首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 203 毫秒
1.
Recently, there has been a great deal of research on network mobility management that can support the movement of a mobile network consisting of several mobile nodes. The IETF NEMO working group proposed a basic support protocol, which defines methodology for supporting network mobility by using bi-directional tunneling between the home agent and the mobile router. This protocol, however, suffers from the ‘pinball routing problem,’ and most of the research attempts to solve this problem still have limitations in the efficiency of intra-domain communication. Moreover, these methods require additional binding procedures in case of the root mobile router handover. In this paper, we propose new route optimization methodology that can remedy these limitations by using asymmetric tunneling and a hierarchical local binding mechanism, which can provide faster signaling and data transmission. It can also be easily extended to support micro-mobility without the need for additional extensions. The performance is evaluated by simulation which can show the efficiency of the approach, compared with several previous route optimization methods.  相似文献   

2.
The NEMO basic support protocol enhances mobile IPv6 (MIPv6) to enable mobile router (MR) to move together with mobile network node (MNN) as a unit. This protocol suffers from pinball routing effect which has triggered research works to enable direct routing between MNNs in the presence of network mobility. Instead of relying on MIPv6, this paper describes network mobility using a novel terminal-assisted IP mobility protocol on MNNs that work cooperatively with MRs and access routers to provide seamless connectivity. This protocol is superior as it neither suffers from pinball routing effect nor requires dedicated infrastructure support such as home agent. It also eliminates the need to dynamically increase the size of IP header in IP tunneling. Through quantitative comparisons with existing protocol, we show that this protocol performs better than existing protocols in terms of average packet delivery overhead and packet generation.  相似文献   

3.
Mobile ad hoc networks are self-organised, infrastructure-less networks in which each mobile host works as a router to provide connectivity within the network. Nodes out of reach to each other can communicate with the help of intermediate routers (nodes). Routing protocols are the rules which determine the way in which these routing activities are to be performed. In cluster-based architecture, some selected nodes (clusterheads) are identified to bear the extra burden of network activities like routing. Selection of clusterheads is a critical issue which significantly affects the performance of the network. This paper proposes an enhanced performance and trusted weight-based clustering approach in which a number of performance factors such as trust, load balancing, energy consumption, mobility and battery power are considered for the selection of clusterheads. Moreover, the performance of the proposed scheme is compared with other existing approaches to demonstrate the effectiveness of the work.  相似文献   

4.
Mobile IP is the basic solution to providing host mobility, whereas network mobility (NEMO) refers to the concept of the collective mobility of a set of nodes. The NEMO basic support protocol has been proposed in IETF as a first solution to the problem of network mobility. The main limitation of this basic solution is that it forces triangular routing, i.e., packets are always forwarded through the home agent (HA), following a suboptimal path. This is because each sub-NEMO obtains a care of address (CoA) that belongs to the home prefix of its parent mobile router. Such a CoA is not topologically meaningful in the current location, since the parent mobile router could also be away from home, and hence, packets addressed to the CoA are forwarded through the HA of the parent NEMO. To solve this problem, various extended proposals, with differing approaches and goals, exist for route optimization (RO) in NEMO applications. Their influences on the RO performance have been evaluated by classifying the detailed operations performed within the nested NEMO network, and then each category is analyzed in detail. The modeling of the detailed RO operation is intended to quantify the tradeoffs between the different approaches in order to provide a basis for the selection decision. In particular, the proposed grouping of the different proposals, based on their address configuration strategy, clarifies their similarities and differences, and provides some useful insights into the various methods that have been developed. In conclusion, it is suggested that, when choosing a solution for deploying NEMO, the designer has to balance his choices between the different pros and cons, and the different cases of application that are derived in this paper.  相似文献   

5.
Network Mobility (NEMO) handles mobility of multiple nodes in an aggregate manner as a mobile network. The standard NEMO suffers from a number of limitations, such as inefficient routing and increased handoff latency. Most previous studies attempting to solve such problems have imposed an extra signaling load and/or modified the functionalities of the main entities. In this paper, we propose a more secure and lightweight route optimization (RO) mechanism based on exploiting the firewall in performing the RO services on behalf of the correspondent nodes (CNs). The proposed mechanism provides secure communications by making an authorized decision about the mobile router (MR) home of address, MR care of address, and the complete mobile network prefixes underneath the MR. In addition, it reduces the total signaling required for NEMO handoffs, especially when the number of mobile network nodes and/or CNs is increased. Moreover, our proposed mechanism can be easily deployed without modifying the mobility protocol stack of CNs. A thorough analytical model and network simulator (Ns‐2) are used for evaluating the performance of the proposed mechanism compared with NEMO basic support protocol and state‐of‐the‐art RO schemes. Numerical and simulation results demonstrate that our proposed mechanism outperforms other RO schemes in terms of handoff latency and total signaling load on wired and wireless links.  相似文献   

