101 resultados para Routing protocols

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mobile ad-hoc networks are characterised by constant topology changes, the absence of fixed infrastructure and lack of any centralised control. Traditional routing algorithms prove to be inefficient in such a changing environment. Ad-hoc routing protocols such as dynamic source routing (DSR), ad-hoc on-demand distance vector routing (AODV) and destination-sequence distance vector (DSDV) have been proposed to solve the multi hop routing problem in ad-hoc networks. Performance studies of these routing protocols have assumed constant bit rate (CBR) traffic. Real-time multimedia traffic generated by video-on demand and teleconferencing services are mostly variable bit rate (VBR) traffic. Most of these multimedia traffic is encoded using the MPEG standard. (ISO moving picture expert group). When video traffic is transferred over MANETs a series of performance issues arise. In this paper we present a performance comparison of three ad-hoc routing protocols - DSR, AODV and DSDV when streaming MPEG4 traffic. Simulation studies show that DSDV performs better than AODV and DSR. However all three protocols fail to provide good performance in large, highly mobile network environments. Further study is required to improve the performance of these protocols in mobile ad-hoc networks offering VBR services.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Opportunistic networks or OppNets refer to a number of wireless nodes opportunistically communicating with each other in a form of “Store-Carry-Forward”. This occurs when they come into contact with each other without proper network infrastructure. In OppNets there is no end-to-end connection between the source node and the destination node. OppNets grow from a single node (seed) to become large networks by inviting new nodes (helpers) to join the network. Due to these characteristics, OppNets are subject to real routing challenges. In this paper, we have presented an overview of the main available three families of OppNet routing protocols. Further, we have evaluated one protocol from each family (Epidemic, Direct Delivery and PRoPHET) in terms of complexity and scalability. Simulation results show that for small and medium complexity, the three protocols perform better than large complexity. As for scalability, simulation results show that Epidemic and PRoPHET perform better than Direct Delivery in terms of delivery rates and delays, but at a very high cost while Direct Delivery achieved lower delivery rates with a low cost.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper extends the conditions of the cluster-based routing protocols in terms of general algorithm complexity of data fusion, general compressing ratio of data fusion, and network area with long distance. Corresponding three general evaluation methods to evaluate the energy efficiency of the cluster-based routing protocols such as LEACH, PEGASIS, and BCDCP are provided. Moreover, three facts are found in them: (1) High-level software energy macro model is used to compute the energy dissipation of general data fusion software and make the constant value of energy dissipation of 1-bit data fusion an especial instance. (2) Multi-hop energy efficiency is related to the radio hardware parameters and the dynamic topology of network and the above protocols do not exploit the best use of the energy efficiency of multi-hop scheme. (3) High-energy dissipation non-cluster-head nodes, whose number changes with the density of the sensor nodes in clusters, worsen the death of nodes. The numerical results of experiments reprove these discoveries. Furthermore, they provide helpful guide for improving the above routing protocols to extent their application ranges.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

In this work we evaluate the performance of routing protocols for mobile ad hoc networks using different physical layer models. The results obtained show that the performance results obtained using idealized models such as the free space propagation model vary significantly when propagation effects such as path loss and shadowing are considered. This difference in performance indicates that optimization is required in the protocol development space that takes into account channel state information (CSI). Such an optimization requires a cross layer approach to be adopted and a framework for protocol performance evaluation to be established. We believe that this work would serve as a first step in this direction. We provide comparative performance results through network simulations.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Sensor nodes are closely tied with their geographic location and their connectivity. In recent years many routing protocols have been developed to provide efficient strategy. But most of them are either focus on the geographic proximity or on connectivity. However in sparse network, Geographic routing would fail at local dead ends where a node has no neighbour closer to destination. In contrast, connectivity-based routing may result in non-optimal path and overhead management. In this paper we designed a scalable and distributed routing protocol, GeoConnect, which considers geographic proximity and connectivity for choosing next hop. In GeoConnecl, we construct a new naming system that integrates geographic and connectivity information into a node identification. We use dissimilarity function to compute the dissimilarity and apply a distributed routing algorithm to route packets. The experimental results show that GeoConnect routing provides robust and better performance than sole geographic routing or connectivity routing.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Human associated delay-tolerant network (HDTN) is a new delay-tolerant network where mobile devices are associated with humans. It can be viewed from both their geographic and social dimensions. The combination of these different dimensions can enable us to more accurately comprehend a delay-tolerant network and consequently use this multi-dimensional information to improve overall network efficiency. Alongside the geographic dimension of the network which is concerned with geographic topology of routing, social dimensions such as social hierarchy can be used to guide the routing message to improve not only the routing efficiency for individual nodes, but also efficiency for the entire network.

