• Title/Summary/Keyword: 애드 혹 라우팅

Search Result 338, Processing Time 0.025 seconds

Dynamic Routing Protocol for Low-power and Ad-hoc Networks (저전력 애드혹 네트워크를 위한 동적 라우팅 프로토콜)

  • Hwang, So-Young;Yu, Don-Hui
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.197-200
    • /
    • 2011
  • Many routing protocols have been proposed for low-power and ad-hoc networks where energy awareness and reliability are essential design issues. This paper proposes a dynamic routing protocol for low-power and ad-hoc networks. A dynamic path cost function is defined considering the constraints and characteristics of low-power and ad-hoc networks. The cost function can be applied flexibly depending on the characteristics of the networks. The performance of the proposed method is evaluated using a QualNet network simulator.

  • PDF

A Routing Protocol for Improving Path Stability in Mobile Ad-hoc Networks (애드혹 네트워크에서 경로 안정성 향상을 위한 라우팅 프로토콜)

  • Kim, Hyungjik;Choi, Sunwoong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1561-1567
    • /
    • 2015
  • Nodes of Mobile ad-hoc network usually use the energy-limited battery. Balanced energy consumptionis important to maintain path's stability. In this paper, we focus on improving the stability of the routing path in mobile ad-hoc networks. For that purpose, we propose a new routing protocol to find the highest minimum node residual energy path among shortest paths. The largest path of minimum value of the remain energy has a longer life than other paths to improve the reliability to data-transmission. Using ns-3 simulator, we show that the proposed routing protocol can provide more long-life stable routing path than AODV and EA-AODV.

Performance Improvement of Efficient Routing Protocol Based on Small End-to-End Sequence Numbers (작은 종단연결 순차번호를 이용한 효율적인 라우팅 프로토콜의 성능향상)

  • Kim, Jang-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1565-1570
    • /
    • 2014
  • In networking communication, nodes and base station send data to each nodes and destination nodes. In this perspective, it is very important to determine the direction in which data sent to each nodes or destination nodes. Ad-hoc routing protocol is a standard routing protocol that determines how the packets sent to destination. Ad-hoc routing protocol includes protocols such as Ad-hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR). In our efficient proposed protocol based on small end-to-end sequence numbers, route direction can be changed properly with the assistance of helper nodes. In this paper, we focus on the simulation analysis of proposed protocol and comparison with other routing protocol models such as AODV and DSR. We simulated using Network Simulator (NS-2) by parameters such as simulation time, number of nodes and packet size based on our metrics (packet delivery fraction, routing load, data throughput). Our proposed protocol based on small end-to-end sequence numbers shows better performance and superior to other two protocols.

Blind Detouring Problem in Geographic Routing for Wireless Ad-hoc Networks (무선 애드-혹 망을 위한 위치기반 라우팅에서의 맹목적 우회경로 결정문제)

  • Na, Jong-Keun;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.6
    • /
    • pp.428-437
    • /
    • 2006
  • Wireless ad-hoc routing has been extensively studied and many clever schemes have been proposed over the last several years. One class of ad-hoc routing is geographic routing where each intermediate node independently selects the next hop using the given location information of destination. Geographic routing, which eliminates the overhead of route request packet flooding, is scalable and suitable for large scale ad hoc networks. However, geographic routing may select the long detour paths when there are voids between a source and a destination. In this paper, we propose a novel geographic routing approach called Geographic Landmark Routing(GLR). GLR recursively discovers the intermediate nodes called landmarks and constructs sub-paths that connect the subsequent landmarks. Simulation results on various network topologies show that GLR significantly improves the performance of geographic routing.

Power Based Dynamic Clustering Scheme for Ad Hoc Networks (애드 혹 네트웍을 위한 전력 기반 동적 클러스터 구성 방법)

  • Lee, Jong-Ho;Youn, Hee-Yong;Lee, Hyung-Su;Jeon, Ki-Man
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.1209-1212
    • /
    • 2003
  • 애드 혹 네트웍(Ad Hoc Networks)은 유선 기반 망을 배제한 완전한 모바일 네트웍이다. 이동성이 큰 애드 혹 네트웍 노드간에는 경로 설정을 위해서 주기적으로 라우팅 패킷이 전송된다. 라우팅 방법은 소스 전송 요구에 따른 요구 기반 라우팅과 주기적으로 라우팅 테이블을 갱신하는 테이블 기반 라우팅으로 나누어진다. 또한, 이 두가지 방법을 혼합한 라우팅을 사용할 수 있는데, 기존의 연구에서 동등한 노드의 자원과 역할을 가정하기 때문에, 실제 네트웍에 적용하는데 한계가 있다. 본 논문에서는 클러스터를 이용한 라우팅 방법을 제안한다. 단순한 클러스터를 이용한 노드 관리는 클러스터 구성에 따른 관리 오버헤드가 발생하게 된다. 따라서 클러스터 구성 노드의 적정 수준을 유지하고, 전파 자원이 충분한 글러스터 선출 방법을 제안함으로써, 네트웍 전체의 관리 오버헤드를 줄일 수 있다. 시뮬레이션은 NS2 [12]를 이용하여, 시뮬레이션 시간동안 노드가 잔여 전력에 따라 클러스터 멤버의 수와 Hello Packet 의 주기를 변화 시킴으로써 노드의 생존성을 보장하고, 최적을 클러스터 구성할 수 있는 노드 수를 측정하였다.

