Routing protocols Essays

  • Importance Of Routing Protocols

    1646 Words  | 4 Pages

    CHAPTER 3 Routing Protocols The nodes in Ad hoc network are free to move in random fashion within the network region due to which the network topology changes randomly or dynamically. This random movement of nodes plays an important role on the performance of routing protocols[30,31]. Considering the node mobility feature it is essential to choose a suitable routing protocol based on the network environment. Because the nodes are mobile in nature and are moving randomly anywhere so its an important

  • Enhanced Interior Gateway Routing Protocol

    588 Words  | 2 Pages

    Enhanced Interior Gateway Routing Protocol Enhanced Interior Gateway Routing Protocol is a distance vector routing protocol, where a router shares information with neighboring routers about the network in an autonomous system and shares only the information that neighboring routers don’t have instead of the whole message. It is an enhanced version of Interior Gateway Routing Protocol, both of them uses the same distant vector technology and the distance information within them is not changed. EIGRP

  • Characteristics and Challenges of Developing Multicast Routing Protocol

    1377 Words  | 3 Pages

    multicast routing protocols, like the dynamically changing network topology, limitation of network scalability. There are different types of protocols like unicast protocols [1], [2], cluster based protocols [3] In this paper we discuss about multicast routing for vehicular Ad hoc network which is different from other Ad Hoc networks [4]. Generally there are two types of multicast routing protocols in wireless networks. Tree-based multicast routing protocol, mesh based routing protocol [5]-[8]. In

  • Routers An Overview

    1538 Words  | 4 Pages

    information age. To cover the complete subject of routers and routing, would be beyond the scope of this research paper. However the basic definition of a router is “ A device used to connect networks of different types, such as those using different architectures and protocols. Routers work at the Network layer of the OSI model. This means they can switch and route packets across multiple networks. They do this by exchanging protocol-specific information between separate networks. Routers determine

  • Delay Tolerant Networking (DTN)

    2494 Words  | 5 Pages

    extending existing protocols or inventing new ones in a coordinated, architecturally clean fashion, to improve network communication when connectivity is periodic, intermittent and/or prone to disruptions and when multiple heterogeneous underlying networks may need to be utilized to effect data transfers. The challenges of this field of research are: 1. Large delays (due to physical distances, small bandwidth, or extended disconnection). 2. A second challenge is efficient routing in the presence of

  • Overlay Networking Essay

    1968 Words  | 4 Pages

    technologies give freedom to implement any routing protocol and network design on top of the internet. There are many proven overlay technologies are there, however they also have some shortcomings, which lead us think about more scalable and secure overlay technology. Some of the disadvantages of the overlay technologies that are currently being used are complicated configuration and networking topology, difficult in expansion and maintenance, GRE (Generic Routing Encapsulation) tunnel’s inability to

  • Sybil Attack Essay

    631 Words  | 2 Pages

    fabricating fake identities. By impersonating a large number of nodes in the network, the attacker forbids other nodes from using those addresses, it can escape from detection systems. This attack can strongly harm geographic routing protocols, and can even threat multiple path routing schemes and node localization [18]. B. Sinkhole attack A sinkhole attacker places itself at very strong status in the network and informs a high quality route to destination or spoofs neighboring nodes that are neighboring

  • Characteristics Of VANET

    2386 Words  | 5 Pages

    different ... ... middle of paper ... ...warding. This protocol also adopt periodic broadcast i.e. used for reduced network fragmentation. In this protocol, a busted vehicle disseminate an alert message to all vehicles in the group and the neighbor which received alert message analyze its applicability based on their location informing to the risk area. Robust Vehicular Routing Protocol (ROVER) [9] is geographical multicast protocol. In ROVER, control packets are using broadcasting and data packets

  • Network Switching and Routing

    1254 Words  | 3 Pages

    Switching & Routing The purpose of this paper is to provide a better understanding of switching and routing used in a network environment and familiarize the reader with various hardware and software associated with there functions. This paper will look at some switching concepts that will include store and forward switching, cut through switching, fragment free switching, and V-Lan. This paper will also cover routing concepts, along with some comparisons including routed vs. routing protocols, Classful

  • Networks: An Open Shortest Path First (OSPF) Protocol

    1147 Words  | 3 Pages

    An Open Shortest Path First (OSPF) protocol is the most used interior gateway protocol and computation intensive protocol where energy consumption in Internet Protocol (IP) networks is the main concern. The energy in an IP network can be saved by allowing a subset of IP router interfaces on sleep mode setting during the low traffic hours through the model of “move” by dint of an Energy Aware Routing (EAR) strategy, which is completely compatible with OSPF and is based on the “Shortest Path Tree

