• Title/Summary/Keyword: random routing

Search Result 95, Processing Time 0.02 seconds

The Simulation of a Multipath Routing Algorithm in Sensor Networks (센서 네트워크에서 멀티패스 라우팅 알고리즘의 시뮬레이션)

  • Jung Won-do;Kim Ki-Hyung;Sohn Young-Ho
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.05a
    • /
    • pp.144-148
    • /
    • 2005
  • The sensor network consists of sensor nodes which communicate wirelessly. It requires energy-efficient routing protocols. We measure requirements in routing protocols by using simulation techniques. In this paper, we propose a random routing algorithm and evaluate it by simulation.

  • PDF

Space-Stretch Tradeoff Optimization for Routing in Internet-Like Graphs

  • Tang, Mingdong;Zhang, Guoqiang;Liu, Jianxun
    • Journal of Communications and Networks
    • /
    • v.14 no.5
    • /
    • pp.546-553
    • /
    • 2012
  • Compact routing intends to achieve good tradeoff between the routing path length and the memory overhead, and is recently considered as a main alternative to overcome the fundamental scaling problems of the Internet routing system. Plenty of studies have been conducted on compact routing, and quite a few universal compact routing schemes have been designed for arbitrary network topologies. However, it is generally believed that specialized compact routing schemes for peculiar network topologies can have better performance than universal ones. Studies on complex networks have uncovered that most real-world networks exhibit power-law degree distributions, i.e., a few nodes have very high degrees while many other nodes have low degrees. High-degree nodes play the crucial role of hubs in communication and inter-networking. Based on this fact, we propose two highest-degree landmark based compact routing schemes, namely HDLR and $HDLR^+$. Theoretical analysis on random power-law graphs shows that the two schemes can achieve better space-stretch trade-offs than previous compact routing schemes. Simulations conducted on random power-law graphs and real-world AS-level Internet graph validate the effectiveness of our schemes.

Characterizing Collaboration in Social Network-enabled Routing

  • Mohaisen, Manar;Mohaisen, Aziz
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1643-1660
    • /
    • 2016
  • Connectivity and trust in social networks have been exploited to propose applications on top of these networks, including routing, Sybil defenses, and anonymous communication systems. In these networks, and for such applications, connectivity ensures good performance of applications while trust is assumed to always hold, so as collaboration and good behavior are always guaranteed. In this paper, we study the impact of differential behavior of users on performance in typical social network-enabled routing applications. We classify users into either collaborative or rational (probabilistically collaborative) and study the impact of this classification and the associated behavior of users on the performance of such applications, including random walk-based routing, shortest path based routing, breadth-first-search based routing, and Dijkstra routing. By experimenting with real-world social network traces, we make several interesting observations. First, we show that some of the existing social graphs have high routing costs, demonstrating poor structure that prevents their use in such applications. Second, we study the factors that make probabilistically collaborative nodes important for the performance of the routing protocol within the entire network and demonstrate that the importance of these nodes stems from their topological features rather than their percentage of all the nodes within the network.

Integrating Random Network Coding with On-Demand Multicast Routing Protocol

  • Park, Joon-Sang;Baek, Seung Jun
    • ETRI Journal
    • /
    • v.34 no.5
    • /
    • pp.775-778
    • /
    • 2012
  • We propose integrating random network coding with the Enhanced On-Demand Multicast Routing Protocol (E-ODMRP). With the Network Coded E-ODMRP (NCE-ODMRP), we present a framework that enables a seamless integration of random linear network coding with conventional ad hoc multicast protocols for enhanced reliability. Simulation results show that the NCE-ODMRP achieves a nearly perfect packet delivery ratio while keeping the route maintenance overhead low to a degree similar to that of the E-ODMRP.

Application of Control Variable with Routing Probability to Queueing Network Simulation (대기행렬 네트워크 시뮬레이션에서 분지확률 통제변수의 응용)

  • Kwon, Chi-Myung;Lim, Sang-Gyu
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.3
    • /
    • pp.71-78
    • /
    • 2012
  • This research discusses the application of the control variables to achieve a more precise estimation for the target response in queueing network simulation. The efficiency of control variable method in estimating the response depends upon how we choose a set of control variables strongly correlated with the response and how we construct a function of selected control variables. For a class of queuing network simulations, the random variables that drive the simulation are basically the service-time and routing probability random variables. Most of applications of control variable method focus on utilization of the service time random variables for constructing a controlled estimator. This research attempts to suggest a controlled estimator which uses these two kinds of random variables and explore the efficiency of these estimators in estimating the reponses for computer network system. Simulation experiments on this model show the promising results for application of routing probability control variables. We consider the applications of the routing probability control variables to various simulation models and combined control variables using information of service time and routing probability together in constructing a control variable as future researches.

