• Title/Summary/Keyword: 비컨 메시지

Search Result 9, Processing Time 0.024 seconds

An Analysis for the Efficient Dissemination of Beacon Messages in Vehicle-to-Vehicle (V2V) Communications (자동차 간 통신에서 비컨 메시지의 효율적인 방송을 위한 성능 분석)

  • Nguyen, Hoa-Hung;Bhawiyuga, Adhitya;Jeong, Han-You
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6C
    • /
    • pp.483-491
    • /
    • 2012
  • In vehicle-to-vehicle (V2V) communications, each vehicle should periodically disseminate a beacon message including the kinematics information, such as position, speed, steering, etc., so that a neighbor vehicle can better perceive and predict the movement of the vehicle. However, a simple broadcasting of such messages may lead to a low reception probability as well as an excessive delay. In this paper, we attempt to analyze the impact of the following key parameters of the beacon dissemination on the performance of vehicular networks: beacon period, carrier-sensing range, and contention window (CW) size. We first derive a beacon period which is inversely proportional to the vehicle speed. Next, we mathematically formulate the maximum beacon load to demonstrate the necessity of the transmit power control. We finally present an approximate closed-form solution of the optimal CW size that leads to the maximum throughput of beacon messages in vehicular networks.

Random Early Beacon Broadcast (REB2) for Cooperative Vehicle Safety Applications (차량안전 응용을 위한 임의 조기 비컨방송)

  • Jeong, Han-You;Nguyen, Hoa-Hung
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.1017-1021
    • /
    • 2020
  • In the V2X communications, each vehicle periodically broadcasts a message, called a beacon, so that its neighbor vehicles can accurately predict the near-future positions of the sending vehicle. In particular, the mobility-adaptive beacon broadcast (MAB2) scheme keeps the tracking error of a sending vehicle below a fixed threshold within a few consecutive beacon losses. In this paper, we present a random-early beacon broadcast (REB2) scheme that addresses the beacon aging problem of the MAB2 scheme. The simulation results show that, for a neighbor vehicle within 100 m distance, the tracking failure probability of REB2 scheme can be reduced to less than 1/10 of that of MAB2 scheme.

Receiver-based Beaconless Real-time Routing Protocol in Wireless Sensor Networks (무선 센서 네트워크에서 수신자 기반의 비컨없는 실시간 라우팅 방안)

  • Yim, Yong-Bin;Park, Ho-Sung;Lee, Jeong-Cheol;Oh, Seung-Min;Kim, Sang-Ha
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.305-307
    • /
    • 2012
  • 무선 센서 네트워크에서 실시간 서비스는 중요한 이슈들 중 하나이다. 일반적으로, 기존의 연구는 이를 위해 비컨 (beacon)에 의존한다. 최근, 자원 제약적인 환경의 무선 센서 네트워크에서는 비컨으로 인한 제어 오버헤드 또한 부담이므로, 이를 극복하기 위한 비컨리스 라우팅이 제안되었다. 그러므로, 비컨리스 방안을 기반으로 한 실시간 통신이 활용 된다면 적은 에너지 소모로 환경적 제약에 유리하게 작용할 것이다. 그러나 이를 위해서는 새로운 도전에 직면한다. 전통적인 실시간 통신에서는, 요구 시간 안에 데이터를 전달하기 위해 각 노드들이 단일 홉 지연 시간을 파악하고 있어야 한다. 이 지연 시간은 비컨 메시지를 통한 이웃 노드 정보에 기반하여 파악되며, 이를 바탕으로 송신자가 적합한 다음 중계 노드를 선정한다. 그러나, 수신자 기반의 비컨리스 방안에서는 수신자가 스스로 다음 중계 노드를 결정하는 방식이기 때문에 기존의 송신자를 기준으로 한 지연 시간을 그대로 사용할 수 없다. 또한 비컨리스 라우팅을 위한 경쟁 지연 시간도 단일 홉 지연 시간에 포함되어야 한다. 따라서, 지연 시간 측정 원리가 새롭게 설계되어야 한다. 본 논문에서는 수신자 기반의 실시간 라우팅 방안을 제안한다. 제안 방안에서, 우리는 새로운 지연시간 측정 방법을 제시한다. 송신자로부터 수신자로의 단일 홉 지연 시간은 수신자에 의해 계산되어, 수신자는 실시간 제약 사항을 만족하는지 스스로가 결정할 수 있다. 시뮬레이션 결과를 통해 제안 방안이 비컨없이도 우수한 성능으로 실시간 서비스를 지원할 수 있음을 보여준다.

Design and Implementation of Low Power Container Security Device based on IEEE 802.15.4 (IEEE 802.15.4 기반 저전력 컨테이너 보안장치의 설계 및 구현)

  • Park, Se-Young;Kim, Taek-Hyun;Choi, Hoon;Baek, Yun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.215-224
    • /
    • 2010
  • A container security device (CSD) monitors intrusions through the cargo door; it is a reduced function device that uses IEEE 802.15.4 with a beacon mode. However, in the beacon mode, the CSD consumes too much battery power in periodical idle listening and sensing trials. Moreover, the CSD cannot send the message to the CSD reader actively, and it makes big latency problem. Therefore, we propose a low-power CSD to reduce the unnecessary power consumption. The proposed CSD follows the requirements of the U.S. Department of Homeland Security, and reduces battery consumption through a power-efficient hardware design, a night-watch mechanism for low-power operation and low-power sensing to reduce unnecessary monitoring. And the CSD sends alert message to the CSD reader. Simulation results show that our CSD reduces battery consumption by over 70% through the night-watch mechanism and by approximately 80% through the low-power sensing. And the CSD can send the alert message to the remote CSD reader by over 94%.

