首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.

Broadcasting is an important phenomenon, because it serves as simplest mode of communication in a network, via which each node disseminates information to their neighboring nodes simultaneously. Broadcasting is widely used in various kind of networks, such as wireless sensor networks, wireless networks, and ad-hoc networks. Similarly, in cognitive radio networks (CRNs), broadcasting is also used to perform many tasks including neighbor discovery, spectrum mobility, spectrum sharing, and dissemination of message throughout the network. The traditional approach that has been used as broadcasting in CRNs is simple flooding in which a message is disseminated in the network without any strategy check. Simple flooding can cause major setbacks in the network, such as excessive redundant rebroadcasts, and collision drops which collectively are termed as broadcast storm problem. To reduce the effects of broadcast storm problem in wireless networks, we propose and compare four broadcasting strategies for cognitive radio networks in this paper. These four strategies are: (1) probability based, (2) counter based, (3) distance based, and (4) area based. Extensive NS-2 based simulations are carried out on different threshold values for each broadcasting strategy. After experimental evaluation, it is demonstrated that counter based broadcasting surpasses other broadcasting strategies by achieving maximum delivery ratio of 60% and by decreasing redundant rebroadcasts and collision drops up to 44 and 37% respectively.

  相似文献   

2.
A mobile ad-hoc network (MANET) is formed by a cluster of mobile hosts, without the infrastructure of base stations. To deal with the dynamic changing topology of a MANET, many routing protocols have been proposed. In this paper, we consider the route maintenance problem, which includes two parts: route deterioration and route breakage. In a MANET, a route may suddenly become broken because only one host roams away. Even if a route remains connected, it may become worse due to host mobility or a better route newly being formed in the system. Existing protocols, however, will stick with a fixed route once it is discovered, until it is expired or broken. In this paper, we show how to enhance several existing protocols with route optimization and local route recovery capability. So the routing paths can be adjusted on-the-fly while they are still being used for delivering packets and can be patched in minimum wireless bandwidth and delay while route errors occur.  相似文献   

3.
One of the fundamental and important operations in sensor networks is sink–source matching, i.e. target detection. Target detection is about how a sink finds the location of source nodes observing the event of interest (i.e. target activity). This operation is very important in many sensor network applications such as military battlefield and environment habitats. The mobility of both targets and sinks brings significant challenge to target detection in sensor networks. Most existing approaches are either energy inefficient or lack of fault tolerance in the environment of mobile targets and mobile sinks. Motivated by these, we propose an energy-efficient line proxy target detection (LPTD) approach in this paper. The basic idea of LPTD is to use designated line proxies as rendezvous points (or agents) to coordinate mobile sinks and mobile targets. Instead of having rendezvous nodes for each target type as used by most existing approaches, we adopt the temporal-based hash function to determine the line in the given time. Then the lines are alternated over time in the entire sensor network. This simple temporal-based line rotation idea allows all sensor nodes in the network to serve as rendezvous points and achieves overall load balancing. Furthermore, instead of network-wide flooding, interests from sinks will be flooded only to designated line proxies within limited area. The interest flooding can further decrease if the interest has geographical constraints. We have conducted extensive analysis and simulations to evaluate the performance of our proposed approach. Our results show that the proposed approach can significantly reduce overall energy consumption and target detection delay. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

4.
The mobile ad hoc network (MANET) has attracted a lot of interest recently. However, most of the existing works have assumed a stand-alone MANET. In this paper, we propose a two-tier, heterogeneous MANET architecture which can support Internet access. The low tier of the network consists of a set of mobile hosts each equipped with a IEEE 802.11 wireless LAN card. In order to connect to the Internet and handle the network partitioning problem, we propose that the high tier is comprised of a subset of the mobile hosts, called gateways, which can access to cellular/infrastructure networks. The high tier is heterogeneous in the sense that the network interfaces in the gateway hosts could be IEEE 802.11 cards, PHS handsets, or GPRS handsets characterized by different bandwidths and latencies. Observing that the gateways could become the bottlenecks of the two-tier network, we propose a set of solutions, namely boundary-moving, host-partitioning, and probabilistic solutions, to solve the load-balance routing issue. Implementation issues/concerns of these schemes are discussed. Simulation results are presented to compare these load-balance routing schemes.  相似文献   

