• Title/Summary/Keyword: Cooperative protocol

Search Result 222, Processing Time 0.025 seconds

Comparison Study of Helper Node Selection Schemes of Cooperative Communications at Ad Hoc Networks (애드혹 네트워크에서 협력통신을 위한 도움노드 선정방법 비교연구)

  • Jang, Jae-Shin
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.2
    • /
    • pp.69-78
    • /
    • 2012
  • In this paper, a study on finding an appropriate helper node that can help increase effective frame transmission rate for cooperative communications at ad hoc networks is carried out. Those researches from reference use the reactive helper node selection mechanism which starts its role after exchanging RTS and CTS frames between source and destination nodes, and are implemented into our simulator for performance comparison. System throughput and average channel access delay are used for performance measures and all communicating nodes are assumed to move independently within the communication range. It is anticipated that this research result can be used as basic information for designing a new efficient helper node selection scheme.

Performance Analysis of Fading Avoidance Scheme using Cooperative Spectrum Sensing Technique (협력 스펙트럼 감지 기법을 이용한 페이딩 회피 방안에 대한 성능 분석)

  • Kim, Tae-Wook;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.61-65
    • /
    • 2014
  • In this paper, we propose a method using cooperative spectrum sensing to avoid multipath and frequency selective fading. One of methods in conventional scheme was multi input multi output (MIMO) solution. However, in the wireless environment, mobile device hardly supports multi antenna because of limitation of hardware. Motivated from above problems, the proposed method provides the information of excellent channel to transmitter. As a result, quality of service (QoS) required by users can be satisfied. Finally, performance of the proposed protocol is analyzed in term of bit error rate (BER).

A Study on Detection Improvement Technique of Black Hole Node in Ad Hoc Network (Ad Hoc Network에서 블랙 홀 노드 탐지 향상 기법에 관한 연구)

  • Yang, HwanSeok;Yoo, SeungJae
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.11-16
    • /
    • 2013
  • Mobile node must move optionally and perform the router and the host functions at the same time. These characteristics of nodes have become a potential threatening element of a variety of attacks. In particular, a black hole which malicious node causes packet loss among them is one of the most important issues. In this paper, we propose distributed detection technique using monitoring tables in all node and cooperative detection technique based cluster for an efficient detection of black hole attack. The proposed technique performs by dividing into local detection and cooperative detection process which is composed of process of step 4 in order to improve the accuracy of the attack detection. Cluster head uses a black hole list to cooperative detection. The performance of the proposed technique was evaluated using ns-2 simulator and its excellent performance could be confirmed in the experiment result.

On Relationship between Safety and Liveness of Election Problem in Asynchronous Distributed Systems

  • Park, Sung-Hoon
    • International Journal of Contents
    • /
    • v.7 no.4
    • /
    • pp.30-34
    • /
    • 2011
  • A Leader is a Coordinator that supports a set of processes to cooperate a given task. This concept is used in several domains such as distributed systems, parallelism and cooperative support for cooperative work. In completely asynchronous systems, there is no solution for the election problem satisfying both of safety and liveness properties in asynchronous distributed systems. Therefore, to solve the election problem in those systems, one property should be weaker than the other property. If an election algorithm strengthens the safety property in sacrifice of liveness property, it would not nearly progress. But on the contrary, an election algorithm strengthening the liveness property in sacrifice of the safety property would have the high probability of violating the safety property. In this paper, we presents a safety strengthened Leader Election protocol with an unreliable failure detector and analyses it in terms of safety and liveness properties in asynchronous distributed systems.

Performance Analysis of Multi-Hop Decode-and-Forward Relaying with Selection Combining

  • Bao, Vo Nguyen Quoe;Kong, Hyung-Yun
    • Journal of Communications and Networks
    • /
    • v.12 no.6
    • /
    • pp.616-623
    • /
    • 2010
  • In this paper, exact closed-form expressions for outage probability and bit error probability (BEP) are presented for multi-hop decode-and-forward (DF) relaying schemes in conjunction with cooperative diversity, in which selection combining technique is employed at each node. We have shown that the proposed protocol offers remarkable diversity advantage over direct transmission as well as the conventional DF relaying schemes with the same combining technique. We then investigate the system performance when different diversity schemes are employed. It has been observed that the system performance loss due to selection combining relative to maximal ratio combining is not significant. Simulations are performed to confirm our theoretical analysis.

