• Title/Summary/Keyword: Part Routing

Search Result 284, Processing Time 0.03 seconds

Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity

  • Hamarsheh, Ala;Goossens, Marnix;Alasem, Rafe
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.7
    • /
    • pp.1230-1251
    • /
    • 2011
  • This document specifies a new IPv6 deployment protocol called CHANC, which stands for Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity. The main part is an application level tunneling protocol that allows Internet Service Providers (ISPs) to rapidly start deploying IPv6 service to their subscribers whom connected to the Internet via IPv4-only access networks. It carries IPv6 packets over HTTP protocol to be transmitted across IPv4-only network infrastructure. The key aspects of this protocol are: offers IPv6 connectivity via IPv4-only access networks, stateless operation, economical solution, assures most firewall traversal, and requires simple installation and automatic configuration at customers' hosts. All data packets and routing information of the IPv6 protocol will be carried over the IPv4 network infrastructure. A simple application and a pseudo network driver must be installed at the end-user's hosts to make them able to work with this protocol. Such hosts will be able to auto-detect the ISP available connectivity in the following precedence: native IPv6, IPv6-in-IPv4, or no IPv6 connectivity. Because the protocol does not require changing or upgrading customer edges, a minimal cost in the deployment to IPv6 service should be expected. The simulation analysis showed that the performance of CHANC is pretty near to those of native IPv6, 6rd, and IPv4 protocols. Also, the performance of CHANC is much better than that of D6across4 protocol.

Development of a Distributed Rainfall-Runoff System for the Guem River Basin Using an Object-oriented Hydrological Modeling System (객체지향형 수문 모델링 시스템을 이용한 금강유역 분포형 강우-유출 시스템의 개발)

  • Lee, Gi-Ha;Takara, Kaoru;Jung, Kwan-Sue;Kim, Jeong-Yup;Jeon, Ja-Hun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.149-153
    • /
    • 2009
  • Physics-based distributed rainfall-runoff models are now commonly used in a variety of hydrologic applications such as to estimate flooding, water pollutant transport, sedimentation yield and so on. Moreover, it is not surprising that GIS has become an integral part of hydrologic research since this technology offers abundant information about spatial heterogeneity for both model parameters and input data that control hydrological processes. This study presents the development of a distributed rainfall-runoff prediction system for the Guem river basin ($9,835km^2$) using an Object-oriented Hydrological Modeling System (OHyMoS). We developed three types of element modules: Slope Runoff Module (SRM), Channel Routing Module (CRM), and Dam Reservoir Module (DRM) and then incorporated them systemically into a catchment modeling system under the OHyMoS. The study basin delineated by the 250m DEM (resampled from SRTM90) was divided into 14 midsize catchments and 80 sub-catchments where correspond to the WAMIS digital map. Each sub-catchment was represented by rectangular slope and channel components; water flows among these components were simulated by both SRM and CRM. In addition, outflows of two multi-purpose dams: Yongdam and Daechung dams were calculated by DRM reflecting decision makers' opinions. Therefore, the Guem river basin rainfall-runoff modeling system can provide not only each sub-catchment outflow but also dam inand outflow at one hour (or less) time step such that users can obtain comprehensive hydrological information readily for the effective and efficient flood control during a flood season.

  • PDF

Load Balancing Schemes in the MANET with Multiple Internet Gateways (다중 인터넷 게이트웨이를 갖는 MANET의 부하 균등화 기법)

  • Kim, Young-Min;Lim, Yu-Jin;Yu, Hyun;Lee, Jae-Hwoon;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.621-626
    • /
    • 2006
  • A mobile ad hoc network (MANET) is an infrastructureless network that supports multi-hop communication. For the MANET nodes wishing to communicate with nodes in the wired Internet, the global Internet connectivity is required and this functionality can be achieved with the help of the Internet gateway. For the support of reliability and flexibility, multiple Internet gateways can be provisioned for a MANET. In this case, load-balancing becomes one of the important issues since the network performance such as the network throughput can be improved if the loads of the gateways are well-balanced. In this paper, we categorize the load-balancing mechanisms and propose a new metric for load-balancing. Simulation results show that our proposed mechanism using the hop distance and the number of routing table entries as a load-balancing metric enhances the overall network throughput.

