• Title/Summary/Keyword: 노드 내 통신

Search Result 445, Processing Time 0.031 seconds

A Tree based Self-Routing Scheme for Mobility Support in Wireless Sensor Networks (무선 센서네트워크에서 이동성을 지원하는 Tree기반의 Self-Routing 기법)

  • Kim, Young-Duk;Yang, Yeon-Mo;Kang, Won-Seok;Kim, Jin-Wook;An, Jin-Ung
    • Proceedings of the KIEE Conference
    • /
    • 2008.10b
    • /
    • pp.534-535
    • /
    • 2008
  • 최근 유비쿼터스 기술이 급속도로 발전함에 따라 많은 application들이 다양한 환경에서 통신서비스를 요구하고 있다. 이를 지원하기 위하여 많은 무선 센서 네트워킹 기술들이 제안되었지만 제한된 대역쪽과 높은 에러율로 인하여 이동성을 지원하기에는 부족하였다. 특히, 경로를 획득하기 위한 Route Request (RREQ)의 잦은 브로드캐스트 과정은 오히려 혼잡 및 에너지 소모를 야기시키며 네트워크 성능을 저하시키는 문제점이 있다. 본 논문에서는 언제, 어디서나 다양한 토폴로지 환경에서 자가 구성이 가능하며, 이동성을 지원하는 Tree기반의 Self-Routing 기법을 제안한다. 기존의 센서 네트워크내 멀티홉 라우팅 프로토콜과는 달리, 라우터 혹은 싱크노드의 비컨 프레임내 Association 정보만을 이용하여 새로운 라우팅 테이블을 형성함으로써 컨트롤 패킷의 오버 헤드를 크게 줄일 수 있다. 성능 평가를 위하여 실제 모바일 로봇을 이용한 실험과 시뮬레이션을 동시에 하였으며, 기존의 기법보다 향상된 성능을 가짐을 보인다.

  • PDF

Performance Evaluation of an Underwater Propagation Delay-Aware Medium Access Control Protocol (수중 전파 지연을 고려한 매체 접근 제어 프로토콜에 대한 성능 평가)

  • Hwang, Ho Young;Kim, Woo-Sik;Lee, Sang-Kug;Cho, Ho-Shin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.34 no.6
    • /
    • pp.463-469
    • /
    • 2015
  • In this paper, we propose an underwater propagation delay-aware medium access control protocol and evaluate the performance of the proposed protocol. In the proposed propagation delay-aware medium access control protocol, a sink node can restore the received RTS frames that are not piled up in a slot time. We analyze and compare the performance of the proposed underwater propagation delay-aware medium access control protocol with that of the conventional medium access control protocol in various environments.

Scheduled Interest Table(SIT) based Multiple Path Configuration Technique in Ocean Sensor Network (해양 센서네트워크에서 Scheduled Interest Table(SIT) 기반 다중경로 설정 기법)

  • Yun, Nam-Yeol;NamGung, Jung-Il;Park, Soo-Hyun
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.175-184
    • /
    • 2009
  • The distance of sensor nodes is an important factor in having influence on capability of networks in underwater acoustic sensor networks. Our proposed scheme is to establish an efficient distance to design a route of communication in underwater environment and it proposes a Level scheme that the areas divided by transmit/receive distance in network are given different levels. Our proposed scheme is pursued research to maintain a established route and maximize an energy efficiency. The established route will have fluid modification by an internal and external factors and it will construct more robust underwater sensor networks over our proposed multiple path configuration scheme.

A Study of Monitoring and Operation for PEM Water Electrolysis and PEM Fuel Cell Through the Convergence of IoT in Smart Energy Campus Microgrid (스마트에너지캠퍼스 마이크로그리드에서 사물인터넷 융합 PEM 전기분해와 PEM 연료전지 모니터링 및 운영 연구)

