Spelling suggestions: "subject:"[een] ROUTING PROTOCOLS"" "subject:"[enn] ROUTING PROTOCOLS""
71 |
Simulační scénáře pro analýzu chování transportních sítí / Simulation scenarios for analysis of behavior of transport networksKoláčková, Aneta January 2019 (has links)
This master’s thesis deals with the issue of mobile networks, protocol suite TCP/IP and routing protocols. It focuses in particular on the functioning of the transport part of the third and fourth generation mobile networks and intends to fnd the most suitable options for their emulation. The master’s thesis compares two selected emulation programs through a series of tests that were performed on a server created for these purposes. The main outputs are two detailed comprehensive scenarios and solutions have been developed. The frst scenario deals with the overall transport network confguration. The second scenario is based on the frst one and is focused on troubleshooting of particular issues in this network. Their implementation helps to analyze the behavior of the transport part of the mobile network.
|
72 |
Vers une intégration des comportements communautaires dans les réseaux mobiles / Towards social behaviors integration in mobile networksHarfouche, Leïla 27 September 2011 (has links)
À l'aire du Multimedia Mobile, l'essor des réseaux sans fil est fulgurant et la mobilité est devenue un sujet primordial exacerbé par l'augmentation significative du nombre d'usagers mobiles. Un nœud évoluant dans un réseau mobile de base se comporte de la même manière qu'un aveugle évoluant dans notre univers en en élaborant sa propre représentation à l'aide de son bâton, mécanisme dénommé dans la littérature : mobilité terminale. Pour réduire cet aveuglement, plusieurs méthodes ont été élaborées qui prennent appui sur les services de localisation ou les modèles de mobilité. Un modèle de mobilité est donc destiné à décrire en termes d'environnement, le mode de circulation des nœuds mobiles avec pour défi de trouver des modèles fidèles aux comportements des utilisateurs. Les modèles aléatoires sont biaisés car les appareils mobiles sont portés par des êtres sociaux. Cela nous a amené à inclure des éléments sociaux dans notre modélisation.Nous présentons les modèles de mobilité existants et les classifions. Nous définissons nos modèles, les implémentons et mesurons leur impact sur le test des réseaux. Enfin nous élargissons notre spectre en montrant comment le fait d'octroyer la perception de regroupement social à un protocole de routage réseau, peut en améliorer les performances. / In our area of Mobile Multimedia, the expansion of wireless networks is dazzling and mobility has become a major issue exacerbated by the significant increase in the number of mobile users.A node operating in a basic mobile network behaves the same way a blind person moving in our universe by developing its own representation with his stick, a mechanism known in the literature as terminal mobility. To reduce this blindness, several methods have been developed that are based on location services and mobility models.A mobility model is then intended to describe in terms of environment, the motion criteria of mobile nodes with the challenge to find models faithful to user behavior.Random models are biased because mobile devices are supported by social beings. This led us to include social elements in our models.We present the existing mobility models and classify them.We define our models, implement them and measure their impact on the network testing.Finally we expand our spectrum by showing that granting social grouping perception to a network routing protocol, can improve its performance.
|
73 |
Friendship based trust model to secure routing protocols in mobile Ad Hoc networksShabut, Antesar R.M., Dahal, Keshav P., Awan, Irfan U. January 2014 (has links)
No / Trust management in mobile ad hoc networks (MANETs) has become a significant issue in securing routing protocols to choose reliable and trusted paths. Trust is used to cope with defection problems of nodes and stimulate them to cooperate. However, trust is a highly complex concept because of the subjective nature of trustworthiness, and has several social properties, due to its social origins. In this paper, a friendship-based trust model is proposed for MANETs to secure routing protocol from source to destination, in which multiple social degrees of friendships are introduced to represent the degree of nodes' trustworthiness. The model considers the behaviour of nodes as a human pattern to reflect the complexity of trust subjectivity and different views. More importantly, the model considers the dynamic differentiation of friendship degree over time, and utilises both direct and indirect friendship-based trust information. The model overcomes the limitation of neglecting the social behaviours of nodes when evaluating trustworthiness. The empirical analysis shows the greater robustness and accuracy of the trust model in a dynamic MANET environment.
|
74 |
Design, Implementation and Analysis of Wireless Ad Hoc MessengerCho, Jin-Hee 12 August 2004 (has links)
Popularity of mobile devices along with the presence of ad hoc networks requiring no infrastructure has contributed to recent advances in the field of mobile computing in ad hoc networks. Mobile ad hoc networks have been mostly utilized in military environments. The recent advances in ad hoc network technology now introduce a new class of applications.
