EFFICIENT NETWORK ROUTING PROTOCOL WITH EFFECTIVE DATA TRANSFER WITHOUT PACKET LOSS OVER THE AD HOC NETWORK (A CASE STUDY OF UBA ENUGU)

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU2418
  • Access Fee: ₦5,000 ($14)
  • Pages: 59 Pages
  • Format: Microsoft Word
  • Views: 423
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853
ABSTRACT
The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to adapt TCP to Ad hoc environment, improvements have been proposed in the literature to help TCP to differentiate between the different type of losses indeed, in mobile or static Ad hoc networks losses are not always due to network congestion  as it is mostly the in wired networks. In this report, we present an overview of this issue an a detailed discussion of major factor involved. In particular, we show how TCP can be affected by mobility and lower layers protocols. In addition, we survey the main proposals which aim at adapting TCP to mobile and static Ad hoc environments. 

TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL PAGE 
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS 

CHAPTER ONE
1.0INTRODUCTION
1.1STATEMENT OF PROBLEM
1.2PURPOSE OF STUDY
1.3AIMS AND OBJECTIVE
1.4SCOPE OF THE STUDY
1.5LIMITATION OF THE STUDY
1.6DEFINITION OF TERMS

CHAPTER TWO
2.0LITERATURE REVIEW

CHAPTER THREE
3.0METHODOLOGY FOR FACT FINDING AND DETAILED DISCUSSION OF THE SUBJECT MATTER
3.1METHODOLOGY FOR FACT FINDING 
3.2DETAILED DISCUSSION OF THE SUBJECT MATTER 

CHAPTER FOUR
4.0THE FUTURE, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1THE FUTURE 
4.2IMPLICATIONS
4.3CHALLENGES 

CHAPTER FIVE
5.0SUMMARY, RECOMMENDATION AND CONCLUSION
5.1SUMMARY 
5.2RECOMMENDATION 
5.3CONCLUSION 
REFERENCES

EFFICIENT NETWORK ROUTING PROTOCOL WITH EFFECTIVE DATA TRANSFER WITHOUT PACKET LOSS OVER THE AD HOC NETWORK (A CASE STUDY OF UBA ENUGU)
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU2418
  • Access Fee: ₦5,000 ($14)
  • Pages: 59 Pages
  • Format: Microsoft Word
  • Views: 423
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU2418
    Fee ₦5,000 ($14)
    No of Pages 59 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to... Continue Reading
    ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to... Continue Reading
    A huge number of studies have been done supporting seamless mobility networks and mobile technologies over the years.  The recent innovations in mobile technologies have unveiled another revolution from the static architectural approach for client-server network relationships to more dynamic, and even mobile approaches. Due to the special... Continue Reading
    ABSTRACT Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to... Continue Reading
    ABSTRACT Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to... Continue Reading
    ABSTRACT This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous... Continue Reading
    ABSTRACT This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous... Continue Reading
    ABSTRACT Multicast routing is an effective way to communicate among multiple hosts in a network. It outperforms the basic broadcast strategy by sharing resources along general links, while sending information to a set of predefined multiple destinations concurrently. However, it is vulnerable to component failure in ad hoc network due to the lack... Continue Reading
    ABSTRACT Multicast routing is an effective way to communicate among multiple hosts in a network. It outperforms the basic broadcast strategy by sharing resources along general links, while sending information to a set of predefined multiple destinations concurrently. However, it is vulnerable to component failure in ad hoc network due to the lack... Continue Reading
    CHAPTER ONE INTRODUCTION The term Network Security and Information Security are used often inter –changeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruder (or hackers). Information Security however, explicitly focuses on protecting data resources from malware (or... Continue Reading
    Call Us
    whatsappWhatsApp Us