• Title/Summary/Keyword: MANET

Search Result 573, Processing Time 0.263 seconds

Transmission Performance of Application Service Traffic on MANET with IDS (IDS가 있는 MANET에서 응용 서비스 트래픽의 전송 성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.584-587
    • /
    • 2012
  • MANET, which can be constructed with only terminal devices, has structural advantages of ease installation and operation, also has environmental change of rapid supply of smart phone, it's usage can be extended to application area likes as emergency communication, leasure, exploration and investigations. But, as one characteristic of MANET, no use of communicaton infrastructure caused disadvantage of weakness for information intrusion which is frequently occurred, nowadays. In this paper, the effects of IDS(Intrusion Detection System), one of defence tools for information intrusion, is analyzed for transmission performance. Blackhole attack is assumed as a type of intrusion, MANET defence with IDS from intrusions. Computer simulation based on NS-2 used for performance measurement. In this paper, performance measurement is done for application service to analyze application level effects of IDS. VoIP service is used as application service.

  • PDF

T-Chord Ring System based on Overlay Network for Service Discovery and Delivery in MANET (MANET에서 서비스 발견 및 전달을 위한 오버레이 네트워크 기반의 T-Chord 링 시스템)

  • Han, Insung;Jeong, Hongsik;Park, Moosung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.51-63
    • /
    • 2013
  • Recently with base apply MANET with the application for the service discovery and delivery which are various techniques are being proposed the result of such MANET base research techniques from actual inside. This dissertation proposes T-Chord(Trustworthy-based Chord) Ring system for MANET to guarantees from such requirements. T-Chord Ring system in order to manage Efficiently the services which the mobile nodes provide is the service discovery system which uses P2P overlay network Technique in mobile environment. The system which is proposed MANET communications in order to accomplish a service discovery operation with physical network class and logical network class will be able to minimize problems from about MANET service discoveries, and uses the dispersive hash table technique for a service discovery and effectiveness of service discovery improves and will be able to guarantee the expandability of network size. The mobile nodes(mobile device) have a mobility from MANET and operate with service request node, service provide node and service transmit node. The mobile nodes will be able to elect cluster header using Trustworthy that was evaluated service request, provision and delivery in each other. The system which is proposed a service discovery and a delivery efficiently will compose the cluster head which will grow of P2P overlay networks and will be able to accomplish. The system which proposes from dissertation is composed of Trustworthy evaluations of MANET mobile nodes, service information collection which is dispersed and P2P overlay networks that composed of Chord algorithm modules which provide O(Log N) efficiencies. The system comparison evaluation analyzes an efficiency from the expandability side of effectiveness and the network of service discovery technique and the service discovery message over head, service discovery and delivery of former times and service discovery and delivery is excellent gives proof from MANET.

The MANET based Distributed Control Communications for Remote Controlled drones (원거리 드론 제어를 위한 MANET기반의 분산제어 통신)

  • Jeong, Seong Soon;Kwon, Ki Mun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.5
    • /
    • pp.168-173
    • /
    • 2016
  • The latest drone market is evolving rapidly. The commercial drone market developed rapid growth. Up to now, one controller had controlled the only one drone. So Remote control and information collection of the remote drone was impossible. Therefore we suggests drone intercommunication distributed network based on the MANET. Subsequently classified according to the characteristics of the drone intercommunication distributed network(speed, distance, applications) and chose a MANET routing protocol in accordance with the classification result.

Transmission Performance of Voice Traffic on MANET under Grayhole Attack (그레이홀 공격이 있는 MANET에서 음성 트래픽의 전송성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.12
    • /
    • pp.1411-1416
    • /
    • 2015
  • Grayhole attack, one of attack to MANET routing function, is very severe in point of view of causing results which disturbs normal transmission function of network with uneasy finding of attacks. In this paper, effects of grayhole attack to application service on MANET is analyzed. Based on this analysis, some conditions is suggested for anti-intrusion to operate an application service on MANET under grayhole attack. This study is done with computer simulation based on NS-2 be added grayhole attack function which is implemented in this paper.

Overlay Multicast using Geographic Information in MANET (MANET에서의 지리 정보를 이용한 오버레이 멀티캐스트)

  • Lim, Yu-Jin;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.359-364
    • /
    • 2007
  • Current researches on the overlay multicast mechanism in the mobile ad hoc network (MANET) maintain the network topology information of the dynamically changing MANET, which may cause severe overhead. In this paper, we propose a new overlay multicast mechanism, the region-based overlay multicast in MANET(ROME), using the geometric locations of group members. In ROME, the physical topology is divided into small regions and the scope of location updates of group members is limited to a single region. ROME provides scalability by using the coordinate of the center point of a destination region as the destination of a data packet instead of the list of member addresses of that region. Our simulation results show that ROME gives better performance in terms of the packet overhead than other schemes.

