• Title/Summary/Keyword: Network Routing Protocol

Search Result 1,135, Processing Time 0.027 seconds

Reliable Transmission of Bio-Data for IEEE 11073 PHD Standards at 6LoWPAN Multi-Hop Wireless Sensor Networks (6LoWPAN 멀티-홉 무선 센서 네트워크에서의 IEEE 11073 PHD 표준을 위한 신뢰성 있는 생체 정보 전송)

  • Woo, Yeon Kyung;Park, Jong Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.116-123
    • /
    • 2013
  • In mobile healthcare applications, the reliable transmission of the bio-data is very important. In this article, we present a reliable bio-data transmission technique for mobile healthcare monitoring service at 6LoWPAN multi-hop wireless networks. In particular, we expand IEEE 11073-20601 protocol, and propose the reliable path construction for 6LoWPAN aimed to reliably provide mobile healthcare service over wireless sensor network, using IPv6 network. 6LoWPAN is recognized possibility because it is agree with sensor network by raising Adaptation layer on the MAC layer to transmit IPv6 packets. In this article proposed minimize the algorithm complexity and reliability routing protocol because the 6LoWPAN devices are suitable for low cost, small size and battery that can be used to health care system environment. And detailed procedures and algorithms are presented. We the proposed method to prove the superiority of using NS-3 for compareing with AODV protocol.

A Reliable Route Selection Algorithm in Mobile Ad-hoc Networks (이동 애드혹 네트워크에서의 안정 경로 선택 알고리즘)

  • Kim, Won-Ik;Suh, Young-Joo;An, Syung-Og
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.314-323
    • /
    • 2002
  • The routing protocols designed for wired networks can hardly be used for mobile ad-hoc networks due to limited bandwidth of wireless transmission and unpredictable topological change. Recently, several routing protocols for mobile ad-hoc networks have been Proposed. However, when theme protocols are applied to support real time services like multimedia transmission, they still have problems in ad-hoc networks, where the topology changes drastically. In this paper, we propose a new route selection algorithm which selects the most reliable route that is impervious to route failures by topological changes by mobile hoots. For reliable route selection, the concept of virtual zone (stable zone and caution zone) is proposed. The zone is located in a mobile node'transmission range and determined by mobile node's mobility information received by Global Positioning System (GPS). The proposed algorithm is applied to the route discovery procedure of the existing on-demand routing protocol, AODV, and evaluated by simulation in various traffic conditions and mobility patterns.

Route-optimized Handoff in Mobile CORBA Environment (Mobile CORBA 환경에서 게이트웨이간의 경로최적화 핸드오프)

  • Shin, Hye-Ryung;Lee, Hyung-Woo;Kim, Ju-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.224-232
    • /
    • 2002
  • The routing protocols designed for wired networks can hardly be used for mobile ad-hoc networks due to limited bandwidth of wireless transmission and unpredictable topological change. Recently, several routing protocols for mobile ad-hoc networks have been proposed. However, when these protocols are applied to support real time services like multimedia transmission, they still have problems in ad-hoe networks, where the topology changes drastically. In this paper, we propose a new route selection algorithm which selects the most reliable rouse that is impervious to route failures by topological changes by mobile hosts. For reliable route selection, the concept of virtual zone (stable lone and caution zone) is proposed. The lone is located in a mobile node's transmission range and determined by mobile node's mobility information received by Global Positioning System (GPS). The proposed algorithm is applied to the route discovery procedure of the existing on-demand routing protocol, AODV, and evaluated by simulation in various traffic conditions and mobility patterns.

Modeling and Simulation of Fuzzy based Propagation Limiting Method for message routing in Wireless Sensor Networks (무선 센서 네트워크에서 메시지 라우팅을 위한 퍼지 기반 전달 영역 제한 기법의 모델링 및 시뮬레이션)

  • Chi, Sang-Hoon;Lee, Hae-Young;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.29-39
    • /
    • 2006
  • Sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. A number of routing protocols to transmit the data between the base station and sensor nodes have been proposed. Intanagonwiwat et al. proposed the directed diffusion in which the base station sends interest messages and waits for data from the nodes in the specific regions. Since the directed diffusion propagates every interest message to whole nodes in the network, it causes energy dissipation of nodes. In this paper, we propose a novel data propagation method, which limits the data transmission area according to a threshold value for reducing the energy consumption in the network. A fuzzy logic is exploited to determine the threshold value by considering the energy and density of all the deployed nodes. The simulation models are designed and implemented based on DEVS formalism which is theoretically well grounded means of expressing discrete event simulation models.

