• Title/Summary/Keyword: Link Redundancy

Search Result 50, Processing Time 0.024 seconds

Synchronous Distributed Load Balancing Algorithm Employing SBIBD (SBIBD를 이용한 분산시스템의 부하 균형 알고리즘)

  • 김성열
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.386-393
    • /
    • 2004
  • In order to maintain load balancing in distributed systems in a decentralized manner, every node should obtain workload information from all the nodes on the network. It requires $Ο({v^2})$ traffic overheads, where v is the number of nodes. This paper presents a new synchronous dynamic distributed load balancing algorithm for a ( v,k+1,1)-configured network topology, which is a kind of 2k regular graph, based on symmetric balanced incomplete block design, where v equals ${k^2}+k+1$. Our algorithm needs only Ο(v√v) message overheads and each node receives workload information from all the nodes without redundancy. And load balancing in this algorithm is maintained so that every link has same amount of traffic by √v for transferring workload information.

A Study on the Inverse kinematic Analysis of a Binary Robot Manipulator using Backbone Curve (등뼈 곡선을 이용한 2진 로봇 머니퓰레이터의 역기구학적 해석)

  • Ryu, Gil-Ha;Lee, Ihn-Seok
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.16 no.3 s.96
    • /
    • pp.174-179
    • /
    • 1999
  • A binary parallel robot manipulator uses actuators which have only two stable states and is structure is variable geometry truss. As a result, it has a finite number of states and fault tolerant mechanism because of kinematic redundancy. This kind of robot manipulator has the following advantages compared to a traditional one. Feedback control is not required, task repeatability can be very high, and finite state actuators are generally inexpensive. Because the number of states of a binary robot manipulator grows exponentially with the number of actuators, it is very difficult to solve an inverse kinematic problem. The goal of this paper is to develop an efficient algorithm to solve an inverse kinematic problem when the number of actuators are too much or the target position is located outside of workspace. The backbone curve is generated optimally by considering the curvature of the robot manipulator configuration and length of link. Then, the robot manipulator is fitted along the backbone curve with some criteria.

  • PDF

A Study on eTextbook Development for Mobile Learning in a University (대학에서의 모바일 러닝을 위한 전자교재 개발 사례 연구)

  • Jung, Hyojung;Chon, Eunhwa;Suh, Eung-Kyo
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.237-256
    • /
    • 2015
  • The purpose of this study is to develop the eTextbook and to explore the usability of the eTextbook for accelerating mobile learning in university. This study was primarily based on needs analysis of students, and eTextbook was created based on digital publishing through Adobe DPS. The major design principles of the eTextbook based on previous studies were as follow. First, eTextbook should deliver learning contents in a simple and systematic way. Second, eTextbook should induce student's flows by providing segmented learning contents and various learning resources. Third, eTextbook should expand information accessibility by providing a wide variety of multimedia functions. The development principles of eTextbook have been developed based on cognitive psychology. Location and function of the link or icon used for eTextbook have been developed on the basis of the principles of cognitive psychology. The main development principles were Coherence, Signaling, Redundancy, Segmentation, Multimedia principle, and so on. In order to examine usability of the developed eTextbook, experts' and learners' reactions were evaluated. The primary responses of learners are that the eTextbook increased the learning accessibility and provided various multimedia factors, and thus increased the learning flows in the class.

A Sensing Radius Intersection Based Coverage Hole Recovery Method in Wireless Sensor Network (센서 네트워크에서 센싱 반경 교차점 기반 홀 복구 기법)

  • Wu, Mary
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.3
    • /
    • pp.431-439
    • /
    • 2021
  • Since the sensor nodes are randomly arranged in the region of interest, it may happen that the sensor network area is separated or there is no sensor node in some area. In addition, after the sensor nodes are deployed in the sensor network, a coverage hole may occur due to the exhaustion of energy or physical destruction of the sensor nodes. The coverage hole can greatly affect the overall performance of the sensor network, such as reducing the data reliability of the sensor network, changing the network topology, disconnecting the data link, and worsening the transmission load. Therefore, sensor network coverage hole recovery has been studied. Existing coverage hole recovery studies present very complex geometric methods and procedures in the two-step process of finding a coverage hole and recovering a coverage hole. This study proposes a method for discovering and recovering a coverage hole in a sensor network, discovering that the sensor node is a boundary node by itself, and determining the location of a mobile node to be added. The proposed method is expected to have better efficiency in terms of complexity and message transmission compared to previous methods.

