• Title/Summary/Keyword: Ad Hoc Broadcasting

Search Result 131, Processing Time 0.036 seconds

Research on Unmanned Aerial Vehicle Mobility Model based on Reinforcement Learning (강화학습 기반 무인항공기 이동성 모델에 관한 연구)

  • Kyoung Hun Kim;Min Kyu Cho;Chang Young Park;Jeongho Kim;Soo Hyun Kim;Young Ghyu Sun;Jin Young Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.33-39
    • /
    • 2023
  • Recently, reinforcement learning has been used to improve the communication performance of flying ad-hoc networks (FANETs) and to design mobility models. Mobility model is a key factor for predicting and controlling the movement of unmmaned aerial vehicle (UAVs). In this paper, we designed and analyzed the performance of Q-learning with fourier basis function approximation and Deep-Q Network (DQN) models for optimal path finding in a three-dimensional virtual environment where UAVs operate. The experimental results show that the DQN model is more suitable for optimal path finding than the Q-learning model in a three-dimensional virtual environment.

Optimal Power Allocation of DOT Relay System with Fixed Branch Receiver (수신가지수가 고정되어있을 때 DOT 릴레이 시스템의 최적전력할당)

  • Hwang, Hwi-Jin;Kim, Nam-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.215-220
    • /
    • 2012
  • Recently, one of the research topics is wireless Ad-Hoc network minimizing power consumption because of limited power. We propose optimal power allocation scheme of each transmit node and derive performance analysis of system that recently designed Double opportunistic relay system which fixed branch receiver to use more than efficient power consumption. Optimal power location scheme is shown that outage probability has always better performance than equal power allocation. Furthermore, we are known that outage probability is minimized by increasing average transmit relays to obtain the diversity gain when average channel power gain is less.

Performance Analysis of Traffic Information Service Based on VANET (VANET기반 교통정보 서비스 방식 성능분석)

  • Kim, Dong-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.149-153
    • /
    • 2012
  • We propose a traffic information service for which traffic data are collected over ad-hoc networks from neighbor vehicles, processed to minimize the data size, and eventually provided to its destination. The proposed scheme simply relies on the existing navigtion systems in vehicles and wireless communication devices for vehicle-to-vehicle communication, rather than on a separately established server. It allows collecting and analyzing traffic status of large areas without incorporating separated monitoring systems, e.g., probe cars and enables to provide accurate traffic information to drivers in timely manner. We also evaluate its performance by ns-3 simulation.

Medium Access Control Protocol for Ad Hoc Networks Using Dynamic Contention Window (동적 경쟁윈도우를 이용한 Ad Hoc 망에서의 Medium Access Control 프로토콜)

  • Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.35-42
    • /
    • 2008
  • Since Bianchi's 2-D Markov Chain Model considers collision problem only in ideal channel condition, it does not reflect real channel impaired by fading, interference, and noise. Distributed Coordination Function(DCF) doubles its contention window(CW) when transmission fails regardless of collision or transmission error. Increase of CW caused by transmission error degrade throughput and increase the delay. In this paper, we present quantitative analysis of the impact of the parameters such as contention window size(CW), transmission probability for a given time slot(${\Im}$), transmission failure probability($p_f$), on the system performance and provide a method how to decrease the initial CW to achieve equivalent performance.

  • PDF

GEOP : A Security Aware Multipath Routing Protocol (GEOP : 보안 인식 다중경로 라우팅 프로토콜)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.151-157
    • /
    • 2010
  • Rapid technological advances in the area of micro electro-mechanical systems (MEMS) have spurred the development of small inexpensive sensors capable of intelligent sensing. A significant amount of research has been done in the area of connecting large numbers of these sensors to create robust and scalable Wireless Sensor Networks (WSNs). The resource scarcity, ad-hoc deployment, and immense scale of WSNs make secure communication a particularly challenging problem. Since the primary consideration for sensor networks is energy efficiency, security schemes must balance their security features against the communication and computational overhead required to implement them. In this paper, we combine location information and probability to create a new security aware multipath geographic routing protocol. The implemented result in network simulator (ns-2) showed that our protocol has a better performance under attacks.

