• فهرس المقالات Mobile Ad hoc Networks

      • حرية الوصول المقاله

        1 - Improvement of the mechanism of congestion avoidance in mobile networks
        Maryam Bagheri Bita Amirshahi Mehdi Khalili
        Mobile ad hoc network congestion control is a significant problem. Standard mechanism for congestion control (TCP), the ability to run certain features of a wireless network, several mutations are not common. In particular, the enormous changes in the network topology a أکثر
        Mobile ad hoc network congestion control is a significant problem. Standard mechanism for congestion control (TCP), the ability to run certain features of a wireless network, several mutations are not common. In particular, the enormous changes in the network topology and the joint nature of the wireless network. It also creates significant challenges in mobile ad hoc networks (MANET), density is one of the most important limitations that disrupts the function of the entire network, after multi-path routing can load balance in relation to the single-path routing in ad hoc networks better, so the traffic division multiple routs congestion is reduced. This study is a multi-path load balancing and congestion control based on the speed of rate control mechanism to avoid congestion in the network provides communication flows. Given such a speed control method that is consistent is that the destination node copy speed is estimated at intermediate nodes and its reflection in the In the forward direction confirmation to the sender sends a packet, therefore the rate quickly estimate The results of the simulation has been set to demonstrate that a given method better package delivery speed and expanded capacity and density to be effective checks congestion control method is better than The result traditional. تفاصيل المقالة
      • حرية الوصول المقاله

        2 - A Survey on Routing Protocols in Vehicular Ad hoc Network
        Elham Bozorgzadeh hamid barati Ali Barati
        Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) that have inherited some of this type of network's features. Due to road accidents, these networks are a promising technology to increase passengers' comfort and safety and increase roa أکثر
        Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) that have inherited some of this type of network's features. Due to road accidents, these networks are a promising technology to increase passengers' comfort and safety and increase road safety and provide traffic information. In vehicular ad hoc networks, it is challenging to design an efficient routing protocol for data routing in vehicles due to rapid topology changes and frequent disconnections. Applications in these fields require efficient routing protocols. The design of a routing protocol must be done both in terms of useful information dissemination and under the information dissemination environment's actual conditions. In this paper, we overview the existing VANET routing protocols; As there are different routing protocols in VANET, we need to do detailed research on various routing protocols and their strengths/weaknesses. The routing protocols essentially concentrate on delay, packet delivery magnitude relation, information measure utilization, and plenty of alternative factors. However, there are challenges to select a routing protocol to a dynamic topology and special characteristics of VANETs. VANET is extremely advantageous because it helps in up the road safety through reducing the amount of accidents by warning drivers regarding the danger before they really face it and different facilities to comfort drivers. تفاصيل المقالة
      • حرية الوصول المقاله

        3 - A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
        Maryam Fathi Ahmadsaraei Abolfazl Toroghi Haghighat
        By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and أکثر
        By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attacks. For example in black hole attack, an attacker catches packets and throw them away, instead of forwarding them to their destinations. By using wireless intrusion detection systems, wireless networks can be protected. In this study, we introduce a new intrusion detection system to encounter black hole attack. This system is based on a combination of anomaly based intrusion detection (ABID) and specification based intrusion detection (SBID), we also use a new intrusion response. The analysis of simulation results (with NS-2) show that our method is success by using three measures: throughput, packet loss rate and packet delivery rate in comparing with ABID and SBID. تفاصيل المقالة
      • حرية الوصول المقاله

        4 - A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
        Maryam Fathi Ahmadsaraei Abolfazl Toroghi Haghighat
        In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networ أکثر
        In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand distance vector routing protocol with NS-2 simulation. Then we review all kinds of intrusion detection systems (IDS) in large and small mobile ad hoc networks. We simulate these networks when they are under single black hole attack and with the existence of IDS byNS-2 simulator software. Finally, we compared the results according to throughput, packet loss ratio and packet delivery rate with each other. تفاصيل المقالة