• Title/Summary/Keyword: Distributed Mobility Management

Search Result 78, Processing Time 0.026 seconds

Spectrum Management Models for Cognitive Radios

  • Kaur, Prabhjot;Khosla, Arun;Uddin, Moin
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.222-227
    • /
    • 2013
  • This paper presents an analytical framework for dynamic spectrum allocation in cognitive radio networks. We propose a distributed queuing based Markovian model each for single channel and multiple channels access for a contending user. Knowledge about spectrum mobility is one of the most challenging problems in both these setups. To solve this, we consider probabilistic channel availability in case of licensed channel detection for single channel allocation, while variable data rates are considered using channel aggregation technique in the multiple channel access model. These models are designed for a centralized architecture to enable dynamic spectrum allocation and are compared on the basis of access latency and service duration.

CACHE:Context-aware Clustering Hierarchy and Energy efficient for MANET (CACHE:상황인식 기반의 계층적 클러스터링 알고리즘에 관한 연구)

  • Mun, Chang-min;Lee, Kang-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.571-573
    • /
    • 2009
  • Mobile Ad-hoc Network(MANET) needs efficient node management because the wireless network has energy constraints. Mobility of MANET would require the topology change frequently compared with a static network. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. Previously proposed a hybrid routing CACH prolong the network lifetime and decrease latency. However the algorithm has a problem when node density is increase. In this paper, we propose a new method that the CACHE(Context-aware Clustering Hierarchy and Energy efficient) algorithm. The proposed analysis could not only help in defining the optimum depth of hierarchy architecture CACH utilize, but also improve the problem about node density.

  • PDF

THERA: Two-level Hierarchical Hybrid Road-Aware Routing for Vehicular Networks

  • Abbas, Muhammad Tahir;SONG, Wang-Cheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3369-3385
    • /
    • 2019
  • There are various research challenges in vehicular ad hoc networks (VANETs) that need to be focused until an extensive deployment of it becomes conceivable. Design and development of a scalable routing algorithm for VANETs is one of the critical issue due to frequent path disruptions caused by the vehicle's mobility. This study aims to provide a novel road-aware routing protocol for vehicular networks named as Two-level hierarchical Hybrid Road-Aware (THERA) routing for vehicular ad hoc networks. The proposed protocol is designed explicitly for inter-vehicle communication. In THERA, roads are distributed into non-overlapping road segments to reduce the routing overhead. Unlike other protocols, discovery process does not flood the network with packet broadcasts. Instead, THERA uses the concept of Gateway Vehicles (GV) for the discovery process. In addition, a route between source and destination is flexible to changing topology, as THERA only requires road segment ID and destination ID for the communication. Furthermore, Road-Aware routing reduces the traffic congestion, bypasses the single point of failure, and facilitates the network management. Finally yet importantly, this paper also proposes a probabilistical model to estimate a path duration for each road segment using the highway mobility model. The flexibility of the proposed protocol is evaluated by performing extensive simulations in NS3. We have used SUMO simulator to generate real time vehicular traffic on the roads of Gangnam, South Korea. Comparative analysis of the results confirm that routing overhead for maintaining the network topology is smaller than few previously proposed routing algorithms.

The Development of Mobile Grid System and Performance Evaluation (모바일 그리드 시스템의 개발 및 성능평가)

  • Kim Tae-Kyung;Kim Hee-Seung;Lee Hyun-Joo;Chung Tai-Myung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.581-588
    • /
    • 2005
  • The performance of mobile devices and wireless networks is improved rapidly and Mobility management skills such as Mobile IP and ad-hoc technology were developed. So the requirement of processing the distributed computing is highly increased in any place and any time or in the state of movement. Therefore we studied the mobile grid system to process the distributed applications properly in wireless networks. In addition to typical computational resources, Mobile Grid brings new resources such as sensor, mobile devices or other wireless devices to distributed computing for the purpose of resource-sharing. In this paper, we design and implement the mobile grid system in wireless lan network environment for the providing the grid service. Also, we evaluate the performance of mobile grid system using the processing the distributed applications in implemented mobile grid environments.

