• Title/Summary/Keyword: routing table

Search Result 200, Processing Time 0.033 seconds

A New Framework for Ad Hoc Network routing Protocol without Destination Sequence Number (목적지 순차 번호를 사용하지 않은 새로운 구조의 Ad Hoc 네트워크의 라우팅 프로토콜)

  • Seo, Jae-Hong;Jung, Ho-Youl
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.3
    • /
    • pp.155-163
    • /
    • 2007
  • In Ad Hoc Networks, a connection breaks due to the irregular movement of mobile nodes and the inherent characteristics of the wireless medium such as the interference and the multi-path fading. AODV, a typical on-demand routing protocol in Ad Hoc networks, uses Destination sequence numbering for loop-free, but it may cause RREQ broadcast storm problem. This paper proposes AODV_ods that does not need destination sequence number, in routing message and routing table without routing loop. To show the effectiveness of the proposed scheme, we performed extensive simulation with NS-2. The simulation results show that the proposed ADOV_ods efficiently uses wireless bandwidth compare to the original AODV. Finally AODV ods reduces the routing overhead, end to end delay and increases the overall packet delivery ratio.

  • PDF

A Symmetric Lookup-based Secure P2P Routing Algorithm

  • Luo, Bingqing;Jin, Yiai;Luo, Shengmei;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2203-2217
    • /
    • 2016
  • To prevent structured peer to peer (P2P) overlay networksfrom being attacked by malicious nodes, a symmetric lookup-based routing algorithm referred to as Symmetric-Chord is proposed in this paper. The proposed algorithm determines the precision of routing lookup by constructing multiple paths to the destination. The selective routing algorithm is used to acquire information on the neighbors of the root. Authenticity of the root is validated via consistency shown between the information ascertained from the neighbors and information from the yet-to-be-verified root, resulting in greater efficiency of resource lookup. Simulation results demonstrate that Symmetric-Chordhas the capability of detecting malicious nodes both accurately and efficiently, so as to identify which root holds the correct key, and provides an effective approach to the routing security for the P2P overlay network.

Multi-path Routing Policy for Content Distribution in Content Network

  • Yang, Lei;Tang, Chaowei;Wang, Heng;Tang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2379-2397
    • /
    • 2017
  • Content distribution technology, which routes content to the cache servers, is considered as an effective method to reduce the response time of the user requests. However, due to the exponential increases of content traffic, traditional content routing methods suffer from high delay and consequent inefficient delivery. In this paper, a content selection policy is proposed, which combines the histories of cache hit and cache hit rate to collaboratively determine the content popularity. Specifically, the CGM policy promotes the probability of possible superior paths considering the storage cost and transmission cost of content network. Then, the content routing table is updated with the proportion of the distribution on the paths. Extensive simulation results show that our proposed scheme improves the content routing and outperforms existing routing schemes in terms of Internet traffic and access latency.

Space-Stretch Tradeoff Optimization for Routing in Internet-Like Graphs

  • Tang, Mingdong;Zhang, Guoqiang;Liu, Jianxun
    • Journal of Communications and Networks
    • /
    • v.14 no.5
    • /
    • pp.546-553
    • /
    • 2012
  • Compact routing intends to achieve good tradeoff between the routing path length and the memory overhead, and is recently considered as a main alternative to overcome the fundamental scaling problems of the Internet routing system. Plenty of studies have been conducted on compact routing, and quite a few universal compact routing schemes have been designed for arbitrary network topologies. However, it is generally believed that specialized compact routing schemes for peculiar network topologies can have better performance than universal ones. Studies on complex networks have uncovered that most real-world networks exhibit power-law degree distributions, i.e., a few nodes have very high degrees while many other nodes have low degrees. High-degree nodes play the crucial role of hubs in communication and inter-networking. Based on this fact, we propose two highest-degree landmark based compact routing schemes, namely HDLR and $HDLR^+$. Theoretical analysis on random power-law graphs shows that the two schemes can achieve better space-stretch trade-offs than previous compact routing schemes. Simulations conducted on random power-law graphs and real-world AS-level Internet graph validate the effectiveness of our schemes.

A Study on New Secure Routing and Authentication Strategy for 2-tier Ad Hoc Networks (2-Tier Ad Hoc 망에서 신뢰할 수 있는 Routing과 인증 메커니즘 연구)

  • 최문석;이현주;이충세;신병철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.919-921
    • /
    • 2002
  • 본 논문에서는 기존의 Table-driven 방식과 On-demand 라우팅 의 장점을 접목시킨 2-tier 계층구조를 사용한 dynamic한 routing기법을 제안하며 , 구조적으로 취약한 보안 위협 요소들에 대한 안정성을 제공하는 인증 알고리즘을 제안하고 네트워크와 클러스터 헤드의 관리를 위한 신뢰할 수 있는 키 분배 메커니즘을 고찰한다. 또한 기존의 3GPP서비스와의 상호 연동 가능성을 고려하여 클러스터 헤더의 재생성과 강력한 신뢰성을 제공할 수 있는 알고리즘을 제안한다.