  • PDF

Cross-Point Based Routing Protocol in Low Earth Orbit Communication Networks (저궤도 위성 통신망을 위한 교차지점 기반 라우팅 프로토콜)

  • Lee, Ye-Eun;Kim, Ki-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.72-74
    • /
    • 2021
  • 현재의 저궤도 위성 통신망은 일반적으로 지상기반 네트워크와 공중 기반 네트워크로 구성되지만 최근에는 위성들간의 애드 혹 네트워크 기술을 적용하고자 하는 연구가 진행중이다. 이러한 애드 혹 네트워크 구성의 핵심은 라우팅 프로토콜로써 본 논문에서는 송신자와 수신자 위성간의 교차지점을 활용한 라우팅 프로토콜을 제안한다. 제안된 방법은 시뮬레이션을 통하여 성능을 평가하였다.

A Joint Topology Discovery and Routing Protocol for Self-Organizing Hierarchical Ad Hoc Networks (자율구성 계층구조 애드혹 네트워크를 위한 상호 연동방식의 토폴로지 탐색 및 라우팅 프로토콜)

  • Yang Seomin;Lee Hyukjoon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.905-916
    • /
    • 2004
  • Self-organizing hierarchical ad hoc network (SOHAN) is a new ad-hoc network architecture designed to improve the scalability properties of conventional 'flat' ad hoc networks. This network architecture consists of three tiers of ad-hoc nodes, i.e.. access points, forwarding nodes and mobile nodes. This paper presents a topology discovery and routing protocol for the self-organization of SOHAN. We propose a cross-layer path metric based on link quality and MAC delay which plays a key role in producing an optimal cluster-based hierarchical topology with high throughput capacity. The topology discovery protocol provides the basis for routing which takes place in layer 2.5 using MAC addresses. The routing protocol is based on AODV with appropriate modifications to take advantage of the hierarchical topology and interact with the discovery protocol. Simulation results are presented which show the improved performance as well as scalability properties of SOHAN in terms of through-put capacity, end-to-end delay, packet delivery ratio and control overhead.

Secure Routing Mechanism using one-time digital signature in Ad-hoc Networks (애드혹 네트워크에서의 one-time 전자 서명을 이용한 라우팅 보안 메커니즘)

  • Pyeon, Hye-Jin;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.623-632
    • /
    • 2005
  • In ad-hoc network, there is no fixed infrastructure such as base stations or mobile switching centers. The security of ad-hoc network is more vulnerable than traditional networks because of the basic characteristics of ad-hoc network, and current muting protocols for ad-hoc networks allow many different types of attacks by malicious nodes. Malicious nodes can disrupt the correct functioning of a routing protocol by modifying routing information, by fabricating false routing information and by impersonating other nodes. We propose a routing suity mechanism based on one-time digital signature. In our proposal, we use one-time digital signatures based on one-way hash functions in order to limit or prevent attacks of malicious nodes. For the purpose of generating and keeping a large number of public key sets, we derive multiple sets of the keys from hash chains by repeated hashing of the public key elements in the first set. After that, each node publishes its own public keys, broadcasts routing message including one-time digital signature during route discovery and route setup. This mechanism provides authentication and message integrity and prevents attacks from malicious nodes. Simulation results indicate that our mechanism increases the routing overhead in a highly mobile environment, but provides great security in the route discovery process and increases the network efficiency.

Social-relation Aware Routing Protocol in Mobile Ad hoc Networks (이동 애드 혹 네트워크를 위한 사회적 관계 인식 라우팅 프로토콜)

  • An, Ji-Sun;Ko, Yang-Woo;Lee, Dong-Man
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.8
    • /
    • pp.798-802
    • /
    • 2008
  • In this paper, we consider mobile ad hoc network routing protocols with respect to content sharing applications. We show that by utilizing social relations among participants, our routing protocols can improve its performance and efficiency of caching. Moreover, in certain situation which we can anticipate pattern of user's content consumption, our scheme can help such applications be more efficient in terms of access time and network overhead. Using NS2 simulator, we compare our scheme to DSDV and routing protocol using shortest path algorithm.

Secure Routing Scheme in CCN-Based Mobile Ad-Hoc Networking Environments (CCN 기반 이동 애드혹 환경에서의 안전한 라우팅 방안)

  • Lee, Ju-Yong;Lee, Ji-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.304-308
    • /
    • 2014
  • As users generate lots of contents anytime and anywhere with an explosive growth of the number of mobile devices, Content centric networking (CCN) has emerged as a new networking architecture. However, the efficient CCN routing scheme is required for ad hoc network support because of its one to one message exchange characteristics. So, this paper proposes the new CCN ad hoc routing scheme using on-demand approach, which includes the secure routing configuration scheme based on multiple hash operation. It is shown from the simulation that the proposed method can provide lower control overhead because of its two-fold routing configuration architecture.