• Title/Summary/Keyword: Network Connectivity

Search Result 761, Processing Time 0.024 seconds

A Novel Architecture for Dynamic Mobile Networks with IPv6-based Multiple Network Interfaces (IPv6 기반의 다중 네트워크 인터페이스를 갖는 새로운 동적 이동형 네트워크 아키텍쳐)

  • Kim Wan-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.8 s.350
    • /
    • pp.25-34
    • /
    • 2006
  • In this paper DynaMoNET is suggested as a novel IPv6-based multi-homed mobile network architecture which is composed of nested mobile ad hoc networks dynamically coming together through wireless personal area networks. Each ad hoc network has a mobile router which may work as a root mobile router instead of fixed mobile routers in a DynaMoNET. A root mobile router provides the reliable Internet connectivity for the entire mobile network. This paper includes a innovative handover protocol for multi-homed mobile networks, network switchover algorithm considering multiple decision factors, root mobile router election process based on token-based algorithm fast root mobile router discovery algorithm and fault avoidance mechanism to support reliable Internet connectivity. Finally the system architecture of a mobile router is given in detail.

Routing Protocol using Node Connectivity for Hierarchical Wireless Sensor Network (계층형 무선센서네트워크에서 노드 연결성을 이용한 라우팅 프로토콜)

  • Choi, Hae-Won;Kim, Sang-Jin;Ryoo, Myung-Chun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3A
    • /
    • pp.269-278
    • /
    • 2010
  • There are tendency that wireless sensor network is one of the important techniques for the future IT industry and thereby application areas in it are getting growing. Researches based on the hierarchical network topology are evaluated in good at energy efficiency in related protocols for wireless sensor network. LEACH is the best well known routing protocol for the hierarchical topology. However, there are problems in the range of message broadcasting, which should be expand into the overall network coverage, in LEACH related protocols. This dissertation proposes a new routing protocol to solve the co-shared problems in the previous protocols. The basic idea of our scheme is using the table for nodes connectivity and node energy information. The results show that the proposed protocol could support the load balancing by distributing the clusters with a reasonable number of member nodes and thereby the network life time would be extended in about 1.8 times longer than LEACH.

Epidemic & Prediction based Routing Protocol for Delay Tolerant Network (DTN에서 에피데믹과 예측 기반 알고리즘을 이용한 라우팅 프로토콜)

  • Dho, Yoon-Hyung;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.404-407
    • /
    • 2014
  • Delay Tolerant Network (DTN) is a networking architecture that is designed to solve network problem in unstable and stressed environments using the Store-Carry-Forward method. Different form general networks, DTN does not guarantee the end-to-end connectivity, it is hard for the exiting TCP/IP based protocols to normally work due to the characteristic such as large latency and unstable link connectivity. And the condition that send massage without the information of the destination occurs frequently. Thus, suitable routing protocols for DTN are required and being researched. In this paper, we propose a novel routing protocol for DTN utilizing epidemic and prediction based algorithm to prevent the defect of previously DTN routing protocols such as the absence of the holistic view of the network. Proposed algorithm predicted destination using the mobility information recorded in neighbor node's history and utilize epidemic based algorithm when occurred condition without destination's information. This algorithm is enhanced in terms of delivery ratio, decreases latency and overhead in sparse network such as DTN.

  • PDF

Design and Implementation of Interworking Architecture between 3G Cellular Network and Wireless Broadband Network (이동통신망과 WiBro망과의 연동을 위한 네트워크 아키텍처와 구현방안)

  • Woo Dae-Sic;Park Seong-Soo;Lee Dong-Hahk;Yu Jae-Hwang;Ihm Jong-Tae
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.47-52
    • /
    • 2006
  • In this paper, we suggested new network architecture to provide seamless service between the cellular system and new wireless broadband network such as IEEE 802.16e, called WiBro. The interworking technologies are very important issue because mobile operator should provide service connectivity between various wireless networks based on different access technologies. Moreover a change and modification on legacy network should be minimized for providing interworking with new wireless broad-band network. We implemented proposed interworking architecture between 3G cellular network and 802.16e network to provide seamless service including interworking unit in real test environment. Also, we performed performance evaluation in hybrid network environments.

