• Title/Summary/Keyword: node mobility

Search Result 571, Processing Time 0.029 seconds

An Enhanced Xcast Protocol for Mobile Nodes in IP Networks (IP 망에서의 이동 노드를 위한 향상된 Xcast, 프로토콜)

  • Nam Sea-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.85-95
    • /
    • 2005
  • Whereas the traditional multicast schemes based on Mobile IP can support a limited number of very large multicast groups, the Xcast protocol can support a very large number of small multicast groups, In the Xcast, the source node encodes the list of destinations in the Xcast header. Therefore, the maximum packet size in the network limits the number of destinations that a Xcast packet may have. In this paper, an enhanced Xcast protocol is proposed to solve the multicast group size limitation of the existing Xcast protocol in providing multicast service for mobile nodes. Moreover, the SIP (a very flexible control plane protocol) is integrated with the proposed multicast scheme to provide mobility awareness on the application layer. The simulation results verify that the proposed multicast scheme not only increases the packet delivery ratio and the data packet forwarding efficiency but also achieves low latency of packets in the network.

  • PDF

Variable Geocasting based on Ad Hoc Networks (Ad Hoc 네트워크 기반의 가변 지오캐스팅)

  • Lee Cheol-Seung;Lee Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1401-1406
    • /
    • 2006
  • Mobile Ad-hoc networks have recently attracted a lot of attention in the research community as well as in industry. Although the previous research mainly focused on various of Ad-hoc in routing, we consider, in this paper, how to efficiently support applications such as variable Goocasting basd on Ad-hoc networks. The goal of a geocasting uotocol is deliver data packets to a group of nodes that are located within a specified geocasting region. Previous research that support geocast nice in mobilie computing based on Ad-hoc have the non-optimization problem of data delivery path, overhead by frequent reconstruction of the geocast tree, and service disruption problem. In this paper, we propose the mobility pattern based geocast technique using variable service range according to the nobility of destination node and resource reservation to solve this problem. The experimental results show that our proposed mechanism has improved performance of Connection & Network Overhead than previous research.

A Community-Based Influence Measuring Scheme in Delay-Tolerant Networks (지연 감내 네트워크에서 커뮤니티 기반 영향력 측정 기법)

  • Kim, Chan-Myung;Kim, Yong-Hwan;Han, Youn-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.1
    • /
    • pp.87-96
    • /
    • 2013
  • Influence propagation is an important research issue in social networks. Influence propagation means that the status or the disposition of nodes get changed by new idea, information and gossip propagated by other nodes. Influenced nodes also make other nodes influenced across the network. The influence propagation problem based on 'word of mouth' referral is to find most influential nodes set in networks to maximize influence. In this paper, we study the influence measuring and finding most influential nodes set in Delay-Tolerant Networks. It is difficult to measure exact influential power in Delay-Tolerant networks where network topology is not stable due to the nodal mobility. In this paper, we propose a distributed scheme that each node constructs $k$-clique community structure and estimates local influential power in Delay-Tolerant Networks. Simulation results show that the influential nodes information estimated by proposed scheme is in agreement with a global view of influential nodes information.

TECDS Protocol for Wireless Ad Hoc Networks (무선 에드혹 네트워크를 위한 타이머를 이용한 CDS 구축)

  • Kim, Bo-Nam;Yang, Jun-Mo
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.365-370
    • /
    • 2007
  • Connected Dominating Set(CDS) has been used as a virtual backbone in wireless ad hoc networks by numerous routing and broadcast protocols. Although computing minimum CDS is known to be NP-hard, many protocols have been proposed to construct a sub-optimal CDS. However, these protocols are either too complicated, needing non- local information, not adaptive to topology changes, or fail to consider the difference of energy consumption for nodes in and outside of the CDS. In this paper, we present two Timer-based Energy-aware Connected Dominating Set Protocols(TECDS). The energy level at each node is taken into consideration when constructing the CDS. Our protocols are able to maintain and adjust the CDS when network topology is changed. The simulation results have shown that our protocols effectively construct energy-aware CDS with very competitive size and prolong the network operation under different level of nodal mobility.

On Improving Reliability of E-ODMRP (E-ODMRP의 신뢰성 향상에 관한 연구)

  • Jung, Young-Woo;Park, Joon-Sang
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.465-470
    • /
    • 2010
  • In this paper we propose a method which can be used to enhance the reliability of E-ODMRP (Enhanced On-Demand Multicast Routing Protocol). E-ODMRP has low overhead compared to its predecessors since it performs periodic refresh at a rate dynamically adapted to the nodes' mobility and adopts the local recovery. Upon detecting a broken route, a node performs a local search to graft to the forwarding mesh proactively. However in E-ODMRP there is no packet recovery mechanism. A receiver may lose some packets when it is detached from the multicast tree. We propose a simple packet recovery mechanism that can be incorporated into E-ODMRP for enhanced reliability. We show via simulation that our mechanism effectively enhances the reliability of E-ODMRP.

