• Title/Summary/Keyword: Network protocol

Search Result 4,954, Processing Time 0.036 seconds

Review on Energy Efficient Clustering based Routing Protocol

  • Kanu Patel;Hardik Modi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.169-178
    • /
    • 2023
  • Wireless sensor network is wieldy use for IoT application. The sensor node consider as physical device in IoT architecture. This all sensor node are operated with battery so the power consumption is very high during the data communication and low during the sensing the environment. Without proper planning of data communication the network might be dead very early so primary objective of the cluster based routing protocol is to enhance the battery life and run the application for longer time. In this paper we have comprehensive of twenty research paper related with clustering based routing protocol. We have taken basic information, network simulation parameters and performance parameters for the comparison. In particular, we have taken clustering manner, node deployment, scalability, data aggregation, power consumption and implementation cost many more points for the comparison of all 20 protocol. Along with basic information we also consider the network simulation parameters like number of nodes, simulation time, simulator name, initial energy and communication range as well energy consumption, throughput, network lifetime, packet delivery ration, jitter and fault tolerance parameters about the performance parameters. Finally we have summarize the technical aspect and few common parameter must be fulfill or consider for the design energy efficient cluster based routing protocol.

A Study of CAN Routing Protocol for Efficient Communication Environment Based on Distance Vector Routing Protocol in Heterogeneous Field Sensor Network (이기종 필드 센서 네트워크의 효율적인 통신 환경을 위한 거리벡터 라우팅 프로토콜 기반 CAN 라우팅 프로토콜에 관한 연구)

  • Han, Kyoung-Heon;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.8
    • /
    • pp.1820-1826
    • /
    • 2013
  • Heterogeneous field sensor network between sensor to sensor is designed the CAN method to bus type structure in most using at industry. This Network is supporting a distance vector routing protocol on a characteristic structural a bus type. Also This network support to convert as making separate routing table in heterogeneous network. However distance vector routing protocol make a problem of decrease efficiency because of restriction of network expandability and low transmission process. We propose new CAN routing protocol to support network expandability and high transmission process of industry network. New CAN routing protocol structure addition priority and optional function field based on RIPv2. We established heterogeneous field sensor network, we measure data Throughput(bits/sec) for confirm new CAN routing protocol to increase efficient in industry.

Implementation of IPv6 Neighbor Discovery Protocol supporting CGA

  • Kim Joong Min;Park In Kap;Yu Jae Wook
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.571-575
    • /
    • 2004
  • Having age of ubiquitous ahead, existing IPv4's address space insufficiency phenomenon appears because of increasing network usage as well as multimedia data transmission becomes much, necessity of new IP address system that guarantee QoS are needed. IPv6 was made to solve these problem. IPv6 solves address space insufficiency phenomenon offering by 128bit address space, and also offers hierarchical address layer that support improved QoS. IPv6 defines relation between surrounding node using Neighbor Discovery protocol. Used Neighbor Discovery messages, grasp surrounding node, include important informations about network. These network information outcrops can give rise in network attack and also service that use network will paralysis. Various kinds of security limitation was found in Present Neighbor Discovery protocol therefore security function to supplement tris problem was required. In this thesis, Secure Neighbor Discovery protocol that add with security function was design and embody by CGA module and SEND module.

  • PDF

Improved Ad Hoc On-demand Distance Vector Routing(AODV) Protocol Based on Blockchain Node Detection in Ad Hoc Networks

  • Yan, Shuailing;Chung, Yeongjee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.46-55
    • /
    • 2020
  • Ad Hoc network is a special wireless network, mainly because the nodes are no control center, the topology is flexible, and the networking could be established quickly, which results the transmission stability is lower than other types of networks. In order to guarantee the transmission of data packets in the network effectively, an improved Queue Ad Hoc On-demand Distance Vector Routing protocol (Q-AODV) for node detection by using blockchain technology is proposed. In the route search process. Firstly, according to the node's daily communication record the cluster is formed by the source node using the smart contract and gradually extends to the path detection. Then the best optional path nodes are chained in the form of Merkle tree. Finally, the best path is chosen on the blockchain. Simulation experiments show that the stability of Q-AODV protocol is higher than the AODV protocol or the Dynamic Source Routing (DSR) protocol.

BL-CAST:Beacon-Less Broadcast Protocol for Vehicular Ad Hoc Networks

  • Khan, Ajmal;Cho, You-Ze
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1223-1236
    • /
    • 2014
  • With the extension of wireless technology, vehicular ad hoc networks provide important services for the dissemination of general data and emergency warnings. However, since, the vehicle topology frequently changes from a dense to a sparse network depending on the speed of the moving vehicles and the time of day, vehicular ad hoc networks require a protocol that can facilitate the efficient and reliable dissemination of emergency messages in a highly mobile environment under dense or intermittent vehicular connectivity. Therefore, this paper proposes a new vehicular broadcast protocol, called BL-CAST, that can operate effectively in both dense and sparse network scenarios. As a low overhead multi-hop broadcast protocol, BL-CAST does not rely on the periodic exchange of beacons for updating location information. Instead, the location information of a vehicle is included in a broadcast message to identify the last rebroadcasting vehicle in an intermittently connected network. Simulation results show that BL-CAST outperforms the DV-CAST protocol in terms of the end-to-end delay, message delivery ratio and network overhead.