5.
The incredible growth in the capabilities and functionality of mobile devices has enabled new applications and network architectures to emerge. Due to the potential for node mobility, along with significant node heterogeneity, characteristics such as very large delays, intermittent links, and high link error rates pose a new set of network challenges. Along with these challenges, end‐to‐end paths are assumed not to exist and message relay approaches are often adopted. While message flooding is a simple and robust solution for such cases, its cost in terms of network resource consumption is unaffordable. In this paper, we focus on the evaluation of different controlled message flooding schemes over disconnected sparse mobile networks. We study the effect of these schemes on message delay, network resource consumption, and neighbor discovery overhead. Our simulations show that our schemes can save substantial network resources while incurring a negligible increase in the message delivery delay. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

6.
A mobile ad hoc network (MANET) is an open wireless network that comprises a set of mobile, decentralized, and self‐organized nodes. Its properties render its environment susceptible to different types of attacks, which can paralyze the mobile nodes in MANET. A particularly dangerous type of attack is run primarily under flooding bogus packet mechanisms, such as hello floods, routing table overflows, exploitation of node penalizing schemes, and resource consumption attack (RCA). Flooding‐based attacks impose severe effects because they are intended to consume MANET resources, such as bandwidth, node memory, and battery power. Therefore, identifying such effects facilitates the development of countermeasures against the intrusions. In this paper, we introduce a simulation‐based study on the effects of RCA on MANET. Qual Net v5.0.2 is used to examine the severity of the effects on MANET performance metrics in terms of throughput, end‐to‐end delay, energy consumption, and routing overhead. The effects of RCA are also monitored under two combinations of four factors: we first vary the number of attackers and attackers' positions, and then modify the attackers' radio range and flooding rate. We also examine the effect of flooding mechanism on the energy consumed by resource consumption attackers. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

7.
On-demand routing protocols are widely used in mobile Ad-hoc network (MANET). Flooding is an important dissemination scheme in routing discovering of on-demand routing protocol. However, in high-density MANET redundancy flooding packets lead to dramatic deterioration of the performance which calls broadcast storm problem (BSP). A location-aided probabilistic broadcast (LAPB) algorithm for routing in MANET is proposed to reduce the number of routing packets produced by flooding in this paper. In order to reduce the redundancy packets, only nodes in a specific area have the probability, computed by location information and neighbor knowledge, to propagate the routing packets. Simulation results demonstrate that the LAPB algorithm can reduce the packets and discovery delay (DD) in the routing discovery phase.  相似文献   

8.
基于策略系统的SYN Flooding攻击防御机制   总被引:3,自引:0,他引:3  
拒绝服务(denial of service)攻击对网络带来的危害越来越严重,SYN Flooding攻击是DoS攻击中著名的一种.本文介绍了在网络测量平台上基于策略系统的SYN Flooding攻击防御机制.文章首先简单介绍了SYN Flooding的攻击原理、防御方法以及网络监测系统,然后对策略系统进行了讨论,最后详细阐述了网络测量平台上基于策略系统的SYN Flooding攻击检测和追踪工具的设计与实现,并进行了分析.  相似文献   