  • PDF

A Study on the Connectivity between the Smart City Comprehensive Plan and Smart City Planning Using the Social Network Analysis - Focusing on Gwangmyeong and Chuncheon Smart City Services (사회연결망 분석을 활용한 스마트도시종합계획과 스마트도시계획간 연결성 연구 - 광명시와 춘천시의 스마트도시 서비스를 중심으로)

  • Kim, Hong Gwang;Yi, Mi Sook
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.36 no.6
    • /
    • pp.601-609
    • /
    • 2018
  • The Smart City Plan specifies that it should reflect the content of the Smart City Comprehensive Plan, which is the upper plan while presenting the basic direction, promotion strategy, service establishment and operation plans of a smart city construction project. However, there are not enough empirical studies on whether plan contents are systematically established according to smart city planning hierarchy. In this study, we are to use the social network analysis to find out the local government's smart city plan is actually highly connected to the Smart City Comprehensive Plan, a master plan at national level. To this end, we conducted a social network analysis on Gwangmyeong and Chuncheon, which were recently approved for smart city planning. First, 108 keywords were derived from the 2nd Smart City Comprehensive Plan, and the connectivity between these keywords and Smart City Planning was analyzed. The results of the social network analysis showed that the total connections of Smart City Planning in Gwangmyeong was 371, which was higher than 307 in Chuncheon, and the average degree of connection per keyword and network density were also higher in the Gwangmyeong Smart City Planning than the Chuncheon Smart City Planning. The results of the study showed that the Smart City Planning actually had a high connectivity with the Smart City Comprehensive Plan, and the keywords with high connection centrality were different for each local government. The result of this study can be used as a basis for judging whether there is a high correlation between plans.

Design and Implementation of MOST Network Service over POSIX (차량용 MOST 네트워크를 위한 POSIX 기반의 Network Service 설계 및 구현)

  • Lee, Mu-Youl;Chung, Sung-Moon;Jin, Hyun-Wook
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.1
    • /
    • pp.23-28
    • /
    • 2010
  • The automotive industry tries to provide infotainment systems to emerging automobiles. Since the infotainment systems require various peripheral devices and network connectivity, legacy operating systems such as Linux and Windows can be much preferred due to its plentiful device drivers and multimedia applications while the operating systems following OSEK standard are used for automotive electronic control units. Thus it is highly desired that the system software supporting infotainment applications can be portable over different legacy operating systems providing unified programming interfaces. The majority of legacy operating systems support POSIX interfaces for application development. MOST is an automotive network standard for infotainment systems. Network Service defines the protocol stacks for MOST control data, which is essential to implement infotainment applications over MOST. In this paper, we suggest a POSIX-based Network Service so that we can utilize legacy device drivers and applications for automotive infotainment systems. We measure the performance of the POSIX-based Network Service and show that its overhead is not significant.

CUCE: clustering protocol using node connectivity and node energy (노드 연결도와 에너지 정보를 이용한 개선된 센서네트워크 클러스터링 프로토콜)

  • Choi, Hae-Won
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.4
    • /
    • pp.41-50
    • /
    • 2012
  • Network life time is very important issue for wireless sensor network(WSN). It is very important to design sensor networks for sensors to utilize their energies in effective ways. A-PEGASIS that basically bases on PEGASIS and enhances in two aspects-an elegant chain generation algorithm and periodical update of chains. However, it has problems in the chain generation mechanism and some possibility of network partitioning or sensing hole problem in the network, in LEACH related protocols. This dissertation proposes a new clustering protocol to solve the co-shared problems in the previous protocols. The basic idea of our scheme is using the table for node connectivity. The results show that the network life time would be extended in about 1.8 times longer than LEACH and 1.5 times longer than PEGASIS-A.

