• Title/Summary/Keyword: Link-Node

Search Result 623, Processing Time 0.024 seconds

A Case for Using Service Availability to Characterize IP Backbone Topologies

  • Keralapura Ram;Moerschell Adam;Chuah Chen Nee;Iannaccone Gianluca;Bhattacharyya Supratik
    • Journal of Communications and Networks
    • /
    • v.8 no.2
    • /
    • pp.241-252
    • /
    • 2006
  • Traditional service-level agreements (SLAs), defined by average delay or packet loss, often camouflage the instantaneous performance perceived by end-users. We define a set of metrics for service availability to quantify the performance of Internet protocol (IP) backbone networks and capture the impact of routing dynamics on packet forwarding. Given a network topology and its link weights, we propose a novel technique to compute the associated service availability by taking into account transient routing dynamics and operational conditions, such as border gateway protocol (BGP) table size and traffic distributions. Even though there are numerous models for characterizing topologies, none of them provide insights on the expected performance perceived by end customers. Our simulations show that the amount of service disruption experienced by similar networks (i.e., with similar intrinsic properties such as average out-degree or network diameter) could be significantly different, making it imperative to use new metrics for characterizing networks. In the second part of the paper, we derive goodness factors based on service availability viewed from three perspectives: Ingress node (from one node to many destinations), link (traffic traversing a link), and network-wide (across all source-destination pairs). We show how goodness factors can be used in various applications and describe our numerical results.

Maximum Lifetime Geocast Considering Link Error Rates in Ad-Hoc Networks (Ad-hoc 네트워크에서 최대 네트워크 수명과 링크 에러율을 고려한 지오캐스트)

  • Lee, Ju-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.69-77
    • /
    • 2006
  • Geocasting is a form of communication that transmits messages to all nodes within a given geographical region(i.e., the geocasting region). Most of conventional onery aware protocols were based on shortest-hop routing that is, they minimized the cost in terms of the distance and total transmission energy not considering both the residual energy at each node and the link error ratio when selecting the routes for communication. In this paper we propose a MLRG(Maximum Lifetime Reliable Geocast) protocol for energy-efficient and reliable geocasting in Ad-hoc networks. The proposed MLRG, a position-based and routing-based geocasting algorithm, maximizes the network lifetime using newly defined cost function and selecting the energy balanced routes on the basis of each node's residual energy, and provides a reliable communication considering the link error ratio.

  • PDF

Exact Performance Analysis of AF Based Hybrid Satellite-Terrestrial Relay Network with Co-Channel Interference

  • Javed, Umer;He, Di;Liu, Peilin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3412-3431
    • /
    • 2015
  • This paper considers the effect of co-channel interference on hybrid satellite-terrestrial relay network. In particular, we investigate the problem of amplify-and-forward (AF) relaying in hybrid satellite-terrestrial link, where the relay is interfered by multiple co-channel interferers. The direct link between satellite and terrestrial destination is not available due to masking by surroundings. The destination node can only receive signals from satellite with the assistance of a relay node situated at ground. The satellite-relay link is assumed to follow the shadowed Rice fading, while the channels of interferer-relay and relay-destination links experience Nakagami-m fading. For the considered AF relaying scheme, we first derive the analytical expression for the moment generating function (MGF) of the output signal-to-interference-plus-noise ratio (SINR). Then, we use the obtained MGF to derive the average symbol error rate (SER) of the considered scenario for M-ary phase shift keying (M-PSK) constellation under these generalized fading channels.

A TCP Performance Enhancement Scheme in Wireless Mesh Networks (무선 메쉬 네트워크에서 TCP 성능 향상 기법)

  • Lee, Hye-Rim;Moon, Il-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1139-1145
    • /
    • 2010
  • Wireless mesh network is similar to ad-hoc network, so when transferred to the data packet in the wireless environment, interfered factor arise. When TCP(Transport Control Protocol) was created, however as it was design based on wired link, wireless link made more transmission error than wired link. It is existent problem that TCP unfairness and congestion collapse over wireless mesh network. But packet losses due to transmission errors are more frequent. The cause of transmission error in wireless ad-hoc network may be inexactly regarded as indications of network congestion. And then, Congestion Control Algorithm was running by this situation causes the TCP performance degradation. In this paper, proposed TCP can adaptively regulate the congestion window through moving node in the Wireless Mesh Network. And it enhanced the performance.

