• Title/Summary/Keyword: Manet

Search Result 602, Processing Time 0.033 seconds

Performance Evaluation of MAC Protocols with Application to MANET Routing for Distributed Cognitive Radio Networks (분산 무선 인지 네트워크를 위한 MAC 프로토콜의 MANET 라우팅 적용 성능 분석)

  • Kwon, Sehoon;Kim, Hakwon;Kim, Bosung;Roh, Byeong-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.4
    • /
    • pp.97-106
    • /
    • 2014
  • In this paper, we propose a design method to extend certain cognitive radio (CR) MAC protocols originally proposed only for the one hop applications in distributed CR networks to MANET routing protocols. Among several CR MAC protocols, the opportunistic MAC (called O-MAC) and the opportunistic period MAC (called OP-MAC) are considered, and AODV as MANET routing protocol is used. We implement the protocols using OPNET network simulator, and compare the performances in both MAC and AODV routing environments. With the experiments, we analyze the relationship between MAC and routing performances of the CR protocols.

A Study on the Efficient ATICC(Adaptive Time Interval Clustering Control) Algorithm for MANET (MANET에서 효율적인 ATICC(Adaptive Time Interval Clustering Control) 알고리즘에 대한 연구)

  • Kim, Young-sam;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.306-309
    • /
    • 2009
  • MANET(Mobile Ad-hoc Network)은 기간망에 의존하지 않는 이동 노드들로 구성된 자율망 또는 추론망 토폴로지에 의한 멀티홉 무선 네트워크이다. MANET을 구성하는 각 노드의 이동성, 속도 그리고 에너지와 같은 다양한 속성정보는 망의 특징과 운영을 결정하는 요인이다. 특히 망의 운영상, 전송 대역폭과 에너지 사용에 따른 제약을 가지며 이러한 특징을 고려한 라우팅 프로토콜의 설계 및 하드웨어 개발이 중요하게 요구된다. 본 논문에서는 계층적 클러스터 구조의 MANET 환경에서 노드의 에너지 속성과 네트워크의 트래픽 상태를 고려한 적응적 시간차 노드관리 기법인 ATICC(Adaptive Time Interval Clustering Control)을 제안한다. 제안된 ATICC은 시간차 노드 관리기법인 TICC(Time Interval Clustering Control)[1]에 기반하며 노드에 최적화된 Active/Sleep, Idle Listening 상태를 적응적으로 설정한 후 패킷을 전송함으로서 계층적 클러스터 내의 각 노드의 균형적인 에너지 소모를 이루는 에너지 효율적인 방식이다. 제안한 노드관리 방법은 기존의 LEACH, TICC과 비교 실험하고 그 성능을 검증하였다. 실험 결과, 제안한 노드관리 방법이 노드별 에너지 소모량을 줄였으며 전체 네트워크의 생존시간을 연장함으로서 기존의 방법 보다 우수함을 확인하였다.

  • PDF

Using The Fixed ZRP Based MANET (MANET 기반의 Fixed ZRP를 이용한 효율적인 경로 탐색 기법)

  • Kim, Nack Hyun;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.463-466
    • /
    • 2009
  • MANET(Mobile Ad-Hoc Network) mean network that configured to mobile device without the help of Fixed infra. Node in MANET constraints have such as liquidity and battery. Node concentrated areas or the size of the network becomes large that causes some issues. It's the problem of routing overhead when path set, path navigation and reset path. In this paper ZRP(Zone Routing Protocol) and ZHLS(Zone-Based Hierarchical Link State) are analyzed. As a result, offers the Fixed ZRP.

  • PDF

A Simulation-based Analysis and Verification Method for Network Vulnerability (시뮬레이션 기반 네트워크 보안 취약점 분석 및 검증 방안)

  • Lee, Hyun-Jin;Kim, Kwang-hee;Lee, Haeng-Ho
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.659-666
    • /
    • 2019
  • MANET can be applied to various applications as it can autonomously configure the network with only mobile nodes. However, the network can be vulnerable to cyber attacks because it is organized in a distributed environment without central control or management. In this paper, we propose a simulation-based network security vulnerability analysis and verification method. Using this method, we simulated the routing message modification attack, Sybil node attack, and TLV message modification attack that may frequently occur in MANET, and confirmed that similar vulnerabilities can be occurred in the real system. Therefore, the proposed method can be used to improve the accuracy of the protocol design by verifying possible security vulnerabilities through simulation during the protocol design procedure.

