• Title/Summary/Keyword: G-Node

Search Result 408, Processing Time 0.02 seconds

A Study on the G-Node and Disconnected Edges to Improve the Global and Local Locating Heuristic for GOSST Problem (GOSST 문제에 대한 전역적 배치와 지역적 배치 휴리스틱의 개선을 위한 G-Node와 단절에 관한 연구)

  • Kim, In-Bum;Kim, Chae-Kak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9B
    • /
    • pp.569-576
    • /
    • 2007
  • This paper is on the enhancement of our heuristics for GOSST problem that could apply to the design of communication networks offering graduated services. This problem hewn as one of NP-Hard problems finds a network topology meeting the G-Condition with minimum construction cost. In our prior research, we proposed two heuristics. We suggest methods of selecting G-Node and disconnections for Global or Local locating heuristic in this research. The ameliorated Local locating heuristic retrenches 17% more network construction cost saving ratio and the reformed Global locating heuristic does 14% more than our primitives.

Design of a set of One-to-Many Node-Disjoint and Nearly Shortest Paths on Recursive Circulant Networks

  • Chung, Ilyong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.7
    • /
    • pp.897-904
    • /
    • 2013
  • The recursive circulant network G(N,d) can be widely used in the design and implementation of parallel processing architectures. It consists of N identical nodes, each node is connected through bidirectional, point-to-point communication channels to different neighbors by jumping $d^i$, where $0{\leq}i{\leq}{\lceil}{\log}_dN{\rceil}$ - 1. In this paper, we investigate the routing of a message on $G(2^m,4)$, a special kind of RCN, that is key to the performance of this network. On $G(2^m,4)$ we would like to transmit k packets from a source node to k destination nodes simultaneously along paths on this network, the $i^{th}$ packet will be transmitted along the $i^{th}$ path, where $1{\leq}k{\leq}m-1$, $0{{\leq}}i{{\leq}}m-1$. In order for all packets to arrive at a destination node quickly and securely, we present an $O(m^4)$ routing algorithm on $G(2^m,4)$ for generating a set of one-to-many node-disjoint and nearly shortest paths, where each path is either shortest or nearly shortest and the total length of these paths is nearly minimum since the path is mainly determined by employing the Hungarian method.

Sensor Network Routing using Data Aggregation (데이터 병합을 이용한 센서 네트워크 라우팅)

  • Kim, Young-Kyun
    • Journal of the Korea Computer Industry Society
    • /
    • v.8 no.4
    • /
    • pp.237-244
    • /
    • 2007
  • In this paper we investigate the benefits of a data aggregation to prolong the lifetime of wireless sensor networks. To reduce the overload of messages from source node to sink node, data aggregation technique is generally used at intermediate node in path. The DD-G(Directed Diffusion-Greedy) can diminish the consumption of node energy by establishing energy effective single path from source to destination. In this case, the nodes near sink node have some problems, i) overly concentration of energy consumption, ii) increase of message delay time. To solve these problems, we propose a new data aggregation method which consider distribution of network overload, especially at the nodes close to sink node. The result shows that it can save energy and network delay time.

  • PDF

An Efficient Context-aware Opportunistic Routing Protocol (효율적인 상황 인지 기회적 라우팅 프로토콜)

  • Seo, Dong Yeong;Chung, Yun Won
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2218-2224
    • /
    • 2016
  • Opportunistic routing is designed for an environment where there is no stable end-to-end routing path between source node and destination node, and messages are forwarded via intermittent contacts between nodes and routed using a store-carry-forward mechanism. In this paper, we consider PRoPHET(Probabilistic Routing Protocol using History of Encounters and Transitivity) protocol as a base opportunistic routing protocol and propose an efficient context-aware opportunistic routing protocol by using the context information of delivery predictability and node type, e.g., pedestrian, car, and tram. In the proposed protocol, the node types of sending node and receiving node are checked. Then, if either sending node or receiving node is tram, messages are forwarded by comparing the delivery predictability of receiving node with predefined delivery predictability thresholds depending on the combination of sending node and receiving node types. Otherwise, messages are forwarded if the delivery predictability of receiving node is higher than that of sending node, as defined in PRoPHET protocol. Finally, we analyze the performance of the proposed protocol from the aspect of delivery ratio, overhead ratio, and delivery latency. Simulation results show that the proposed protocol has better delivery ratio, overhead ratio, and delivery latency than PRoPHET protocol in most of the considered simulation environments.

Incompatible 3-node interpolation for gradient-dependent plasticity

  • Chen, G.;Baker, G.
    • Structural Engineering and Mechanics
    • /
    • v.17 no.1
    • /
    • pp.87-97
    • /
    • 2004
  • In gradient-dependent plasticity theory, the yield strength depends on the Laplacian of an equivalent plastic strain measure (hardening parameter), and the consistency condition results in a differential equation with respect to the plastic multiplier. The plastic multiplier is then discretized in addition to the usual discretization of the displacements, and the consistency condition is solved simultaneously with the equilibrium equations. The disadvantage is that the plastic multiplier requires a Hermitian interpolation that has four degrees of freedom at each node. Instead of using a Hermitian interpolation, in this article, a 3-node incompatible (trigonometric) interpolation is proposed for the plastic multiplier. This incompatible interpolation uses only the function values of each node, but it is continuous across element boundaries and its second-order derivatives exist within the elements. It greatly reduces the degrees of freedom for a problem, and is shown through a numerical example on localization to yield good results.

