首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 22 毫秒
1.
With developments in voice over IP (VoIP), IP-based wireless data networks and their application services have received increased attention. While multimedia applications of mobile nodes are served by Session Initiation Protocol (SIP) as a signaling protocol, the mobility of mobile nodes may be supported via Mobile IP protocol. For a mobile node that uses both Mobile IP and SIP, there is a severe redundant registration overhead because the mobile node has to make location registration separately to a home agent for Mobile IP and to a home registrar for SIP, respectively. Therefore, we propose two new schemes that integrate mobility management functionality in Mobile IP and SIP. We show performance comparisons among the previous method, which makes separate registration for Mobile IP and SIP without integration, and our two integrated methods. Numerical results show that the proposed methods efficiently reduce the amount of signaling messages and delay time related to the idle handoff and the active handoff.  相似文献   

2.
Cluster Based Routing Protocol for Mobile Nodes in Wireless Sensor Network   总被引:1,自引:1,他引:0  
Mobility of sensor nodes in wireless sensor network (WSN) has posed new challenges particularly in packet delivery ratio and energy consumption. Some real applications impose combined environments of fixed and mobile sensor nodes in the same network, while others demand a complete mobile sensors environment. Packet loss that occurs due to mobility of the sensor nodes is one of the main challenges which comes in parallel with energy consumption. In this paper, we use cross layer design between medium access control (MAC) and network layers to overcome these challenges. Thus, a cluster based routing protocol for mobile sensor nodes (CBR-Mobile) is proposed. The CBR-Mobile is mobility and traffic adaptive protocol. The timeslots assigned to the mobile sensor nodes that had moved out of the cluster or have not data to send will be reassigned to incoming sensor nodes within the cluster region. The protocol introduces two simple databases to achieve the mobility and traffic adaptively. The proposed protocol sends data to cluster heads in an efficient manner based on received signal strength. In CBR-Mobile protocol, cluster based routing collaborates with hybrid MAC protocol to support mobility of sensor nodes. Schedule timeslots are used to send the data message while the contention timeslots are used to send join registration messages. The performance of proposed CBR-Mobile protocol is evaluated using MATLAB and was observed that the proposed protocol improves the packet delivery ratio, energy consumption, delay and fairness in mobility environment compared to LEACH-Mobile and AODV protocols.  相似文献   

3.
Network architecture based on opportunistic Delay Tolerant Network (DTN) is best applicable for post-disaster scenarios, where the controlling point of relief work is any fixed point like a local school building or a hospital, whose location is known to everyone. In this work, 4-tier network architecture for post-disaster relief and situation analysis is proposed. The disaster struck area has been divided into clusters known as Shelter Points (SP). The architecture consists of mobile Relief Workers (RW) at tier 1, Throw boxes (TB) at tier 2 placed at fixed locations within SPs. Data Mules (DM) like vehicles, boats, etc. operate at tier 3 that provide inter-SP connectivity. Master Control Station (MCS) is placed at tier 4. The RWs are provided with smart-phones that act as mobile nodes. The mobile nodes collect information from the disaster incident area and send that information to the TB of its SP, using DTN as the communication technology. The messages are then forwarded to the MCS via the DMs. Based on this architecture, a novel DTN routing protocol is proposed. The routing strategy works by tracking recent direction of movement of mobile nodes by measuring their consecutive distances from the destination at two different instants. If any node moves away from the destination, then it is very unlikely to carry its messages towards the destination. For a node, the fittest node among all its neighbours is selected as the next hop. The fittest node is selected using parameters like past history of successful delivery and delivery latency, current direction of movement and node’s recent proximity to the destination. Issues related to routing such as fitness of a node for message delivery, buffer management, packet drop and node energy have been considered. The routing protocol has been implemented in the Opportunistic Networks Environment (ONE) simulator with customized mobility models. It is compared with existing standard DTN routing protocols for efficiency. It is found to reduce message delivery latency and improve message delivery ratio by incurring a small overhead .  相似文献   

