• Title/Summary/Keyword: Hop

Search Result 1,598, Processing Time 0.022 seconds

Cluster Routing Scheme using Multi-hop Pairwise Key for Distributed Sensor Networks (분산 센서 네트워크에서 Multi-hop Pairwise Key를 이용한 Cluster Routing 기법)

  • Park Soyoung;Kim Hyung Chan;Ramakrishina R.S.
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.484-486
    • /
    • 2005
  • 본 논문에서는 센서네트워크를 위한 기존의 클러스터 라우팅 기법에 multi-hop pairwise key를 적용시킴으로써 multi-hop pairwise key를 기반으로 하는 클러스터를 구성하고 이를 통한 클러스터 간의 통신을 제안한다. 이는 암호화된 클러스터 통신을 위한 키 분배에 있어서 메모리 효율성을 높이고, 클러스터 라우팅의 난제였던 클러스터 헤드 선택과 관리를 효과적으로 할 수 있게 한다.

  • PDF

Resource Allocation in Two Hop Relay Network based on PB/MC-CDMA System (PB/MC-CDMA 기반 two-hop 중계 망에서의 자원 할당 방식)

  • Sun, Yan;Lee, Kye-San
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.1
    • /
    • pp.94-99
    • /
    • 2010
  • In this paper, we discuss a proposed two hop relay network with PB/MC-CDMA(partial block MC-CDMA) technique. The main advantages of PB/MC-CDMA system are the increased cell capacity and the high quality of performances. In the system, we employ relay scheme to focus on the coverage reduction and hotspot problem, hotspot is a location where a cluster of users are blocked or dropped for the reason of insufficient frequency resources. Frequency resource allocation scheme is put forward in a three cells system according to each problem. The simulation result shows the performance of the two hop transmission is better than the direct transmission and the proposed network can support much more users to relief hotspot effect compared to the conventional one.

Energy-Efficient Cooperative Beamforming based CMISO Transmission with Optimal Nodes Deployment in Wireless Sensor Networks

  • Gan, Xiong;Lu, Hong;Yang, Guangyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.3823-3840
    • /
    • 2017
  • This paper analyzes the nodes deployment optimization problem in energy constrained wireless sensor networks, which multi-hop cooperative beamforming (CB) based cooperative-multi-input-single-output (CMISO) transmission is adopted to reduce the energy consumption. Firstly, we establish the energy consumption models for multi-hop SISO, multi-hop DSTBC based CMISO, multi-hop CB based CMISO transmissions under random nodes deployment. Then, we minimize the energy consumption by searching the optimal nodes deployment for the three transmissions. Furthermore, numerical results present the optimal nodes deployment parameters for the three transmissions. Energy consumption of the three transmissions are compared under optimal nodes deployment, which shows that CB based CMISO transmission consumes less energy than SISO and DSTBC based CMISO transmissions. Meanwhile, under optimal nodes deployment, the superiorities of CB based CMISO transmission over SISO and DSTBC based CMISO transmissions can be more obvious when path-loss-factor becomes low.

Pretraining Dense retrieval for Multi-hop question answering of Korean (한국어 다중추론 질의응답을 위한 Dense Retrieval 사전학습)

  • Kang, Dong-Chan;Na, Seung-Hoon;Kim, Tae-Hyeong;Choi, Yun-Su;Chang, Du-Seong
    • Annual Conference on Human and Language Technology
    • /
    • 2021.10a
    • /
    • pp.588-591
    • /
    • 2021
  • 다중추론 질의응답 태스크는 하나의 문서만 필요한 기존의 단일추론 질의응답(Single-hop QA)을 넘어서 복잡한 추론을 요구하는 질문에 응답하는 것이 목표이다. IRQA에서는 검색 모델의 역할이 중요한 반면, 주목받고 있는 Dense Retrieval 모델 기반의 다중추론 질의응답 검색 모델은 찾기 어렵다. 본 논문에서는 검색분야에서 좋은 성능 보이고 있는 Dense Retrieval 모델의 다중추론을 위한 사전학습 방법을 제안하고 관련 한국어 데이터 셋에서 이전 방법과의 성능을 비교 측정하여 학습 방법의 유효성을 검증하고 있다. 이를 통해 지식 베이스, 엔터티 링킹, 개체명 인식모듈을 비롯한 다른 서브모듈을 사용하지 않고도 다중추론 Dense Retrieval 모델을 학습시킬 수 있음을 보였다.

  • PDF

Confidential Convergecast Based on Random Linear Network Coding for the Multi-hop Wireless Sensor Network

  • Davaabayar Ganchimeg;Sanghyun Ahn;Minyeong Gong
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.252-262
    • /
    • 2024
  • The multi-hop wireless sensor network (WSN) suffers from energy limitation and eavesdropping attacks. We propose a simple and energy-efficient convergecast mechanism using inter-flow random linear network coding that can provide confidentiality to the multi-hop WSN. Our scheme consists of two steps, constructing a logical tree of sensor nodes rooted at the sink node, with using the Bloom filter, and transmitting sensory data encoded by sensor nodes along the logical tree upward to the sink where the encoded data are decoded according to our proposed multi-hop network coding (MHNC) mechanism. We conducted simulations using OMNET++ CASTALIA-3.3 framework and validated that MHNC outperforms the conventional mechanism in terms of packet delivery ratio, data delivery time and energy efficiency.

