• Title/Summary/Keyword: random routing

Search Result 95, Processing Time 0.024 seconds

Stochastic Mobility Model for Energy Efficiency in MANET Environment (MANET 환경에서 에너지 효율적인 Stochastic 노드 이동 모델)

  • Yun, Dai-Yeol;Yoon, Chang-Pyo;Hwang, Chi Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.444-446
    • /
    • 2021
  • MANETs(Mobile Ad-hoc Networks) are composed of mobile nodes that are not subordinate to fixed networks and have the feature that can form their own networks. they are used in various fields for specific goals. The mobility model in MANET can be applied in various ways depending on the purpose of usage. The random mobility model has the advantage of being simple and easy to implement, so it is being used the most. In a MANET, it is assumed that each node moves independently. The random movement model is a good model for expressing this independence of each node. However, it is insufficient to express the characteristics of all nodes with only random properties of individual nodes. This paper limits the stochastic mobility model applicable in MANET. we compare the proposed stochastic mobility model and the random mobility model. We confirm that the proposed mobility model is applied to the routing protocol to show improved characteristics in terms of energy consumption efficiency.

  • PDF

An Efficient Lookup Mechanism for Unstructured Peer-to-Peer Considering IP Distribution (ISP별 IP분포를 고려한 비구조적 Peer-to-Peer에서의 Lookup 기법)

  • 김홍일;신판섭
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.873-886
    • /
    • 2003
  • Lookup Is one of important factors for network traffic on peer-to-peer network. Especially, large amount of network resources are required for lookup process in p2p file sharing system that clients use the dynamic If and they import to p2p network in random. In this paper, we employ efficient lookup mechanism which searches lookup with the combined information of ISP key values and the extracted key values from SHA-1 hashing function for shared contents id. The proposed mechanism efficiently searches files on the network because the mechanism processes P2P lookup with consideration the routing information of ISP. We suggest the adapted simulation environment based upon the famous file sharing system of emule P2P and experiment the proposed system.

  • PDF

Self-Identification of Boundary's Nodes in Wireless Sensor Networks

  • Moustafa, Kouider Elouahed;Hafid, Haffaf
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.128-140
    • /
    • 2017
  • The wireless sensor networks (WSNs) became a very essential tool in borders and military zones surveillance, for this reason specific applications have been developed. Surveillance is usually accomplished through the deployment of nodes in a random way providing heterogeneous topologies. However, the process of the identification of all nodes located on the network's outer edge is very long and energy-consuming. Before any other activities on such sensitive networks, we have to identify the border nodes by means of specific algorithms. In this paper, a solution is proposed to solve the problem of energy and time consumption in detecting border nodes by means of node selection. This mechanism is designed with several starter nodes in order to reduce time, number of exchanged packets and then, energy consumption. This method consists of three phases: the first one is to detect triggers which serve to start the mechanism of boundary nodes (BNs) detection, the second is to detect the whole border, and the third is to exclude each BN from the routing tables of all its neighbors so that it cannot be used for the routing.

A Strategy of the Link Saving Routing and Its Characteristics for QoS Aware Energy Saving(QAES) in IP Networks (IP Network에서 QoS Aware Energy Saving(QAES)을 위한 링크 절약 라우팅의 한 방법 및 특성)

  • Han, Chimoon;Kim, Sangchul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.5
    • /
    • pp.76-87
    • /
    • 2014
  • Today the energy consumption of ICT networks is about 10% of the worldwide power consumption and is predicted to increase remarkably in the near future. For this reason, this paper studies energy saving strategies assuring the network-level QoS. In the strategies, the energy consumption of NIC(network interface card) on both endpoint of links decreases by selecting links and making them sleep when the total traffic volume of the IP network is lower than a threshold. In this paper, we propose a heuristic routing algorithm based on so-called delegating/delegated routers, and evaluate its characteristics using computer simulation considering network-level QoS. The selection of sleep links is determined in terms of the number of traffic paths (called min_used path) or the amount of traffics(called min_used traffic) through those kinks. To our experiment, the min_used traffic method shows a little better energy saving but the increased path length compared to the min_used path method. Those two methods have better energy saving characteristics than the random method. This paper confirms that the delegating/delegated router-based routing algorithm results in energy saving effects and sustains network-level QoS in IP networks.

Sybil Attack Detection with Energy Efficiency in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 시빌 공격 탐지)

  • Heo, Junyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.115-120
    • /
    • 2013
  • There are lots of vulnerability and chance to be attacked in wireless sensor networks, which has many applications. Among those attacks, sybil attack is to generate a lot of false node and to inject false information into networks. When a user uses such false information without recognizing the attack, there might be a disaster. Although authentication method can be used to protect such attack, the method is not a good choice in wireless sensor networks, where sensor nodes have a limited battery and low power. In this paper, we propose a novel method to detect sybil attack with a little extra overhead. The proposed method use the characteristics that there is a weak connection between a group of normal nodes and a group of false nodes. In addition, the method uses energy aware routing based on random routing and adds a little information into the routing. Experimental results show that the proposed method detects false node by more than 90% probability with a little energy overhead.

Performance Evaluation of Multi-path Source Routing Protocol according to Mobility Model (이동성 모델에 따른 다중경로 소스 라우팅 프로토콜의 성능평가)

  • Kim, Su-Sun;Kim, Moon Jeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.8
    • /
    • pp.5559-5564
    • /
    • 2015
  • A variety of routing protocols targeted specifically at mobile ad-hoc network environments have been developed. Mobile ad-hoc network is a self-organizing temporary network, operating without the aid of any established wired infrastructure. The proposed protocol supports seamless communication services between the mobile hosts within a mobile ad-hoc network environments. In particular, our protocol makes faster route re-establishment possible by maintaining multiple paths in each mobile host, and also, the protocol provides reliable communication environments. We compare the performance of RWP model with that of LW model. This paper shows delivery ratio with single path and non-disjoint multiple path according to mobility model and node numbers.