Performance of Mobility Models for Routing Protocol in Wireless Ad-hoc Networks

  • Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.610-614
    • /
    • 2011
  • Nowadays Mobile Ad Hoc Networks (MANETs) are a very popular and emerging technology in the world. MANETs helps mobile nodes to communicate with each other anywhere without using infrastructure. For this purpose we need good routing protocols to establish the network between nodes because mobile nodes can change their topology very fast. Mobile node movements are very important features of the routing protocol. They can have a direct effect on the network performance. In this paper, we are going to discuss random walk and random waypoint mobility models and their effects on routing parameters. Previously, mobility models were used to evaluate network performance under the different routing protocols. Therefore, the network performance will be strongly modeled by the nature of the mobility pattern. The routing protocols must rearrange the changes of accurate routes within the order. Thus, the overheads of traffic routing updates are significantly high. For specific network protocols or applications, these mobility patterns have different impacts.

Performance Evaluation of AODV and OLSR Routing Protocol According to Node's Mobility Model (노드 이동성 모델에 따른 AODV와 OLSR 라우팅 프로토콜의 성능 분석)

  • Kang, Mi-Seon;Kum, Dong-Won;Cho, You-Ze
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7A
    • /
    • pp.662-668
    • /
    • 2011
  • This paper analyzes the performance of the Ad hoc On-demand Distance Vector (AODV) routing protocol and Optimized Link State Routing (OLSR) for Mobile Ad hoc Networks (MANETs) using node mobility models. Mobility affects the performance of a routing protocol as it causes changes to network topology. Thus, evaluating the performance of a MANET routing protocol requires mobility models that can accurately represent the movements of mobile nodes. Therefore, this paper evaluates the performance of the AODV and OLSR routing protocols using the random way point model and the Levy walk model by the ns-2 simulations.

DPW-RRM: Random Routing Mutation Defense Method Based on Dynamic Path Weight

  • Hui Jin;Zhaoyang Li;Ruiqin Hu;Jinglei Tan;Hongqi Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3163-3181
    • /
    • 2023
  • Eavesdropping attacks have seriously threatened network security. Attackers could eavesdrop on target nodes and link to steal confidential data. In the traditional network architecture, the static routing path and the important nodes determined by the nature of network topology provide a great convenience for eavesdropping attacks. To resist monitoring attacks, this paper proposes a random routing mutation defense method based on dynamic path weight (DPW-RRM). It utilizes network centrality indicators to determine important nodes in the network topology and reduces the probability of important nodes in path selection, thereby distributing traffic to multiple communication paths, achieving the purpose of increasing the difficulty and cost of eavesdropping attacks. In addition, it dynamically adjusts the weight of the routing path through network state constraints to avoid link congestion and improve the availability of routing mutation. Experimental data shows that DPW-RRM could not only guarantee the normal algorithmic overhead, communication delay, and CPU load of the network, but also effectively resist eavesdropping attacks.

TAILWIND: Mobility information based Routing for Delay Tolerant Network (이동 방향 정보를 이용한 DTN 라우팅: TAILWIND)

  • Cho, Seoik;Kim, Sunhyun;Moon, Soohoon;Han, Seungjae
    • Journal of KIISE
    • /
    • v.42 no.3
    • /
    • pp.408-412
    • /
    • 2015
  • In base station based networks, traffic overload at the base station is inevitable. Peer-to-peer DTN which disperses the traffic overhead to each node can relieve the traffic overload at the base station. To increase the message delivery ratio and reduce the message overhead, we present novel routing using mobility information which can be obtained from each node, unlike the existing flooding based routings. In the proposed routing scheme, the routing decision metric, which is defined based on the node mobility information, is computed by using the expected distance between each node to the destination. The message is copied to other nodes that have lower expected distance to the destination than the value for the node willing to copy the message. We conducted simulations by using both a random mobility model and a real mobility trace to compare the performance of the proposed routing scheme to the existing routing scheme that does not utilize the mobility information. The performance evaluation showed the proposed routing successfully delivers messages with 10% to 30% less copies compared to previously proposed routing schemes.

On Sensor Network Routing for Cloaking Source Location Against Packet-Tracing

  • Tscha, Yeong-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3B
    • /
    • pp.213-224
    • /
    • 2009
  • Most of existing routing methods in wireless sensor networks to counter the local eavesdropping-based packet-tracing deal with a single asset and suffer from the packet-delivery latency as they prefer to take a separate path of many hops for each packet being sent. Recently, the author proposed a routing method, GSLP-w(GPSR-based Source-Location Privacy with crew size w), that enhances location privacy of the packet-originating node(i.e., active source) in the presence of multiple assets, yet taking a path of not too long. In this paper, we present a refined routing(i.e., next-hop selection) procedure of it and empirically study privacy strength and delivery latency with varying the crew size w(i.e., the number of packets being sent per path). It turns out that GSLP-w offers the best privacy strength when the number of packets being sent per path is randomly chosen from the range [$1,h_{s-b}/4$] and that further improvements on the privacy are achieved by increasing the random walk length TTLrw or the probability prw that goes into random walk(where, $h_{s-b}$ is the number of hops of the shortest path between packet-originating node s and sink b).