4.
Delay tolerant networks are a class of ad hoc networks that enable data delivery even in the absence of end‐to‐end connectivity between nodes, which is the basic assumption for routing in ad hoc networks. Nodes in these networks work on store‐carry and forward paradigm. In addition, such networks make use of message replication as a strategy to increase the possibility of messages reaching their destination. As contact opportunities are usually of short duration, it is important to prioritize scheduling of messages. Message replication may also lead to buffer congestion. Hence, buffer management is an important issue that greatly affects the performance of routing protocols in delay tolerant networks. In this paper, Spray and Wait routing protocol, which is a popular controlled replication‐based protocol for delay tolerant networks, has been enhanced using a new fuzzy‐based buffer management strategy Enhanced Fuzzy Spray and Wait Routing, with the aim to achieve increased delivery ratio and reduced overhead ratio. It aggregates three important message properties namely number of replicas of a message, its size, and remaining time‐to‐live, using fuzzy logic to determine the message priority, which denotes its importance with respect to other messages stored in a node's buffer. It then intelligently selects messages to schedule when a contact opportunity occurs. Because determination of number of replicas of a message in the network is a difficult task, a new method for estimation of the same has been proposed. Simulation results show improved performance of enhanced fuzzy spray and wait routing in terms of delivery ratio and resource consumption. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

5.
Delay and Disruption Tolerant Networks are made up of mobile wireless nodes which may experience major message delivery restrictions. Such restrictions are the result of intermittent connectivity and scattered topology. Within these networks, messages can be detained for long periods of time or never be delivered. Existing solutions that purport improved message delivery rates modify routing protocols to perform integrity verification with each hop, resulting in routing overhead and, very often, unnecessary processing costs. This article proposes a scheme, named EMCOD, which decreases message delivery delay, while minimally increasing the processing overheads. To achieve this, EMCOD uses data encoding and interleaving to create messages. The original data is reassembled from some of the messages received, without the need to wait for all messages to be received. In scenarios subject to long delays and/or significant packet loss rates, it is possible to reduce original data recovery times by more than 50%. The processing overhead resulting from the encoding procedures is offset by the data recovery capabilities, which effectively decreases network overheads by more than 60%, in the same scenarios. EMCOD modifies the Bundle Layer, without interfering with the remaining layers, making it possible to route the messages through nodes that do not implement the proposed scheme.  相似文献   

6.
A predictive model‐based mobility tracking method, called dead reckoning, is developed for mobile ad hoc networks. It disseminates both location and movement models of mobile nodes in the network so that every node is able to predict or track the movement of every other node with a very low overhead. The basic technique is optimized to use ‘distance effect’, where distant nodes maintain less accurate tracking information to save overheads. The dead reckoning‐based location service mechanism is evaluated against three known location dissemination service protocols: simple, distance routing effect algorithm for mobility (DREAM) and geographic region summary service (GRSS). The evaluation is done with geographic routing as an application. It is observed that dead reckoning significantly outperforms the other protocols in terms of packet delivery fraction. It also maintains low‐control overhead. Its packet delivery performance is only marginally impacted by increasing speed or noise in the mobility model, that affects its predictive ability. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

7.

Secure and efficient group communication among mobile nodes is one of the significant aspects in mobile ad hoc networks (MANETs). The group key management (GKM) is a well established cryptographic technique to authorise and to maintain group key in a multicast communication, through secured channels. In a secure group communication, a one-time session key is required to be shared between the participants by using distributed group key agreement (GKA) schemes. Due to the resource constraints of ad hoc networks, the security protocols should be communication efficient with less overhead as possible. The GKM solutions from various researches lacks in considering the mobility features of ad hoc networks. In this paper, we propose a hexagonal clustered one round distributed group key agreement scheme with trust (HT-DGKA) in a public key infrastructure based MANET environment. The proposed HT-DGKA scheme guarantees an access control with key authentication and secrecy. The performance of HT-DGKA is evaluated by simulation analysis in terms of key agreement time and overhead for different number of nodes. Simulation results reveal that the proposed scheme guarantees better performance to secure mobile ad hoc network. It is demonstrated that the proposed scheme possesses a maximum of 2250 ms of key agreement time for the higher node velocity of 25 m/s and lower key agreement overhead. Also, the HT-DGKA scheme outperforms the existing schemes in terms of successful message rate, packet delivery ratio, level of security, computation complexity, number of round, number of exponentiations and number of message sent and received that contribute to the network performance.

