• Title/Summary/Keyword: Information sender

Search Result 351, Processing Time 0.031 seconds

RGF: Receiver-based Greedy Forwarding for Energy Efficiency in Lossy Wireless Sensor Networks

  • Hur, In;Kim, Moon-Seong;Seo, Jae-Wan;Choo, Hyun-Seung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.529-546
    • /
    • 2010
  • Greedy forwarding is the key mechanism of geographic routing and is one of the protocols used most commonly in wireless sensor networks. Greedy forwarding uses 1-hop local information to forward packets to the destination and does not have to maintain the routing table, and thus it takes small overhead and has excellent scalability. However, the signal intensity reduces exponentially with the distance in realistic wireless sensor network, and greedy forwarding consumes a lot of energy, since it forwards the packets to the neighbor node closest to the destination. Previous proposed greedy forwarding protocols are the sender-based greedy forwarding that a sender selects a neighbor node to forward packets as the forwarding node and hence they cannot guarantee energy efficient forwarding in unpredictable wireless environment. In this paper, we propose the receiver-based greedy forwarding called RGF where one of the neighbor nodes that received the packet forwards it by itself. In RGF, sender selects several energy efficient nodes as candidate forwarding nodes and decides forwarding priority of them in order to prevent unnecessary transmissions. The simulation results show that RGF improves delivery rate up to maximum 66.8% and energy efficiency, 60.9% compared with existing sender-based greedy forwarding.

The Influences of Restaurant Consumers' Electronic Word-of-Mouth(E-WOM) Information Communication on Product Perception Risk, Benefit and WOM Effect

  • Heo, Yeong-Uk
    • The Journal of Economics, Marketing and Management
    • /
    • v.6 no.4
    • /
    • pp.51-64
    • /
    • 2018
  • Purpose - This study is intended to look into the influences of restaurant consumers' e-WOM information communication on product perception risk, benefit and WOM effect. Research design, data, and Methodology - To achieve this, a survey was empirically carried out to 426 restaurant consumers. Results - The findings are as follows. First, the influence of e-WOM on product perception risk showed that WOM information sender characteristics, WOM information recipient characteristics and online community had a statistically significant positive influence on product perception risk. Second, the influence of e-WOM on product risk benefit showed that WOM information sender characteristics, WOM information recipient characteristics and online communication had a statistically significant positive influence on product risk benefit. Third, WOM risk perception had a statistically significant positive influence on WOM acceptance. Fourth, WOM risk benefit had a statistically significant positive influence on WOM effect. Conclusions - As for the above-mentioned findings, the communication between e-WOM sender and recipient had a positive influence on the product evaluation and attitude change in the restaurant industry, and the WOM effect had an influence on the financial performance and non-financial performance. The communication attaches importance to a direct using and tasting experience due to the nature of restaurant industry when it is simultaneously performed as a positive mechanism between sender and recipient through each channel of these factors. But the e-WOM culture can lead to the WOM effect when both sender and recipient share the persuasive communicability in reality that diversifies communication methods, having a positive influence on the management performance.

The Effect of Online WOM of Menu Product Consumers on Product Perception Risk and WOM Effect

  • HEO, Yeong-Wook
    • Journal of Distribution Science
    • /
    • v.18 no.3
    • /
    • pp.77-85
    • /
    • 2020
  • Purpose: This study examined marketing value as online word-of-mouth media in the foodservice industry, and it did research on online word-of-mouth (e-WOM) communication marketing schemes using mass communication in the industry. The study is also intended to investigate the impact of electronic word-of-mouth (e-WOM) information and communication on product awareness risks, benefits, and word-of-mouth (WOM) impacts on restaurant consumers. Research design, data, and methodology: The analysis was conducted on a valid questionnaire of 425 menu product consumers. The survey was conducted for two months in March 2019. The collected data was analyzed using SPSS and hierarchical regression analysis was applied. Results: It did empirical research on the reciprocal casual relations to online and the existing word-of-mouth communication that have to be preceded to understand characteristics of online word-of-mouth communication for the purpose of this study. The result is summarized as follows. First, the online word-of-mouth (e-WOM) effect on product recognition risk shows the statistically significant effect of information sender characteristics, information recipient characteristics, and online word-of-mouth (e-WOM) communication on product recognition risk. Second, the influence of online word-of-mouth (e-WOM) on product risk benefits shows that the information sender characteristics, the information receiver characteristics, and online communications have a statistically significant effect on product risk benefits. Third, online word of mouth risk recognition had a statistically significant effect on word of mouth acceptance. Fourth, online risk benefit had a statistically significant positive effect on word of mouth (WOM) effect. Conclusions: The communication between online word of mouth (e-WOM) sender and recipient had a positive influence on the product evaluation and attitude change in the foodservice industry, and the word-of-mouth (WOM) effect affected financial and non-financial performance. The results mentioned above indicated that the communication between the sender of the information and the receiver of the information had a positive effect on the product evaluation and attitude change of the menu consumer, and the word-of-mouth (WOM) result affected the financial. Therefore, the online word-of-mouth (e-WOM) effect has a positive effect on the word-of-mouth (WOM) effect of menu products when performed simultaneously and positively between the information sender and the information receiver.

