17-07-2013, 04:40 PM
SIMULATION OF BLACK HOLE ATTACK IN WIRELESS AD-HOC NETWORKS
SIMULATION OF BLACK.pdf (Size: 1.71 MB / Downloads: 38)
INTRODUCTION
Wireless ad-hoc networks are composed of autonomous nodes that are self- managed
without any infrastructure. In this way, ad-hoc networks have a dynamic topology
such that nodes can easily join or leave the network at any time. They have many
potential applications, especially, in military and rescue areas such as connecting
soldiers on the battlefield or establishing a new network in place of a network which
collapsed after a disaster like an earthquake. Ad-hoc networks are suitable for areas
where it is not possible to set up a fixed infrastructure. Since the nodes communicate
with each other without an infrastructure, they provide the connectivity by
forwarding packets over themselves. To support this connectivity, nodes use some
routing protocols such as AODV (Ad-hoc On-Demand Distance Vector), DSR
(Dynamic Source Routing) and DSDV (Destination-Sequenced Distance-Vector).
Besides acting as a host, each node also acts as a router to discover a path and
forward packets to the correct node in the network.
WIRELESS NETWORKS
Wireless communication is used to transfer data among users without a wired
infrastructure. Using electromagnetic waves, mobile users transmit and receive data
over the air. Wireless communication spreads from home RF to satellites, from
cellular phones to walkie-talkies. Its mobility, simplicity and cost saving installation
advantages make the wireless communication more popular, especially in recent
decades Increasing user mobility needs and developments in the use of laptop
computers and PDA’s is one of the main reasons of the popularity of wireless
networks.