• 제목/요약/키워드: Forwarding

검색결과 694건 처리시간 0.028초

차량 애드혹 네트워크의 링크 단절 문제 해결을 위한 효율적인 라우팅 알고리즘 (An Efficient Routing Algorithm for Solving the Lost Link Problem of Vehicular Ad-hoc Networks)

  • 임완선;김석형;서영주
    • 한국통신학회논문지
    • /
    • 제33권12B호
    • /
    • pp.1075-1082
    • /
    • 2008
  • 그리디 포워딩(Greedy forwarding) 기법은 주변 노드들의 정보만을 이용해 패킷을 전달하는 기법으로, 전체 라우팅 경로를 유지해야 하는 다른 애드혹 라우팅 프로토콜에 비해 경로 유지가 쉽기 때문에 토폴로지가 자주 변하는 차량간 애드혹 네트워크에 적합한 방식이라고 할 수 있다. 그리디 포워딩 기법에서는 주기적인 비콘 전송을 통해 이웃 노드들의 위치를 획득하고, 패킷을 전달할 때 수신 노드와 가장 가까운 노드를 전달 노드로 선택한다. 이러한 그리디 포워딩의 성능을 떨어뜨리는 주요 원인 중 하나는 이웃 노드가 원래의 위치에서 벗어나면서 발생하는 링크 단절 문제이다. 본 논문에서는 그리디 포워딩 기반의 라우팅 프로토콜인 Greedy Perimeter Stateless Routing (GPSR) 프로토콜을 바탕으로 링크 단절 문제를 해결하기 위한 새로운 알고리즘을 제안한다. 제안하는 알고리즘은 이웃 노드의 위치와 비콘을 수신한 시간 등을 고려해 효율적이면서도 안정적인 라우팅 경로를 찾는 것을 목표로 한다. 다양한 환경에서의 실험 결과를 통해 우리는 제안하는 알고리즘이 GPSR과 기존의 연구 결과들에 비해 더 뛰어난 성능을 보이는 것을 확인하였다.

An Efficient Routing Scheme Based on Node Density for Underwater Acoustic Sensors Networks

  • Rooh Ullah;Beenish Ayesha Akram;Amna Zafar;Atif Saeed;Sultan H. Almotiri;Mohammed A. Al Ghamdi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권5호
    • /
    • pp.1390-1411
    • /
    • 2024
  • Underwater Wireless Sensors Networks (UWSNs) are deployed in remotely monitored environment such as water level monitoring, ocean current identification, oil detection, habitat monitoring and numerous military applications. Providing scalable and efficient routing is very challenging in UWSNs due to the harsh underwater environment. The biggest difficulties are the nodes inherent movement due to water current, long delay in data transmission, low bandwidth of the acoustic signal, high error rate and energy scarcity in battery powered nodes. Many routing protocols have been proposed to solve the aforementioned problems. There are three broad categories of routing protocols namely depth based, energy based and vector-based routing. Vector Based Forwarding protocols perform routing through virtual pipeline by defining their radius which give proper direction to packets communication. We proposed a routing protocol termed as Path-Oriented Energy Scaled Expanded Vector Based Forwarding (PESEVBF). PESEVBF takes into account all parameters; holding time, the source nodes packets routing path and void holes creation on the second hop; PESEVBF not only considers the packet upward advancement but also focus on density of the forwarded nodes in terms of number of potential forwarding and suppressed nodes for path selection. Node selection in resultant holding time is based on minimum Path Factor (PF) value. Moreover, the suppressed node will be selected for packet forwarding to avoid the void holes occurrences on the second hop. Performance of PESEVBF is compared with other routing protocols using matrices such as energy consumption, packet delivery ratio, packets dropping ratio and duplicate packets creation indicating considerable performance improvement.

고속의 최장 IP 주소 프리픽스 검색을 위한 비트-맵 트라이 (A Bit-Map Trie for the High-Speed Longest Prefix Search of IP Addresses)

