• Title/Summary/Keyword: Network Routing Protocol

Search Result 1,135, Processing Time 0.03 seconds

A Study of Stable Route Decision Based on VANET Routing Protocol in Urban Environment (도심환경에서의 안정적 경로 설정을 위한 VANET 라우팅 프로토콜)

  • Ham, Woo-Hyung;Jang, Sang-Woo;Lee, Sang-Sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.3
    • /
    • pp.70-80
    • /
    • 2012
  • In Vehicular Ad-hoc Network(VANET) which constructs networks without fixed infrastructure among vehicles, network topology is frequently changed due to high mobility. In case of urban model, communication disconnections caused by interruptions of communication propagation such as buildings and constructions could be often occurred. Therefore, in VANET environment a routing protocol to complement its characteristics is needed. This paper suggests an algorithm to improve the transmission performance at intersections by approaching of the distance-based broadcasting which utilizes the information of vehicle's position. By using relative velocity among vehicles, it makes the stability of route decision improved and reduces packet collisions through graded priorities in the intersection, and simultaneously improves the performance of data rate. It can be seen that the performance compared with previous algorithm is significantly improved when using the suggested algorithm in the urban traffic environment.

Neighbor Discovery Protocol Based on Inhibited and Priority Access Controls for Multihop Cellular Networks (멀티홉 셀룰러 네트워크에서 억제 및 우선순위 접속 제어기반의 이웃노드 탐색 프로토콜)

  • Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2533-2540
    • /
    • 2013
  • In multihop cellular network environments, the mobility of nodes is a major obstacle to find a reliable routing path between a mobile node (MN) and the access node (AN). Therefore, in this paper, we propose a fast and reliable neighbor discovery protocol that enables the fast and reliable neighbor discovery by considering the node mobility in the multihop cellular network. The proposed neighbor discovery protocol inhibits the transmission of unnecessary control messages to quickly find a suitable neighbor node (NN) and performs a priority-based access control to transmit control messages without collision in the order of NN desirable to be selected. Simulation results show that the proposed neighbor discovery protocol can discover the NNs faster than the conventional scheme and select a more reliable relay node although the number of neighbor nodes increases and the node mobility increases.

Route Optimization Scheme in Nested NEMO Environment based on Prefix Delegation (프리픽스 할당에 기반한 중첩된 NEMO 환경에서의 경로최적화 기법)

  • Rho, Kyung-Taeg;Kang, Jeong-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.95-103
    • /
    • 2008
  • The Network Mobility (NEMO) basic support protocol extends the operation of Mobile IPv6 to provide uninterrupted Internet connectivity to the communicating nodes of mobile networks. The protocol is not efficient to offer delays in data delivery and higher overheads in the case of nested mobile networks because it uses fairly sub-optimal routing and multiple encapsulation of data packets. In this paper, our scheme combining Hierarchical Mobile IPv6 (HMIPv6) functionality and Hierarchical Prefix Delegation (HPD) protocol for IPv6, which provide more effective route optimization and reduce packet header overhead and the burden of location registration for handoff. The scheme also uses hierarchical mobile network prefix (HMNP) assignment and tree-based routing mechanism to allocate the location address of mobile network nodes (MNNs) and support micro-mobility and intra-domain data communication. The performance is evaluated using NS-2.

  • PDF

A Study on Zone-based Intrusion Detection in Wireless Network Environments (무선 네트워크 환경에서 영역기반 침입탐지 기법에 관한 연구)

  • Yang, Hwanseok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.19-24
    • /
    • 2019
  • It is impossible to apply the routing protocol in the wired environment because MANET consists of only mobile nodes. Therefore, routing protocols considered these characteristics are required. In particular, if malicious nodes are not excluded in the routing phase, network performance will be greatly reduced. In this paper, we propose intrusion detection technique based on region to improve routing performance. In the proposed technique, the whole network is divided into certain areas, and then attack detection within the area using area management node is performed. It is a proposed method that can detect attack nodes in the path through cooperation with each other by using completion message received from member nodes. It also applied a method that all nodes participating in the network can share the attack node information by storing the detected attack node and sharing. The performance evaluation of the proposed technique was compared with the existing security routing techniques through the experiments and the superior performance of the proposed technique was confirmed.

A Study on Secure Routing Technique using Trust Model in Mobile Ad-hoc Network (신뢰 모델을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.11-16
    • /
    • 2017
  • MANET composed of only mobile node is applied to various environments because of its advantage which can construct network quickly in emergency situation. However, many routing vulnerabilities are exposed due to the dynamic topology and link failures by the movement of nodes. It can significantly degrade network performance. In this paper, we propose a secure routing protocol based on trust model. The domain-based network structure is used for efficient trust evaluation and management of nodes in the proposed technique. The reliability evaluation of nodes was performed by the discard ratio of control packet and data packet of the nodes. The abnormal nodes are detected by performing traffic check and inspecting of nodes on a path that generates excessive traffic in order to increase the efficiency of routing. It is confirmed through experiments of the proposed technique that data transmission is performed securely even if an attack exists on the path.

