-
Research on Applying Hierachical Clustered Based Routing Technique Using Artificial Intelligence Algorithms for Quality of Service of Service Based Routing
Nguyen Thanh Long,
Nguyen Duc Thuy,
Pham Huy Hoang
Issue:
Volume 3, Issue 3, October 2015
Pages:
14-21
Received:
5 May 2015
Accepted:
6 May 2015
Published:
12 May 2015
Abstract: MANET (Mobile Ad-Hoc Network) is autonomous system, not based on existing infrastructure. Nodes usually change their position, network topology changes very fast. Service Based Routing is inherited from the model of Content Based Routing - CBR that manages and classifies many of network services. In order making nodes to communicate quickly and stablely, it requires applying some methodologies to reduce overhead and delay as well as power consumption. Therefore, this paper mentions a hierarchical clustered based routing using R^+Tree. R^+ is a data structure with fast algorithms to establish, insert, update. It has been used in many fields effectively and efficiently such as Google Map, Forwarding technique, computer virtual memory. In combination with some artificial intelligence algorithms to make cluster, find optimized routes, multicast trees for effective communication. Fuzzy logic and genetic al. are proved to be very compatible with Manet. A genetic algorithm is used to choose optimized clusters, Fuzzy logic is applied to choose the cluster head and members of each cluster. Multiple paths routing is very importance for routing in MANET that making Quality of Service by Ant Colony Optimization Algorithm.
Abstract: MANET (Mobile Ad-Hoc Network) is autonomous system, not based on existing infrastructure. Nodes usually change their position, network topology changes very fast. Service Based Routing is inherited from the model of Content Based Routing - CBR that manages and classifies many of network services. In order making nodes to communicate quickly and sta...
Show More
-
Research on Innovating and Applying Evolutionary Algorithms Based Hierarchical Clustering and Multiple Paths Routing for Guaranteed Quality of Service on Service Based Routing
Nguyen Thanh Long,
Nguyen Duc Thuy,
Pham Huy Hoang
Issue:
Volume 3, Issue 3, October 2015
Pages:
22-28
Received:
5 May 2015
Accepted:
6 May 2015
Published:
12 May 2015
Abstract: In Service Based Routing (SBR), data is transmitted from a source node to destination nodes are not depended on destination addresses. Hence, it is comfortable with new advanced technology as cloud computing and also flexible and reliable. Genetic and Queen-Bee algorithms (GA, QB) are artificial intelligence techniques for combinatorial optimization problems solving based on some natural rules. In which GA is a branch of the evolutionary strategies that uses some principles of evolution theory, such as natural selection, mutation and crossover. QB is performed based on GA for energy saving. The R^+ tree is an effective data structure that can be used to organize a hierarchical clustering network with fast establishing, updating, tuning algorithms. The usage of the Greedy algorithm to find cyclic routes or multiple paths on each trunk by multiple criterions to transmit data effectively.
Abstract: In Service Based Routing (SBR), data is transmitted from a source node to destination nodes are not depended on destination addresses. Hence, it is comfortable with new advanced technology as cloud computing and also flexible and reliable. Genetic and Queen-Bee algorithms (GA, QB) are artificial intelligence techniques for combinatorial optimizatio...
Show More
-
Building Multile Multicast Trees with Guarranteed QOS for Service Based Routing Using Artificial Algorithms
Nguyen Thanh Long,
Nguyen Duc Thuy,
Pham Huy Hoang
Issue:
Volume 3, Issue 3, October 2015
Pages:
29-32
Received:
1 June 2015
Accepted:
2 June 2015
Published:
11 June 2015
Abstract: In Service Based Routing (SBR), data is transmitted from a source node to destination nodes are not depended on destination addresses. Hence, it is comfortable with new advanced technology as cloud computing and also flexible and reliable. Multicast routing is advanced technique to deliver data simultaneously from one source node to multiple destination nodes with QOS (quality of service). In this paper, we introduce a technique that is extended from multicast technique with multiple multicast trees that are conformed quality of service routing. This technique is based on Greedy, Ant Colony Optimization, and fuzzy logic to get optimal routes to transmit data from one source to multiple destination node very effectively. The usage of the ANT Colony optimization, Greedy, fuzzy logic algorithms to find cyclic or multiple paths routes on each trunk by multiple criterions to transmit data effectively.