9.
A Multi-Path QoS Routing Protocol in a Wireless Mobile Ad Hoc Network   总被引:2,自引:0,他引:2  
A mobile ad hoc network (MANET) is one composed of a set of mobile hosts capable of communicating with each other without the assistance of base stations. This paper considers the QoS (quality-of-service) routing problem in a MANET, which is important for many real-time multimedia applications. We propose an on-demand protocol for searching for a multi-path QoS route from a source host to a destination host in a MANET, where a multi-path is a network with a source and a sink satisfying certain bandwidth requirement. Existing works all try to find a uni-path to the destination. The basic idea is to distribute a number of tickets from the source, which can be further partitioned into subtickets to search for a satisfactory multi-path. Through simulations, we justify that the value of our multi-path protocol is in its flexibility: (i) when the network bandwidth is very limited, it can offer a higher success rate to find a satisfactory QoS route than those protocols which try to find a uni-path, and (ii) when the network bandwidth is sufficient, it can perform almost the same as those protocols which try to find a uni-path (in both routing overhead and success rate).  相似文献   

10.
This paper considers a spatially separated wireless sensor network, which consists of a number of isolated subnetworks that could be far away from each other in distance. We address the issue of using mobile mules to collect data from these sensor nodes. In such an environment, both data‐collection latency and network lifetime are critical issues. We model this problem as a bi‐objective problem, called energy‐constrained mule traveling salesman problem (EM‐TSP), which aims at minimizing the traversal paths of mobile mules such that at least one node in each subnetwork is visited by a mule and the maximum energy consumption among all sensor nodes does not exceed a pre‐defined threshold. Interestingly, the traversal problem turns out to be a generalization of the classical traveling salesman problem (TSP), an NP‐complete problem. With some geometrical properties of the network, we propose some efficient heuristics for EM‐TSP. We then extend our heuristics to multiple mobile mules. Extensive simulation results have been conducted, which show that our proposed solutions usually give much better solutions than most TSP‐like approximations. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

11.
Uichin  Jiejun  Mario  Joon-Sang  Eugenio   《Ad hoc Networks》2007,5(6):943-958
In this paper we study multi-hop ad hoc routing in a scalable underwater sensor network (UWSN), which is a novel network paradigm for ad hoc investigation of the world below the water surface. Unlike existing underwater acoustic networks (UAN), the new UWSN paradigm dispatches large number (in the thousands) of unmanned low-cost sensor nodes to locally monitor and report otherwise not easily accessible underwater events in a time-critical manner. Due to the large propagation latency and very low bandwidth of the acoustic channel, a new protocol stack and corresponding models are required as conventional approaches fail. In particular, we show that neither proactive routing message exchange nor reactive/on-demand flooding is adequate in the challenging new underwater environment. Unlike the terrestrial scenarios, on-demand flooding cannot be both reliable and efficient due to widespread collisions caused by the large propagation delay. On the other hand, as in terrestrial scenarios, proactive routing is more expensive and less efficient than on-demand routing in typical underwater environments. We propose a “conservative” communications architecture that minimizes the number of all packet transmissions to avoid possible acoustic collisions. This is implemented in the non-intrusive underwater diffusion (UWD), which is a multi-hop ad hoc routing and in-network processing protocol with no proactive routing message exchange and negligible amount of on-demand floods. To achieve its design goal, UWD does not rely on GPS or power hungry motors to control currents. Instead, UWD is designed in a minimalist’s framework, which assumes homogeneous GPS-free nodes and random node mobility. Our simulation study verifies the effectiveness and efficiency of our design.  相似文献   

12.
We address the problem of routing Label Switched Paths (LSPs) in multi-layer networks based on the Generalized MultiProtocol Label Switching (GMPLS) paradigm. In particular, we pursue policies for choosing the appropriate layer to host a new LSP request, as we find that such layer-preference policies have significant impact on network performance. We discuss several simple layer-preference policies and we reveal why these simple policies ruin network performance in the long run. Consequently, we develop an efficient heuristics, the Min-phys-hop routing and wavelength assignment algorithm, to govern the selection of the best layer of a multi-layer network in which to host new LSP requests. We discuss the applicability of this algorithm with respect to the state-of-the-art GMPLS standards, above all, the GMPLS routing extensions to OSPF-TE. By extensive simulations, we justify that the Min-phys-hop algorithm produces close-to-optimal blocking and resource consumption under almost all possible selections of input parameters, and this is regardless of the wavelength and Optical-Electrical-Optical (OEO) conversion capability present in the network.  相似文献   

