• Title/Summary/Keyword: routing scheme

Search Result 820, Processing Time 0.029 seconds

Design of Multiple Routing for Simulcast

  • Kim, Chang-Su;Cho, Kwang-Hee;Jeong, Dae-Jin;Jung, Ki-Ung;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.652-653
    • /
    • 2016
  • In ad hoc networks, the neighbors of a transmitter often experience very different propagation and channel conditions, and therefore these neighbors will differ in their ability to recover information from a transmitted message. In this paper, the properties of a multiple routing scheme in ad hoc networks, based on a simulcast transmission that allocates randomly unequal transmission rates on multiple links according to the simulcast capabilities, are investigated.

  • PDF

A Clustering Protocol with Mode Selection for Wireless Sensor Network

  • Kusdaryono, Aries;Lee, Kyung-Oh
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.29-42
    • /
    • 2011
  • Wireless sensor networks are composed of a large number of sensor nodes with limited energy resources. One critical issue in wireless sensor networks is how to gather sensed information in an energy efficient way, since their energy is limited. The clustering algorithm is a technique used to reduce energy consumption. It can improve the scalability and lifetime of wireless sensor networks. In this paper, we introduce a clustering protocol with mode selection (CPMS) for wireless sensor networks. Our scheme improves the performance of BCDCP (Base Station Controlled Dynamic Clustering Protocol) and BIDRP (Base Station Initiated Dynamic Routing Protocol) routing protocol. In CPMS, the base station constructs clusters and makes the head node with the highest residual energy send data to the base station. Furthermore, we can save the energy of head nodes by using the modes selection method. The simulation results show that CPMS achieves longer lifetime and more data message transmissions than current important clustering protocols in wireless sensor networks.

An efficient dynamic routing scheme for delay-bounded multicasting

  • Kang, Moon-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2626-2634
    • /
    • 1997
  • The purpose of multicasting is to reduce the network costs for transmitting the same traffic to multiple destinations. In this paper, an efficient delay-bounded multicasting routing algorithm is proposed, which satistifies the network conditions of cost minimization and can adjust the dynamic events, such as 'leave and/or join ones' from the multicast group. Also, our algorithm is designed for various network requirements such as the efficiet dynamic group support, high-quality data distribution, and adaptability to variable situation. After the delay tolerance and the maximum group size are determined according to network state and requirements for delay and cost, the dynamic delay-bounded multicast tree is constructed using partial multicast routing. We evaluate the performance of the proposed algorithm by running simulations on randomly generated test networks using a Sun Sparc 20 workstation. We were able to obtain good simulation resutls, which means solutions that lies between the minimum cost solution and the minimum delay one.

  • PDF

Distribution based Reliable Routing Scheme with Cooperative Nodes for Wireless Sensor Networks (무선 센서 네트워크의 분산 기반 라우팅 기법)

  • Cho, Bum-Sung;Shon, Min Han;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.752-754
    • /
    • 2012
  • 무선센서네트워크 환경에서는 에너지 효율적인 데이터 패킷 전송을 위해 multi-hop routing 기법과 multi-path routing 기법 등이 연구되고 있다. 두 기법 모두 에너지를 적게 소모하는 경로를 택하여 데이터 패킷을 전송한다. 그러나 에너지를 적게 소모하는 경로를 택하기 위해 센서 노드 간 거리가 가까워져 목적지까지 데이터 패킷을 전송하는데 많은 홉 수를 필요로 한다. 따라서 본 논문에서는 에너지 효율적인 경로를 택하면서 동시에 목적지 가까이에서 데이터 패킷 전송을 이어가는 cooperative communication 기반의 라우팅 기법을 제안한다.

Design and Implementation of The EIGRP based on the SDN (SDN 기반의 EIGRP 라우팅 프로토콜 설계 및 구현)

  • Choi, Youngjun;Kwon, Taewook
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.2
    • /
    • pp.178-185
    • /
    • 2019
  • Recently, due to the rapid growth of the internet the existing network architecture is showing limitations. In order to overcome these problems SDN has been proposed as a new paradigm. EIGRP is a modern routing protocol with many advantages but little research has been done on operation in SDN. In this paper we propose a controller-centric EIGRP based on the SDN environment. To construct the SDN network, We seperate the control function and the data transfer function and the EIGRP is operated by a separated controller. Experiments have shown that the proposed scheme can actually work and be used effectively.