Abstract: In Service Based Routing (SBR), data is transmitted from a source node to destination nodes are not depended on destination addresses. Hence, it is comfortable with new advanced technology as cloud computing and also flexible and reliable. Multicast routing is advanced technique to deliver data simultaneously from one source node to multiple destin...
Show More
-
Research on Innovating and Applying Cryptography Algorithms for Security Routing in Service Based Routing
Nguyen Thanh Long,
Nguyen Duc Thuy,
Pham Huy Hoang
Issue:
Volume 3, Issue 3, October 2015
Pages:
33-41
Received:
17 September 2015
Accepted:
18 September 2015
Published:
12 October 2015
Abstract: In Cryptography, there are two kinds of methods for encryption and decryption. They are symmetric cryptography and asymmetric cryptography. In symmetric cryptography, it uses a single key for encryption and decryption. In asymmetric cryptography, it uses both public key and private key for encryption and decryption. In MANET (mobile ad-hoc network) every node usually moves and has limited energy, so network link is not stable and has low bandwidth. Therefore it is very carefully to choose the cryptography for ad-hoc network or MANET. If the transaction is very important, for example online banking, can use an asymmetric algorithm. So Elliptic Curve Cryptography is right choice. For data and control traffic, the symmetric cryptography can be the good selection, especially stream ciphers are very comfortable. We use Elliptic Curve Cryptography (ECC) with its arithmetic operations on finite fields to build public - key cryptographic schemes consisting of: i) signature schemes; ii) encryption schemes; and iii) key agreement schemes. In key management, public key cryptography is used to distribute the secret keys used in other cryptographic algorithms (for example DES). For digital signatures, public key cryptography is used to authenticate the origin of data and protect the integrity of that data. Early public key systems are secure based on difficulty of factoring a large integer composed by two or more large prime integers. With Elliptic Curve based protocol, its security is based on assuming that is difficult to find the discrete logarithm of a random point on Elliptic Curve with respect to a publicly known base point. The size of EC determines the level of difficulty of the problem. If comparing to RSA, with the same level of security, RSA has to use larger public key, for example ECC of 256 bits public key is with the same level of security as 3072 bits public key RSA. To use RSA or Diffie-Hellman to protect 128-bit AES keys one should use 3072-bit parameters: three times the size in use throughout the Internet today. The equivalent key size for elliptic curves is only 256 bits.
Abstract: In Cryptography, there are two kinds of methods for encryption and decryption. They are symmetric cryptography and asymmetric cryptography. In symmetric cryptography, it uses a single key for encryption and decryption. In asymmetric cryptography, it uses both public key and private key for encryption and decryption. In MANET (mobile ad-hoc network)...
Show More
-
Research on Innovating, Evaluating and Applying Multicast Routing Technique and Genetic Algorithm for Routing Messages in Service - Oriented Routing
Nguyen Thanh Long,
Nguyen Duc Thuy,
Pham Huy Hoang
Issue:
Volume 3, Issue 3, October 2015
Pages:
42-47
Received:
21 September 2015
Accepted:
21 September 2015
Published:
12 October 2015
Abstract: MANET (short for Mobile Ad-Hoc Network) consists of a set of mobile network nodes, network configuration changes very fast. Each node will act as a router to maintain network operation. As some standard content based routing protocols, when a node publishes its content, it will broadcast data to network. The published content will be cached at all routers on the network. So when a node publish a request to get some content, it will prepare a subscription message then broadcast it. When any node on network received that subscription, it matches subscription’s content with published content that have been cached on it. If found then matched content will be transferred to requested node. Service Oriented Routing is inherited from the model of content based routing (CBR), combined with several advanced techniques such as Multicast, Genetic algorithm (GA) increase the data rate, and data encryption to ensure information security.
Abstract: MANET (short for Mobile Ad-Hoc Network) consists of a set of mobile network nodes, network configuration changes very fast. Each node will act as a router to maintain network operation. As some standard content based routing protocols, when a node publishes its content, it will broadcast data to network. The published content will be cached at all ...
