• 제목/요약/키워드: Mobile wireless networks

검색결과 1,350건 처리시간 0.036초

이동호스트의 수신신호를 이용한 유무선 혼합망에서의 TCP 성능 향상 (Improving the Performance of TCP over Wired-Wireless Networks Using the Received Signal Strengths of Mobile Host)

  • 김진희;권경희
    • 정보처리학회논문지C
    • /
    • 제13C권5호
    • /
    • pp.635-640
    • /
    • 2006
  • 유무선 혼합망에서 BS(Base Station : 기지국)에 Snoop을 이용한 지역 재전송기법은 무선망에서 패킷이 손실되면 빠른 복구를 가능하게 하지만 MH(Mobile Host:이동호스트)가 수신범위를 벗어나면서 생긴 패킷 손실 시에는 오히려 성능 저하의 원인이 될 수 있다. 따라서 본 논문에서는 MH가 수신범위를 벗어나면서 생기는 패킷 손실과 그로 인한 지역 재전송을 최소화하기 위해 MH의 ACK 패킷에 RSS(Received Signal Strengths:수신신호세기)를 나타내는 flag bit추가를 제안한다. BS는 RSS flag bit를 이용해서 패킷 전송여부를 결정함으로써 패킷 손실을 최소화하는 것이다. 시뮬레이션 결과 기존의 Snoop에 비해 TCP 성능이 향상됨을 확인할 수 있었다.

모바일 애드혹 무선 네트워크에서 멀티 홉 협력 전송 프로토콜 (A Multi-hop Cooperative Transmission Protocol in Mobile Ad-hoc Wireless Networks)

  • 공형윤
    • 한국인터넷방송통신학회논문지
    • /
    • 제13권4호
    • /
    • pp.17-22
    • /
    • 2013
  • 본 논문에서는 레일리 페이딩 채널의 멀티 홉 협력 전송 프로토콜을 제안한다. 제안된 프로토콜에서, 멀티 홉 협력 전송은 시스템 성능의 향상을 위해 사용되었다. 중계라는 특성으로 인해, 전송받는 노드와 다음의 노드뿐만 아니라, 목적지와 그 사이의 전송 받는 모든 노드들이 제한되어 있지 않다. 제안된 프로토콜은 선택된 릴레이나 몇몇의 중간 노드로부터 건너 뛰어 전송되는 멀티 홉 직접 전송 프로토콜에 비해 평균 전송 전력을 절약할 수 있다. 제안하는 기법은 모바일 ad-hoc 무선 네트워크에서 시행 및 평가되어진다.

차세대 무선 이동 통신망에서의 이 동성 제어 방안에 관한 고찰 (A study on the mobility control in the next generation wireless mobile network)

  • 김덕중;김재학;김형택;안길환
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2007년도 학술대회
    • /
    • pp.273-278
    • /
    • 2007
  • In the next generation wireless mobile network, various methods are studied to offer interworking and mobility between various radio networks. To offer these harmoniously, network adaptation methods based on IP is generalized, and specifications of host-based mobility method with Mobile IPv4 and Mobile IPv6 to offer IP's mobility are defined in IETF specially. However, it is insufficient to satisfy quality of service that should be offered in wireless mobile network environment. Alternatively studies about Network-Based Mobility of Proxy Mobile IPv4, Proxy Mobile IPv6 etc. are preceded. This paper presents optimum plan that can offer mobility in the next generation radio transfer communication network by comparing and analyzing IP mobility methods divided by Host-based Mobility and Network-based Mobility.

  • PDF

이동 애드혹 네트워크에서의 안정 경로 선택 알고리즘 (A Reliable Route Selection Algorithm in Mobile Ad-hoc Networks)

  • 김원익;서영주;안성옥
    • 한국정보과학회논문지:정보통신
    • /
    • 제29권3호
    • /
    • pp.314-323
    • /
    • 2002
  • 유선 네트워크 환경을 위해 설계된 경로 설정 프로토콜들은 대역폭의 제한성과 예측할 수 없는 위상의 변화로 인해 이동 애드혹 (ad-hoc) 네트워크 환경에 적용하기에는 부적합하다. 최근 들어 애드혹 네트워크 환경에 적합한 경로 설정 프로토콜들이 많이 개발되었다. 그러나 위상이 급격히 변화하는 애드혹 네트워크에서 멀티미디어 데이타 전송과 같이 실시간 서비스를 지원하기에는 이러한 애드혹 경로 설정 프로토콜로는 한계가 있다. 본 논문에서는 애드혹 네트워크에서의 위상 변화에 대한 적응력을 향상시키기 위해서 위성 위치 확인 시스템 (GPS: Global Positioning System)을 활용한 가상 지역 (안정 지역, 경고 지역) 개념을 제안하고 있고 AODV의 경로 설립 과정 시 이러한 가상 지역 개념을 도입함으로써 이동 단말의 이동성에 의한 위상의 변화에도 잘 적응할 수 있는 안정된 경로의 설립을 목표로 하고 있다. 본 논문에서는 시뮬레이션을 통하여 다양한 트래픽 상태와 단말들의 이동성 형태에 따른 중요 변수들을 설명하였으며 이에 따라 제안하는 경로 설정 프로토콜들의 효율성을 검증하고 있다.

