• Title/Summary/Keyword: Network Routing Protocol

Search Result 1,135, Processing Time 0.027 seconds

MPLS Traffic Engineering of standard skill (MPLS Traffic Engineering의 표준 기술)

  • Kim, Kang;Jeon, Jong-Sik;Kim, Ha-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.68-73
    • /
    • 2001
  • MPLS(Multi protocol Label Switching) is standard skill for added to speed and control the Network Traffic. MPLS concerned the routing protocol to relative Pack line, Each Pack composed label and node, saved the time to seek the address of node. MPLS worked IP, ATM and Network protocol of flame rely. MPLS is Network OSI suport model, 2Layer send to most of Packinsted of 3Layer Switching. MPLS is added speed Traffic of QoS and effective controled the Network.

  • PDF

An Improvement of Routing Performance in Ad Hoc Networks (애드혹 네트워크에서의 라우팅 성능 개선)

  • Park, No-Yeul;Kim, Chang-Hwa;Kim, Sang-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.79-86
    • /
    • 2006
  • This paper proposes a new protocol to enhance the routing performance and applies our proposal to AODV (Ad hoc On-demand Distance Vector routing) protocol, which is a typical on-demand routing protocol in MANET. In general, when a route repair procedure is performed due to the transfer or failure of a node, the source node re-initiate a route discovery procedure in most routing protocols of MANET. This causes to increase the control traffic overhead largely and degrade the routing performance. The main idea of our study is to provide a methodology that can minimize the control traffic overhead and enhance the performance by initiating a route repair procedure at destination node and utilizing the previous routing information maximumly. To evaluate the performance of the our mechanism, we have performed a series of simulations. The simulations include comparisons with AODV and AODV with local repair. The simulations have been executed under simulation environments taking into account mobility speed and network site. The simulation results show that our proposal overall outperforms the existing protocols.

  • PDF

Location based Ad-hoc Network Routing Protocol for Ubiquitous Port (지능형 항만을 위한 위치기반 Ad-hoc 네트워크 라우팅 프로토콜)

  • Lee, Bong-Hee;Choi, Young-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.65-71
    • /
    • 2011
  • In this paper, the RFID / USN-based ad-hoc network structure is presented for efficient operation of a container terminal yard. Communication between fixed or mobile devices in the container terminal yard is accomplished through the ad-hoc node, to collect the status information of a container in real time. Any outside shipper of the container as well as central server allows to share the status information of a container through ad-hoc communication. In addition, to predict the maximum wireless transmission range of nodes by RFID tag position in the yard, LAODV (Location based AODV) routing protocol is proposed. The validity is proved by performance evaluation via computer simulation.

A Clustered Directed Diffusion Routing Protocol for Wireless Sensor Network (무선센서 네트워크에서 클러스터화된 디렉티드 디퓨젼 라우팅 프로토콜)

  • Zhao, Bin;Lee, Kyung-Oh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.165-172
    • /
    • 2011
  • Wireless sensor networks consist of small battery powered devices with limited energy resources. Once deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible. Hence, energy efficiency is a key design issue that needs to be enhanced in order to improve the life span of the network. Directed Diffusion is a well known routing protocol. In this paper we adopt the clustering mechanism to improve the efficiency of Directed Diffusion. We introduce C-Directed Diffusion which make clusters, select the CH(Cluster Head) and CHs do the same process as in Directed Diffusion. C-Directed Diffusion is pretty simple and show better performance than Directed Diffusion.

WSN-based Coastal Environment Monitoring System Using Flooding Routing Protocol (플러딩 라우팅 프로토콜을 이용한 WSN 기반의 연안 환경 모니터링 시스템)

  • Yoo, Jae-Ho;Lee, Chang-Hee;Ock, Young-Seok;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.21 no.1
    • /
    • pp.46-52
    • /
    • 2012
  • The rapid water pollution in stream, river, lake and sea in recent years raises an urgent need for continuous monitoring and policymaking to conserve the global clean environment. In particular, the increasing water pollution in coastal marine areas adds to the importance of the environmental monitoring systems. In this paper, the mobile server is designed to gathers information of the water quality at coastal areas. The obtained data by the server is transmitted from field servers to the base station via multi-hop communication in wireless sensor network. The information collected includes dissolved oxygen(DO), hydrogen ion exponent(pH), temperature, etc. By the information provided the real-time monitoring of water quality at the coastal marine area. In addition, wireless sensor network-based flooding routing protocol was designed and used to transfer the measured water quality information efficiently. Telosb sensor node is programmed using nesC language in TinyOS platform for small scale wireless sensor network monitoring from a remote server.