Proactive Internet Gateway Discovery Mechanisms for Load-Balancing in MANET (MANET에서의 부하 균등화를 위한 Proactive 인터넷 게이트웨이 발견 기법들)

  • Kim, Young-Min;Ahn, Sang-Hyun;Yu, Hyun;Lee, Jae-Hwoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • /
    • pp.59-63
    • /
    • 2006
  • 이동 애드 혹 네트워크(Mobile Ad Hoc Network; MANET)는 인프라 없이 빠른 구성이 가능한 네트워크이다. 하지만, 긴급 상황과 같은 특수한 경우가 아닌 일상생활에서 사용 가능한 네트워크로 발전하기 위해서는 MANET과 인터넷의 연결이 꼭 필요하다. 인터넷 노드와 MANET 노드 간의 통신을 가능하게 만드는 것은 인터넷과 MANET을 중계하는 인터넷 게이트웨이를 통해서 이다. 고장 감내(fault tolerance)를 지원하고 대역폭을 늘리기 위해 다중 인터넷 게이트웨이들을 MANET에 배치하여 사용할 수 있다. 다중 게이트웨이들 간의 부하를 잘 분배한다면 네트워크 성능 향상을 얻을 수 있으므로, MANET 내에 여러 개의 인터넷 게이트웨이가 존재할 경우 이들 간의 부하 균등화는 중요한 이슈이다. 본 연구에서는 노드들의 이동이 빈번하고 인터넷 게이트웨이들이 고정되어 있는 MANET 환경에서의 부하 균등화 인터넷 게이트웨이 발견 기법들을 제안한다. 기존에 제안된 부하 균등화 기법들로 Shortest Path (SP), Minimum Load Index(MLI), Running Variance Metric (RVM) 기법들을 소개하고 각 기법들에 대한 시뮬레이션 결과를 제공한다. 시뮬레이션을 통해 이들 기법을 분석하여 문제점을 찾아내고 이를 수정 및 보완하여 새로운 기법들을 제안하며, 새로운 기법들의 성능이 기존 기법들에 비하여 향상되었음을 보인다.

  • PDF

Extended Peer Searching Method Using Wireless AP in Mobile Ad-Hoc Network (모바일 애드-혹 네트워크에서 무선 AP를 이용한 확장된 단말 탐색 방법)

  • Park, Seok-In;Kim, Taek-Hyun;Lee, Kwang-Jo;Yang, Sung-Bong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • /
    • pp.254-257
    • /
    • 2010
  • 최근 모바일 컴퓨팅 기술이 급격이 발전하면서, 이동 애드-혹 네트워크(Mobile Ad-Hoc Network, MANET)에 대한 연구가 활발히 진행되고 있다. 그러나 대다수의 MANET에 관한 연구는 하나의 MANET 내에서 이루어지는 라우팅 방법이나 에너지 관리에 대한 것으로 MANET 내에서 검색에 실패 했을 경우에 대한 해결 방법은 없는 상태이다. 본 논문에서는 하나의 MANET에서 검색에 실패한 경우에 기반망인 무선 AP를 이용하여 또 다른 MANET으로 연결하고 정보를 검색 할 수 있도록 탐색범위 확장을 위한 방법을 제안한다. 본 논문에서 제안한 방법은 보다 넓은 범위에서 필요로 하는 정보를 가진 단말을 탐색할 수 있게 함으로써 MANET에서의 검색 성공률을 높일 수 있다.

  • PDF

Performance of VoIP Traffics over MANETs under DDoS Intrusions (DDoS 침해가 있는 MANET에서 VoIP 트래픽의 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.493-498
    • /
    • 2011
  • In this paper, Transmission performance over MANET(Mobile Ad-hoc Networks) under DDoS Intrusions is evaluated. Intrusion counterplan requirement, which have to be used for MANET under DDoS intrusions, is suggested through this evaluation. VoIP simulator based on NS-2 network simulator is used for performance measurement. MOS, network delay, packet loss rate and call connection rate is measured with this simulation. Finally, requirement of intrusion continuing time shorter then 10 seconds is suggested for VoIP service over MANETs under DDoS intrusions.

Implementation of Testbed for Policy Based MANET Management (정책 기반 MANET 관리를 위한 테스트베드의 구현)

  • Huh, Jee-Wan;Song, Wang-Cheol
    • Proceedings of the KAIS Fall Conference
    • /
    • /
    • pp.994-997
    • /
    • 2009
  • MANET은 노드가 이동성을 가지고 있으며, 네트워크 위상을 자율적으로 결정하는 특성을 가지고 있다. 정책기반 망 관리 시스템을 MANET에 도입하기 위한 연구는 이러한 네트워크 특성을 고려하여 신뢰성과 효율성을 확보하기 위해 이루어지고 있다. 또한, 정책기반 망 관리 시스템은 유선 네트워크를 기반으로 제안되어 있으므로 이를 MANET에 도입하기 위해서는 여러 가지 수정이 필요한 부분이 있다. 정책 기반 망 관리 시스템은 SNMP의 MIB나 LDAP를 이용하는 정책 저장소와 노드의 상태를 수신하여 정책을 배포하는 정책결정자, 그리고 정책을 수신하여 수행하는 정책 수행자 노드가 있다. 본 논문에서는 MANET 라우팅을 이용하고 표준 정책 기반 망 관리 시스템에서 정책 결정자와 정책수행자 사이의 프로토콜로 제안된 COPS-PR을 MANET에 특성에 맞게 수정한 능동적 PDP 탐색 메커니즘을 이용한 테스트베드를 설계하고 구현한다.

  • PDF

VoIP service performance improvements of MANET based on Diffserv (Diffserv기반 MANET에서 VoIP 서비스 성능 개선)

  • Yoon, Tong-il;Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.777-779
    • /
    • 2009
  • Study for VoIP in MANET is mainly focused on transmission performance or voice quality of VoIP traffic as single traffic. In this study, VoIP performance is analyzed of MANET which has several types of traffics. Diffserv scheme is used to process the traffics. It is showed that VoIP traffic performance is improved by differv scheme, as a result of analysis for VoIP and FTP traffic. Simulator, which is implemented with NS-2 package and VoIP patch, is used.

  • PDF