• Title/Summary/Keyword: Bursty Data

Search Result 49, Processing Time 0.022 seconds

A Delay Efficient and Bursty Traffics Friendly MAC Protocol in Wireless Sensor Networks (무선 센서 네트워크에서 지연과 버스티 트래픽에 적합한 MAC 프로토콜)

  • Kim, Hye Yun;Kim, Seong Cheol
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.254-260
    • /
    • 2017
  • Data packets from sensor nodes scattered over measuring fields are generally forwarding to the sink node, which may be connected to the wired networks, in a wireless sensor network. So many data packets are gathered near the sink node, resulting in significant data packet collisions and severe transmission latency. In an event detection application such as object tracking and military, bursty data is generated when an event occurs. So many data packet should be transmitted in a limited time to the sink node. In this paper, we present a delay efficient and bursty traffic friendly MAC protocol called DEBF-MAC protocol for wireless sensor networks. The DEBF-MAC uses a slot-reserved mechanism and sleep period control method to send multiple data packets efficiently in an operational cycle time. Our simulation results show that DEBF-MAC outperforms DW-MAC and SR-MAC in terms of energy consumption and transmission delay.

A Bursty Traffics Friendly MAC Protocol in Wireless Sensor Networks (무선센서 네트워크에서 버스티 트래픽에 적합한 MAC 프로토콜)

  • Lee, Jin-young;Kim, Seong-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.772-778
    • /
    • 2018
  • Due to the recent advances in computing, communication and micro-electromechanical technology, Wireless Sensor Networks (WSNs) applications have been extended from military to many commercial areas such as object tracking, wire detection, and vehicular sensor networks. In some applications bursty data from many sensor nodes may be generated and the generated data from the monitoring area may be sent in a limited time to the final destination, sink node. In this paper, we present a BTF-MAC protocol adequate for WSNs applications in which bursty data packets are required to be transmitted in a limited time. The BTF-MAC is a synchronous duty-cycle MAC protocol and uses a slot-reserved and operational period extension mechanism adapted to the traffics. Our numerical analysis and simulation results show that BTF-MAC outperforms other related protocols such as DW-MAC and SR-MAC in terms of energy consumption and transmission delay.

A Novel Multiple Access Scheme via Compressed Sensing with Random Data Traffic

  • Mao, Rukun;Li, Husheng
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.308-316
    • /
    • 2010
  • The problem of compressed sensing (CS) based multiple access is studied under the assumption of random data traffic. In many multiple access systems, i.e., wireless sensor networks (WSNs), data arrival is random due to the bursty data traffic for every transmitter. Following the recently developed CS methodology, the technique of compressing the transmitter identities into data transmissions is proposed, such that it is unnecessary for a transmitter to inform the base station its identity and its request to transmit. The proposed compressed multiple access scheme identifies transmitters and recovers data symbols jointly. Numerical simulations demonstrate that, compared with traditional multiple access approaches like carrier sense multiple access (CSMA), the proposed CS based scheme achieves better expectation and variance of packet delays when the traffic load is not too small.

Analysis of Bursty Packet Loss Characteristic According to Transmission Rate for Wi-Fi Broadcast (Wi-Fi 방송 서비스를 위한 방송 패킷 전송률에 따른 버스트 손실 특성 분석)

  • Kim, Se-Mi;Kim, Dong-Hyun;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.7
    • /
    • pp.553-563
    • /
    • 2013
  • When the IEEE 802.11 wireless LAN-based broadcasting services, we use broadcast packets to broadcast multimedia contents to a large number of users using limited wireless resources. However, broadcast transmission is difficult to recover the loss packets compared with unicast transmission. Therefore, analysis of packet loss characteristics is required to perform efficient packet recovery. The packet loss in wireless transmissions is often bursty with high loss data rate. Even if loss patterns have the same average packet loss, they are different in the recovery rate of random loss and burst loss depending on the nature. Therefore, the analysis and research of the nature of the loss are needed to recover loss packets considering bursty characteristics. In this paper, we experimented Wi-Fi broadcast transmission according to transmission rate and analyzed bursty characteristics of loss patterns using 4-state markov model.

