• Title/Summary/Keyword: Network overhead

Search Result 1,017, Processing Time 0.03 seconds

An Autonomous Power Control Scheme of Femto Cells for Throughput Improvement and Overhead Reduction in Heterogeneous Networks (이종망 환경에서 오버헤드 감소와 수율 향상을 위한 자율적인 펨토셀 전송 전력 조절 기법)

  • Jo, Younghoon;Lim, Jaechan;Hong, Daehyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.1
    • /
    • pp.26-33
    • /
    • 2013
  • Femto-cells are low power/cost, micro-base stations and are main components in heterogeneous networks. However, some of technical issues arise when femto-cells are initially installed. One approach to resolve the problems is to control the transmission (TX) power autonomously via SON(Self-Organized Network) scheme. By controlling the femto-cell TX power, the system throughput performance can be improved or the system overhead is highly reduced. Generally, the TX power for maximizing the system throughput and that for reduced system overhead may not be identical. Therefore, we propose a TX power control scheme by which we can improve the system throughput and reduce the system overhead, simultaneously. When we apply the proposed method, the simulation results show that the system overhead can be reduced by up to 41% compared to the performance of the method which maximizes throughput performance only, and the throughput performance can be improved by up to 63% compared to that of the method which only optimizes the coverage area.

Supporting Mobile IP in Ad Hoc Networks with Wireless Backbone (무선 백본 기반 Ad Hoc 네트워크에서의 Mobile IP지원)

  • 신재욱;김응배;김상하
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.223-226
    • /
    • 2003
  • In this paper, we propose new agent discovery and route discovery schemes to support Mobile IP (MIP) in Ad Hoc networks with wireless backbone. The wireless backbone consisting of stationary wireless routers and Internet gateways (IGs) is a kind of wireless access network of IP-based core network. The proposed scheme utilizes favorable features of wireless backbone such as stable links and no energy constraints. In the agent discovery scheme, backbone-limited periodic Agent Advertisement (AA) and proxy-AA messages are used, which reduce network-wide broadcasting overhead caused by AA and Agent Solicitation messages and decentralize MIP processing overhead in IGs. In order to reduce delay time and control message overhead during route discovery far the destination outside Ad Hoc network, we propose a cache-based scheme which can be easily added to the conventional on-demand routing protocols. The proposed schemes can reduce control overhead during agent discovery and route discovery, and efficiently support MIP in Ad Hoc network with wireless backbone.

  • PDF

Improved AKA Protocol for Efficient Management of Authentication Data in 3GPP Network (3GPP 네트워크에서 효율적인 인증 데이터 관리를 위한 개선된 AKA 프로토콜)

  • Kim, Doo-Hwan;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.93-103
    • /
    • 2009
  • In this paper, we propose a USIM-based Authentication Scheme for 3GPP Network Access. The proposed scheme improves the problems of existing authentication protocol in 3GPP Network such as sequence number synchronization problem, the storage overhead of authentication data, and bandwidth consumption between Serving Network and Home Network. Our proposal is based on the USIM-based Authentication and Key Agreement Protocol that is defined in 3GPP Specification. In our scheme, mobile nodes share a SK with Serving Network and use a time stamp when mobile nodes are performing an authentication procedure with Serving Network. By using time stamp, there is no reason for using sequence number to match the authentication vector between mobile nodes and networks. So, synchronization problem can be solved in our scheme. As well as our scheme uses an authentication vector, the storage overhead of authentication data in Serving Network and bandwidth consumption between networks can be improved.

Mobility-Aware Mesh Construction Algorithm for Low Data-Overhead Multicast Ad Hoc Routing

  • Ruiz, Pedro M.;Antonio F., Gomez-Skarmeta
    • Journal of Communications and Networks
    • /
    • v.6 no.4
    • /
    • pp.331-342
    • /
    • 2004
  • We study the problem of controlling data overhead of mesh-based multicast ad hoc routing protocols by adaptively adding redundancy to the minimal data overhead multicast mesh as required by the network conditions. We show that the computation of the minimal data overhead multicast mesh is NP-complete, and we propose an heuristic approximation algorithm inspired on epidemic algorithms. In addition, we propose a mobility-aware and adaptive mesh construction algorithm based on a probabilistic path selection being able to adapt the reliability of the multicast mesh to the mobility of the network. Our simulation results show that the proposed approach, when implemented into ODMRP, is able to offer similar performance results and a lower average latency while reducing data overhead between 25 to 50% compared to the original ODMRP.

An Elliptic Curve Cryptosystem based on Trust and RBAC to Reduce Security Overhead in Sensor Networks (센서네트워크의 보안 오버헤드를 줄이기 위한 신뢰와 RBAC 기반의 타원곡선암호)

  • Kim, Hyojin;Park, Ho-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.11
    • /
    • pp.747-756
    • /
    • 2013
  • It is important to reduce unnecessary overhead in sensor network using battery. In addition encryption is important because of necessity of security. Since unavoidable overhead occurs in case of encryption, security and overhead are in trade-off condition. In this paper, we use a concept called trust to reduce the encryption overhead. We reduce overhead by controlling encryption key sizes while maintaining the security level where high and low trust nodes are mixed. We simulated and compared normal encryption and trust value based encryption. As a result, the latter has lower execution time and overhead. If we define a standard of trust levels considering purpose and circumstances of real network, we can use constrained resources efficiently in sensor network.

