• Title/Summary/Keyword: routing table

Search Result 200, Processing Time 0.029 seconds

A Semi-Soft Handoff Mechanism with Zero Frame Loss in Wireless LAM Networks (무선 LAN 환경에서 프레임 손실 없는 Semi-Soft 핸드오프 방안)

  • 김병호;민상원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1135-1144
    • /
    • 2003
  • In this paper, we proposed a semi-soft handoff mechanism to provide link mobility in IEEE 802.11 wireless LAN environment. Buffers and routing tables in APs and portals are provided in order to reroute frames, which have not been received during handoff time and have been buffered in an old AP, to a new AP after handoff is performed. For the re -routing operation, the MAC routing table should be updated by exchanging information of a mobile terminal between neighbor APs. With our proposed scheme. a wireless LAN node can perform semi soft handoff while changing its attached AP and provide mobile IP and/or real time service like voice over IP. Also, we have done simulation for evaluation of the performance of the proposed scheme. We show that our semi soft handoff mechanism can be applied for real-time service with no frame loss in mobile environment.

Provider's Mobility Supporting Proactive Neighbor Pushing Scheme in CCN (CCN에서 정보제공자의 이동성 지원을 위한 푸싱 기법)

  • Woo, Taehee;Kwon, Taewook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.721-729
    • /
    • 2016
  • CCN(Content-Centric Network) enables users to retrieve content using the content's name. Researchers face critical challenges in terms of mobility. Since the routing information is part of the content name, when the provider moves, it is necessary to update all the routers routing information. However, this requires significant costs. In this paper, we propose PNPCCN(Proactive Neighbor Pushing CCN), considering the popularity and rarity of mobility support, for providers in CCN environments. Via simulation studies, we demonstrate that our solutions are effective in terms of shorter numbers of retransmitted Interest packets, and average download times and higher delivery ratios during mobility.

Geographical Information-aided Routing Table Management and Routing Method (지리적 정보를 응용한 라우팅 테이블 관리 및 라우팅 기법)

  • Park, Chul-Hyun;Kwon, Tae-Kyung;Choi, Yang-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.402-405
    • /
    • 2008
  • 네트워크에 연결되는 장치의 개수가 늘어남에 따라서 각 장치에 패킷을 전달하는 경로 결정에 필요한 라우팅 정보의 양도 늘어나고 있다. 라우팅 정보의 양이 증가하여 라우팅 테이블의 크기가 커질 경우 패킷의 전달 경로를 결정하기 위한 테이블 검색 시간이 길어져 라우팅 성능이 저하될 수 있다. 본 논문에서는 지리적 정보를 이용하여 지리적 거리로 계산한 다음 홉 라우터와 네트워크 상의 라우팅 경로에서 계산된 다음 홉 라우터가 동일할 경우 해당 엔트리를 삭제하는 방법으로 라우팅 테이블의 크기를 작게 유지하는 한편 라우팅은 정상적으로 수행하는 기법을 소개하고자 한다.

  • PDF

IP Prefix Update of Routing Protocol in the Multi-way Search Tree (멀티웨이 트리에서의 IP Prefix 업데이트 방안)

  • 이상연;이강복;이형섭
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.269-272
    • /
    • 2001
  • Since Multi-way Search Tree reduces the number of the memory access by increasing the branch factor, it is considered a method to archive the high-speed IP address lookup. Using the combination of initial 16 bit may and Multi-way Search Tree, it also reduces the search time of If address lookup. Multi-way Search Tree consists of K keys and K+1 key pointers. This paper shows how the E update of Multi-way Search Tree which consists of the one pointer within a node can be performed. Using the one pointer within a node, it increases the number of keys within a node and reduces the search time of IP lookup. We also describes IP updating methods such as modification, Insertion and Deletion of address entries. Our update scheme performs better than the method which rebuilds the entire IP routing table when IP update processes.

  • PDF

An Efficient Content Sharing Scheme in Structured P2P Systems (구조적 P2P 시스템에서 효율적 컨텐트 공유 기법)

  • Bae, Joon-Hyun;Kim, Sang-Wook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.6
    • /
    • pp.430-434
    • /
    • 2009
  • In this paper, we propose an efficient content sharing scheme for structured P2P overlay network. The main idea of this paper is to exploit the identified routing table instead of anonymous one using social relationships among nodes. The contribution of this paper is to present a means of mitigating the problem of 'free riding' and the threat of misrouting attack by malicious nodes.

