• Title/Summary/Keyword: hierarchical routing

Search Result 242, Processing Time 0.027 seconds

Hierarchical Routing Protocol for Traffic-Balanced DiffServ Network Architecture (DiffServ망 구조에서 트래픽 분산을 위한 계층적 라우팅 프로토콜)

  • 인치형
    • The Magazine of the IEIE
    • /
    • v.30 no.5
    • /
    • pp.551-551
    • /
    • 2003
  • 현재의 라우팅 프로토콜은 다양한 사용자 요구를 만족시켜주기 위해서는 네트워크의 처리량을 최대화하고 동시에 사용자의 요구 시 QoS를 보장해주는 기법이 요구되고 있다. 기존의 최단경로 라우팅 프로토콜은 단일경로 라우팅으로 인해 병목현상의 단점을 지니고 있다. 즉, 원천과 목적지간 최단경로는 낮은 활용도를 나타내는 경로들이 많이 존재하지만 단일경로를 선택하므로서 폭주(congestion)의 발생확률이 높다. 최근에 들어 사용자의 QoS 요구 시, 다양한 QoS를 패킷 네트워크에서 처리할 수 있도록 IETF에서 DiffServ, RSVP, MPLS 등과 같은 패킷 QoS 기법에 대한 표준화 작업이 진행중이며, 그 중에서 Diffserv 네트워크가 대표적이다. 따라서 본 논문에서는 이 DiffServ 네트워크상에서 다양하게 유입되는 트래픽의 종류에 따라 사용자의 응용에 적절히 대응하여 트래픽을 처리하는 라우팅 기법 및 알고리즘을 연구하고 기존의 최선형 (Best effort) 트래픽을 처리하기 위한 트래픽 분산 라우팅 프로토콜 (Traffic-Balanced Rout-ing Protocol'TBRP)을 제안하였으며, 최적의 중간 노드를 선택하여 높은 순위의 상호형 데이터를 처리하기 위한 계층적 라우팅 프로토콜(또ierarchicalTra(fic-Scheduling Routing Protocol : HTSRP)을 연구하였다. 본 연구에서 제시한 프로토콜은 유, 무선망의 통합에 따른 다양한 엑세스망과 백본망에 유연한 트래픽 처리기법으로서 계층적 라우팅 알고리즘으로 적합하였다. 본 실험에서는 사용자의 QoS요청 시 제공되는 상호형 또는 스트리 밍 데이터를 위한 HTSRP_Q(Hierarchical Traffic-Scheduling Routing Pro-tocol for QoS)에 대해 성능이 우수함을 입증하였으며, 각 엑세스 단에서 요청하는 QoS 파라미터에 따라 자원을 최적화하여 QoS를 보장하고, 특히 지연에 민감한 트래픽을 처리하였으며, 제안한 프로토콜을 이용하여 사용자 요구 트래픽 종류에 따라 대화형 클래스, 스트리밍 클래스, 높은 순위의 상호형 클래스, 낮은 순위의 상호형 클래스, 그리고 background 클래스등 5개의 서비스 클래스로 분리하여 트래픽 특성에 맞게 처리할 수 있었다. QoS 관련 실험에서는 QoS 요청데이터를 균등하게 1에서 10Mbps 사이에 분포하였고 연결된 호에 대한 지속시간은 5분으로 하였다. 이러한 환경에서 프로토콜을 MaRS에 의해 실험을 하였고 기존의 거리-벡터 라우팅과 링크-상태 라우팅 프로토콜과 비교해서 처리량, 메시지 손실, 블럭킹율 등에서 비교적 우위의 성능을 확인할 수 있었으며, 특히, 차별화된 서비스의 특성에 맞게 라우팅 기법을 적용하므로서 망의 효율성과 안정성을 꾀할 수가 있었다. 연결 수 대 처리량에서는 HTSRP 프로토콜이 연결이 적을 때 DVR, LSR보다 우월하였으며 특히, 선형을 유지하였다. 연결 수 대 패킷 손실에서 HTSRP프로토콜에서 메시지 손실은 연결의 수가 낮거나 높을 때 다른 DVR과 LSR 라우팅 프로토콜과 유사한 결과를 나타내었다. Hotspo에서 TBRP, HTSRP프로토콜은 hotspot 연결의 수가 9일 때까지 DVR, LSR 보다 좋은 처리량를 나타냈고 HTSRP는 연결의 수가 6 이상일 때 가장 높은 처리량을 나타내었다. 일반 트래픽과 QoS 트래픽이 흔재할 경우는 트래픽이 증가할수록 HTSRP_Q가 가장 월등하였으며 , 로드가 증가할수록 낮은 블록킹률을 나타내었다. 본 논문에서는 점대점 전송을 기반으로 하였다. 앞으로 다양한 응용 S/W는 멀티캐스트 기반이 예상되므로 멀티캐스트 라우팅에 대한 연구가 필요하다. 본 논문의 프로토콜은 원천과 목적지간의 최단경로가 폭주상태가 아닌 해당 중간 노드를 이용한다. 최단경로의 모든 링크상의 트래픽 부하가 낮을 때 중간노드의 사용은 지연을 증가시킨다. 향후 최적의 성능을 위해 보완이 필요하다. 아울러, 2계위에서는 일반 트래픽과 QoS 트래픽이 혼재할 때 자동으로 네트워크의 효율적을 고려한 방법 선택이 필요하다.