Show More
-
Research on Innovating and Applying Fuzzy Logic for Routing Technique in Service Oriented Routing
Nguyen Thanh Long,
Nguyen Duc Thuy,
Pham Huy Hoang
Issue:
Volume 3, Issue 3, October 2015
Pages:
48-58
Received:
22 September 2015
Accepted:
22 September 2015
Published:
12 October 2015
Abstract: Mobile Ad-hoc Network (Manet) consists of a set of network nodes which change, not based on an existing network infrastructure as well as the centralized control. Network nodes usually have limited energy, bandwidth limitations, so find a way to transfer packets in the network is very important. To minimize packet loss, efficient bandwidth utilization at the node requires routing protocol must be compact, efficient, accurate. Fuzzy logic is a logical field studies evaluating the accuracy of the results based on the approximation of the components involved, make decisions based on many factors relative accuracy based on experimental or mathematical proof. Each component of the logical expression is usually belong to one set of defined unclear (fuzzy set). In this paper, We give some researchs applied fuzzy logic in assessing the network routing and bandwidth management on the basis of a number of existing studies.
Abstract: Mobile Ad-hoc Network (Manet) consists of a set of network nodes which change, not based on an existing network infrastructure as well as the centralized control. Network nodes usually have limited energy, bandwidth limitations, so find a way to transfer packets in the network is very important. To minimize packet loss, efficient bandwidth utilizat...
Show More
-
Innovating R Tree for Message Forwarding Technique and Hierarchical Network Clustering in Service Based Routing
Nguyen Thanh Long,
Nguyen Duc Thuy,
Pham Huy Hoang
Issue:
Volume 3, Issue 3, October 2015
Pages:
59-65
Received:
22 September 2015
Accepted:
22 September 2015
Published:
12 October 2015
Abstract: In service based routing (SBR) [5], the problem for storing forwarding table that includes searching predicates received from subscribers through subscription messages is an important job. When a content request happens, the subscriber will create a subscription message. The subscription message stores several kinds of information, the most important content is a filter that is a conjunction of some constraints [5]. A filter is denoted by F character, that has mathematical formula: F = ⋀ni=1C1, in which C1 is service request, has the format: C1= ‘Service_name = requested service name’. Every C1 (i=¯(2..n)) is a constraint that is formed by three components: (Key, op, Value), Key is a keyword for searching, op is an operator, Value is searching condition. Key belongs to the set of name of properties of content messages that the requested service supplies. Op is an operator that depends on the type of data of the Key. Therefore the forwarding table is a set of filters which are received from all subscribers on networks. The algorithms for inserting, updating, deleting and finding filters that match content messages have been published by service providers are very important. In this paper, We mention a technique for forwarding technique on the basic of summary filter for storing and searching filter quickly. This technique is based on some previous researches. In section 8, give an algorithm for finding all network nodes that have matched filters with a content message. Section 7 introduces a cluster routing technique based on summary filter.
Abstract: In service based routing (SBR) [5], the problem for storing forwarding table that includes searching predicates received from subscribers through subscription messages is an important job. When a content request happens, the subscriber will create a subscription message. The subscription message stores several kinds of information, the most importa...
Show More
-
Innovating Multicast Tree and Artificial Algorithms for Service Based Routing
Nguyen Thanh Long,
Nguyen Duc Thuy,
Pham Huy Hoang
Issue:
Volume 3, Issue 3, October 2015
Pages:
66-73
Received:
23 September 2015
Accepted:
23 September 2015
Published:
12 October 2015
Abstract: In advance network we may use service Based Routing (SBR), so data is transmitted from a source node to destination nodes are not depended on destination addresses. So, it may be comfortable with new advanced technology as cloud computing and also flexible and reliable. Multicast routing is advanced technique to deliver data simultaneously from one source node to multiple destination nodes with QOS (quality of service). In this paper, we introduce a technique that is extended from multicast technique with multiple multicast trees that are conformed quality of service routing and multiple path routing. It also guarantees QOS of routes such as bandwidth. This technique is based on Greedy, Ant Colony Optimization, artificial neural network and fuzzy logic to get optimal routes to transmit data from one source to multiple destination node very effectively. The usage of the ANT Colony optimization, Greedy, fuzzy logic algorithms to find cyclic or multiple paths routes on each trunk by multiple criterions to transmit data effectively.
