• Title/Summary/Keyword: reliable routing

Search Result 197, Processing Time 0.025 seconds

Reliability Analysis of the 2-Dimensional Ring-Banyan Network (2차원 링-밴얀 망의 신뢰성 분석)

  • Park, Jae-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.4
    • /
    • pp.256-261
    • /
    • 2007
  • 2-Dimensional Ring-banyan network is a high-performance fault-tolerant switching network using a deflection self-routing. The throughput of the switching network is better than that of Cyclic Banyan network under non-uniform traffic. In this paper, we present an analytic reliability analysis of the fault-tolerant switching network. We present the Mean-Time-to-Failure that is calculated by using probabilistic model. This model also takes into account a hardware complexity. In case of $16\;{\times}\;16$ size, the presented switching network is 1.275 times more reliable than Hui's switching network. And it is 1.510 times more reliable than Hui's network in case of $64\;{\times}\;64$ size.

Dimensioning of linear and hierarchical wireless sensor networks for infrastructure monitoring with enhanced reliability

  • Ali, Salman;Qaisar, Saad Bin;Felemban, Emad A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3034-3055
    • /
    • 2014
  • Wireless Sensor Networks have extensively been utilized for ambient data collection from simple linear structures to dense tiered deployments. Issues related to optimal resource allocation still persist for simplistic deployments including linear and hierarchical networks. In this work, we investigate the case of dimensioning parameters for linear and tiered wireless sensor network deployments with notion of providing extended lifetime and reliable data delivery over extensive infrastructures. We provide a single consolidated reference for selection of intrinsic sensor network parameters like number of required nodes for deployment over specified area, network operational lifetime, data aggregation requirements, energy dissipation concerns and communication channel related signal reliability. The dimensioning parameters have been analyzed in a pipeline monitoring scenario using ZigBee communication platform and subsequently referred with analytical models to ensure the dimensioning process is reflected in real world deployment with minimum resource consumption and best network connectivity. Concerns over data aggregation and routing delay minimization have been discussed with possible solutions. Finally, we propose a node placement strategy based on a dynamic programming model for achieving reliable received signals and consistent application in structural health monitoring with multi hop and long distance connectivity.

Reliable and Efficient Multicast Protocol for Mobile IP (이동 IP 망에서 효율적인 경로설정과 신뢰성 있는 전송방법을 갖는 멀티캐스트 프로토콜)

  • 조형상;신석재;유상조
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.349-359
    • /
    • 2004
  • To provide multicasting service, several multicast protocols for mobile hosts have been proposed. But they include glitches such as a non-optimal delivery route, data loss when hosts move another network, therefore they have some insecure problems about multicast data transmission. In this paper, we consider these problems and propose a new reliable and efficient multicast routing protocol for Mobile If networks. The proposed protocol provides reliable multicast transmission by compensating data loss from the previous agent when a mobile host moves another network. Also it provides additional function that is directly to connect a multicast tree according to the status of agents. It provides more efficient and optimal multicast path. The performance of the proposed protocol is proved by simulation of various conditions.

Survey on the Authentication and Key Management of 802.11s

  • Lam, Jun Huy;Lee, Sang-Gon;Tan, Whye Kit
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.89-92
    • /
    • 2012
  • Wireless Mesh Network expanded the capability of the conventional wireless networking by allowing the nodes to operate in proactive mode, reactive mode or the combination of both, the hybrid mode in the multi-hopping nature. By doing so, the links between the nodes become much more robust and reliable because of the number of paths to reach a destination node from a source node can be more than 1 and do not need to rely on the access point (AP) alone to relay the messages. As there may be many possible ways to form an end-to-end link between 2 nodes, the routing security becomes another main concern of the 802.11s protocol. Besides its reliance on the 802.11i for the security measures, 802.11s also includes some new features such as the Mesh Temporal Key (MTK) and the Simultaneous Authentication of Equals (SAE). The authentication and key management (AKM) process of 802.11s were observed in this paper.

  • PDF

Design of ONU for EPON Based Access Network (EPON 액세스 망 기반의 ONU 설계)

  • 김용태;신동범;이형섭
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.633-636
    • /
    • 2003
  • An Ethernet passive optical network(EPON) is a point-to-multipoint optical network. EPONs leverage the low cost, high performance curve of Ethernet systems to provide reliable data, voice and video to end user at bandwidths far exceeding current access technologies. In this paper, we propose the economical and flexible structure of optical network unit(ONU) converting optical format traffic to the customer's desired format(Ethernet, VDSL, T1, IP multicast, etc.). A unique feature of EPONs is that in addition to terminating and converting the optical signal the ONU provide Layer 2-3 switching functionality, which allows internal routing of enterprise traffic at the ONU.