  相似文献   

8.
A Mobile Ad hoc NETwork (MANET) is a group of mobile nodes that form a multihop wireless network. The topology of the network can change randomly due to unpredictable mobility of nodes and propagation characteristics. Previously, it was assumed that the nodes in the network were assigned IP addresses a priori. This may not be feasible as nodes can enter and leave the network dynamically. A dynamic IP address assignment protocol like DHCP requires centralized servers that may not be present in MANETs. Hence, we propose a distributed protocol for dynamic IP address assignment to nodes in MANETs. The proposed solution guarantees unique IP address assignment under a variety of network conditions including message losses, network partitioning and merging. Simulation results show that the protocol incurs low latency and communication overhead for an IP address assignment.  相似文献   

9.
Recent advances in body area network technologies such as radio frequency identification and ham radio, to name a few, have introduced a huge gap between the use of current wireless sensor network technologies and specific needs of some important wireless sensor network applications such as medical care, disaster relief, or emergency preparedness and response. In these types of applications, the mobility of nodes can occur, leading to the challenge of mobility handling. In this paper, we address this challenge by prioritizing transmissions of mobile nodes over static nodes. This is achieved by using shorter contention windows in reservation slots for mobile nodes (the so‐called backoff technique) combined with a novel hybrid medium access control (MAC) protocol (the so‐called versatile MAC). The proposed protocol advocates channel reuse for bandwidth efficiency and management purpose. Through extensive simulations, our protocol is compared with other MAC alternatives such as time division multiple access and IEEE 802.11 with request to send/clear to send exchange, chosen as benchmarks. The performance metrics used are bandwidth utilization, fairness of medium access, and energy consumption. The superiority of versatile MAC against the studied benchmark protocols is established with respect to these metrics. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

10.
The Multicast Ad hoc On-Demand Distance Vector (MAODV) protocol achieves multicast routing in self-organizing wireless mobile on-demand networks, e.g., Mobile Ad-hoc Networks (MANETs). However, unreliable wireless links degrade network reliability and network goodput, and the unreliable link problem becomes worse in multicasting because a multicast tree consists of more number of wireless links. MAODV adopts a broadcast-type local repair, and thus yields a large number of broadcast-type repair messages, increases extensive control overhead, and involves largely power consumption. Thus, a cross-layer unicast-type multihop local repair approach is proposed to recover broken links in multicasting MANETs. Additionally, the cross-layer mechanism provides mobile nodes to send a cross-layer message to the TCP sender to keep current congestion window (cwnd) and slow start threshold (ssthresh) when downstream links are temporarily broken, and then increases network goodput. Finally, the optimal number of neighbor-tiers is analyzed and the optimal substitute node is identified. Numerical results demonstrate that the proposed approach outperforms other approaches in successful repair rate, control message overhead, packet delivery ratio, and network goodput.  相似文献   

11.
In challenged networks such as Wireless Sensor Networks, limitations such as nodes mobility, short radio range and sparse network density can prevent communications among nodes. Consequently, it can result in long delays in exchanging messages among nodes. Designing Delay-Tolerant Networks is considered to be an approach for dealing with lengthy breakdown of communication between nodes. Using multi-replica methods seems rational for these networks. However, a majority of these methods inject a large amount of replications of a message in the network so as to enhance message delivery probability which consequently leads to the loss of energy and reduction of network efficiency. Two major issues should be considered to achieve data delivery in such challenging networking environments: a routing strategy for the network and a buffer management policy. This study proposes a new routing protocol called Fuzzy-Logic based Distance and Energy Aware Routing protocol (FLDEAR) in delay tolerant mobile sensor network. A FLDEAR is a distance and energy aware protocol that reduces the number of message replications and uses two fuzzy inference systems in routing and buffer management. The results of conducted simulations indicated that this routing algorithm can be used for enhancing data packet delivery ratios and reducing data transmission overhead than several current Delay-Tolerant Mobile Sensor Networks routing protocols.  相似文献   

12.