Abstract: In advance network we may use service Based Routing (SBR), so data is transmitted from a source node to destination nodes are not depended on destination addresses. So, it may be comfortable with new advanced technology as cloud computing and also flexible and reliable. Multicast routing is advanced technique to deliver data simultaneously from one...
Show More
-
Innovating R Tree and Multicast Routing to Make QOS Multiple Paths for Service Based Routing
Nguyen Thanh Long,
Nguyen Duc Thuy,
Pham Huy Hoang
Issue:
Volume 3, Issue 3, October 2015
Pages:
74-78
Received:
23 September 2015
Accepted:
23 September 2015
Published:
12 October 2015
Abstract: In the advanced routing of new networks communication and network technologies, it not only operates on some lower levels of a network protocol. But it also operates on some upper layers such as the application layer the highest-level layer in network protocol stack of OSI model. The routing process can be known by a more abstract concept. It can process on many layers on network’s stack of OSI model. So this kind of routing may be called the upper layer routing protocol. As the content based routing, in the service based routing protocol, the information can be classified by categories or service classes. Subscribers and publishers can communicate with each other but they don’t know other’s address. So it is more dynamical in processing and more comfortable for ad-hoc network. However the upper routing must be based on lower layers to make routing decisions. But normal routing protocols are used for most static network or rather small wireless networks or not high mobility networks. In mobile ad-hoc networks, nodes move very often and fast, so bandwidth of connection between them may be reduced. Therefore the transmission delay may be increased. The paper aims at purpose to increate QOS of routing by hierarchical clustering routing by using R+ tree in addition with some advanced techniques multicast routing, multiple paths, use GEN/ BEE/ ANT to optimize routes to transmit data. In R+ tree model, the network’s nodes are managed by Bottom-Up model from leaf nodes to root of the tree. All the leaf nodes, inner nodes and root of this tree are used for two roles: i) Manage a cluster that consists all nodes that have direct connections with this node; ii) Operate as a normal node. The paper mentions: (i) Setup hierarchical clustering network by using R tree structure. (ii) Making multicast tree from some cluster heads for fast routing. (iii) Making optimized route by Ant Colony Optimization.
Abstract: In the advanced routing of new networks communication and network technologies, it not only operates on some lower levels of a network protocol. But it also operates on some upper layers such as the application layer the highest-level layer in network protocol stack of OSI model. The routing process can be known by a more abstract concept. It can p...
Show More
-
Apply R+ Tree to Make Hierarchical Cluster Routing with QOS Guarranteed by Multiple Paths and Multicast Routing
Nguyen Thanh Long,
Nguyen Duc Thuy,
Pham Huy Hoang
Issue:
Volume 3, Issue 3, October 2015
Pages:
79-81
Received:
3 June 2015
Accepted:
4 June 2015
Published:
15 October 2015
Abstract: In the new era of communication and network technologies, a routing protocol not only operates on some lower levels of a network protocol. It also operates on the application layer the highest-level layer in network protocol stack. So we call this is upper layer routing protocol. But it must be based on lower layers to make routing decisions. But normal routing protocols are used for most static network or rather small wireless networks or not high mobility networks. In mobile ad-hoc networks, nodes move very often and fast, so bandwidth of connection between them can be reduced. Therefore the transmission delay may be increased. The paper aims at purpose to increate QOS routing by hierarchical clustering routing by using R+ tree in addition with some advanced techniques multicast routing, multiple paths, use GEN/ BEE/ ANT to optimize routes to transmit data.
Abstract: In the new era of communication and network technologies, a routing protocol not only operates on some lower levels of a network protocol. It also operates on the application layer the highest-level layer in network protocol stack. So we call this is upper layer routing protocol. But it must be based on lower layers to make routing decisions. But n...
Show More