We propose a multi-dimensional routing protocol (M-Dimension) for the human associated delay-tolerant network which uses the local information derived from multiple dimensions to identify a mobile node more accurately. Each dimension has a weight factor and is organized by the Distance Function to select an intermediary and applies multi-cast routing. We compare M-Dimension to existing benchmark routing protocols using the MIT Reality Dataset, a well-known benchmark dataset based on a human associated mobile network trace file. The results of our simulations show that M-Dimension has a significant increase in the average success ratio and is very competitive when End-to-End Delay of packet delivery is used in comparison to other multi-cast DTN routing protocols.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Cooperative relaying has been shown to be an effective method to significantly improve the error-rate performance in wireless networks. This technique combats fading by exploiting the spatial diversity made available through cooperating nodes that relay signals for each other. In the context of wireless sensor networks, cooperative relaying can be applied to reduce the energy consumption in sensor nodes and thus extend the network lifetime. Realizing this benefit, however, requires a careful incorporation of this technique into the routing process to exploit diversity gains. In this chapter, we introduce the basic concepts required to understand cooperative relaying and review current state of the art energy-efficient routing protocols that realize cooperative relaying.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Opportunistic networks or OppNets refer to a number of wireless nodes opportunistically communicating with each other in a form of “Store–Carry–Forward”. This occurs when they come into contact with each other without proper network infrastructure. OppNets use wireless technologies, such as IEEE 802.11, WiMAX, Bluetooth, and other short-range radio communication. In OppNets, there is no end-to-end connection between the source and the destination nodes, and the nodes usually have high mobility, low density, limited power, short radio range, and often subject to different kinds of attacks by malicious nodes. Due to these characteristics and features, OppNets are subject to serious security challenges. OppNets strongly depend on human interaction; therefore, the success of securing such networks is based on trust between people. This survey includes the security approaches in OppNets and techniques used to increase their security levels.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In many cases, sensors are randomly deployed in Wireless Sensor Networks (WSN), called Sensor-Randomly-Deployed WSN (SRD WSN). Several cluster-based routing protocols are provided to maximize network lifetime of SRD WSN in different sensor densities. LEACH performs better than direct routing in the density of 0.01. BCDCP excels LEACH in the density of 0.05. DMSTRP outperforms LEACH and BCDCP in the density of. However, simulation results under one or two kinds of sensor densities are not strong enough to prove the optimum of the routing protocols. In this paper, we give the general formulas to compute the network lifetimes of the above three routing protocols, discuss their optimal number of clusters, and compare their optimal network lifetime in arbitrary sensor densities. These formulas can provide more general design guidelines applicable to SRD WSN than simulation results under only one or two kinds of sensor densities. © 2007 IEEE.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Opportunistic Networks aim to set a reliable networks where the nodes has no end-To-end connection and the communication links often suffer from frequent disruption and long delays. The design of the OppNets routing protocols is facing a serious challenges such as the protection of the data confidentiality and integrity. OppNets exploit the characteristics of the human social, such as similarities, daily routines, mobility patterns and interests to perform the message routing and data sharing. Packet dropping attack is one of the hardest attacks in Opportunistic Networks as both the source nodes and the destination nodes have no knowledge of where or when the packet will be dropped. In this paper, we present a new malicious nodes detection technique against packet faking attack where the malicious node drops one or more packets and instead of them injects new fake packets. We have called this novel attack in our previous works a packet faking attack. Each node in Opportunistic Networks can detect and then traceback the malicious nodes based on a solid and powerful idea that is, hash chain techniques. In our hash chain based defense techniques we have two phases. The first phases is to detect the attack, and the second phases is to find the malicious nodes. We have compared our approach with the acknowledgement based mechanisms and the networks coding based mechanism which are well known approaches in the literature. In our simulation, we have achieved a very high node detection accuracy and low false negative rate.