• Title/Summary/Keyword: Routing overhead

Search Result 351, Processing Time 0.029 seconds

Design of Mobile Agent Model Supporting the Intelligent Path Search (지능형 경로 탐색 이동 에아전트 모델 설계)

  • Ko, Hyun;Kim, Kwang-Jong;Lee, Yon-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.7
    • /
    • pp.993-1000
    • /
    • 2002
  • In this paper, we design the CORBA-based Mobile Agent Model (CMAM) which has the capability of the efficient work processing in distributed environment through sensing network traffic and searching the optimal path for migration nodes of mobile agent. In case existing mobile agent model is given various works from user, the network overhead and traffic are increased by increasing of execution module size. Also, if it happens a large quantity of traffics due to migration of nodes according to appointment of the passive host(below node) routing schedule by user, it needs much cost for node search time by traffic. Therefore, in this paper, we design a new mobile agent m()del that assures the reliability of agent's migration through dynamic act on the specific situation according to appointment of the active routing schedule and can minimize agent's work processing time through optimal path search. The proposed model assigns routing schedule of the migration nodes actively using an extended MAFFinder. Also, for decreasing overhead of network by agent's size, it separates the existing mobile agent object by mobile agent including only agent calling module and push agent with work executing module based on distributed object type of CORBA. Also, it reduces the required time for round works of mobile agent through the optimal path search of migration nodes.

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

A Study on a Robust Clustered Group Multicast in Ad-hoc Networks (에드-혹 네트워크에서 신뢰성 있는 클러스터 기반 그룹 멀티캐스트 방식에 관한 연구)

  • Park, Yang-Jae;Lee, Jeong-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.163-170
    • /
    • 2003
  • In this paper we propose a robust clustered croup Multicast in Ad-hoc network. The proposed scheme applies to weighted clustered Algorithm. Ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or reliable support services such as wired network and base station. In ad hoc network routing protocol because of limited bandwidth and high mobility robust, simple and energy consume minimal. WCGM method uses a base structure founded on combination weighted value and applies combination weight value to cluster header keeping data transmission by scoped flooding, which is the advantage of the exiting FGMP method. Because this method has safe and reliable data transmission, it shows the effect to decrease both overhead to preserve transmission structure and overhead for data transmission.

MA(Mesh Adaptive)-CBRP Algorithm for Wireless Mesh Network (Wireless Mesh Network를 위한 MA(Mesh Adaptive)-CBRP 알고리즘의 제안)

  • Kim, Sung-Joon;Cho, Gyu-Seob
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1607-1617
    • /
    • 2010
  • In this paper we propose MA-CBRP, mesh adaptive algorithm for wireless mesh networks. MA-CBRP is a hybrid algorithm based on ad-hoc CBRP protocol. In MA-CBRP, the mesh router periodically sends the ANN message as like Hello-message in CBRP. ANN message allows to all clients periodically store a route towards the mesh-router and renewal information in their routing cache. While CBRP periodically reply Hello-message, MA-CBRP does not reply to achieve less overhead. After receiving ANN message, mesh client send JOIN message to mesh router when the route towards mesh router changed. at the same time Register the entry to mesh router, it can achieve to reduce overhead of control the route and shorten the time to find route. consequently, MA-CBRP shows 7% reduced overhead and shortened time to find route than CBRP with regardless of clients number.

Pathless Multihop Packet Forwarding Protocol for Inter-vehicular Communication (차량간 통신을 위한 비경로형 멀티 홉 패킷 포워딩 프로토콜)

  • Lee, Woo-Sin;Lee, Hyuk-Joon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.328-339
    • /
    • 2007
  • Conventional topology-based routing protocols are not suitable for inter-vehicular communication, where frequent route updates are necessary due to continuous and abrupt changes in network topology Position-based routing protocols are widely accepted to better serve their purpose in such a scenario as they do not require path discovery or maintenance. However they have to deal with the overhead of the location service and inaccurate position information. This paper proposes the MMFP (Multi-hop MAC Forwarding Protocol) for inter-vehicle communication that relies on reachability information collected from received packets in making a forwarding decision without path discovery. The MMFP is designed as an extension to the IEEE 802.11 MAC layer to ensure accuracy in its time-critical operations. This paper also presents some simulation results that demonstrate the superior performance of the MMFP over AODV in a realistic inter-vehicular communication.