13.
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks   总被引:9,自引:0,他引:9  
An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Prior research in ad hoc networking has generally studied the routing problem in a non-adversarial setting, assuming a trusted environment. In this paper, we present attacks against routing in ad hoc networks, and we present the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne. Ariadne prevents attackers or compromised nodes from tampering with uncompromised routes consisting of uncompromised nodes, and also prevents many types of Denial-of-Service attacks. In addition, Ariadne is efficient, using only highly efficient symmetric cryptographic primitives.  相似文献   

14.
Sensor networks have been receiving significant attention due to their potential applications in environmental monitoring and surveillance domains. In this paper, we consider the design issue of sensor networks by placing a few powerful aggregate nodes into a dense sensor network such that the network lifetime is significantly prolonged when performing data gathering. Specifically, given K aggregate nodes and a dense sensor network consisting of n sensors with Kn, the problem is to place the K aggregate nodes into the network such that the lifetime of the resulting network is maximized, subject to the distortion constraints that both the maximum transmission range of an aggregate node and the maximum transmission delay between an aggregate node and its covered sensor are met. This problem is a joint optimization problem of aggregate node placement and the communication structure, which is NP‐hard. In this paper, we first give a non‐linear programming solution for it. We then devise a novel heuristic algorithm. We finally conduct experiments by simulation to evaluate the performance of the proposed algorithm in terms of network lifetime. The experimental results show that the proposed algorithm outperforms a commonly used uniform placement schema — equal distance placement schema significantly. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

15.
Dynamic Traitor Tracing   总被引:2,自引:0,他引:2  
Traitor tracing schemes were introduced to combat the typical piracy scenario whereby pirate decoders (or access control smartcards) are manufactured and sold by pirates to illegal subscribers. Those traitor tracing schemes, however, are ineffective for the currently less common scenario where a pirate publishes the periodical access control keys on the Internet or, alternatively, simply rebroadcasts the content via an independent pirate network. This new piracy scenario may become especially attractive (to pirates) in the context of broadband multicast over the Internet. In this paper we consider the consequences of this type of piracy and offer countermeasures. We introduce the concept of dynamic traitor tracing which is a practical and efficient tool to combat this type of piracy. Received December 1999 and revised November 2000 Online publication 9 April 2001  相似文献   

16.
Nodes mobility brings flinty challenges to multicast in Mobile ad hoc Networks (MANETs). To track nodes mobility, flooding messages are widely used for data delivery structure construction and maintenance in many multicast protocols. These periodic flooding messages significantly consume network resources, such as energy and bandwidth, and result in network collisions. To release data delivery structure maintenance onus, profited from GPS location service, a number of stateless location based multicast protocol were proposed, where a destination list is encapsulated into each data packet for data packet orientation. However, due to data packet capability limitation, the way of encapsulating a destination list in each data packet header restricts the protocol scalability. To solve the scalability issue of multicast protocols, we propose a Scalable Location Guide Overlay Multicast (SLGOM) for MANETs. Analysis and simulation results show that SLGOM achieves high performance in large multicast group and significantly improves the scalability of stateless multicast with respect to group size. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