6.
Ad hoc networks have a scalability problem. When the nodes of an ad hoc network increase in number or mobility, the amount of control traffic for routing increases and could cause traffic congestion. Cluster-based routing schemes have been proposed as a solution to this problem. Typical cluster-based ad hoc networks use a proactive routing scheme for intra-cluster routes and a reactive routing scheme for inter-cluster routes. In this study, we propose a new cluster-based routing scheme for ad hoc networks which makes use of the mobility of nodes. Nodes are divided into two groups on the basis of their mobility. For a route search within a cluster, a proactive routing scheme is used for low-mobility nodes and a flooding-based reactive routing scheme is used for high-mobility nodes. The required control traffic of the proposed scheme is analyzed and optimal parameters of the proposed scheme are derived from the analysis. The numerical results show that the proposed scheme produces far less control traffic than a typical cluster-based routing scheme.  相似文献   

7.
As the volume of mobile traffic consisting of video, voice, and data is rapidly expanding, a challenge remains with the mobile transport network, which must deliver data traffic to mobile devices without degrading the service quality. Since every Internet service holds its own service quality requirements, the flow-aware traffic management in fine granularity has been widely investigated to guarantee Quality of Service (QoS) in the IP networks. However, the mobile flow-aware management has not been sufficiently developed yet because of the inherent constraints of flow routing in the mobile networks regarding flow-aware mobility and QoS support. In this paper, we propose a flow-aware mobility and QoS support scheme called mobile flow-aware network (MFAN) for IP-based wireless mobile networks. The proposed scheme consists of dynamic handoff mechanisms based on QoS requirements per flow to reduce the processing overhead of the flow router while ensuring QoS guarantee to mobile flows. The performance analyses of the proposed scheme demonstrate that MFAN successfully supports the mobile flow traffic delivery while satisfying the QoS requirement of flows in the wireless mobile IP networks.  相似文献   

8.
We consider the realization of traffic-oblivious routing in IP-over-optical networks where routers are interconnected over a switched optical backbone. The traffic-oblivious routing we consider is a scheme where incoming traffic is first distributed in a preset manner to a set of intermediate nodes. The traffic is then routed from the intermediate nodes to the final destination. This splitting of the routing into two phases simplifies network configuration significantly. In implementing this scheme, the first and second phase paths are realized at the optical layer with router packet grooming at a single intermediate node only. Given this unreliability of routers, we consider how two-phase routing in IP-over-optical networks can be made resilient against router node failures. We propose two different schemes for provisioning the optical layer to handle router node failures-one that is failure node independent and static, and the other that is failure node dependent and dynamic We develop linear programming formulations for both schemes and a fast combinatorial algorithm for the second scheme so as to maximize network throughput. In each case, we determine (i) the optimal distribution of traffic to various intermediate routers for both normal (no-failure) and failure conditions, and (ii) provisioning of optical layer circuits to provide the needed inter-router links. We evaluate the performance of the two router failure protection schemes and compare it with that of unprotected routing  相似文献   

9.
Supporting IP Multicast for Mobile Hosts   总被引:6,自引:0,他引:6  
  相似文献   

10.
We analyze the capacity scaling laws of mobile ad hoc networks comprising heterogeneous nodes and spatial inhomogeneities. Most of previous work relies on the assumption that nodes are identical and uniformly visit the entire network space. Experimental data, however, show that the mobility pattern of individual nodes is usually restricted over the area, while the overall node density is often largely inhomogeneous due to the presence of node concentration points. In this paper we introduce a general class of mobile networks which incorporates both restricted mobility and inhomogeneous node density, and describe a methodology to compute the asymptotic throughput achievable in these networks by the store-carry-forward communication paradigm. We show how the analysis can be mapped, under mild assumptions, into a Maximum Concurrent Flow (MCF) problem over an associated Generalized Random Geometric Graph (GRGG). Moreover, we propose an asymptotically optimal scheduling and routing scheme that achieves the maximum network capacity.  相似文献   

