• Title/Summary/Keyword: Network Routing Protocol

Search Result 1,135, Processing Time 0.033 seconds

Method to Support Mobility using MPLS in IP Network (IP망에서 다중 프로토콜 레이블 교환 방식을 사용하는 이동성 제공 방안)

  • Choi, Yun-Jin;Yu, Myoung-Ju;Lee, Jong-Min;Choi, Seong-Gon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.34-41
    • /
    • 2008
  • Existing mobility support scheme like MIPv4 has the delay at data transfer and Triangle routing problem. This paper proposes the new mobility support scheme and method that can overcome the problem using MPLS LSP in Next Generation Network. The proposed scheme overcomes the problem by introducing the LMS(Location Management Server) managing the location of the mobile terminal and the MPLS LSP between FA for a tunneling. We shows on the mathematical analysis using the queuing theory that this proposed scheme is more superior to the existing method(MIP).

Oversubscription factors for Community Wireless Services using AODV Routing

  • Ajith, P.K.;Yan, Huai-Zhi;Park, Dong-Won
    • The Journal of Engineering Research
    • /
    • v.7 no.1
    • /
    • pp.53-60
    • /
    • 2005
  • Community Wireless Networks define the next generation wireless services. Multimedia usages for financial services over community Wireless LAN (WLAN) based mesh networks require link stability. Several new services are being proposed for multimedia over WLANs. Portable Internet Services are implemented by several wireless carriers to proliferate their customer base. However, these services are still expensive and require a central telecom/wireless carrier whose monopoly and preference defines the availability of new services. Our research project identifies the usage of these critical services in public places over the financial services backbone architecture to provide efficient easy-to-use and economical services to their customers and merchants without being dependent on the central wireless carrier. The user connects to the network using his regular WLAN NIC using the Mesh Router/Bridge interconnectivity and obtains the needed multimedia and financial services from the ATM-AP Gateway, In our proposed scenario, the ATN AP-MR use AODV protocol and MR-MC is based on 802.11g/a/b IEEE standard. We use multi path routing protocols for reducing the congestion over a particular route. We demonstrate the results of our simulations and test-bed outcome to evaluate link failure rate and oversubscription factors to eliminate network congestion and non-availability of the critical financial services.

  • PDF

Development for a Simple Client-based Distributed Web Caching System

  • Park, Jong-Ho;Chong, Kil-To
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2131-2136
    • /
    • 2003
  • Since the number of user-requests increases dramatically on the Internet, the servers and networks can be swamped unexpectedly without any prior notice. Therefore, the end-users are waiting or refused for the responses of the contents from the originating servers. To solve this problem, it has been considered that a distributed web caching system efficiently utilizes structural elements of the network. Because a distributed web caching system uses the caches that are close to end-users on the network, it transmits the contents to users faster than the original network system. This paper proposes a simple client-based distributed web caching system(2HRCS) that client can directly perform object allocation and load balancing without an additional DNS for load balancing in CARP (Cache Array Routing Protocol) and GHS (Global Hosting System) that are the recent distributed web caching system protocol. The proposed system reduces the cost of setup and operation by removing DNS that needs to balance the load in the existing system. The system has clients with consistent hashing method, so it extends its environment to other distributed web caching system that has caches of different capacity. A distributed web caching system is composed and tested to evaluate the performance. As a result, it shows superior performance to consistent hashing system. Because this system can keep performance of the existing system and reduce costs, it has the advantage of constructing medium or small scale CDN (Contents Delivery Network).

  • PDF

The Effects of Backhole Attack on Lattice Structure MANET (격자구조 MANET에서 블랙홀 공격의 영향)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.578-581
    • /
    • 2014
  • Blackhole attack, a kinds of attacks to routing function, can cause critical effects to network transmission function, Especially, on MANET(Mobile Ad-hoc Network) which it is not easy to prepare functions to respond malicious intrusion, transmission functions of entire networks could be degraded. In this paper, effects of blackhole attack to network transmission performance is analyzed on lattice structured MANET. Specially, performance is measured for various location of blackhole attack on lattice MANET, and compared with the performance of random structured MANET. This paper is done with computer simulation, VoIP(Voice over Internet Protocol) traffic is used in simulation. The results of this paper can be used for data to deal with blackhole attack.

  • PDF

Energy-Efficient Data-Aware Routing Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 에너지 효율적인 데이터 인지 라우팅 프로토콜)

  • Lee, Sung-Hyup;Kum, Dong-Won;Lee, Kang-Won;Cho, You-Ze
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.122-130
    • /
    • 2008
  • In many applications of wireless sensor networks, sensed data can be classified either normal or urgent data according to its time criticalness. Normal data such as periodic monitoring is loss and delay tolerant, but urgent data such as fire alarm is time critical and should be transferred to a sink with reliable. In this paper, by exploiting these data characteristics, we propose a novel energy-efficient data-aware routing protocol for wireless sensor networks, which provides a high reliability for urgent data and energy efficiency for normal data. In the proposed scheme, in order to enhance network survivability and reliability for urgent data, each sensor node forwards only urgent data when its residual battery level is below than a threshold. Also, the proposed scheme uses different data delivery mechanisms depending on the data type. The normal data is delivered to the sink using a single-path-based data forwarding mechanism to improve the energy-efficiency. Meanwhile, the urgent data is transmitted to the sink using a directional flooding mechanism to guarantee high reliability. Simulation results demonstrate that the proposed scheme could significantly improve the network lifetime, along with high reliability for urgent data delivery.

