• Title/Summary/Keyword: Network Routing Protocol

Search Result 1,135, Processing Time 0.025 seconds

Routing Mechanism using Mobility Prediction of Node for QoS in Mobile Ad-hoc Network (모바일 애드-혹 네트워크에서 QoS를 위한 노드의 이동성 예측 라우팅 기법)

  • Cha, Hyun-Jong;Han, In-Sung;Yang, Ho-Kyung;Cho, Yong-Gun;Ryou, Hwang-Bin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.7B
    • /
    • pp.659-667
    • /
    • 2009
  • Mobile Ad-hoc Network consists of mobile nodes without immobile base station. In mobile ad-hoc network, network cutting has occurred frequently in node because of energy restriction and frequent transfer of node. Therefore, it requires research for certain techniques that react softly in topology alteration in order to improve reliability of transmission path. This paper proposes path selection techniques to consider mobility of node that respond when search path using AOMDV routing protocol. As applying proposed techniques, We can improve reliability and reduce re-searching number of times caused by path cutting.

A hierarchical routing protocol of suggest to Sensor network reconfiguration (센서 네트워크의 재배치를 고려한 계층적 라우팅 프로토콜)

  • Kwon, Hoon;Kim, Jeong-Hee;Kwak, Ho-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1113-1119
    • /
    • 2008
  • In IP-USN for replacing the sensor network based on Zigbee by IP-based it, routing and the address assignment technique for sensor node are important focuses. But, there is a weak point in existing hierarchical routings. It is that all paths must be searched because the end node isn't considered. And the end node based muting is not sufficient in the mobile sensor network environment because it supports the only simple-path-search. Hereupon, this thesis suggests ComHRP(Complement HRP) that have the only merits of existing methods. The address assignment technique and search method are also proposed. ComHRP simplifies the organization of sensor networks and reduces network complexity. Also, It can efficiently deal with restructuring networks for the unpredictable ubiquitous sensor network feature.

Shedding Light on the Use of AS Relationships for Path Inference

  • Deng, Wenping;Muhlbauer, Wolfgang;Yang, Yuexiang;Zhu, Peidong;Lu, Xicheng;Plattner, Bernhard
    • Journal of Communications and Networks
    • /
    • v.14 no.3
    • /
    • pp.336-345
    • /
    • 2012
  • Autonomous system (AS) business relationships and their inference have been widely studied by network researchers in the past. An important application of inferred AS relationships can be the prediction of AS paths between a source and destination AS within a model. However, besides knowing the topology and inferred AS relationships, AS path prediction within a model needs to be understood in order for us to know how we can derive border gateway protocol (BGP) policies from AS relationships. In this paper, we shed light onto the predictive capabilities of AS relationships by investigating whether they can be translated into BGP policies such that inferred AS paths are consistent with real AS paths, e.g., paths observed from BGP routing tables. Our findings indicate that enforcing constraints such as the well-known valley-free property and the widely assumed preference of customer routes always results in a very low consistency for AS path inference. In addition, this is true irrespective of whether customer, peer, or provider routes are preferred. Apparently, applying such constraints eliminates many "correct" paths that are observed in BGP routing tables and that are propagated in a simple shortest path model where AS relationships are ignored. According to our findings, deriving BGP routing policies for predicting with high accuracy AS paths in a model directly from AS relationships is still difficult.

A Method of Selecting Core for the Shared-Tree based Multicast Routing (공유 트리 기반 멀티캐스트 라우팅을 위한 코어 선택 방법)

  • Hwang, Soon-Hwan;Youn, Sung-Dae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.885-890
    • /
    • 2003
  • The Core Base Tree (CBT) multicast routing architecture is a multicast routing protocol for the internet. The CBT establishes a single shared tree for a multicast connection. The shared tree Is rooted at a center node called core. The location of the core may affect the cost and performance of the CBT. The core placement method requires the knowledge of the network topology In this Paper, we propose a simple and effective method for selecting the core. This method requires the distance vector information. in addition, we used results that calculated sample correlation coefficient. And then we select suitable routing algorithm according to member's arrangement states in muliticast group. we select core node that have minimum average cost or PIM-SM protocol is selected. The performance of this method is compared with several other methods by extensive simulations (i.e mean delay, maximum delay, and total cost). Our results shows that this method for Selecting Core is very effective.