An Anomaly Detection Method for the Security of VANETs (VANETs의 보안을 위한 비정상 행위 탐지 방법)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.77-83
    • /
    • 2010
  • Vehicular Ad Hoc Networks are self-organizing Peer-to-Peer networks that typically have highly mobile vehicle nodes, moving at high speeds, very short-lasting and unstable communication links. VANETs are formed without fixed infrastructure, central administration, and dedicated routing equipment, and network nodes are mobile, joining and leaving the network over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connect, without centralized control. In this paper, we propose a rough set based anomaly detection method that efficiently identify malicious behavior of vehicle node activities in these VANETs, and the performance of a proposed scheme is evaluated by a simulation in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.

Advanced On-Demand Multicast Routing Protocol For Multimedia Contents (멀티미디어 컨텐츠를 위하여 개선된 ODMRP)

  • Kim, Do-Yeon;Cho, Jin-Woong;Park, Sung-Kwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.13-19
    • /
    • 2008
  • A mobile ad-hoc network routing protocols for transmission of multimedia contents need to have low delay time and to maintain the established route because it should secure quality of service(QoS) of the network. In this paper, the proposed protocol, termed HODMRP (History-based On-Demand Multicast Routing Protocol), is enhanced On-Demand Multicast Routing Protocol (ODMRP) by adding the criterion which is the session history for establishing route. The characteristic of this protocol is that data can be transmitted using the redundant route which is already selected by session history, if it occurs that the route is broken, HODMRP have better Packet Delivery Ratio (PDR) value and lower delay time than ODMRP by the simulation results.

  • PDF

Performance Comparison of MISP-based MANET Strong DAD Protocol

  • Kim, Sang-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3449-3467
    • /
    • 2015
  • A broadcast operation is the fundamental transmission technique in mobile ad-hoc networks (MANETs). Because a broadcast operation can cause a broadcast storm, only selected forwarding nodes have the right to rebroadcast a broadcast message among the one-hop and two-hop neighboring nodes of a sender. This paper proposes the maximum intersection self-pruning (MISP) algorithm to minimize broadcasting redundancy. Herein, an example is given to help describe the main concept of MISP and upper bounds of forward node have been derived based on induction. A simulation conducted demonstrated that when conventional blind flooding (BF), self-pruning (SP), an optimized link state routing (OLSR) multipoint relay (MPR) set, and dominant pruning (DP), are replaced with the MISP in executing Strong duplicate address detection (DAD), the performances in terms of the energy consumption, upper bounds of the number of forward nodes, and message complexity have been improved. In addition, to evaluate the performance in reference to the link error probability, Pe, an enhancement was achieved by computing a proposed retransmission limit, S, for error recovery based on this probability. Retransmission limit control is critical for efficient energy consumption of MANET nodes operating with limited portable energy where Strong DAD reacts differently to link errors based on the operational procedures.

Performance Comparison of OLSR and AODV Routing Protocols Using OPNET (OPNET을 이용한 OLSR과 AODV 라우팅 프로토콜 성능 비교)

  • Wang, Ye;Zhang, Xiao-Lei;Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.9-17
    • /
    • 2009
  • A Mobile Ad hoc network(MANET) is a network consisting of a set of wireless mobile nodes, which communicate with each other without centralized control or established infrastructure. In this paper, to obtain a better understanding of AODV(Ad hoc On-Demand Distance Vector Routing Protocol)and OLSR(Optimized Link State Routing Protocol) routing protocols, different performances are simulated and analyzed using OPNET modeler 14.5 with the various performance metrics, such as packet delivery ratio, end-to-end delay and routing overhead. As a conclusion, in static analysis, the routing overhead of OLSR is affected by the number of nodes, but not data traffic. In AODV case, it is affected by both data traffic and number of nodes. In mobility analysis, routing overhead is not greatly affected by mobility speed in AODV and OLSR, and the PDR(Packet Delivery Ration) of OLSR is decreased as the node speed increased, while AODV is not changed. AS to delay, AODV is always higher than OLSR in both static and nobility cases.

  • PDF