• Title/Summary/Keyword: 플러딩

Search Result 193, Processing Time 0.018 seconds

Load Balancing Schemes in the MANET with Multiple Internet Gateways (다중 인터넷 게이트웨이를 갖는 MANET의 부하 균등화 기법)

  • Kim, Young-Min;Lim, Yu-Jin;Yu, Hyun;Lee, Jae-Hwoon;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.621-626
    • /
    • 2006
  • A mobile ad hoc network (MANET) is an infrastructureless network that supports multi-hop communication. For the MANET nodes wishing to communicate with nodes in the wired Internet, the global Internet connectivity is required and this functionality can be achieved with the help of the Internet gateway. For the support of reliability and flexibility, multiple Internet gateways can be provisioned for a MANET. In this case, load-balancing becomes one of the important issues since the network performance such as the network throughput can be improved if the loads of the gateways are well-balanced. In this paper, we categorize the load-balancing mechanisms and propose a new metric for load-balancing. Simulation results show that our proposed mechanism using the hop distance and the number of routing table entries as a load-balancing metric enhances the overall network throughput.

Schemes to Overcome ATM VC Switch Failures using Backup Virtual Paths (예비 가상 경로를 이용한 ATM VC 교환기 고장 우회 방법)

  • Yoo, Young-Hwan;Ahn, Sang-Hyun;Kim, Chong-Sang
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.2
    • /
    • pp.187-196
    • /
    • 2000
  • Failures in ATM networks can occur at virtual path (VP) links, virtual path switches, and virtual channel (VC) switches. Restoration schemes have been proposed for VP link and VP switch failures, however, none for VC switch failures. In general, VC switches are used for edge nodes in protection domains. Since even only one VC switch failure can cause a critical problem, new restoration schemes for VC switch failures are highly required. Restoration schemes at the VP level proposed so far can be categorized into those using the flooding algorithm and those using the backup virtual path (BVP) concept. Even though the latter cannot handle unpredictable failures, it has some advantages such as fast restoration and low spare capacity requirement. In this paper, we propose new restoration schemes using a new type of BVPs to handle VC switch failures. The simulation results show that the proposed schemes can restore virtual connection failures due to VC switch failures without degrading restorability for VP failures.

  • PDF

Improving Energy Consumption of Directed Diffusion with Mobile Sinks By Prefetching and Pruning (이동 싱크 환경에서 사전경로설정과 가지치기를 이용한 Directed Diffusion의 에너지 소모 개선)

  • Kim, Sung-Hoon;Lee, Sang-Mok;Yang, Hyun;Park, Chang-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.34-45
    • /
    • 2008
  • In dynamic wireless sensor networks where sources and sinks are moving or are created/died, control overheads for route establishment are increased and thus become one of the major factors for energy consumption. This study introduces prefetching and pruning for Directed Diffusion to remove redundant control messages. Prefetching collects path information for each event with "AnyEvent" in advance and gives quick responses without further flooding of requests. Pruning accumulates history information from previous requests and replies, and then stops forwarding a request towards where the event does not exist. Simulation results with ns show that it is possible to build implicit and soft infrastructures within a Directed Diffusion system through these active collection and passive accumulation and they improve energy consumption more as control overhead goes higher.

An Improved Route Recovery using Bidirectional Searching Method for Ad hoc Networks (Ad hoc 네트워크에서의 양방향 경로탐색을 이용한 경로복구 개선 방안)

  • Han, Ho-Yeon;Nam, Doo-Hee;Kim, Seung-Cheon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.35-41
    • /
    • 2010
  • Since the ad-hoc network allow nodes to communicate each other without infrastructure system and predefined configuration, it comes into the spotlight that is suitable to ubiquitous society. In ad-hoc network, route recovery mechanism is considered important. Normally route recovery is needed to solve the link failure problem because there is no route maintaining system like a router in ad-hoc networks. In this paper we propose BS-AODV(Bidirectional Searching-AODV) route recovery method. The proposed method is a local repair method that can be applied in all of the network area. Unlike a limited local repair method in AODV. the proposed method adopts the bidirectional searching method where the upstream/downstream nodes can send the route maintenance messages. Restricting the flooding of route request messages, the proposed scheme attempts to minimize the costs of local repair, the performance of the proposed scheme is evaluated through the simulations. In two scenarios which variate the node numbers and node speed, the comparison among the proposed scheme, AODV and AOMDV is shown in terms of the control traffic and data delivery ratio.

A Countermeasure Scheme Based on Whitelist using Bloom Filter against SIP DDoS Attacks (블룸필터를 사용한 화이트리스트 기반의 SIP 서버스 거부 공격 대응 기법)

  • Kim, Ju-Wan;Ryu, Jea-Tek;Ryu, Ki-Yeol;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1297-1304
    • /
    • 2011
  • SIP(Session Initiation Protocol) has some security vulnerability because it works on the Internet. Therefore, the proxy server can be affected by the flooding attack such as DoS and service interruption. However, traditional schemes to corresponding Denial of Service attacks have some limitation. These schemes have high complexity and cannot protect to the variety of Denial of Service attack. In this paper, we newly define the normal user who makes a normal session observed by verifier module. Our method provides continuous service to the normal users in the various situations of Denial of Service attack as constructing a whitelist using normal user information. Various types of attack/normal traffic are modeled by using OPNET simulator to verify our scheme. The simulation results show that our proposed scheme can prevent DoS attack and achieve a low false rate and fast searching time.