Study on Multi-vehicle Routing Problem Using Clustering Method for Demand Responsive Transit (수요응답형 대중교통체계를 위한 클러스터링 기반의 다중차량 경로탐색 방법론 연구)

  • Kim, Jihu;Kim, Jeongyun;Yeo, Hwasoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.5
    • /
    • pp.82-96
    • /
    • 2020
  • The Demand Responsive Transit (DRT) system is the flexible public transport service that determines the route and schedule of the service vehicles according to users' requests. With increasing importance of public transport systems in urban areas, the development of stable and fast routing algorithms for DRT has become the goal of many researches over the past decades. In this study, a new heuristic method is proposed to generate fast and efficient routes for multiple vehicles using demand clustering and destination demand priority searching method considering the imbalance of users' origin and destination demands. The proposed algorithm is tested in various demand distribution scenarios including random, concentration and directed cases. The result shows that the proposed method reduce the drop of service ratio due to an increase in demand density and save computation time compared to other algorithms. In addition, compared to other clustering-based algorithms, the walking cost of the passengers is significantly reduced, but the detour time and in-vehicle travel time of the passenger is increased due to the detour burden.

Energy Saving Characteristics of OSPF Routing Based on Energy Profiles (Energy Profile에 기반한 OSPF 라우팅 방식의 에너지 절약 특성)

  • Seo, Yusik;Han, Chimoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1296-1306
    • /
    • 2015
  • Nowadays the research of energy saving on the IP networks have been studied the various methods in many research institutes. This paper suggests the energy saving method in IP networks which have the various energy profiles, and analyzes its energy saving characteristics in detail. Especially this paper proposes the energy profile based OSPF routing method which have the selectable weighted value in OSPF metric and energy consumption in IP network. This paper analyzes the energy saving effects of the various situations to minimize the energy consumption using the various weighted value on the proposed scheme. The results show that the energy saving efficiency can get about 67% at in ingress input load ${\rho}=0.5$ by using random energy profiles in IP networks. Although the number of hops is a slight increased due to routing the paths for the minimum energy consumption in the algorithm of this method, the increment hop number is limited the mean 1.4 hops. This paper confirms that the energy profile of core router has the large effects of energy saving than the energy profile of edge router, and the proposed method has the excellent energy saving characteristics in IP networks.

Core Selection Algorithm for Multicast Routing in Multiple QoS-Constrained Networks (다중 QoS 제약형 네트워크에서의 멀티캐스트 코어 선택 알고리즘)

  • Jeong, Seung-Mo;Yun, Chan-Hyeon;Son, Seung-Won;Lee, Yu-Gyeong
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.4
    • /
    • pp.507-521
    • /
    • 2000
  • 실시간 멀티미디어 서비스에서 Quality of Service(QoS) 보장의 필요성이 증가하고 있다. 멀티미디어 서비스 제공 형태의 대다수가 될 멀티캐스트 경로설정에서도 QoS 보장은 확장성 신뢰성과 함께 매우 중요한 문제이다. QoS 기반 코어 선택 알고리즘을 제안한다. 제안 알고리즈믄 멀티캐스트 경로설정에서 코어 선택시에 다중 QoS 제약조건을 고려한다. QoS 제약조건은 최소보장 대역폭, 종단 지연, 종단 지연변이 등으로 정의한다. 모의 실험결과는 제안한 QCSA와 Maximum Centered Tree(MCT) Average Centered Tree (ACT) Initial Delay-Constrained Shared Tree(Dcinitial) Random Tree(Random)등의 기존 코어 선택 알고리즘의 성능을 각 항목별로 비교한다 멀티캐스트 그룹 멤버수와 QoS 제약조건을 인자로 한 모의 실험 결과는 제안한 QoS 기반 코어 선택 알고리즘이 기존 코어 선택 알고리즘에 비해서 다중 QoS 제약조건 보장 코어 선택 성공률에서 성능 개선 효과를 가짐을 보여준다. 제안 알고리즘이 본 논문에서 설정한 모의 실험 환경에서는 QoS 기반 코어 선택의 정도를 나타내는 성공률에서 약 10% 정도 기존 알고리즘보다 우수함을 보인다. 이 결과는 제안 알고리즘이 코어 선택 과정의 초기부터 멀티캐스트 그룹내의 모든 멤버에 대한 다중 QoS 제약조건을 고려하는 점이 QoS 기반 코어 선택에서 개선 효과를 나타냄을 보여준다.

  • PDF

Performance analysis of linear pre-processing hopfield network (선형 선처리 방식에 의한 홉필드 네트웍의 성능 분석)

  • Ko, Young-Hoon;Lee, Soo-Jong;Noh, Heung-Sik
    • The Journal of Information Technology
    • /
    • v.7 no.2
    • /
    • pp.43-54
    • /
    • 2004
  • Since Dr. John J. Hopfield has proposed the HOpfield network, it has been widely applied to the pattern recognition and the routing optimization. The method of Jian-Hua Li improved efficiency of Hopfield network which input pattern's weights are regenerated by SVD(singluar value decomposition). This paper deals with Li's Hopfield Network by linear pre-processing. Linear pre-processing is used for increasing orthogonality of input pattern set. Two methods of pre-processing are used, Hadamard method and random method. In manner of success rate, radom method improves maximum 30 percent than the original and hadamard method improves maximum 15 percent. In manner of success time, random method decreases maximum 5 iterations and hadamard method decreases maximum 2.5 iterations.

  • PDF