  • PDF

Intrusion Detection Algorithm in Mobile Ad-hoc Network using CP-SVM (Mobile Ad - hoc Network에서 CP - SVM을 이용한 침입탐지)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.41-47
    • /
    • 2012
  • MANET has vulnerable structure on security owing to structural characteristics as follows. MANET consisted of moving nodes is that every nodes have to perform function of router. Every node has to provide reliable routing service in cooperation each other. These properties are caused by expose to various attacks. But, it is difficult that position of environment intrusion detection system is established, information is collected, and particularly attack is detected because of moving of nodes in MANET environment. It is not easy that important profile is constructed also. In this paper, conformal predictor - support vector machine(CP-SVM) based intrusion detection technique was proposed in order to do more accurate and efficient intrusion detection. In this study, IDS-agents calculate p value from collected packet and transmit to cluster head, and then other all cluster head have same value and detect abnormal behavior using the value. Cluster form of hierarchical structure was used to reduce consumption of nodes also. Effectiveness of proposed method was confirmed through experiment.

A Repulsive Force based High-Reliable Data Routing Scheme in Wireless Sensor Networks (무선 센서 네트워크 환경에서 반발력 기반 고-신뢰 데이터 라우팅 기법)

  • Seong, Dong-Ook;Lee, Yun-Jeong;Park, Jun-Ho;Yoo, Jae-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.171-174
    • /
    • 2011
  • 무선 센서 네트워크를 이용한 응용에서는 데이터 저장 및 처리 기술, 데이터 전송 기술 등과 같은 다양한 기반 기술들이 요구된다. 특히 응용을 실제 환경에 적용하기 위해서는 데이터 보안 기술은 필수적이다. 본 논문은 여러 해킹 기술 중 하나인 스니핑(Sniffing) 공격으로부터 원천적인 방어를 위해 데이터 전송 경로를 위험 요소로부터 물리적으로 회피시키기 위한 라우팅 기법을 제안한다. 제안하는 기법은 크기와 방향 정보를 가지는 반발력 이라는 개념을 기반으로 위험 요소의 인근에 위치한 센서 노드들에게 반발력 정보를 설정한다. 데이터 라우팅 과정에서 반발력이 설정된 노드를 지나갈 경우 해당 정보를 이용하여 안전한 경로로 우회 라우팅을 수행한다. 본 논문에서는 제안하는 기법의 효과를 보이기 위해 시뮬레이션을 통한 동작 모습을 보인다.

A Reliable Transport Supporting Method for a DTMNs (DTMNs를 위한 신뢰성 있는 데이터 전송 지원 방법)

  • Seo, Doo Ok;Lee, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.151-160
    • /
    • 2009
  • While portable and wireless devices are pouring, a new network technology is needed as a breakthrough. The new network technology features large delays, intermittent connectivity, and absence of an end-to-end path from sources to destinations. A network which has one of those characteristics is called DTNs(Delay Tolerant Networks). The main 4 routing methods have been researched so far in extream environment. In this paper, we look into the reliability of DTMNs(Delay Tolerant Mobile Networks) in several different situations, and propose an algorithm that selects a positive routine by sending the only information of its position when making a connection to a detected node. We simulate the proposed algorithm here in DTN using ONE simulator. As a result, it shows that the algorithm reduces the number of message transmission each node.

Reliable Mobile Multicasting with Fewer Control Signaling through Regional Location Management (지역적 위치 관리를 통한 신뢰적인 이동 멀티캐스트 지원방안)

  • 피영수;김기영;윤미연;박진홍;신용태
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.629-631
    • /
    • 2003
  • 본 논문에서는 IP 네트워크 환경에서 이동 사용자에게 멀티캐스트 전송을 보다 효율적으로 지원하기 위해 새로운 프로토콜 EMP(Enhanced Multicast Protocol)을 제안한다. 제안한 EMP는 이동 사용자의 이동성을 지역적으로 관리[5]하므로써 원격가입 방식에서 발생하는 빈번한 멀티캐스트 트리 갱신의 비용을 줄이고 가입/탈퇴로 인해 발생되는 시그널링 지연과 패킷 손실을 완화하였다. 또한 EMP는 양방향 방식에서 발생하는 비효율적인 삼각라우팅(Triangle routing)과 터널링 집중(Tunneling convergence) 현상[4]이 발생하지 않는다. 만약 패킷 손실이 발생하면 RFA(Root of FA)를 통해 회복하므로 회복 절차에 대한 오버헤드가 감소되었다. 따라서 제안된 EMP는 좁은 지역보다는 넓은 지역에서 효율성이 높기 때문에 광범위한 지역에서 사용될 수 있다.

  • PDF

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Tooba Rashid;Sumbal Mustafa
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.100-110
    • /
    • 2023
  • The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.