Design and Implementation of Double-Key based Light Weight Security Protocol in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 더블키를 이용한 경량 보안 프로토콜 설계 및 구현)

  • Zhung, Yon-Il;Lee, Sung-Young
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.239-254
    • /
    • 2007
  • Ubiquitous computing supports environment to freely connect to network without restrictions of place and time. This environment enables easy access and sharing of information, but because of easy unauthorized accesses, specified security policy is needed. Especially, ubiquitous sensor network devices use limited power and are small in size, so, many restrictions on policies are bound to happen. This paper proposes double-key based light weight security protocol, independent to specific sensor OS, platform and routing protocol in ubiquitous sensor network. The proposed protocol supports safe symmetric key distribution, and allows security manager to change and manage security levels and keys. This had a strong merit by which small process can make large security measures. In the performance evaluation, the proposed light weight security protocol using double-key in ubiquitous sensor network allows relatively efficient low power security policy. It will be efficient to ubiquitous sensor network, such as smart of ace and smart home.

The Regional transferring Model for Multicasting Service based on IP (IP 기반 멀티캐스트 서비스의 지역분할 전송 모델)

  • Jang, Kyung-Sung;Kim, Byung-Ki
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.637-646
    • /
    • 2001
  • The multicasting telecommunication is an important research as an applicable technique in the development of adaptable technique for modern mobile computing and mobile IP, because that is supposed to be a solution for transferring the large-size information on the mobile and wireless network with the narrow bandwidth. This paper will suggest one solution for the bidirectional tunneling and the local re-registration problems to support transferring mobile multicasting datagram by the partitioned network. The bidirectional tunneling technique is in use for mobile host moving around in a region and the local re-registration technique for crossing regions to reduce traffic load caused by transferring datagram along a long distance, and we compare those models with our suggested model by simulation.

  • PDF

Study on Construction of Multiple-Valued Logic Circuits Based on Reed-Muller Expansions (Reed-Muller 전개식에 의한 다치 논리회로의 구성에 관한 연구)

  • Seong, Hyeon-Kyeong
    • The KIPS Transactions:PartA
    • /
    • v.14A no.2
    • /
    • pp.107-116
    • /
    • 2007
  • In this paper, we present a method on the construction of multiple-valued circuits using Reed-Muller Expansions(RME). First, we discussed the input output interconnection of multiple valued function using Perfect Shuffle techniques and Kronecker product and designed the basic cells of performing the transform matrix and the reverse transform matrix of multiple valued RME using addition circuit and multiplication circuit of GF(4). Using these basic cells and the input-output interconnection technique based on Perfect Shuffle and Kronecker product, we implemented the multiple valued logic circuit based on RME. The proposed design method of multiple valued RME is simple and very efficient to reduce addition circuits and multiplication circuits as compared with other methods for same function because of using matrix transform based on modular structures. The proposed design method of multiple valued logic circuits is simple and regular for wire routing and possess the properties of concurrency and modularity of array.