  • PDF

A Scheme of the Distributed Path Assignment in Network with Hierarchical Topology (계층적 망구조에서의 분산 경로 설정 방안)

  • 김형철;홍충선;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.5B
    • /
    • pp.925-930
    • /
    • 2000
  • The Problem of allocating paths is very significant in order to transmit a large amount of various data on the ATM network. Therefore, selecting an optimal path among available paths between the a source node and a target node has been researched. Alternate paths designed in previous PNNI routing is not considered on the group-occupation so that traffic congestion happens, when errors occur in the network which consists of a hierarchical network architecture extendable to a large network, We propose the Top-Down algorithm considering an average of the occupation among the groups reported from a leader node in each group and minimizing a traffic congestion

  • PDF

MPLS를 기반으로 한 Mobile IPv6의 이동성 지원 방법

  • Choi, Eun-Seok;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2003.11b
    • /
    • pp.163-166
    • /
    • 2003
  • In recent years, there has been increased to access multimedia service through the Internet due to rise of the access speed. We suppose the co-existence of the various access networks in adjacent area in the future, such as wireless LAN, Bluetooth, and 3G Cellular So, the size of the cell will be smaller and the number of access point will be increased. In other words, the potable devices need the efficient mobility scheme due to move between cells frequently Currently, the several of the scheme, which is Cellular IP, HAWAII, Mobile IPv4 regional registration, and hierarchical Mobile IPv6, is suggested to support micro-mobility but Mobile IPv4 is standard scheme to support the mobility of the mobile node. MPLS, which forwards the packet through switching instead of routing using IP address, has begun to deploy in the internet backbone to increase the performance of mobility protocol. The integration of both MPLS and Mobile IP improves the scalability of the Mobile IP data forwarding process by leveraging on the features MPLS which are fast switching and high scalability. Moreover it abbreviates IP-in-IP tunneling between HA and FA. In this paper, we suggest efficient mobility scheme through integration of both MPLS and hierarchical Mobile IPv6.

  • PDF

An Efficient Management Scheme of Hierarchical P2P System based on Network Distance (계층적 P2P 시스템의 효율적 관리를 위한 네트워크 거리 기반 운영 기법)

  • Hong, Chung-Pyo;Kim, Cheong-Ghil;Kim, Shin-Dug
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.10 no.4
    • /
    • pp.121-127
    • /
    • 2011
  • Many peer-to-peer (p2p) systems have been studied in distributed, ubiquitous computing environments. Distributed hash table (DHT)-based p2p systems can improve load-balancing even though locality utilization and user mobility are not guaranteed. We propose a mobile locality-based hierarchical p2p overlay network (MLH-Net) to address locality problems without any other services. MLH-Net utilizes mobility features in a mobile environment. MLH-Net is constructed as two layers, an upper layer formed with super-nodes and a lower layer formed with normal-nodes. Because super-nodes can share advertisements, we can guarantee physical locality utilization between a requestor and a target during any discovery process. To overcome a node failure, we propose a simple recovery mechanism. The simulation results demonstrate that MLH-Net can decrease discovery routing hops by 15% compared with JXTA and 66% compared with Chord.

  • PDF

Communication coverage-aware cluster head election algorithm for Hierarchical Wireless Sensor Networks (계층형 무선센서 네트워크에서 통신영역을 고려한 클러스터 헤드 선출 알고리즘)

  • Lee, Doo-Wan;Kim, Yong;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.527-530
    • /
    • 2010
  • WSN is composed of a lot of small sensors with the limited hardware resources. In WSN, at the initial stage, sensor nodes are randomly deployed over the region of interest, and self-configure the clustered networks by grouping a bunch of sensor nodes and selecting a cluster header among them. Specially, in WSN environment, in which the administrator's intervention is restricted, the self-configuration capability is essential to establish a power-conservative WSN which provides broad sensing coverage and communication coverage. In this paper, we propose a communication coverage-aware cluster head election algorithm for Herearchical WSNs which consists of communication coverage-aware of the Base station is the cluster head node is elected and a clustering.

