• Title/Summary/Keyword: Network Routing Protocol

Search Result 1,135, Processing Time 0.03 seconds

Self-configuration Routing Protocol for Mobile Wireless Sensor Networks (이동 무선센서 네트워크에서의 자가구성 라우팅 기법)

  • Lee, Doo-Wan;Kim, Yong;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.856-859
    • /
    • 2010
  • WSN is composed of a lot of small sensors with the limited hardware resources. In WSN, at the initial stage, sensor nodes are randomly deployed over the region of interest, and self-configure the clustered networks by grouping a bunch of sensor nodes and selecting a cluster header among them. Specially, in Mobile-WSN environment, in which the administrator's intervention is restricted, the self-configuration capability is essential to establish a power-conservative Mobile-WSN which provides broad sensing coverage and communication coverage. In this paper, we propose a self-configuration routing protocol for Mobile-WSN, which consists of step-wise novel protocols for initial deployment, effective joining and removal of sensor nodes, which result in reducing overall power consumption, and extending the lifetime of network.

  • PDF

An Efficient Anonymous Routing Protocol Without Using Onion Technique in MANET (Onion 기법을 사용하지 않는 효율적인 MANET 익명 라우팅 프로토콜)

  • Lee, Sung-Yun;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.71-82
    • /
    • 2009
  • There have been a lot of researches on providing privacy in MANET (Mobile Ad hoc NETwork) using trapdoor, onion, and anonymous authentication. Privacy protection in MANET can be divided into satisfying ID privacy, location privacy, route privacy, and unlinkability between sessions. Most of the previous works, however, were unsatisfactory with respect to location privacy or route privacy. Moreover, in previous schemes, cryptographic operation cost needed to meet the privacy requirements was relatively high. In this paper, we propose a new efficient anonymous routing protocol that satisfies all the privacy requirements and reduces operation costs. The proposed scheme does not use onion or anonymous authentication techniques in providing privacy. We also provide a more accurate analysis of our scheme's efficiency by considering all the nodes involved in the route establishment.

A Multicast Routing Protocol for Reducing the Control Overhead in Mobile Ad-Hoc Networks (이동 애드-혹 네트워크 환경에서 컨트롤 오버 헤드를 줄이기 위한 멀티캐스트 라우팅 프로토콜)

  • Lim, Yu-Jin;Ahn, Sang-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.459-465
    • /
    • 2002
  • Ad-hoc networks have the dynamic topology characteristics and most of the applications on ad-hoc networks require the group communication capability. Previously proposed multicast mechanisms on mobile ad-hoc networks build multicast-infrastructures like the tree or mesh for the group communication and these infrastructures nay cause significant overhead especially in a highly dynamic mobile ad-hoc network environment. Therefore, in this paper, we propose a new multicast mechanism supporting multicast services based on only the underlying unicast routing tables, hence any multicast-related infrastructures like trees and meshes are not required to be constructed.

Bluetooth Network for Mobile System Control (이동 시스템 제어를 위한 블루투스 네트워크)

  • 임준홍;곽재혁
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.11
    • /
    • pp.1052-1057
    • /
    • 2004
  • Bluetooth technology is essentially a method for wireless connectivity of a diverse set of devices ranging from PDAs, mobile phone, notebook computers, to another equipments, The bluetooth system both point-to point connection and point-to multipoint connection. In point-to multipoint connection, the channel is shared among several bluetooth devices. Two or more devices sharing the same channel form a piconet. There one master device and up to seven active slave devices in a piconet. The radio operates in the unlicensed 2.45GHz ISM band. This allows users who travel world-wide to use bluetooth equipments anywhere. Since the link is based on frequency-hop spread spectrum, multiple channels can exist at the same time. The bluetooth standard ha s been suggested that bluetooth equipments can be used in the short-range, maximum 100 meters. It has been defined that the time takes to setup and establish a bluetooth connection among devices is 10 seconds. It is a long time and may be a cause to lose a chance of finding other non-fixed devices. We propose a routing protocols for scatternets which can be used to control a mobile units(MUs) in this network. The proposed routing protocol is composed of two kinds of bluetooth information, access point(AP) and MU.

An Effective Route Selection Scheme with Considering Traffic Density in VANET

  • An, Do-Sik;Cho, Gi-Hwan
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.6
    • /
    • pp.623-629
    • /
    • 2010
  • A geographical routing protocol is typically utilized for a route selection of VANET. Even if it is conceptually well adapted into VANET, message delivery tends to be unreliable with frequent network partitions, which mainly come from the inherent characteristics such as high mobility and irregular traffic density. In this paper, we deal with a method to enable reliable message delivery with reflecting the traffic density on routing decision. By concatenating the message delivery cost of each of inbetween junction section, $1^{st}$ and $2^{nd}$ shortest paths are initially determined. When it is not possible to deliver the message on a junction on the 1st path, we utilize two novel ideas, that is, letting the message stay on the junction to find out a new relay node, and putting a replicated copy to reach via a detour path. By using the NS-2 network simulator, our method has been examined in terms of message delivery rate and delay. It shows that our method is much efficient than the other method in the low density environment, while it brings similar results in the high density environment.

