• Title/Summary/Keyword: 라우팅 기법

Search Result 899, Processing Time 0.034 seconds

An Efficient Routing Protocol for Mobile Sinks in Sensor Networks (센서 네트워크에서 모바일 싱크를 위한 효율적인 라우팅 기법)

  • Wu, Mary
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.4
    • /
    • pp.640-648
    • /
    • 2017
  • Sensors have limited resources in sensor networks, so efficient use of energy is important. In order to use the energy of the sensor node efficiently, researches applying mobile sink to the sensor network have been actively carried out. The sink node moves the sensor network, collects data from each sensor node, which spread the energy concentrated around the sink node, thereby extending the entire life cycle of the network. But, when the sink node moves, it requires a reset of the data transmission path, which causes a lot of control messages and delays. In this paper, we propose a CMS(Cluster-based Mobile Sink) method to support the movement of mobile sink in a cluster sensor environment. The proposed scheme minimizes an amount of control messages without resetting the routing paths of entire sensor networks by supporting the sink mobility path using the neighbor cluster list. And, it simplifies the routing path setup process by setting a single hop path between clusters without a gateway. The experiment results show that the proposed scheme has superior energy efficiency in processing and network structure, compared with existing clustering and mesh routing protocols.

MAC Protocol Analysis for Effective Energy Consumption in Ubiquitous Sensor network (유비쿼티스 센서 네트워크에서 효율적인 에너지 소모를 위한 MAC 프로토콜 분석)

  • Kim, Dong Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.927-930
    • /
    • 2012
  • The sensor network technology for core technology of ubiquitous computing is in the spotlight recently, the research on ubiquitous sensor network is proceeding actively which is composed many different sensor node. One of the important condition for design of sensor node is to extend for network life which is to minimize power-consumption under the limited resources of sensor network. This study suggest routing protocol that was used second level cluster structure to reduce power-consumption of sensor node. the first level use the previous routing protocol under the LEACH, second level decide to transmit or not by comparision of data value for Effective Usage, reduce the unnecessary power-consumption.

  • PDF

A Study on the efficient AODV Routing Algorithm using Cross-Layer Design (크로스레이어 디자인을 이용한 효율적인 AODV 알고리즘에 관한 연구)

  • Nam, Ho-Seok;Lee, Tae-Hoon;Do, Jae-Hwan;Kim, Jun-Nyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11B
    • /
    • pp.981-988
    • /
    • 2008
  • In this paper, the efficient AODV routing algorithm in MANET is proposed. Because transmission channel has a high error rate and loss in MANET, the number of hops can't be regarded as an absolute network metric. After measuring FER periodically at the data link layer using cross-layer design, the scheme that every node forwards the weight of link status in the reserved field of AODV protocol is used. In order to find the efficient route, we design AODV to be able to select an optimal route that has a good channel status by evaluating the sum of weight. The proposed AODV improves throughput, routing overhead and average end-to-end delay in comparison with the generic AODV.

A Study on Routing Performance Improvement through Cooperation Authentication Technique (협력기반 인증 기법을 통한 라우팅 성능 개선에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.71-79
    • /
    • 2016
  • The main security threats in MANET are integrity and non-repudiation. In the meantime, a lot of secure routing protocols have been designed in order to block these security threats. In this paper, partnership-based authentication technique is proposed in order to provide participation exclusion of network and non-repudiation for the nodes. The proposed technique is a technique that participates in data communication for only the nodes receiving the authentication through the authentication process for the nodes. For this, the proposed technique is largely consists of two steps. The first step is the process that issued the certificate after the reliability for the nodes participating in the network is evaluated. And in the second step, the key exchange agreement with the neighbor nodes is performed and data communication is made after setting security path with responding nodes. The level of security in data transmission is improved because the process of path setting is performed through cooperation with a neighboring nodes having high reliability during the course of these two steps. The superiority of proposed technique in this paper was confirmed through the comparative experiment.

A Design of Call Routing Agent for Multi-Channel (멀티채널 환경에서의 콜 에이전트 설계 및 구현)

  • Jun, Byung-Uk
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.139-145
    • /
    • 2008
  • CRM(Customer Relationship Management) improves the competitiveness of small companies to large enterprises. E-mail, SMS (Short Message Service), telephony service, DM (Direct Mail) are used for customer response in many companies. In order to improve company's profit, business diversification is in progress with protecting the succession of existing customers, and the only of new customers. Futhermore, BPR (Business Process Re-engineering) and BPM (Business Process Management) of the CRM can be easily found in many companies, because it is the first contact point to the company at the customer's view. This paper discusses the development of CRM, and proposes a call object routing agent that is the main engine of the CRM. Result of performance evaluation of proposed method show that the system is effective and powerful enough to use at the multi-channel environment.

  • PDF

Tree based Route Optimization in Nested NEMO Environment (중첩 NEMO 환경에서 트리 기반 라우트 최적화 기법)

  • Lim, Hyung-Jin;Chung, Tai-Myoung
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.9-19
    • /
    • 2008
  • This paper propose the issue of connecting nested NEMO (Network Nobility) networks to global IPv6 networks, while supporting IPv6 mobility. Specifically, we consider a self-addressing including topology information IPv6-enabled NEMO infrastructure. The proposed self-organization addressing protocol automatically organized mobile routers into free architecture and configuration their global IPv6 addresses. BU(binding update) to MR own HA and internal rouging, hosed on longest prefix matching and soft state routing cache, are specially designed for IPv6-based NEMO. In conclusion, numeric analysis ore conducted to show more efficiency of the proposed routing protocols than other RO (Route Optimization) approaches.

