• Title/Summary/Keyword: virtual node

Search Result 245, Processing Time 0.025 seconds

An Energy-Efficient Multiple Path Data Routing Scheme Using Virtual Label in Sensor Network (센서 네트워크 환경에서 가상 식별자를 이용한 에너지 효율적인 다중 경로 데이터 라우팅 기법)

  • Park, Jun-Ho;Yeo, Myung-Ho;Seong, Dong-Ook;Kwon, Hyun-Ho;Lee, Hyun-Jung;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.7
    • /
    • pp.70-79
    • /
    • 2011
  • The multi-path routing schemes that assigns labels to sensor nodes for the reliability of data transmission and the accuracy of an aggregation query over the sensor networks where data transfer is prone to defect have been proposed. However, the existing schemes have high costs for reassigning labels to nodes when the network topology is changed. In this paper, we propose a novel routing method that avoids duplicated data and reduces the update cost of a sensor node. In order to show the superiority of the proposed scheme, we compare it with the existing scheme through the various experiments. Our experimental results show that our proposed method reduces about 95% the amount of the transmitted data for restoration to node failure and about 220% the amount of the transmitted data for query processing over the existing method on average.

A Distributed Bandwidth-Interference aware CDS (BI CDS) Construction Scheme in Wireless Mesh Network (무선 메쉬 네트워크에서 최소 간섭과 최적의 주파수 대역폭을 이용한 CDS 구성)

  • Yang, Jun-Mo;Kim, Bo-Nam;Kim, Heung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.53-59
    • /
    • 2009
  • As a special type of Wireless Ad Hoc Networks, Wireless Mesh Networks (WMNs) have become the comer stone of research issues. Due to the limited operational environment of WMNs, an efficient connected dominating set (CDS) construction scheme is an important concern since it has been found extremely useful in broadcasting, routing and virtual backbone construction. In this paper, we propose a distributed Bandwidth-Interference aware CDS construction scheme to improve the network performance via two parameters such as node's number of neighbor and link bandwidth. Our CDS construction scheme selects the node that has more neighbors and enough bandwidth to support more end-devices in order to enhance overall network throughput and reliability. We confirm through simulations and show that our scheme constructs the CDS with the small subset of DS and the link that has better bandwidth.

Group Dynamic Source Routing Protocol for Wireless Mobile Ad Hoc Networks (무선 이동 애드 혹 네트워크를 위한 동적 그룹 소스 라우팅 프로토콜)

  • Kwak, Woon-Yong;Oh, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11A
    • /
    • pp.1034-1042
    • /
    • 2008
  • It is very hard, but important to sustain path stability for a reliable communication in mobile ad hoc networks. We propose a novel source routing protocol that establishes a group path with virtual multiple paths to enable a robust communication. The entire mobile nodes form a disjoint set of clusters: Each has its clusterhead as a cluster leader and a unique cluster label to identify itself from other clusters. A group path is a sequence of cluster labels instead of nodes and the nodes with the same label collaborate to deliver packets to a node with next label on the group path. We prove by resorting to simulation that our proposed protocol outperforms the existing key routing protocols, even for a network with a high node mobility and a high traffic.

3S: Scalable, Secure and Seamless Inter-Domain Mobility Management Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 3S를 고려한 도메인간 이동성관리 기법)

  • Kang, Min;Jeong, Jong-Pil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.99-114
    • /
    • 2012
  • Proxy Mobile IPv6 (PMIPv6) has received considerable attention between telecommunications and the Internet communities and does not require active participation of the Mobile Node (MN) by way of network-based mobility management. The PMIPv6 domain is studying establishment in progress to support extensively a number of MN by using a low handover latency. In this research, we are propose a novel 3S scheme for building Scalable and Secure and Seamless PMIPv6 domains. In the proposed scheme, all of Mobility Access Gateway (MAG) are acting as the Local Mobility Anchor (LMA) and composing a virtual ring with another MAG. General hashing is used in the efficient distribution-mapping between each MN and the MN's LMA of all MAGs. And, MAG and MN are authenticated using the symmetric key. Through mathematical analysis, we verifies the safety, scalability, and seamless service for 3S. Also, we're propose a handover procedure of 3S and show better than the existing schemes in terms of handover latency.

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.

