• Title/Summary/Keyword: HOPS

Search Result 220, Processing Time 0.023 seconds

Void-less Routing Protocol for Position Based Wireless Sensor Networks (위치기반 무선 센서 네트워크를 위한 보이드(void) 회피 라우팅 프로토콜)

  • Joshi, Gyanendra Prasad;JaeGal, Chan;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.10
    • /
    • pp.29-39
    • /
    • 2008
  • Greedy routing which is easy to apply to geographic wireless sensor networks is frequently used. Greedy routing works well in dense networks whereas in sparse networks it may fail. When greedy routing fails, it needs a recovery algorithm to get out of the communication void. However, additional recovery algorithm causes problems that increase both the amount of packet transmission and energy consumption. Communication void is a condition where all neighbor nodes are further away from the destination than the node currently holding a packet and it therefore cannot forward a packet using greedy forwarding. Therefore we propose a VODUA(Virtually Ordered Distance Upgrade Algorithm) as a novel idea to improve and solve the problem of void. In VODUA, nodes exchange routing graphs that indicate information of connection among the nodes and if there exist a stuck node that cannot forward packets, it is terminated using Distance Cost(DC). In this study, we indicate that packets reach successfully their destination while avoiding void through upgrading of DC. We designed the VODUA algorithm to find valid routes through faster delivery and less energy consumption without requirement for an additional recovery algorithm. Moreover, by using VODUA, a network can be adapted rapidly to node's failure or topological change. This is because the algorithm utilizes information of single hop instead of topological information of entire network. Simulation results show that VODUA can deliver packets from source node to destination with shorter time and less hops than other pre-existing algorithms like GPSR and DUA.

Proximity-based Overlay Network Routing for Service Discovery in Mobile Ad-Hoc Network (이동 애드혹 망에서의 서비스 검색을 위한 근접성 기반 오버레이 네트워크 라우팅)

  • Yoon Hyeon-Ju;Lee Eunju;Jeong Hyunku;Kim Jin-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.643-658
    • /
    • 2004
  • Mobile ad hoc networks(MANET) have recently attrarted a lot of attention in the research community as well as in industry. Although the previous research mainly focused on the various problems of MANET in data link and network layers, we consider, in this paper, how to efficiently support applications such as service discovery on top of MANET. Peer-to-Peer(P2P) overlay network can be adopted to service discovery mechanism because P2P and MANET share certain similarities, primarily the fact that both arc instances of self-organizing decentralized systems. Especially, distributed hash table(DHT) systems used for r2r overlay network can be effective in reducing the communication overhead in service discovery. However, since overlay network is independent of physical network topology and existing topology-aware mechanisms are based on the wired network, they are inefficient in MANET. We propose a proximity-based overlay network routing to overcome the inefficiency of routing in overlay network. In the proximity-based overlay network routing, each node collects information of physically close nodes by using one hop broadcast and routes messages to the logically closest node to destination. In a detailed ns-2 simulation study, we show that the proximity-based overlay network routing reduces the number of physical hops comparable to the flooding-based mechanism with low communication overhead. We also find that the proposed scheme works well in the mobile environment.

Lambda Routing Table based Dynamic Routing Scheme and Its Characteristics on GMPLS Network (GMPLS 네트워크에서 Lambda Routing Table 조회형 동적 라우팅 방식 및 특성)

  • Kwon Ho-jin;Kim Young-bu;Han Chi-moon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11B
    • /
    • pp.938-945
    • /
    • 2004
  • This paper describes the problems of the existing two multi-layer routing policies(policy 1 and policy 2) and suggests new multi-layer routing policy(policy 3) which is established the packet LSP by inquiry on packet LSP lambda routing tables for GMPLS based optical If Network. All policies of multi-layer routing schemes first try to allocate a newly requested electrical path to an existing optical path that directly connects the source and destination nodes. U such a path is not available, all policies employ different procedures. Policy 1 tries to find available existing optical paths with two or more hops that connect the source and destination nodes and policy 2 tries to establish a new one-hop optical path between source and destination nodes. Policy 3 tries to establish a new one-hop optical path by inquiry on information of the packet LSP lambda routing tables between source and destination nodes. The performances of the three multi-routing policies are evaluated by computer simulation. Simulation results show that policy 3 is the excellent of routing time and traffic acceptance capabilities compare to existing two polices if p is large, where p is the number of packet-switching-capable ports p.

