• Title/Summary/Keyword: 플러딩

Search Result 193, Processing Time 0.021 seconds

An Adaptive Flooding Scheme based on local density for Ad hoc Networks (애드 혹 네트워크에서 지역 밀집도에 적응적인 확률적 플러딩 기법)

  • Kim Jeong-sahm;Ryu Jeoung-pil;Han Ki-Jun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.9 s.339
    • /
    • pp.11-18
    • /
    • 2005
  • In ad hoc networks, many applications use the broadcast service that is elementary operation to support various important functions such as route discovery procedure. This paper presents several adaptive probabilistic broadcast schemes base on local information to alleviate the broadcast storm problem for wireless ad hoc network. Our schemes dynamically determine the rebroadcast probability at each node based on the neighbor information within two-hop span. Simulation results are presented, which show our schemes have a better performance over the deterministic flooding approach.

Cluster Group Multicast by Weighted Clustering Algorithm in Mobile Ad-hoc Networks (이동 에드-혹 네트워크에서 조합 가중치 클러스터링 알고리즘에 의한 클러스터 그룹 멀티캐스트)

  • 박양재;이정현
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.3
    • /
    • pp.37-45
    • /
    • 2004
  • In this paper we propose Clustered Group Multicast by Clustering Algorithm in Wireless Mobile Ad-hoc Network. The proposed scheme applies to Weighted Cluster Algorithm Ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or reliable support services such as wired network and base station. In ad hoc network muting protocol because of limited bandwidth and high mobility robust, simple and energy consume minimal. WCGM method uses a base structure founded on combination weighted value and applies combination weight value to cluster header keeping data transmission by seeped flooding, which is the advantage of the exiting FGMP method. Because this method has safe and reliable data transmission, it shows the effect to decrease both overhead to preserve transmission structure and overhead for data transmission.

Distributed Multi-Hop Multicast Transmission Scheme for Low-Power and Low-Complexity Wireless Devices (저 전력 저 복잡도 무선 기기를 위한 분산적인 다중 홉 멀티 캐스트 중계 기법)

  • Ko, Byung Hoon;Jeon, Ki-Jun;Lee, Seong Ro;Kim, Kwang Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.931-937
    • /
    • 2015
  • Distributed relay scheme for wireless ad hoc multi-hop multicast network composed of low-power and low-complexity wireless devices with high density is proposed. The proposed relay scheme is shown to be better than flooding, which is the distributed relay scheme applied to ZigBee, in the outage probability and the multicast transmission rate by simulations.

Distributed Multi-Hop Relay Scheme to Reduce Delay-Constrained Broadcast Outage Probability (전달 시간 제한이 있는 브로드캐스트 아웃티지 확률을 감소시키는 분산적인 다중 홉 중계 기법)

  • Ko, Byung Hoon;Byun, Ilmu;Rhee, Duho;Jeon, Ki Jun;Kim, Beom Mu;Lee, Seong Ro;Kim, Kwang Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.219-226
    • /
    • 2013
  • Distributed multi-hop relay scheme to reduce delay-constrained outage probability for broadcast network is proposed. We consider multi-hop relay scheme, which is similar to distributed beamforming, where multiple nodes simultaneously relay packets, and we propose channel access control and power control for relaying nodes to satisfy energy constraint. Compared with flooding which is multi-hop relay scheme used for ZigBee, the proposed scheme is better in terms of outage probability and average reception throughput.

Traceback Technique using Table-based Route Management under Mobile Ad Hoc Network Environment (Mobile Ad Hoc Network에서 테이블 기반 경로 관리를 이용한 역추적 기법)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.19-24
    • /
    • 2013
  • MANET has a highly dynamic topology because it consists of only mobile nodes. Various attacks using these characteristics exist. Among them, damage of the attacks based flooding such as DoS or DDos is large and traceback of the attack node is not easy. It is because route information by moving of intermediate nodes which pass the data changes frequently. In this paper, we propose table-based traceback technique to perform efficient traceback although route information by moving of nodes changes frequently. Cluster head manages route management table in order to form cluster status table and network topology snapshot for storing the location information of mobile nodes when cluster member nodes change. Also, bloom filter is used to reduce the amount of storing route information. The performance of the proposed technique is confirmed through experiment.

Fuzzy Logic based Propagation Limiting Method for message routing in Wireless Sensor Networks (무선 센서 네트워크에서 메시지 라우팅을 위한 퍼지로직 기반의 전달 영역 제한 기법)