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Since the satellite network plays an irreplaceable role in many fields, how to interconnect it with the ground network has received an unprecedented attention. However, with much more requirements imposed to the current terrestrial network, many serious problems caused by the IP dual-role exposed. In this context, their direct interconnection seems not the most appropriate way. Thus, in this paper, SAT-GRD, an incrementally deployable ID/Loc split network architecture is proposed, aiming to integrate the satellite and ground networks efficiently. Specifically, SAT-GRD separates the identity of both the host and network from the location. Then, it isolates the host from the network, and further divides the whole network into core and edge networks. These make SAT-GRD much more flexible and scalable to achieve heterogeneous network convergence and avoid problems resulting from the overloaded semantics of IP addresses. In addition, much work has been done to implement the proof-of-concept prototype of SAT-GRD, and experimental results prove its feasibility.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Multicast is an important mechanism in modern wireless networks and has attracted significant efforts to improve its performance with different metrics including throughput, delay, energy efficiency, etc. Traditionally, an ideal loss-free channel model is widely used to facilitate routing protocol design. However, the quality of wireless links would be affected or even jeopardized by many factors like collisions, fading or the noise of environment. In this paper, we propose a reliable multicast protocol, called CodePipe, with advanced performance in terms of energy-efficiency, throughput and fairness in lossy wireless networks. Built upon opportunistic routing and random linear network coding, CodePipe not only simplifies transmission coordination between nodes, but also improves the multicast throughput significantly by exploiting both intra-batch and inter-batch coding opportunities. In particular, four key techniques, namely, LP-based opportunistic routing structure, opportunistic feeding, fast batch moving and inter-batch coding, are proposed to offer substantial improvement in throughput, energy-efficiency and fairness. We evaluate CodePipe on ns2 simulator by comparing with other two state-of-art multicast protocols, MORE and Pacifier. Simulation results show that CodePipe significantly outperforms both of them.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Service-oriented wireless sensor networks (WSNs) are being paid more and more attention because service computing can hide complexity of WSNs and enables simple and transparent access to individual sensor nodes. Existing WSNs mainly use IEEE 802.15.4 as their communication specification, however, this protocol suite cannot support IP-based routing and service-oriented access because it only specifies a set of physical- and MAC-layer protocols. For inosculating WSNs with IP networks, IEEE proposed a 6LoWPAN (IPv6 over LoW Power wireless Area Networks) as the adaptation layer between IP and MAC layers. However, it is still a challenging task how to discover and manage sensor resources, guarantee the security of WSNs and route messages over resource-restricted sensor nodes. This paper is set to address such three key issues. Firstly, we propose a service-oriented WSN architectural model based on 6LoWPAN and design a lightweight service middleware SOWAM (service-oriented WSN architecture middleware), where each sensor node provides a collection of services and is managed by our SOWAM. Secondly, we develop a security mechanism for the authentication and secure connection among users and sensor nodes. Finally, we propose an energyaware mesh routing protocol (EAMR) for message transmission in a WSN with multiple mobile sinks, aiming at prolonging the lifetime of WSNs as long as possible. In our EAMR, sensor nodes with the residual energy lower than a threshold do not forward messages for other nodes until the threshold is leveled down. As a result, the energy consumption is evened over sensor nodes significantly. The experimental results demonstrate the feasibility of our service-oriented approach and lightweight middleware SOWAM, as well as the effectiveness of our routing algorithm EAMR.