A Disjoint Multi-path Routing Protocol for Efficient Transmission of Collecting Data in Wireless Sensor Network (무선 센서 네트워크에서 수집 데이터의 효과적인 전송을 위한 비겹침 다중경로 라우팅 프로토콜)

  • Han, Dae-Man;Lim, Jae-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.17C no.5
    • /
    • pp.433-440
    • /
    • 2010
  • Energy efficiency, low latency and scalability for wireless sensor networks are important requirements, especially, the wireless sensor network consist of a large number of sensor nodes should be minimized energy consumption of each node to extend network lifetime with limited battery power. An efficient algorithm and energy management technology for minimizing the energy consumption at each sensor node is also required to improve transfer rate. Thus, this paper propose no-overlap multi-pass protocol provides for sensor data transmission in the wireless sensor network environment. The proposed scheme should minimize network overhead through reduced a sensor data translation use to searched multi-path and added the multi-path in routing table. Proposed routing protocol may minimize the energy consumption at each node, thus prolong the lifetime of the sensor network regardless of where the sink node is located outside or inside the received signal strength range. To verify propriety proposed scheme constructs sensor networks adapt to current model using the real data and evaluate consumption of total energy.

On Improving Reliability of E-ODMRP (E-ODMRP의 신뢰성 향상에 관한 연구)

  • Jung, Young-Woo;Park, Joon-Sang
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.465-470
    • /
    • 2010
  • In this paper we propose a method which can be used to enhance the reliability of E-ODMRP (Enhanced On-Demand Multicast Routing Protocol). E-ODMRP has low overhead compared to its predecessors since it performs periodic refresh at a rate dynamically adapted to the nodes' mobility and adopts the local recovery. Upon detecting a broken route, a node performs a local search to graft to the forwarding mesh proactively. However in E-ODMRP there is no packet recovery mechanism. A receiver may lose some packets when it is detached from the multicast tree. We propose a simple packet recovery mechanism that can be incorporated into E-ODMRP for enhanced reliability. We show via simulation that our mechanism effectively enhances the reliability of E-ODMRP.

Cluster Label-based ZigBee Mesh Routing Protocol (클러스터 라벨 기반의 지그비 메쉬 라우팅 프로토콜)

  • Lee, Kwang-Koog;Kim, Seong-Hoon;Park, Hong-Seong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1164-1172
    • /
    • 2007
  • To solve scalability problem in the ZigBee Network, this paper presents a new mesh routing protocol for ZigBee, called ZigBee Cluster Label (ZiCL). ZiCL divides the ZigBee network into one or more logical clusters and then assigns a unique Cluster Label to each cluster so that it discovers a route of a destination node based on Cluster Label. When a node collects new Cluster Label information of a destination node according to discovery based on Cluster Label, ZiCL encourages nodes with the same Cluster Label to share the information. Consequen tly, it contributes on reducing numerical potential route discoveries and improving network performances such as routing overhead, end-to-end delay, and packet delivery ratio. Simulation results using NS-2 show ZiCL performs well.

Unmanned aerial vehicle routing algorithm using vehicular communication systems (차량 통신 시스템 기반 UAV 라우팅 알고리즘)

  • Kim, Ryul;Joo, Yang-Ick
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.7
    • /
    • pp.622-628
    • /
    • 2016
  • The prosperity of IT technologies and the removal of restrictions regarding Unmanned Aerial Vehicles (UAVs), also known as drones, have driven growth in their popularity. However, without a proper solution to the problem of accident avoidance for UAVs, this popularity increases the potential for collisions between UAVs and between UAV and terrain features. These collisions can occur because UAVs to date have flown using radio control or image recognition based autonomous navigation. Therefore, we propose efficient UAV routing schemes to tackle the collision problem using vehicular communication systems. Performance evaluation by computer simulation shows that the proposed methods effectively reduce the collision probability and improve the routing efficiency of the UAV. Furthermore, the proposed algorithms are compatible and can be directly applied with small overhead to the commercial vehicular communication system implementation.

Robust Backup Path Selection in Overlay Routing with Bloom Filters

  • Zhou, Xiaolei;Guo, Deke;Chen, Tao;Luo, Xueshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1890-1910
    • /
    • 2013
  • Routing overlay offers an ideal methodology to improve the end-to-end communication performance by deriving a backup path for any node pair. This paper focuses on a challenging issue of selecting a proper backup path to bypass the failures on the default path with high probability for any node pair. For existing backup path selection approaches, our trace-driven evaluation results demonstrate that the backup and default paths for any node pair overlap with high probability and hence usually fail simultaneously. Consequently, such approaches fail to derive a robust backup path that can take over in the presence of failure on the default path. In this paper, we propose a three-phase RBPS approach to identify a proper and robust backup path. It utilizes the traceroute probing approach to obtain the fine-grained topology information, and systematically employs the grid quorum system and the Bloom filter to reduce the resulting communication overhead. Two criteria, delay and fault-tolerant ability on average, of the backup path are proposed to evaluate the performance of our RBPS approach. Extensive trace-driven evaluations show that the fault-tolerant ability of the backup path can be improved by about 60%, while the delay gain ratio concentrated at 14% after replacing existing approaches with ours. Consequently, our approach can derive a more robust and available backup path for any node pair than existing approaches. This is more important than finding a backup path with the lowest delay compared to the default path for any node pair.