.

Wednesday, July 24, 2019

Mesh Networks Coursework Example | Topics and Well Written Essays - 10000 words

Mesh Networks - Coursework Example As organizations are relying more on high-speed wireless networks, security is a vital factor. Wireless security is a framework that emphasizes on prevention of workstations or networks from unauthorized access. An automated system known as mobile ad-hoc network (MANET) is integrated within the wireless networks to establish communication between wireless nodes or access points. However, MANET does not have centralized administration. MANET is defined as â€Å"Mobile Ad Hoc Network (MANET) refers to a type of mobile network in which each node has the ability to act as a router, permitting adaptable multi-hop communications† [3]. The ad-hoc on demand distant vector protocol (AODV) that is operated by MANET provides loopholes for the hackers to gain access to the network or the system via a wireless network. AODV is widely used due to its significant advantages such as lower network overhead with a complex algorithm. However, AODV does not maintain the database for routing infor mation in the router. This is the area where there is a possibility of the hackers to break in the network. This paper will discuss the details associated with attacks incorporated with AODV. Moreover, other type of threats that may affect the domestic wireless network operating on an 802.11 will also be defined and discussed. 3. Introduction MANET is constructed on multiple routers knows as multi hop communication paths, these multi hop communication paths, can be dislocated any time and in any direction. The routing protocols that are associated with MANET are categorized in to hybrid, table-driven and demand-driven routing protocols [1]. Table-driven protocols attempt to synchronize routing information with the routing table for each wireless router. For example, Destination Sequenced Distance Vector (DSDV) and Wireless Routing Protocol (WRP) protocols fall under the category of table-driven protocols. Demand-driven protocols are associated with AODV and dynamic source routing pr otocol (DSR). Hybrid routing protocols interlinks with the other two protocols i.e. table driven and demand driven routing protocols. The wireless MANET network is associated with protocols that are not well designed in terms of network security, as there is no centralized administration to monitor or configure MANET. However, most of the wireless network protocols associated with MANET is designed for optimum bandwidth utilization but not for optimal security. These factors have made the wireless network vulnerable for the hackers and cyber criminals. One of the examples of mesh networks are illustrated in Fig. 1. Figure 1 Source: (Siraj and Bakar 1263-1271) One of the latest examples for mesh network is the youtube architecture, as shown Fig 1.2. Figure 2 Source: (Staehle et al. 144-148) In this competitive and evolutionary world of technological advancements, threats and vulnerabilities are a great concern. Similarly, any wireless protocol must address security issues during the design phase. The protocol must add

No comments:

Post a Comment