• Title/Summary/Keyword: Ad hoc 네트워크

Search Result 1,435, Processing Time 0.026 seconds

AODV Routing Algorithm Considering Successful Transmission Rate for QoS Support (전송성공률을 고려한 QoS보장 AODV 알고리즘)

  • Cho, Byeong Seok;Lee, Juhyeon;Park, Hyung-Kun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.741-742
    • /
    • 2013
  • AODV algorithm is one of the widely used algorithm for wireless ad-hoc environment In AODV, the destination node selects the route with smallest hop count. Since AODV only consider hop count, the selected route could have low capacity link, and degrade QoS. In this paper, we propose a modified AODV algorithm that consider successful transmission rate of each link. Advantage of proposed algorithm is that AODV can support QoS without significant change of the algorithm using modified hop count.

  • PDF

Routing Performance Improvement Based on Link State Prediction of Trajectory in Airborne Backbone Network (이동 궤적을 고려한 링크 상태 예측을 통한 공중 백본 네트워크 라우팅 성능 향상 방법)

  • Shin, Jin-Bae;Choi, Geun-Kyung;Roh, Byeong-Hee;Kang, Jin-Seok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.492-500
    • /
    • 2011
  • The airborne backbone network(ABN) provides communication transport services between airborne nodes, surface nodes and satellite nodes. Such ABN is generally constructed with wide-body and high-capacity planes such as AWACS, which can fly long-term along pre-defined flight paths. In this paper, we propose an efficient method to improve routing performances by reconfiguring routing path before link failure based on the prediction of link state with the information of pre-defined backbone nodes' trajectories. Since the proposed method does not need additional information exchange between airborne nodes in order to acknowledge the link failure, it can be effectively used for airborne backbone network with limited bandwidths.

Efficient Vehicle-Roadside Data Dissemination Algorithm for the Roadside Safety (도로안전을 위한 효율적인 차량-노변 데이터 배포 알고리즘)

  • Nam, Jaehyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.1015-1016
    • /
    • 2015
  • VANET is a technology for building a robust ad-hoc network between mobile vehicles as well as, between vehicles and RSU. Vehicles are moving and they only stay in the RSU area for a short time. When the number of requests is increased, an important challenge is to implement a suitable scheduling algorithm which serves as more requests as possible. $D^*S$ algorithm uses a priority weight, DS_Value, for selection of a request to get service. Priority weight is influenced only by deadline and data size parameters. We propose a packet scheduling using multilevel queue and show that using this idea leads to higher service ratio compare to previous algorithms.

  • PDF

A Sensing Data Collection Strategy in Software-Defined Mobile-Edge Vehicular Networks (SDMEVN) (소프트웨어 정의 모바일 에지 차량 네트워크(SDMEVN)의 센싱 데이터 수집 전략)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.62-65
    • /
    • 2018
  • This paper comes out with the study on sensing data collection strategy in a Software-Defined Mobile Edge vehicular networking. The two cooperative data dissemination are Direct Vehicular cloud mode and edge cell trajectory prediction decision mode. In direct vehicular cloud, the vehicle observe its neighboring vehicles and sets up vehicular cloud for cooperative sensing data collection, the data collection output can be transmitted from vehicles participating in the cooperative sensing data collection computation to the vehicle on which the sensing data collection request originate through V2V communication. The vehicle on which computation originate will reassemble the computation out-put and send to the closest RSU. The SDMEVN (Software Defined Mobile Edge Vehicular Network) Controller determines how much effort the sensing data collection request requires and calculates the number of RSUs required to support coverage of one RSU to the other. We set up a simulation scenario based on realistic traffic and communication features and demonstrate the scalability of the proposed solution.

  • PDF

Design of Mobile Phone Middleware based on Integrated Context Provisioning Strategy (통합 상황 프로비저닝 전략을 기반으로 한 모바일 폰 미들웨어의 설계)

  • Jeong, Hyun-Jin;Won, You-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.89-98
    • /
    • 2007
  • In these days, the use of context in application running on mobile devices such as PDAs and smart Phone has become a crucial requirement for several research areas, including ubiquitous computing. mobile computing. Previous middlewares which support context provisioning uses single strategy. But, this paper proposed middleware integrated multiple strategies for context provisioning, namely internal sensors-based, external infrastructure-based, and distributed provisioning in ad hoc networks. Applications can query needed context items using SQL like context query language and require context information to use different provisioning mechanisms depending on resource availability and presence of external infrastructures.

