• Title/Summary/Keyword: Network Routing Protocol

Search Result 1,135, Processing Time 0.039 seconds

Clustering Ad hoc Network Scheme and Classifications Based on Context-aware

  • Mun, Chang-Min;Lee, Kang-Whan
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.475-479
    • /
    • 2009
  • In ad hoc network, the scarce energy management of the mobile devices has become a critical issue in order to extend the network lifetime. Current research activity for the Minimum Energy Multicast (MEM) problem has been focused on devising efficient centralized greedy algorithms for static ad hoc networks. In this paper, we consider mobile ad hoc networks(MANETs) that could provide the reliable monitoring and control of a variety of environments for remote place. Mobility of MANET would require the topology change frequently compared with a static network. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. In this paper, we propose a new method, the CACH(Context-aware Clustering Hierarchy) algorithm, a hybrid and clustering-based protocol that could analyze the link cost from a source node to a destination node. The proposed analysis could help in defining the optimum depth of hierarchy architecture CACH utilize. The proposed CACH could use localized condition to enable adaptation and robustness for dynamic network topology protocol and this provide that our hierarchy to be resilient. As a result, our simulation results would show that CACH could find energy efficient depth of hierarchy of a cluster.

The Design of Mobile Grid Architecture using Ad-Hoc Network (Ad-Hoc 네트워크를 이용한 모바일 그리드의 구조 설계)

  • Kim Tea-Kyoung;Seo Hee-Sek;Kim Hee-Wan
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.2
    • /
    • pp.345-354
    • /
    • 2005
  • Mobile grid can provide the grid service to grid users regardless of space and time. There are many restrictions to use grid service in mobile environment such as battery power of mobile device, movement pattern of mobile device etc. So it is difficult to apply the grid technologies of wired network to wireless network environments. Therefore, to provide the mobile grid service, we suggested the mobile grid architecture using ad-hoc network. Also we showed that hybrid routing protocol is efficient for mobile grid service by considering the battery power of mobile device and simulations of evaluating the delay time of three routing protocols using NS-2. We will study the methods of resource allocations and network reliability to provide the mobile grid service.

  • PDF

Routing protocol Analysis for Minimum delay Between Hierarchical node in Low Power Sensor Network (저 전력 센서 네트워크에서의 계층 노드 간 지연 감소를 위한 라우팅 프로토콜 분석)

  • Kim, Dong Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1721-1726
    • /
    • 2014
  • The sensor network technology for core technology of ubiquitous computing is in the spotlight recently, the research on sensor network is proceeding actively which is composed many different sensor node. The major traffic patterns of plenty of sensor networks are composed of collecting types of single directional data, which is transmitting packets from several sensor nodes to sink node. One of the important condition for design of sensor node is to extend for network life which is to minimize power-consumption under the limited resources of sensor network. In this paper analysis used routing protocols using the network simulation that was used second level cluster structure to reduce delay and power-consumption of sensor node.

Discrete-Event Based Packet Simulation for Sensor Network Routing Protocols (분산이벤트 기반 센서네트워크 패킷 라우팅 프로토클 시뮬레이션)

  • Chung, Kyung-Yul;Lee, Hoo-Rock;Choi, Dae-Seok;Kim, Yong-Sik;Lee, Soo-Tae;Rhyu, Keel-Soo
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2006.06a
    • /
    • pp.79-81
    • /
    • 2006
  • Simulation and physical implementation are both valuable tools in evaluating sensor network routing protocols, but neither alone is sufficient. In this paper, we present the implementation and analysis of sensor routing protocols on the discrete-event simulation system that allows existing nesC codes of sensor network routing protocols to be used to create a physical implementation of the same protocol. We have evaluated the Surge function of TinyOS through example implementations in the Ptolemy II of the unmodified codes and Direct-diffusion routing protocols using VIPTOS simulation models.

  • PDF

Power and Location Information based Routing Protocol Design in Wireless Sensor Networks (무선 센서 네트워크에서 전력과 위치정보 기반 라우팅 프로토콜 디자인)

  • Son Byung-Rak;Kim Jung-Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.2
    • /
    • pp.48-62
    • /
    • 2006
  • In recent years, wireless sensor networks(WSNs) have emerged as a new fast-growing application domain for wireless distributed computing and embedded systems. Recent Progress in computer and communication technology has made it possible to organize wireless sensor networks composed tiny sensor nodes. Furthermore, ad-hoc network protocols do not consider the characteristics of wireless sensor nodes, making existing ad-hoc network protocols unsuitable for the wireless sensor networks. First, we propose power-aware routing protocols based on energy-centered routing metrics. Second, we describe power management techniques for wireless sensor nodes using the spatial locality of sensed data. Many nodes can go into a power-down mode without sacrificing the accuracy of sensed data. Finally, combining the proposed techniques, we describe an overall energy-efficient protocol for data collection. Experimental results show that the proposed routing protocol can extend the routing path lifetime more than twice. The average energy consumption per sensing period is reduced by up to 30%.

