• Title/Summary/Keyword: End-to-end Delay

Search Result 762, Processing Time 0.028 seconds

A Study on Backup Route Setup Scheme in Ad Hoc Networks (애드혹 네트워크에서의 보조 경로 설정 기법에 관한 연구)

  • Jung Se-Won;Lee Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.8 s.350
    • /
    • pp.47-58
    • /
    • 2006
  • Due to the movement of nodes, ad-hoc networks suffer from the problems such as the decrease of data delivery ratio, the increase of end-to-end delay, and the increase of routing overhead. The backup routing schemes try to solve these problems by finding the backup routes during the route discovery phase and using them when a route fails. Generally the backup routing schemes outperform the single-path routing schemes in terms of data delivery ratio, end-to-end delay, and routing overhead when the nodes move rapidly. But when the nodes don't move rapidly, the backup routing schemes generate more routing traffics than the single-path routing schemes because they need to exchange packets to find the backup route. In addition, when the backup route fails earlier than the main route, it can not use the backup route because in many backup route algorithms, the backup route is found only at the initial route discovery phase. RBR(Reactive Backup Routing Algorithm) proposed in this paper is an algorithm that provides more stable data delivery than the previous backup routing schemes through the selective maintenance of backup route and the backup route rediscovery. To do that RBR prioritize the backup routes, and maintain and use them selectively Thus it can also decrease the routing overheads. Also, RBR can increase data delivery ratio and decrease delay because it reestablishes the backup route when the network topology changes. For the performance evaluation, OPNET simulator is used to compare RBR with the single-path routing scheme and some of the well known backup routing schemes.

Continuous Moving Object Tracking Using Query Relaying in Tree-Based Sensor Network (트리 기반의 센서 네트워크에서 질의 중계를 통한 이동 객체의 연속적인 위치 획득 방안)

  • Kim, Sangdae;Kim, Cheonyong;Cho, Hyunchong;Yim, Yongbin;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.271-280
    • /
    • 2014
  • In wireless sensor networks, there have been two methods for sensing continuously moving object tracking: user-query based method and periodic report based method. Although the former method requires overhead for user query rather than the latter method, the former one is known as an energy-efficient method without transferring unnecessary information. In the former method, a virtual tree, consisting of sensor nodes, is exploited for the user querying and sensor reporting. The tree stores the information about mobile objects; the stored information is triggered to report by the user query. However, in case of fast moving object, the tracking accuracy reduces due to the time delay of end-to-end repeated query. To solve the problem, we propose a query relaying method reducing the time delay for mobile object tracking. In the proposed method, the nodes in the tree relay the query to the adjacent node according to the movement of mobile object tracking. Relaying the query message reduces the end-to-end querying time delay. Simulation results show that our method is superior to the existing ones in terms of tracking accuracy.

A Crossover Node Discovery and Local Repair Mechanism for Reducing the Signaling Delay of Resource Reservation on HMIPv6 Networks (HMIPv6 네트워크에서 자원예약 시그널링 지연을 줄이기 위한 크로스오버 노드 발견 및 지역적 자원 갱신 방안)

  • Byun, Hae-Sun;Lee, Mee-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.1
    • /
    • pp.37-44
    • /
    • 2008
  • In order to minimize the signaling delay for a resource reservation on the new routing path after the handover of Mobile Node(MN) is completed, it is important to discover the crossover node where the old and new routing paths meet. With the 크로스오버 노드 being found, the signaling messages only need to be transferred on the changed part of the end-to-end path. The crossover node is generally discovered using the end-to-end Session ID(SID) of the established session between MN and Correspondent Node(CN). However, in the Hierarchical Mobile IPv6(HMIPv6) network, if the Mobile Anchor Point (MAP) reserves the resource by aggregate with the Home Agent(HA), the crossover node discovery cannot be performed in the general way since the aggregate SID that has established between the previous MAP and HA is different from the that of the current MAP and HA after MN's handover. In this paper, we propose a mechanism to discover the crossover node within the tunnel between the MAP and the HA in an HMIPv6 network, assuming that the Next Steps in Signaling(NSIS) is deployed for the resource reservation and the aggregate reservation is applied over the MAP and HA tunnel. The local repair required for the change of path is performed upon the crossover node discovery. The simulation results show that the proposed scheme reduces the signaling delay for the reservation and outperforms the existing scheme with respect to throughput during the handover.