Resilient Packet Transmission (RPT) for the Buffer Based Routing (BBR) Protocol

  • Rathee, Geetanjali;Rakesh, Nitin
    • Journal of Information Processing Systems
    • /
    • v.12 no.1
    • /
    • pp.57-72
    • /
    • 2016
  • To provide effective communication in the wireless mesh network (WMN), several algorithms have been proposed. Since the possibilities of numerous failures always exist during communication, resiliency has been proven to be an important aspect for WMN to recover from these failures. In general, resiliency is the diligence of the reliability and availability in network. Several types of resiliency based routing algorithms have been proposed (i.e., Resilient Multicast, ROMER, etc.). Resilient Multicast establishes a two-node disjoint path and ROMER uses a credit-based approach to provide resiliency in the network. However, these proposed approaches have some disadvantages in terms of network throughput and network congestion. Previously, the buffer based routing (BBR) approach has been proposed to overcome these disadvantages. We proved earlier that BBR is more efficient in regards to w.r.t throughput, network performance, and reliability. In this paper, we consider the node/link failure issues and analogous performance of BBR. For these items we have proposed a resilient packet transmission (RPT) algorithm as a remedy for BBR during these types of failures. We also share the comparative performance analysis of previous approaches as compared to our proposed approach. Network throughput, network congestion, and resiliency against node/link failure are particular performance metrics that are examined over different sized WMNs.

Enhancing Security in Mobile IPv6

  • Modares, Hero;Moravejosharieh, Amirhossein;Salleh, Rosli Bin;Lloret, Jaime
    • ETRI Journal
    • /
    • v.36 no.1
    • /
    • pp.51-61
    • /
    • 2014
  • In the Mobile IPv6 (MIPv6) protocol, a mobile node (MN) is a mobile device with a permanent home address (HoA) on its home link. The MN will acquire a care-of address (CoA) when it roams into a foreign link. It then sends a binding update (BU) message to the home agent (HA) and the correspondent node (CN) to inform them of its current CoA so that future data packets destined for its HoA will be forwarded to the CoA. The BU message, however, is vulnerable to different types of security attacks, such as the man-in-the-middle attack, the session hijacking attack, and the denial-of-service attack. The current security protocols in MIPv6 are not able to effectively protect the BU message against these attacks. The private-key-based BU (PKBU) protocol is proposed in this research to overcome the shortcomings of some existing MIPv6 protocols. PKBU incorporates a method to assert the address ownership of the MN, thus allowing the CN to validate that the MN is not a malicious node. The results obtained show that it addresses the security requirements while being able to check the address ownership of the MN. PKBU also incorporates a method to verify the reachability of the MN.

Broadcasting Message Reduction Methods in VANET

  • Makhmadiyarov, Davron;Hur, Soojung;Park, Yongwan
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.1
    • /
    • pp.42-49
    • /
    • 2009
  • Most Vehicular Ad hoc Network (VANET) applications rely heavily on broadcast transmission of traffic related information to all reachable nodes within a certain geographical area. Among various broadcast approaches, flooding is the first broadcasting technique. Each node rebroadcasts the received message exactly once, which results in broadcast storm problems. Some mechanisms have been proposed to improve flooding in Mobile Ad hoc Networks (MANET), but they are not effective for VANET and only a few studies have addressed this issue. We propose two distance-based and timer-based broadcast suppression techniques: 15P(15percent) and slotted 15P. In the first (distance based) scheme, node's transmission range is divided into three ranges (80%,15%and5%). Only nodes within 15% range will rebroadcast received packet. Specific packet retransmission range (15%) is introduced to reduce the number of messages reforwarding nodes that will mitigate the broadcaststorm. In the second (timer-based) scheme, waiting time allocation for nodes within 15% range isused to significantly reduce the broadcaststorm. The proposed schemes are distributed and reliedon GPS information and do not requireany other prior knowledge about network topology. To analyze the performance of proposed schemes, statistics such as link load and the number of retransmitted nodes are presented. Our simulation results show that the proposed schemes can significantly reduce link load at high node densities up to 90 percent compared to a simple broadcast flooding technique.