EEPB-MAC: Energy Efficient & Priority-Based MAC Protocol for Energy Harvesting Wireless Sensor Networks (에너지 수확 무선 센서 네트워크에서 에너지 효율 및 우선순위 기반의 MAC 프로토콜)

  • Kim, Seong-Cheol;Jeon, Jun-Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.755-761
    • /
    • 2013
  • Medium access control (MAC) protocols for wireless sensor networks make sensor nodes on state for energy-efficiency only when necessary. In this paper we present an energy efficient priority-based MAC protocol for energy-harvesting Wireless Sensor Networks (WSNs). For support priority-based packet transmission the proposed EEPB-MAC protocol uses the modified IEEE 802.15.4 beacon frames including priority bit, sender node address, and NAV value fields. A receiver node periodically wakes up, receives sender beacon frames, selects data sending sender, and broadcasts a beacon frame containing the selected sender's address. A receiver node selects sender node according to sender's data priority. A receiver nodes also adjust wake up period based on their energy states. Hence, the energy consumption of receiver node can be minimized. Through simulations and analytical analysis, we evaluate the performance of our proposed the EEPB-MAC protocol and compare it against the previous MACs. Results have shown that our protocol outperforms other MAC in terms of energy consumption, higher priority packet delivery delay.

A Genetic-based Methodology for Adjustable Load Redistribution (적응성 있는 부하 재분배를 위한 유전적 방법론)

  • Lee, Seong-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.691-693
    • /
    • 2005
  • In a sender-initiated load balancing algorithm, a sender continues to send unnecessary request messages for load transfer until a receiver is found while the system load is heavy. Therefore, it yields many problems such as low cpu utilization and system throughput because of inefficient inter-processor communications until the sender receives an accept message from the receiver in this environment. This paper presents an approach based on evolutionary algorithm. The processors to which the requests are sent off are determined by the proposed algorithm to decrease unnecessary request messages.

  • PDF

An Implimentation of the uniersal signalling equipment using DSP in Digital Switching System (DSP를 이용한 전전자식 교환기용 universal 신호장치의 개발)

  • 장말숙;김수홍;성승희;김근배;하영상;박찬옹
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1987.04a
    • /
    • pp.86-92
    • /
    • 1987
  • We implement an universal signaling equipment including many kinds of singling devices just as R2 MFC seder.receiver DTMF sender/receiver Tone sender sued in Digital Switching System the universal signaling equipment has two parts sender part and receiver part. The sender part is implemnted with ROM-LOOK-UP Table method and the receiver part is implemnted that the equipment satisfies the Recomandations of CCITT. Also the capability of the equipment is evaluated by the LCS(Local Call Simulatior)Test in the TDX-1A system.

