List of Figures
Figure 2.1 | Communications in wireless networks | 11 |
Figure 2.2 | Infrastructure-based network | 12 |
Figure 2.3 | Infrastructure-less network | 12 |
Figure 2.4 | Simple ad hoc network | 13 |
Figure 2.5 | MANET | 15 |
Figure 2.6 | MANET | 16 |
Figure 2.7 | MANET routing protocols | 24 |
Figure 2.8 | Another classification of MANET routing protocols | 28 |
Figure 2.9 | Flooding packets using MPR | 30 |
Figure 2.10 | Hello message exchange | 30 |
Figure 2.11 | AODV mechanisms | 32 |
Figure 2.12 | Flooding RREQ in AODV | 32 |
Figure 2.13 | Route reply in AODV | 33 |
Figure 2.14 | AODV route discovery | 34 |
Figure 2.15 | Route error message in AODV | 35 |
Figure 2.16 | Classification of MANET attacks | 39 |
Figure 2.17 | Active and passive attack in MANETs | 42 |
Figure 2.18 | External and internal attacks in ... |
Get A Study of Black Hole Attack Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.