  • PDF

Defect-free 4-node flat shell element: NMS-4F element

  • Choi, Chang-Koon;Lee, Phill-Seung;Park, Yong-Myung
    • Structural Engineering and Mechanics
    • /
    • v.8 no.2
    • /
    • pp.207-231
    • /
    • 1999
  • A versatile 4-node shell element which is useful for the analysis of arbitrary shell structures is presented. The element is developed by flat shell approach, i.e., by combining a membrane element with a Mindlin plate element. The proposed element has six degrees of freedom per node and permits an easy connection to other types of finite elements. In the plate bending part, an improved Mindlin plate has been established by the combined use of the addition of non-conforming displacement modes (N) and the substitute shear strain fields (S). In the membrane part, the nonconforming displacement modes are also added to the displacement fields to improve the behavior of membrane element with drilling degrees of freedom and the modified numerical integration (M) is used to overcome the membrane locking problem. Thus the element is designated as NMS-4F. The rigid link correction technique is adopted to consider the effect of out-of-plane warping. The shell element proposed herein passes the patch tests, does not show any spurious mechanism and does not produce shear and membrane locking phenomena. It is shown that the element produces reliable solutions even for the distorted meshes through the analysis of benchmark problems.

Design and Evaluation of a Fault-tolerant Publish/Subscribe System for IoT Applications (IoT 응용을 위한 결함 포용 발행/구독 시스템의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1101-1113
    • /
    • 2021
  • The rapid growth of sense-and-respond applications and the emerging cloud computing model present a new challenge: providing publish/subscribe middleware as a scalable and elastic cloud service. The publish/subscribe interaction model is a promising solution for scalable data dissemination over wide-area networks. In addition, there have been some work on the publish/subscribe messaging paradigm that guarantees reliability and availability in the face of node and link failures. These publish/subscribe systems are commonly used in information-centric networks and edge-fog-cloud infrastructures for IoT. The IoT has an edge-fog cloud infrastructure to efficiently process massive amounts of sensing data collected from the surrounding environment. In this paper. we propose a quorum-based hierarchical fault-tolerant publish/subscribe systems (QHFPS) to enable reliable delivery of messages in the presence of link and node failures. The QHFPS efficiently distributes IoT messages to the publish/subscribe brokers in fog overlay layers on the basis of proposing extended stepped grid (xS-grid) quorum for providing tolerance when faced with node failures and network partitions. We evaluate the performance of QHFPS in three aspects: number of transmitted Pub/Sub messages, average subscription delay, and subscritpion delivery rate with an analytical model.

A New Routing Protocol in Wireless Ad-hoc Networks with Multiple Radios and Channels

  • Ko, Sung-Won;Cho, Jeong-Hwan;Hong, Kwon-Eui
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.7
    • /
    • pp.26-40
    • /
    • 2010
  • We propose a new routing protocol, MCQosR, that is based on bandwidth estimation, admission control, and a routing metric, MCCR - suitable for wireless ad-hoc networks with multiple radios and channels. To use the full capacity of a wireless link, we assume a node with multiple radios for full duplex operation, and a radio using multiple channels to exclude route-intra interference. This makes it possible to use the capacity of a wireless link. Then, to provide bandwidth and delay guarantee, we have a radio with a fixed channel for layer-3 data reception at each node, used to estimate the available bandwidth and expected delay of a wireless link. Based on the estimate of available bandwidth and delay, we apply the call admission control to a new call requiring bandwidth and delay guarantee. New calls with traffic that will overflow link or network capacity are rejected so the accepted calls can use the required bandwidth and delay. Finally, we propose a routing metric, MCCR, which considers the channel contentions and collisions of a wireless link operating in CSMA/CA. MCCR is useful for finding a route with less traffic and distributing traffic over the network to prevent network congestion as much as possible. The simulation of the MCQosR protocol and the MCCR metric shows traffic is distributed and guaranteed service is provided for accepted calls.