  • 오승현;안종석
    • 한국정보과학회논문지:정보통신
    • /
    • 제30권2호
    • /
    • pp.282-292
    • /
    • 2003
  • 본 논문은 IPv4와 IPv6을 지원하는 라우터에서 기가비트의 속도로 포워딩 검색을 수행하는 효율적인 포워딩 테이블 구조를 제안한다. 포워딩 검색은 최장 프리픽스 일치검색, LPM(Longest Prefix Matching)의 복잡도가 포워딩 테이블 및 주소크기에 따라 증가하여 라우터 성능의 병목지점으로 알려져 있다. 포워딩 검색의 고속화를 위해 본 논문에서는 빈번한 메모리 접근을 최소화할 수 있는 BMT(Bit-Map Trie) 자료구조를 소개한다. BMT 포워딩 검색은 필요한 모든 검색연산이 캐쉬에 저장된 소형 인덱스 테이블에서만 발생한다. 포워딩 테이블의 트라이로부터 소형 인덱스 테이블을 구축하기 위해서 BMT는 차일드(child) 노드 포인터와 포워딩 테이블 엔트리에 대한 포인터를 각각 한 비트로 표현하는 비트-맵을 구성한다. 또한 IPv6와 같이 주소길이가 증가하면 트라이의 깊이가 깊어져서 전통적인 트라이 검색속도가 느려지는 문제점을 해결하기 위해서 BMT에서는 검색을 시작할 적절한 트라이의 레벨을 결정하는 이진검색 알고리즘을 사용한다. 실험 결과 BMT는 IPv4 백본 라우팅 테이블을 펜티엄-II 프로세서의 L2 캐쉬 크기인 512KB 보다 작게 압축하였으며, 최대 250ns/패킷의 검색속도를 제공하여 기존의 알려진 가장 빠른 최장 검색 알고리즘의 성능과 같은 속도를 실현하였다.

논스톱 포워딩 기능을 지원하는 네트워크 시스템에 대한 다중화 모형의 가용도 분석 (Availability Analysis of Redundancy Models for Network System with Non-Stop Forwarding)

  • 심재찬;류홍림;류호용;박재형;이유태
    • 한국정보통신학회논문지
    • /
    • 제19권12호
    • /
    • pp.2828-2835
    • /
    • 2015
  • 본 논문에서는 다양한 다중화 모형과 논스톱 포워딩 기능이 네트워크 서비스의 가용도에 미치는 영향을 비교 분석한다. 다중화 모형 중 no redundancy, 2N redundancy, N-way redundancy, N-way active redundancy 모형에 대한 확률적 리워드 네트(Stochastic Reward Net, SRN) 모델을 설계하고, 각각의 모형에 대해 논스톱 포워딩 기능을 추가한 SRN 모델을 설계한다. 확률적 페트리 네트 패키지(Stochastic Petri Net Package, SPNP)를 활용하여 설계한 SRN 모델의 가용도를 구한다.

TCP Performance Enhancement by Implicit Priority Forwarding (IPF) Packet Buffering Scheme for Mobile IP Based Networks

  • Roh, Young-Sup;Hur, Kye-Ong;Eom, Doo-Seop;Lee, Yeon-Woo;Tchah, Kyun-Hyon
    • Journal of Communications and Networks
    • /
    • 제7권3호
    • /
    • pp.367-376
    • /
    • 2005
  • The smooth handoff supported by the route optimization extension to the mobile IP standard protocol should support a packet buffering mechanism at the base station (BS), in order to reduce the degradation in TCP performance caused by packet losses within mobile network environments. The purpose of packet buffering at the BS is to recover the packets dropped during intersubnetwork handoff by forwarding the packets buffered at the previous BS to the new BS. However, when the mobile host moves to a congested BS within a new foreign subnetwork, the buffered packets forwarded by the previous BS are likely to be dropped. This subsequently causes global synchronization to occur, resulting in the degradation of the wireless link in the congested BS, due to the increased congestion caused by the forwarded burst packets. Thus, in this paper, we propose an implicit priority forwarding (IPF) packet buffering scheme as a solution to this problem within mobile IP based networks. In the proposed IPF method, the previous BS implicitly marks the priority packets being used for inter-subnetwork handoff. Moreover, the proposed modified random early detection (M-RED) buffer at the new congested BS guarantees some degree of reliability to the priority packets. The simulation results show that the proposed IPF packet buffering scheme increases the wireless link utilization and, thus, it enhances the TCP throughput performance in the context of various intersubnetwork handoff cases.

