Tuesday, 10 July 2018

T8 : INTERNATIONAL JOURNAL RELATED TO YOUR RESEARCH

APLIKASI TUTORIAL TEHNIK DASAR OLAHRAGA HOCKEY BERBASIS ANDROID

A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET)
Pascal Maniriho, Maurice Ntahobari, Radityo Anggoro

Abstract
The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET) make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP) for any received route request packets (RREQ). When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.


CONSTRUCTION MECHANISM SURVEY ON TRANSMISSION CONTROL PROTOCOL IN SOFTWARE DEFINED NETWORK
 
Faishal Halim Saputra, Royyana Muslim Ijtihadie
Abstract
A new network paradigm, Software Defined Network (SDN) is developed to divide vertical integration in network devices, separating the control logic from the network infrastructure making it possible to change the state and network conditions of centrally programmable controllers. most one-to-many communications on SDN are implemented through some unicast like TCP, which is inefficient. It generates a lot of replicated traffic, which can result in lower application performance due to several issues such as congestion, redundancy and collision. The problem of congestion occurs when a network has a lot of load and resulted in decreased performance as the number of shipments exceeds the capacity of the existing router. One of the congestion handling solutions by reducing the size of TCP receive window. The main purpose of making this paper is to summarize some of the jamming control mechanisms using TCP that have been tackled by researchers to deal with congestion problems on the network.
Sumber Jurnal :



No comments:

Post a Comment