A Cross-layering Handover Scheme for IPv6 Mobile Station over WiBro Networks (와이브로 망에서 IPv6 이동 단말의 교차 계층 핸드오버 기법)

  • Jang, Hee-Jin;Han, Youn-Hee;Hwang, Seung-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.48-61
    • /
    • 2007
  • WiBro (Wireless Broadband) service, developed in Korea, can provide the host mobility while its users hang around within the subnet. Next-generation Internet protocols, IPv6 and Mobile IPv6 (MIPv6), provide a plenty of addresses to the nodes and enable the handover between different subnets. However, MIPv6 is not enough to support a real time service such as VoIP (Voice over IP) due to the long latency, and it is necessary to develop an enhanced handover mechanism which is optimized to the WiBro networks. In this paper, we suggest an improved fast handover mechanism while the mobile node moves around WiBro networks. The proposal is based on Fast Mobile IPv6 (FMIPv6) which is the representative protocol for fast handover, and reduces the handover latency by the close interaction between the link layer (WiBro MAC) and IP layer (FMIPv6). Finally, we analyze the performance of proposed mechanism through the mathematical analysis.

A Novel K-hop Cluster-based Ad hoc Routing Scheme with Delegation Functions (위임 기능을 이용한 새로운 K-hop 클러스터 기반 Ad hoc 라우팅 구조)

  • Kim Tae-yeon;Wang Ki-cheoul
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.27-37
    • /
    • 2004
  • The existing ad hoc network protocols suffer the scalability problem due to the inherent characteristics of node mobility. Cluster-based routing protocols divide the member nodes into a set of clusters and perform a hierarchical routing between these clusters. This hierarchical feature help to improve the scalability of ad hoc network routing. However, previous k-hop cluster-based routing protocols face another problems, that is, control overhead of the cluster headers. This paper proposes a novel k-hop cluster-based routing scheme with delegation functions for mobile ad hoc networks. The scheme employs is based on tree topology to manage cluster members in effectively. The cluster headers do not manage the routing table for whole members, while the header keeps the routing table for its neighbor members and the member list for one hop over nodes within k-hop cluster. Then the in-between leveled nodes manage the nested nodes which is structured in the lower level. Therefore, the proposed mechanism can reduce some control overhead of the cluster leaders.

  • PDF

Mutual Authentication and Route Optimization between MN and CN using AAA in Mobile IPv6 (Mobile IPv6에서 AAA를 이용한 MN과 CN간의 상호 인증 및 경로 최적화)

  • 김미영;문영성
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.429-437
    • /
    • 2004
  • The mobileip working group is equipped with the RR(Return Routabilit) taking the simple procedures and small amount of cryptographic operations by considering the processing capability of the mobile node however it dose not provide security features enough. To replace with enhanced methods, mobileip WG is making an effort to find the approved solutions include CGA(Craptographically Generated Address), IPsec(Internet Protocol Security) as well as the existing infrastructure such as AAA(Authentication, Authorization and Account) and PKI(Public Key Infrastructure). In this paper, we propose the authentication and route optimization based on AAA suitable for the requested security service for its successful story in wireless network such as 802.11 and 3GPP(3rd Generation Partnership Project) as well as wired one. We analyze the effectiveness of our scheme according to the traffic and mobility properties. The result shows the cost reduction up to 20 percent comparing with RR.

Secure Routing with Time-Space Cryptography for Mobile Ad-Hoc Networks (이동 애드혹 망을 위한 시공간 방식의 보안 라우팅 프로토콜)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.11-16
    • /
    • 2007
  • This paper describes the design and performance of a secure routing protocol with time-space cryptography for mobile ad-hoc networks. The proposed time-space scheme works in the time domain for key distribution between source and destination as well as in the space domain for intrusion detection along the route between them. For data authentication, it relies on the symmetric key cryptography due to high efficiency and a secret key is distributed using a time difference from the source to the destination. Also, a one-way hash chain is formed on a hop-by-hop basis to prevent a compromised node or an intruder from manipulating the routing information. In order to evaluate the performance of our routing protocol, we compare it with the existing AODV protocol by simulation under the same conditions. The proposed protocol has been validated using the ns-2 network simulator with wireless and mobility extensions.

Design and Implementation of MAC Protocol for Underwater Mobile Ad-hoc Networks (수중 모바일 애드 혹 네트워크를 위한 MAC 프로토콜 설계 및 구현)

  • Lee, Jin-Young;Yun, Nam-Yeol;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.4
    • /
    • pp.76-89
    • /
    • 2014
  • In this paper, we propose a MAC(Media Access Control) protocol based on flexible RWT(RTS Waiting Time) for underwater mobile ad-hoc networks with a three-way handshaking mechanism. This protocol can solve a problem of collision between RTS(Request-To-Send) and CTS(Clear-To-Send) packets in existing MACA(Multiple Access with Collision Avoidance) protocol. This proposed MAC protocol is also an effective protocol which can apply to underwater mobile ad-hoc networks in a real field by using implementable technologies. We set flexible RTS Waiting Time called RWT, considering various characteristics of underwater environment. It is possible to support variable network size according to node mobility. Finally, we conduct a performance evaluation between proposed MAC protocol and existing MACA based MAC protocol through practical implementation and experiment. As a result, we verify the superiority of our proposed MAC protocol in terms of throughput, packet drop rate, average transmission time, energy consumption and channel utilization.