In this thesis, we design, implement and analyze a multi-hop ad hoc messenger application using Pocket PCs and Microsoft .Net Compact Framework. Pocket PCs communicate wirelessly with each other using the IEEE 802.11b technology without the use of an infrastructure. The main protocol implemented in this application is based on Dynamic Source Routing (DSR), which consists of two important mechanisms, Route Discovery and Route Maintenance. We adopt DSR since DSR operates solely based on source routing and "on-demand" process, so each packet does not have to transmit any periodic advertisement packets or routing information. These characteristics are desirable for the ad hoc messenger application for which a conversation is source-initiated on-demand.
To test our application easily, we have developed a testing strategy by which a mobility configuration file is pre-generated describing the mobility pattern of each node generated based on the random waypoint mobility model. A mobility configuration file thus defines topology changes at runtime and is used by all nodes to know whether they can communicate with others in a single-hop or multi-hops during an experimental run.
We use five standard metrics to test the performance of the wireless ad hoc messenger application implemented based on DSR, namely, (1) average latency to find a new route, (2) average latency to deliver a data packet, (3) delivery ratio of data packets, (4) normalized control overhead, and (5) throughput. These metrics test the correctness and efficiency of the wireless ad hoc messenger application using the DSR protocol in an 802.11 ad hoc network that imposes limitations on bandwidth and resources of each mobile device.
We test the effectiveness of certain design alternatives for implementing the ad hoc messenger application with these five metrics under various topology change conditions by manipulating the speed and pause-time parameters in the random waypoint model. The design alternatives evaluated include (1) Sliding Window Size (SWS) for end-to-end reliable communication control; (2) the use of per-hop acknowledgement packets (called receipt packets) deigned for rapid detection of route errors by intermediate nodes; and (3) the use of cache for path look-up during route discovery and maintenance.
Our analysis results indicate that as the node speed increases, the system performance deteriorates because a higher node speed causes the network topology to change more frequently under the random waypoint mobility model, causing routes to be broken. On the other hand, as the pause time increases, the system performance improves due to a more stable network topology. For the design alternatives evaluated in our wireless ad hoc messenger, we discover that as SWS increases, the system performance also increases until it reaches an optimal SWS value that maximizes the performance due to a balance of a higher level of data parallelism introduced and a higher level of medium contention in 802.11 because of more packets being transmitted simultaneously as SWS increases. Beyond the optimal SWS, the system performance deteriorates as SWS increases because the heavy medium contention effect outweighs the benefit due to data parallelism. We also discover that the use of receipt packets is helpful in a rapidly changing network but is not beneficial in a stable network. There is a break-even point in the frequency of topology changes beyond which the use of receipt packets helps quickly detect route errors in a dynamic network and would improve the system performance. Lastly, the use of cache is rather harmful in a frequently changing network because stale information stored in the cache of a source node may adversely cause more route errors and generate a higher delay for the route discovery process. There exists a break-even point beyond which the use of cache is not beneficial.
