• Title/Summary/Keyword: Internet Ad

Search Result 412, Processing Time 0.026 seconds

Throughput and Delay Analysis of a Network Coding-enabled Cooperative MAC Protocol for Ad Hoc Networks

  • Jang, Jae-Shin;Kim, Sang-Wu;Wie, Sung-Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1668-1688
    • /
    • 2012
  • Cooperative communications and network coding schemes have been proposed to increase system throughput for ad hoc networks. In this paper, we present throughput and delay analysis of the new network coding-enabled cooperative MAC protocol called NC-MAC, which has been proposed by us in order to significantly enhance system performance. This protocol introduces an approach that can accommodate both cooperative communication and network coding for wireless ad hoc networks by slightly increasing overhead and modifying standards. The protocol's performance is evaluated using mathematical analysis and computer simulation and two performance measures, system throughput and average channel access delay, are used for a performance comparison with previous schemes. It is assumed that all the frames exchanged over a wireless channel are susceptible to transmission errors, which is a new but more reasonable assumption differentiating this research from previous research. Numerical results show this protocol provides significantly enhanced system performance compared with conventional cooperative MAC protocols used in previous research. For instance, system performance is 47% higher using the NC-MAC protocol than when using the rDCF protocol.

Self-Updating One-Time Password Mutual Authentication Protocol for Ad Hoc Network

  • Xu, Feng;Lv, Xin;Zhou, Qi;Liu, Xuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1817-1827
    • /
    • 2014
  • As a new type of wireless network, Ad hoc network does not depend on any pre-founded infrastructure, and it has no centralized control unit. The computation and transmission capability of each node are limited. In this paper, a self-updating one-time password mutual authentication protocol for Ad hoc network is proposed. The most significant feature is that a hash chain can update by itself smoothly and securely through capturing the secure bit of the tip. The updating process does not need any additional protocol or re-initialization process and can be continued indefinitely to give rise to an infinite length hash chain, that is, the times of authentication is unlimited without reconstructing a new hash chain. Besides, two random variable are added into the messages interacted during the mutual authentication, enabling the protocol to resist man-in-the-middle attack. Also, the user's identity information is introduced into the seed of hash chain, so the scheme achieves anonymity and traceability at the same time.

A Multi-hop Cooperative Transmission Protocol in Mobile Ad-hoc Wireless Networks (모바일 애드혹 무선 네트워크에서 멀티 홉 협력 전송 프로토콜)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.17-22
    • /
    • 2013
  • In this paper, we propose a multi-hop cooperative transmission protocol over Rayleigh fading channels. In the proposed protocol, the multi-hop cooperative transmission is used to improve the system performance. Due to broadcast nature, we do not limit the receiving node to be only the next node, but the destination and all the nodes between the transmitting node and the destination. The proposed protocol can hence save the average transmit power, compared with multi-hop direct transmission protocol due to the skipped transmissions from some intermediate nodes or chosen relays. The proposed scheme is implemented and evaluated in mobile ad-hoc wireless networks.

A Simulator of LBN Method for Fast Link Recovery over Wireless Ad-Hoc Networks (무선 애드 혹 망에서 빠른 경로 복구를 위한 LBN 방법의 시뮬레이터 구현)

  • Shin, Hyun-Ho;Park, Ji-Hoon;Joo, Bok-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.239-243
    • /
    • 2011
  • In wireless ad-hoc network, the detection of link breakage and re-establishing the route path causes lots of network overhead and results in communication delay. In the LBN method, the node causing a link breakage actively sends a message to neighbors so that they can instantly start re-establishing process of new path. In this paper we describe the result of network simulation we performed using NS2 to show the effectiveness of LBN method.

Modeling and Analyzing Per-flow Throughput in IEEE 802.11 Multi-hop Ad Hoc Networks

  • Lei, Lei;Zhao, Xinru;Cai, Shengsuo;Song, Xiaoqin;Zhang, Ting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4825-4847
    • /
    • 2016
  • In this paper, we focus on the per-flow throughput analysis of IEEE 802.11 multi-hop ad hoc networks. The importance of an accurate saturation throughput model lies in establishing the theoretical foundation for effective protocol performance improvements. We argue that the challenge in modeling the per-flow throughput in IEEE 802.11 multi-hop ad hoc networks lies in the analysis of the freezing process and probability of collisions. We first classify collisions occurring in the whole transmission process into instantaneous collisions and persistent collisions. Then we present a four-dimensional Markov chain model based on the notion of the fixed length channel slot to model the Binary Exponential Backoff (BEB) algorithm performed by a tagged node. We further adopt a continuous time Markov model to analyze the freezing process. Through an iterative way, we derive the per-flow throughput of the network. Finally, we validate the accuracy of our model by comparing the analytical results with that obtained by simulations.