On Deploying Relays for Connected Indoor Sensor Networks

  • Zhu, Yanmin;Xue, Cuiyao;Cai, Haibin;Yu, Jiadi;Ni, Lei;Li, Minglu;Li, Bo
    • Journal of Communications and Networks
    • /
    • v.16 no.3
    • /
    • pp.335-343
    • /
    • 2014
  • This paper considers the crucial problem of deploying wireless relays for achieving a connected wireless sensor network in indoor environments, an important aspect related to the management of the sensor network. Several algorithms have been proposed for ensuring full sensing coverage and network connectivity. These algorithms are not applicable to indoor environments because of the complexity of indoor environments, in which a radio signal can be dramatically degraded by obstacles such as walls. We first prove theoretically that the indoor relay placement problem is NP-hard. We then predict the radio coverage of a given relay deployment in indoor environments. We consider two practical scenarios; wire-connected relays and radio-connected relays. For the network with wire-connected relays, we propose an efficient greedy algorithm to compute the deployment locations of relays for achieving the required coverage percentage. This algorithm is proved to provide a $H_n$ factor approximation to the theoretical optimum, where $H_n=1+{\frac{1}{2}}+{\cdots}+{\frac{1}{n}}={\ln}(n)+1$, and n is the number of all grid points. In the network with radio-connected relays, relays have to be connected in an ad hoc mode. We then propose an algorithm based on the previous algorithm for ensuring the connectivity of relays. Experimental results demonstrate that the proposed algorithms achieve better performance than baseline algorithms.

Authenticated Route Optimization Protocol for Network Mobility Support (네트워크 이동성 지원을 위한 인증된 경로 최적화 프로토콜)

  • Koo, Jung-Doo;Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.781-787
    • /
    • 2007
  • Network Mobility (NEMO) basic support protocol doesn't execute the process of route optimization and has not presented the particular security mechanism in other blocks except hi-directional tunnel between Mobile Router (MR) and its Home Agent (HA). Therefore in this paper we process secure route optimization courses through authenticated binding update protocol between MR and its Correspondent Node (CN) and the protocol of the competency of mandate between MR and its Mobile Network Node (MNN); its block also uses an bi-directional tunnel as the block between MR and its HA. The address of each node are generated by the way of Cryptographically Generated Address (CGA) for proving the ownership of address. Finally we analyze the robustness of proposed protocol using security requirements of MIPv6 and existing attacks and the efficiency of this protocol using the connectivity recovery and end-to-end packet transmission delay time.

  • PDF

Adjacent Matrix-based Hole Coverage Discovery Technique for Sensor Networks

  • Wu, Mary
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.169-176
    • /
    • 2019
  • Wireless sensor networks are used to monitor and control areas in a variety of military and civilian areas such as battlefield surveillance, intrusion detection, disaster recovery, biological detection, and environmental monitoring. Since the sensor nodes are randomly placed in the area of interest, separation of the sensor network area may occur due to environmental obstacles or a sensor may not exist in some areas. Also, in the situation where the sensor node is placed in a non-relocatable place, some node may exhaust energy or physical hole of the sensor node may cause coverage hole. Coverage holes can affect the performance of the entire sensor network, such as reducing data reliability, changing network topologies, disconnecting data links, and degrading transmission load. It is possible to solve the problem that occurs in the coverage hole by finding a coverage hole in the sensor network and further arranging a new sensor node in the detected coverage hole. The existing coverage hole detection technique is based on the location of the sensor node, but it is inefficient to mount the GPS on the sensor node having limited resources, and performing other location information processing causes a lot of message transmission overhead. In this paper, we propose an Adjacent Matrix-based Hole Coverage Discovery(AMHCD) scheme based on connectivity of neighboring nodes. The method searches for whether the connectivity of the neighboring nodes constitutes a closed shape based on the adjacent matrix, and determines whether the node is an internal node or a boundary node. Therefore, the message overhead for the location information strokes does not occur and can be applied irrespective of the position information error.