• Title/Summary/Keyword: Ad Hoc 망

Search Result 416, Processing Time 0.022 seconds

An Efficient Mobility Agent Advertisement Mechanism for MIPMANET (MIPMANET에서 효율적인 이동성 에이전트 광고기법)

  • Park, Chan-Heum;Seo, Hyun-Gon;Kim, Ki-Hyung;Kim, Chong-Gun
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.5
    • /
    • pp.343-354
    • /
    • 2006
  • There has been much research efforts trying to integrate mobile IP that has been proposed to guarantee the mobility of mobile nodes on MANET (Mobile Ad Hoc Networks) and wired integrated networks. To support the mobility service of nodes in MIPMANET, this paper proposes MAAM(Mobility Agent Advertisement Mechanism) and AMAAM protocols. In MAAM, the mobility agent of the mobile IP can maintain the information of ad hoc networks by broadcasting advertisement messages periodically. AMAAM(Aggregation based Mobility Agent Advertisement Mechanism) is an enhancement of MAAM for reducing the number of transmission of advertisement messages by aggregating them. The proposed schemes are applied in MIPMANET for agent advertisement mechanism. For the performance evaluation of both protocols, we simulated them by NS2. We evaluate the protocols by ns2 with such performance metrics as packet delivery ratio, transmission throughput, and energy consumption.

Distributed Construction of the Multiple-Ring Topology of the Connected Dominating Set for the Mobile Ad Hoc Networks: Boltzmann Machine Approach (무선 애드혹 망을 위한 연결 지배 집합 다중-링 위상의 분산적 구성-볼츠만 기계적 접근)

  • Park, Jae-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.226-238
    • /
    • 2007
  • In this paper, we present a novel fully distributed topology control protocol that can construct the multiple-ring topology of Minimal Connected Dominating Set (MCDS) as the transport backbone for mobile ad hoc networks. It makes a topology from the minimal nodes that are chosen from all the nodes, and the constructed topology is comprised of the minimal physical links while preserving connectivity. This topology reduces the interference. The all nodes work as the nodes of the distributed parallel Boltzmann machine, of which the objective function is consisted of two Boltzmann factors: the link degree and the connection domination degree. To define these Boltzmann factors, we extend the Connected Dominating Set into a fuzzy set, and also define the fuzzy set of nodes by which the multiple-ring topology can be constructed. To construct the transport backbone of the mobile ad hoc network, the proposed protocol chooses the nodes that are the strong members of these two fuzzy sets as the clusterheads. We also ran simulations to provide the quantitative comparison against the related works in terms of the packet loss rate and the energy consumption rate. As a result, we show that the network that is constructed by the proposed protocol has far better than the other ones with respect to the packet loss rate and the energy consumption rate.

Minimizing non-optimal paths in multi-hop ad hoc network adopted IEEE 802.11 PSM (IEEE 802.11 PSM을 적용한 다중 홉애드 혹 네트워크에서 우회경로의 최소화)

  • Whang, Do-Hyeon;Lee, Jang-Su;Kim, Sung-Chun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.583-588
    • /
    • 2007
  • It is easy to implement a temporary network with a mobile ad-hoc network in which mobile nodes have without using a infrastructure network. They depend on their limited power. Recently, it is a hot issue to save the energy in a mobile ad-hoc network because a mobile nodes have a limited energy. Research of IEEE 802.11 PSM was proposed in a single hop ad-hoc assumption. If IEEE 802.11 PSM is applied to multi hop ad-hoc network, non-optimal paths will be generated by the mobile nodes which didn't receive a message of routing request. Non-optimal paths increase not only a network latency but also energy consumption of mobile nodes. Reconfiguring algorithm of non-optimal paths caused by the mobile nodes which didn't receive a message of routing request is proposed in this paper. A mobile node can overhear the data in his range. A wireless medium is shared by all mobile nodes using the same bandwidth. All mobile nodes lookout the non-optimal paths with these properties of a medium, if non-optimal path is generated, optimal reconfiguring will be accomplished by modifying routing table of itself or sending a request message of routing update to nearby nodes. By reconfiguring the non-optimal paths to optimized ones, network latency and energy consumption was decreased. It is confirmed to ignore the overhead caused by a algorithm presented in this paper through the result of the simulation.

Wireless Localization Technology Survey and Analysis (무선 측위 기술 조사 및 분석)

  • Kim, Chong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.2
    • /
    • pp.72-78
    • /
    • 2011
  • Localization information of an object can be a very useful element for many application areas. Presently, GPS is typically used for it, but many researches on the wireless localization technology are going on recently actively using mobile communication network, wireless sensor network, and ad hoc network in order to overcome the limitations of the GPS such as indoor, cost, power consumption, and etc. Therefore, this article surveys the most representative wireless localization techniques, which can be deployed in the wireless networks, and their principles and performances are analyzed based on the researched papers. In a conclusion, selection of a localization technique should consider the key design elements to a given application from the design elements such as localization environment, accuracy, time to fix, computation amount, implementation ease, and etc.