Our wireless ad hoc messenger application can be used in a real chatting setting allowing Pocket PC users to chat instantly in 802.11 environments. The design and development of the dynamic topology simulation tool to model movements of nodes and the automatic testing and data collection tool to facilitate input data selection and output data analysis using XML are also a major contribution. The experimental results obtained indicate that there exists an optimal operational setting in the use of SWS, receipt packets and cache, suggesting that the wireless ad hoc messenger should be implemented in an adaptive manner to fine-tune these design parameters based on the current network condition and performance data monitored to maximize the system performance. / Master of Science
|
75 |
Détection de la retransmission sélective sur les réseaux de capteursHaddad, Edgard 04 1900 (has links)
L'attaque de retransmission sélective est une menace sérieuse dans les réseaux de capteurs sans fil (WSN), en particulier dans les systèmes de surveillance. Les noeuds peuvent supprimer de manière malicieuse certains paquets de données sensibles, ce qui risque de détruire la valeur des données assemblées dans le réseau et de diminuer la disponibilité des services des capteurs. Nous présentons un système de sécurité léger basé sur l'envoi de faux rapports pour identifier les attaques de retransmission sélective après avoir montré les inconvénients des systèmes existants. Le grand avantage de notre approche est que la station de base attend une séquence de faux paquets à un moment précis sans avoir communiqué avec les noeuds du réseau. Par conséquent, elle sera capable de détecter une perte de paquets.
L'analyse théorique montre que le système proposé peut identifier ce type d'attaque et peut alors améliorer la robustesse du réseau dans des conditions d'un bon compromis entre la fiabilité de la sécurité et le coût de transmission.
Notre système peut atteindre un taux de réussite élevé d‟identification face à un grand nombre de noeuds malicieux, tandis que le coût de transmission peut être contrôlé dans des limites raisonnables. / The selective forwarding attack is a serious threat in wireless sensor networks (WSN), especially in surveillance systems. Nodes can maliciously delete some sensitive data packets, which could destroy the value of the data assembled in the network and reduce its sensors availability. After describing the drawbacks of the existing systems in this thesis, we will present a lightweight security system based on sending fake reports used to identify selective forwarding attacks. The great advantage in our approach is that the base station expects a number of packets at a specific time. Therefore, it will be able to detect missing or delayed packets. Theoretical analysis shows that the proposed system can identify this type of attack, which will improve the robustness of the network under conditions of a good tradeoff between the security, reliability and communication overhead. Our system can achieve a high ratio of identification when facing a large number of malicious nodes, while the communication overhead can be controlled within reasonable bounds.
|
76 |
Smart Broadcast Protocol Design For Vehicular Ad hoc NetworksUnknown Date (has links)
Multi-hop broadcast is one of the main approaches to disseminate data in
VANET. Therefore, it is important to design a reliable multi-hop broadcast protocol,
which satis es both reachability and bandwidth consumption requirements.
In a dense network, where vehicles are very close to each other, the number of
vehicles needed to rebroadcast the message should be small enough to avoid a broad-
cast storm, but large enough to meet the reachability requirement. If the network
is sparse, a higher number of vehicles is needed to retransmit to provide a higher
reachability level. So, it is obvious that there is a tradeo between reachability and
bandwidth consumption.
In this work, considering the above mentioned challenges, we design a number
of smart broadcast protocols and evaluate their performance in various network den-
sity scenarios. We use fuzzy logic technique to determine the quali cation of vehicles
to be forwarders, resulting in reachability enhancement. Then we design a band-
width e cient fuzzy logic-assisted broadcast protocol which aggressively suppresses
the number of retransmissions. We also propose an intelligent hybrid protocol adapts
to local network density. In order to avoid packet collisions and enhance reachability, we design a cross layer statistical broadcast protocol, in which the contention window
size is adjusted based on the local density information.
We look into the multi-hop broadcast problem with an environment based
on game theory. In this scenario, vehicles are players and their strategy is either
to volunteer and rebroadcast the received message or defect and wait for others to
rebroadcast. We introduce a volunteer dilemma game inspired broadcast scheme to
estimate the probability of forwarding for the set of potential forwarding vehicles. In
this scheme we also introduce a fuzzy logic-based contention window size adjustment
system.
Finally, based on the estimated spatial distribution of vehicles, we design a
transmission range adaptive scheme with a fuzzy logic-assisted contention window
size system, in which a bloom lter method is used to mitigate overhead.