A Reliable Route Selection Algorithm in Mobile Ad-hoc Networks (이동 애드혹 네트워크에서의 안정 경로 선택 알고리즘)

  • Kim, Won-Ik;Suh, Young-Joo;An, Syung-Og
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.314-323
    • /
    • 2002
  • The routing protocols designed for wired networks can hardly be used for mobile ad-hoc networks due to limited bandwidth of wireless transmission and unpredictable topological change. Recently, several routing protocols for mobile ad-hoc networks have been Proposed. However, when theme protocols are applied to support real time services like multimedia transmission, they still have problems in ad-hoc networks, where the topology changes drastically. In this paper, we propose a new route selection algorithm which selects the most reliable route that is impervious to route failures by topological changes by mobile hoots. For reliable route selection, the concept of virtual zone (stable zone and caution zone) is proposed. The zone is located in a mobile node'transmission range and determined by mobile node's mobility information received by Global Positioning System (GPS). The proposed algorithm is applied to the route discovery procedure of the existing on-demand routing protocol, AODV, and evaluated by simulation in various traffic conditions and mobility patterns.

Route-optimized Handoff in Mobile CORBA Environment (Mobile CORBA 환경에서 게이트웨이간의 경로최적화 핸드오프)

  • Shin, Hye-Ryung;Lee, Hyung-Woo;Kim, Ju-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.224-232
    • /
    • 2002
  • The routing protocols designed for wired networks can hardly be used for mobile ad-hoc networks due to limited bandwidth of wireless transmission and unpredictable topological change. Recently, several routing protocols for mobile ad-hoc networks have been proposed. However, when these protocols are applied to support real time services like multimedia transmission, they still have problems in ad-hoe networks, where the topology changes drastically. In this paper, we propose a new route selection algorithm which selects the most reliable rouse that is impervious to route failures by topological changes by mobile hosts. For reliable route selection, the concept of virtual zone (stable lone and caution zone) is proposed. The lone is located in a mobile node's transmission range and determined by mobile node's mobility information received by Global Positioning System (GPS). The proposed algorithm is applied to the route discovery procedure of the existing on-demand routing protocol, AODV, and evaluated by simulation in various traffic conditions and mobility patterns.

Design of Location and User Status Awareness Service Architecture Based on Opportunistic Computing with Ad-hoc Nodes (Ad-hoc 통신 노드를 이용한 기회 컴퓨팅형 위치인식 및 상황인지 서비스 구조 설계)

  • Kim, Tae-Hyon;Jo, Hyeong-Gon;Jeong, Seol-Young;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12B
    • /
    • pp.1199-1210
    • /
    • 2010
  • In recent years opportunistic computing has gained popularity in Ad-hoc network research area and it is highly required to research for actual services and related requirements. In this paper we summarized a virtual opportunistic service that is named "Children Care System" and proposed an Ad-hoc communication node (uMobile) that is connected with cellular phone and a sensor node (uClo) which is embedding into clothes. uMobile can support cellular phone communication and Ad-hoc communication and uClo can be embedded into clothes and recognize the user status using multiple sensors. In this paper we implemented the location awareness and user status awareness services using uMobile and uClo. We also tested them in indoor situation and showed the result. We expect that our research can play a significant role to inspire another various opportunistic computing services.

Cell-interleavd VC merging scheme for multipoint-to-multipoint communication in ATM network (ATM 망에서의 다자간 통신을 위한 cell-interleaved VC merging 기법)

  • 신상헌
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.9A
    • /
    • pp.1431-1440
    • /
    • 2000
  • In order to support efficiently the multimedia applications, such as virtual classroom, video conferencing and tele-medical, the efficient multipoint-to-multipoint(MP-to-MP) connection management function is essential. Shared tree is reported as the most useful method for this purpose. In this paper we propose a new MP-to-MP connection setup & management scheme, called CIMA(Cell Interleaved Multiplexing on ATM) scheme,which is a VC merging method for MP-to-MP communication using shared tree. In the CIMA scheme,MRM cell delivers the cell merging information to the next node. The receiving node can identfy cells which arrived through a channel using the same VPI/VCI by the merging information in the MRM cell. Therefore the CIMA scheme can solve easily the Cell Interleaving Problem(CIP) that happens in VC merging. We analyzed the overhead of the proposed CIMA by mathematical analysis,and simulated the buffer usage of CIMA with OPNET. As the result of analysis,we found that the CIMA scheme has acceptable merging overhead and doesn't cause the buffer scare problem.

  • PDF

Protecting Mobile Agent with VPN (VPN을 이용한 이동 에이전트의 보호)

  • 박재경;원유헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.3-12
    • /
    • 2001
  • In this course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies is private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is the use of mobile agents. The mobile agent is capable of migrating autonomously form node to node in the network, to perform some computations on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It does however, suffer. from a major drawback namely, the potential for malicious attacks, abuse of resources, pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describes the design of a secure mobile agent gateway 7hat can split and merge the agent code with security policy database on the VPN. This mechanism will promote security in the mobile agent systems.