Performance Analysis of Available Superframe Size and Device Discovery Time for Multi-hop Communications in IEEE 802.15.3 High-rate WPAN Mesh Network (IEEE 802.15.3 고속 WPAN 메쉬 네트워크의 멀티-홉 통신을 위한 가용 슈퍼프레임 크기와 디바이스 탐색 성능 분석)

  • Jung, Ssang-Bong;Yim, Soon-Bin;Kim, Hyun-Ki;Lee, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6B
    • /
    • pp.350-357
    • /
    • 2007
  • The IEEE 802.15.3 high-rate WPAN has been developed to communicate with devices within l0m. A piconet consists of one Piconet Coordinator (PNC) and several devices. The devices associated with a parent piconet can become child PNCs in order to form child piconets. A mesh network made up of a parent piconet and several child piconets can support multi-hop communications. In this paper, we analyze the maximum level and the avaliable superframe size to make the best use of bandwidth for multi-hop communications, and compare the analysis with the simulation results in terms of time to discover devices for multi-hop communications. The average number of levels in mesh networks is shown to be about 1.9 when the number of devices increases within a fixed area. We have also shown that the maximum available superframe size is 52ms and the discovery time is approximately 155ms.

Load-Balanced One-hop Overlay Multipath Routing with Path Diversity

  • Liao, Jianxin;Tian, Shengwen;Wang, Jingyu;Li, Tonghong;Qi, Qi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.443-461
    • /
    • 2014
  • Overlay routing has emerged as a promising approach to improve reliability and efficiency of the Internet. For one-hop overlay source routing, when a given primary path suffers from the link failure or performance degradation, the source can reroute the traffic to the destination via a strategically placed relay node. However, the over-heavy traffic passing through the same relay node may cause frequent package loss and delay jitter, which can degrade the throughput and utilization of the network. To overcome this problem, we propose a Load-Balanced One-hop Overlay Multipath Routing algorithm (LB-OOMR), in which the traffic is first split at the source edge nodes and then transmitted along multiple one-hop overlay paths. In order to determine an optimal split ratio for the traffic, we formulate the problem as a linear programming (LP) formulation, whose goal is to minimize the worse-case network congestion ratio. Since it is difficult to solve this LP problem in practical time, a heuristic algorithm is introduced to select the relay nodes for constructing the disjoint one-hop overlay paths, which greatly reduces the computational complexity of the LP algorithm. Simulations based on a real ISP network and a synthetic Internet topology show that our proposed algorithm can reduce the network congestion ratio dramatically, and achieve high-quality overlay routing service.

Detecting Inner Attackers and Colluded nodes in Wireless Sensor Networks Using Hop-depth algorithm (Hop-depth 알고리즘을 이용한 무선 센서 네트워크상에서의 내부공격자 및 공모노드 검출)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.1
    • /
    • pp.113-121
    • /
    • 2007
  • Commonly, in the Sensor Network that composed with multiple nodes uses Ad-hoc protocol to communicate each other. Each sensed data packets are collected by base node and processed by Host PC. But the Ad-hoc protocol is too vulnerable to Sinkhole attack, where the intruder attracts surrounding nodes with unfaithful routing information, and then performs selective forwarding or changes the data passing through it. The Sinkhole attack increases overhead over the network and boosts energy consumption speed to decrease network's life time. Since the other attacks can be easily adopted through sinkhole attack, the countermeasure must be considered carefully. In this paper, we proposed the Hop-depth algorithm that detects intruder in Sinkhole attack and colluded nodes. First, the proposed algorithm makes list of suspected nodes and identifies the real intruder in the suspected node list through the Hop-depth count value. And recalculates colluder's path information to find the real intruder. We evaluated the performance of the proposed algorithm using NS2. We compared and analyzed the success ratio of finding real intruder, false positive ratio, false negative ratio, and energy consumption.

An Adaptive Flooding Scheme using N-hop Look-ahead in MANET (MANET에서 N-hop 사전조사를 이용한 적응적인 플러딩 기법)

  • Jong, Jong-Hyeok;Oh, Im-Geol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.4
    • /
    • pp.32-39
    • /
    • 2006
  • MANET is a dynamically reconfigurable wireless network with no fixed infrastructure (base station, or AP). In order to provide the data service in MANET, we need an efficient routing protocol to deliver the data to the wanted destination at a mobile node. A method of routing protocols called reactive routing protocol has recently got attention because of their low routing overhead. But a method of flooding broadcasts the packet to all of its neighbors. For this reason, each of the node has high routing overhead to route and keep path discovery. Accordingly in this paper, I propose an adaptive flooding scheme using N-hop look-ahead in MANET, md an optimal N value of doing flooding the packet to limited area. Because of being basically ignorant about topological changes, each of the node did not spontaneously cope with path alteration. But an efficient flooding scheme applying N-hop look-ahead is more resilient to topology changes than traditional algorithms. And also with this efficient flooding scheme, the simulation results demonstrate excellent reduction of routing overhead.

  • PDF

A Routing Protocol supporting QoS in WiMAX based Wireless Mesh Networks (WiMAX 기반의 무선 메쉬 네트워크에서 QoS를 지원하는 라우팅 프로토콜)

  • Kim, Min;Kim, Hwa-Sung
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.1
    • /
    • pp.1-11
    • /
    • 2009
  • In this paper, we propose a QoS routing protocol for WiMAX based wireless mesh networks. The proposed routing protocol is a proactive hop-by-hop QoS routing protocol. It can find an optimal route that satisfies QoS requirements using bandwidth and delay as QoS parameters. In this paper, we first present a network model for WIMAX based wireless mesh networks and explain why QoS routing protocol is the most appropriate for WiMAX based wireless mesh networks. Then, we propose a proactive hop-by-hop QoS routing protocol that meets QoS requirements of traffic flowing between mesh client and the gateway. The simulation results show that the proposed routing protocol outperforms QOLSR protocol in terms of end-to-end delay, packet delivery ratio and routing overhead.