Selective Query Node for On-Demand Routing (On-Demand Routing의 성능향상을 위한 쿼리 수신 노드 선택)

  • Son, Dong-Hyoun;Kim, Dae-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.616-618
    • /
    • 2005
  • On-Demand routing protocol들은 Route를 셋업하기 위해 network-wide flooding scheme을 사용한다. 이 경우 않은 수의 overhead가 쿼리 패킷들이 생산되어 네트웍 퍼포먼스가 저하되는 결과를 초래한다. 우리는 이것을 일컬어 " 8roadcast storm problem" 이라고 한다. 여기에 우리는 Selective Query Node라는 scheme을 제안하여 flooding시에 발생하는 broadcast storm 문제를 완화하려고 한다. SQN은 이웃노드의 topology를 고려하여 proactive한 라우팅 정보를 제공하여 세가지 제한요소를 두어 쿼리를 받은 이웃노드가 받은 쿼리를 중지할 수 있도록 하며 퍼포먼스 향상을 기할 수 있도록 한다.

  • PDF

An Implementation of Project-Based Learning for Routing Design Course

  • Lee, Sang-Gon
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.570-575
    • /
    • 2009
  • This paper describes an implementation of project-based learning in routing design course. The total students who enrolled in the class were 48 and were divided into groups of 3~4 students. At the beginning of the course, a survey was conducted to check the student's level of back ground knowledge acquired from the prerequisite courses. At the end of the curse, we also conducted a survey to evaluate the effect of project-based learning. According to the end of course survey, the course was helpful to identify the problems to solve by themselves, to develop the problem solving ability, and to understand the global picture of the subject by integrating knowledge of each chapter into a project. The survey also shows that students recognized the importance of the teamwork skill throughout the project activity.

A Novel Adaptive Routing Scheme for the QoS-Based Multimedia Services in Mobile Ad-Hoc Networks

  • Lee, Chang-Bum;Kim, Young-Woong;Soh, Surng-Ryurl;Kim, Yung-Kwon
    • Journal of IKEEE
    • /
    • v.4 no.2 s.7
    • /
    • pp.281-287
    • /
    • 2000
  • A mobile ad-hoc network is composed of only mobile nodes, which are distributed dynamically, without any wired backbone or centralized entities. Since the existing works on ad-hoc routing protocol are mostly biased toward a military application, we need a new routing scheme for a support of multimedia services in mobile ad-hoc networks. Therefore, we propose a novel scheme that can support a variety of traffic attributes and can be applicable to high-speed and multimedia data services in mobile ad-hoc networks by using adaptive transmission power level. As a result of simulation, the proposed scheme has better performance than conventional method, which is performed with uniform transmission power level, in view of route query delay time.

  • PDF

TCP Performance Improvement Considering ACK Loss in Ad Hoc Networks

  • Kim, Dong-Kyun;Yoo, Hong-Seok
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.98-107
    • /
    • 2008
  • In mobile ad hoc networks, packet loss is unavoidable due to MAC contention, link failure or the inherent characteristics of wireless link. Since TCP relies on the timely reception of TCP ACK packets to progress the transmission of the TCP DATA packets, ACK loss obviously affects the performance due to two main problems: (a) Frequent occurrence of spurious retransmissions caused by timeout events and (b) impairment of the fast retransmit mechanism caused by the lack of a sufficient number of duplicate ACK packets. In particular, since most reactive routing protocols force the packets buffered over a path to be discarded while performing a route recovery, the performance degradation becomes more serious due to such ACK loss. In this paper, therefore, TCP with two piggybacking schemes (called TCP-pgy) is proposed in order to resolve the above-mentioned problems over reactive routing protocols. Through extensive simulations using the ns-2 simulator, we prove that our proposed schemes contribute to TCP performance improvements.

AS-PATH Authentication algorithm for BGP Security (BGP 보안을 위한 AS-PATH 식별 방법)

  • Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.3-12
    • /
    • 2019
  • BGP is the most important protocol among routing protocols that exchange routing information to create routing tables and update changed information so that users on the Internet can send information to destination systems. This paper analyzes how to prevent malicious attacks and problems caused by network administrator's mistakes by using vulnerabilities in BGPv4 that are currently used. We analyzed the attack methods by performing the actual attack experiment on the AS-PATH attack, which is the attack method for BGP's representative security vulnerability, and proposed the algorithm to identify the AS-PATH attack.

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.