Reliable Data Transmission Based on Erasure-resilient Code in Wireless Sensor Networks

  • Lei, Jian-Jun;Kwon, Gu-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.1
    • /
    • pp.62-77
    • /
    • 2010
  • Emerging applications with high data rates will need to transport bulk data reliably in wireless sensor networks. ARQ (Automatic Repeat request) or Forward Error Correction (FEC) code schemes can be used to provide reliable transmission in a sensor network. However, the naive ARQ approach drops the whole frame, even though there is a bit error in the frame and the FEC at the bit level scheme may require a highly complex method to adjust the amount of FEC redundancy. We propose a bulk data transmission scheme based on erasure-resilient code in this paper to overcome these inefficiencies. The sender fragments bulk data into many small blocks, encodes the blocks with LT codes and packages several such blocks into a frame. The receiver only drops the corrupted blocks (compared to the entire frame) and the original data can be reconstructed if sufficient error-free blocks are received. An incidental benefit is that the frame error rate (FER) becomes irrelevant to frame size (error recovery). A frame can therefore be sufficiently large to provide high utilization of the wireless channel bandwidth without sacrificing the effectiveness of error recovery. The scheme has been implemented as a new data link layer in TinyOS, and evaluated through experiments in a testbed of Zigbex motes. Results show single hop transmission throughput can be improved by at least 20% under typical wireless channel conditions. It also reduces the transmission time of a reasonable range of size files by more than 30%, compared to a frame ARQ scheme. The total number of bytes sent by all nodes in the multi-hop communication is reduced by more than 60% compared to the frame ARQ scheme.

Design of a convolutional encoder and viterbi cecoder ASIC for continuous and burst mode communications (연속 및 버스트모드 통신을 위한 길쌈부호기와 비터비복호기 ASIC 설계)

  • 장대익;김대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.4
    • /
    • pp.984-995
    • /
    • 1996
  • Data errors according to the various noises caused in the satellite communication links are corrected by the Viterbi decoding algorithm which has extreme error correcting capability. In this paper, we designed and implemented a convolutional encoder and Viterbi decoder ASIC which is used to encode the input data at the transmit side and correct the errors of the received data at the receive side for use in the VSAT communication system. And this chip may be used in any BPSK, QPSK, or OQPSK transmission system. The ambiguity resolver corrects PSK modem ambiguities by delaying, interting, and/or exchanging code symbol to restore their original sequence and polarity. In case of previous decoding system, ambiguity state(AS) of data is resolved by external control logic and extra redundancy data are needed to resolve AS. But, by adopting decoder proposed in this paper, As of data is resolved automatically by internal logic of decoder in case of continuous mode, and by external As line withoug extra redudancy data in burst mode case. So, decoding parts are simple in continuous mode and transmission efficiency is increased in bust mode. The features of this chip are full duplex operation with independent transmit and receive control and clocks, start/stop inputs for use in burst mode systems, loopback function to verify encoder and decoder, and internal or external control to resolve ambinguity state. For verification of the function and performance of a fabricated ASIC chip, we equiped this chip in the Central and Remote Earth Station of VSAT system, and did the performance test using the commerical INTELSAT VII under the real satellite link environmens. The results of test were demonstrated the superiority of performance.

  • PDF

A Design of the Radio Protocol for Digital Communications in HF band (HF대 디지털통신을 위한 무선프로토콜 설계)

  • Kim, Tae-Hyun;Choi, Jo-Cheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.153-158
    • /
    • 2007
  • The INMARSAT is able to long range maritime communications that can not use for expensive charge in non-SOLAS ship. Therefore, international discussion for the question that replacements use of MF/HF band for maritime distress and safety communications in maritime. HF data communications system may be effectively utilized for SOLAS ships as well as for the existing non-SOLAS vessels including the fishing boats, which navigate A2 and A3 sea areas. The HF data communications may have various functions such as e-mail services, broadcasting services of up-to-date information related to marine safety, position reporting services, polling services etc. However, the present HF e-mail communications protocols have a problem of increasing calling redundancy as the number of channels in operation increases. This paper new protocol and communication sequence proposed in this submission establishes a proper radio link automatically and adaptively by taking channel traffic into account.