  • PDF

Receiver-driven Cooperation-based Concurrent Multipath Transfer over Heterogeneous Wireless Networks

  • Cao, Yuanlong;Liu, Qinghua;Zuo, Yi;Huang, Minghe
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2354-2370
    • /
    • 2015
  • The advantages of employing SCTP-based Concurrent Multipath Transfer (CMT) have been demonstrated to be very useful for data delivery over multi-homed wireless networks. However, there is still significant ongoing work addressing some remaining limitations and challenges. The most important concern when applying CMT to data delivery is related to handling packet reordering and buffer blocking. Another concern on this topic is that current sender-based CMT solutions seldom consider balancing the overhead and sharing the load between the sender and receiver. This paper proposes a novel Receiver-driven Cooperation-based Concurrent Multipath Transfer solution (CMT-Rev) with the following aims: (i) to balance overhead and share load between the sender and receiver, by moving some functions including congestion and flow control from the sender onto receiver; (ii) to mitigate the data reordering and buffer blocking problems, by using an adaptive receiver-cooperative path aggregation model, (iii) to adaptively transmit packets over multiple paths according to their receiver-inspired sending rate values, by employing a new receiver-aware data distribution scheduler. Simulation results show that CMT-Rev outperforms the existing CMT solutions in terms of data delivery performance.

A Transmission Service Method for Processing Visual Recognition of Sender Information (발신자 정보에 대한 시각적 인식 처리를 위한 전송 서비스 기법)

  • 김기현
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.4
    • /
    • pp.328-336
    • /
    • 2004
  • Recently a mobile service is changing into a system environment that offers the customer various contents service. Representative example of service is a Calling Identity Del ivory Service(CID). Such service has the problem in the case which the receiver cannot remember the phone number of the sender; it has a difficult problem that cannot easily confirm whose the phone number it is. Therefore, it is desirable to design and implement visual services that can enhance the recognition of users. In this paper, we propose the architecture that is similar to a Calling Identity Delivery Service. We propose the architecture for communication service and system that is able to visually display the information of the sender using 2D image data in mobile environment. After that we set the image information to represent the user and this method is able to visually display the information of the sender by transmitting an image data through channels from switch station or base station using the server. When the receiver receives a phone call from the sender, this method provides an efficient service by transmitting visual data with bell sound. That is, the image information of sender is appeared on liquid crystal display(LCD) of the receiver at the same time. We investigate the concepts for processing real-time transmission of image data and describe an example of the implementation result that is based on system. This technology has a potential influence on the marketing and presents an efficiency of this method.

Configuration of ACK Trees for Multicast Transport Protocols

  • Koh, Seok-Joo;Kim, Eun-Sook;Park, Ju-Young;Kang, Shin-Gak;Park, Ki-Shik;Park, Chee-Hang
    • ETRI Journal
    • /
    • v.23 no.3
    • /
    • pp.111-120
    • /
    • 2001
  • For scalable multicast transport, one of the promising approaches is to employ a control tree known as acknowledgement (ACK) tree which can be used to convey information on reliability and session status from receivers to a root sender. The existing tree configuration has focused on a 'bottom-up' scheme in which ACK trees grow from leaf receivers toward a root sender. This paper proposes an alternative 'top-down' configuration where an ACK tree begins at the root sender and gradually expands by including non-tree nodes into the tree in a stepwise manner. The proposed scheme is simple and practical to implement along with multicast transport protocols. It is also employed as a tree configuration in the Enhanced Communications Transport Protocol, which has been standardized in the ITU-T and ISO/IEC JTC1. From experimental simulations, we see that the top-down scheme provides advantages over the existing bottom-up one in terms of the number of control messages required for tree configuration and the number of tree levels.

  • PDF

A Scalable Recovery Tree Construction Scheme Considering Spatial Locality of Packet Loss

  • Baek, Jin-Suk;Paris, Jehan-Francois
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.2
    • /
    • pp.82-102
    • /
    • 2008
  • Packet losses tend to occur during short error bursts separated by long periods of relatively error-free transmission. There is also a significant spatial correlation in loss among the receiver nodes in a multicast session. To recover packet transmission errors at the transport layer, tree-based protocols construct a logical tree for error recovery before data transmission is started. The current tree construction scheme does not scale well because it overloads the sender node. We propose a scalable recovery tree construction scheme considering these properties. Unlike the existing tree construction schemes, our scheme distributes some tasks normally handled by the sender node to specific nodes acting as repair node distributors. It also allows receiver nodes to adaptively re-select their repair node when they experience unacceptable error recovery delay. Simulation results show that our scheme constructs the logical tree with reduced message and time overhead. Our analysis also indicates that it provides fast error recovery, since it can reduce the number of additional retransmissions from its upstream repair nodes or sender node.