Redundancy Path Routing Considering Associativity in Ad Hoc Networks (Ad Hoc Network에서 Associativity을 고려한 Redundancy 경로 라우팅)

  • 이학후;안순신
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.199-201
    • /
    • 2003
  • Ad hoc network은 stationary infrastructure의 도움 없이 이동 노드들이 필요 시 network 형태을 구성하여 통신이 이루어지게 하는 network으로 ad hoc network 환경에 맞는 다양한 라우팅 프로토콜들이 개발되었고 크게는 table­driven, on­demand 방식으로 나눌 수 있는데 on­demand 방식의 AODV 프로토콜은 routing overhead가 적다는 장점이 있는 반면 single path로 data forwarding을 진행하여 중간노드의 이동에 의한 path가 broken되는 경우 local routing을 하거나 새로이 source­initialed route rediscovery을 수행하여 전송 delay 및 control traffic overhead 등을 높이는 결과를 발생 시켰다. 본 논문은 single path로 구성되는 AODV 프로토콜의 route failures시 문제점을 보완한 Associativity Based Redundancy path Routing(ABRR) 및 Alternate Redundancy path Routing(ARR) schemes을 제안한다. 첫째, ABRR은 main path상에 있는 각 노드들은 associativity based stable node 정보를 이용하여 path broken 이전에 local redundancy path을 구성하여 path broken시 local routing없이 route을 복구할 수 있게 하고 둘째, ARR은 source­initialed route discovery에 의해 alternate path을 구성하여 ABRR 그리고 local routing에 의해 main route recovery 실패 시 alternate path을 main path로 전환하여 control traffic overhead 및 전송 delay을 줄이게 한다.

  • PDF

Scalable Path Computation Flooding Approach for PCE-Based Multi-domain Networks

  • Perello, Jordi;Hernandez-Sola, Guillem;Agraz, Fernando;Spadaro, Salvatore;Comellas, Jaume
    • ETRI Journal
    • /
    • v.32 no.4
    • /
    • pp.622-625
    • /
    • 2010
  • In this letter, we assess the scalability of a path computation flooding (PCF) approach to compute optimal end-to-end inter-domain paths in a path computation element-based multi-domain network. PCF yields a drastically reduced network blocking probability compared to a blind per-domain path computation but introduces significant network control overhead and path computation complexity. In view of this, we introduce and compare an alternative low overhead PCF (LoPCF) solution. From the obtained results, LoPCF leads to similar blocking probabilities to PCF while exhibiting around 50% path computation complexity and network control overhead reduction.

IPv6 Autoconfiguration for Hierarchical MANETs with Efficient Leader Election Algorithm

  • Bouk, Safdar Hussain;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.248-260
    • /
    • 2009
  • To connect a mobile ad hoc network (MANET) with an IP network and to carryout communication, ad hoc network node needs to be configured with unique IP adress. Dynamic host configuration protocol (DHCP) server autoconfigure nodes in wired networks. However, this cannot be applied to ad hoc network without introducing some changes in auto configuration mechanism, due to intrinsic properties (i.e., multi-hop, dynamic, and distributed nature) of the network. In this paper, we propose a scalable autoconfiguration scheme for MANETs with hierarchical topology consisting of leader and member nodes, by considering the global Internet connectivity with minimum overhead. In our proposed scheme, a joining node selects one of the pre-configured nodes for its duplicate address detection (DAD) operation. We reduce overhead and make our scheme scalable by eliminating the broadcast of DAD messages in the network. We also propose the group leader election algorithm, which takes into account the resources, density, and position information of a node to select a new leader. Our simulation results show that our proposed scheme is effective to reduce the overhead and is scalable. Also, it is shown that the proposed scheme provides an efficient method to heal the network after partitioning and merging by enhancing the role of bordering nodes in the group.

Polling Method based on Weight Table for Efficient Monitoring (효율적인 모니터링을 위한 가중치 테이블 기반의 폴링기법)

  • Mun, Hyung-Jin
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.5-10
    • /
    • 2015
  • With the advance of ICT, understanding the condition of network and analysing network monitoring have become an important issue. On the TCP/IP network, SNMP is the typical protocol that catches the condition of network by using polling method. If polling method is implemented for a long period, to catch the change of the condition of the network is not easy. On the other hand, in case of short-term polling, even if it could catch the condition of the network in real time, responsive messages to results of the polling cause the increase of traffic and therefore burden the network. There have been studies to control the overhead of responsive messages by controlling the polling period. However, not considering the characteristics of an agent, and running randomly, they cannot decrease the overhead although they would have an instant effect. This paper suggests an efficient polling method that decreases the traffic overhead of polling and catches the condition of the network in real time. Proposed method an polling for a short period and gave weight based on the characteristics of agents to catch the network condition, and a manager decided polling differentially based on the weight so that it decreased the overhead of polling traffic.

  • PDF

Practical Schemes for Tunable Secure Network Coding

  • Liu, Guangjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1193-1209
    • /
    • 2015
  • Network coding is promising to maximize network throughput and improve the resilience to random network failures in various networking systems. In this paper, the problem of providing efficient confidentiality for practical network coding system against a global eavesdropper (with full eavesdropping capabilities to the network) is considered. By exploiting a novel combination between the construction technique of systematic Maximum Distance Separable (MDS) erasure coding and traditional cryptographic approach, two efficient schemes are proposed that can achieve the maximum possible rate and minimum encryption overhead respectively on top of any communication network or underlying linear network code. Every generation is first subjected to an encoding by a particular matrix generated by two (or three) Vandermonde matrices, and then parts of coded vectors (or secret symbols) are encrypted before transmitting. The proposed schemes are characterized by tunable and measurable degrees of security and also shown to be of low overhead in computation and bandwidth.