Routing for Enhancing Source-Location Privacy with Low Delivery Latency in Sensor Networks (센서 네트워크에서 낮은 전달 지연으로 근원지 위치 기밀을 강화하는 라우팅)

  • Tscha, Yeong-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.636-645
    • /
    • 2008
  • Most of routing schemes that protect the source's location from a malicious attacker usually make use of a path of a long length per message for the sake of lengthening the safety period. The biggest problem to such approaches is taking a very long latency in transferring messages to the destination. In this paper we show the problem to find the least-cost single path that is enough to keep the source-location always secure from the attacker, provided that it is used for the delivery of a set of messages given in priori, is NP-complete. Consequently we propose a routing protocol GSLP-w(GPSR-based Source-Location Privacy with crew size co) that is a trade-off between two extreme approaches. The advantage of GSLP-co lies in its enhanced safety period for the source and its lowered delivery latency in messaging. We consider NSP(Normalized Sefety Period) and NDL(Normalized Delivery Latency), measured in terms of the least number of hops to the destination, to achieve tangible interpretation of the results. We ran a simulation to confirm our claim by generating 100 topologies of 50,000 nodes with the average number of neighbors being 8. The results show that GSLP-$\omega$ provides more enhanced NSP compared to other protocols GSLP, an earlier version of GSLP-$\omega$, and PR-SP(Phantom Routing - Single Path), the most notable existing protocol for the source-location privacy, and less NDL than that of GSLP but more than that of PR-SP.

Device Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism (LR-WPAN에서 사전인증기법을 이용한 기기 인증 프로토콜)

  • Lee, Sung-Hyung;Kim, Jae-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.63-72
    • /
    • 2010
  • This paper proposes a new authentication protocol for the LR-WPAN. In order to guarantee the reliability and safety of a protocol, this protocol uses the hierarchical authentication approach. In addition, in order to reduce the impact of the denial of service attack, the proposed protocol performs the authentication between a parent router and a joiner device prior to the authentication between a trust center and the joiner device. Moreover, this protocol reduces the authentication delay by decreasing the number of message exchanges during authentication procedure. This paper evaluates the safety of the proposed protocol by the security analysis and reliability of the proposed protocol by the GNY analysis. This paper also compares the number of message exchanges of the ZigBee authentication protocol and the proposed protocol when denial of service attack occurs to evaluate the resistance of the proposed protocol against the denial of service attack. We also analyze the delay for authentication of the joiner device through the implementation of both protocols. Those results show that the proposed protocol effectively protects networks from the denial of service attack and reduces the time for authenticating the joiner device up to maximum 30% as the number of hops increases.

LED Communication based Multi-hop Audio Data Transmission Network System (LED 통신 기반 멀티 홉 오디오 데이터 전송네트워크시스템)

  • Jo, Seung Wan;Le, The Dung;An, Beongku
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.180-187
    • /
    • 2013
  • In this paper, we propose a LED communication based multi-hop audio data transmission network system. The main contribution and features of the proposed system are as follows. First, the contribution of this research is to develope the LED communication based multi-hop transmission network system which can transmit audio data signal with long distance via multi-hops. Second, the developed system has the following features: In transmitter, audio data is transmitted after encoding with S/PDIF format via a general LED. The relay receives digital audio signal by using photo diode and then transmits the signal to receiver after error checking and amplifying. The receiver receives the encoded audio data via photo diode and then converts to analog audio signal by using decoding and amplifying. The performance evaluation of the proposed system is conducted in the laboratory with fluorescent light source. The results of the performance evaluation confirm that the system can provide high quality audio transmission from transmiter to receiver via multi-hop relays in a long distance while we can see there are differences in the transmitted audio quality according to the used LED colors.

Visible Light Communication based Multi-hop Multimedia Data Transmission Networks System (VLC 기반 멀티 홉 멀티미디어 데이터 전송 네트워크 시스템)

  • Park, In-Chul;Shin, Jung-Jin;Park, Joo-Young;Dung, Le The;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.21-31
    • /
    • 2014
  • In this paper, we propose VLC(visible light communication) based multi-hop multimedia data transmission system. The main contributions and features of the proposed system are as follows. First, the contribution of this research is to develope the LED communication based multi-hop transmission network system which can transmit multimedia data(audio data, video data) with long distance. Second, the developed system has the following features: In transmitter, audio data and video data are transmitted via multi-hops using two channels. The relay in audio channel receives digital audio signal by using photo diode and then transmits the signal to receiver after error checking and amplifying. The receiver receives the encoded audio data via photo diode and then converts to analog audio signal by using decoding and amplifying. The relay in video channel receives video signal by using photo diode and then amplify the video signal using OP-AMP and then transmits the signal to receiver. The receiver amplifies the received signal from photo diode and then sends it to the monitor. The performance evaluation of the proposed system is conducted in the laboratory with fluorescent light source. The results of the performance evaluation confirm that the system can provide high quality multimedia data transmission from transmiter to receiver via multi-hop relays in a long distance while we can see there are differences in the transmitted multimedia(audio and video) quality according to the used LED colors.

