• Title/Summary/Keyword: Mobile wireless networks

Search Result 1,350, Processing Time 0.031 seconds

Improving the Performance of TCP over Wired-Wireless Networks Using the Received Signal Strengths of Mobile Host (이동호스트의 수신신호를 이용한 유무선 혼합망에서의 TCP 성능 향상)

  • Kim, Jin-Hee;Kwon, Kyun-Hee
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.635-640
    • /
    • 2006
  • The Snoop in the BS (Base Station) performs a local retransmission over wired-wireless networks to recover packet loss quickly. However, when the MH (Mobile Host) leaves the reception range of the signal, the local retransmission causes performance to degrade. In this paper, we minimize the packet loss and local retransmission caused by the unreachability from BS to MH to improve network performance. To do this, we suggest to add RSS(Received Signal Strengths) flag bit in ACK packet of MH. By using this flag bit, the BS decides whether it retransmits or not to minimize packet loss. The result of the simulation by ns-2 shows a big improvement of performance in the networks.

A Multi-hop Cooperative Transmission Protocol in Mobile Ad-hoc Wireless Networks (모바일 애드혹 무선 네트워크에서 멀티 홉 협력 전송 프로토콜)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.17-22
    • /
    • 2013
  • In this paper, we propose a multi-hop cooperative transmission protocol over Rayleigh fading channels. In the proposed protocol, the multi-hop cooperative transmission is used to improve the system performance. Due to broadcast nature, we do not limit the receiving node to be only the next node, but the destination and all the nodes between the transmitting node and the destination. The proposed protocol can hence save the average transmit power, compared with multi-hop direct transmission protocol due to the skipped transmissions from some intermediate nodes or chosen relays. The proposed scheme is implemented and evaluated in mobile ad-hoc wireless networks.

A study on the mobility control in the next generation wireless mobile network (차세대 무선 이동 통신망에서의 이 동성 제어 방안에 관한 고찰)

  • Kim, Duck-Jung;Kim, Jae-Hak;Kim, Hyoung-Taek;Ahn, Gil-Whan
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.273-278
    • /
    • 2007
  • In the next generation wireless mobile network, various methods are studied to offer interworking and mobility between various radio networks. To offer these harmoniously, network adaptation methods based on IP is generalized, and specifications of host-based mobility method with Mobile IPv4 and Mobile IPv6 to offer IP's mobility are defined in IETF specially. However, it is insufficient to satisfy quality of service that should be offered in wireless mobile network environment. Alternatively studies about Network-Based Mobility of Proxy Mobile IPv4, Proxy Mobile IPv6 etc. are preceded. This paper presents optimum plan that can offer mobility in the next generation radio transfer communication network by comparing and analyzing IP mobility methods divided by Host-based Mobility and Network-based Mobility.

  • PDF

A Reliable Route Selection Algorithm in Mobile Ad-hoc Networks (이동 애드혹 네트워크에서의 안정 경로 선택 알고리즘)

  • Kim, Won-Ik;Suh, Young-Joo;An, Syung-Og
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.314-323
    • /
    • 2002
  • The routing protocols designed for wired networks can hardly be used for mobile ad-hoc networks due to limited bandwidth of wireless transmission and unpredictable topological change. Recently, several routing protocols for mobile ad-hoc networks have been Proposed. However, when theme protocols are applied to support real time services like multimedia transmission, they still have problems in ad-hoc networks, where the topology changes drastically. In this paper, we propose a new route selection algorithm which selects the most reliable route that is impervious to route failures by topological changes by mobile hoots. For reliable route selection, the concept of virtual zone (stable zone and caution zone) is proposed. The zone is located in a mobile node'transmission range and determined by mobile node's mobility information received by Global Positioning System (GPS). The proposed algorithm is applied to the route discovery procedure of the existing on-demand routing protocol, AODV, and evaluated by simulation in various traffic conditions and mobility patterns.

Analytical Approach of Proxy-LMA Mobility System in Heterogeneous IP-based Mobile Networks

  • Cho, Chulhee;Choi, Jae-Young;Jeong, Jongpil
    • International journal of advanced smart convergence
    • /
    • v.4 no.1
    • /
    • pp.71-87
    • /
    • 2015
  • Mobile users want to be provided with undisrupted network services when they navigate on the Next-Generation (NG) wireless networks. For that, interlocking with a heterogeneous network is important, but there have been few studies on the method for guaranteeing global mobility. Thus, this paper proposes the Proxy-LMA technique, the mobile IP-based global inter-networking system, to enhance global mobility and interoperability within the Next-Generation (NG) network environment. The purpose of the proposed Proxy-LMA system is to expand the boundary of the mobility with regards to the existing mobility management protocol (PMIPv6 and MIPv6) in order to guarantee global mobility and interoperability within the heterogeneous network environment. The results of the performance evaluation showed that the proposed Proxy-LMA system was more efficient than other methods from the standpoint of signaling cost and delay in the heterogeneous network environment.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.2
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

A Simple Path Prediction Scheme to Improve Handoff Efficiency in All-IP Wireless Networks

  • Zhu, Huamin;Kwak, Kyung-sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7A
    • /
    • pp.781-785
    • /
    • 2004
  • Mobile IP maintains Internet connectivity while Mobile Hosts moving from one Internet attachment point to another. However, Mobile If is not appropriate for seamless mobility. Some micromobility protocols were proposed to complement Mobile IP by offering fast and seamless handoff control in limited geographical areas. In this paper, a new scheme, based on path prediction and resource reservation, is proposed to reduce the handoff latency by trying to eliminate the link setup time for fast handoff in all-IP wireless networks. Analytical results show that the proposed scheme offers shorter handoff delay and can improve the handoff efficiency.

A Single Mobile Target Tracking in Voronoi-based Clustered Wireless Sensor Network

  • Chen, Jiehui;Salim, Mariam B.;Matsumoto, Mitsuji
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.17-28
    • /
    • 2011
  • Despite the fact that the deployment of sensor networks and target tracking could both be managed by taking full advantage of Voronoi diagrams, very little few have been made in this regard. In this paper, we designed an optimized barrier coverage and an energy-efficient clustering algorithm for forming Vonoroi-based Wireless Sensor Networks(WSN) in which we proposed a mobile target tracking scheme (CTT&MAV) that takes full advantage of Voronoi-diagram boundary to improve detectability. Simulations verified that CTT&MAV outperforms random walk, random waypoint, random direction and Gauss-Markov in terms of both the average hop distance that the mobile target moved before being detected and lower sensor death rate. Moreover, we demonstrate that our results are robust as realistic sensing models and also validate our observations through extensive simulations.

Optical Wireless Access Point Agent Networks

  • Lee, Tae-Gyu
    • Journal of the Optical Society of Korea
    • /
    • v.13 no.1
    • /
    • pp.98-106
    • /
    • 2009
  • This paper proposes an optical wireless transfer agent method which realizes the continuous and swift data transfer of optical wireless terminals in optical wireless networks. The unguided wireless channel generally shows frequent link disconnections and propagation delays due to weak wireless links. Specially speaking, optical wireless channels have more vulnerable links and roaming propagation delays relative to the weakness of the previous RF channels due to their low signal connectivity and small geographic coverage. Conventional optical wireless network protocols did not consider any fault models about physical link faults. Consequently, they have shown data transfer inefficiency for both data link control and physical wireless link control. To overcome these optical wireless environmental problems, this paper suggests a new wireless access point (or base station) agent system, which provides wireless or mobile clients with previous link layer protocols compensated.