17.
This paper considers the channel assignment problem in a multi‐channel MANET environment. We propose a scheme called GRID, by which a mobile host can easily determine which channel to use based on its current location. In fact, following the GSM style, our GRID spends no communication cost to allocate channels to mobile hosts since channel assignment is purely determined by hosts' physical locations. We show that this can improve the channel reuse ratio. We then propose a multi‐channel MAC protocol, which integrates GRID. Our protocol is characterized by the following features: (i) it follows an ‘on‐demand’ style to access the medium and thus a mobile host will occupy a channel only when necessary, (ii) the number of channels required is independent of the network topology, and (iii) no form of clock synchronization is required. On the other hand, most existing protocols assign channels to a host statically even if it has no intention to transmit [IEEE/ACM Trans. Networks 1995; 3 (4):441–449; 1993; 1 (6): 668–677; IEEE J. Selected Areas Commun. 1999; 17 (8):1345–1352], require a number of channels which is a function of the maximum connectivity [IEEE/ACM Trans. Networks 1995; 3 (4):441–449; 1993; 1 (6): 668–677; Proceedings of IEEE MILCOM'97, November 1997; IEEE J. Selected Areas Commun. 1999; 17 (8):1345–1352], or necessitate a clock synchronization among all hosts in the MANET [IEEE J. Selected Areas Commun. 1999; 17 (8):1345–1352; Proceedings of IEEE INFOCOM'99, October 1999]. Through simulations, we demonstrate the advantages of our protocol. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   

18.
In this paper, the resource allocation problem in a general network configuration is addressed. In particular, we will present a distributed solution algorithm in one the hand, followed by the exact set of equations that solves for (p,1)‐proportionally fair allocation in an attempt to express the network optimal rates in a closed form on the other hand. First, the problem is presented as an optimization model that maximizes the social utility of the network. A duality approach is used to solve the network model in a timely synchronized iterative manner. Next, the exact analytical variant of the model is presented showing its equivalence to the numerical solution. The analytical model relies on the pattern of bottlenecks inside the network, which can be found using a weighted progressive filling. Such a pattern will help in finding the exact analytical set of equations that solves for proportionally fair rates for any network configuration. Closed‐form solutions are now computed for different networks including well‐known configurations such as linear, grid, and cyclic networks. Different simulation experiments are conducted along with the solution of standard optimization solvers. The results of the simulation, the solvers, and the analytical solutions coincide and present the same allocation. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

19.
Nodes in a computer network often require a copy of a message to be delivered to every node in the network. The network layer can provide such a service, referred to as network‐wide broadcast routing or simply ‘broadcasting’. Broadcasting has many applications, including its role as a service to many routing protocols. In a mobile ad hoc network (MANET), simplistic broadcast schemes (such as flooding) inundate the network with redundancy, contention, collision, and unnecessary use of energy resources. This can prevent broadcasts from achieving their primary objective of maximizing delivery ratio, while also considering secondary objectives, such as balancing energy resources or reducing the network's burden on congested or busy nodes. As a solution, we propose multiple‐criteria broadcasting (MCB). In MCB, the source of each broadcast specifies the importance assigned to broadcast objectives. Network nodes use these priorities, along with local and neighbor knowledge of distributed factors, to broadcast in accordance with the objective priorities attributed to the message. Using ns2, the performance of MCB is evaluated and compared to that of other broadcast protocols. To present knowledge, MCB constitutes the first reconfigurable, multi‐objective approach to broadcasting. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

20.
Broadcasting has been widely used in mobile Ad hoc networks as a communication means to disseminate information to all reachable nodes. Because radio signals are likely to overlap with others in a geographical area, straightforward broadcasting by flooding becomes very costly and results in serious redundancy, contention and collision, to which we refer as the broadcast storm problem. In this paper we propose the Relative Degree Adaptive flooding Broadcast (RDAB) algorithm for Ad hoc networks to efficiently reduce the broadcast overhead in the network. Based on the current situation of the network and the degree of the nodes, RDAB calculates the relative degree of the nodes, decides which nodes need to re-transmit and which nodes only need to receive. The higher the neighbor node's relative degree, the more uncovered nodes it can cover, hence these nodes can be selected to re-transmit broadcasting packets in the networks. We analyze the reliability and the validity of the RDAB algorithm to prove that the RDAB algorithm is a valid flooding broadcast algorithm. Simulation results show that the RDAB strategy outperforms the Ordinary Flooding Broadcast Method (OBM) and the Multipoint Relaying (MPR) protocol for Ad hoc networks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号