• Title/Summary/Keyword: Hop-based Routing

Search Result 316, Processing Time 0.022 seconds

Bit-Map Based Hybrid Fast IP Lookup Technique (비트-맵 기반의 혼합형 고속 IP 검색 기법)

  • Oh Seung-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.2
    • /
    • pp.244-254
    • /
    • 2006
  • This paper presents an efficient hybrid technique to compact the trie indexing the huge forward table small enough to be stored into cache for speeding up IP lookup. It combines two techniques, an encoding scheme called bit-map and a controlled-prefix expanding scheme to replace slow memory search with few fast-memory accesses and computations. For compaction, the bit-map represents each index and child pointer with one bit respectively. For example, when one node denotes n bits, the bit-map gives a high compression rate by consumes $2^{n-1}$ bits for $2^n$ index and child link pointers branched out of the node. The controlled-prefix expanding scheme determines the number of address bits represented by all root node of each trie's level. At this time, controlled-prefix scheme use a dynamic programming technique to get a smallest trie memory size with given number of trie's level. This paper proposes standard that can choose suitable trie structure depending on memory size of system and the required IP lookup speed presenting optimal memory size and the lookup speed according to trie level number.

  • PDF

Resource Allocation in Spectrum Sharing ad-hoc Cognitive Radio Networks Based on Game Theory: An Overview

  • Abdul-Ghafoor, Omar B.;Ismail, Mahamod;Nordin, Rosdiadee;El-Saleh, Ayman Abd
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.2957-2986
    • /
    • 2013
  • The traditional approach of fixed spectrum allocation to licensed networks has resulted in spectrum underutilisation. Cognitive radio technology is envisioned as a promising solution that can be used to resolve the ineffectiveness of the fixed spectrum allocation policy by accessing the underutilised spectrum of existing technologies opportunistically. The implementation of cognitive radio networks (CRNs) faces distinct challenges due to the fact that two systems (i.e., cognitive radio (CR) and primary users (PUs)) with conflicting interests interact with each other. Specially, in self-organised systems such as ad-hoc CRNs (AHCRNs), the coordination of spectrum access introduces challenges to researchers due to rapid utilisation changes in the available spectrum, as well as the multi-hop nature of ad-hoc networks, which creates additional challenges in the analysis of resource allocation (e.g., power control, channel and rate allocation). Instead, game theory has been adopted as a powerful mathematical tool in analysing and modelling the interaction processes of AHCRNs. In this survey, we first review the most fundamental concepts and architectures of CRNs and AHCRNs. We then introduce the concepts of game theory, utility function, Nash equilibrium and pricing techniques. Finally, we survey the recent literature on the game theoretic analysis of AHCRNs, highlighting its applicability to the physical layer PHY, the MAC layer and the network layer.

Publish/Subscrib Service based Selective Sensor Data Monitoring System using Mesh Network (메쉬 네트워크에서 가입/게시(subscribe/publish) 서비스기반 선택적 센서정보 모니터링 시스템)

  • Kim, Yong-Hyuck;Kim, Young-Han
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.493-502
    • /
    • 2010
  • In this paper we propose a scalable sensor network system that makes mesh network among the sink nodes to solve the scalability problem of existing sensor network which is caused by multi-hop networking between the sensor nodes. In the proposed system, the sink nodes have the wireless networking ability to communicate with another sink nodes in mesh fashion, and with the monitoring nodes which is located in the local area or internet area. Especially, the system includes L4(Application Layer) routing mechanism that provides subscribe/publish service to serve selective transmission of sensor data to the specific monitoring nodes. The collected sensor data is transmitted to the monitoring nodes when the sensor data is matched with the monitoring node's interesting value.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

Development of Multipoint Simultaneous Full-duplex Team Communication Module for SCBA (SCBA 면체용 다자간 동시 양방향 팀 통신모듈 개발)

  • Kim, Si-Kuk;Choi, Su-Gil;Lim, Woo-Sub;Han, Yong-Taek
    • Fire Science and Engineering
    • /
    • v.33 no.6
    • /
    • pp.165-172
    • /
    • 2019
  • This study presents the design and manufacture of a self-contained breathing apparatus SCBA wireless communication module with a multipoint simultaneous full-duplex communication system to enable communication between team members wearing the SCBA system. It is necessary for fire-fighters to wear the SCBA system during extinguishing and rescue work at the fire site. Evaluation of the team communication module confirmed the feasibility of communication over more than 500 m in the test condition based on the line of sight. By implementing the Ad-hoc function, it was confirmed that the communication distance could be extended to 128 m by automatic routing up to 3 hoc. The vertical distance inside the building for successful communication was up to the 5th floor in the open staircase and up to the 3rd floor in the partitioned staircase. Furthermore, the performance testing of the communication module assuming a fire situation, confirmed that five team members correctly recognized the standard abbreviation of fire and wireless communication without a separate PTT key operation. In addition, the flame resistance was verified by exposing the module to a flame at 950 ± 50 ℃ for 5 s and then immediately extinguishing the flame.

A Real-Time Data Transfer Mechanism Considering Link Error Rates in Wireless Sensor Networks (무선 센서 네트워크에서 링크 에러율을 고려한 실시간 데이터 전달 기법)

  • Choi, Jae-Won;Lee, Kwang-Hui
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.1
    • /
    • pp.146-154
    • /
    • 2007
  • In this paper, we have presented a real-time transfer mechanism for the delay-sensitive data in WSNs (Wireless Sensor Networks). The existing methods for real-time data transfer select a path whose latency is shortest or the number of hops is least. Although the approaches of these methods are acceptable, they do not always work as efficiently as they can because they had no consideration for the link error rates. In the case of transmission failures on links, they can not guarantee the end-to-end real-time transfer due to retransmissions. Therefore, we have proposed an algorithm to select a real-time transfer path in consideration of the link error rates. Our mechanism estimates the 1-hop delay based on the link error rate between two neighboring nodes, which in turn enables the calculation of the expected end-to-end delay. A source node comes to choose a path with the shortest end-to-end delay as a real-time route, and sends data along the path chosen. We performed various experiments changing the link error rates and discovered that this proposed mechanism improves the speed of event-to-sink data transfer and reduces delay jitter. We also found that this mechanism prevents additional energy consumption and prolongs network lifetime, resulting from the elative reduction of transmission failures and retransmissions.