GPS-Based Shortest-Path Routing Scheme in Mobile Ad Hoc Network

  • Park, Hae-Woong;Won, Soo-Seob;Kim, So-Jung;Song, Joo-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1529-1532
    • /
    • 2004
  • A Mobile Ad Hoc NETwork (MANET) is a collection of wireless mobile nodes that forms a temporary network without the need for any existing network infrastructure or centralized administration. Therefore, such a network is designed to operate in a highly dynamic environment due to node mobility. In mobile ad hoc network, frequent topological changes cause routing a challenging problem and without the complete view of the network topology, establishing the shortest path from the source node to the destination node is difficult. In this paper, we suggest a routing approach which utilizes location information to setup the shortest possible path between the source node and the destination node. Location information is obtained through Global Positioning System (GPS) and this geographical coordinate information of the destination node is used by the source node and intermediate nodes receiving route request messages to determine the shortest path to the destination from current node.

  • PDF

Provably Secure Aggregate Signcryption Scheme

  • Ren, Xun-Yi;Qi, Zheng-Hua;Geng, Yang
    • ETRI Journal
    • /
    • v.34 no.3
    • /
    • pp.421-428
    • /
    • 2012
  • An aggregate signature scheme is a digital signature scheme that allows aggregation of n distinct signatures by n distinct users on n distinct messages. In this paper, we present an aggregate signcryption scheme (ASC) that is useful for reducing the size of certification chains (by aggregating all signatures in the chain) and for reducing message size in secure routing protocols. The new ASC scheme combines identity-based encryption and the aggregation of signatures in a practical way that can simultaneously satisfy the security requirements for confidentiality and authentication. We formally prove the security of the new scheme in a random oracle model with respect to security properties IND-CCA2, AUTH-CMA2, and EUF-CMA.

Efficient Route Maintenance Scheme for Wireless Ad-hoc Network Environments (무선 ad-hoc 네트워크 환경을 위한 효율적인 경로 유지 기법)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8A
    • /
    • pp.639-648
    • /
    • 2005
  • A wireless ad-hoc network is a temporal network formed by a collection of wireless mobile nodes without the aid of any existing network infrastructure or centralized ad-ministration. Numerous routing protocols have been developed for changing messages among the nodes in a wireless ad-hoc network. Some multi-path routing protocols have also been proposed to support load balancing and QoS for wireless ad-hoc networks. In this paper, we propose not only an efficient routing algorithm for wireless ad-hoc net-worts but also a protocol that can improve data transmission rate and reduce end-to-end delay. In our protocol, each mobile node need not broadcast routing messages periodically and the mobile node that wants to send data packets initiates route request and route establishment procedure. By simulation, we showed that faster route recovery is possible by maintaining multiple routing paths in each node, and the route maintenance overhead can be reduced by limiting the number of multiple routing paths.

An Enhanced Routing Protocol for Support Mobility in Mobile Ad hoc Networks (이동 ad hoc 네트워크의 이동성을 지원하기 위한 향상된 라우팅 프로토콜)

  • Kim, Kwan-Woong;Kim, Dae-Ik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.131-138
    • /
    • 2008
  • Mobile Ad hoc NETworks (MANETs) refer to autonomous networks in which wireless data communications are established between multiple nodes in a given coverage area without a base station or centralized administration. Because of node mobility and limited battery life, the network topology may changes frequently. Selecting the most reliable path during route discovery process is important to improve performance in ad hoc networks. In this paper, an enhanced routing protocol based on AODV(Ad hoc On-demand Distance Vector routing) by monitoring variation of receiving signal strength is proposed. New metric function that consists of node mobility and hops of path is used for routing decision. For preventing route failure by node movement during data transmission, a new route maintenance named as LRC (Local Route Change) is presented. If the node movement is detected, the routing agent switches path to its neighbor node in LRC. Simulation results show that the performance of the proposed routing scheme is superior to previous AODY protocol.

A Secure and Efficient Method for Detecting Malicious Nodes in MANET (MANET에서 악의적인 노드의 안전하고 효율적인 검출 방안)

  • Lee KangSeok;Choi JongOh;Ji JongBok;Song JooSeok
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.617-622
    • /
    • 2005
  • Lately, the MANET research has focused on providing routing services with security and previous schemes have been proposed for detecting malicious nodes in a MANET. However, they still include some problems which malicious nodes cannot be found when they falsely report other nodes as malicious. Accordingly, we propose a novel and efficient scheme for detecting malicious nodes using report messages and a report table which is consisted of node ID both for suspecting and reporting when the malicious nodes behave normally during the route discovery, but the other hand they drop and modify packets, or falsely report other nodes as malicious during the data transmission. Our proposed scheme is applicable to not only DSR but aiso AODV. And we provide some simulation results of our proposed scheme by comparing general AODV with our proposed scheme. Simulation results show that our Proposed scheme outperforms general AODV in terms of average packet loss ratio and packet delivery ratio.