A Study for Detection Accuracy Improvement of Malicious Nodes on MANET (MANET에서의 의심노드 탐지 정확도 향상을 위한 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.95-101
    • /
    • 2013
  • MANET has an advantage that can build a network quickly and easily in difficult environment to build network. In particular, routing protocol that uses in existing mobile environment cannot be applied literally because it consists of only mobile node. Thus, routing protocol considering this characteristic is necessary. Malicious nodes do extensive damage to the whole network because each mobile node has to act as a router. In this paper, we propose technique that can detect accurately the suspected node which causes severely damage to the performance of the network. The proposed technique divides the whole network to zone of constant size and is performed simultaneously detection technique based zone and detection technique by collaboration between nodes. Detection based zone translates the information when member node finishes packet reception or transmission to master node managing zone and detects using this. The collaborative detection technique uses the information of zone table managing in master node which manages each zone. The proposed technique can reduce errors by performing detection which is a reflection of whole traffic of network.

A Study on the IPv6 Multihoming Mechanism using Loadsharing Broker.

  • Kim, Dong-Kyun;Park, Hak-Soo;Kim, Seong-Hae;Whang, Il-Sun
    • Journal of Scientific & Technological Knowledge Infrastructure
    • /
    • s.7
    • /
    • pp.141-148
    • /
    • 2001
  • This paper describes a mechanisms for IPv6 multihomming with loadsharing broker, focusing on the interdomain scalability and load sharing with redundancy on IPv6 networks. Unlike currently-practiced IPv4 multihoming, this model does not impact the worldwide routing table size, also it provides inbound load sharing at site level based on router renumbering, and multiple-prefix assigning techniques of IPv6. The proposed model has four modules such as building interfaces MIB module, priority list maintaining module, load detection module, and RRP configuration module.

  • PDF

Performance analysis of Mobile Hosts based on On-Demand Ad-Hoc Networks (On-Demand Ad-Hoc망에서의 이동 호스트의 성능분석)

  • 하윤식;송창안;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.213-217
    • /
    • 2003
  • An Ad-Hoc networks is a set of wireless mobile host which forms temporary networks without any concentrated controls or any helps of standard support services. Mobile host' routers are operated by their mobile hosts without fixed routers, therefore, the original routing protocol algorithm are not effective. There are two major Protocols in Ad-Hoc Network. A Table-Driven algorithm and an On-Demand, but the latter is presented more effective. We try to compare and analyze the performances of each protocol's host in this thesis.

  • PDF

Implementation of Ternary Adder and Multiplier Using Current-Mode CMOS (전류모드 CMOS에 의한 3치 가산기 및 승산기의 구현)

  • Seong, Hyeon-Kyeong
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.142-144
    • /
    • 2006
  • In this paper, the Ternary adder and multiplier are implemented by current-mode CMOS. First, we implement the ternary T-gate using current-mode CMOS which have an effective availability of integrated circuit design. Second, we implement the circuits to be realized 2-variable ternary addition table and multiplication table over finite fields GF(3) with the ternary T-gates. Finally, these operation circuits are simulated by Spice under $1.5{\mu}m$ CMOS standard technology, $1.5{\mu}m$ unit current, and 3.3V VDD voltage. The simulation results have shown the satisfying current characteristics. The ternary adder and multiplier implemented by current-mode CMOS are simple and regular for wire routing and possess the property of modularity with cell array.

  • PDF

On connected dominating set games

  • Kim, Hye-Kyung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.6
    • /
    • pp.1275-1281
    • /
    • 2011
  • Many authors studied cooperative games that arise from variants of dominating set games on graphs. In wireless networks, the connected dominating set is used to reduce routing table size and communication cost. In this paper, we introduce a connected dominating set game to model the cost allocation problem arising from a connected dominating set on a given graph and study its core. In addition, we give a polynomial time algorithm for determining the balancedness of the game on a tree, for finding a element of the core.