EFFICIENT NETWORK ROUTING PROTOCOL WITH EFFECTIVE DATA TRANSFER WITHOUT PACKET LOSS OVER THE AD HOC NETWORK (A CASE STUDY OF UBA ENUGU)

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1521
  • Access Fee: ₦5,000 ($14)
  • Pages: 59 Pages
  • Format: Microsoft Word
  • Views: 779
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853
ABSTRACT
The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to adapt TCP to Ad hoc environment, improvements have been proposed in the literature to help TCP to differentiate between the different type of losses indeed, in mobile or static Ad hoc networks losses are not always due to network congestion  as it is mostly the in wired networks. In this report, we present an overview of this issue an a detailed discussion of major factor involved. In particular, we show how TCP can be affected by mobility and lower layers protocols. In addition, we survey the main proposals which aim at adapting TCP to mobile and static Ad hoc environments. 

TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL PAGE 
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS 

CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVE
1.4 SCOPE OF THE STUDY
1.5 LIMITATION OF THE STUDY
1.6 DEFINITION OF TERMS

CHAPTER TWO
2.0 LITERATURE REVIEW

CHAPTER THREE
3.0 METHODOLOGY FOR FACT FINDING AND DETAILED DISCUSSION OF THE SUBJECT MATTER
3.1 METHODOLOGY FOR FACT FINDING 
3.2 DETAILED DISCUSSION OF THE SUBJECT MATTER 

CHAPTER FOUR
4.0 THE FUTURE, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 THE FUTURE 
4.2 IMPLICATIONS
4.3 CHALLENGES 

CHAPTER FIVE
5.0 SUMMARY, RECOMMENDATION AND CONCLUSION
5.1 SUMMARY 
5.2 RECOMMENDATION 
5.3 CONCLUSION 
REFERENCES

EFFICIENT NETWORK ROUTING PROTOCOL WITH EFFECTIVE DATA TRANSFER WITHOUT PACKET LOSS OVER THE AD HOC NETWORK (A CASE STUDY OF UBA ENUGU)
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1521
  • Access Fee: ₦5,000 ($14)
  • Pages: 59 Pages
  • Format: Microsoft Word
  • Views: 779
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1521
    Fee ₦5,000 ($14)
    No of Pages 59 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to... Continue Reading
    ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to... Continue Reading
    A huge number of studies have been done supporting seamless mobility networks and mobile technologies over the years.  The recent innovations in mobile technologies have unveiled another revolution from the static architectural approach for client-server network relationships to more dynamic, and even mobile approaches. Due to the special... Continue Reading
    ABSTRACT Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to... Continue Reading
    ABSTRACT Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to... Continue Reading
    ABSTRACT This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous... Continue Reading
    ABSTRACT This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous... Continue Reading
    ABSTRACT Multicast routing is an effective way to communicate among multiple hosts in a network. It outperforms the basic broadcast strategy by sharing resources along general links, while sending information to a set of predefined multiple destinations concurrently. However, it is vulnerable to component failure in ad hoc network due to the lack... Continue Reading
    ABSTRACT Multicast routing is an effective way to communicate among multiple hosts in a network. It outperforms the basic broadcast strategy by sharing resources along general links, while sending information to a set of predefined multiple destinations concurrently. However, it is vulnerable to component failure in ad hoc network due to the lack... Continue Reading
    CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
    Call Us
    Get this work
    whatsappWhatsApp Us