• Title/Summary/Keyword: Ad hoc(Ad hoc)

Search Result 2,481, Processing Time 0.024 seconds

Performance Analysis of TCP Traffic over DSR Routing Protocol in Ad-Hoc Wireless Network (Ad-hoc 무선 망에서 DSR 라우팅 프로토콜을 이용한 인터넷 트래픽의 성능 분석)

  • 이규남;고영웅;육동철;박승섭
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05c
    • /
    • pp.385-389
    • /
    • 2002
  • Ad-hoc 무선망은 고정된 유선망을 가지지 않고 이동 노드들로만 구성된 망이다. 여러 가지 이동 노드에 대한 이동 제약이 없고, 유선망이나 기지국 같은 기반 구조를 필요를 하지 않기 때문에 여러 환경에 적용이 가능하다. 그러나 라우터들 사이의 이동성과 다른 연결 요소들의 가변적인 요소는 잠재적으로 속도감 있고 예측 불가능하게 변하는 망을 가져올 수 있다. 이에 따른 패킷의 손실이 무선 네트워크에서 자주 발생하게 된다. 최근 몇 년 동안 Ad-hoc망에서 사용되는 라우팅 프로토콜의 각각에 대한 성능을 분석하는 연구가 있었지만, Ad-hoc 무선망에서 특정한 프로토콜의 TCP 버전별 비교 분석에 대한 연구가 미비한 실정이다. 따라서 본 논문에서는 무선 네트워크가 가지는 단점을 보완하고 트래픽 성능을 향상시키기 위한 한 방편으로, Ad-hoc 라우팅 알고리즘인 DSR 프로토콜을 이용하여 TCP Tahoe, Sack, Reno 버전별로 토폴로지의 크기의 변화와 이동 노드의 이동 속도의 변화에 따라 트래픽의 성능을 모의 실험하여 비교 분석하였다.

  • PDF

An Improved Authentication Protocol in Vehicular Ad-hoc Networks using Certificateless Signature (Certificateless 서명기법을 이용한 Vehicular Ad-hoc 네트워크에서 향상된 인증프로토콜)

  • Jung, Chae-Duk;Sur, Chul;Park, Sang-Woo;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.3
    • /
    • pp.507-513
    • /
    • 2007
  • In this paper, we propose an efficient authentication protocol based on certificateless signature scheme, which does not need anyinfrastructure to deal with certification of public keys, among the vehicles in Vehicular Ad-hoc Networks. Moreover, due to the characteristicsof VANET nodes (i.e., vehicles) that is fast and movement, the proposed protocol introduces the concept of interval signing key to overcome efficiently the problem of certificate revocation in traditional Public Key Infrastructure(PKI).

Collision Avoidance System of Container Terminal Crossroad, using an Ad-hoc Network (Ad-hoc 네트워크를 이용한 컨테이너터미널 교차로에서의 충돌방지 시스템 설계)

  • Ha, Il-Ho;Do, Dae-Man;Hyun, Maeng-Hwan;Choi, Young-Bok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.1079-1081
    • /
    • 2011
  • 컨테이너터미널 장치장 내 교차로에서 무인 YT(Yard Tractor)간 충돌방지를 위하여 RFID(Radio Frequency Identification) 태그와 ad-hoc 네트워크를 이용한 교차로 충돌방지 알고리즘을 제안한다. 또한 ad-hoc 네트워크 라우팅 프로토콜은 장치장 교차로에서 충돌방지를 위한 YT 간 통신성능을 결정하는 중요한 요소로써, 장치장 교차로 환경과 YT의 이동성을 고려하여 프로토콜을 결정해야 한다. 따라서 RFID 태그를 이용한 YT 위치정보와 AODV(Ad hoc On demand Distance Vector) 방식의 Hello 메시지를 이용해서 충돌방지를 위한 ad-hoc 네트워크 라우팅 프로토콜을 제안한다.

A Novel K-hop Cluster-based Ad hoc Routing Scheme with Delegation Functions (위임 기능을 이용한 새로운 K-hop 클러스터 기반 Ad hoc 라우팅 구조)

  • Kim Tae-yeon;Wang Ki-cheoul
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.27-37
    • /
    • 2004
  • The existing ad hoc network protocols suffer the scalability problem due to the inherent characteristics of node mobility. Cluster-based routing protocols divide the member nodes into a set of clusters and perform a hierarchical routing between these clusters. This hierarchical feature help to improve the scalability of ad hoc network routing. However, previous k-hop cluster-based routing protocols face another problems, that is, control overhead of the cluster headers. This paper proposes a novel k-hop cluster-based routing scheme with delegation functions for mobile ad hoc networks. The scheme employs is based on tree topology to manage cluster members in effectively. The cluster headers do not manage the routing table for whole members, while the header keeps the routing table for its neighbor members and the member list for one hop over nodes within k-hop cluster. Then the in-between leveled nodes manage the nested nodes which is structured in the lower level. Therefore, the proposed mechanism can reduce some control overhead of the cluster leaders.