  • PDF

A Study on Ad-Hoc Routing Protocol using Table-Driven DSR (테이블 구동 DSR을 이용한 에드혹 라우팅 프로토콜에 관한 연구)

  • 유기홍;하재승
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.9
    • /
    • pp.1209-1218
    • /
    • 2001
  • In this dissertation, we propose a dynamic source routing protocol supporting asymmetric path for mobile ad hoc networks. At present, the existing dynamic source routing protocol supports only symmetric path for routing. However, in fact, there can exist unidirectional links due to asymmetric property of mobile termenals or current wireless environment. Thus, we implement a mobile ad hoc routing protocol supporting asymmetric routing path, which is fit for more general wireless environment. Especially, the proposed protocol uses an improved multipath maintenance method in order to perform rapid route reconfiguration when route error due to mobility is detected.

  • PDF

Redundancy Path Routing Considering Associativity in Ad Hoc Networks (Ad Hoc Network에서 Associativity을 고려한 Redundancy 경로 라우팅)

  • 이학후;안순신
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.199-201
    • /
    • 2003
  • Ad hoc network은 stationary infrastructure의 도움 없이 이동 노드들이 필요 시 network 형태을 구성하여 통신이 이루어지게 하는 network으로 ad hoc network 환경에 맞는 다양한 라우팅 프로토콜들이 개발되었고 크게는 table­driven, on­demand 방식으로 나눌 수 있는데 on­demand 방식의 AODV 프로토콜은 routing overhead가 적다는 장점이 있는 반면 single path로 data forwarding을 진행하여 중간노드의 이동에 의한 path가 broken되는 경우 local routing을 하거나 새로이 source­initialed route rediscovery을 수행하여 전송 delay 및 control traffic overhead 등을 높이는 결과를 발생 시켰다. 본 논문은 single path로 구성되는 AODV 프로토콜의 route failures시 문제점을 보완한 Associativity Based Redundancy path Routing(ABRR) 및 Alternate Redundancy path Routing(ARR) schemes을 제안한다. 첫째, ABRR은 main path상에 있는 각 노드들은 associativity based stable node 정보를 이용하여 path broken 이전에 local redundancy path을 구성하여 path broken시 local routing없이 route을 복구할 수 있게 하고 둘째, ARR은 source­initialed route discovery에 의해 alternate path을 구성하여 ABRR 그리고 local routing에 의해 main route recovery 실패 시 alternate path을 main path로 전환하여 control traffic overhead 및 전송 delay을 줄이게 한다.

  • PDF

Job Deployment and Dynamic Routing for Container-AGVs (컨테이너용 AGV의 작업할당과 동적 경로계획)

  • So Myung-Ok;Lee Hyun-Sik;Jin Gang-Gyoo
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.29 no.4
    • /
    • pp.369-376
    • /
    • 2005
  • In recent years, AGVs(Automated Guided Vehicles) have received growing attention as a subsystem of the integrated container operating system which enables unmanned control. improvement of job reliability, accuracy and productivity. Therefore, a number of works have been done to enhance the performance AGVs. In this paper. job deployment and a dynamic routing control system composed of supervisor, traffic controller. motion controller and routing table are discussed. A simple job deployment scheme and an efficient dynamic routing algorithm incorporating with the deadlock prediction and avoidance algorithm are investigated.

An AODV-Based Two Hops Dynamic Route Maintenance in MANET (MANET에서의 AODV 기반 2홉 동적 경로유지 기법 연구)

  • Moon, Dae-Keun;Kim, Hag-Bae
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.191-198
    • /
    • 2007
  • A mobile ad-hoc network (MANET) is an autonomous, infrastructure-less system that consists of mobile nodes. In MANET, on demand routing protocols are usually used because network topology changes frequently. AODV, which is a representative on demand routing protocol, operates using the routing table of each node that includes next hop of a route for forwarding packets. It maintains the established route if there is not an expiration of route or any link break. In the paper, we propose a partially adaptive route maintenance scheme (AODV-PA) based on AODV, which provides dynamic route modification of initial route for selecting the effective route using not only next hop but also next-hop of next-hop (i.e. 2-hop next node) acquired through route discovery process. In addition, the proposed scheme additionally manages the routing table for preventing exceptional link breaks by route modification using HELLO messages. We use NS 2 for the computer simulation and validate that the proposed scheme is better than general AODV in terms of packet delivery ratio, latency, routing overhead.

The Bit-Map Trip Structure for Giga-Bit Forwarding Lookup in High-Speed Routers (고속 라우터의 기가비트 포워딩 검색을 위한 비트-맵 트라이 구조)

  • Oh, Seung-Hyun;Ahn, Jong-Suk
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.2
    • /
    • pp.262-276
    • /
    • 2001
  • Recently much research for developing forwarding table that support fast router without employing both special hardware and new protocols. This article introduces a new forwarding data structure based on the software to enable forwarding lookup to be penormed at giga-bit speed. The forwarding table is known as a bottleneck of the routers penormance due to its high complexity proportional to the forwarding table size. The recent research that based on the software uses a Patricia trie and its variants. and also uses a hash function with prefix length key and others. The proposed forwarding table structure construct a forwarding table by the bit stream array in which it constructs trie from routing table prefix entries and it represents each pointer pointing the child node and the associated forwarding table entry with one bit The trie structure and routing prefix pointer need a large memory when representing those by linked-list or array. but in the proposed data structure, the needed memory size is small enough since it represents information with one bit. Additionally, by use a lookup method that start searching at desired middle level we can shorten the search path. The introduced data structure. called bit-map trie shows that we can implement a fast forwarding engine on the conventional Pentium processor by reducing the backbone routing table fits into Level 2 cache of Pentium II processor and shortens the searching path. Our experiments to evaluate the performance of proposed method show that this bit-map trie accomplishes 5.7 million lookups per second.

  • PDF