Transmission Performance of Video Traffic on Underwater MANET (수중 MANET에서 비디오 트래픽의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.49-54
    • /
    • 2019
  • Since the underwater communication environment, which is used mainly in acoustic channel, is different from terestrial communication, it needs to analyze the appropriate transmission performance in underwater environment to implement the communication services. Appropriate traffic process method for a communication service is required through transmission performance of object traffic for the communication service. In this paper, transmission performance of video traffic on underwater MANET(Mobile Ad-hoc Network) is analyzed and video traffic configuration scheme on underwater MANET with results of performance analysis is suggested, This study is done with computer simulation based on NS(Network Simulator)-3. throughput, transmission delay, packet loss rate is used for transmission performance.

Performance Variations of AODV, DSDV and DSR Protocols in MANET under CBR Traffic using NS-2.35

  • Chandra, Pankaj;Soni, Santosh
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.13-20
    • /
    • 2022
  • Basically Mobile Ad Hoc Network (MANET) is an autonomous system with the collection of mobile nodes, these nodes are connected to each other by using wireless networks. A mobile ad hoc network poses this quality which makes topology in dynamic manner. As this type of network is Ad Hoc in nature hence it doesn't have fixed infrastructure. If a node wishes to transfer data from source node to a sink node in the network, the data must be passed through intermediate nodes to reach the destination node, hence in this process data packet loss occurs in various MANET protocols. This research study gives a comparison of various Mobile Ad Hoc Network routing protocols like proactive (DSDV) and reactive (AODV, DSR) by using random topology with more intermediate nodes using CBR traffic. Our simulation used 50, 100, and 150 nodes variations to examine the performance of the MANET routing protocols. We compared the performance of DSDV, AODV and DSR, MANET routing protocols with the result of existing protocol using NS-2 environment, on the basis of different performance parameters like Packet Delivery Ratio, average throughput and average end to end delay. Finally we found that our results are better in terms of throughput and packet delivery ratio along with low data loss.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

Distributed Address Configuration Mechanism Using Address Pool in MANET (MANET 환경에서 주소 영역기반 주소할당 분산기법)

  • Ahn, Sang-Hyun;Lim, Yu-Jin;Yu, Hyun
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.753-760
    • /
    • 2009
  • As it becomes increasingly important that Internet access is available anywhere at any time, providing MANET (Mobile Ad-Hoc Network) with the Internet access attracts more attention. The existing DHCP (Dynamic Host Configuration Protocol) address configuration schemes require message exchanges between MANET nodes and the DHCP server through multi-hop routes. Messages can be easily dropped in the wireless multi-hop communication environment and the address configuration may be instable and need long delay. In this paper, we propose a new address configuration scheme using the concept of address pool allocation. In the proposed scheme, the DHCP server assigns a part of its address pool to a node instead of a single address and the node can assign a part of its own address pool to its neighbor nodes. Through simulation studies, we show that our scheme yields about 77% of the address configuration delay and 61% of the control message overhead of the existing DHCP based mechanism.

A Study on Improvement of AODV for Hybrid Wireless Mesh Networks (혼합형 무선 메시 네트워크를 위한 AODV 개선 연구)

  • Kim, Ho-Cheal
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.8
    • /
    • pp.943-953
    • /
    • 2013
  • By the enormous increase in mobile nodes and diverse service requests on wireless networks, wireless mesh network(WMN) takes an interest as the solution for such requests. However, lots of issues which should be solved to deploy WMN are still remained. In the network layer, the performance improvement of routing protocols is the major issue of nowadays researches. WMN can be easily deployed by use of protocols for mobile ad-hoc networks(MANET) because it is much similar with MANET in multi-hop wireless routing and which node plays as host and router concurrently. Unfortunately, most routing protocols for MANET have drawbacks such as large traffic overhead and long delay time for route discovery due to the network extension. They are major factors of performance degradation of WMN and most researches are focused on them. In this paper, domain-based AODV which is amended AODV to be applied in hybrid WMN is proposed. The proposed scheme divides a hybrid WMN as several domains and performs route discovery by header layer domain. Therefore it can reduce the distance for route discovery as much as average hop count between domain header and member nodes. From the simulation, domain-based AODV was showed slowly increasing delay time due to the network extension.

A Study on Improvement of Routing Performance for Wireless Mesh Networks (무선 메시 네트워크의 라우팅 성능 개선 연구)

  • Kim, Ho-Cheal
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.5
    • /
    • pp.2422-2429
    • /
    • 2013
  • WMN is considered as a core methodology to provide mobile wireless network service with multi-hop routing feature. It has a merit that can be easily deployed by utilization of protocols for MANET. However, it has differences in supporting multiple networks and channels, network architecture, and so on. Especially, in case of routing protocols, to apply them intactly to WMN can be a cause of low performance because of do not moving mesh routers. AODV seems like suitable for WMN among the various routing protocols for MANET. However, it has a defect in scalability. In this paper, an enhanced AODV routing method for WMN was proposed. The proposed method was designed to be suitable to the architecture of WMN by use of layering and localizing the broadcasting domain.