11.
The Locator Identifier Separation Protocol (LISP) has been proposed as an identifier-locator separation scheme for scalable Internet routing. However, LISP was originally designed in the fixed network environment rather than in the mobile network environment. In particular, the existing LISP mobility schemes are based on a centralized map server that is used as an anchor point for mobile nodes, and thus intrinsically subject to some limitations in mobile environment. In this paper, we propose a distributed mapping management of Endpoint Identifiers (EIDs) and Locators (LOCs) in mobile LISP networks. We use Routing LOC (RLOC) and Local LOC (LLOC) as locators for mobile hosts. RLOC represents the IP address of the domain gateway, and LLOC is the IP address of the access router that a host is currently attached to. For EID-LOC mapping management, each network domain has a Distributed Map Server (DMS) over its gateway. Each DMS keeps track of the EID-LOC mapping information for mobile hosts in the distributed way. The proposed scheme is also a network-based approach, in which each access router, instead of a host, performs the mapping management operations. From the performance analysis, we can see that the proposed distributed scheme can give better performance than the existing schemes in terms of the signaling delays required for EID-LOC mapping update and query operations.  相似文献   

12.
Lyes  Hamamache   《Ad hoc Networks》2008,6(2):168-194
The ad hoc networks are completely autonomous wireless networks where all the users are mobile. These networks do not work on any infrastructure and the mobiles communicate either directly or via other nodes of the network by establishing routes. These routes are prone to frequent ruptures because of nodes mobility. If the future movement of the mobile can be predicted in a precise way, the resources reservation can be made before be asked, which enables the network to provide a better QoS. In this aim, we propose a virtual dynamic topology, which on one hand, will organize the network as well as possible and decreases the impact of mobility, and on the other hand, is oriented user mobility prediction. Our prediction scheme uses the evidence theory of Dempster–Shafer in order to predict the future position of the mobile by basing itself on relevant criteria. These ones are related to mobility and network operation optimisation. The proposed scheme is flexible and can be extended to a general framework. To show the relevance of our scheme, we combine it with a routing protocol. Then, we implemented the prediction-oriented topology and the prediction scheme which performs on it. We implemented also a mobility prediction based routing protocol. Simulations are made according to a set of elaborate scenarios.  相似文献   

13.
In a critical environment, e.g. in a factory where an employee faces hazardous conditions, monitoring the health status of the employee is important. Thus, continuous connectivity of the employee to the network is the main concern of such networks. In this paper, we have proposed a decentralized approach for mobility management of mobile nodes in hazardous areas like factory. The proposed mobility structure for hazardous areas, called MSHA, organizes static nodes as a tree for an efficient routing, automatic addressing, and handling movement of mobile nodes. MSHA is capable of handling multiple failures of static nodes which disconnect a mobile node from the network. MSHA is highly scalable regarding the number of mobile nodes and the size of the covered monitoring area. The proposed scheme is evaluated based on different factors. The results reveal the superiority of MSHA compared with the previous works. The promising analytical results manifest the performance (about 20%) of MSHA specifically in reducing packet loss and hand-off delay caused by the failure of the static nodes. The performance does not degrade with increasing the number of mobile nodes.  相似文献   

14.
Ad hoc wireless networks are composed of mobile nodes communicating through wireless links, without any fixed backbone infrastructure. Frequent topology changes due to node mobility make routing in such dynamic networks a challenging problem. Moreover, successful message routing implies every mobile node is potentially capable of acting as a router, thus supporting store-and-forward mechanisms. However, resource limitations on these nodes also require a control on congestion due to message forwarding. In this paper, we consider our recently proposed randomized version of the well-known Destination-Sequenced Distance Vector (DSDV) routing protocol, referred to as R-DSDV, and validate its performance through extensive simulation experiments. Our results demonstrate that a probabilistic control on message traffic based on local tuning of protocol parameters is feasible, and that R-DSDV outperforms the basic DSDV protocol by significantly reducing the average queue size associated with each mobile node and hence the average packet delay.  相似文献   