Energy Aware Routing Protocol over Wireless Sensor Network (센서 네트워크에서 에너지 보유량을 고려한 라우팅 프로토콜)

  • Choi, Hae-Won;Yoo, Kee-Young
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.2
    • /
    • pp.28-34
    • /
    • 2008
  • This paper reports the problem in the previous routing protocol, EAR, and proposes an energy aware routing protocol to solve the problem in it. Proposed routing protocol considers the number of hops, the possibility of node exhaustion, and the node energy amount at the same time from the source to the sink. Thereby, it could efficiently solve the potential network separation problem and the sensing hole problem in EAR. Proposed routing protocol could remove the problems in the previous routing protocols but it still gets the advantages in them.

  • PDF

A Novel Authentication Protocol based on the Password scheme for Wireless Mesh Network (무선 메쉬 네트워크의 패스워드 기반 인증 프로토콜)

  • Lee, Kyu-Hwan;Lee, Ju-A;Kim, Jae-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.5
    • /
    • pp.54-62
    • /
    • 2007
  • We propose a novel authentication protocol for wireless mesh network. The proposed authentication protocol is based on the password scheme for convenience of users. The proposed protocol is evaluated through three analyses. The correctness of the proposed protocol is proved using the GNY analysis. By the security analysis, we show that the proposed protocol is resistant to various attacks. For the performance analysis, we implemented the protocol in Linux operating system based laptop and measured the transmission time. The analytic results show that the proposed protocol provides the secure wireless mesh network without considerable performance degradation.

ETRI Protocol Test Architecture and Its Application to CCS Network Service Part Protocols (ETRI 프로토콜 검증구조와 CCS망 서비스부 프로토콜에의 응용)

  • Gang, Yeong-Man;Cheon, Dae-Nyeong;Cha, Yeong-Hwan;Baek, Yeong-Sik;Choe, Yang-Hui
    • ETRI Journal
    • /
    • v.10 no.2
    • /
    • pp.3-12
    • /
    • 1988
  • Several ISDN (Integrated Services Digital Network) protocols have implemented at ETRI (Electronics and Telecommunications Research Institute) in an experimental network so that functional characteristics of the protocols under test could be certified against their protocol specifications with the help of the ETRI protocol test facilities. This paper describes ETRI protocol test architecture and its application to testing the NSP (Network Service Part) protocols : MTP (Message Transfer Part) level 3 and SCCP (Signalling Connection Control Part) of the CCITT CCS (Common Channel Signalling ) system No. 7 The test architecture presented here allows tests for two different protocol classes : peer-to-peer and multipeer protocolos. Some extensions are made to the conventional test architectures, namely the test coordination, test result transfer and network state observation method.

  • PDF

Research on the Feasibility of DAP-NAD for Wideband Tactical Ad-hoc Network (광대역 전술 Ad-hoc Network를 위한 DAP-NAD 가용성에 대한 연구)

  • Han, Se-Won;Kim, Byung-Seo;Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.199-204
    • /
    • 2011
  • This paper evaluates on the feasibility of MIL-STD-188-220 protocol as a medium access protocol over WNW(Wideband Network Waveform) by simulating and comparing with IEEE 802.11e-based protocol. WNW is newly designed waveform for next-generation broadband tactical communication system. This paper shows the feasibility of using the MIL-STD-188-220 protocol that shows better performance than IEEE 802.11e-based protocol on the particular environment.

A Comparative Analysis Of Routing Protocol In Mobile Ad-hoc Network Based On OMNeT++ (OMNeT++ 기반 Mobile Ad-hoc Network 라우팅 프로토콜 비교분석)

  • Kim, Sang Young;Lee, Byung-Jun;Cho, Young-Joo;Youn, Hee Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.63-64
    • /
    • 2016
  • Ad-hoc Network는 노드의 이동성과 제한된 배터리 수명에 의해 Network 토폴로지가 자주 교체되며 이런 연유로 적합한 Routing Protocol을 선택하는 것도 매우 중요한 과제이다. 본 논문에서는 자주 변화하는 Ad-hoc Network에 적합한 Routing Protocol을 선정하기 위해서 OMNeT++을 이용해 시뮬레이션 환경을 설정하고 각 Routing Protocol 특성을 파라미터 화시켜 적용, 요소별 수치를 비교 분석하여 성능평가를 하였다.

  • PDF