Delay tolerant networks (DTNs) are a newest class of networks that have the ability to provide connectivity to areas that are yet to be served by conventional networks. Routing in DTN is a tough task because nodes have no prior information about the partitioned network and transfer opportunities between peer nodes are limited. A node in a DTN delivers messages to the destination using the store and forward strategy. Messages are transmitted to multiple intermediate relay nodes encountered in order to increase the opportunity for the message to reach the destination. Encounter duration is the time period in which a pair or more mobile nodes move into the communication range of each other and hence are able to transfer messages between them. Since the node movements are arbitrary, the encounter duration is unpredictable. This research work proposes a novel encounter based fuzzy logic routing (EFLR) scheme to maximize message delivery with reduced overhead. The fuzzy based utility computation is used for finding a better node to forward messages as well as to drop messages from buffer. Simulation results reveal that EFLR performs better than other existing DTN routing protocols.

  相似文献   

13.
Mobility management for VoIP service: Mobile IP vs. SIP   总被引:4,自引:0,他引:4  
Wireless Internet access has gained significant attention as wireless/mobile communications and networking become widespread. The voice over IP service is likely to play a key role in the convergence of IP-based Internet and mobile cellular networks. We explore different mobility management schemes from the perspective of VoIP services, with a focus on Mobile IP and session initiation protocol. After illustrating the signaling message flows in these two protocols for diverse cases of mobility management, we propose a shadow registration concept to reduce the interdomain handoff (macro-mobility) delay in the VoIP service in mobile environments. We also analytically compute and compare the delay and disruption time for exchanging signaling messages associated with the Mobile IP and SIP-based solutions.  相似文献   

14.
Scalable Routing Protocol for Ad Hoc Networks   总被引:6,自引:0,他引:6  
In this paper we present a scalable routing protocol for ad hoc networks. The protocol is based on a geographic location management strategy that keeps the overhead of routing packets relatively small. Nodes are assigned home regions and all nodes within a home region know the approximate location of the registered nodes. As nodes travel, they send location update messages to their home regions and this information is used to route data packets. In this paper, we derive theoretical performance results for the protocol and prove that the control packet overhead scales linearly with node speed and as N 3/2 with increasing number of nodes. These results indicate that our protocol is well suited to relatively large ad hoc networks where nodes travel at high speed. Finally, we use simulations to validate our analytical model.  相似文献   

15.
针对移动IP注册协议中家乡和移动节点过多且复杂的计算问题,提出了一个新的基于身份的密钥分发方案,并在此基础上设计了一种高效的移动IP注册协议。该协议实现了移动IP各个节点间相互认证,其中移动节点与家乡代理之间具有双重认证的特点。双线性对和秘密随机数的选取保证了消息的安全性,消息认证码Mac和数字签名Sig保障了消息的完整性。该协议从整体上减少了计算量,降低了注册延迟率,同时也有效地保证了安全性。安全性分析表明,该方案满足移动IP的安全要求。  相似文献   

16.
This paper considers basic bounds on the overhead of link-state protocols in mobile ad hoc networks. Hierarchical protocols are known for their good scalability properties, and hence this paper considers a two-level hierarchical protocol. In such protocols, nodes need to keep track of shortest path information, link states and cluster membership. Two types of overheads are considered; the memory needed to store routing-related information, including link-states and cluster membership, and the control messages that need to be exchanged to keep track of the changes in the network. Memory overhead is important practically for dimensioning network nodes, while message routing overhead is important since it reduces the effective capacity of the network to carry user data (vis-a-vis control data). The scalability properties of the message routing overhead are analyzed for different modes of network scaling. Practical implications, such as optimal cluster size, average/fixed memory requirement and routing protocol parameter selections are discussed.  相似文献   