Mechanism of Authentication Procedure between Ad Hoc Network and Sensor Network (에드 홉 네트워크와 개별 센서 네트워크 간의 인증 절차 메카니즘)

  • Kim, Seungmin;Yang, Jisoo;Kim, Hankyu;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.160-161
    • /
    • 2013
  • Extending mobile IP to ad hoc networks with the foreign agent acting as the bridge between the wired network and ad hoc networks can provide the global Internet connectivity for ad hoc hosts. The existing research in the area of the integrated wired and ad hoc network is carried out in a non-adversarial setting. This paper analysed an effective solution to solve the security related problems encountered in these integrated networks. This security protocol also excludes malicious nodes from performing the ad hoc network routing. This paper focuses on preventing ad hoc hosts from the attacks of anti-integrity.

  • PDF

Ralph Lauren's Design Characteristics and Brand Strategies of Ad Pictures on Internet Website (인터넷 광고(廣告)를 통(通)한 랄프 로렌의 브랜드 전략(戰略) 및 디자인 특성(特性))

  • Park, Hye-Won
    • Journal of Fashion Business
    • /
    • v.6 no.4
    • /
    • pp.125-140
    • /
    • 2002
  • The purpose of this study is confirming the design characteristics and brand strategies of Ralph Lauren's products through the advertising pictures on internet website. Methods of this study are the analysis of his brand growth process, concept strategy and designs by web promotion sites. Also this study defined his brand character and fashion mind. The Results are as follows. 1) Ralph Lauren's concept strategies are 1. Convert british type into American style 2. Presentation an American life style 3. Marketing strategy using life style and IT business. 2) Ralph Lauren's designs characters are 1. Rich and simple style by preppy look 2. Traditional wear of noble taste 3. Western style of American reclamation period 4. Using of comfortable material 5. Unique colors which are simbolic. Today, his classic and preppy designs all draw upon an image of old word wealth and luxury and he pioneered the concept of clothes as part of a lifestyle environment.

Supporting Mobile IP in Ad Hoc Networks with Wireless Backbone (무선 백본 기반 Ad Hoc 네트워크에서의 Mobile IP지원)

  • 신재욱;김응배;김상하
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.223-226
    • /
    • 2003
  • In this paper, we propose new agent discovery and route discovery schemes to support Mobile IP (MIP) in Ad Hoc networks with wireless backbone. The wireless backbone consisting of stationary wireless routers and Internet gateways (IGs) is a kind of wireless access network of IP-based core network. The proposed scheme utilizes favorable features of wireless backbone such as stable links and no energy constraints. In the agent discovery scheme, backbone-limited periodic Agent Advertisement (AA) and proxy-AA messages are used, which reduce network-wide broadcasting overhead caused by AA and Agent Solicitation messages and decentralize MIP processing overhead in IGs. In order to reduce delay time and control message overhead during route discovery far the destination outside Ad Hoc network, we propose a cache-based scheme which can be easily added to the conventional on-demand routing protocols. The proposed schemes can reduce control overhead during agent discovery and route discovery, and efficiently support MIP in Ad Hoc network with wireless backbone.

  • PDF

A Virtual Mobile Ad-Hoc Network Model to Improve Internet Connectivity among Heterogeneous Mobile Devices (이종 모바일 기기들의 인터넷 접속을 개선할 수 있는 가상 모바일 애드혹 네트워크 모델)

  • Uddin, Jia;Kim, Jong-Myon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.1
    • /
    • pp.31-41
    • /
    • 2014
  • This paper proposes a virtual mobile ad-hoc network (VMANET) model that automatically divides heterogeneous mobile devices of a MANET into a number of network groups depending on the communication capacity(data rate) of different network operational models such as IEEE 802.11g, IEEE 802.11b, and Frequency Hopping. In addition, it supports a distinct routing protocol for each network group of VMANETs, resulting in running multiple routing protocols concurrently on different groups of VMANETs. To reduce the network congestion and improve the network load balance, a default MANET gateway is configured in each VMANET and these gateways are responsible for integrating the MANET and IP networks. Experiment results show that the proposed model outperforms the conventional IMANET by significantly increasing throughput and reducing network congestion and network delay.

A study of performance improvement scheme in MIPv6 based on Ad-hoc (Ad-hoc 기반 MIPv6망에서 성능향상 기법 연구)

  • Jo Young-Jun;Ye Hwi-Jin;Moon Tae-Wook;Cho Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.402-405
    • /
    • 2006
  • Mobile IP has been designed to have mobile host users move from place to plate without changing their IP address. Ad-hoc network is a provisional network whose mobile host users construct networks by themselves without any assistance of infra structure network, using wireless interface. In this paper we discuss the scheme with which Ad-hoc network users ran access the Internet freely, using mobile IP protocol, and Ad-hot networks are access networks in the spotlight. In this paper we propose algorithm that support enhanced mobility between two Ad-hoc networks applying mobile IP at Ad-hoc routing protocol.

  • PDF