+234 813 0686 500
+234 809 3423 853
info@grossarchive.com

EFFICIENT NETWORK ROUTING PROTOCOL WITH EFFECTIVE DATA TRANSFER WITHOUT PACKET LOSS OVER THE AD HOC NETWORK (A CASE STUDY OF UBA ENUGU)

  • Type:Project
  • Pages:59
  • Format:Microsoft Word
(Computer Science Project Topics & Materials)
ABSTRACT
The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to adapt TCP to Ad hoc environment, improvements have been proposed in the literature to help TCP to differentiate between the different type of losses indeed, in mobile or static Ad hoc networks losses are not always due to network congestion  as it is mostly the in wired networks. In this report, we present an overview of this issue an a detailed discussion of major factor involved. In particular, we show how TCP can be affected by mobility and lower layers protocols. In addition, we survey the main proposals which aim at adapting TCP to mobile and static Ad hoc environments. 

TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL PAGE 
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS 

CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVE
1.4 SCOPE OF THE STUDY
1.5 LIMITATION OF THE STUDY
1.6 DEFINITION OF TERMS

CHAPTER TWO
2.0 LITERATURE REVIEW

CHAPTER THREE
3.0 METHODOLOGY FOR FACT FINDING AND DETAILED DISCUSSION OF THE SUBJECT MATTER
3.1 METHODOLOGY FOR FACT FINDING 
3.2 DETAILED DISCUSSION OF THE SUBJECT MATTER 

CHAPTER FOUR
4.0 THE FUTURE, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 THE FUTURE 
4.2 IMPLICATIONS
4.3 CHALLENGES 

CHAPTER FIVE
5.0 SUMMARY, RECOMMENDATION AND CONCLUSION
5.1 SUMMARY 
5.2 RECOMMENDATION 
5.3 CONCLUSION 
REFERENCES

EFFICIENT NETWORK ROUTING PROTOCOL WITH EFFECTIVE DATA TRANSFER WITHOUT PACKET LOSS OVER THE AD HOC NETWORK (A CASE STUDY OF UBA ENUGU)

Share This

Details

Type Project
Department Computer Science
Project ID CPU1521
Price ₦3,000 ($9)
No of Pages 59 Pages
Format Microsoft Word

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1521
    Price ₦3,000 ($9)
    No of Pages 59 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to... Continue Reading
    ABSTRACT Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to... Continue Reading
    ABSTRACT This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous... Continue Reading
    CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
    ABSTRACT Multicast routing is an effective way to communicate among multiple hosts in a network. It outperforms the basic broadcast strategy by sharing resources along general links, while sending information to a set of predefined multiple destinations concurrently. However, it is vulnerable to component failure in ad hoc network due to the lack... Continue Reading
    SOURCE CODE INCLUDED ABSTRACT In the fundamental operation in computer science, Graph algorithm is a great tool used to solve problems related to graph theory and this algorithms have wide applications in solving routing problems. For the purpose of this project four algorithms from the many types of graph algorithms were selected which are... Continue Reading
    ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
    ABSTRACT The world has changed a lot in the last couple of decades. Instead of simply dealing with local or regional concerns, many businesses now have to think about global markets and logistics. Many companies have facilities spread out across the country or around the world, and there is one thing that all of them need, a way to maintain cost... Continue Reading
    ABSTRACT Interest in large-scale sensor networks for both civilian and military applications is burgeoning. The deployment of such networks will require new approaches in resource discovery, query processing and data routing. This paper presents a framework and some analytic results for query satisfaction and data routing in networks consisting of... Continue Reading
    ABSTRACT This project describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, interposed mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous network... Continue Reading