Hardware Implementation of TORA Protocol in Mobile Ad-hoc Network Node
نویسندگان
چکیده
منابع مشابه
Study of TORA FOR Mobile Ad-hoc NetworK
Mobile Adhoc Networks [MANETs] involve communication between various mobiles hosts which themselves act as routers and help in transmitting packets to the destination through intermediate nodes which lie within the radio transmission range of each other. Due to high level of dynamism, reliable, fast and energy efficient routing of data packets from the source to the destination is an area of gr...
متن کاملTemporal Modeling of Node Mobility in Mobile Ad hoc Network
Ad-hoc network consists of a set of identical nodes that move freely and independently and communicate via wireless links. The most interesting feature of this network is that it does not require any predefined infrastructure or central administration and hence it is very suitable for establishing temporary communication links in emergency situations. This flexibility however is achieved at the...
متن کاملHardware Implementation of Intrusion detection system for Ad-Hoc Network
Received Apr 24, 2016 Revised Aug 3, 2016 Accepted Aug 18, 2016 New technologies have been developed in wireless adhoc network need more security. To widespread the adhoc networks we turn in the attention of wireless hand held device mobile phones communicate with short distance using wireless lan card or Bluetooth. The performance of mobile phone are improved greatly for last few years .so sec...
متن کاملEnhancing Node Cooperation in Mobile Ad Hoc Network
Mobile Ad Hoc Networks (MANET) have been a research interest over the past few years, yet, node cooperation has continually been a recognized issue for researchers. Because of their lack of infrastructure, MANETS depend on the cooperation of intermediate nodes in order to forward or send packets of their own to other nodes in the network. Therefore, nodes located in the central area of the netw...
متن کاملCommunity based Node Cooperative in Mobile Ad-Hoc Network
Generally In a network you will find selfish nodes , which don’t want to forward other’s information, Because of these nodes network performance will decrease drastically, sometimes even it get disconnected. From last few years research is going on this problem, and there are so many solutions were proposed , which are related to some incentive approaches, and some Game theory approaches. But i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology Journal
سال: 2007
ISSN: 1812-5638
DOI: 10.3923/itj.2007.345.352