A Study on Logical Cooperative Entity-Based Multicast Architecture Supporting Heterogeneous Group Mobility in Mobile Ad Hoc Networks (Mobile Ad Hoc 네트워크에서 이질적 그룹 이동성을 지원하는 논리적 협업 개체 기반의 멀티캐스트 구조 연구)

  • Kim, Kap-Dong;Kim, Sang-Ha
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.171-178
    • /
    • 2007
  • In mobile ad hoc networks, an application scenario requires mostly group mobility behavior in the mix of group moving nodes and individually moving nodes. The nodes of those applications tend to belong to the movement group with similar movement behavior. Group mobility is one of the good methods to improve scalability, and reduces the protocol overhead. In this paper, we propose the multicast architecture which regards nodes that have equal group mobility in the heterogeneous group mobility network as the single entity with the multiple interfaces and composes multicast tree, The logical cooperative entity-based multicast architecture accommodates the scalability, the multicast tree simplification, and the protocol overhead reduction which arc obtained from the hierarchical multicast architecture, while it maintains the nat multicast architecture for the data transmission. It also prevents the concentration of the energy consumption dispersing data forwarding load into the several ingress/egress nodes. Results obtained through simulations show that logical cooperative entity based multicast protocol with multiple interfaces offers the protocol scalability and the efficient data transmission.

An Energy Efficient Cluster Formation Algorithm for Wireless Sensor Networks (무선 센서 네트워크를 위한 에너지 효율적인 클러스터 구성 알고리즘)

  • Han, Uk-Pyo;Lee, Hee-Choon;Chung, Young-Jun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.185-190
    • /
    • 2007
  • The efficient node energy utilization is one of important performance factors in wireless sensor networks because sensor nodes operate with limited battery power. To extend the lifetime of the wireless sensor networks, maintaining balanced power consumption between sensor nodes is more important than reducing each energy consumption of the sensor node in the network. In this paper, we proposed a cluster formation algorithm to extend the lifetime of the networks and to maintain a balanced energy consumption of nodes. To obtain it, we add a tiny slot in a round frame, which enables to exchange the residual energy messages between the base station (BS). cluster heads, and nodes. The performance of the proposed protocol has been examined and evaluated with the NS 2 simulator. As a result of simulation, we have confirmed that our proposed algorithm show the better performance in terms of lifetime than LEACH. Consequently, our proposed protocol can effectively extend the network lifetime without other critical overhead and performance degradation.

TECDS Protocol for Wireless Ad Hoc Networks (무선 에드혹 네트워크를 위한 타이머를 이용한 CDS 구축)

  • Kim, Bo-Nam;Yang, Jun-Mo
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.365-370
    • /
    • 2007
  • Connected Dominating Set(CDS) has been used as a virtual backbone in wireless ad hoc networks by numerous routing and broadcast protocols. Although computing minimum CDS is known to be NP-hard, many protocols have been proposed to construct a sub-optimal CDS. However, these protocols are either too complicated, needing non- local information, not adaptive to topology changes, or fail to consider the difference of energy consumption for nodes in and outside of the CDS. In this paper, we present two Timer-based Energy-aware Connected Dominating Set Protocols(TECDS). The energy level at each node is taken into consideration when constructing the CDS. Our protocols are able to maintain and adjust the CDS when network topology is changed. The simulation results have shown that our protocols effectively construct energy-aware CDS with very competitive size and prolong the network operation under different level of nodal mobility.

Address Configuration and Route Determination in the MANET Connected to the External Network (외부 망에 연결된 MANET에서의 주소 설정 및 경로 결정)

  • Lee, Jae-Hwoon;Ahn, Sang-Hyun;Yu, Hyun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.539-546
    • /
    • 2008
  • In this paper, we propose an address autoconfiguration mechanism and a route establishment mechanism appropriate for the modified MANET architecture which overcomes the multi-link subnet problem. For the delivery of Router Advertisement (RA) messages without causing the duplicate packet reception problem in the multi-hop wireless network environment, the Scope-Extended RA (Scope-Extended Router Advertisement) message is defined. Also, by defining the MANET Prefix option, a MANET node is allowed to send packets destined to a host not in the MANET directly to the gateway. This can prevent the performance degradation caused by broadcasting control messages of the reactive routing protocol for route establishment. The performance of the proposed mechanism is analyzed through NS-2 based simulations and, according to the simulation results, it is shown that the proposed mechanism performs well in terms of the control message overhead.