  • Chi, Sang-Hoon;Cho, Tae-Ho
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.8-12
    • /
    • 2005
  • 최근 마이크로 센서와 무선 통신 기술의 진보는 센서 네트워크의 발전을 가능하게 하였다. 이와 같은 사실은 무선 센서 네트워크를 위한 수많은 라우팅 프로토콜의 개발로 이어졌으며, 다양한 구조의 알고리즘들이 제안되었다. 특히, 디렉티드 디퓨젼(Directed Diffusion; DD)은 데이터 중심 기반의 라우팅 알고리즘으로 속성 칼 쌍을 이용하여 통신하는 센서 네트워크의 한 패러다임이라고 할 수 있다. 그러나 기존의 DD에서는 작업을 요청하는 질의 메시지(interest message)가 전체 센서 네트워크에 플러딩(flooding)되는데, 이러한 과정은 에너지 소비 측면에서 볼 때 매우 비효율적이라고 할 수 있다. 이와 같은 문제를 해결하기 위하여 본 논문에서는 센서 노드의 에너지와 밀도 정보를 고려한 임계값을 이용하여 데이터의 전송 지역을 제한함으로서, 네트워크의 에너지 소비를 줄일 수 있는 새로운 메시지 전달영역 제한기법(propagation limiting method; PLM)을 제안한다. 퍼지 규칙 기반 시스템은 센서 필드에 배치된 노드들의 에너지와 밀도 정보를 입력 파라미터로 사용하여 메시지 라우팅을 위한 임계값 결정에 사용된다 본 연구에서 제안된 기법을 사용하여 센서 네트워크의 에너지 소비를 실험한 결과 기존에 제안되었던 알고리즘들에 비해 상대적으로 높은 효율성을 나타내었으며, 전체적으로 네트워크의 수명도 연장할 수 있었다.

  • PDF

A Study on the Heat Transport Limitations of a PFC(FC-72) Two-Phase Closed Thermosyphon for Cooling Power Semiconductors (전력변환 반도체 냉각용 PFC(FC-72) 밀폐형 2상 열사이폰의 열전달 한계에 관한 연구)

  • 박용주;홍성은;김철주
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.14 no.9
    • /
    • pp.725-733
    • /
    • 2002
  • In this study, the heat transport limitations of a two-phase closed thermosyphon were investigated. For the test, a two-phase closed thermosyphon ($L_t/: 600 mm,\;L_e:105mm,\;L_a:75mm,\;L_c:420mm,\;D_o:22.2mm,$ container: copper (inner grooved surface), working fluid: PFC ($C_6F_14$) was fabricated with a reservoir that can change the fill charge ratio. The following was imposed as the factors on the heat transport limitations of a two-phase closed thermosyphon. 1) Fill charge ratio of the working fluid. 2) Tilt angle of the longitudinal axis. From tile experimental data, some results were obtained as follows. When the fill charge ratio was relatively small ($\psi$20%), the heat transport limitation occurred about 100W by dry-out limitation. However over 40%, it shelved nearly constant value (500 W) by flooding limitation. The heat transport limitation according to the tilt angle increased smoothly until the tilt angle was $60^{\circ}$,/TEX>, after then decreased slowly.

Packet Replacement Technique for Securing Anonymity in P2P Network (P2P 네트워크에서 익명성 보장을 위한 패킷 대치 기법)

  • Kim Byung Ryong;Kim Ki Chang
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.331-338
    • /
    • 2005
  • Flooding based P2P system basically provides anonymity and under the anonymity circumstances user and provider exchange information. Most of packets transferred from node to node do not contain identity information on node that sent packet. And these packets are transmitted to the destination through the routing systems dynamically composed of intermediate nodes. Therefore it is impossible to know who transmitted it for the first and who the designated recipient is. But since downloading and uploading host's IP address is exposed it does not provide anonymity. This study introduces techniques to provide anonymity for protecting identification of users and resource Providers by replacing QueryHit Packets in systems where anonymity can cause trouble.

A Clustering Mechanism based on Vehicle Local Information in the Vehicular Ad Hoc Network (차량 애드혹 네트워크에서 차량 자체 정보를 기반으로 한 클러스터링 기법)

  • Ahn, Sang-Hyun;Lim, Yu-Jin
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.445-450
    • /
    • 2011
  • In the vehicular ad hoc network environment, the clustering mechanism is one of the efficient mechanisms to deliver broadcast messages. Most clustering mechanisms require message exchanges between vehicles to build stable clusters, which causes overhead. In order to reduce this overhead, CF-IVC [1] proposes the mechanism to construct clusters based on the vehicle speed. However, since CF-IVC does not consider the road traffic condition and the driver's behavior, it may result in inefficient clusters. Therefore, in this paper, we propose a mechanism to establish efficient clusters based on the vehicle local information with considering the road maximum speed limit and the road traffic condition. The performance of the proposed mechanism is validated by comparing with those of the simple flooding and CF-IVC through NS-2 simulations.

An Enhanced Dynamic Switching-based Flooding scheme in Low-Duty-Cycled WSNs with unreliable links (비신뢰성 링크를 가진 로우 듀티사이클 무선센서네트워크 환경에서 향상된 동적 스위칭 기반 플러딩 방법)

  • Nguyen, Dung T.;Le-Thi, Kim-Tuyen;Yeum, Sanggil;Kim, Dongsoo;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.216-217
    • /
    • 2015
  • Duty-cycling could efficiently prolong the life time of Wireless Sensor Networks (WSNs) by let nodes be in dormant state most of the time, and only wake up (for sending or receiving) for a very short period. Flooding is one critical operation of WSNs. Many studies have been studied to improve the delay and/or energy efficiency of flooding. In this paper, we propose a novel time slot design, and the switching decision that reduce energy consumption for the schedule-based flooding tree. Each node, if failed to receive from its parent, will look for other candidate, among its siblings to overhear the flooding packet. By accurately collect information from other siblings, each node can make the best as possible switching decision; therefore the energy efficiency of the network is improved.