• Title/Summary/Keyword: routing scheme

Search Result 820, Processing Time 0.025 seconds

An Efficient TCP Algorithm in Mobile ADHOC Networks (이동망 네트워크에서의 효율적인 TCP 알고리즘)

  • Hong, Sung-Hwa;Kim, Hoon-Ki
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.73-81
    • /
    • 2009
  • TCP assumes that packet loss is always happened by congestionlike wired networks because is can not distinguish between congestion loss and transmission error loss,. This assumption results in unnecessary TCP performance degradation in wireless networks by reducing sender's congestion window size and retransmitting the lost packets. Also, repeated retransmissions loed to waste the limited battery power of mobile devices. In this paper, we propose the new congestion control scheme that add the algorithms monitoring networks states and the algorithms preventing congestion to improve TCP throughput performance and energy efficiency in wireless ad-hoc networks. Using NS2, we showd our scheme improved throughput performance and energy efficiency.

Dynamic Threshold Method for Isolation of Worm Hole Attack in Wireless Sensor Networks

  • Surinder Singh;Hardeep Singh Saini
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.119-128
    • /
    • 2024
  • The moveable ad hoc networks are untrustworthy and susceptible to any intrusion because of their wireless interaction approach. Therefore the information from these networks can be stolen very easily just by introducing the attacker nodes in the system. The straight route extent is calculated with the help of hop count metric. For this purpose, routing protocols are planned. From a number of attacks, the wormhole attack is considered to be the hazardous one. This intrusion is commenced with the help of couple attacker nodes. These nodes make a channel by placing some sensor nodes between transmitter and receiver. The accessible system regards the wormhole intrusions in the absence of intermediary sensor nodes amid target. This mechanism is significant for the areas where the route distance amid transmitter and receiver is two hops merely. This mechanism is not suitable for those scenarios where multi hops are presented amid transmitter and receiver. In the projected study, a new technique is implemented for the recognition and separation of attacker sensor nodes from the network. The wormhole intrusions are triggered with the help of these attacker nodes in the network. The projected scheme is utilized in NS2 and it is depicted by the reproduction outcomes that the projected scheme shows better performance in comparison with existing approaches.

A Route Repair Scheme for Reducing DIO Poisoning Overhead in RPL-based IoT Networks (RPL 기반 IoT 네트워크에서 DIO Poisoning 오버헤드를 감소시키는 경로 복구 방법)

  • Lee, Sung-Jun;Chung, Sang-Hwa
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1233-1244
    • /
    • 2016
  • In the IoT network environments for LLNs(Low power and Lossy networks), IPv6 Routing Protocol for Low Power and Lossy networks(RPL) has been proposed by IETF(Internet Engineering Task Force). The goal of RPL is to create a directed acyclic graph, without loops. As recommended by the IETF standard, RPL route recovery mechanisms in the event of a failure of a node should avoid loop, loop detection, DIO Poisoning. In this process, route recovery time and control message might be increased in the sub-tree because of the repeated route search. In this paper, we suggested RPL route recovery method to solve the routing overhead problem in the sub-tree during a loss of a link in the RPL routing protocol based on IoT wireless networks. The proposed method improved local repair process by utilizing a route that could not be selected as the preferred existing parents. This reduced the traffic control packet, especially in the disconnected node's sub tree. It also resulted in a quick recovery. Our simulation results showed that the proposed RPL local repair reduced the recovery time and the traffic of control packets of RPL. According to our experiment results, the proposed method improved the recovery performance of RPL.

A Study on Improvement of Energy Efficiency for LEACH Protocol in WSN (WSN에서 LEACH 프로토콜의 에너지 효율 향상에 관한 연구)

  • Lee, Won-Seok;Ahn, Tae-Won;Song, ChangYoung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.213-220
    • /
    • 2015
  • Wireless sensor network(WSN) is made up of a lot of battery operated inexpensive sensors that, once deployed, can not be replaced. Therefore, energy efficiency of WSN is essential. Among the methods for energy efficiency of the network, clustering algorithms, which divide a WSN into multiple smaller clusters and separate all sensors into cluster heads and their associated member nodes, are very energy efficient routing technique. The first cluster-based routing protocol, LEACH, randomly elects the cluster heads in accordance with the probability. However, if the distribution of selected cluster heads is not good, uniform energy consumption of cluster heads is not guaranteed and it is possible to decrease the number of active nodes. Here we propose a new routing scheme that, by comparing the remaining energy of all nodes in a cluster, selects the maximum remaining energy node as a cluster head. Because of decrease in energy gap of nodes, the node that was a cluster head operates as a member node much over. As a result, the network lifespan is increased and more data arrives at base station.