  • PDF

Tier-based Proactive Path Selection Mode for Wireless Mesh Networks

  • Fu-Quan, Zhang;Joe, In-Whee;Park, Yong-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1303-1315
    • /
    • 2012
  • In the draft of the IEEE 802.11s standard, a tree topology is established by the proactive tree-building mode of the Hybrid Wireless Mesh Protocol (HWMP). It is used for cases in which the root station (e.g., gateway) is an end point of the majority of the data connections. In the tree topology, the root or central stations (e.g., parent stations) are connected to the other stations (e.g., leaves) that are one level lower than the central station. Such mesh stations are likely to suffer heavily from contention in bottleneck links when the network has a high traffic load. Moreover, the dependence of the network on such stations is a point of vulnerability. A failure of the central station (e.g., a crash or simply going into sleep mode to save energy) can cripple the whole network in the tree topology. This causes performance degradation for end-to-end transmissions. In a connected mesh topology where the stations having two or more radio links between them are connected in such a way that if a failure subsists in any of the links, the other link could provide the redundancy to the network. We propose a scheme to utilize this characteristic by organizing the network into concentric tiers around the root mesh station. The tier structure facilitates path recovery and congestion control. The resulting mode is referred to as Tier-based Proactive Path Selection Mode (TPPSM). The performance of TPPSM is compared with the proactive tree mode of HWMP. Simulation results show that TPPSM has better performance.

Avionics Architecture Design for Military Unmanned Aerial Vehicles (군용 무인기의 항공전자 아키텍처 설계)

  • Jae Ick, Shim;Jae Won, Choi;Yong Tae, Kim;Dong Wan, Yoo;Kook Bo, Yang;Hyun Seok, Ha;Sang Jin, Kim;Seung Yul, Lee;Sang Jun, Jung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.6
    • /
    • pp.628-636
    • /
    • 2022
  • This paper describes the design of the avionics architecture for military unmanned aerial vehicles considering the airworthiness requirements for the first time. This design considers the redundancy in the system data bus and the power system and the data link system to meet the system safety requirements of the airworthiness requirements of military UAVs. This avionics architecture design has been verified through the system integration test and the flight test after manufacturing the UAV.

Study on Implementation Measures of Provincial Self-governing Police System : Focusing on the Implication from Enlargement of Work Scope of Self-governing Police of Jeju Province (광역자치경찰제의 정착방안에 관한 연구 - 제주자치경찰의 사무확대에 대한 시사점을 중심으로 -)

  • Kim, Seong-Hee
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.37-69
    • /
    • 2019
  • According to viewpoints of researchers and stakeholders, various opinions can be suggested on self-governing police system. Therefore, success of Korean self-governing police system will be defending on how to balance among conflicting values such as Empowerment, Political neutrality, Financial issues, Comprehensive competence in maintaining public safety. Before the launching of self-governing police system nation-wide, the experience of Jeju provincial police will be valuable model case. In specific, enlargement of work scope of self-governing police in Jeju province which has been introduced since last year will be a useful reference. There is more pessimism about self-governing police of Jeju province so far. However, this perspective is mostly based on the issue regarding hardwares such as manpower, equipment, law and organization. Issues regarding softwares such as organizational culture, operation system and work process need more attention to evaluate self-governing police system properly. To mark the first year after enlargement of work scope of Jeju police, this study demonstrate the overall result and implications of self-governing police of Jeju province based on documents, statistics, reports and media reports. In result, several preconditions are needed to implement the self-governing police system nation-wide successfully. 1. Strengthen the link between local government and local police 2. Establish the foundation for collaboration of state and local police 3. Enhance the aspect of citizen autonomy in local level 4. Reinforcing the capability of handling situation of state and local police 5. Invigorating the inter-organizational working group to operate self-governing police system effectively. The self-governing police system is unclosed topic to discuss. After this study, in-depth studies should be followed with more resources. Particularly, additional perspective including redundancy and equity need to be considered regarding self-governing police. By getting with the changes of macroscopic trends - lowbirth and aging, the fourth industrial revolution and possible reunification of north and south Koreas - these studies should suggest the long-term blueprint of self-governing police system of Korea.