  • PDF

A MANET Routing Protocol using Address Autoconfiguration in Zone-based MANETs (존 기반 MANET에서의 주소 자동 설정 기술을 이용한 라우팅 프로토콜)

  • Park, Ik-Kyun;Kang, Nam-Hi;Kim, Young-Han
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.897-904
    • /
    • 2006
  • In large-scale MANETs, the performance of MANET routing protocols is degraded significantly. To avoid this, zone-based hierarchical architecture is proposed. In this architecture, single large-scale MANET is divided into multiple small-scale MANETs. In this paper, we propose autoconfiguration-coupled MANET routing protocol to reduce routing overhead of mim user nodes. If MANET routing protocol utilizes the autoconfigured information of each user node, its overhead or procedure can be reduced. Proposed method shows the degradation of routing overhead of user nodes via simulation.

Passive and Cost Effective People Indoor Location Tracking System for Ubiquitous Healthcare (유비쿼터스 헬스케어를 위한 저비용, 수동형 실내 위치추적 시스템)

  • Chung Wan-Young;Singh Vinay Kumar;Lim Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.430-433
    • /
    • 2006
  • Wireless sensor network plays a prominent role in tracking the location of the target outdoor and indoor. This paper describes the implementation of the passive indoor location tracking system using ultrasonic and RF technologies that provides accurate location in the form of user space and position in three dimensions. Our system used a combination of RF and ultrasonic technologies to provide a location-support service to users and applicants. Ceiling-mounted beacons were spread through the building, publishing location information on an RF signal. The person carried a listener and the listener determined the location by calculating the distance from three beacons using triangulation algorithm.

  • PDF

Passive and Cost Effective People Indoor Location Tracking System for Ubiquitous Healthcare (유비쿼터스 헬스케어를 위한 저비용, 수동형 실내 위치추적 시스템)

  • Chung Wan-Young;Singh Vinay Kumar;Lim Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1119-1123
    • /
    • 2006
  • Wireless sensor network plays a prominent role in tracking the location of the target outdoor or indoor. This paper describes the implementation of the passive indoor location tracking system using ultrasonic and RF technologies that provides accurate location in the form of user space and position in three dimensions. Our system used a combination of RF and ultrasonic technologies to provide a location-support service to users and applicants. Ceiling-mounted beacons were spread through the building, publishing location information on an RF signal. The person carried a listener and the listener determined the location by calculating the distance from three beacons using triangulation algorithm.

Self Updatable Pseudonym System for VANET (VANET를 위한 차량자체 갱신가능 익명ID 시스템)

  • Kim, Sang-Jin;Lee, Byeong-Woo;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.93-103
    • /
    • 2009
  • Since message forgery or alteration in VANET may cause severe consequences, authentication of critical messages must be provided. However, using normal digital signature may infringe privacy of drivers. Therefore, VANET requires authentication systems that provide conditional anonymity. In this paper, we propose a new authentication system for VANET. In our proposed system, each vehicle can update its pseudonym using re-encryption technique and digitally sign messages using representation problem on the pseudonym. By limiting the usage period, revocation of individual pseudonym is not required. Moreover, we also provide a way to revoke the vehicle itself. Secureness of our system partially rely on the usage of tamper-resistance hardware.

A Privacy Preserving Efficient Route Tracing Mechanism for VANET (VANET에서 프라이버시를 보호하는 효율적인 경로 추적 방법)

  • Lee, Byeong-Woo;Kim, Sang-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.53-62
    • /
    • 2010
  • In VANETs (Vehicular Ad hoc NETwork), conditional anonymity must be provided to protect privacy of vehicles while enabling authorities to identify misbehaving vehicles. To this end, previous systems provide a mechanism to revoke the anonymity of individual messages. In VANET, if we can trace the movement path of vehicles, it can be useful in determining the liability of vehicles in car accidents and crime investigations. Although route tracing can be provided using previous message revocation techniques, they violate privacy of other vehicles. In this paper, we provide a route tracing technique that protects privacy of vehicles that are not targeted. The proposed method can be employed independently of the authentication mechanism used and includes a mechanism to prevent authorities from abusing this new function.