  • PDF

Performance Analysis of Directional Communication for Wireless Ad Hoc Networks (무선 Ad hoc 네트워크의 지향성 통신 성능분석)

  • Lee, Sin-Kyu;Hong, Jin-Dae;Kim, Hyun-Tae;Ra, In-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2447-2458
    • /
    • 2009
  • Ad hoc wireless networks operate without any infrastructure where a node can be a source and a router at the same time. This indispensably requires high throughput and low delay performance throughout the wireless network coverage span, particularly under heavy traffic conditions. Recent research on using multiple antennas in beam-forming or multiplexing modes over a wireless channel has shown promising results in terms of high throughput and low delay. Directional antennas have shown to increase spatial reuse by allowing multiple transmitters and receivers to communicate using. directional beams as long as they do not significantly interfere with each other. However directional antenna performance asymptotically approaches the omni-directional performance in a high density ad hoc network. Simulation results in QualNet validate that average throughput and packet corruption ratio of directional antenna approach omni-directional performance. Moreover, we further highlight some important issues pertaining to the directional antenna performance in wireless networks.

Analysis the Overhead of IEEE 802.11 RTS/CTS Handshake in Ad-hoc Networks Based Multipath Routing (다중경로 라우팅 기반 Ad-hoc Networks에서 IEEE 802.11 RTS/CTS 핸드세이크 오버헤드 분석)

  • Kim, Hyun-Chang;Lee, Jai-Yong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.33-44
    • /
    • 2008
  • Multipath routing protocols with load balance, fault tolerance, aggregated bandwidth in Ad-hoc Networks provide improved throughput and reliable route as compared with singlepath routing protocols. However, multipath routing protocols have not been explored thoroughly in the domain of overhead in Ad-hoc Networks. In this paper, we analyze and compare on-demand singlepath and multipath routing with IEEE 802.11 DCF in terms of Routing overhead and MAC overhead. The results reveals that in comparison with singlepath routing protocol, multipath routing mechanism creates more overheads but provides better performance in congestion and capacity provided that the route length is within a certain upper bound which is derivable. The analytical results are further confirmed by simulation.

An Enhanced Routing Protocol for Support Mobility in Mobile Ad hoc Networks (이동 ad hoc 네트워크의 이동성을 지원하기 위한 향상된 라우팅 프로토콜)

  • Kim, Kwan-Woong;Kim, Dae-Ik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.131-138
    • /
    • 2008
  • Mobile Ad hoc NETworks (MANETs) refer to autonomous networks in which wireless data communications are established between multiple nodes in a given coverage area without a base station or centralized administration. Because of node mobility and limited battery life, the network topology may changes frequently. Selecting the most reliable path during route discovery process is important to improve performance in ad hoc networks. In this paper, an enhanced routing protocol based on AODV(Ad hoc On-demand Distance Vector routing) by monitoring variation of receiving signal strength is proposed. New metric function that consists of node mobility and hops of path is used for routing decision. For preventing route failure by node movement during data transmission, a new route maintenance named as LRC (Local Route Change) is presented. If the node movement is detected, the routing agent switches path to its neighbor node in LRC. Simulation results show that the performance of the proposed routing scheme is superior to previous AODY protocol.

An Attack Origin Traceback Mechanism using ICMP Message on Ad-hoc Network (Ad-hoc 네트워크에서 ICMP메시지를 이용한 공격 근원지 역추적 기법)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.47-54
    • /
    • 2013
  • Ad-hoc network is composed of mobile nodes and has a vulnerability of attack like on conventional wire networks. So, many studies have been conducted to apply the traceback mechanism on wire network to Ad-hoc network. In this paper, a new mechanism that can trace back to IP source of spoofing DDoS packet using iTrace message on Ad-hoc network is proposed. The proposed mechanism implements ICMP Traceback message and the traceback path between agents allocated in local network and a server located in management network. Also the proposed mechanism can trace the position of attacker even after an attack is over and has extendability through standardization by using a mechanism that IETF proposed. Result of performance evaluation shows a great improvement in terms of load, integrity, safety, traceback function as compared with conventional mechanisms.

Energy Efficient Congestion Control Scheme in Ad-hoc Networks (Ad-hoc 통신망의 에너지 효율적인 혼잡 제어 기법)

  • Cho, Nam-Ho;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.5
    • /
    • pp.369-379
    • /
    • 2006
  • In recent years, there have been many researches about Ad-hoc Networks which is available to communicate freely between mobile devices by using multi-hop without any support of relay base or access point. TCP that used the most widely transport protocol in the Internet repeats packet loss and retransmission because it increases congestion window size by using reactive congestion control until packet loss occurs. As a result of this, energy of mobile device is wasted unnecessarily. In this paper, we propose TCP-New Veno in order to improve the energy efficiency of mobile device. According to the state of network, the scheme adjusts appropriate size of congestion window. Therefore, the energy efficiency of mobile device and utilization of bandwidth are improved by the scheme. From the simulation by using ns-2, we could see more improved energy efficiency with TCP-New Veno than those with TCP in Ad-hoc Networks.