• Title/Summary/Keyword: Network Routing Protocol

Search Result 1,135, Processing Time 0.029 seconds

A study on the Advanced Inference Routing NETwork scheme for RODMRP (RODMRP를 위한 진보된 추론 연결 망 구현)

  • Kim, Sun-Guk;Ji, Sam-Hyeon;Du, Gyeong-Min;Lee, Beom-Jae;Kim, Yeong-Sam;Lee, Kang-Whan
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.313-314
    • /
    • 2008
  • Ad hoc network is a multi-hop wireless network formed with non-infrastructure. The fact that limited resource could support the network of robust, simple framework and energy conserving etc. In this paper, we propose a new ad hoc multicast routing protocol for based on the ontology scheme called inference network. Ontology knowledge-based is one of the structure of context-aware.

  • PDF

An Energy Efficient Routing Scheme with Tabu Search Algorithm (타부 탐색 알고리즘을 적용한 전력 효율적 라우팅 기법)

  • Yan, Shi;Hong, Won-Kee
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.10 no.3
    • /
    • pp.86-91
    • /
    • 2011
  • Wireless sensor network (WSN) is a distributed self-organizing network which contains a large number of tiny multi-functional sensor nodes. The network life time is an important issue in WSN because every sensor node has a constraint on electric supply. In this paper, an energy consumption model is described and a GA-based algorithm will be used to optimize the energy consumption by analyzing the working model of sensor nodes. The model will provide an effective reference of working pattern for WSN. This algorithm is evaluated through analysis and simulations.

  • PDF

Optimizing Network Lifetime of RPL Based IOT Networks Using Neural Network Based Cuckoo Search Algorithm

  • Prakash, P. Jaya;Lalitha, B.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.255-261
    • /
    • 2022
  • Routing Protocol for Low-Power and Lossy Networks (RPLs) in Internet of Things (IoT) is currently one of the most popular wireless technologies for sensor communication. RPLs are typically designed for specialized applications, such as monitoring or tracking, in either indoor or outdoor conditions, where battery capacity is a major concern. Several routing techniques have been proposed in recent years to address this issue. Nevertheless, the expansion of the network lifetime in consideration of the sensors' capacities remains an outstanding question. In this research, aANN-CUCKOO based optimization technique is applied to obtain a more efficient and dependable energy efficient solution in IOT-RPL. The proposed method uses time constraints to minimise the distance between source and sink with the objective of a low-cost path. By considering the mobility of the nodes, the technique outperformed with an efficiency of 98% compared with other methods. MATLAB software is used to simulate the proposed model.

Research on the Performance of Protocols and the Evaluation Metric for VIDEO Transmissions in an Ad Hoc Network

  • Chen, Ruey-Shin;Chao, Louis R.;Chen, Ching-Piao;Tsai, Chih-Hung
    • International Journal of Quality Innovation
    • /
    • v.10 no.1
    • /
    • pp.115-126
    • /
    • 2009
  • Video transmission effectiveness in the Ad Hoc network is becoming important recently, if different routing protocols are applied. Some researchers conclude that the reactive protocols are better for file transfer protocol (FTP) and constant bit rate (CBR) or hypertext transfer protocol (HTTP) transmission in an Ad Hoc wireless network but the performance report of video transmission is not much. This study adopts Qualnet (Network Simulator) as a simulation tool for environmental designing and performance testing, and employs an experimental design with eight groups. Our experiment shows that: (1) The performance of AODV (reactive) protocol is better than DSDV, ZRP and DSR when the transmission load has only one video stream; (2) Proactive (DSDV) and Hybrid protocols (ZRP) are better for a smaller Ad Hoc network when it transmits a video stream with some applications (VoIP, FTP and CBR). We conclude that packet loss rate is sensitive to the quality of video transmission and it has negative relationship with Peak Signal-to-Noise Ratio (PSNR) value. In addition, our experiment also shows that PSNR is a simple Metric for the performance evaluation of video transmission.

RRA : Ripple Routing Algorithm Considering the RF-Coverage of the node in WSN (RRA : 무선센서 네트워크에서 노드의 통신영역을 고려한 랜덤 배치 고정형 라우팅 알고리즘)

  • Lee, Doo-Wan;Kim, Min-Je;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.820-823
    • /
    • 2011
  • WSN is composed of a lot of small sensors with the limited hardware resources. In WSN, at the initial stage, sensor nodes are randomly deployed over the region of interest, and self-configure the clustered networks by grouping a bunch of sensor nodes and selecting a cluster header among them. In this paper, we propose a self-configuration routing protocol for WSN, which consists of step-wise ripple routing algorithm for initial deployment, effective joining of sensor nodes. RRA is search node in RF-coverage of each node, which result in fast network connection, reducing overall power consumption, and extending the lifetime of network.

