Multiple-Access Protocol for ...
packet flows or real-time streams, we are able to provide quality of service guarantees for selected group of flows. Transmission power control in wireless ...

Cross-Layer Routing and Multiple-Access Protocol for ... - CiteSeerX
Requests are considered for store-and-forward service by allocating slots for ..... [21] S. M. Selkow, The Independence Number of Graphs in. Terms of Degrees ...

Improved Optimal Link State Routing (OLSR) Protocol
performance by selecting an appropriate “Hello Refresh Interval” for better throughput and select suitable MPR nodes, to reduce overhead and packet duplicity.

A Secure Distributed Anonymous Routing Protocol for ...
for the session, and the signature of the original received message. b. Forward the new ..... and Digital Pseudonyms. Communications of the ACM, vol. 24, no.

Secure Adhoc Routing Protocol for Privacy Preservation - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 9, .... Communication anonymity in data management has been discussed ..... “Rumor riding: anonymizing unstructured peer-to-peer systems,” IEEE Trans.

Secure Adhoc Routing Protocol for Privacy Preservation - IJRIT
In this particular paper, we define stronger privacy requirements relating to ..... “Rumor riding: anonymizing unstructured peer-to-peer systems,” IEEE Trans.

Investigating Routing-Protocol Characteristics with MLC - GitHub
Workshop, Computer Architecture Department UPC, Barcelona, Spain November 2011 ... Create 100-nodes network on your laptop. ... s 0:0:0:10:0:1анd Broadcastанo veth1001_1анj markаннmarkset 0x3аннmarktarget ACCEPT.

Effect of Black Hole Attack in AODV Protocol of Adhoc Wireless Networks
black hole attack, a malicious node impersonates a destination node by sending a ... writing a new AODV protocol using C++, to simulate the Black Hole attack.

Zero-Modified Distributions for Inventory Control under ...
Three operational performances are considered: ready rate (RR), the expected number of backorders (BO) and on hand inventory levels (I). The ready rate is the ...

Effect of Black Hole Attack in AODV Protocol of Adhoc Wireless Networks
Periodically updating route tables keeps the nodes awake and quickly exhausts their batteries,. • Many redundant route entries to the specific destination needlessly take place in .... discovery process and influence the network integrity in a wide

Iterative Route Discovery in AODV
A major challenge in the design of ad hoc network is the ..... Thus, it is logical to assess the behavior of an approach .... [9] D. B. Johnson and D. A. Maltz.

Filtering Network Traffic Based on Protocol ... - Fulvio Risso
Let's put the two together and create a new automaton that models our filter tcp in ip* in ipv6 in ethernet startproto ethernet ip ipv6 tcp http udp dns. Q0. Q3. Q1.