Analytical Approach of Proxy-LMA Mobility System in Heterogeneous IP-based Mobile Networks

  • Cho, Chulhee;Choi, Jae-Young;Jeong, Jongpil
    • International journal of advanced smart convergence
    • /
    • 제4권1호
    • /
    • pp.71-87
    • /
    • 2015
  • Mobile users want to be provided with undisrupted network services when they navigate on the Next-Generation (NG) wireless networks. For that, interlocking with a heterogeneous network is important, but there have been few studies on the method for guaranteeing global mobility. Thus, this paper proposes the Proxy-LMA technique, the mobile IP-based global inter-networking system, to enhance global mobility and interoperability within the Next-Generation (NG) network environment. The purpose of the proposed Proxy-LMA system is to expand the boundary of the mobility with regards to the existing mobility management protocol (PMIPv6 and MIPv6) in order to guarantee global mobility and interoperability within the heterogeneous network environment. The results of the performance evaluation showed that the proposed Proxy-LMA system was more efficient than other methods from the standpoint of signaling cost and delay in the heterogeneous network environment.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • 한국멀티미디어학회논문지
    • /
    • 제10권12호
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • 제18권2호
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

A Simple Path Prediction Scheme to Improve Handoff Efficiency in All-IP Wireless Networks

  • Zhu, Huamin;Kwak, Kyung-sup
    • 한국통신학회논문지
    • /
    • 제29권7A호
    • /
    • pp.781-785
    • /
    • 2004
  • Mobile IP maintains Internet connectivity while Mobile Hosts moving from one Internet attachment point to another. However, Mobile If is not appropriate for seamless mobility. Some micromobility protocols were proposed to complement Mobile IP by offering fast and seamless handoff control in limited geographical areas. In this paper, a new scheme, based on path prediction and resource reservation, is proposed to reduce the handoff latency by trying to eliminate the link setup time for fast handoff in all-IP wireless networks. Analytical results show that the proposed scheme offers shorter handoff delay and can improve the handoff efficiency.

A Single Mobile Target Tracking in Voronoi-based Clustered Wireless Sensor Network

  • Chen, Jiehui;Salim, Mariam B.;Matsumoto, Mitsuji
    • Journal of Information Processing Systems
    • /
    • 제7권1호
    • /
    • pp.17-28
    • /
    • 2011
  • Despite the fact that the deployment of sensor networks and target tracking could both be managed by taking full advantage of Voronoi diagrams, very little few have been made in this regard. In this paper, we designed an optimized barrier coverage and an energy-efficient clustering algorithm for forming Vonoroi-based Wireless Sensor Networks(WSN) in which we proposed a mobile target tracking scheme (CTT&MAV) that takes full advantage of Voronoi-diagram boundary to improve detectability. Simulations verified that CTT&MAV outperforms random walk, random waypoint, random direction and Gauss-Markov in terms of both the average hop distance that the mobile target moved before being detected and lower sensor death rate. Moreover, we demonstrate that our results are robust as realistic sensing models and also validate our observations through extensive simulations.

Optical Wireless Access Point Agent Networks

  • Lee, Tae-Gyu
    • Journal of the Optical Society of Korea
    • /
    • 제13권1호
    • /
    • pp.98-106
    • /
    • 2009
  • This paper proposes an optical wireless transfer agent method which realizes the continuous and swift data transfer of optical wireless terminals in optical wireless networks. The unguided wireless channel generally shows frequent link disconnections and propagation delays due to weak wireless links. Specially speaking, optical wireless channels have more vulnerable links and roaming propagation delays relative to the weakness of the previous RF channels due to their low signal connectivity and small geographic coverage. Conventional optical wireless network protocols did not consider any fault models about physical link faults. Consequently, they have shown data transfer inefficiency for both data link control and physical wireless link control. To overcome these optical wireless environmental problems, this paper suggests a new wireless access point (or base station) agent system, which provides wireless or mobile clients with previous link layer protocols compensated.