A Tree-Based Routing Algorithm Considering An Optimization for Efficient Link-Cost Estimation in Military WSN Environments (무선 센서 네트워크에서 링크 비용 최적화를 고려한 감시·정찰 환경의 트리 기반 라우팅 알고리즘에 대한 연구)

  • Kong, Joon-Ik;Lee, Jae-Ho;Kang, Ji-Heon;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.637-646
    • /
    • 2012
  • Recently, Wireless Sensor Networks (WSNs) are used in many applications. When sensor nodes are deployed on special areas, where humans have any difficulties to get in, the nodes form network topology themselves. By using the sensor nodes, users are able to obtain environmental information. Due to the lack of the battery capability, sensor nodes should be efficiently managed with energy consumption in WSNs. In specific applications (e.g. in intrusion detections), intruders tend to occur unexpectedly. For the energy efficiency in the applications, an appropriate algorithm is strongly required. In this paper, we propose tree-based routing algorithm for the specific applications, which based on the intrusion detection. In addition, In order to decrease traffic density, the proposed algorithm provides enhanced method considering link cost and load balance, and it establishes efficient links amongst the sensor nodes. Simultaneously, by using the proposed scheme, parent and child nodes are (re-)defined. Furthermore, efficient routing table management facilitates to improve energy efficiency especially in the limited power source. In order to apply a realistic military environment, in this paper, we design three scenarios according to an intruder's moving direction; (1) the intruder is passing along a path where sensor nodes have been already deployed. (2) the intruders are crossing the path. (3) the intruders, who are moving as (1)'s scenario, are certainly deviating from the middle of the path. In conclusion, through the simulation results, we obtain the performance results in terms of latency and energy consumption, and analyze them. Finally, we validate our algorithm is highly able to adapt on such the application environments.

Improved Cluster Routing Algorithm Using Remaining Electric Energy Based on CBRP (CBRP 기반 잔여전력량을 이용한 개선된 클러스터 라우팅 기법)

  • Park, Hyeran;Kim, Wuwoan;Jang, Sangdong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.1
    • /
    • pp.63-71
    • /
    • 2013
  • In the Cluster-Based Routing Protocol (CBRP) a cluster header in each cluster should be elected. The cluster headers consume energy much more than other member nodes do because they manage and operate all of mobile nodes in their cluster. The traditional CBRP elects a cluster header without considering the remaining electric energy of each node. So, there exist problems that the cluster header has short average lifetime, and a new cluster header should be elected again frequently. In this paper, we propose the improved protocol which prolongs the lifetime of the cluster header, decreases the problem of re-electing the cluster header and enhances the stability of the path. In order to achieve this, when a cluster header is elected in a cluster, the remaining electric energies of all the nodes are compared with one another, and the node with the highest energy is elected as the cluster header. Also, the node with the second highest energy is elected as the second header. If the elected cluster header is unable to perform the role of the cluster header any more because the remaining energy level goes low, it sends a beacon message to neighbor member nodes, then the second header will serve as the cluster header.

A Study on the Effect of Designated Domestic Traffic Separation Scheme(TSS) -Focused on the Marine Casualty & the Marine Traffic Flow- (국내 통항분리수역 설치 효과에 관한 연구 -해양사고 및 해상교통흐름을 중심으로-)

  • Kim, Chol-Seong;Jeong, Jae-Yong;Lee, Hong-Hoon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.17 no.1
    • /
    • pp.61-68
    • /
    • 2011
  • The "ship's routeing" system was adopted by IMO and has been operated on the major sea routes of all over the world for the prevention of marine casualty and the improvement of marine traffic flow. Thereupon, also in Korea, the "Hong-do" and "Bogil-do" sea routes on southern coast were designated to mandatory sea area by traffic separation scheme(TSS) in 2003, and the "Geomun-do" sea route on southern coast was designated in 2005. But there were few or no studies on the effect of designated traffic separation scheme in Korea. For this reason, in this paper, we evaluated the contribution of traffic separation scheme to the prevention of marine casualty and the improvement of marine traffic flow after designation of domestic traffic separation scheme using data of the marine casualties and ship's tracks from AIS information. The results of evaluation showed that on the contrary, the cases of marine casualties were increased on some sea routes and regular traffic flows were disturbed by some vessels after designation of traffic separation scheme. For the safer and better sea routes, alternative ideas such as reposition of ship's routing on "Hong-do" and "Bogil-do" sea areas were suggested.