Efficient data transmission mechanism for bursty traffics in the energy-harvesting wireless sensor networks (에너지 수확 무선 센서 네트워크에서 효율적인 버스티 데이터 전송 메커니즘)

  • Jeon, Jun-Heon;Kim, Seong-Cheol;Park, Hyun-Joo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.293-296
    • /
    • 2012
  • 본 논문에서는 에너지 수확 무선 센서 네트워크에서 버스티 데이터 전송에 효율적인 수신자 기반의 MAC 프로토콜을 제안한다. 에너지 수확 무선 센서 네트워크는 기존의 배터리에 의해 동작하는 센서 네트워크에 비해 태양열과 같은 주변의 환경으로부터 에너지를 수확하여 사용함으로써 전체 네트워크의 수명을 향상시킬 수 있는 장점으로 인하여 많은 연구가 이루어지고 있다. 본 논문에서는 에너지 수확 무선 센서 네트워크에서 데이터 전송에 참여하는 센서 노드의 에너지를 참고하여 비콘(beacon) 주기를 조절하고 수신자(receiver) 비콘에 응답(acknowledgment)신호를 포함시킴으로써 버시티 데이티(bursty data) 전송에 효율적이면서, 센서 노드의 에너지를 절약할 수 있는 MAC 프로토콜을 제안한다. 본 논문에서는 제안된 MAC 프로토콜과 기존에 연구되었던 ODMAC 프로토콜과 에너지 절약 및 버스티 데이터 전송 효율면에서 비교분석한다.

  • PDF

THE DISCRETE-TIME ANALYSIS OF THE LEAKY BUCKET SCHEME WITH DYNAMIC LEAKY RATE CONTROL

  • Choi, Bong-Dae;Choi, Doo-Il
    • Communications of the Korean Mathematical Society
    • /
    • v.13 no.3
    • /
    • pp.603-627
    • /
    • 1998
  • The leaky bucket scheme is a promising method that regulates input traffics for preventive congestion control. In the ATM network, the input traffics are bursty and transmitted at high-speed. In order to get the low loss probability for bursty input traffics, it is known that the leaky bucket scheme with static leaky rate requires larger data buffer and token pool size. This causes the increase of the mean waiting time for an input traffic to pass the policing function, which would be inappropriate for real time traffics such as voice and video. We present the leaky bucket scheme with dynamic leaky rate in which the token generation period changes according to buffer occupancy. In the leaky bucket scheme with dynamic leaky rate, the cell loss probability and the mean waiting time are reduced in comparison with the leaky bucket scheme with static leaky rate. We analyze the performance of the proposed leaky bucket scheme in discrete-time case by assuming arrival process to be Markov-modulated Bernoulli process (MMBP).

  • PDF

ON THE RELATIONSHIP BETWEEN SUBSTORM CURRENT SYSTEM AND BURSTY BULK FLOWS AT NEAR TAIL (서브스톰 전류계와 BBF 사이의 관계에 대하여)

  • LEE DAE-YOUNG;MIN KYOUNG WOOK
    • Publications of The Korean Astronomical Society
    • /
    • v.15 no.spc2
    • /
    • pp.53-56
    • /
    • 2000
  • We investigate the critical issue on how the BBF (bursty bulk flow) is related to the substorm current wedge formation. Observationally, after analysing data sets from Geotail spacecraft at near tail and many ground magnetic observatories for 9 months period of 1996, we find three BBF events that clearly occurred at the center of the wedge with region I type FAC (field-aligned current), and two other BBF events that were seen outside the wedge sector. Theoretically, we suggest that the substorm current wedge generation by BBF is most likely when the h' VB contribution is dominant in the well-known MHD $J_{II}$ expression (Vasyliunaus, 1984) or when the divergence of the cross-tail current carried by the particle's gradient/curvature drift is predominantly sufficient at the moment of the BBF arrival at near tail.