  • PDF

Performance Evaluation and Analysis of Implicit Cluster-based Ad hoc Multicast Mechanism (암시적 클러스터기반 애드 혹 멀티캐스트 기법 성능 평가 및 분석)

  • Choi, Young-Hwan;Park, Soo-Chang;Lee, Eui-Sin;Yu, Fucai;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.5
    • /
    • pp.457-461
    • /
    • 2008
  • Previous studies on overlay ad hoc multi-casting are mainly divided into two categories: hierarchical structure-based multicast schemes and non-hierarchical structure-based multicast schemes. They do not reflect their real-time location information for routing updates. This can be a cause of low performance on energy consumption, throughput, and latency. For improving the problems, we propose an implicit cluster based overlay ad hoc multicast scheme with analysis of related work, and then we evaluate performance through computer simulation.

A Ring-based Multicast Routing Architecture for Mobile Ad Hoc Networks (모바일 애드혹 네트워크를 위한 링 기반 멀티캐스트 라우팅 구조)

  • Heo Joon;Hong Choong Seon;Yang Yubai
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.895-904
    • /
    • 2004
  • Due to the frequent and unpredictable topology changes, multicast still remains as challenge and no one-size-fits-all protocol could serve all kinds of needs in mobile ad hoc network. In this paper, we propose a novel scheme of Hierarchical Eulerian Ring Oriented Multicast Architecture (HEROMA) over mobile ad hoc network. It has features that concentrate on efficiency and robustness simultaneously. It is also an application-driven proposal for hazard detection. Architectures including Eulerian ring, hierarchy and multicast agent are investigated in detail Simulation results different level of improvements on control traffic, end-to-end delay and packet delivery ratio by comparing with tree-based and mesh-based multicast protocols.

An Efficient Location Management Scheme in the Network Mobility (Network Mobility 환경에서의 효율적인 위치관리 기법)

  • Kim Hye-Young;Song Uy-Seang;Gil Joon-Min;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.190-202
    • /
    • 2005
  • Mobile nodes are change their point of attachment dynamically such as networks deployed in aircraft, boats, trains, and cars. These mobile nodes move together and share the same nobility properties. Therefore, this paper addresses an efficient location management scheme based on collaboration of mobile nodes to a mobile network. We propose a scheme that combines multicast routing with Mobile IPv6 to support mobile network in the internet. This paper also tests the usefulness of our proposed method using analytical models and compares the results with our scheme and HMIPv6(Hierarchical Mobile IPv6) and Network Mobility(NEMO).

Dimensioning of linear and hierarchical wireless sensor networks for infrastructure monitoring with enhanced reliability

  • Ali, Salman;Qaisar, Saad Bin;Felemban, Emad A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3034-3055
    • /
    • 2014
  • Wireless Sensor Networks have extensively been utilized for ambient data collection from simple linear structures to dense tiered deployments. Issues related to optimal resource allocation still persist for simplistic deployments including linear and hierarchical networks. In this work, we investigate the case of dimensioning parameters for linear and tiered wireless sensor network deployments with notion of providing extended lifetime and reliable data delivery over extensive infrastructures. We provide a single consolidated reference for selection of intrinsic sensor network parameters like number of required nodes for deployment over specified area, network operational lifetime, data aggregation requirements, energy dissipation concerns and communication channel related signal reliability. The dimensioning parameters have been analyzed in a pipeline monitoring scenario using ZigBee communication platform and subsequently referred with analytical models to ensure the dimensioning process is reflected in real world deployment with minimum resource consumption and best network connectivity. Concerns over data aggregation and routing delay minimization have been discussed with possible solutions. Finally, we propose a node placement strategy based on a dynamic programming model for achieving reliable received signals and consistent application in structural health monitoring with multi hop and long distance connectivity.

Improving the Cyber Security over Banking Sector by Detecting the Malicious Attacks Using the Wrapper Stepwise Resnet Classifier

  • Damodharan Kuttiyappan;Rajasekar, V
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1657-1673
    • /
    • 2023
  • With the advancement of information technology, criminals employ multiple cyberspaces to promote cybercrime. To combat cybercrime and cyber dangers, banks and financial institutions use artificial intelligence (AI). AI technologies assist the banking sector to develop and grow in many ways. Transparency and explanation of AI's ability are required to preserve trust. Deep learning protects client behavior and interest data. Deep learning techniques may anticipate cyber-attack behavior, allowing for secure banking transactions. This proposed approach is based on a user-centric design that safeguards people's private data over banking. Here, initially, the attack data can be generated over banking transactions. Routing is done for the configuration of the nodes. Then, the obtained data can be preprocessed for removing the errors. Followed by hierarchical network feature extraction can be used to identify the abnormal features related to the attack. Finally, the user data can be protected and the malicious attack in the transmission route can be identified by using the Wrapper stepwise ResNet classifier. The proposed work outperforms other techniques in terms of attack detection and accuracy, and the findings are depicted in the graphical format by employing the Python tool.