Implementation of the PNNI Routing Simulator for Analyze Topology Aggregation (Topology Aggregation 분석을 위한 PNNI 라우팅 시물레이터 구현)

  • Kim, Byeon-Gon;Kim, Gwan-Ung;Jeong, Gwang-Il;Sin, Hyeon-Sun;Jeong, Gyeong-Taek;Jeon, Byeong-Sil
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.6
    • /
    • pp.259-267
    • /
    • 2002
  • In this paper, we focus on comparison and analysis of performance for existing Topology Aggregation algorithm. For these, we designed and implemented PNNI routing simulator which contain various TA schemes, and evaluate performance of TA schemes by this simulator. The PNNI 1.0 specification of the ATM Forum is recommended that hierarchical routing protocol and topology information is aggregated in the network constructed hierarchically Aggregating topology information is known as TA(Topology Aggregation) and TA is very important for scalability and security in network. Therefore, the performance of PNNI network would vary with TA schemes and routing algorithm. PNNI routing simulator can be applied to develope Routing algorithm and TA algorithm and can be develope these algorithms in short period.

Studying Route Optimality in Multi-Hop Wireless Mesh Networks (다중 홉 무선 메쉬 네트워크에서 최적 경로에 관한 연구)

  • Kim, Seong-Kwan;Lee, Ok-Hwan;Lee, Sung-Ju;Choi, Sung-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1B
    • /
    • pp.16-23
    • /
    • 2009
  • This paper investigates how many optimal routes can be established in terms of a given wireless mesh routing metric. Although many of routing metrics have been devised to precisely derive the wireless link quality in mesh, most (if not all) metrics have not been evaluated their optimality along with routing protocols. We consider stateof-the-art routing metrics and a widely accepted routing protocol in order to observe the optimality of established routes varying the number of source nodes. Also, we propose a unidirectional routing to deal with possible link asymmetry feature in wireless links. Through comparative simulation evaluations, we show that the portion of optimally established routes becomes less as the network traffic load increases, regardless of employed metrics, network topologies, and routing protocols.

The Network Protocol Among Cars at High-Speed based on Active Network (엑티브 네트워크 기반의 고속 이동시 차량 간 통신 프로토콜)

  • Jang, Hae-Suk;Lee, Jin-Kwan;Jung, Kyu-Cheol;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.9-18
    • /
    • 2008
  • This paper propose CAR-TO-CAR protocol which can prevent the cars at high-speed from a multiple clash accident at highway with exchanging information. we construct cluster be linked with distance took from GPS(Global Positioning System) because there is no connection at cars on the road. The proposed method solved the overload problem by establishing route because construct the cluster at the IEEE 802.11 MAC class. 'Multi-hop Routing protocol' based on Active Network enable stable Network to be formed by using Active Network.

  • PDF

Communication Protocol for Mobile Sensor Networks with Continuous Mobility (지속적인 이동성을 갖는 이동 센서네트워크를 위한 통신 프로토콜)

  • Kim, Hyoung-Jin;Kim, Lae-Young;Song, Joo-Seok
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.139-146
    • /
    • 2007
  • Mobile Sensor Network(MSN) is actively studied due to the advent of mobile sensors such as Robomote and Robotic Sensor Agents(RSAs), However, existing studies on MSN have mainly focused on coverage hole problem which occurs in Stationary Sensor Network(SSN). To address coverage hole problem, these studies make mobile sensors move temporarily so that they do not make the best use of the mobility of mobile sensors, Thus, a mechanism utilizing the continuous movement of mobile sensors is proposed to improve the network coverage performance. However, this mechanism is presently immature and does not explain how to make routing path and send data from mobile sensors to a sink node, Therefore, to efficiently make routing path and send data from mobile sensors to a sink node, we propose a communication protocol for mobile sensor network where mobile sensors continuously move. The proposed protocol deploys not only mobile sensors but also stationary sensors which send sensing data to a sink node instead of mobile sensors. Simulation results show that the proposed protocol improves the performance in terms of network coverage and traffic overhead, compared to conventional SSN protocols.

Dual Super Cluster Head Underwater Sensor Network Routing Protocol (듀얼 슈퍼 클러스터 헤드 해양 센서 네트워크 라우팅 프로토콜)

  • Chang, Young-Il;Shin, Soo-Young;Prak, Hyun-Mun;Park, Soo-Huyn
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.87-96
    • /
    • 2006
  • Wireless Sensor Network (WSN) is researched in various filed. Underwater Sensor Network (UWSN) is used various purpose such as underwater environment monitoring. But, WSN is researched in the terrestrial that uses mainly radio frequency, The existing terrestrial research is incongruent to apply to underwater. Therefore, we propose UWSN architecture that considers underwater environment. In this paper, UWSN applied cluster technique and functional node constructs. Each cluster collects and sends cluster data. Dual super cluster head receives cluster data and transmits each in the base-station. We implement WSN routing algorithm, and construct test-bed and analyze cluster data receive rate.

  • PDF