2018
DOI: 10.12720/jcm.13.5.218-224
|View full text |Cite
|
Sign up to set email alerts
|

Performance Comparison of Proactive and Reactive Routing Protocol in Mobile Ad Hoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0
4

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 5 publications
0
2
0
4
Order By: Relevance
“…Watchdog and Pathrater It is a kind of intruder detection system it checks all the nodes behaviour by monitoring the packets forwarding, any nodes fails to forward the packet to the next hope a certain threshold is maintain which exist the threshold limit then the watchdog intimate to the sender about the malicious nodes activities, also the pathrater will support the sender to avoid malicious node route path is selected for transmission. CONFIDANT protocol has four modules called the Monitor, the Reputation System, the Path Manager, and the Trust Manager proposed by, all the nodes continuously monitoring the first hope neighbour with functions of neighbour node surveillance, node ranking, path evaluation, and sending and receiving alarm messages [17][18][19][20][21]. Any misbehaviours find on the function the nodes alarms to the trust manager about the malicious nodes.…”
Section: Packet Dropping Due To Internal Factorsmentioning
confidence: 99%
“…Watchdog and Pathrater It is a kind of intruder detection system it checks all the nodes behaviour by monitoring the packets forwarding, any nodes fails to forward the packet to the next hope a certain threshold is maintain which exist the threshold limit then the watchdog intimate to the sender about the malicious nodes activities, also the pathrater will support the sender to avoid malicious node route path is selected for transmission. CONFIDANT protocol has four modules called the Monitor, the Reputation System, the Path Manager, and the Trust Manager proposed by, all the nodes continuously monitoring the first hope neighbour with functions of neighbour node surveillance, node ranking, path evaluation, and sending and receiving alarm messages [17][18][19][20][21]. Any misbehaviours find on the function the nodes alarms to the trust manager about the malicious nodes.…”
Section: Packet Dropping Due To Internal Factorsmentioning
confidence: 99%
“…Mobile Ad-Hoc Network (MANET) adalah sebuah jaringan ad-hoc yang terdiri dari sekumpulan perangkat yang bergerak yang tidak memiliki router tetap. Perangkat didalam MANET disebut sebagai node dimana tiap node dapat melakukan fungsi sebagai router dengan fungsi meneruskan jalur komunikasi antar node dan menangani rute ke setiap node dalam jaringan [1]. Teknologi MANET dapat diimplementasikan pada area seperti bencana, kemiliteran, dan lainnya.…”
Section: Pendahuluanunclassified
“…End to end delay adalah ratarata waktu yang dibutuhkan oleh paket data untuk tiba ditempat tujuan yang mana mencakup keterlambatan yang disebabkan oleh penemuan rute dan antrian transmisi paket data [10]. Dimana dalam parameter ini menggunakan rumus :…”
Section: Gambar 1 Alur Rancangan Penelitian Keteranganunclassified
“…Particel swarm optimization Particle Swarm Optimization adalah teknik optimasi dengan cara menghitung secara terus menerus calon solusi dengan menggunakan suatu acuan kualitas. Algoritma ini mengoptimasi permasalahan dengan cara menggerakan partikel / calon solusi di dalam ruang permasalahan menggunakan fungsi tertentu untuk posisi dan kecepatan dari partikel [10].…”
Section: End To End Delay = Receive Time -Sent Timeunclassified
See 1 more Smart Citation