Self-Sustaining System Using Piezoelectric Power Generator for WBAN/USN Applications (압전 발전기를 이용한 WBAN/USN용 자기유지 시스템 구현)

  • Roh, Hyoung-Hwan;Park, Jun-Seok;Kim, Hyeong-Seok
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.1
    • /
    • pp.40-46
    • /
    • 2009
  • This paper presents a self-sustaining system, and an effective method in enhancing overall energy efficiency. The proposed system consists of the two major nodes: a slave node, which contains the environment information (e.g., temperature, humidity, etc.); and a master node, which communicates with the slave nodes, and transmit the slave node's information to users. All slave nodes are under control of the master node. Each slave node uses two power sources: the piezoelectric power generator (PPG); and the continuous wave from the master node. The paper highlights the basic operational principle, each node's specifications, and experimental data for performance verification. The two nodes successfully communicate each other in a range of 3.3m (maximal range), where the user's computer is wired the master node.

  • PDF

GROUP SECRET KEY GENERATION FOR 5G Networks

  • Allam, Ali M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4041-4059
    • /
    • 2019
  • Key establishment method based on channel reciprocity for time division duplex (TDD) system has earned a vital consideration in the majority of recent research. While most of the cellular systems rely on frequency division duplex (FDD) systems, especially the 5G network, which is not characterized by the channel reciprocity feature. This paper realizes the generation of a group secret key for multi-terminals communicated through a wireless network in FDD mode, by utilizing the nature of the physical layer for the wireless links between them. I consider a new group key generation approach, which using bitwise XOR with a modified pairwise secret key generation approach not based on the channel reciprocity feature. Precisely, this multi-node secret key agreement technique designed for three wireless network topologies: 1) the triangle topology, 2) the multi-terminal star topology, and 3) the multi-node chain topology. Three multi-node secret key agreement protocols suggest for these wireless communication topologies in FDD mode, respectively. I determine the upper bound for the generation rate of the secret key shared among multi-node, for the three multi-terminals topologies, and give numerical cases to expose the achievement of my offered technique.

mSCTP for Vertical Handover between 3G and WiBro (3G-WiBro 망간 수직핸드오버를 위한 mSCTP 기법)

  • Kim, Dong-Phil;Koh, Seok-Joo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.355-366
    • /
    • 2008
  • This paper proposes a mobile SCTP (mSCTP) handover scheme for vertical handover between 3G wireless and WiBro networks. To evaluate the proposed mSCTP vertical handover scheme, we implement the mSCTP handover supporting system over Linux platform in which the movement of a mobile node is automatically detected and the mSCTP vertical handover is performed by the mobile node. We analyze and compare the performance of mSCTP handover and Mobile IP handover over the preconfigured testbed. From the numerical results, we can see that the handover latency of mSCTP could be much more reduced, compared to the Mobile IP handover, if the mobile node would sojourn long enough in the overlapping region between the two heterogeneous networks.

Performance Analysis of Multiplexing Gain over Timer_CU in AAL2 on UMTS Network (UMTS망의 AAL2에서 Timer_CU에 따른 다중화 이득 성능분석)

  • 이현진;김재현
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.8
    • /
    • pp.35-43
    • /
    • 2004
  • An AAL2 transmission scheme is used to deliver voice and data traffic between Node-B and RNC on 3G WCDMA network. To predict performance of AAL2 multiplexing precisely, we derived analytically bandwidth gain and cell packing density using discrete-time Markov chain model for voice service and validated these results with simulation. We also performed detailed simulation for AAL2 multiplexing in a concentrator. Based on the analytical result, we propose the engineering guideline to select the optimal Timer_CU in a Node-B. We found that there is no major benefit of additional AAL2 multiplexing in a concentrator and the benefit of AAL2 switching in tub for data services is much less than that for voice service.

An Efficient Software Defined Data Transmission Scheme based on Mobile Edge Computing for the Massive IoT Environment

  • Kim, EunGyeong;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.974-987
    • /
    • 2018
  • This paper presents a novel and efficient data transmission scheme based on mobile edge computing for the massive IoT environments which should support various type of services and devices. Based on an accurate and precise synchronization process, it maximizes data transmission throughput, and consistently maintains a flow's latency. To this end, the proposed efficient software defined data transmission scheme (ESD-DTS) configures and utilizes synchronization zones in accordance with the 4 usage cases, which are end node-to-end node (EN-EN), end node-to-cloud network (EN-CN), end node-to-Internet node (EN-IN), and edge node-to-core node (EdN-CN); and it transmit the data by the required service attributes, which are divided into 3 groups (low-end group, medium-end group, and high-end group). In addition, the ESD-DTS provides a specific data transmission method, which is operated by a buffer threshold value, for the low-end group, and it effectively accommodates massive IT devices. By doing this, the proposed scheme not only supports a high, medium, and low quality of service, but also is complied with various 5G usage scenarios. The essential difference between the previous and the proposed scheme is that the existing schemes are used to handle each packet only to provide high quality and bandwidth, whereas the proposed scheme introduces synchronization zones for various type of services to manage the efficiency of each service flow. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of throughput, control message overhead, and latency. Therefore, the proposed ESD-DTS is very suitable for upcoming 5G networks in a variety of massive IoT environments with supporting mobile edge computing (MEC).