Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Theses and Dissertations

2005

Computer network protocols

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Evaluation Of The Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Networks, Amber J. Rickmon Mar 2005

Evaluation Of The Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Networks, Amber J. Rickmon

Theses and Dissertations

Routing protocols designed for wired networks cannot be used in mobile ad hoc networks (MANETs) due to the dynamic topology, limited throughput, and energy constraints. New routing protocols have been designed for use in MANETs, but have not been thoroughly tested under realistic conditions such as node movement, number of sources, the presence of obstacles, and node speed. This research evaluates the performance of ad hoc on-demand distance vector routing with respect to throughput, goodput ratio, end-to-end (ETE) delay, node pair packet delivery rate, and node pair end-to-end delay. It shows these performance metrics vary significantly according to the choice …


Analysis Of Effects Of Bgp Black Hole Routing On A Network Like The Niprnet, Michael D. Kleffman Mar 2005

Analysis Of Effects Of Bgp Black Hole Routing On A Network Like The Niprnet, Michael D. Kleffman

Theses and Dissertations

The Department of Defense (DoD) relies heavily on the Non-secure Internet Protocol Router Network (NIPRNET) to exchange information freely between departments, services, bases, posts, and ships. The NIPRNET is vulnerable to various attacks, to include physical and cyber attacks. One of the most frequently used cyber attacks by criminally motivated hackers is a Distributed Denial of Service (DDoS) attack. DDoS attacks can be used to exhaust network bandwidth and router processing capabilities, and as a leveraging tool for extortion. Border Gateway Protocol (BGP) black hole routing is a responsive defensive network technique for mitigating DDoS attacks. BGP black hole routing …