Experimental Design of AODV Routing Protocol with Maximum Life Time (최대 수명을 갖는 AODV 라우팅 프로토콜 실험 설계)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.29-45
    • /
    • 2017
  • Ad hoc sensor network is characterized by decentralized structure and ad hoc deployment. Sensor networks have all basic features of ad hoc network except different degrees such as lower mobility and more stringent energy requirements. Existing protocols provide different tradeoffs among some desirable characteristics such as fault tolerance, distributed computation, robustness, scalability and reliability. wireless protocols suggested so far are very limited, generally focusing on communication to a single base station or on aggregating sensor data. The main reason having such restrictions is due to maximum lifetime to maintain network activities. The network lifetime is an important design metric in ad hoc networks. Since every node does a router role, it is not possible for other nodes to communicate with each other if some nodes do not work due to energy lack. In this paper, we suggest an experimental ad-hoc on-demand distance vector routing protocol to optimize the communication of energy of the network nodes.The load distribution avoids the choice of exhausted nodes at the route selection phase, thus balances the use of energy among nodes and maximizing the network lifetime. In transmission control phase, there is a balance between the choice of a high transmission power that lead to increase in the range of signal transmission thus reducing the number of hops and lower power levels that reduces the interference on the expense of network connectivity.

Cache-Filter: A Cache Permission Policy for Information-Centric Networking

  • Feng, Bohao;Zhou, Huachun;Zhang, Mingchuan;Zhang, Hongke
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4912-4933
    • /
    • 2015
  • Information Centric Networking (ICN) has recently attracted great attention. It names the content decoupling from the location and introduces network caching, making the content to be cached anywhere within the network. The benefits of such design are obvious, however, many challenges still need to be solved. Among them, the local caching policy is widely discussed and it can be further divided into two parts, namely the cache permission policy and the cache replacement policy. The former is used to decide whether an incoming content should be cached while the latter is used to evict a cached content if required. The Internet is a user-oriented network and popular contents always have much more requests than unpopular ones. Caching such popular contents closer to the user's location can improve the network performance, and consequently, the local caching policy is required to identify popular contents. However, considering the line speed requirement of ICN routers, the local caching policy whose complexity is larger than O(1) cannot be applied. In terms of the replacement policy, Least Recently Used (LRU) is selected as the default one for ICN because of its low complexity, although its ability to identify the popular content is poor. Hence, the identification of popular contents should be completed by the cache permission policy. In this paper, a cache permission policy called Cache-Filter, whose complexity is O(1), is proposed, aiming to store popular contents closer to users. Cache-Filter takes the content popularity into account and achieves the goal through the collaboration of on-path nodes. Extensive simulations are conducted to evaluate the performance of Cache-Filter. Leave Copy Down (LCD), Move Copy Down (MCD), Betw, ProbCache, ProbCache+, Prob(p) and Probabilistic Caching with Secondary List (PCSL) are also implemented for comparison. The results show that Cache-Filter performs well. For example, in terms of the distance to access to contents, compared with Leave Copy Everywhere (LCE) used by Named Data Networking (NDN) as the permission policy, Cache-Filter saves over 17% number of hops.

Development of natural sunscreen using plant extracts (식물 추출물을 이용한 천연 자외선 차단제 개발)

  • Moon, Ji-Sun
    • Journal of the Korean Applied Science and Technology
    • /
    • v.37 no.5
    • /
    • pp.1138-1150
    • /
    • 2020
  • In this study, an experiment was conducted to develop a sunscreen with antioxidant effects by simultaneously investigating the antioxidant and UV protection capabilities of various plant extracts. First, to investigate the UV-blocking ability of 33 kinds of plant extracts, the absorbance spectrum between the UV wavelength of 280 to 400 nm was investigated. Arrowroot, graviola, wheat sprout, sangbaek skin, thorn meal, lacquer, etc. 11 species were selected. The total polyphenol content, total flavonoid content, and DPPH radical scavenging activity of the selected plant extracts are measured to examine the degree of antioxidant activity, and from this, it is a plant extract that has excellent UV protection and antioxidant activity at the same time. The species was selected. A gel-shaped cream is prepared by mixing the selected gold, hops, and licorice extracts in a ratio of 1:1:1, and the UV protection effect of this cream is measured when the cultured cells are irradiated with UV rays. Determined by the method. As a result of the study, it was confirmed that the selected mixture of plant extracts complemented each other in terms of ultraviolet absorption ability and increased cell damage protection effect. Through these results, it was confirmed that it was possible to develop a sunscreen with an antioxidant effect if the antioxidant and sunscreen capabilities of various plant extracts were determined at the same time.