A Directional Route Discovery Protocol in Ad Hoc Multi-Hop Cellular Networks (Ad-hoc Multihop Cellular Network 에서의 방향성 Route Discovery 프로토콜)

  • Park, Yong-Suk
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.9
    • /
    • pp.8-15
    • /
    • 2009
  • Although traditional single-hop cellular networks had been serving well in past years, they are no longer economically feasible in supporting high data-rate, multimedia services of $4^{th}$Generation (4G) communications due to the requirement of high transmission power By contrast, multi-hop cellular networks (MCN) are capable of dramatically saving the transmission power by overlaying the capability of ad hoc networking among mobile terminals on the cellular network infrastructure. To achieve this performance gain as well as enable 4G services, an efficient routing protocol needs to be designed for MCN. In this paper, we propose a reactive route discovery protocol for MCN that uses directional information to the base station in the route discovery process. Our analysis/simulation results have demonstrated that the proposed protocol significantly reduces flooding overheads. In addition, we consider issues for 4G services in MCN and applications of the proposed protocol.

Local Repair Routing Algorithm using Link Breakage Prediction in Mobile Ad Hoc Networks (모바일 애드 혹 네트워크에서 링크 단절 예측을 사용한 지역 수정 라우팅 알고리즘)

  • Yoo, Dae-Hun;Choi, Woong-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1173-1181
    • /
    • 2007
  • A number of routing algorithms have been studied for wireless mobile ad-hoc network. Among them, the AODV routing algorithm with on-demand method periodically transmits hello message and monitors link state during data transmission in order to maintain routing paths. When a path is disconnected, a node that senses it transmits a RERR packet to the transmitting node or transmits a RREQ locally so that the path could be repaired. With that, the control packet such as a RREQ is broadcast, which causes the consumption of bandwidth and incurs data latency. This paper proposes a LRRLBP algorithm that locally repairs a path by predicting link state before disconnecting the path based on the AODV routing protocol for solving such problems. Intensive simulations with the results using NS-2 simulator are shown for verifying the proposed protocol.

QoS-Aware Bounded Flooding RWA Algorithm in the Next Generation Optical Internet based on DWDM Networks (DWDM기반의 차세대 광인터넷에서 QoS 기반의 제한적 플러딩 RWA 알고리즘에 관한 연구)

  • Kim Yong-Seong;Lee Jae-Dong;Hwang Jin-Ho;Woo Chong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.8 s.350
    • /
    • pp.1-14
    • /
    • 2006
  • Multi-constraint QoS routing has been seen as crucial network property in the next generation optical Internet based on DWDM Networks. This paper proposes a new QoS routing algorithm based on flooding method, called bounded flooding routing (BFR) algorithm which can meet multi-constraint QoS requirements. Primarily, the BFR algorithm tries to reduce network overhead by accomplishing bounded-flooding to meet QoS requirements, and improve blocking probability and wavelength utilization. Also, as one effort to improve routing performance, we introduce a new concept, ripple count, which does not need any link-state information and computational process. For extensive analysis and simulation study, as a critical concern, in DWDM-based networks we deploy limited wavelength conversion capability within DWDM nodes. And the simulation results demonstrate that the BFR algorithm is superior to other predominant routing algorithms (both original flooding method and source-directed methods) in terms of blocking probability, wavelength channels required and overhead.

An Energy-Efficient Protocol For Detecting Injurious Insect in Wireless Bio Sensor Networks (무선 바이오센서 네트워크에서 에너지 효율을 고려한 해충 감지 시스템을 구축하기 위한 프로토콜)

  • Yoo, Dae Hyun;Lee, Joo Sang;An, Beongku;Kim, Nam-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.29-34
    • /
    • 2008
  • In this paper, we proposed a system protocol for detecting injurious insect to support energy saving transmission in wireless bio sensor networks. The main ideas and features of the system are as follows. First, the route establishment method which is based on the energy efficiency and stability by using time-division tree structure. Second, multi-hop direction-based data gatering structure. In this structure, the selected fading method is used to transmit packet via the established tree structure for supporting power saving and route lifetime efficiently. Finally, we can get the node power saving and reduce transmission delay, thus network lifetime and efficiency are improved. The performance evaluation of the proposed protocol is via OPNET(Optimized Network Engineering Tool).

  • PDF

A Closed Counter-Current Two-Phase Thermosyphon Loop of a Cold Neutron Source in HANARO Research Reactor (하나로 원자로에 설치될 대향 이상 열사이펀 루프에 관한 실험)

  • Hwang, Kwon-Sang;Cho, Man-Soon;Sung, Hyung-Jin
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.24 no.8
    • /
    • pp.1038-1045
    • /
    • 2000
  • An experimental study was carried out to delineate the flow characteristics in a closed countescurrent two-phase thermo syphon with concentric tubes. This is to be installed in the HANARO research reactor as a part of a Cold Neutron Source(CNS). In the present investigation, experiments ata room temperature with Freon-II3 as a moderator were performed. Results show that, based on the magnitude of pressure fluctuation, the flow regimes could be divided into 4 distinct ones in the ($V_f,\;Q_i$) plane, where $V_f$ represents the volume of the charged liquid and $Q_i$ the heat load: a stable flow regime, an oscillatory flow regime, a restablized flow regime and a dryout flow regime. For $V_f$>2.5l, the flow is stable at low $Q_i$. However, as $Q_i$ increases, the flow becomes oscillatory and finally restablizes As $V_f$ increases, the oscillation amplitude decreases, reaching to the restablized flow region at low $Q_i$, and the liquid level in the moderator cell remains high. In the oscillatory flow regimes, for a fixed VI; the oscillating period of time varies with $Q_i$, having a minimum value at a certain value of $Q_i$. The heat load, where the oscillating period of time is minimum, decreases as $V_f$ increases.