Evaluation of the Use of Guard Nodes for Securing the Routing in VANETs

  • Martinez, Juan A.;Vigueras, Daniel;Ros, Francisco J.;Ruiz, Pedro M.
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.122-131
    • /
    • 2013
  • We address the problem of effective vehicular routing in hostile scenarios where malicious nodes intend to jeopardize the delivery of messages. Compromised vehicles can severely affect the performance of the network by a number of attacks, such as selectively dropping messages, manipulating them on the fly, and the likes. One of the best performing solutions that has been used in static wireless sensor networks to deal with these attacks is based on the concept of watchdog nodes (also known as guard nodes) that collaborate to continue the forwarding of data packets in case a malicious behavior in a neighbor node is detected. In this work, we consider the beacon-less routing algorithm for vehicular environments routing protocol, which has been previously shown to perform very well in vehicular networks, and analyze whether a similar solution would be feasible for vehicular environments. Our simulation results in an urban scenario show that watchdog nodes are able to avoid up to a 50% of packet drops across different network densities and for different number of attackers, without introducing a significant increase in terms of control overhead. However, the overall performance of the routing protocol is still far from optimal. Thus, in the case of vehicular networks, watchdog nodes alone are not able to completely alleviate these security threats.

DTN Routing with Back-Pressure based Replica Distribution

  • Jiao, Zhenzhen;Tian, Rui;Zhang, Baoxian;Li, Cheng
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.378-384
    • /
    • 2014
  • Replication routing can greatly improve the data delivery performance by enabling multiple replicas of the same packet to be transmitted towards its destination simultaneously. It has been studied extensively recently and is now a widely accepted routing paradigm in delay tolerant networks (DTNs). However, in this field, the issue of how to maximize the utilization efficiency of limited replication quota in a resource-saving manner and therefore making replication routing to be more efficient in networks with limited resources has not received enough attention. In this paper, we propose a DTN routing protocol with back-pressure based replica distribution. Our protocol models the replica distribution problem from a resource allocation perspective and it utilizes the idea of back-pressure algorithm, which can be used for providing efficient network resource allocation for replication quota assignment among encountered nodes. Simulation results demonstrate that the proposed protocol significantly outperforms existing replication routing protocols in terms of packet delay and delivery ratio.

Efficient and Secure Routing Protocol forWireless Sensor Networks through SNR Based Dynamic Clustering Mechanisms

  • Ganesh, Subramanian;Amutha, Ramachandran
    • Journal of Communications and Networks
    • /
    • v.15 no.4
    • /
    • pp.422-429
    • /
    • 2013
  • Advances in wireless sensor network (WSN) technology have enabled small and low-cost sensors with the capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. In the WSN, the sensor nodes have a limited transmission range and their processing and storage capabilities as well as their energy resources are limited. A triple umpiring system has already been proved for its better performance in WSNs. The clustering technique is effective in prolonging the lifetime of the WSN. In this study, we have modified the ad-hoc on demand distance vector routing by incorporating signal-to-noise ratio (SNR) based dynamic clustering. The proposed scheme, which is an efficient and secure routing protocol for wireless sensor networks through SNR-based dynamic clustering (ESRPSDC) mechanisms, can partition the nodes into clusters and select the cluster head (CH) among the nodes based on the energy, and non CH nodes join with a specific CH based on the SNR values. Error recovery has been implemented during the inter-cluster routing in order to avoid end-to-end error recovery. Security has been achieved by isolating the malicious nodes using sink-based routing pattern analysis. Extensive investigation studies using a global mobile simulator have shown that this hybrid ESRP significantly improves the energy efficiency and packet reception rate as compared with the SNR unaware routing algorithms such as the low energy aware adaptive clustering hierarchy and power efficient gathering in sensor information systems.

Secure Routing Protocol in Cluster-Based Ad Hoc Networks (클러스터 기반 애드혹 네트워크 환경에서의 보안 라우팅 프로토콜)

  • Min, Sung-Geun;Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1256-1262
    • /
    • 2012
  • Mobile ad hoc networks (MANETs) are infrastructure-less, autonomous, and stand-alone wireless networks with dynamic topologies. Recently, cluster-based ad hoc networks which enhance the security and efficiency of ad hoc networks are being actively researched. And routing protocols for cluster-based ad hoc networks are also studied. However, there are few studies about secure routing protocols in cluster-based ad hoc networks. In this paper, we propose secure routing protocol for cluster-based ad hoc networks. We use Diffie-Hellman key agreement, HMAC, and digital signature to support integrity of routing messages, and finally can perform secure routing.

A MANET Routing Protocol using Address Autoconfiguration in Zone-based MANETs (존 기반 MANET에서의 주소 자동 설정 기술을 이용한 라우팅 프로토콜)

  • Park, Ik-Kyun;Kang, Nam-Hi;Kim, Young-Han
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.897-904
    • /
    • 2006
  • In large-scale MANETs, the performance of MANET routing protocols is degraded significantly. To avoid this, zone-based hierarchical architecture is proposed. In this architecture, single large-scale MANET is divided into multiple small-scale MANETs. In this paper, we propose autoconfiguration-coupled MANET routing protocol to reduce routing overhead of mim user nodes. If MANET routing protocol utilizes the autoconfigured information of each user node, its overhead or procedure can be reduced. Proposed method shows the degradation of routing overhead of user nodes via simulation.