Wednesday, 7 November 2012

AODV Routing Protocol:


AODV:
            Adhoc Ondemand Distance Vector Routing Protocol

                          http://www.youtube.com/watch?v=bZGic0j1rXs

MANET Attacks:


Attack:
             An attack is nothing but that disrupts the normal network operation.

    1.Passive attacks are those, launched by the  adversaries solely to snoop the data exchanged in the network. These adversaries in any way don’t  disturb the operation of the  network. Such attacks identification becomes very difficult since  network itself does not affected and they can reduced by using  powerful encryption techniques 
   Example: Snooping, eavesdropping, traffic analysis, monitoring

    2.Active attack tries to alter or destroy the information that is being exchanged, thereby disturbing the normal functionality of the network.
   Example:Wormhole, black hole, gray hole, byzantine, information  
                   disclosure, resource consumption, routing attacks 



Explanation for Routing Protocol


Proactive routing protocols: In proactive protocols, the routes are discovered before usage in order to avoid the latency incurred in finding the route. These protocols require the nodes to maintain routing and network topology information through one or more tables. Any change in the network needs to be reflected in these tables by propagating the changes throughout the network. Examples of this class include DSDV, WRP.
Reactive routing protocols: Reactive protocols try to conserve the precious battery power of the nodes by discovering routes only when it is required. Only when there is a packet to be transferred, the route discovery protocol is initiated by the source and the route is found. Because of this nature, this class of routing protocols is also called as “Dynamic routing protocols”. Examples of this class include DSR, AODV and ABR. 
Hybrid protocols: Hybrid protocols make use of both reactive and proactive approaches. They typically offer means to switch dynamically between the reactive and proactive parts of the protocol. Examples of this class include TORA and ZRP.