Cache Table Management for Effective Label Switching (효율적인 레이블 스위칭을 위한 캐쉬 테이블 관리)

  • Kim, Nam-Gi;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.2
    • /
    • pp.251-261
    • /
    • 2001
  • The traffic on the Internet has been growing exponentially for some time. This growth is beginning to stress the current-day routers. However, switching technology offers much higher performance. So the label switching network which combines IP routing with switching technology, is emerged. EspeciaJJy in the data driven label switching, flow classification and cache table management are needed. Flow classification is to classify packets into switching and non-switching packets, and cache table management is to maintain the cache table which contains information for flow classification and label switching. However, the cache table management affects the performance of label switching network considerably as well as flowclassification because the bigger cache table makes more packet switched and maintains setup cost lower, but cache is restricted by local router resources. For that reason, there is need to study the cache replacement scheme for the efficient cache table management with the Internet traffic characterized by user. So in this paper, we propose several cache replacement schemes for label switching network. First, without the limitation at switching capacity in the router. we introduce FIFO(First In First Out). LFC(Least Flow Count), LRU(Least Recently Used! scheme and propose priority LRU, weighted priority LRU scheme. Second, with the limitation at switching capacity in the router, we introduce LFC-LFC, LFC-LRU, LRU-LFC, LRU-LRU scheme and propose LRU-weighted LRU scheme. Without limitation, weighted priority LRU scheme and with limitation, LRU-weighted LRU scheme showed best performance in this paper.

  • PDF

Analysis of Rainfall-Runoff Characteristics in Gokgyochun Basin Using a Runoff Model (유출모형을 이용한 곡교천 유역의 강우-유출 특성 분석)

  • Hwan, Byungl-Ki;Cho, Yong-Soo;Yang, Seung-Bin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.404-411
    • /
    • 2019
  • In this study, the HEC-HMS was applied to determine rainfall-runoff processes for the Gokgyuchun basin. Several sub-basins have large-scale reservoirs for agricultural needs and they store large amounts of initial runoff. Three infiltration methods were implemented to reflect the effect of initial loss by reservoirs: 'SCS-CN'(Scheme I), 'SCS-CN' with simple surface method(Scheme II), and 'Initial and Constant rate'(Scheme III). Modeling processes include incorporating three different methods for loss due to infiltration, Clark's UH model for transformation, exponential recession model for baseflow, and Muskingum model for channel routing. The parameters were calibrated using an optimization technique with trial and error method. Performance measures, such as NSE, RAR, and PBIAS, were adopted to aid in the calibration processes. The model performance for those methods was evaluated at Gangcheong station, which is the outlet of study site. Good accuracy in predicting runoff volume and peak flow, and peak time was obtained using the Scheme II and III, considering the initial loss, whereas Scheme I showed low reliability for storms. Scheme III did not show good matches between observed and simulated values for storms with multi peaks. Conclusively, Scheme II provided better results for both single and multi-peak storms. The results of this study can provide a useful tool for decision makers to determine master plans for regional flood control management.

Explicit Multicast Extension (Xcast+) for Efficient Multicast Packet Delivery

  • Shin, Myung-Ki;Kim, Yong-Jin;Park, Ki-Shik;Kim Sang-Ha
    • ETRI Journal
    • /
    • v.23 no.4
    • /
    • pp.202-204
    • /
    • 2001
  • In this letter, we propose a new multicast scheme, named Xcast+, which is an extension of Explicit Multicast (Xcast) for an efficient delivery of multicast packets. The mechanism incorporates the host group model and a new control plane into existing Xcast, and not only does it provide the transparency of traditional multicast schemes to senders and receivers, but it also enhances the routing efficiency in networks. Since intermediate routers do not have to maintain any multicast states, it results in a more efficient and scalable mechanism to deliver multicast packets. Our simulation results show distinct performance improvements of our approach compared to Xcast, particularly as the number of receivers in a subnet increases.

  • PDF