• Title/Summary/Keyword: ad hoc communication

Search Result 808, Processing Time 0.026 seconds

The Measurement of Fading Characteristics of The Beamforming on Mobile ad-hoc Channel Environments (이동 ad-hoc채널에서 빔 형성 방식의 페이딩 특성 측정)

  • Ko, Hak-Lim;Park, Byeong-Hoon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.4
    • /
    • pp.266-271
    • /
    • 2007
  • In mobile channel environments, the effect of the multi-path fading reduces the performance of the mobile communication severely. Previous studies on the effect of the multi-path fading show that, only the channel between fixed base stations and mobile terminals are considered. However, the future mobile communication service such as telematics may use the communication between moving mobile terminals, so called mobile ad-hoc communication, the studies on the channel is required for such situations. In this paper we have measured the mobile channel and analyzed the fading characteristics when using the linear array antennas. In the data measurements, we sent the QPSK modulated signal with carrier frequency of 2GHz band and received the signal using the array antennas equipped on moving vehicles. We have analyzed the fading characteristics and the effects of the fading reduction using the CDF of fading depth using data collected from two moving vehicles. The simulation results show that the beamforming technique adds 6 or 7dB to the fading margin than that of the selection diversity depending on channel environments.

  • PDF

A Multicast Routing Protocol for Reducing the Control Overhead in Mobile Ad-Hoc Networks (이동 애드-혹 네트워크 환경에서 컨트롤 오버 헤드를 줄이기 위한 멀티캐스트 라우팅 프로토콜)

  • Lim, Yu-Jin;Ahn, Sang-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.459-465
    • /
    • 2002
  • Ad-hoc networks have the dynamic topology characteristics and most of the applications on ad-hoc networks require the group communication capability. Previously proposed multicast mechanisms on mobile ad-hoc networks build multicast-infrastructures like the tree or mesh for the group communication and these infrastructures nay cause significant overhead especially in a highly dynamic mobile ad-hoc network environment. Therefore, in this paper, we propose a new multicast mechanism supporting multicast services based on only the underlying unicast routing tables, hence any multicast-related infrastructures like trees and meshes are not required to be constructed.

Routing Protocol Supporting QoS in Mobile Ad-hoc Network (이동 애드 혹 네트워크에서 QoS를 지원하는 라우팅 프로토콜)

  • Kang, Kyung-In;Park, Kyung-Bae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.189-196
    • /
    • 2007
  • In this paper, we proposed a mobile ad hoc routing protocol based on AODV(Ad hoc On demand Distance Vector) with QoS(Quality of Service) support and evaluated the performance through simulation. The waste of communication resources is reduced by establishing the shortest route suitable to QoS support, considering in advance the usable communication resources at each node. For performance evaluation, we analyzed the average data reception rate, considering the node mobility and the number of best effort/QoS data flows. We found that in the mobile Ad Hoc networks the QoS service for some specific data flows increased the average data reception rate for the QoS data flows.

  • PDF

A study on Management Mechanism of Malicious Node in Ad-hoc Networks (Ad-hoc 네트워크에서 악의적 노드 관리기법에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2716-2723
    • /
    • 2010
  • An Ad-hoc network will operate properly and provide smooth communication when nodes cooperate mutually with each of them having equal authority. Although it is possible to form a network consisting only of authenticated nodes in order to ensure reliability, authentication by itself is not sufficient to remove malicious nodes and their activities jeopardizing the whole network. Detection and prevention of such activities are vital for maintaining a safe and reliable network, but research on this matter is relatively lacking. Hence a suggestion is made on how to detect and prevent malicious or uncooperative ones among the nodes forming a network by a relationship of mutual trust, thereby maintaining safety and stability of the network and improving its processing abilities

Dynamic Source Multi-path Routing Protocol for Wireless Ad-hoc Network Environments (무선 에드-혹 네트워크 환경을 위한 동적다중경로라우팅 프로토콜)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.336-346
    • /
    • 2001
  • A wireless ad-hoc network is a temporal network formed by a collection of wireless mobile nodes without the aid of any existing network infrastnlcture or centralized administration. Currently, numerous routing protocols have been developed for changing messages between nodes in a wireless ad-hoc network. Applications of wireless ad-hoc network technology are various and proper routing protocol must be used according to application domain or network size. In a wireless ad-hoc network. some hosts want services from fixed networks. For supporting such services, it is necessary to interconnect wireless ad-hoc networks and fixed networks. The DSMIHDynamic Source Multipath Routing) protocol, proposed in this paper, focuses on supporting seamless communication services between the nodes within a wireless ad-hoc network and providing fixed networks to the mobile hosts in wireless an-hoc networks. In DSMR protocol, each node need not broadcast routing messages periodically. and mobile hosts that to send data packets initiate route request and route establishment procedure. By maintaining multiple paths in each node. faster route re-establishment is also possible in our scheme.