Comparative Analysis of Routing Protocols for Wireless Sensor Networks (무선 센서 네트워크의 라우팅 프로토콜 비교 분석)

  • Gautam, Navin;Pyun, Jae-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.373-376
    • /
    • 2008
  • Wireless sensor networks consist of thousands of sensor nodes that have low power, low footprint and low computational capacities. So the burning issues in the design and deployment of these sensor nodes in the practical application areas include the energy conservation and network lifetime. Efficient routing schemes can help reduce the energy consumption and thus increase the network lifetime. This paper deals with the comparative analysis of popular routing protocols such as LEACH, LEACH-C, MTE, and PEGASIS. The protocols are compared by using performance me tries such as system lifetime, the time for first node death, and total system energy.

  • PDF

Enhancement of Return Routability Mechanism for Optimized-NEMO Using Correspondent Firewall

  • Hasan, Samer Sami;Hassan, Rosilah
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.41-50
    • /
    • 2013
  • Network Mobility (NEMO) handles mobility of multiple nodes in an aggregate manner as a mobile network. The standard NEMO suffers from a number of limitations, such as inefficient routing and increased handoff latency. Most previous studies attempting to solve such problems have imposed an extra signaling load and/or modified the functionalities of the main entities. In this paper, we propose a more secure and lightweight route optimization (RO) mechanism based on exploiting the firewall in performing the RO services on behalf of the correspondent nodes (CNs). The proposed mechanism provides secure communications by making an authorized decision about the mobile router (MR) home of address, MR care of address, and the complete mobile network prefixes underneath the MR. In addition, it reduces the total signaling required for NEMO handoffs, especially when the number of mobile network nodes and/or CNs is increased. Moreover, our proposed mechanism can be easily deployed without modifying the mobility protocol stack of CNs. A thorough analytical model and network simulator (Ns-2) are used for evaluating the performance of the proposed mechanism compared with NEMO basic support protocol and state-of-the-art RO schemes. Numerical and simulation results demonstrate that our proposed mechanism outperforms other RO schemes in terms of handoff latency and total signaling load on wired and wireless links.

A study on the comparison of VPN with Dedicated Line Network on security (보안측면에서의 가상사설망과 전용회선망의 비교 연구)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.2
    • /
    • pp.107-122
    • /
    • 2008
  • Communication is be classified into public network and private network. VPN is made by integrating the circuit cost reduction of public network and the reliable security support of public network. This paper analyzes the IPSec using three layer tunneling, MPLS(Multi Protocol Label Switching) integrating 2 layer switching and 3 layer routing techniques and dedicated line from the viewpoint of security. In conclusion, VPN is better than dedicated network line in cost and security. If IPSec VPN is compared with MPLS VPN, MPLS VPN is more excellent than IPSec VPN in safe data transmission, cost, QoS and management.

  • PDF

A Management for IMS Network Using SDN and SNMP (SDN과 SNMP를 이용한 IMS 네트워크 관리)

  • Yang, Woo-Seok;Kim, Jung-Ho;Lee, Jae-Oh
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.694-699
    • /
    • 2017
  • In accordance with the development of information and communications technology, a network user has to be able to use quality of service (QoS)-based multimedia services easily. Thus, information and communications operators began to focus on a technique for providing multimedia services. The IP Multimedia Subsystem (IMS) is a platform based on Internet Protocol (IP) as a technology for providing multimedia services and application services. The emerging 5G networks are described as having massive capacity and connectivity, adaptability, seamless heterogeneity, and great flexibility. The explosive growth in network services and devices for 5G will cause excessive traffic loads. In this paper, software-defined networking (SDN) is applied as a kind of virtualization technology for the network in order to minimize the traffic load, and Simple Network Management Protocol (SNMP) is used to provide more efficient network management. To accomplish these purposes, we suggest the design of a dynamic routing algorithm to be utilized in the IMS network using SDN and an SNMP private management information base (MIB). The proposal in this paper gives information and communications operators the ability to supply more efficient network resources.

A Study on Decrease of Network traffic via ZRP Grouping (ZRP Grouping을 통한 Traffic 감소에 관한 연구)

  • Kang, Hyun-Sik;Kim, Kee-Cheon
    • Annual Conference of KIPS
    • /
    • 2002.11b
    • /
    • pp.1667-1670
    • /
    • 2002
  • 현재 Network 의 취약점인 Node 들의 빠른 이동성을 지원하기 위하여 MANET 이라는 이동단말로만 이루어진 Network model 이 현재 연구 중에 있다. 그러나 MANET 은 별도의 Router 없이 이동 노드로만 이루어져있으므로 각 노드는 자신의 목적지에 대한 경로를 각자 알아내야 한다. 따라서 각 노드는 목적지까지의 경로를 알아내기 위한 RREQ 메시지를 모든 Network 노드로 Broadcasting 하는데 Network 이 커질 경우 각 노드들이 전체 Network으로 Broadcasting하는 RREQ 메시지로 인하여 커다란 Network 부하를 만들어 낸다. 본 논문에서는 이러한 RREQ 메시지에 의한 Network 부하를 줄이고자 MANET의 Routing Protocol의 한 종류인 ZRP를 개선하여 각 Zone들을 그룹으로 묶어 그룹내의 노드 목록을 캐쉬에 저장함으로써 전체 network 으로 RREQ 를 Broadcasting 하지 않고 Group내에서 1차적으로 전송하여 Network의 부하를 줄이고자 한다.

  • PDF