• Title/Summary/Keyword: Forwarding nodes

Search Result 191, Processing Time 0.024 seconds

Multihop Rate Adaptive Wireless Scalable Video Using Syndrome-Based Partial Decoding

  • Cho, Yong-Ju;Radha, Hayder;Seo, Jeong-Il;Kang, Jung-Won;Hong, Jin-Woo
    • ETRI Journal
    • /
    • v.32 no.2
    • /
    • pp.273-280
    • /
    • 2010
  • The overall channel capacity of a multihop wireless path drops progressively over each hop due to the cascading effect of noise and interference. Hence, without optimal rate adaptation, the video quality is expected to degrade significantly at any client located at a far-edge of an ad-hoc network. To overcome this limitation, decoding and forwarding (DF), which fully decodes codewords at each intermediate node, can be employed to provide the best video quality. However, complexity and memory usage for DF are significantly high. Consequently, we propose syndrome-based partial decoding (SPD). In the SPD framework an intermediate node partially decodes a codeword and relays the packet along with its syndromes if the packet is corrupted. We demonstrate the efficacy of the proposed scheme by simulations using actual 802.11b wireless traces. The trace-driven simulations show that the proposed SPD framework, which reduces the overall processing requirements of intermediate nodes, provides reasonably high goodput when compared to simple forwarding and less complexity and memory requirements when compared to DF.

Design and Implementation of a Large-Scale Mail Server using Source IP Address Forwarding (발신지 IP 주소 포워딩을 이용한 메일 서버의 설계 및 구현)

  • 송영호;권택근
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.3
    • /
    • pp.307-315
    • /
    • 2002
  • As growing the population of the Internet, e-mail should provide various types of media, and the size of e-mail including multimedia data becomes larger and larger Furthermore, the multimedia e-mail has been used through various communication terminals including mobile devices. The main objectives of this thesis is designing and Implementing efficient mail server which should provide high performance and scalability in terms of storage capacity and the number of mail users. This thesis proposes a cluster-based mail server architecture which has a load-balance node using. If address forwarding for distributing incoming mail messages into distributed mail server nodes.

  • PDF

Reliable Gossip Zone for Real-Time Communications in Wireless Sensor Networks

  • Li, Bijun;Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.2
    • /
    • pp.244-250
    • /
    • 2011
  • Gossip is a well-known protocol which was proposed to implement broadcast service with a high reliability in an arbitrarily connected network of sensor nodes. The probabilistic techniques employed in gossip have been used to address many challenges which are caused by flooding in wireless sensor networks (WSNs). However, very little work has yet been done on real-time wireless sensor networks which require not only highly reliable packets reception but also strict time constraint of each packet. Moreover, the unique energy constraining feature of sensor makes existing solutions unsuitable. Combined with unreliable links, redundant messages overhead in real-time wireless sensor networks is a new challenging issue. In this paper, we introduce a Reliable Gossip Zone, a novel fine-tailored mechanism for real-time wireless sensor networks with unreliable wireless links and low packet redundancy. The key idea is the proposed forwarding probability algorithm, which makes forwarding decisions after the realtime flooding zone is set. Evaluation shows that as an oracle broadcast service design, our mechanism achieves significantly less message overhead than traditional flooding and gossip protocols.

Secure Data Forwarding based on Source Routing in Mobile Ad Hoc Networks (소스 라우팅 기반의 이동 Ad-hoc 네트워크에서 안전한 데이터 전송 방법)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12C
    • /
    • pp.1188-1193
    • /
    • 2007
  • This paper proposes a secure data forwarding scheme on source routing-based ad-hoc networks. The scheme uses two hash-key chains generated from a trusted third party to generate Message Authentication Codes for data integrity The selected MAC keys are delivered to the ad-hoc node using a pre-shared secret between the trusted third party and a node. The proposed scheme does not require the PKI, or the provisioning of the pre-shared secrets among the ad-hoc nodes.

A Efficient Energy-Saving Forwarding Technique in Wireless Sensor Networks (무선센서네크워크에서 효율적인 에너지 절약 전송 기법)

  • Duc, Thang Le;Nguyen, Dang Tu;Shon, Min-Han;Choo, Hyun-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.158-159
    • /
    • 2011
  • Energy efficiency in wireless sensor networks (WSNs) is one significant factor that needs to be considered when making any designs or doing any enhancements on the communication protocol stack. In WSNs using traditional geographic routing, when a sensor node receives a data packet that needs to be transmitted to the sink, it will forward the packet to the neighbor node which is closest to the sink. The traditional geographic routing assumes that the link quality is always 100%. This may cause a bad result as per which we waste too many energy for retransmissions between the two nodes. Thus, the problem here is how to select such node as forwarder at most efficiently in the aspect of both energy consumption and the distance toward the destination. The better node we choose, the more energy we can conserve for the whole network. In this paper, we propose a next-hop forwarding selection metric, called Energy Consumption for Transmission (ECT), which can resolve the above problem in the best way.