An Intra-path Load Balancing Method based on both the Bottleneck State of Path and the Bandwidth Avaliability of Link (경로 병목상태와 링크 대역폭 가용도 기반 경로 부하 밸런싱 방법)

  • Kim, Tae-Joon
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.3
    • /
    • pp.409-418
    • /
    • 2009
  • Providing Quality-of-Service (QoS) guarantee requires for each router on the path of a traffic flow not to violate the flow's delay budget allocated to itself. Since the amount of load being offered to the router is determined by the budget, some imbalance in load among routers on the path may be alleviated by means of adjusting the budget. The equal allocation applied to the resource reservation protocol (RSVP) is simple to implement, but it has the drawback of a poor resource utilization. A load balancing method in which the delay budget being allocated to a router depends on its load state was developed to improve the drawback, but it's too complex to apply to the RSVP. This paper proposes an intra-path load balancing method not only applicable to the RSVP but also more effective in improving the drawback. The proposed method first partitions the end-to-end delay bound of a flow to routers by the RSVP and then let them adjust their budgets according to both the bottleneck state of the path and their links' bandwidth availabilities. The results of the simulation applying the proposed method to an evaluation network showed that the proposed method may provide the gain of 4 ${\sim}$ 17 % compared to that in the legacy one in terms of the number of maximally admittable flows.

  • PDF

Delay of Gratification in Infancy : Effects of Infants' Temperament and Parenting

  • Rha Jong-Hay
    • International Journal of Human Ecology
    • /
    • v.1 no.1
    • /
    • pp.59-77
    • /
    • 2000
  • The purpose of this study was to extend our understanding of the developmental antecedents of delay of gratification in infancy. The first goal was to examine direct effects of one feature of an infants’ temperament and of positive and negative parenting assumed at age one on children’s delay of gratification six months later. The second goal of the study was to test the interactive effect of early infant temperament and parenting on children’s delay of gratification. It was hypothesized that 1) less negative infants at 12 months would delay gratification longer six months later, 2) children of parents who provided more positive and sensitive feedback would delay gratification longer than children with parents who were more negative and less sensitive, and 3) there would be differential prediction of parenting for children who scored high and low in negative emotionality as infants. Toward this end, 81 infants were observed interacting at one year of age with their mothers and fathers during laboratory assessments to obtain measures of parenting and infant negative emotionality. At 18 months of age, the child’s capacity to delay touching attractive objects was measured. The main effects of infant negative emotionality and of mothering on children’s delay of gratification were not detected at standard levels of significance. Differential effects of parenting on children’s delay of gratification for infants with low or high negative emotionality, too, were not detected. However, the anticipated effect of fathering on delay of gratification was found in some analyses, indicating that the more positive fathering children received, the longer they could delay gratification in the laboratory six months later.

  • PDF

Simplified Reaction Scheme of Hydrocarbon Fuels and Its Application to Autoignition of Gasoline with Different Octane Numbers (탄화수소계 연료의 축소반응모델과 가솔린연료의 옥탄가 변화에 따른 자발화 지연시간)

  • 여진구
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.11 no.3
    • /
    • pp.13-19
    • /
    • 2003
  • Mathematically simplified reaction scheme that simulates autoignitions of the end gases in spark ignition engines has been studied computationally. The five equation model is described, to predict the essential features of hydrocarbon oxidation. This scheme has been calibrated against autoignition delay times measured in rapid compression machines. The rate constants, activation temperatures, Ta, Arrhenius preexponential constants, A, and heats of reaction for stoichiometric n-heptane/air, iso-octane/air, and their mixtures have all been optimised. The optimisation has been guided by Morley's correlation of the ratio of chain branching to linear termination rates with octane number. Comparisons between computed and experimental autoignition delay times have validated the Present simplified reaction scheme and the influences of octane number upon autoignition delay times have been computationally investigated. It has been found that both cool flame and high temperature direct reactions can have an effect on autoignition delay times.

Multihop Vehicle-to-Infrastructure Routing Based on the Prediction of Valid Vertices for Vehicular Ad Hoc Networks

  • Shrestha, Raj K.;Moh, Sangman;Chung, IlYong;Shin, Heewook
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.4
    • /
    • pp.243-253
    • /
    • 2010
  • Multihop data delivery in vehicular ad hoc networks (VANETs) suffers from the fact that vehicles are highly mobile and inter-vehicle links are frequently disconnected. In such networks, for efficient multihop routing of road safety information (e.g. road accident and emergency message) to the area of interest, reliable communication and fast delivery with minimum delay are mandatory. In this paper, we propose a multihop vehicle-to-infrastructure routing protocol named Vertex-Based Predictive Greedy Routing (VPGR), which predicts a sequence of valid vertices (or junctions) from a source vehicle to fixed infrastructure (or a roadside unit) in the area of interest and, then, forwards data to the fixed infrastructure through the sequence of vertices in urban environments. The well known predictive directional greedy routing mechanism is used for data forwarding phase in VPGR. The proposed VPGR leverages the geographic position, velocity, direction and acceleration of vehicles for both the calculation of a sequence of valid vertices and the predictive directional greedy routing. Simulation results show significant performance improvement compared to conventional routing protocols in terms of packet delivery ratio, end-to-end delay and routing overhead.

Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks

  • Farooq, Muhammad Umar;Wang, Xingfu;Sajjad, Moizza;Qaisar, Sara
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1330-1347
    • /
    • 2018
  • Mobile Ad hoc Network (MANET) is a collection of nodes or communication devices that wish to communicate without any fixed infrastructure and predetermined organization of available links. The effort has been made by proposing a scheme to overcome the critical security issue in MANET. The insufficiency of security considerations in the design of Ad hoc On-Demand Distance Vector protocol makes it vulnerable to the threats of collaborative black hole attacks, where hacker nodes attack the data packets and drop them instead of forwarding. To secure mobile ad hoc networks from collaborative black hole attacks, we implement our scheme and considered sensor's energy as a key feature with a better packet delivery ratio, less delay time and high throughput. The proposed scheme has offered an improved solution to diminish collaborative black hole attacks with high performance and benchmark results as compared to the existing schemes EDRIAODV and DRIAODV respectively. This paper has shown that throughput and packet delivery ratio increase while the end to end delay decreases as compared to existing schemes. It also reduces the overall energy consumption and network traffic by maintaining accuracy and high detection rate which is more safe and reliable for future work.

Reliable Message Routing Protocol for Periodic Messages on Wireless Sensor Networks (무선센서 네트워크에서 주기적 메시지에 대해 신뢰성 있는 메시지 전송을 위한 라우팅 프로토콜)

  • Ngo, Hoai Phong;Kim, Myung-Kyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.2
    • /
    • pp.190-197
    • /
    • 2011
  • In industrial distributed control systems, sensors collect data from the physical environment periodically and transmit them to the actuators, which process the control operations based on the received data. For the effective operation of the control systems, the data transmitted by the sensors has to be delivered to the actuators reliably within the deadline, and if the message reception rate of the actuators becomes lower than a threshold, then the performance of the control systems drops greatly. This paper suggests a message routing protocol to transmit periodic messages reliably in a distributed control system based on wireless sensor networks. For reliable message transmission, the proposed protocol selects a routing path whose end-to-end message reception rate is the highest before transmitting data messages. The proposed protocol has the capability of maintaining a target message reception rate for each flow. To maintain the required target reception rate, each destination monitors the actual message reception rate periodically and transmits a feedback message to the source if it drops below the target reception rate. On receiving the feedback message, the source tries to find a new path which can satisfy the target rate. The performance of the proposed protocol has been evaluated using simulation and compared with other protocols in terms of the message reception rate, the message delay and delay jitter, and so on. The simulation results show that the proposed protocol has a higher message reception rate and comparable message delay and delay jitter to other protocols. The simulation results also show that the proposed protocol has an ability to adapt well to the dynamic network traffic change.

Multicast Extension to Proxy Mobile IPv6 for Mobile Multicast Services

  • Kim, Dae-Hyeok;Lim, Wan-Seon;Suh, Young-Joo
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.316-323
    • /
    • 2011
  • Recently, Proxy Mobile IPv6 (PMIPv6) has received much attention as a mobility management protocol in next-generation all-IP mobile networks. While the current research related to PMIPv6 mainly focuses on providing efficient handovers for unicast-based applications, there has been relatively little interest in supporting multicast services with PMIPv6. To provide support for multicast services with PMIPv6, there are two alternative approaches called Mobile Access Gateway (MAG)-based subscription and Local Mobility Anchor (LMA)-based subscription. However, MAG-based subscription causes a large overhead for multicast joining and LMA-based subscription provides non-optimal multicast routing paths. The two approaches may also cause a high packet loss rate. In this paper, we propose an efficient PMIPv6-based multicast protocol that aims to provide an optimal delivery path for multicast data and to reduce handover delay and packet loss rate. Through simulation studies, we found that the proposed protocol outperforms existing multicast solutions for PMIPv6 in terms of end-to-end delay, service disruption period, and the number of lost packets during handovers.