  • PDF

An implementation of the dynamic rate leaky bucket algorithm combined with a neural network based prediction (신경회로망 예측기법을 결합한 Dynamic Rate Leaky Bucket 알고리즘의 구현)

  • 이두헌;신요안;김영한
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.2
    • /
    • pp.259-267
    • /
    • 1997
  • The advent of B-ISDN using ATM(asynchronous transfer mode) made possible a variety of new multimedia services, however it also created a problem of congestion control due to bursty nature of various traffic sources. To tackle this problem, UPC/NPC(user parameter control/network parameter control) have been actively studied and DRLB(dynamic rate leaky bucket) algorithm, in which the token generation rate is changed according to states of data source andbuffer occupancy, is a good example of the UPC/NPC. However, the DRLB algorithm has drawbacks of low efficiency and difficult real-time implementation for bursty traffic sources because the determination of token generation rate in the algorithm is based on the present state of network. In this paper, we propose a more plastic and effective congestion control algorithm by combining the DRLB algorithm and neural network based prediction to remedy the drawbacks of the DRLB algorithm, and verify the efficacy of the proposed method by computer simulations.

  • PDF

Energy and Delay Efficient Slot Reservation Mechanism for Multihop Wireless Sensor Networks (멀티 홉 무선 센서 네트워크에서 에너지 소모와 전송 지연에 효율적인 슬롯 예약 메커니즘)

  • Park, Hyun Joo;Kim, Seong Cheol;Jeon, Jun Heon;Kim, Hye-Yun;Kim, Joong Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.102-105
    • /
    • 2014
  • 일반적으로 무선 센서네트워크에서 각 센서 노드들에서 생성된 데이터는 목적지 노드 즉, 싱크(sink) 노드로 전송되어진다. 본 논문에서는 이처럼 데이터 전송이 몰리게 되는 sink 노드 근처에서 노드들 사이에 전송된 데이터 패킷의 충돌을 줄임으로 에너지 효율과 지연의 성능을 향상시킬 수 있는 TDMA 기반의 MAC 프로토콜을 제안한다. 전송할 데이터를 가지는 노드들은 먼저 싱크 노드에게 자신이 전송할 데이터의 양을 포함하는 RTS 패킷을 전송한다. 이 RTS 패킷을 받은 싱크 노드는 각 노드들에게 전송할 수 있는 전송 스케줄을 노드들에게 보내고, 이 스케줄을 받은 각 노드들은 전송 스케줄에 맞추어 자신들에게 할당된 슬롯에 데이터 패킷을 전송함으로 충돌 없이 bursty데이터를 전송한다. 이 방법을 통하여 각 노드들은 동시에 멀티 슬롯을 할당 받아 여러 패킷을 전송할 수 있다. 따라서 버스티한 트래픽 전송에서 지연(Delay)을 줄이는 동시에 충돌을 없애 데이터 전송 효율을 높일 수 있다.

  • PDF

Throughput Performance Analysis of Transmission System with SR-ARQ Scheme in Burst Home Network Channel (버스트 홈 네트워크 채널에서 SR-ARQ 기법을 적용한 전송 시스템의 Throughput 성능 분석)

  • Roh, Jae-Sung;Chang, Tae-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.894-897
    • /
    • 2008
  • This paper analyzes the throughput performance of a selective repeat (SR)/automatic repeat request (ARQ) scheme to transmit packet data in burst home network channel. To combat the high degree of error caused by transmission of home network data a robust error control scheme is a necessity. Basically, error control schemes can be divided in two categories: ARQ schemes and forward error correction (FEC) schemes. ARQ schemes are often used for reliable data transmission. The performance of packet transmission using SR-ARQ schemes for bursty channels is analyzed and simple analytical expressions of its throughput are presented. Theoretic analysis and numerical results indicate that a small number of packet sizes can get good performance in bursty home network channel.

  • PDF