  • PDF

A Study on Response Technique of Routing Attack under Wireless Ad Hoc Network. Environment (Wireless Ad Hoc Network환경에서의 라우팅 공격 대응 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.105-112
    • /
    • 2014
  • The utilization of Wireless Ad Hoc Network which can build easily network using wireless device in difficult situation to build network is very good. However, it has security threat element because it transfers data by only forwarding of wireless devices. The measures against this should be prepared because damage by especially routing attack can affect the entire network. It is hard to distinguish malicious node and normal node among nodes composing network and it is not easy also to detect routing attack and respond to this. In this paper, we propose new method which detect routing attack and can respond to this. The amount of traffic in all nodes is measured periodically to judge the presence or absence of attack node on the path set. The technique that hides inspection packet to suspected node and transmits is used in order to detect accurately attack node in the path occurred attack. The experiment is performed by comparing SRAODA and SEAODV technique to evaluate performance of the proposed technique and the excellent performance can be confirmed.

Power-efficient MAC protocol for energy harvesting wireless sensor networks (에너지하베스팅 무선센서네트워크를 위한 전력효율적인 매체접근제어 프로토콜)

  • Shim, Kyu-Wook;Park, Hyung-Kun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.580-581
    • /
    • 2018
  • In order to reduce end-to-end delay in EH-WSN (energy harvestin wireless sensor netowk), medium access control protocols using multi-hop routing technique have been studied. In a real environment, there are many situations where it is difficult to harvest enough energy than the energy consumed. Therefore, it is required to design a MAC protocol that allows nodes to reliably relay data without exhausting power in multi-hop transmission. In this paper, we propose a power-efficient MAC protocol that can select the relay node according to the residual power and the energy collection rate to increase network lifetime.

  • PDF

An Efficient Host Mobility Supporting in Hierarchical Multicast Route Reconstructions (계층적 멀티캐스트 경로 재설정을 이용한 효율적 호스트 이동성 지원)

  • Kim, Sun-Jib;Song, Se-Bong;Cho, Min-Woong;Shin, Yong-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10b
    • /
    • pp.997-1000
    • /
    • 2000
  • 무선 인터넷 서비스에 대한 요구가 무선기술의 발전과 더불어 증가되고 있다. 하지만 현재의 인터넷 프로토콜인 IPv4에서는 IP의 이동 환경을 지원하지 못한다. 이에 여러 연구가 진행되고 있으며, IETF의 Mobile IP Working Group에서는 기존의 IPv4를 사용하면서도 이동환경을 지원하기 위한 이동 IP에 대한 연구를 진행하고 있다. 이에 본 논문에서는 인터넷에서 계층적이며 효율적인 이동성 지원을 위하여 영역과 도메인, 인터 도메인으로 세분화된 환경에서의 이동성 지원을 위한 기법을 제안한다. 본 논문에서는 하나의 이동 호스트가 특정 멀티캐스트 주소로 인식되어 멀티캐스트 라우팅 프로토콜에 의한 데이터 전송 서비스를 받는다. 이에 지속적인 이동성을 가진 이동 호스트에게 절단점 없는 서비스를 제공하기 위하여 동적 멀티캐스트 경로를 재설정 함으로서 경로 설정에 의한 오버헤드와 데이터전송의 지연을 최소화한다. 이러한 방법은 영역과 도메인, 인터 도메인의 계층적인 이동성을 지원함으로서 핸드오프 지연을 감소시키며. 홈 에이전트와 대응 노드에 부가되는 부하를 줄 일 수 있다.

  • PDF

Development of Sensor Network Simulator for Estimating Power Consumption and Execution Time (전력소모량 및 실행시간 추정이 가능한 센서 네트워크 시뮬레이터의 개발)

  • Kim Bang-Hyun;Kim Tae-Kyu;Jung Yong-Doc;Kim Jong-Hyun
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.108-112
    • /
    • 2005
  • 유비쿼터스 컴퓨팅의 기반 설비인 센서 네트워크는 많은 수의 센서 노드들로 구성되며, 각 센서 노드의 하드웨어는 매우 작은 규모이다. 또한 센서 네트워크는 구축 목적에 따라 네트워크 토폴로지 및 라우팅 방식이 결정되어야 하고, 이와 더불어 센서 노드의 하드웨어와 소프트웨어도 필요에 따라 다양하게 변경되어야 한다. 따라서 센서 네트워크가 구현되기 전에 시스템 동작과 성능을 예측할 수 있는 센서 네트워크 시뮬레이터가 필요하다. 기존의 센서 네트워크 시뮬레이터들은 특별한 응용을 위한 특정 기반의 하드웨어와 운영체제에 국한되어 개발되었기 때문에 다양한 센서 네트워크 환경을 지원하기에는 한계가 있으며, 센서 네트워크 설계상의 주요 요소인 전력소모량과 실행 시간에 대한 분석이 포함되지 않았다. 따라서 본 연구에서는 특정한 응용이나 운영체제에 제한을 받지 않으면서 다양하게 센서 네트워크 환경을 설계 및 검증할 수 있고, 더불어 전력소모량과 실행시간 추정도 가능한 시뮬레이터를 개발하는 것을 목표로 하였다. 이를 위해 본 연구에서 개발한 시뮬레이터는 기계명령어-레벨(machine instruction-level)의 이산-사건 시뮬레이션(discrete-event simulation) 기법을 이용함으로써 실제 센서 노드의 프로그램 실행 및 관련 동작들을 세부적으로 예측하는 데 사용될 수 있도록 하였다. 시뮬레이션의 작업부하(workload)인 명령어 트레이스(instruction trace)로는 ATmega128L 마이크로컨트롤러용으로 크로스 컴파일된 인텔 핵스-레코드(.hex) 형식을 사용한다.

  • PDF