  • PDF

Maximum Lifetime Geocast Considering Link Error Rates in Ad-Hoc Networks (Ad-hoc 네트워크에서 최대 네트워크 수명과 링크 에러율을 고려한 지오캐스트)

  • Lee, Ju-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.69-77
    • /
    • 2006
  • Geocasting is a form of communication that transmits messages to all nodes within a given geographical region(i.e., the geocasting region). Most of conventional onery aware protocols were based on shortest-hop routing that is, they minimized the cost in terms of the distance and total transmission energy not considering both the residual energy at each node and the link error ratio when selecting the routes for communication. In this paper we propose a MLRG(Maximum Lifetime Reliable Geocast) protocol for energy-efficient and reliable geocasting in Ad-hoc networks. The proposed MLRG, a position-based and routing-based geocasting algorithm, maximizes the network lifetime using newly defined cost function and selecting the energy balanced routes on the basis of each node's residual energy, and provides a reliable communication considering the link error ratio.

  • PDF

The Communication protocol proposal at Ad-hoc for Water-Treatment (수처리 계측제어망 Ad-hoc 적용시 데이터 신뢰성 확보를 위한 통신 프로토콜 제안)

  • Yu, Chool;Seo, Gang do;Choi, Hong yeol;Hong, Sung taek;Ji, Yu chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.984-987
    • /
    • 2013
  • In concept, such as the backup of wired network and disaster prevention network of water treatment measurement and control system, reliability and security of high level of sending and receiving data between the nodes must be ensured in Ad-hoc network construction. Rather than apply the common communication protocols of Ad-hoc network construction during the FA network of closed water treatment facility with the facility of a certain scale is concentrated contrast, and high characteristics of the water treatment system infrastructure, public facilities We have developed a specific protocol another that applies the OTP of communication frame of process control commands and H-ARQ with ZRP by applying the flexibility to time constraints such as precision industrial plants to ensure the safety and property of facility operation.

  • PDF

Node-Level Trust Evaluation Model Based on Blockchain in Ad Hoc Network

  • Yan, Shuai-ling;Chung, Yeongjee
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.169-178
    • /
    • 2019
  • Due to the characteristics of an ad hoc network without a control center, self-organization, and flexible topology, the trust evaluation of the nodes in the network is extremely difficult. Based on the analysis of ad hoc networks and the blockchain technology, a blockchain-based node-level trust evaluation model is proposed. The concepts of the node trust degree of the HASH list on the blockchain and the perfect reward and punishment mechanism are adopted to construct the node trust evaluation model of the ad hoc network. According to the needs of different applications the network security level can be dynamically adjusted through changes in the trust threshold. The simulation experiments demonstrate that ad-hoc on-demand distance vector(AODV) Routing protocol based on this model of multicast-AODV(MAODV) routing protocol shows a significant improvement in security compared with the traditional AODV and on-demand multipath distance vector(AOMDV) routing protocols.

Performance Analysis of Mobile Hosts based on Packet Type of Ad Hoc Networks (Ad Hoc 망의 패킷형태에 따른 모바일 호스트의 성능분석)

  • 김동일;김동현
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.3
    • /
    • pp.417-422
    • /
    • 2003
  • Ad Hoc network not only can be the constitution of multiple piconet, but also can be the extension to the scatternet. By changing the length of the packets, it will transmit packets according to the amount of the transmission. There are two forms of the bluetooth. The one is the DM which is slower in speed but higher in reliance than the DH. The other is the DH which is faster in speed but lower in reliance than the DM. This paper tries to compare and analyze the performances of mobile hosts according to the forms of the packets in bluetooth Ad Hoc network.