• Title/Summary/Keyword: hierarchical routing

Search Result 243, Processing Time 0.044 seconds

A Study on the Method of Assigning Ipv6 address for M-BcN (M-BcN을 위한 IPv6 주소 할당 방안 연구)

  • Kim, Gweon-Il;Lee, Sang-Hoon
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.87-100
    • /
    • 2007
  • The aspect of future warfare is NCW(Network Centric Warfare) in accordance with the IT development, so MND have the planning of M-BcN(Military Broadband convergence Network) establishment as the basic system of NCW by the end of 2008. IPv6 address must be managed systematically as a essential element of NCW. In the previous study, it is designed on the basis of the present military information communication network topology. However, it makes some problems. First, it is difficult for present topology to adapt the future M-BcN which is different from the present military network topology. Second, it has defects of inefficiency of route aggregation and enlargement of routing table size. In this paper, we improved the route aggregation and routing table size by assigning the hierarchical address on the basis of M-BcN topology and adjusting the position of field identifying service network. Furthermore, it is proved by the network simulation program(OPNET 12.0).

Design of Distributed Hierarchical Routing Plan Method for Urban Traffic Information System (도시교통정보시스템을 위한 분산 계층 경로탐색 기법 설계)

  • Back, Yeong-Tae;Kim, Sang-Oh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.147-154
    • /
    • 2010
  • This paper suggests new route plan cost calculation and cost-effective route plan algorithm and architecture for the new city traffic information system when it is operated nationwide. New algorithm and architecture estimates cost with traffic speeds which is supported for all different lanes, stratifies logical layer which process different levels' traffic information with diverse traffic patterns and provides different traffic information in the few levels. Also suggested new algorithm supports drivers' customized traffic information through both-way communications and plans routes effectively based on the distance between drivers' start position and destination and different levels which start and end position located. It proposes additional research items and requirement for integration between different cities' traffic information system which the national police agency invested and led.

A Study of node Authentication in Ad-hoc Network using Java Card (자바 카드를 이용한 Ad-hoc망의 노드 인증에 관한 연구)

  • Lee, Cheol-Seung;Shin, Myeong-Sook;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.902-905
    • /
    • 2005
  • In this paper we challenge the mobile node Authentication using Java Card authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc rooting protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Java Card Authentication of mobile node can possibly be applied to the area of M-Commerce, Wireless Security, and Ubiquitous Computing and so on.

  • PDF

Modified LEACH Protocol improving the Time of Topology Reconfiguration in Container Environment (컨테이너 환경에서 토플로지 재구성 시간을 개선한 변형 LEACH 프로토콜)

  • Lee, Yang-Min;Yi, Ki-One;Kwark, Gwang-Hoon;Lee, Jae-Kee
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.311-320
    • /
    • 2008
  • In general, routing algorithms that were applied to ad-hoc networks are not suitable for the environment with many nodes over several thousands. To solve this problem, hierarchical management to these nodes and clustering-based protocols for the stable maintenance of topology are used. In this paper, we propose the clustering-based modified LEACH protocol that can applied to an environment which moves around metal containers within communication nodes. In proposed protocol, we implemented a module for detecting the movement of nodes on the clustering-based LEACH protocol and improved the defect of LEACH in an environment with movable nodes. And we showed the possibility of the effective communication by adjusting the configuration method of multi-hop. We also compared the proposed protocol with LEACH in four points of view, which are a gradual network composition time, a reconfiguration time of a topology, a success ratio of communication on an containers environment, and routing overheads. And to conclude, we verified that the proposed protocol is better than original LEACH protocol in the metal containers environment within communication of nodes.

A Wireless Sensor Network Architecture and Security Protocol for Monitoring the State of Bridge (교량감시를 위한 무선 센서 네트워크 구조 및 보안 프로토콜)

  • Lim Hwa-Jung;Jeon Jin-Soon;Lee Heon-Guil
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.3
    • /
    • pp.465-476
    • /
    • 2005
  • The wireless sensor network consists of a number of sensor nodes which have physical constraints. Each sensor node senses surrounding environments and sends the sensed information to Sink. In order to alleviate the inherent vulnerability in security of the wireless sensor nodes with the hardware constraints, the lightweight security protocol is needed and a variety of research is ongoing. In this paper, we propose a non-hierarchical sensor network and a security protocol that is suitable for monitoring man-made objects such as bridges. This paper, furthermore, explores a two-layer authentication, key distribution scheme which distributes the key and location of a sensor node in advance, and an effective security routing protocol which can take advantage of the Sleep and Awake state. This also results in the increased data transfer rate by increasing the number of alternative routing paths and the reduced energy consumption rate.

