Wednesday, April 24, 2019
Mesh Networks Coursework Example | Topics and Well Written Essays - 10000 words
Mesh Networks - Coursework ExampleAs organizations are relying more on high-speed wireless networks, protective cover is a vital factor. Wireless security is a framework that emphasizes on prevention of workstations or networks from unauthorised access. An automated system known as mobile ad-hoc network (MANET) is integrated within the wireless networks to cause communication between wireless invitees or access points. However, MANET does not have centralized administration. MANET is defined as Mobile Ad Hoc Network (MANET) refers to a type of mobile network in which each node has the ability to act as a router, permitting adaptable multi-hop communications 3. The ad-hoc on demand distant sender protocol (AODV) that is operated by MANET provides loopholes for the hackers to gain access to the network or the system via a wireless network. AODV is astray used due to its significant advantages such as lower network overhead with a interwoven algorithm. However, AODV does not main tain the database for routing learning in the router. This is the area where there is a possibility of the hackers to break in the network. This paper will discuss the details associated with attacks incorporated with AODV. Moreover, other type of threats that may affect the internal wireless network operating on an 802.11 will also be defined and discussed. 3. Introduction MANET is constructed on multiple routers knows as multi hop communication paths, these multi hop communication paths, can be dislocated whatsoever time and in any direction. The routing protocols that are associated with MANET are categorized in to hybrid, table- operate and demand-driven routing protocols 1. Table-driven protocols attempt to synchronize routing information with the routing table for each wireless router. For example, Destination Sequenced Distance Vector (DSDV) and Wireless Routing Protocol (WRP) protocols fall under the category of table-driven protocols. Demand-driven protocols are associa ted with AODV and dynamic source routing protocol (DSR). Hybrid routing protocols interlinks with the other two protocols i.e. table driven and demand driven routing protocols. The wireless MANET network is associated with protocols that are not well designed in term of network security, as there is no centralized administration to monitor or configure MANET. However, closely of the wireless network protocols associated with MANET is designed for optimum bandwidth utilization but not for optimal security. These factors have do the wireless network vulnerable for the hackers and cyber criminals. One of the examples of mesh networks are illustrated in Fig. 1. Figure 1 bloodline (Siraj and Bakar 1263-1271) One of the latest examples for mesh network is the youtube architecture, as shown Fig 1.2. Figure 2 Source (Staehle et al. 144-148) In this competitive and evolutionary world of technological advancements, threats and vulnerabilities are a great concern. Similarly, any wireless p rotocol must address security issues during the design phase. The protocol must add
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.