Extensive experimental work is obtained using simulation tools to evaluate the
performance of the proposed schemes. The results con rm the relative advantages of
the proposed protocols for di erent density scenarios. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2017. / FAU Electronic Theses and Dissertations Collection
|
77 |
Uso de grafos evolutivos no roteamento em redes dinâmicas: algoritmos, fluxos e limites / Using evolving graphs in routing of dynamic networks: algorithms, flows and boundsMonteiro, Julian Geraldes 13 July 2007 (has links)
O comportamento dinâmico das redes sem fio as torna muito peculiares e de difícil análise. No entanto, algumas destas redes, como as de sensores com funcionamento intermitente, redes periódicas ou cíclicas e as do sistema de satélites de órbita baixa têm um comportamento dinâmico relativamente previsível, pois as variações da topologia da rede no tempo são quase que determinísticas. Recentemente, um modelo teórico -- grafos evolutivos -- foi proposto com o intuito de capturar o comportamento dinâmico destas redes e formalizar algoritmos de roteamento de custo mínimo, além de outros. Os algoritmos e idéias obtidos com este modelo são teoricamente muito eficientes, mas, no entanto, antes deste trabalho não existiam estudos do uso destes modelos em situações práticas. Assim, o objetivo deste trabalho é analisar a aplicabilidade da teoria de grafos evolutivos na construção de protocolos de roteamento eficientes em cenários realistas. Foram implementados dois protocolos de roteamento para redes móveis ad hoc baseados nos algoritmos de grafos evolutivos, são eles: Jornada que Chega Mais Cedo e Jornada Mais Curta. Extensivas simulações foram realizadas utilizando o simulador de redes NS2 e os resultados foram comparados com outros quatro protocolos clássicos para este tipo de rede: AODV, DSR, OLSR e DSDV. Os resultados preliminares mostram que este recente modelo tem muito potencial para ser uma ferramenta poderosa no desenvolvimento e análise de algoritmos para redes dinâmicas com comportamento previsível. No entanto, foram apontados alguns aspectos que precisam ser melhores estudados para que estes algoritmos possam ser utilizados em situações reais. / The assessment of routing protocols for wireless networks is a difficult task, because of the networks\' highly dynamic behavior and the absence of benchmarks. However, some of these networks, such as intermittent wireless sensors networks, periodic or cyclic networks, and low earth orbit satellites systems, have more predictable dynamics, as the temporal variations in the network topology are somehow deterministic, which may make them easier to study. Recently, a graph theoretic model -- the evolving graphs -- was proposed to help to capture the dynamic behavior of these networks, in view of the construction of least cost routing and other algorithms. The algorithms and insights obtained through this model are theoretically very efficient and intriguing. However, before this work there was no study on the use of such theoretical results into practical situations. Therefore, the objective of our work is to analyze the applicability of the evolving graph theory in the construction of efficient routing protocols in realistic scenarios. We use the NS2 network simulator to first implement two evolving graph based routing protocols: Foremost Journey and Shortest Journey, They are evaluated and compared to four major ad-hoc protocols: AODV, DSR, OLSR and DSDV. Interestingly, our experiments show that evolving graphs have all the potentials to be an effective and powerful tool in the development and analysis of algorithms for dynamic networks, with predictable dynamics at least. In order to make this model widely applicable, however, some practical issues still have to be addressed and incorporated into the model.
|
78 |
An Ant Inspired Dynamic Traffic Assignment for VANETs: Early Notification of Traffic Congestion and Traffic IncidentsUnknown Date (has links)
Vehicular Ad hoc NETworks (VANETs) are a subclass of Mobile Ad hoc NETworks
and represent a relatively new and very active field of research. VANETs will enable in
the near future applications that will dramatically improve roadway safety and traffic
efficiency. There is a need to increase traffic efficiency as the gap between the traveled
and the physical lane miles keeps increasing. The Dynamic Traffic Assignment problem
tries to dynamically distribute vehicles efficiently on the road network and in accordance
with their origins and destinations. We present a novel dynamic decentralized and
infrastructure-less algorithm to alleviate traffic congestions on road networks and to fill
the void left by current algorithms which are either static, centralized, or require
infrastructure. The algorithm follows an online approach that seeks stochastic user
equilibrium and assigns traffic as it evolves in real time, without prior knowledge of the traffic demand or the schedule of the cars that will enter the road network in the future.