  • Chang, Hui Il;Thapa, Prakash
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.13-21
    • /
    • 2016
  • In this paper we are trying to explain the effect of temperature on polymer membrane exchange water electrolysis (PEMWE) and polymer membrane exchange fuel cell (PEMFC) simultaneously. A comprehensive studying approach is proposed and applied to a 50Watt PEM fuel cell system in the laboratory. The monitoring process is carried out through wireless LoRa node and gateway network concept. In this experiment, temperature sensor measure the temperature level of electrolyzer, fuel cell stack and $H_2$ storage tank and transmitted the measured value of data to the management control unit (MCU) through the individual node and gateway of each PEMWE and PEMFC. In MCU we can monitor the temperature and its effect on the performance of the fuel cell system and control it to keep the lower heating value to increase the efficiency of the fuel cell system. And we also proposed a mathematical model and operation algorithm for PEMWE and PEMFC. In this model, PEMWE gives higher efficiency at lower heating level where as PEMFC gives higher efficiency at higher heating value. In order to increase the performance of the fuel cell system, we are going to monitor, communicate and control the temperature and pressure of PEMWE and PEMFC by installing these systems in a building of university which is located in the southern part of Korea.

Load Balancing Mechanisms for Foreign Agents in Hierarchical Mobile IPv4 Networks (계층적 MIPv4 네트워크에서의 외부 에이전트 부하 분산 방안)

  • Byun Haesun;Lee Meejeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.167-179
    • /
    • 2005
  • In hierarchical Mobile IPv4 Networks the highest FA(Foreign Agent) may experience serious congestion and delay since the highest FA plays a role of CoA(Care of Address) for all mobile nodes in the domain, In this paper, we propose mechanism called 'HRFA(Hierarchical Root Foreign Agent)', which distributes the load imposed on the highest FA. In the proposed HRFA scheme, multiple HRFAs are selected to provide the similar service that is provided by the highest FA. According to which entity determines HRFAs, HRFA scheme is categorized into 'Active' and 'Passive' approaches. HRFA scheme is further categorized into 'All MN(Mobile Node)s' and 'New MNs' approaches, depending on which mobile nodes are assigned to a newly elected HRFA. Through a course of simulations, we investigate the performance of 4 possible combinations of HRFA schemes. We also compare the performance of the proposed HRFA schemes with the LMSP(Local Multicast Service Provider) scheme, which is a scheme to distribute the load of FA for multicast service in hierarchical wireless network domain. The simulation results show that the Passive & New MN approach performs best with respect to both the overhead and the load balancing.

Distributed Edge Computing for DNA-Based Intelligent Services and Applications: A Review (딥러닝을 사용하는 IoT빅데이터 인프라에 필요한 DNA 기술을 위한 분산 엣지 컴퓨팅기술 리뷰)

  • Alemayehu, Temesgen Seyoum;Cho, We-Duke
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.291-306
    • /
    • 2020
  • Nowadays, Data-Network-AI (DNA)-based intelligent services and applications have become a reality to provide a new dimension of services that improve the quality of life and productivity of businesses. Artificial intelligence (AI) can enhance the value of IoT data (data collected by IoT devices). The internet of things (IoT) promotes the learning and intelligence capability of AI. To extract insights from massive volume IoT data in real-time using deep learning, processing capability needs to happen in the IoT end devices where data is generated. However, deep learning requires a significant number of computational resources that may not be available at the IoT end devices. Such problems have been addressed by transporting bulks of data from the IoT end devices to the cloud datacenters for processing. But transferring IoT big data to the cloud incurs prohibitively high transmission delay and privacy issues which are a major concern. Edge computing, where distributed computing nodes are placed close to the IoT end devices, is a viable solution to meet the high computation and low-latency requirements and to preserve the privacy of users. This paper provides a comprehensive review of the current state of leveraging deep learning within edge computing to unleash the potential of IoT big data generated from IoT end devices. We believe that the revision will have a contribution to the development of DNA-based intelligent services and applications. It describes the different distributed training and inference architectures of deep learning models across multiple nodes of the edge computing platform. It also provides the different privacy-preserving approaches of deep learning on the edge computing environment and the various application domains where deep learning on the network edge can be useful. Finally, it discusses open issues and challenges leveraging deep learning within edge computing.

