• Title/Summary/Keyword: Wireless ad-hoc network

Search Result 715, Processing Time 0.028 seconds

Performace Evaluation of Global MANET adapted to Internet Access solution (인터넷 억세스 솔루션을 적용한 Global MANET의 성능 분석)

  • Jung, Chan-Hyuk;Oh, Se-Duk;Kim, Hyun-Wook;Lee, Kwang-Bae;Yu, Choung-Ryoul;Mun, Tae-Su
    • Journal of IKEEE
    • /
    • v.10 no.1 s.18
    • /
    • pp.75-86
    • /
    • 2006
  • The MANET that can make autonomous distributed Network with Routing function has many differences than past wireless communication. For upcoming ALL-IP environment, MANET device should be connected with wired Internet Network and MANET is required to have a gateway to bridge two different networks to share information from any place. In this paper, Using the GMAHN Algorithm proposed Proactive, Reactive, Hybrid method that provides Inteface between Wired Internet network and MANET, we learned each method's the advantage and disadvantage through the various network environments. And also, we presented the optimization method of Hybrid combined Proactive with Reactive.

  • PDF

Design and Implementation of Multi-rate Broadcast based Link Quality Measurement for WLAN Mesh Network (다중 전송률을 반영한 무선랜 매쉬 링크 품질 측정방법의 설계 및 구현)

  • Lee, Duck-Hwan;Yang, Seung-Chur;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9A
    • /
    • pp.801-808
    • /
    • 2011
  • We propose MBAP(Multi-rate Broadcast Active Probing) technique to get the right measurements for link quality in Wireless Mesh Network (WMN). Most routing protocols for WMN make use of link quality-aware routing metrics, such as ETX(Expected Transmission Count) and ETT(Expected Transmission Time), while the hop count is usually used in MANET (Mobile Ad-hoc NETwork). A broadcast based active proving technique is adopted in the previous studies to get the ETX or ETT of a link. However this technique does not reflect the multi-rate feature of WLAN because it uses a single fixed transmission rate for broadcast which usually differs from the actual rate used in data transmissions. MBAP overcomes this shortage by exploiting various rate broadcast frames for probing. We implement MBAP on linux system by modifying WLAN driver and related kernel sub-systems. Experimental results show that MBAP can capture link quality more accurately than the existing techniques.

Environment Monitoring System Using RF Sensor (RF 센서를 이용한 해양 환경 관리 시스템)

  • Cha, Jin-Man;Park, Yeoun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.896-898
    • /
    • 2012
  • Recently, many countries are making efforts for the development of ocean resources because the necessity and importance of the ocean resources are increased. Underwater sensor networks have emerged as a very powerful technique for many applications, including monitoring, measurement, surveillance and control and envisioned to enable applications for oceanographic data collection, ocean sampling, environmental and pollution monitoring, offshore exploration, disaster prevention, tsunami and seaquake warning, assisted navigation, distributed tactical surveillance, and mine reconnaissance. The idea of applying sensor networks into underwater environments (i.e., forming underwater sensor networks) has received increasing interests in monitoring aquatic environments for scientific, environmental, commercial, safety, and military reasons. The data obtained by observing around the environment are wireless-transmitted by a radio set with various waves. According to the technical development of the medium set, some parameters restricted in observing the ocean have been gradually developed with the solution of power, distance, and corrosion and watertight by the seawater. The actual matters such as variety of required data, real-time observation, and data transmission, however, have not enough been improved just as various telecommunication systems on the land. In this paper, a wireless management system will be studied through a setup of wireless network available at fishery around the coast, real-time environmental observation with RF sensor, and data collection by a sensing device at the coastal areas.

  • PDF

Adaptive Resource Allocation for Efficient Power Control Game in Wireless Networks (무선 네트워크에서 효율적인 전력 제어 게임을 위한 적응 자원 할당 기법)

  • Wang, Jin-Soo;Park, Jae-Cheol;Hwang, Sung-Hyun;Kim, Chang-Joo;Kim, Yun-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3A
    • /
    • pp.221-228
    • /
    • 2009
  • We consider distributed resource allocation among the links in a wireless network to minimize the total transmit power of the network while meeting the target rate required by each link. The problem to be solved is how to change the amount of wireless resource allocated and the number of links sharing the resource according to the interference environment so that the following distributed power control game converges to a stable point. To provide a distributed method with less complexity and lower information exchange than the centralized optimal method, we define the resource sharing level among the links from which the size of resource allocated and the links sharing the resource are determined distributively. It is shown that the performance of the proposed method is better than that of the conventional methods, orthogonal resource allocation only and resource sharing only, as well as it approaches to that of the optimal method.

QoS Mesh Routing Protocol for IEEE 802.16 based Wireless Mesh Networks (IEEE 802.16 기반의 무선 메쉬 네트워크를 위한 QoS 메쉬 라우팅 프로토콜)

  • Kim, Min;Kim, Hwa-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1226-1237
    • /
    • 2007
  • This paper proposes QoS mesh routing protocol for IEEE 802.16 based wireless mesh networks. QoS mesh routing protocol proposed in this paper is a proactive hop-by-hop QoS routing protocol. The goal of our routing protocol is not only to find a route from a source to a destination, but also optimal route that satisfies QoS requirements, given in terms of bandwidth and delay as default QoS parameters. In this paper, we first analyze possible types of routing protocols that have been studied for MANET and show proactive hop-by-hop routing protocols are the most appropriate for wireless mesh networks. Then, we present a network model for IEEE 802.16 based wireless mesh networks and propose a proactive hop-by-hop QoS routing protocol. Through our simulation, we represent that our routing protocol outperforms QOLSR protocol in terms of end-to-end delay, packet delivery ratio and routing overhead.

