• Title/Summary/Keyword: 플러딩

Search Result 193, Processing Time 0.025 seconds

A Study on the Performance Enhancements of Location Aided Routing in Mobile Ad-hoc Networks (Mobile Ad-hoc Networks에서 위치기반라우팅의 성능 개선에 관한 연구)

  • Kim, Young-Beom
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.3
    • /
    • pp.486-490
    • /
    • 2007
  • Recently, there have been active research efforts on devising efficient routing algorithms utilizing location information in ad-hoc mobile networks. In this paper, we propose a new method to improve the performance of the widely recognized Location Aided Routing (LAR) algorithm. To this end, we suggest the concept of accessible zone combined with the basic two schemes associated with LAR algorithm. Through the proposed algorithm, we can confine the flooding area within accessible zone, thereby reducing the routing delay.

Low-cost Localization using 2-hop Distance Anchors in Wireless Sensor Networks (무선센서네트워크에서 2 홉 거리 앵커노드를 이용한 분산 위치 측정)

  • Kim, Taeyoung;Bae, Dongju;Shon, Minhan;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.533-534
    • /
    • 2009
  • 무선센서네트워크에서 많은 응용 프로그램들이 센서노드들의 위치 정보를 기반하기 때문에 센서노드에 대한 위치 측정은 매우 중요하다. 본 논문은 위치 정보를 알고 있는 소수의 앵커노드들을 사용하여 위치 측정 정확도를 높이고 주어진 위치 정보 메시지의 교환 비용을 줄이는 분산 위치 측정 기법인 Low-cost Localization using 2-hop Distance Anchors (LLTA)를 제안한다. LLTA는 높은 위치 측정 정확도를 위해 각각의 센서노드로부터 2 홉 거리 이내의 센서노드들의 위치 정보를 모으는 2-홉플러딩을 사용한다. 또한 2-홉 플러딩을 통해 얻은 위치 정보를 이용하여 센서노드가 위치할 수 있는 지역을 계산한 후 그리드 스캔 알고리즘을 사용하여 센서노드의 더 정확한 위치를 계산한다. 시뮬레이션 결과를 통해 LLTA가 기존의 위치 측정 기법들보다 위치 측정 정확도가 더 높고, 위치 정보 전달 비용이 더 낮음을 보인다.

An Emergency Message Propagation Method with Stem and Branch Structure for Vehicle Safety Communication (차량안전통신을 위한 줄기와 가지 구조를 이용한 긴급 메시지 전파 방법)

  • Yu, Suk-Dea;Cho, Gi-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2A
    • /
    • pp.203-212
    • /
    • 2007
  • An advanced vehicle safety system can be constructed by exchanging danger-related information ,such as urgency stop, traffic accident, obstacle, and car trouble, among the vehicles. However, because network topology changes rapidly and frequently due to the mobility of vehicles, it is impossible to configure the network for information forwarding in this environment. In the most of vehicle safety communication applications, an emergency message is propagated in a form of broadcasting. The simple broadcasting causes a lot of problems in terms of efficiency due to multi-hop area and radio collision problem. This paper proposes a method of selective message forwarding with stem and branch structure for propagating the emergency messages. However, the proposed method raise the efficiency of message transmission with the selective forwarding based on the priority assignment as its location. We analyze and evaluate the performance by comparing the proposed scheme with other schemes that are presented in the paper.

A Study on a Robust Clustered Group Multicast in Ad-hoc Networks (에드-혹 네트워크에서 신뢰성 있는 클러스터 기반 그룹 멀티캐스트 방식에 관한 연구)

  • Park, Yang-Jae;Lee, Jeong-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.163-170
    • /
    • 2003
  • In this paper we propose a robust clustered croup Multicast in Ad-hoc network. The proposed scheme applies to weighted clustered Algorithm. Ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or reliable support services such as wired network and base station. In ad hoc network routing protocol because of limited bandwidth and high mobility robust, simple and energy consume minimal. WCGM method uses a base structure founded on combination weighted value and applies combination weight value to cluster header keeping data transmission by scoped flooding, which is the advantage of the exiting FGMP method. Because this method has safe and reliable data transmission, it shows the effect to decrease both overhead to preserve transmission structure and overhead for data transmission.

Numerical Simulation of Water Transport in a Gas Diffusion Layer with Microchannels in PEMFC (마이크로채널이 적용된 고분자 전해질 연료전지 가스확산층의 물 이송에 대한 전산해석 연구)

  • Woo, Ahyoung;Cha, Dowon;Kim, Bosung;Kim, Yongchan
    • Journal of the Korean Electrochemical Society
    • /
    • v.16 no.1
    • /
    • pp.39-45
    • /
    • 2013
  • The water management is one of the key issues in low operating temperature proton exchange membrane fuel cells (PEMFCs). The gas diffusion layer (GDL) allows the reactant gases flow to the reaction sites of the catalyst layer (CL). At high current density, generated water forms droplets because the normal operating temperature is $60{\sim}80^{\circ}C$. If liquid water is not evacuated properly, the pores in the GDL will be blocked and the performance will be reduced severely. In this study, the microchannel GDL was proposed to solve the flooding problem. The liquid water transport through 3-D constructed conventional GDL and microchannel GDL was analyzed varying air velocity, water velocity, and contact angle. The simulation results showed that the liquid water was evacuated rapidly through the microchannel GDL because of the lower flow resistance. Therefore, the microchannel GDL was efficient to remove liquid water in the GDL and gas channels.