Location Management Scheme by using Jumping Pointer in Distributed HLR Environment (분산 HLR 환경에서 분기포인터를 이용한 위치 관리 기법)

  • Lee, Bo-Kyung;Hwang, Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.30-38
    • /
    • 2000
  • In distributed HLR environment, the pointer forwarding with distributed HLR(Pointer Forwarding Scheme) has been proposed for eliminating the cost of updating multiple HLRs. In Pointer Forwarding Scheme, the find cost can be changed according to from which HLR a call originates. If a user changes PCS registration areas frequently, but receives calls relatively infrequently, and call for such a user originates from any other HLRs than the recently updated HLR, many VLRs should be traversed in order to find that user. In this paper, location tracking with jumping pointer in distributed HLR(Jumping Pointer Scheme) is proposed. The jumping pointer can be connected between the recently updated VLR and the VLR in which the mobile host currently resides. In case of call delivery, the mobile host can be found sooner by using the jumping pointer. In terms of 'find' cost, Jumping Pointer scheme improves about 17% over Forwarding Pointer scheme. Otherwise, Jumping Pointer scheme takes additional update charge in order to manage the jumping pointer. However the total costs of 'find' cost and 'update' cost for Jumping Pointer scheme are cheaper than them for Forwarding Pointer scheme when call-to-mobility ratio is smaller.

  • PDF

Certificate Management System of MANET for Stable Ubiquitous Service (안전한 유비쿼터스 서비스를 위한 MANET의 인증서 관리 시스템에 관한 연구)

  • Oh Suk-Sim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1558-1564
    • /
    • 2006
  • This study addressed security requirements for ad-hoc network environments, which lies at the hour of the ubiquitous computing revolution and proposed a partially-distributed certificate management system that can ensure security in mobile ad-hoc networks. The proposed model is characterized by ie ability to handle dynamic mobility of nodes, minimize routing load and enhance expandability of network by allowing participating nodes to authenticate each other without being interrupted by joining the cluster. The security, efficiency and robustness of the proposed model were evaluated through simulation.

A Study on the Kernel-Based Management for Mobile Grid Application (모바일 그리드 어플리케이션을 위한 커널 기반 관리방안에 대한 연구)

  • Kim, Tae-Kyung;Seo, Hee-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.21-28
    • /
    • 2006
  • In this paper, we introduce the mobile grid architecture using kernel-based managements. Mobile grid paradigm is used to allow mobile users to access distributed resources in a transparent, secure and effective way. Each mobile grid user requests job submission, searches for suitable resources to run Job, executes the job to the allocated system resources, and receives the results of the requested job. There are a number of challenging issues when taking mobile environment into account, such as limited performance of mobile devices and mobility of mobile device. To resolve these issues, we design and implement the kernel-based management system for mobile grid application to overcome the limited resources of mobile devices. Also, we show the efficiency of the suggested architecture using the performance evaluation.

  • PDF

A Study on Mobile IP Systems for Military Information Systems (이동 IP 체계에 대한 군 정보체계 활용방안 연구)

  • 이태종
    • Journal of the military operations research society of Korea
    • /
    • v.22 no.2
    • /
    • pp.73-89
    • /
    • 1996
  • This paper suggests the new IP, SIMIP(Simple Mobile IP), which supports a continuous mobility between a static host and a mobile host in the static TCP/IP LAN environment where mobile hosts are overlayed with cells. For designing a mobile protocol, routing optimization is very important, and it is directly related to the management mechanism of a mobile host's location information. When the mobile hosts' location information are centralized, the network has high risk when a centralized device fails. On the other hand, when they are distributed, the above problems are solved. But it requires complicated techniques in order to search the encapsulated addresses. SIMP centralizes mobile hosts' location information, minimizes the risk by automatically substituting the failed default mobile router with one of the multiple general mobile routers, and supports the optimal routing path through "default mobile router path alternation" Then since SIMIP isn't reasonable the operations informations to the chief in military operations room.ions room.

  • PDF

An Efficient Routing Algorithm Based on the Largest Common Neighbor and Direction Information for DTMNs (DTMNs를 위한 방향성 정보와 최대 공동 이웃 노드에 기반한 효율적인 라우팅 프로토콜)

  • Seo, Doo Ok;Lee, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.83-90
    • /
    • 2010
  • DTNs (Delay Tolerant Networks) refer to the networks that can support data transmission in the extreme networking situations such as continuous delay and no connectivity between ends. DTMNs (Delay Tolerant Networks) are a specific range of DTNs, and its chief considerations in the process of message delivery in the routing protocol are the transmission delay, improvement of reliability, and reduction of network loading. This article proposes a new LCN (Largest Common Neighbor) routing algorism to improve Spray and Wait routing protocol that prevents the generation of unnecessary packets in a network by letting mobile nodes limit the number of copies of their messages to all nodes to L. Since higher L is distributed to nodes with directivity to the destination node and the maximum number of common neighbor nodes among the mobile nodes based on the directivity information of each node and the maximum number of common neighbor nodes, more efficient node transmission can be realized. In order to verify this proposed algorism, DTN simulator was designed by using ONE simulator. According to the result of this simulation, the suggested algorism can reduce average delay and unnecessary message generation.

A Study on the Secure Authentication Method using SIP in the VoIP System (VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구)

  • Lee, Young Gu;Kim, Jeong Jai;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.