15.
Recently, Mobile Ad Hoc networks (MANETs) are growing in popularity and importance. They present a possible communication among a set of mobile nodes with no need for either a pre-established infrastructure or a central administration. However, in order to guarantee an efficient communication among network nodes, efficient routing algorithms should be established. Routing plays the central role in providing ubiquitous network communications services in such dynamic networks. The problem is further aggravated through the node mobility as any node may move at any time without notice. Several routing protocols had been proposed; however, most of them suffer from control packet flooding, which results in a scalability problem. In this paper, a new routing strategy for MANETs is proposed which is called Snack Routing Strategy (SRS). The basic idea of SRS is to continuously inform the network mobile nodes with any changes in the network topology without overloading the network by a huge amount of control messages. SRS is a hybrid routing strategy that relies on Learning by accumulation, hence, new routes can be discovered by learning the accumulative data stored in the nodes routing tables by several foraging artificial snacks. SRS uses no periodic routing advertisement messages but uses artificial snacks instead, thereby reducing the network bandwidth overhead and minimizing end-to-end transmission delay. SRS has been compared against two well known protocols AODV and DSR. Experimental results have shown that SRS outperforms both AODV and DSR as it introduces the minimal routing overheads.  相似文献   

16.
We present a new hierarchical location update and routing scheme for a wide area mobile computing environment with scalability of network hierarchy. Our scheme provides nearly optimal routing for most communication bypassing the mobile host's home network and home agent. We use simulation to compare our scheme with other schemes in both non‐hierarchical and hierarchical network architectures. Copyright © 2000 John Wiley & Sons, Ltd.  相似文献   

17.
The envisioned sensor network architecture where some of the nodes may be mobile poses several new challenges to this special type of ad hoc wireless network. Recently, researchers have proposed several data dissemination protocols based on either some hierarchical structure mainly constructed by a source node or source/sink oriented dissemination tree to support mobile sinks. However, such a source-initiated hierarchical structure results in significant resource consumption as the number of source-sink pairs are increased. Additionally, stimulus mobility aggravates the situation, where several sources may build a separate data forwarding hierarchy along the stimulus moving path. In this paper, we propose a new data dissemination protocol that exploits “Quadtree-based network space partitioning” to provide more efficient routing among multiple mobile stimuli and sink nodes. A common hierarchy of cluster-head nodes is constructed where the data delivery to mobile sinks is independent of the current position of mobile stimuli. Therefore, the overhead needed for hierarchy (route) maintenance is lower. Simulation results show that our work significantly reduces average energy consumption while maintaining comparably higher data delivery ratio.  相似文献   

18.
移动IPv6协议解决了IPv6网络中移动节点的位置更新和路由可达问题,使移动节点能够在不同IPv6子网间进行切换而不中断当前连接。但是这种切换的时延较长,影响移动IPv6网络的性能。为了减少切换时延,文章在移动IPv6协议中引入软切换技术,提出一种采用绑定更新计时器和路由优先级变换机制的软切换工程实现方案,实验结果表明,该软切换方案可以有效提高移动IPv6网络的性能。  相似文献   

19.
Real-time payments for mobile IP   总被引:2,自引:0,他引:2  
The mobile IP protocol has evolved from providing mobility support for portable computers to support for wireless handheld devices with high mobility patterns. A new category of micromobility protocols has been proposed to deal with the increased signaling loads that will be generated with large populations of such devices on a network. We argue that the authentication schemes presently employed in these networks do not scale well for large numbers of nodes, and that the lack of accounting procedures prevents the mass deployment of these networks. We envisage that future access networks will be operated by independent service providers, who will charge users for access to services in the fixed network but may not have long-term contractual relationships with them. These access networks may also employ a variety of micromobility protocols for fast handover support. We present a scheme based on hash chains, which allows for fast authentication of datagrams for secure updating of router entries within the access network, and real-time accounting of network usage by mobile nodes. Such a system will alleviate problems of fraud in mobile networks and eliminate the need for interoperator billing agreements.  相似文献   

20.
移动自组网是一种有特殊用途的对等式网络,具有无中心、自组织、可快速展开、可移动等特点,这些特点使得它在战场、救灾等特殊场合的应用日渐受到人们的重视.由于在移动自组网络中每节点既是主机又是路由器,所以容易遭受基于路由信息的攻击,而现今的路由协议基本没有考虑到该问题.本文在分析移动自组网络安全特性的基础上,综述了该方面的研究工作,建立了基于声誉机制评价体系,并给出了具体的评价方法和计算模型.在此基础上,提出了基于声誉机制的安全路由协议S-DSR.仿真结果表明在存在攻击节点的情况下S-DSR协议比DSR协议具有更好的包传输率、包丢失率等属性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号