  • Network Management

    1212 Words  | 3 Pages

    fixing them before they affect the network users, making sure network security is fully updated and capable of protecting the network from all threats, restricting employee access to files they do not require, updating networks with different routing protocols and making sure two networks are compatible in the event of a business merger or expansion and resource keeping. Resource keeping refers to keeping track of the resources on a network and making sure that users who need it have access. Network

  • Mobile and Wireless Communication: Mobile Ad Hoc Networks

    2277 Words  | 5 Pages

    functionalities of the network when the fixed infrastructure is not available (Techtermsn.d.). This report will provide an insight view of potential of ad hoc network and the technical issues that developers and the protocol developers face with it. These issues could be such as internet connection, routing service, resource discovery etc. In this report we will have a closer view of Mobile Ad Hoc networks, what are their basic origin and their properties ... ... middle of paper ... ...le-ad-hoc-network-characteristics-and-features/

  • Incorporating Congestion Control in BGP considering its Economic & Policy Effects

    1164 Words  | 3 Pages

    Gateway Protocol (BGP) is responsible for communication between different Autonomous Systems (AS). The Internet is comprised of a large number of Autonomous Systems (AS) and exchanging routing information between two or more AS is achieved using BGP. Inter-domain routing in the Internet is carried out majorly by one protocol – Border Gateway Protocol (BGP). BGP is a distance-vector protocol and uses TCP as its underlying mechanism. BGP peers are the routers running BGP that exchange routing information

  • Nt1310 Unit 3

    869 Words  | 2 Pages

    col The attacks targets the routing information which is being exchanged among nodes. The data in the table is altered and attacker then attracts or repel network traffic, generate false error messages, increase latency or even partition the network. The next node generally depends on the previous node(s) table to create routing paths. Selective forwarding The attacker forwards only specific packets to next node, it generally chooses which kind of packet to forward. These attacks are effective if

  • Wireless Sensor Network Essay

    1346 Words  | 3 Pages

    First, considering the high density of nodes, the routing protocols should route data over long distances, irrespective of the network structure and size of the network. Some of the active nodes may fail during network operations due to depletion of the energy of sensor nodes or hardware breakdowns or various

  • Decision Support Systems Used in Network Hardware

    1868 Words  | 4 Pages

    as the number of stations grows. Another way of saying this is that the speed of the hub is shared. (Panko 108)” As, you can tell, hubs are simple, and don’t use more information than needed. Switches, which are layer 2 devices, use decision based routing by storing NIC hardware addresses and port numbers on a table in the switch. By doing this, when data is received by the switch, it knows where the source was, and where the data needs to go. This allows for faster data transmission for all NICS that

  • Essay On Bp Hijacking

    878 Words  | 2 Pages

    1. THE NEED OF DEFENSES AGAINST BGP HIJACKING There are various routing risks to anyone who connects to the Internet today: downtime, hijacking and now even wholesale traffic interception [1]. Not many people are aware of these risks, because of which they are not being managed or measured appropriately. One of the most common forms of threat to the world of Internet today is BGP hijacking. BGP Route Hijacking occurs when a rogue BGP peer maliciously announces a victim's prefixes in an effort to

  • Nt1330 Unit 1 Term Paper

    940 Words  | 2 Pages

    task. Explain how the routing schemes handle this problem. Ans. Routing scheme means to find a path from once place to another on which packets can travel. In most of the cases, we need multiple routers in order to route the packet to the destination. Routing contains three elements: Routing protocols, Routing Algorithms, and Routing databases. • Routing protocols allow the information to be gathered and distributed. • Routing algorithms are used to determine paths. • Routing databases, which will

  • The Importance Of Accessibility In Human Geography

    775 Words  | 2 Pages

    3.2. Accessibility Accessibility is often used in human geography for the evaluation of spatial distribution of facilities and functions. A place is accessible only when it can be reached easily by pedestrians or by an appropriate mode of transport; it denotes the ease with which any land-use activity can be reached from a location, using a particular transport system[13]. Accessibility is also considered as the opportunities available to an individual or type of person to take part in a particular

  • Right Wood Router Essay

    913 Words  | 2 Pages

    between handheld and table routing. Plunge routers allows vertical movement while cutting so that you can shove you bit into the wood and make desired grooves. Plunge router gives precision in cutting and helps you make intricate patterns and profiles on wooden board. On the contrary, Fixed Base router is best for shaping edges. It usually has a compact body size and better handle placement. By and large, it is an all-purpose router and can do almost all kind of routing. If you think you need both