17.
P-MIP: Paging Extensions for Mobile IP   总被引:13,自引:1,他引:12  
As the number of Mobile IP users grows, so will the signalling overhead associated with Internet mobility management in the core IP network. This presents a significant challenge to Mobile IP as the number of mobile devices scale-up. In cellular networks, registration and paging techniques are used to minimize the signalling overhead and optimize the mobility management performance. Currently, Mobile IP supports registration but not paging. In this paper, we argue that Mobile IP should be extended to support paging to improve the scalability of the protocol to handle large populations of mobile devices. To address this, we introduce P-MIP, a set of simple paging extensions for Mobile IP, and discuss the construction of paging areas, movement detection, registration, paging and data handling. We present analysis and simulation results for Mobile IP with and without paging extensions, and show that P-MIP can scale well supporting large numbers of mobile devices with reduced signalling under a wide variety of system conditions.  相似文献   

18.
任智  朱其政  付泽亮  周舟  周杨 《电讯技术》2023,63(10):1546-1552
优化链路状态路由(Optimized Link State Routing,OLSR)协议是一种先验式路由协议,网络中的所有节点通过周期性地发送控制消息来计算全网路由信息。在短波自组织网络中,节点周期性地发送控制消息会占据大量的信道资源,大幅增加网络的控制开销,浪费短波有限的带宽资源,导致网络通信性能急剧下降。其次,受到地形地貌、天线方向和接收性能的个体差异等影响,造成无线链路不稳定,导致网络中存在非对称链路,增加了通信端到端时延。为此,提出了一种低时延的短波自组网OLSR协议。该协议在执行MPR(Multipoint Relay)选择算法时综合考虑了节点的连接度和链路可靠性,在优化MPR节点个数的同时选择链路可靠性较大的节点作为MPR节点,在进行路由选择时能够利用网络中的非对称链路。仿真结果表明,该协议能优化数据包投递成功率、吞吐量、端到端时延和网络控制开销等性能指标。  相似文献   

19.
In delay tolerant vehicular networks, gossip is an efficient forwarding scheme, which significantly reduces the message transmission overhead while maintaining a relatively high transmission rate in the high mobility vehicular environment. This mechanism requires vehicles as the network nodes to forward messages according to the system-defined gossip probability in a cooperative and selfless way among all the vehicles in the system. However, in the real word vehicular networks, most of the vehicular nodes exhibit selfish and non-collaboration behaviors to reduce the gossip probability in order to save their own energy and other limited resources in the vehicular nodes. In this paper, we study how node selfishness influences the performance of energy-constrained gossip forwarding based vehicular networks. We consider two typical forms of selfishness in the realistic vehicular networks: individual selfishness and social selfishness, and study the networking performance by focusing on the average message transmission delay and mean transmission cost. First, we model the message transmission process with selfish behaviors in the gossip forwarding based delay tolerant vehicular networks using a continuous time Markov chain. Based on this useful model, we derive closed-form formulae for average message transmission delay and mean transmission cost. Then, we give extensive numerical results to analyze the impact of selfishness on system performance of the vehicular networks. The results show that gossip forwarding in delay tolerant vehicular networks is robust to selfish behaviors since even when they increase the message transmission delay, there is a gain on the message transmission cost.  相似文献   

20.
Wireless sensor networks (WSNs) are made up of many small and highly sensitive nodes that have the ability to react quickly. In WSNs, sink mobility brings new challenges to large-scale sensor networks. Almost all of the energy-aware routing protocols that have been proposed for WSNs aim at optimizing network performance while relaying data to a stationary gateway (sink). However, through such contemporary protocols, mobility of the sink can make established routes unstable and non-optimal. The use of mobile sinks introduces a trade-off between the need for frequent rerouting to ensure optimal network operation and the desire to minimize the overhead of topology management. In this paper, in order to reduce energy consumption and minimize the overhead of rerouting frequency, we propose an energy-aware data aggregation scheme (EADA) for grid-based wireless sensor networks with a mobile sink. In the proposed scheme, each sensor node with location information and limited energy is considered. Our approach utilizes location information and selects a special gateway in each area of a grid responsible for forwarding messages. We restrict the flooding region to decrease the overhead for route decision by utilizing local information. We conducted simulations to show that the proposed routing scheme outperforms the coordination-based data dissemination scheme (CODE) (Xuan, H. L., & Lee, S. Proceedings of the Sensor Networks and Information Processing Conference, pp. 13–18, 2004).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号