  • PDF

NEMO-enabled Hybrid Distributed Mobility Management (네트워크 이동성을 지원하는 하이브리드 분산 이동성 관리)

  • Wie, Sunghong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.7
    • /
    • pp.1030-1040
    • /
    • 2018
  • In Distributed Mobility Management (DMM) protocol, the mobility functions are distributed to network edge closer to mobile users. DMM protocol has some advantages of low-cost traffic delivery, optimized routing path, high scalability. However, it needs many mobile anchors to exchange signaling messages and it results in a high signaling cost. Thus, previous works suggested the hybrid DMM protocol to reduce the high signaling cost for long-live sessions and this paper extends a hybrid scheme to the NEMO environment. The mobile routers are installed at vehicles and can move together with several mobile devices. So we can define the high-mobility property for mobile routers and suggest the hybrid scheme using this property. According to the high-mobility property of mobile routers, we can distribute the mobile anchors or allocate a centralized mobile anchor. In this paper, we mathematically analyze the performance of the proposed NEMO-enabled hybrid DMM protocol and show superior performance.

Reliable and Efficient Multicast Protocol for Mobile IP (이동 IP 망에서 효율적인 경로설정과 신뢰성 있는 전송방법을 갖는 멀티캐스트 프로토콜)

  • 조형상;신석재;유상조
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.349-359
    • /
    • 2004
  • To provide multicasting service, several multicast protocols for mobile hosts have been proposed. But they include glitches such as a non-optimal delivery route, data loss when hosts move another network, therefore they have some insecure problems about multicast data transmission. In this paper, we consider these problems and propose a new reliable and efficient multicast routing protocol for Mobile If networks. The proposed protocol provides reliable multicast transmission by compensating data loss from the previous agent when a mobile host moves another network. Also it provides additional function that is directly to connect a multicast tree according to the status of agents. It provides more efficient and optimal multicast path. The performance of the proposed protocol is proved by simulation of various conditions.

A Design of Device Management System for Factories using Wireless Sensor Network (무선 센서 망을 이용한 공장 내 장치 관리 시스템 설계)

  • Moon, Sung-Nam;Kim, Young-Han
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3C
    • /
    • pp.233-240
    • /
    • 2012
  • Unlike traditional factory environment, in an industrial factory network applied wireless sensor network technologies, all procedures of discovery, identification and verification of devices should be performed in an automatic fashion. To address these challenges, we design a management system using the device registry server that we propose in this paper. In the phase of device discovery, the proposed system utilizes properties of routing protocol running in factories. Also, in the phase of identification and verification, the system uses unique and general information of a device stored within the device registration server. Such a way allows management system to reduce implementation complexity and to easily manage devices in a factory applied with a wireless network consisting of heterogeneous devices.

K-connected, (K+1)-covered Fault-tolerant Topology Control Protocol for Wireless Sensor Network (무선 센서 망을 위한 K-연결 (K+1)-감지도 고장 감내 위상 제어 프로토콜)

  • Park, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11B
    • /
    • pp.1133-1141
    • /
    • 2009
  • In this paper, we present a distributed fault-tolerant topology control protocol that configure a wireless sensor network to achieve k-connectivity and (k+1)-coverage. One fundamental issue in sensor networks is to maintain both sensing coverage and network connectivity in order to support different applications and environments, while some least active nodes are on duty. Topology control algorithms have been proposed to maintain network connectivity while improving energy efficiency and increasing network capacity. However, by reducing the number of links in the network, topology control algorithms actually decrease the degree of routing redundancy. Although the protocols for resolving such a problem while maintaining sensing coverage were proposed, they requires accurate location information to check the coverage, and most of active sensors in the constructed topology maintain 2k-connectivity when they keep k-coverage. We propose the fault-tolerant topology control protocol that is based on the theorem that k-connectivity implies (k+1)-coverage when the sensing range is at two times the transmission range. The proposed distributed algorithm does not need accurate location information, the complexity is O(1). We demonstrate the capability of the proposed protocol to provide guaranteed connectivity and coverage, through both geometric analysis and extensive simulation.

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.

AFLRS: An AODV-based Fast Local Repair Scheme in Ad Hoc Networks (AFLRS: 애드 혹 네트워크에서 AODV에 기반한 빠른 경로 복구 기법)

  • 서현곤;김기형;서재홍
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.81-90
    • /
    • 2004
  • A Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes dynamically self-organizing in arbitrary and temporary network topologies without the use of any existing network infrastructure. The AODV (Ad Hoc On-Demand Distance Vector) Protocol is one of the typical reactive routing protocols, in that mobile nodes initiate routing activities only in the presence of data packets in need of a route. In this paper, we focus upon the local repair mechanism of AODV. When a link is broken, the upstream node of the broken link repairs the route to the destination by initiating a local route discovery process. The process involves the flooding of AODV control messages in every node within a radius of the length from the initiating node to the destination. In this paper, we propose an efficient local repair scheme for AODV called AFLRS (AODV-based Fast Local Repair Scheme). AFLRS utilizes the existing routing information in the intermediate nodes which have been on the active route to the destination before a link break occurs. AFLRS can reduce the flooding range of AODV control messages and the route recovery time because it can repair route through the intermediate nodes. For the performance evaluation of the proposed AFLRS, we have simulated the local repair mechanisms by using NS2 and AODV-UU. The performance results show that AFLRS can achieve faster route recovery than the local repair mechanism of AODV.