An Analysis of Optimum Transmission Range in MANETs under various Propagation Models (다양한 전파 환경 하에서 MANET 최적 통달거리 분석)

  • Choi, Hyungseok;Lee, JaeYong;Kim, ByungChul
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2014
  • This paper presents an analytical method for finding the optimum transmission range in mobile ad hoc networks(MANETs). The results are particularly useful for the operation of military networks, as the transmission range affects the throughput, delay, and battery consumption. Plus, the proposed method allows the optimum transmission range to be determined in advance when deploying combatants with mobile terminals. And we analyze the battery life-time and the optimum transmission range under various propagation scenarios based on Hata propagation model. The proposed method obtains the optimum transmission range in a MANET based on the operational conditions.

Performance Improvement of Channel Access Control Method in Wireless Mesh Networks (무선 메쉬 네트워크에서 성능향상을 위한 채널접속 제어 방법)

  • Lee, Soon-Sik;Yun, Sang-Man;Lee, Sang-Wook;Jeon, Seong-Geun;Kim, Eung-Soo;Lee, Woo-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.572-580
    • /
    • 2010
  • The Wireless Mesh Network uses a wireless communication technology with transmission rates simular to a cable which is used as a backbone networks. The topology structure is in a Mesh form which resembles an Ad-hoc networks. However, a metric is needed in order to set the channel access control method to operate intentions and interior motions are different. In this document, an efficient channel for delivering datas to improve access controls to a wireless mesh networks. The improved performance of the proposed plan is for a hidden and exposed mesh client through an exclusive channels to perform a proposed and analyzed methods.

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks (군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.

MANET에서의 상황 인지 구조를 이용한 에너지 보존 라우팅 연구

  • Jin, Un;Lee, Beom-Jae;Ji, Sam-Hyeon;Kim, Sun-Guk;Du, Gyeong-Min;Lee, Kang-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.413-417
    • /
    • 2007
  • Ad hoc 센서 네트워크에서 노드는 제한된 에너지를 가지며, 에너지의 사용률은 토폴로지 구조나 센서 노드의 동작에 의존한다. 본 논문에서는 low power distributed MAC을 개량 하여, MANET에서 clustering 구조의 네트워크를 위한 효율적인 에너지 절약을 위한 새로운 구조를 제안한다. 본 제안된 구조의 특징은 Ad hoc 네트워크에서 에너지에 관련된 배터리 파워나, 노드의 거리, 전송 전력 등의 정보를 활용한 상황 인식을 사용하였다. 에너지 상황 인식을 적용한 제안된 망의 구조는 clustering 형상과 메시지 전송의 성능 및 데이터의 도달 인식을 향성 시킨다. 또한 context aware computing을 이용함으로써, 상황과 정의된 rule에 따라서 노드의 동작과 네크워크 라우팅의 상황에 적응하도록 노드를 조정 할 수 있는 구조이다.

  • PDF

1-hop Data Traffic Reduction Method in Tactical Wireless Mobile Ad-Hoc Network based on MIL-STD-188-220C (MIL-STD-188-220C 기반 전술 무선 이동 Ad-Hoc 망에서 1-hop내 데이터 트래픽 감소 방법)

  • You, Ji-Sang
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.15-24
    • /
    • 2008
  • The data delivery confirmation method of MIL-STD-188-220C, which is a tactical wireless mobile Ad-Hoc communication protocol, is that a source node requires the end-to-end ack from all destination nodes and the data-link ack from 1-hop neighboring destination nodes and relaying nodes, regardless of the hop distance from a source node to destination nodes. This method has the problem to degrade the whole communication network performance because of excessive data traffic due to the duplicate use of end-to-end ack and data-link ack, and the collision among end-to-end acks on the wireless network in the case of confirming a data delivery within an 1-hop distance. In order to solve this problem, this paper has proposed the method to perform the data delivery confirmation with the improvement of communication network performance through the data traffic reduction by achieving the reliable data delivery confirmation requiring the only data-link ack within an 1-hop distance. The effects of the proposed method are analyzed in the two aspects of the data delivery confirmation delay time and the data delivery confirmation success ratio.

A Multipath Establishing Scheme using Pre-search in Ad Hoc Networks (애드혹 망에서 사전탐색을 통한 다중경로 설정)

  • Lee, Kil-Hung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.129-135
    • /
    • 2010
  • This paper suggests a multipath establishing scheme for ad hoc networks. Data paths are established by on-demand manner. Multipath are made as a sequence of route control message exchange at route setup process. Multipath can be used as a backup path or load balancing for data exchange. Proposed scheme uses a one-hop pre-search scheme for establishing multipath between source and destination. When a node selects a next node for route reply, the node finds optimal route by exchanging route information with neighbor nodes. Simulation results show that the proposed multipath scheme has better split characteristics among multipath and higher route survivability at the environment where nodes are moving.