A Novel Hitting Frequency Point Collision Avoidance Method for Wireless Dual-Channel Networks

  • Quan, Hou-De;Du, Chuan-Bao;Cui, Pei-Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.941-955
    • /
    • 2015
  • In dual-channel networks (DCNs), all frequency hopping (FH) sequences used for data channels are chosen from the original FH sequence used for the control channel by shifting different initial phases. As the number of data channels increases, the hitting frequency point problem becomes considerably serious because DCNs is non-orthogonal synchronization network and FH sequences are non-orthogonal. The increasing severity of the hitting frequency point problem consequently reduces the resource utilization efficiency. To solve this problem, we propose a novel hitting frequency point collision avoidance method, which consists of a sequence-selection strategy called sliding correlation (SC) and a collision avoidance strategy called keeping silent on hitting frequency point (KSHF). SC is used to find the optimal phase-shifted FH sequence with the minimum number of hitting frequency points for a new data channel. The hitting frequency points and their locations in this optimal sequence are also derived for KSHF according to SC strategy. In KSHF, the transceivers transmit or receive symbol information not on the hitting frequency point, but on the next frequency point during the next FH period. Analytical and simulation results demonstrate that unlike the traditional method, the proposed method can effectively reduce the number of hitting frequency points and improve the efficiency of the code resource utilization.

A Study on DDoS Detection Technique based on Cluster in Mobile Ad-hoc Network (무선 애드혹 망에서 클러스터 기반 DDoS 탐지 기법에 관한 연구)

  • Yang, Hwan-Seok;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.25-30
    • /
    • 2011
  • MANET has a weak construction in security more because it is consisted of only moving nodes and doesn't have central management system. The DDoS attack is a serious attack among these attacks which threaten wireless network. The DDoS attack has various object and trick and become intelligent. In this paper, we propose the technique to raise DDoS detection rate by classifying abnormal traffic pattern. Cluster head performs sentinel agent after nodes which compose MANET are made into cluster. The decision tree is applied to detect abnormal traffic pattern after the sentinel agent collects all traffics and it judges traffic pattern and detects attack also. We confirm high attack detection rate of proposed detection technique in this study through experimentation.

IoL Field Gateway: An Integrated IoT Agent using Networked Smart LED Lighting Controller

  • Mariappan, Vinayagam;Jung, Soonho;Lee, Sangwoon;Cha, Jaesang
    • Information and Communications Magazine
    • /
    • v.34 no.2
    • /
    • pp.12-19
    • /
    • 2017
  • The LED technology advancement introduce cuttingedge technology on Internet of Things (IoT) to connect the physical world to the digital realm, using digital smart lighting infrastructure called Internet of light (IoL). This paper proposes an Integrated IoT agent on networked smart LED lighting controller called IoL Filed Gateway using lighting infrastructure in which a lighting system that can connect to a network and can be monitored and controlled from a centralized system or via the cloud. The IoL Field Gateway defines new world of smart connected intelligence, lighting can become an integral and responsive part of everyday human life environments. The proposed connected lighting gateway uses the concept of multi-hop ad hoc network using visible light communication (VLC) with RF wireless technologies and Wired PLC (Power Line Communication). This connectivity and intelligence integrated into LED-based luminaires form the backbone of smart buildings and cities and make the Internet of Things (IoT) vision feasible and enables the lighting administrator can control numerous lightings easily and visitors can get visual information from the lightings with their smart devices. The proposed IoL gateway design is emulated on Arduino based HW platform with VLC, RF, and PLC connectivity and evaluated with four sensor interface.

A Study on Relay Enhancing Method of MIL-STD-188-220 using ACK Reply in CNR Network (Ack 응답을 이용한 MIL-STD-188-220의 중계전송 성능향상에 관한 연구)

  • Choi, Young-Min;Sung, Bo Hyon;Youn, Jong Taek;Kim, Young-Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.635-642
    • /
    • 2012
  • The Packet radio C2OTM(Command and Control On The Move) for Command, Control and situational awareness in communication environment of current Combat Net Radio Network is required in a relay transmission techniques. This is to assure the reliability of information transfer, and extend Wireless Coverage and overcome Communication obstacles of mountainous terrain. For the reliability of information transmission in tactical environment, Ad hoc Networking is necessary considering communication environment and an appropriate application of error correction. In this study, We propose a on-demand SDR algorithm that is currently being applied the FEC, Golay, Repetition Code. This enhanced relay transfer uses Ack Reply in tactical operating environment of MIL-STD-188-220 Protocol.

Evaluation of the Use of Guard Nodes for Securing the Routing in VANETs

  • Martinez, Juan A.;Vigueras, Daniel;Ros, Francisco J.;Ruiz, Pedro M.
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.122-131
    • /
    • 2013
  • We address the problem of effective vehicular routing in hostile scenarios where malicious nodes intend to jeopardize the delivery of messages. Compromised vehicles can severely affect the performance of the network by a number of attacks, such as selectively dropping messages, manipulating them on the fly, and the likes. One of the best performing solutions that has been used in static wireless sensor networks to deal with these attacks is based on the concept of watchdog nodes (also known as guard nodes) that collaborate to continue the forwarding of data packets in case a malicious behavior in a neighbor node is detected. In this work, we consider the beacon-less routing algorithm for vehicular environments routing protocol, which has been previously shown to perform very well in vehicular networks, and analyze whether a similar solution would be feasible for vehicular environments. Our simulation results in an urban scenario show that watchdog nodes are able to avoid up to a 50% of packet drops across different network densities and for different number of attackers, without introducing a significant increase in terms of control overhead. However, the overall performance of the routing protocol is still far from optimal. Thus, in the case of vehicular networks, watchdog nodes alone are not able to completely alleviate these security threats.