فهرست و منابع پایان نامه پروتکل های مسیر یابی در شبکه های حسگر بی سیم
فهرست:
مقدمه ............................................................................................................................................................................................................................................ 3
افزودن به ضریب عملکرد هکرها............................................................................................................................................................................................... 4
سطح 1 امنیت پیرامون............................................................................................................................................................................................................... 5
سطح 2 امنیت پیرامون .............................................................................................................................................................................................................. 7
استاندارد شبکه های محلی بی سیم ...................................................................................................................................................................................... 9
شبکه های بی سیم و انواع WPAN,WWAN.WLAN ....................................................................................................................................... 11
مقدار بر شبکه خصوصی مجازی (VPN)...................................................................................... 12
دسته بندی VPN بر اساس رمزنگاری ................................................................................................................................................................................. 12
دسته بندی VPN بر اساس لایه پیاده سازی .................................................................................................................................................................... 14
مقایسه تشخیص نفوذ و پیشگیری از نفوذ............................................................................................................................................................................... 14
تفاوت شکلی تشخیص با پیشگیری.......................................................................................................................................................................................... 14
تشخیص نفوذ.................................................................................................................................................................................................................................. 16
نتیجه ی نهایی................................................................................................................................................................................................................................ 17
مقدمه ای بر تشخیص نفوذ.......................................................................................................................................................................................................... 17
انواع حملات شبکه ای با توجه به طریقه حمله .................................................................................................................................................................. 18
انواع حملات شبکه ای با توجه به حمله کننده .................................................................................................................................................................. 19
پردازه تشخیص نفوذ .................................................................................................................................................................................................................... 20
مقدمه ای بر IPSEC ............................................................................................................................................................................................................... 20
انواع IPSEC VPN .............................................................................................................................................................................................................. 21
کاربرد پراکسی در امنیت شبکه .............................................................................................................................................................................................. 23
برخی از انواع پراکسی.................................................................................................................................................................................................................. 24
SMTP proxy ...................................................................................................................................................................................................................... 25
امنیت و پرتال ............................................................................................................................................................................................................................... 27
امنیت و پرتال CMS PARS............................................................................................................................................................................................. 27
راهکارهای شبکه های سیم ...................................................................................................................................................................................................... 28
نسب، طراحی و راه اندازی شبکه و ایرلس Multipoint Point o....................................................................................................................... 29
نسب طراحی و راه اندازی شبکه های Hot spot.......................................................................................................................................................... 29
مشاوره و تامین تجهیزات برای راه اندازی شبکه های وایرلس......................................................................................................................................... 29
شبکه های بیسیم.......................................................................................................................................................................................................................... 35
انواع شبکه های بی سیم ........................................................................................................................................................................................................... 36
شبکه های (MANET) Mobile ad hoc .............................................................................................................................................................. 38
کاربردهای شبکه Mobile ad hoc ............................................................................................................................................................................. 39
پروتوکل های مسیریابی Routing proto cols...................................................................................................................................................... 39
پروتوکل TCP/IP...................................................................................................................................................................................................................... 40
مقدمه................................................................................................................................................................................................................................................. 40
معنی پروتوکل TCP/IP.......................................................................................................................................................................................................... 41
لایه های پروتکل TCP/IP...................................................................................................................................................................................................... 41
لایه Application.................................................................................................................................................................................................................. 42
لایه Transport........................................................................................................................................................................................................................ 43
لایه اینترنت..................................................................................................................................................................................................................................... 43
لایه Network Interface................................................................................................................................................................................................ 43
مشخص نمودن برنامه ها ............................................................................................................................................................................................................ 43
آدرس IP......................................................................................................................................................................................................................................... 44
یورت TCP/IP............................................................................................................................................................................................................................ 44
سوکت (Socket).................................................................................................................................................................................................................... 44
TCP/IP........................................................................................................................................................................................................................................ 44
پروتکل:TCP لایه Transport.......................................................................................................................................................................................... 45
ارسال اطلاعات با استفاده از TCP......................................................................................................................................................................................... 45
پروتوکل: UUP لایه Internet ........................................................................................................................................................................................... 46
پروتوکل: IP لایه Internet.................................................................................................................................................................................................... 48
مسیر یابی ....................................................................................................................................................................................................................................... 49
معنای حمل.................................................................................................................................................................................................................................... 49
توزیع توپولوژی.............................................................................................................................................................................................................................. 49
آلگوریتم برداری راه دور ............................................................................................................................................................................................................. 49
آلگوریتم حالت اینک.................................................................................................................................................................................................................... 59
پروتوکل بردار مسیر...................................................................................................................................................................................................................... 50
مقایسه الگوریتم مسیریابی ......................................................................................................................................................................................................... 50
انتخاب مسیر................................................................................................................................................................................................................................... 51
عوامل چندگانه .............................................................................................................................................................................................................................. 51
شبکه های حسگر بی سیم......................................................................................................................................................................................................... 52
نگاهی به شبکه های بی سیم حسگر....................................................................................................................................................................................... 52
ویژگی های عمومی یک شبکه حسگر..................................................................................................................................................................................... 54
ساختار ارتباطی شبکه های حسگر.......................................................................................................................................................................................... 54
فاکتورهای طراحی ....................................................................................................................................................................................................................... 54
تحمل خرابی................................................................................................................................................................................................................................... 55
قابلیت گسترش.............................................................................................................................................................................................................................. 55
هزینه تولید .................................................................................................................................................................................................................................... 55
سخن پایانی..................................................................................................................................................................................................................................... 57
منابع ................................................................................................................................................................................................................................................. 58
.