  • PDF

An Energy-Efficient Multi-Path Multi-Hop Routing Techniques based on LEACH in WSN Environment (WSN LEACH 기반 에너지 효율적인 다중 패스 멀티 홉 라우팅 기법 연구)

  • Park Tae Bin;Tae-Wook Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.5
    • /
    • pp.827-834
    • /
    • 2024
  • LEACH, a layer-based routing protocol used in wireless sensor networks, sends fused data from the cluster head to the sink node in a single hop, so as the network size increases, the distance to the sink node increases significantly, which increases energy consumption. In addition, existing multi-hop transmission studies to solve this problem have problems with reverse transmission in the process of finding the next node to be transmitted and passing through this node. In this paper, we propose a multi-hop routing technique that selects a relay node based on the distance to the sink node and transmits it to a relay node via general nodes located in a straight line between the relay node and each cluster head. By reducing the transmission distance between nodes and minimizing reverse transmission occurring in the process through adjacent nodes, it was confirmed that the network life was extended compared to the previously proposed LEACH and EEACP protocols.

Dynamic Local Update-based Routing Protocol(D-LURP) in Wireless Sensor Network with Mobile Sink (모바일 싱크노드를 갖는 무선 센서 네트워크에서 동적 지역 업데이트 기반의 라우팅 프로토콜(D-LURP))

  • Chung, Jae-Hoon;Park, Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.3
    • /
    • pp.116-122
    • /
    • 2009
  • Mobile Wireless Sensor Network is an organized collection of sensor nodes and mobile sink nodes, in which the sensor node transmits the signal to the sink node. In real environment, there are many cases in which sinks have mobility caused by the people, the vehicle and etc. Since all nodes in the sensor networks have limited energy, many researches have been done in order to prolong the lifetime of the entire network. In this paper we propose Dynamic Local Update-based Routing Protocol(D-LURP) that prolong the lifetime of the entire network to efficiently maintain frequent location update of mobile sink static sensor nodes in Mobile WSNs. When the sink node moves out of the local broadcasting area the proposed D-LURP configures dynamically the local update area consisted of the new local broadcasting area and the previous dissemination node(DN) and find the path between the DN and the sink node, instead of processing a new discovering path like LURP. In this way the processing of broadcasting sink node's location information in the entire network will be omitted. and thus less energy will be consumpted. We compare the performances of the proposed scheme and existing Protocols.

Energy-aware Routing Protocol using Multi-route Information in Wireless Ad-hoc Networks with Low Mobility (저이동성을 갖는 무선 애드혹 망에서 다중 경로 정보를 이용한 에너지 인지 라우팅 프로토콜)

  • Hong, Youn-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.4
    • /
    • pp.55-65
    • /
    • 2010
  • We present a method for increasing network lifetime without link failure due to lack of battery capacity of nodes in wireless ad-hoc networks with low mobility. In general, a node with larger remaining battery capacity represents the one with lesser traffic load. Thus, a modified AODV routing protocol is proposed to determine a possible route by considering a remaining battery capacity of a node. Besides, the total energy consumption of all nodes increase rapidly due to the huge amount of control packets which should be flooded into the network. To reduce such control packets efficiently, a source node can store information about alternative routes to the destination node into its routing table. When a link failure happens, the source node should retrieve the route first with the largest amount of the total remaining battery capacity from its table entries before initiating the route rediscovery process. To do so, the possibility of generating unnecessary AODV control packets should be reduced. The method proposed in this paper increases the network lifetime by 40% at most compared with the legacy AODV and MMBCR.

A P2P Content Distribution Method Using Virtual Location in MANET (MANET에서 가상위치를 이용한 P2P 데이터 배포 방법)

  • Ko, Seok-Kap;Oh, Seung-Hun;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.139-145
    • /
    • 2009
  • Recently P2P (Peer-to-Peer) networks and applications have been expanded to various field. However, because the construction of P2P network did not influence a underlying network topology or property, it may be inefficient. Especially, this inefficiency is more serious in MANET because MANET has narrow bandwidth and energy constraint. When we use a proactive routing protocol in MANET, we can know hop counts between two nodes. And, we can construct a P2P overlay network using this hop count information. However, In case of using hop count only, we can avoid a interference path selection problem and a zig-zag problem. We propose a method of improving P2P contents distribution using virtual positions. We calculate virtual positions from hop counts using the trigonometry. This method solves a interference path selection problem and a zig-zag problem. This method also allows a P2P network to influence underlying network topology. We adopt this method to a network which uses a virtual geographic routing, a proactive routing protocol, or a reactive routing protocol. We show that our proposed methods improve P2P contents distribution performance over MANET through a simulation.

GEOP : A Security Aware Multipath Routing Protocol (GEOP : 보안 인식 다중경로 라우팅 프로토콜)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.151-157
    • /
    • 2010
  • Rapid technological advances in the area of micro electro-mechanical systems (MEMS) have spurred the development of small inexpensive sensors capable of intelligent sensing. A significant amount of research has been done in the area of connecting large numbers of these sensors to create robust and scalable Wireless Sensor Networks (WSNs). The resource scarcity, ad-hoc deployment, and immense scale of WSNs make secure communication a particularly challenging problem. Since the primary consideration for sensor networks is energy efficiency, security schemes must balance their security features against the communication and computational overhead required to implement them. In this paper, we combine location information and probability to create a new security aware multipath geographic routing protocol. The implemented result in network simulator (ns-2) showed that our protocol has a better performance under attacks.