Design and Implementation of MPλS Simulator based on ns-2 Network Simulator (ns-2 네트워크 시뮬레이터 기반의 MPλS 시뮬레이터의 설계 및 구현)

  • 서선영;이봉환;황선태;윤찬현
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.10
    • /
    • pp.119-128
    • /
    • 2003
  • The rapid increase of Internet users, diversity of application services, high speed data transmission, and extension of application areas have resulted in exponential growth of Internet traffic. In order to satisfy the increasing demand of bandwidth, the MPλS protocol, which is based on MPLS for efficient integration of WDM and IP protocols, has been suggested by IETF. In this paper, we present an MPλS simulator which enables to simulate various MPλS function such as optical crossconnect (OXC), multi-wavelength links, routing and wavelength assignment(RWA), and MPλS signaling and control. The simulator is developed based on the ns-2, an widely used multi-protocol network simulator. The function of the simulator is validated by running many simulation based on various scenarios and performance measures such as throughput and blocking probability. The simulator could be widely utilized for validation of proposed protocols before developing real optical network systems.

A Study on the Design of OSPF Area and Data Flow in the Tactical Data Networks (전술 데이터망에서 OSPF Area 설정과 데이터 흐름에 관한 연구)

  • Kwon, Soo-Gab;Jeong, Kyu-Young;Kim, Jeong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.267-276
    • /
    • 2007
  • In OSPF, the larger and more unstable the area, the greater the likelihood for performance problems associated with routing protocol recalculation. Generally, an area should have no more than 50 routers. Areas with unstable links should be smaller. Military tactical data network is used for military operations during war-time. It consists of wireless network for mobility of node. Thus, it has low-bandwidth and unstable property. In addition, it is expected that many kinds of router-failure, Link-failure and recovery at emergency period. However, Military tactical data network is designed with about one and half times the number of recommendation. This paper proves that the traffic is limited by the increase of re-calculation of area.

IPv6 Address Autoconfiguration for AODV in Mobile Ad Hoc Networks (이동 애드혹 네트워크 환경에서 AODV를 위한 IPv6 주소 자동 설정)

  • Ahn, Sang-Hyun;Kim, Young-Min;Lee, Young-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.1
    • /
    • pp.1-10
    • /
    • 2007
  • An advantage of the mobile ad hoc network (MANET) is that mobile nodes can self-organize the network topology without the help of network infrastructure. However, for the perfect self-organization of the MANET, each mobile node needs to self-configure its address. Even though a mobile node configures a unique address during the booting time, its address may conflict with nodes in other MANETs since MANETs containing the same address can be merged. The address autoconfiguration protocol implemented in this work consists of the strong DAD (Duplicate Address Detection) and the weak DAD. A unique address of a node is assigned by the strong DAD during the booting time and the weak DAD is used to detect address conflict and resolve address conflict during the ad hoc routing. In this work, we have implemented address autoconfiguration in the IPv6-based MANET using AODV as the routing protocol. We describe how the IPv6 address autoconfiguration is implemented and verify our implementation by showing the test scenarios on our testbed.

Channel Aware Reliable Routing Protocol in Wireless Multimedia Sensor Networks (무선 멀티미디어 센서네트워크에서 신뢰성향상을 위한 채널상태기반 경로설정 프로토콜)

  • Cho, Byeong Seok;Lee, Juhyeon;Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.459-465
    • /
    • 2014
  • Recently, multimedia data transmission becomes important issues in the wireless sensor network. For the multimedia data transmission in wireless sensor network, QoS (Quality of service) is an important factor to determine the system performance. AODV algorithm is one of the widely used algorithm for wireless ad-hoc environment. In AODV, the destination node selects the route with the smallest hop count. Since AODV only considers the hop count, the selected route could have low channel condition, and degrade QoS. In this paper, we propose a modified AODV algorithm that considers the successful transmission rate of each link. The proposed algorithm regards the number of retransmission which can be obtained from the successful transmission rate as the hop count, and applies the modified hop count to AODV. The advantage of the proposed algorithm is that the modified AODV can support QoS without significant change of the conventional algorithm.

Interactive Visual Analytic Approach for Anomaly Detection in BGP Network Data (BGP 네트워크 데이터 내의 이상징후 감지를 위한 인터랙티브 시각화 분석 기법)

  • Choi, So-mi;Kim, Son-yong;Lee, Jae-yeon;Kauh, Jang-hyuk;Kwon, Koo-hyung;Choo, Jae-gul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.135-143
    • /
    • 2022
  • As the world has implemented social distancing and telecommuting due to the spread of COVID-19, real-time streaming sessions based on routing protocols have increased dependence on the Internet due to the activation of video and voice-related content services and cloud computing. BGP is the most widely used routing protocol, and although many studies continue to improve security, there is a lack of visual analysis to determine the real-time nature of analysis and the mis-detection of algorithms. In this paper, we analyze BGP data, which are powdered as normal and abnormal, on a real-world basis, using an anomaly detection algorithm that combines statistical and post-processing statistical techniques with Rule-based techniques. In addition, we present an interactive spatio-temporal analysis plan as an intuitive visualization plan and analysis result of the algorithm with a map and Sankey Chart-based visualization technique.