منبع:
1-http://www.aftab.ir/articles/computer_internet_infortmation_technology/computer_science
/c14c1127318700p1.php 2-http://networkinfo.blogfa.com/post-16.aspx
3-http://ebooks.ketabnak.com/comment.php?dlid=1322
4-http://confbank.um.ac.ir/modules/conf_display/csicc2003/pdf/160.pdf
5-http://dbase.irandoc.ac.ir/00261/00261700.htm
6-http://kavoshrayane.parsiblog.com/-611532.htm
7-http://forum.bitiran.com/f596/%D9%85%D9%82%D8%A7%DB%8C%D8%B3%D9%87-%D9%BE%D8%B1%D9%88%D8%AA%D9%83%D9%84-%D9%87%D8%A7%DB%8C-%D9%85%D8%B3%DB%8C%D8%B1%DB%8C%D8%A7%D8%A8%DB%8C-%D8%B4%D8%A8%D9%83%D9%87-%D9%87%D8%A7%DB%8C-ad-hoc-34413.html
8-http://www.esnips.com/doc/5115e8c1-fbf9-45ba-860a-568bc8e20041/%DA%A9%D8%A7%D9%87%D8%B4-%D8%A2%D8%B3%D9%8A%D8%A8-%D9%BE%D8%B0%D9%8A%D8%B1%D9%8A%D9%87%D8%A7%DB%8C-%D8%A7%D9%85%D9%86%D9%8A%D8%AA%D9%8A-%D9%BE%D8%B1%D9%88%D8%AA%DA%A9%D9%84%D9%87%D8%A7%D9%8A-%D9%85%D8%B3%D9%8A%D8%B1%D9%8A%D8%A7%D8%A8%D9%8A-%D8%A7%D9%85%D9%86-%D9%85%D8%A8%D8%AA%D9%86%D9%8A-%D8%A8%D8%B1-%D9%BE%D8%B1%D9%88%D8%AA%DA%A9%D9%84-DSR-%D8%AF%D8%B1-%D8%B4%D8%A8%DA%A9%D9%87-%D9%87%D8%A7%D9%8A-%D8%A8%D9%8A-%D8%B3%D9%8A%D9%85-%D8%A7%D9%82%D8%AA%D8%B6%D8%A7%D9%8A%D9%8A
9-http://xn-----ctdfg5bza8j2aec06dsrha53c.iranictnews.ir/T______%D9%BE%D8%B1%D9%88%D8%AA%DA%A9%D9%84-%D9%87%D8%A7%DB%8C-%D8%B4%D8%A8%DA%A9%D9%87.htm
10-http://www.network.blogfa.com/post-14.aspx
11-http://www.semeng.net/information/HowTCPIP.asp
12-http://www.mcs-8051.com/archives/000083.php
13-http://daneshnameh.roshd.ir/mavara/mavara-index.php?page=%d9%be%d8%b1%d9%88%d8%aa%da%a9%d9%84+%d8%a7%d9%85%d
9%86%db%8c%d8%aa%db%8c+SSL&SSOReturnPage=Check&Rand=0
14-http://www.iritn.com/?action=show&type=news&id=4982
.