A Study of Client Side Defence Method of UDP/ICMP Attack (UDP/ICMP 플러딩 공격에 대한 클라이언트 측 방어 기법 연구)

  • Kim, Dong-Hoon;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.667-669
    • /
    • 2012
  • Traditional DDoS defence methods are performed at server side which was attacked. If servers detect DDoS attack, they use some methods for defending the attack such as increasing the bandwidth, bypassing the traffic, blocking the IP addresses or blocking the ports by the firewall. But as lots of people use smart-phones, it is possible a smart-phone to be a zombie and DDoS attack could be much more a huge and powerful forms than now. Victims are not only a server but also a host which becomes a zombie. While it performs DDoS attack, zombie smart-phone users have to pay the extra charge. After finish the attack, DDoS try to destroy hard drives of zombie hosts. Therefore the situation is changed rather than to defend DDoS server side only, we should protect a client side who needs to prevent DDoS attacks. In this paper, we study a defence method that we terminates a process which perform the attack, send the information to different hosts when a zombie PC or smart-phone perform DDoS attacks.

  • PDF

Hybrid Routing protocol for Energy Efficiency in Wireless Sensor Networks (무선센서네트워크에서 에너지 효율을 위한 혼합적 라우팅 프로토콜)

  • Kim, Jin-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.363-368
    • /
    • 2012
  • The Cluster-based routing protocol is consumed the energy consumption efficiently, but there are many isolated nodes while clustering, so these are impeding energy efficiency. Hop-by-hop based routing protocol is suitable large-scaled network or dynamic environment. However, with the periodic flooding signal and rapid energy loss of near sink nodes, the network life time become shorter. In this paper, We propose the hybrid routing protocol that combine the cluster based routing method for energy efficiency of nodes and hop-by-hop method for re-joining the isolated nodes and load balance of nodes in the near cluster using fibonacci sequence. Based on the analysis, it is proved that the hybrid routing protocol provided higher energy efficiency and less the isolated nodes than previous methods.

Hybrid Multipath Routing in Mobile Ad Hoc Networks (MANET환경에서 적용 가능한 복합적 다중 라우팅 기술)

  • Ninh, Khanhchi;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.2
    • /
    • pp.49-56
    • /
    • 2011
  • One of the most important VANET applications is providing active safety by broadcasting emergency messages. In order to prevent broadcast storm of flooding-based broadcasting scheme in which any node receiving message will rebroadcast, the existing protocols use the different methods to limit the number of relay nodes. Nevertheless, the existing protocols have low delivery ratio with high traffic density and cause message overhead. Currently, the dramatic increase in the number of vehicles equipped with Global Positioning System (GPS) and onboard radar created new application scenarios that were not feasible before. Consequently, we proposed a broadcasting protocol that selects relay node by using GPS-based position information and detecting neighboring vehicles with the help of onboard radar to. Simulation results show that our proposed protocol has better performance than the existing schemes.

Location Service and Data Dissemination Protocol for Mobile Sink Groups in Wireless Sensor Networks (무선 센서 네트워크에서 이동 싱크 그룹을 위한 위치 서비스와 데이터 전송 프로토콜)

  • Yoon, Min;Lee, Euisin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1431-1439
    • /
    • 2016
  • In this paper, we propose a new location service and location-based routing for data dissemination from a source to a mobile group sink in less energy consumption of the sensor node. Unlike the existing protocols, the proposed protocol uses a leader sink instead of a group area as the location information to represent a mobile sink group. The proposed protocol also uses grid leaders on virtual grid structure to support sink mobility in location service. By using a leader sink as a representative and grid leaders for mobility supporting, the proposed protocol can exploit an efficient hierarchical location service and data dissemination method without using flooding. Accordingly, the proposed protocol carries out upper layer location services and data dissemination between a leader sink and a source and lower layer location services and data dissemination between the leader sink and member sinks. Simulation results demonstrate that the proposed protocol achieves energy-efficiency.

A RealTime DNS Query Analysis System based On the Web (웹 기반 실시간 DNS 질의 분석 시스템)

  • Jang, Sang-Dong
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.279-285
    • /
    • 2015
  • In this paper, we present the design and implementation of a realtime DNS Query Analysis System to detect and to protect from DNS attacks. The proposed system uses mirroring to collect data in DMZ, then analizes the collected data. As a result of the analysis, if the proposed system finds attack information, the information is used as a filtering information of firewall. statistic of the collected data is viewed as a realtime monitoring information on the web. To verify the effictiveness of the proposed system, we have built the proposed system and conducted some experiments. As the result, Our proposed system can be used effectively to defend DNS spoofing, DNS flooding attack, DNS amplification attack, can prevent interior network's attackers from attacking and provides realtime DNS query statistic information and geographic information for monitoring DNS query using GeoIP API and Google API. It can be useful information for ICT convergence and the future work.