Specification of Communication Services for Multimedia Cooperative Applications Based on the Reference Model of ODP

  • Yi, Jong-Hwa;Pastor, Encarna
    • ETRI Journal
    • /
    • v.20 no.2
    • /
    • pp.149-170
    • /
    • 1998
  • Between a wide range of distributed applications, this work is particularly focused on those applications which allow a group of persons, who are geographically distributed, to interact and cooperate exchanging different kind of information in order to realize group activities in a common work environment. In this paper we realized a study of this kind of applications to identify general and functional characteristics which will then enable us to determine their communication requirements. Also, we analyzed the existent support architectures to examine whether they support multimedia cooperative applications. Based on the results of analysis, we proposed a set of communication functions needed additionally to support these applications, using the ODP(Open Distributed Processing) modelling concepts, rules and view points as our global design methodology.

  • PDF

Adaptive Decode-and-Forward Cooperative Networks with Multiple Relay Nodes

  • Vu, Ha Nguyen;Kong, Hyung-Yun
    • Journal of electromagnetic engineering and science
    • /
    • v.11 no.1
    • /
    • pp.5-10
    • /
    • 2011
  • We propose an adaptive cooperative scheme with a multi-relay node that achieves high bandwidth efficiency and achieves better SEP performance. In the proposed protocol, if the quality of the direct channel is better than that of the all channels from relays to destination, the source will transmit directly to the destination. Otherwise, the source broadcasts the signal and then a potential relay will be chosen to help the source. A re-transmission will also occur if the potential relay cannot be detected. The spectral efficiency is first derived by calculating the probability of each mode, i.e., direct and cooperation transmission. Subsequently, the SEP performance of M-PSK modulation for the scheme is analyzed by considering each event where the source transmits data to the destination. Finally, the obtained analytical results are verified through computer simulations.

An Algorithm to Detect Bogus Nodes for a Cooperative Intrusion Detection Architecture in MANETs

  • Hieu Cao Trong;Dai Tran Thanh;Hong Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1117-1120
    • /
    • 2006
  • Wide applications because of their flexibilities and conveniences of Wireless Mobile Ad-hoc Networks (MANETs) also make them more interesting to adversaries. Currently, there is no applied architecture efficient enough to protect them against many types of attacks. Some preventive mechanisms are deployed to protect MANETs but they are not enough. Thus, MANETs need an Intrusion Detection System (IDS) as the second layer to detect intrusion of adversaries to response and diminish the damage. In this paper, we propose an algorithm for detecting bogus nodes when they attempt to intrude into network by attack routing protocol. In addition, we propose a procedure to find the most optimize path between two nodes when they want to communicate with each other. We also show that our algorithm is very easy to implement in current proposed architectures.

  • PDF

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF

Optimal selection Relaying for cooperative ARQ protocol (협력 ARQ 프로토콜에서 최적의 선택적 릴레이)

  • Choi, Dae-Kyu;Kong, Hyung-Yun
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.225-226
    • /
    • 2008
  • 본 논문은 협력 ARQ 프로토콜에서 기존의 SNR 또는 채널 계수를 고려하는 선택적 릴레이 방식 대신에 LLR를 고려한 최적의 선택적 릴레이를 제안하였다. 협력통신에 ARQ를 적용함으로써 주파수 효율을 향상 시킬 수 있으며, LLR를 적용함으로써 성능을 보다 향상시킬 수 있었다. 레일리 페이딩과 AWGN를 고려한 Monte-Carlo 시뮬레이션을 통해 성능을 검증하였다.

  • PDF