The Reverse Online Algorithm for the Dynamic Traffic Assignment inspired by Ant
Colony Optimization for VANETs follows a metaheuristic approach that uses reports from
other vehicles to update the vehicle’s perceived view of the road network and change route
if necessary. To alleviate the broadcast storm spontaneous clusters are created around
traffic incidents and a threshold system based on the level of congestion is used to limit
the number of incidents to be reported. Simulation results for the algorithm show a great
improvement on travel time over routing based on shortest distance. As the VANET
transceivers have a limited range, that would limit messages to reach at most 1,000 meters,
we present a modified version of this algorithm that uses a rebroadcasting scheme. This
rebroadcasting scheme has been successfully tested on roadways with segments of up to
4,000 meters. This is accomplished for the case of traffic flowing in a single direction on
the roads. It is anticipated that future simulations will show further improvement when
traffic in the other direction is introduced and vehicles travelling in that direction are
allowed to use a store carry and forward mechanism. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2016. / FAU Electronic Theses and Dissertations Collection
|
79 |
Context-aware hybrid data dissemination in vehicular networksUnknown Date (has links)
This work presents the development of the Context-Aware Hybrid Data Dissemination
protocol for vehicular networks. The importance of developing vehicular networking data
dissemination protocols is exemplified by the recent announcement by the U.S. Department of Transportation (DOT) National Highway Traffic Safety Administration (NHTSA) to enable vehicle-to-vehicle (V2V) communication technology. With emphasis on safety, other useful applications of V2V communication include but are not limited to traffic and routing, weather, construction and road hazard alerts, as well as advertisement and entertainment. The core of V2V communication relies on the efficient dispersion of relevant data through wireless broadcast protocols for these varied applications. The challenges of vehicular networks demand an adaptive broadcast protocol capable of handling diverse applications. This research work illustrates the design of a wireless broadcast protocol that is context-aware and adaptive to vehicular environments taking into consideration vehicle density, road topology, and type of data to be disseminated. The context-aware hybrid data dissemination scheme combines store-and-forward and multi-hop broadcasts, capitalizing on the strengths of both these categories and mitigates the weaknesses to deliver data with maximum efficiency to a widest possible reach. This protocol is designed to work in both urban and highway mobility models. The behavior and performance of the hybrid data dissemination scheme is studied by varying the broadcast zone radius, aggregation ratio, data message size and frequency of the broadcast messages. Optimal parameters are determined and the protocol is then formulated to become adaptive to node density by keeping the field size constant and increasing the number of nodes. Adding message priority levels to propagate safety messages faster and farther than non-safety related messages is the next context we add to our adaptive protocol. We dynamically
set the broadcast region to use multi-hop which has lower latency to propagate
safety-related messages. Extensive simulation results have been obtained using realistic vehicular network scenarios. Results show that Context-Aware Hybrid Data Dissemination Protocol benefits from the low latency characteristics of multi-hop broadcast and low bandwidth consumption of store-and-forward. The protocol is adaptive to both urban and highway mobility models. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2014. / FAU Electronic Theses and Dissertations Collection
|
80 |
A Pragmatic View of MANET Performance Evaluation and Design of a Prototype MAC Level Routing AlgorithmThurston, Michael J 08 January 2003 (has links)
Our goal in this research is to investigate and determine how to best support a challenging mobile wireless network based in a military operational environment. Since routing protocols used in mobile ad hoc networks (MANET) must adapt to frequent or continual changes of topology, while simultaneously limiting the impact of tracking these changes on wireless resources, we focused our initial research on improving the efficiency of route discovery. We proposed and designed a new MAC layer routing protocol that pursues reduced routing overhead, greater interaction of network protocol layers and passive neighbor/path discovery. This algorithm, called Virtual MAC Tag Switching (VMTS), evolved as we implemented a prototype in the ns-2 network simulator and conducted simulation analysis of existing protocols: DSDV, DSR and AODV. Upon analyzing the performance of existing routing protocols using pragmatic metrics not applied in any MANET literature it was found that current MANET models produce unsatisfactory performance. Subsequent analysis of transport layer protocol behaviors pinpointed the causes that undermine the performance of the existing protocols and would have thwarted VMTS as well.
|
Page generated in 0.0348 seconds