Efficient Broadcasting Scheme of Emergency Message based on VANET and IP Gateway (VANET과 IP 게이트웨이에 기반한 긴급메시지의 효율적 방송 방법)

  • Kim, Dongwon;Park, Mi-Ryong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.31-40
    • /
    • 2016
  • In vehicular ad-hoc networks (VANETs), vehicles sense information on emergency incidents (e.g., accidents, unexpected road conditions, etc.) and propagate this information to following vehicles and a server to share the information. However, this process of emergency message propagation is based on multiple broadcast messages and can lead to broadcast storms. To address this issue, in this work, we use a novel approach to detect the vehicles that are farthest away but within communication range of the transmitting vehicle. Specifically, we discuss a signal-to-noise ratio (SNR)-based linear back-off (SLB) scheme where vehicles implicitly detect their relative locations to the transmitter with respect to the SNR of the received packets. Once the relative locations are detected, nodes that are farther away will set a relatively shorter back-off to prioritize its forwarding process so that other vehicles can suppress their transmissions based on packet overhearing. We evaluate SLB using a realistic simulation environment which consists of a NS-3 VANET simulation environment, a software-based WiFi-IP gateway, and an ITS server operating on a separate machine. Comparisons with other broadcasting-based schemes indicate that SLB successfully propagates emergency messages with latencies and hop counts that is close to the experimental optimal while reducing the number of transmissions by as much as 1/20.

Mechanism for Building Approximation Edge Minimum Spanning Tree Using Portals on Input Edges (선분상의 포탈을 이용한 근사 선분 최소 신장 트리의 생성)

  • Kim, In-Bum;Kim, Soo-In
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.509-518
    • /
    • 2009
  • In this paper, a mechanism that produces an approximation edges minimum spanning tree swiftly using virtual nodes called portals dividing given edges into same distance sub-edges. The approximation edges minimum spanning tree can be used in many useful areas as connecting communication lines, road networks and railroad systems. For 3000 random input edges, when portal distance is 0.3, tree building time decreased 29.74% while the length of the produced tree increased 1.8% comparing with optimal edge minimum spanning tree in our experiment. When portal distance is 0.75, tree building time decreased 39.96% while the tree length increased 2.96%. The result shows this mechanism might be well applied to the applications that may allow a little length overhead, but should produce an edge connecting tree in short time. And the proposed mechanism can produce an approximation edge minimum spanning tree focusing on tree length or on building time to meet user requests by adjusting portal distance or portal discard ratio as parameter.

IoT Multi-Phase Authentication System Using Token Based Blockchain (블록체인 기반의 토큰을 이용한 IoT 다단계 인증 시스템)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.6
    • /
    • pp.139-150
    • /
    • 2019
  • IoT(Internet of Things) security is becoming increasingly important because IoT potentially has a variety of security threats, including limited hardware specifications and physical attacks. This paper is a study on the certification technology suitable for the lightened IoT environment, and we propose a system in which many gateways share authentication information and issue authentication tokens for mutual authentication using blockchain. The IoT node can be issued an authentication token from one gateway to continuously perform authentication with a gateway in the block-chain network using an existing issued token without performing re-authentication from another gateway participating in the block-chain network. Since we do not perform re-authentication for other devices in a blockchain network with only one authentication, we proposed multi phase authentication consisting of device authentication and message authentication in order to enhance the authentication function. By sharing the authentication information on the blockchain network, it is possible to guarantee the integrity and reliability of the authentication token.

A Study on the Performance of Priority Mechanisms in ATM Multiplexer (ATM 멀티플렉서에서의 우선순위 메카니즘에 관한 연구)

  • 윤성호;박광채;이재호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.6
    • /
    • pp.779-792
    • /
    • 1993
  • In a switching node or an ATM multiplexer of the ATM network, a good bandwidth utilization can be achieved by the priority control using the 1-bit(Cell Loss priority) in ATM cell header. In this paper, the mixed mechanism is proposed to make up for shortcomings of existing space priority control mechanisms and to decrease the loss probability of high priority cell and its performance is analyzed about the cell loss probability. To estimate the performance of proposed mixed mechanism, its cell loss probability is compared with those of non-priority mechanism, push-out mechanism and partial buffer sharing mechanism. The cell loss probability is analyzed using a M/D/1/N modeling and a 2-state MMPP/D/1/N modeling and also comparison between two modelings is made. To verify this result of numerical analysis, the computer simulation is performed for each mechanism using the simulation language, SIMSRIPT II.5.

  • PDF