  • PDF

Ant Colony Optimization and Data Centric Routing Approach for Sensor Networks

  • Lim, Shu-Yun;Lee, Ern-Yu;Park, Su-Hyun;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.410-415
    • /
    • 2007
  • Recent advances in sensor network technology have open up challenges for its effective routing. Routing protocol receives most of the attention because routing protocols might differ depending on the application and network architecture. In the rapidly changing environment and dynamic nature of network formation efficient routing and energy consumption are very crucial. Sensor networks differ from the traditional networks in terms of energy consumption. Thus, data-centric technologies should be used to perform routing to yield an energy-efficient dissemination. By exploiting the advantages of both ant colony optimization techniques in network routing and the ability of data centric muting to organize data for delivery, our approach will cover features for building an efficient autonomous sensor network.

A Short Path Data Routing Protocol for Wireless Sensor Network (단거리 데이터 전달 무선 센서네트워크 라우팅 기법)

  • Ahn, Kwang-Seon
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.395-402
    • /
    • 2007
  • Wireless sensor networks have many sensor nodes which response sudden events in a sensor fields. Some efficient routing protocol is required in a sensor networks with mobile sink node. A data-path template is offered for the data announcement and data request from source node and sink node respectively. Sensed data are transferred from source node to sink node using short-distance calculation. Typical protocols for the wireless networks with mobile sink are TTDD(Two-Tier Data Dissemination) and CBPER(Cluster-Based Power-Efficient Routing). The porposed SPDR(Short-Path Data Routing) protocol in this paper shows more improved energy efficiencies from the result of simulations than the typical protocols.

A Study for Detection Accuracy Improvement of Malicious Nodes on MANET (MANET에서의 의심노드 탐지 정확도 향상을 위한 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.95-101
    • /
    • 2013
  • MANET has an advantage that can build a network quickly and easily in difficult environment to build network. In particular, routing protocol that uses in existing mobile environment cannot be applied literally because it consists of only mobile node. Thus, routing protocol considering this characteristic is necessary. Malicious nodes do extensive damage to the whole network because each mobile node has to act as a router. In this paper, we propose technique that can detect accurately the suspected node which causes severely damage to the performance of the network. The proposed technique divides the whole network to zone of constant size and is performed simultaneously detection technique based zone and detection technique by collaboration between nodes. Detection based zone translates the information when member node finishes packet reception or transmission to master node managing zone and detects using this. The collaborative detection technique uses the information of zone table managing in master node which manages each zone. The proposed technique can reduce errors by performing detection which is a reflection of whole traffic of network.

An adaptive MAC protocol exploiting multiple paths in wireless mesh networks

  • Lee, Hyung-Keun;Yi, Joon-Hwan
    • Journal of IKEEE
    • /
    • v.13 no.1
    • /
    • pp.94-100
    • /
    • 2009
  • In recent years, the wireless mesh network (WMN) has been an emerging technology to provide Internet access to fixed and mobile wireless devices. The main goal of this paper is the design and simulation of a new MAC protocol based on the multi-path routing information for wireless mesh networks. The information about multiple paths discovered in the network layer is exploited by the MAC layer in order to forward a frame over the best hop out of multiple hop choices. The performance of our approach is compared with conventional 802.11 MAC through the simulation. The results show that our scheme exhibits a significantly better performance rather than conventional 802.11 MAC protocol in terms of packet overhead, end-to-end throughput and delay.

  • PDF

A Reputation based Cooperative Routing Scheme for End-to-End Reliable Communications in Multi-hop Wireless Networks (다중 홉 무선 네트워크에서 종단 간 신뢰성 통신을 위한 평판 기반의 협력적 라우팅 기법)

  • Kim, Tae-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.11
    • /
    • pp.1593-1608
    • /
    • 2009
  • If a certain relay node in multi-hop wireless networks might become a malicious node that does not cooperate with other nodes or a selfish node, network throughput will be dramatically decreased. Most of existing ad hoc routing protocols assuming that the nodes will fully cooperate with other nodes do not resolve the problem of network performance degradation due to malicious and selfish nodes. This paper presents the CARE (Cooperative Ad hoc routing protocol based REputation) scheme incorporating the reputation management that can achieve a multi-hop wireless network with high throughput performance. The proposed scheme provides the horizontal cross-layer approach which can identify misbehaving malicious, selfish nodes dropped out of the hop-by-hop based packet processing in the network and then set up an optimal packet routing path that will detour misbehaving nodes. And the vertical cross-layer approach contained in the CARE scheme attempts to improve the quality of routing paths by exploiting the quality of link information received from the MAC layer. Besides, it provides high TCP throughput by exploiting the reputation values of nodes acquired from the network layer into the transport layer. A case study on experiments and simulations shows that the CARE scheme incorporating vertical and horizontal cross-layer approaches yields better performance in terms of the low rate of packet loss, fast average packet delivery time, and high TCP throughput between end-to-end nodes.

  • PDF