Transient Multipath routing protocol for low power and lossy networks

  • Lodhi, Muhammad Ali;Rehman, Abdul;Khan, Meer Muhammad;Asfand-e-yar, Muhammad;Hussain, Faisal Bashir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2002-2019
    • /
    • 2017
  • RPL routing protocol for low-power and lossy networks is an Internet Engineering Task Force (IETF) recommended IPv6 based protocol for routing over Low power Lossy Networks (LLNs). RPL is proposed for networks with characteristics like small packet size, low bandwidth, low data rate, lossy wireless links and low power. RPL is a proactive routing protocol that creates a Directed Acyclic Graph (DAG) of the network topology. RPL is increasingly used for Internet of Things (IoT) which comprises of heterogeneous networks and applications. RPL proposes a single path routing strategy. The forwarding technique of RPL does not support multiple paths between source and destination. Multipath routing is an important strategy used in both sensor and ad-hoc network for performance enhancement. Multipath routing is also used to achieve multi-fold objectives including higher reliability, increase in throughput, fault tolerance, congestion mitigation and hole avoidance. In this paper, M-RPL (Multi-path extension of RPL) is proposed, which aims to provide temporary multiple paths during congestion over a single routing path. Congestion is primarily detected using buffer size and packet delivery ratio at forwarding nodes. Congestion is mitigated by creating partially disjoint multiple paths and by avoiding forwarding of packets through the congested node. Detailed simulation analysis of M-RPL against RPL in both grid and random topologies shows that M-RPL successfully mitigates congestion and it enhances overall network throughput.

A P2P-based Management Method for Dynamic AOI (동적 AOI를 위한 P2P 기반 관리기법)

  • Lim, Chae-Gyun;Rho, Kyung-Taeg
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.211-216
    • /
    • 2011
  • Networked virtual environments (NVEs) are distributed systems where geographically dispersed users interact with each other in virtual worlds by exchanging network messages. Massively Multiplayer Online Game (MMOG) is one of diverse applications where more than hundreds of users enjoy experiencing virtual worlds. A limited area called area of interest (AOI) in MMOG is reduced the load caused by message exchange between users. Voronoi-based Overlay Network (VON) is proposed to reduce the bandwidth consumption in P2P environments and Vorocast also is made using message forwarding in VON. We propose a dynamic AOI management method that solves problems such as a consistency and latency due to forwarding position updates to neighbor nodes from the message originator in forwarding scheme. Our scheme provides the consistency and reduces latency by combining direct connection scheme and Vorocast scheme compared to existing schemes. The communication between a user and users existing in center circle within AOI of the user is directly connected and the communication between the user and users existing outside the center area within AOI is using Vorocast scheme. The proposed model is evaluated through simulations.

Energy Entropy based Multipath Routing Protocol using Dynamic Forwarding Range in Mobile Ad-hoc Wireless Sensor Networks (모바일 애드혹 무선 센서 네트워크에서 동적 전송범위를 사용한 에너지 엔트로피 기반 다중경로 라우팅 프로토콜)

  • Shim, Kyuhyun;Shim, Kyusung;Nam, Sangyep;An, Beongku
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.2
    • /
    • pp.68-75
    • /
    • 2017
  • In this paper, we propose an energy entropy based multipath routing protocol using dynamic forwarding range in mobile ad-hoc wireless sensor networks. The main features and contributions of the proposed routing protocol are as follows. First, can select stable routing routes by using the calculated route entropy based on energy information of sensor nodes. Second, using dynamic forwarding range based on the route stability of route entropy can reduce energy, control overhead, delay for route establishment, finally improve data transmission efficiency. The performance evaluation using OPNET shows that the proposed routing protocol can efficiently support PDR.

An Enhanced Route Optimization Scheme for Multiple LMAs in PMIPv6 Domain (다중 LMA 환경을 고려한 Proxy Mobile IP 기반의 향상된 경로 최적화 방안)

  • Jang, Jong-Min;Seo, Won-Kyeong;Choi, Jea-In;Cho, You-Ze
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1A
    • /
    • pp.82-89
    • /
    • 2011
  • The Proxy Mobile IPv6 is a network-based localized mobility management protocol. In the PMIPv6, Mobile Nodes are topologically anchored at a Local Mobility Anchor, which forwards all data packets for registered Mobile Nodes. Since all data packets destined for the Mobile Nodes a1ways traverse the Mobile Nodes's Local Mobility Anchor, the LMA might be bottleneck and the end-to-end de1ay are increased. Therefore, in this paper, we proposed an enhanced Route Optimization scheme in Multiple Local Mobility Anchors environment. In order to rapid1y detect Route Optimization, we designed Domain Information Table in Mobility Access Gateway. Furthermore, we use Correspondent Binding Cache in Local Mobility Anchor to maintain Route Optimization information during Mobile Nodes's handover. To solve packet loss and reodering problems during handover, we propose a new buffering and forwarding scheme.

Detecting Inner Attackers and Colluded nodes in Wireless Sensor Networks Using Hop-depth algorithm (Hop-depth 알고리즘을 이용한 무선 센서 네트워크상에서의 내부공격자 및 공모노드 검출)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.1
    • /
    • pp.113-121
    • /
    • 2007
  • Commonly, in the Sensor Network that composed with multiple nodes uses Ad-hoc protocol to communicate each other. Each sensed data packets are collected by base node and processed by Host PC. But the Ad-hoc protocol is too vulnerable to Sinkhole attack, where the intruder attracts surrounding nodes with unfaithful routing information, and then performs selective forwarding or changes the data passing through it. The Sinkhole attack increases overhead over the network and boosts energy consumption speed to decrease network's life time. Since the other attacks can be easily adopted through sinkhole attack, the countermeasure must be considered carefully. In this paper, we proposed the Hop-depth algorithm that detects intruder in Sinkhole attack and colluded nodes. First, the proposed algorithm makes list of suspected nodes and identifies the real intruder in the suspected node list through the Hop-depth count value. And recalculates colluder's path information to find the real intruder. We evaluated the performance of the proposed algorithm using NS2. We compared and analyzed the success ratio of finding real intruder, false positive ratio, false negative ratio, and energy consumption.