Query Technique for Quick Network Routing changing of Mobility Sensor Node in Healthcare System (헬스케어 시스템에서 이동형 센서노드의 신속한 네트워크 라우팅 변화를 위한 질의기법)

  • Lee, Seung-chul;Kwon, Tae-Ha;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.517-520
    • /
    • 2009
  • Healthcare application system has been actively researched to apply WSN technology to healthcare area with a mobile sensor node of low cost, low power, and small size. Sensor node has the problem for transmission range of RF power and time delay of the wireless routing connectivity between sensor nodes. In this paper, we proposes a new method utilizing mobile sensor nodes with relay sensor nodes for quick network routing changing using query technique in healthcare system. A query processor to control and manage the routing changing of sensor nodes in a wireless sensor network was designed and implemented. The user's PC transmits the beacon message which will change the quick link routing according to activity status of patient in wireless sensor network. We describe the implementation for query protocol that is very effective of power saving between sensor nodes.

  • PDF

Design and Construction of Asymmetric Two-way Message Transmitting System Overlaid on TRS (비대칭 양방향 메시지 전송 시스템의 설계와 구성)

  • 전명연;안정근
    • The Journal of Information Technology
    • /
    • v.3 no.2
    • /
    • pp.87-95
    • /
    • 2000
  • This paper studies on method about construction and design of two-way message system to overcome limit of one-way pager system. Method of two-way system construction is studied on using the present one-way pager system and configure system. Forward-link of proposed method is using the present one-way pager system. And Reverse-link of proposed method is used TRS and Beacon on pager. CTI(Computer Telephony Integration) is used to Call processing

  • PDF

Mesh Routing Algorithm for TDMA Based Low-power and Ad-hoc Networks (TDMA 기반 저전력 애드혹 네트워크를 위한 메쉬 라우팅 알고리즘)

  • Hwang, Soyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.8
    • /
    • pp.1955-1960
    • /
    • 2014
  • Many routing protocols have been proposed for low-power and ad-hoc networks to deliver command or data among nodes and recently, various researches are carried out about networking scheme considering reliability and scalability. In low-power networking technology, the performance of network layer is closely connected with the operation of data link layer and mesh routing mechanisms based on TDMA MAC are considered for reliability and scalability. This paper proposes mesh routing algorithm utilizing the characteristics of TDMA MAC and topological addressing in TDMA based low-power and ad-hoc networks and implementation results are presented.

An Effective Service Discovery Architecture at Wired/Wireless Networks (유무선 네트워크에서 효율적인 서비스탐색 구조 설계)

  • Seo, Hyun-Gon;Kim, Ki-Hyung;Hong, You-Sik;Lee, U-Beom
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.64-75
    • /
    • 2007
  • Service discovery protocols is software components to find specific services or resources on network. The SLP defined by IETF protocol is a framework for automatic service discovery on IP based networks. Automatic service discovery is an important component on ubiquitous computing environment. This paper proposes a service discovery architecture named as SLPA(Service Location Protocol based on AMAAM). AMAAM(Mobility Agent Advertisement Mechanism) is an aggregation-based Mobile IP implementation in MANET. In SLPA, the role of the directory agent is assigned to the mobility agent in AMAAM. The mobility agent periodically beacons an advertisement message which contains both the advertisement of the directory agent in SLP and the advertisement of the mobility agent in Mobile IP. For evaluating the functional correctness of SLPA and the overhead of maintaining a service directory of SLPA. We simulate SLPA using ns-2 and analyze the overhead of control overheads for the aggregation. Through the simulation experiments we show the functional correctness of the proposed architecture and analyze the performance results.

A Secure and Privacy-Aware Route Tracing and Revocation Mechanism in VANET-based Clouds (VANET 기반 클라우드 환경에서 안전과 프라이버시를 고려한 경로추적 및 철회 기법)

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.795-807
    • /
    • 2014
  • Vehicular Ad hoc Network (VANET) has gone through a rich amount of research and currently is making its way towards the deployment. However, surprisingly it evolved to rather more applications and services-rich breed referred to as VANET-based clouds due to the advancements in the automobile and communication technologies. Security and privacy have always been the challenges for the think tanks to deploy this technology on mass scale. It is even worse that some security issues are orthogonally related to each other such as privacy, revocation and route tracing. In this paper, we aim at a specific VANET-based clouds framework proposed by Hussain et al. namely VANET using Clouds (VuC) where VANET and cloud infrastructure cooperate with each other in order to provide VANET users (more precisely subscribers) with services. We specifically target the aforementioned conflicted privacy, route tracing, and revocation problem in VANET-based clouds environment. We propose a multiple pseudonymous approach for privacy reasons and leverage the beacons stored in the cloud infrastructure for both route tracing and revocation. In the proposed scheme, revocation authorities after colluding, can trace the path taken by the target node for a specified timespan and can also revoke the identity if needed. Our proposed scheme is secure, conditional privacy preserved, and is computationally less expensive than the previously proposed schemes.