  • PDF

Design Mobility Agent Module for Healthcare Application Service (헬스케어 응용 서비스를 위한 Mobility Agent 모듈 설계)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.2
    • /
    • pp.378-384
    • /
    • 2008
  • The sensor network for the health care application service has the man or movable object as the main sensing object. In order to support inter-node interaction by the movement of such sensing objects, the node's dynamic function modification, dynamic self-configuration and energy efficiency must be considered. In this paper, the Agilla model which supports the dynamic function modification through the agent migration between nodes and LEACH protocol which guarantees the dynamic self-configuration and energy efficiency through the configuration of inter-node hierarchical cluster configuration are analyzed. Based on the results of the analysis, the Mobility Agent Middleware which supports the dynamic function modification between nodes is designed, and LEACH_Mobile protocol which guarantees the node nobility as the weakness of the existing LEACH protocol is suggested. Also, the routing module which supports the LEACH_Mobile protocol is designed and the interface for conjunction with Mobility Agent Middleware is designed. Then, it is definitely increase performance which un mobility node of transfer data rate through LEACH_Mobile protocol of simulation result.

i-LEACH : Head-node Constrained Clustering Algorithm for Randomly-Deployed WSN (i-LEACH : 랜덤배치 고정형 WSN에서 헤더수 고정 클러스터링 알고리즘)

  • Kim, Chang-Joon;Lee, Doo-Wan;Jang, Kyung-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.198-204
    • /
    • 2012
  • Generally, the clustering of sensor nodes in WSN is a useful mechanism that helps to cope with scalability problem and, if combined with network data aggregation, may increase the energy efficiency of the network. The Hierarchical clustering routing algorithm is a typical algorithm for enhancing overall energy efficiency of network, which selects cluster-head in order to send the aggregated data arriving from the node in cluster to a base station. In this paper, we propose the improved-LEACH that uses comparably simple and light-weighted policy to select cluster-head nodes, which results in reduction of the clustering overhead and overall power consumption of network. By using fine-grained power model, the simulation results show that i-LEACH can reduce clustering overhead compared with the well-known previous works such as LEACH. As result, i-LEACH algorithm and LEACH algorithm was compared, network power-consumption of i-LEACH algorithm was improved than LEACH algorithm with 25%, and network-traffic was improved 16%.

Hierarchical Mesh Network Design & Implementation (계층적 메쉬 네트워크의 설계 및 구현)

  • Kim, Yong-Hyuck;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.6
    • /
    • pp.26-36
    • /
    • 2009
  • ad-hoc network is self-constructed by mobile hosts without any infrastructure. And the hosts collaborate with each other for routing packet by means of multi-hop communication. But it is too hard to deploy ad hoc network at the large area because of the salability problem caused by low network throughput. network throughput decrease is due to contention on the air among the neighbor host and single interface limitation, and broadcast flooding through overall network. In this paper, to solve the ad hoc scalability problem, we propose mesh network based scalable hierarchical ad hoc architecture, and also propose the adaptation methods for inter-working with the host not including ad hoc functions and the legacy infra-network.

TP2P: Topology-based Peer-to-Peer System for Efficient Resources Lookup (TP2P: 효율적인 자원탐색을 위한 토폴로지 기반의 P2P 시스템)

  • Cha, Bong-Kwan;Han, Dong-Yun;Son, Young-Song;Kim, Kyong-Sok
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.2
    • /
    • pp.88-99
    • /
    • 2007
  • P2P systems are distributed data sharing systems, and each node in them plays the role of client as well as server. There are several studies using Distributed Hash Table, such as Chord, CAN, Tapestry, Pastry, but these systems don't consider the physical latency, therefore they have a weakness of difficulty to guarantee stable performance. To improve this problem, we present the TP2P system. This system is a self-organizing hierarchical overlay system and it uses Chord routing mechanism for lookup data. This system is organized by several subnets, each subnet is organized by physically close nodes, and global network organized by all nodes. In each subnet, one node finds a data, it saves in a node in the subnet, therefore it has higher probability to reduce physical lookup latency than Chord system. And each node has global information of some nodes in its subnet, and it is used to lookup data, therefore the number of hops decrease about 25% as well as the physical lookup latecy are reduced.

Teen Based Secure Group Communication Scheme for Wireless Sensor Networks (무선 센서네트워크를 위한 TEEN 기반의 안전한 그룹통신 기법)

  • Seo, Il-Soo
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.71-78
    • /
    • 2009
  • It is very difficult to apply previous security protocols to WSNs(Wireless Sensor Networks) directly because WNSs have resource constrained characteristics such as a low computing ability, power, and a low communication band width. In order to overcome the problem, we proposes a secure group communication scheme applicable to WSNs. The proposed scheme is a combined form of the TEEN(Threshold sensitive Energy Efficient sensor Network protocol) clustering based hierarchical routing protocol and security mechanism, and we assume that WSNs are composed of sensor nodes, cluster headers, and base stations. We use both private key and public key cryptographic algorithms to achieve an enhanced security and an efficient key management. In addition, communications among sensor nodes, cluster headers, and base stations are accomplished by a hierarchical tree architecture to reduce power consumption. Therefore, the proposed scheme in this paper is well suited for WSNs since our design can provide not only a more enhanced security but also a lower power consumption in communications.

  • PDF