Delay Tolerant Packet Forwarding Algorithm Based on Location Estimation for Micro Aerial Vehicle Networks

  • Li, Shiji;Hu, Guyu;Ding, Youwei;Zhou, Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권3호
    • /
    • pp.1377-1399
    • /
    • 2020
  • In search and rescue mission, micro aerial vehicles (MAVs) are typically used to capture image and video from an aerial perspective and transfer the data to the ground station. Because of the power limitation, a cluster of MAVs are required for a large search area, hence an ad-hoc wireless network must be maintained to transfer data more conveniently and fast. However, the unstable link and the intermittent connectivity between the MAVs caused by MAVs' movement may challenge the packet forwarding. This paper proposes a delay tolerant packet forwarding algorithm based on location estimation for MAV networks, called DTNest algorithm. In the algorithm, ferrying MAVs are used to transmit data between MAVs and the ground station, and the locations of both searching MAVs and ferrying MAVs are estimated to compute the distances between the MAVs and destination. The MAV that is closest to the destination is selected greedy to forward packet. If a MAV cannot find the next hop MAV using the greedy strategy, the packets will be stored and re-forwarded once again in the next time slot. The experiment results show that the proposed DTNest algorithm outperforms the typical DTNgeo algorithm in terms of packet delivery ratio and average routing hops.

선진 해운국의 Freight Forwarding System에 관한 연구 - 미국제도를 중심으로 - (Study on the Freight Forwarding System of Advanced Shipping Country - A Case of United States of America System -)

  • 김세원
    • 수산해양교육연구
    • /
    • 제20권3호
    • /
    • pp.416-428
    • /
    • 2008
  • In the end of 2007, Korea Government promulgated the Rule of 'Basic Act of Logistics Policy' for improving international logistics forwarding business. The goals of these rules are to achieve the development of our nation's economics for providing the security and efficiency of logistics system and enforced competition of logistics enterprises. This is established the basic principles of the legal basis for expanding into the Logistics Hub Center of North-east Asia. However In May 1999 new licensing requirements for ocean freight forwarders and NVOCCs operating in the USA were established by the US Federal Maritime Commission(FMC). Due to these regulations, each ocean transportation service provider in the USA acting as ocean freight forwarder, NVOCCs, or NVOCC agent must obtain a license to operate as Ocean Transportation Intermediary(OTI) before it begins operations. Only licensed OTIs may act as US transportation agents or receiving agents of other NVOCCs, on both US exports and imports. In this context, I think this study will be contributes for the development of korean freight forwarding system by analysis and comparing with between the Rule of the Basic Act of Logistics Policy of Korea and OTI freight forwarder & NVOCCs of USA.

Position-based Routing Algorithm for Improving Reliability of Inter-Vehicle Communication

  • Ryu, Min-Woo;Cha, Si-Ho;Koh, Jin-Gwang;Kang, Seok-Joong;Cho, Kuk-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권8호
    • /
    • pp.1388-1403
    • /
    • 2011
  • A vehicular ad-hoc network (VANET) consists of vehicles that form a network without any additional infrastructure, thus allowing the vehicles to communicate with each other. VANETs have unique characteristics, including high node mobility and rapidly changing network topology. Because of these characteristics, routing algorithms based on greedy forwarding such as greedy perimeter stateless routing (GPSR) are known to be very suitable for a VANET. However, greedy forwarding just selects the node nearest to the destination node as a relay node within its transmission range. This increases the possibility of a local maximum and link loss because of the high mobility of vehicles and the road characteristics in urban areas. Therefore, this paper proposes a reliability-improving position-based routing (RIPR) algorithm to solve those problems. The RIPR algorithm predicts the positions, velocities, and moving directions of vehicles after receiving beacon messages, and estimates information about road characteristics to select the relay node. Thus, it can reduce the possibility of getting a local maximum and link breakage. Simulation results using ns-2 revealed that the proposed routing protocol performs much better than the existing routing protocols based on greedy forwarding.

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

  • Wu, Zehui;Wei, Qiang;Ren, Kailei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.846-864
    • /
    • 2017
  • Software Defined Network (SDN) realizes management and control over the underlying forwarding device, along with acquisition and analysis of network topology and flow characters through south bridge protocol. Data path Identification (DPID) is the unique identity for managing the underlying device, so forged DPID can be used to attack the link of underlying forwarding devices, as well as carry out DoS over the upper-level controller. This paper proposes a dynamic defense method based on Client-Puzzle model, in which the controller achieves dynamic management over requests from forwarding devices through generating questions with multi-level difficulty. This method can rapidly reduce network load, and at the same time separate attack flow from legal flow, enabling the controller to provide continuous service for legal visit. We conduct experiments on open-source SDN controllers like Fluid and Ryu, the result of which verifies feasibility of this defense method. The experimental result also shows that when cost of controller and forwarding device increases by about 2%-5%, the cost of attacker's CPU increases by near 90%, which greatly raises the attack difficulty for attackers.