• Title/Summary/Keyword: Mobile Message

Search Result 731, Processing Time 0.027 seconds

Proposed Message Transit Buffer Management Model for Nodes in Vehicular Delay-Tolerant Network

  • Gballou Yao, Theophile;Kimou Kouadio, Prosper;Tiecoura, Yves;Toure Kidjegbo, Augustin
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.153-163
    • /
    • 2023
  • This study is situated in the context of intelligent transport systems, where in-vehicle devices assist drivers to avoid accidents and therefore improve road safety. The vehicles present in a given area form an ad' hoc network of vehicles called vehicular ad' hoc network. In this type of network, the nodes are mobile vehicles and the messages exchanged are messages to warn about obstacles that may hinder the correct driving. Node mobilities make it impossible for inter-node communication to be end-to-end. Recognizing this characteristic has led to delay-tolerant vehicular networks. Embedded devices have small buffers (memory) to hold messages that a node needs to transmit when no other node is within its visibility range for transmission. The performance of a vehicular delay-tolerant network is closely tied to the successful management of the nodes' transit buffer. In this paper, we propose a message transit buffer management model for nodes in vehicular delay tolerant networks. This model consists in setting up, on the one hand, a policy of dropping messages from the buffer when the buffer is full and must receive a new message. This drop policy is based on the concept of intermediate node to destination, queues and priority class of service. It is also based on the properties of the message (size, weight, number of hops, number of replications, remaining time-to-live, etc.). On the other hand, the model defines the policy for selecting the message to be transmitted. The proposed model was evaluated with the ONE opportunistic network simulator based on a 4000m x 4000m area of downtown Bouaké in Côte d'Ivoire. The map data were imported using the Open Street Map tool. The results obtained show that our model improves the delivery ratio of security alert messages, reduces their delivery delay and network overload compared to the existing model. This improvement in communication within a network of vehicles can contribute to the improvement of road safety.

REMOTE MONITORING OF WIND-PHOTOVOLTAIC HYBRID GENERATION SYSTEM USING MOBILE PHONE AND INTERNET (휴대폰과 인터넷을 이용한 풍력-태양광 복합발전 시스템의 원격 모니터링)

  • Xu, Zhenchao;Moon, Chae-Joo;Chang, Young-Hak;Lim, Jung-Min;Kim, Tae-Gon
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.89-91
    • /
    • 2007
  • In this paper, a remote monitoring system of wind-photovoltaic hybrid generation system using mobile phone and internet has been developed. Many kinds of data can be acquired, analyzed and saved automatically by this system. The hybrid system is composed of 1[kW] PV with DC/DC converter, battery banks and 5[kW] wind power system with power inductor and AC/DC converter. In addition, wind monitoring sensors, voltage and current meters, current transformers and potential transformers are used as accessory instruments. All of these signals are fed into DAQ (Data Acquisition) board after converting the data which have been processed by many types of converters, dividing circuits and signal conditioning circuits. These data can not only be displayed on a computer, transmitted using the server program to remote computer and saved on a computer as a file day by day but also be sent as a CDMA message. The monitored-data can be downloaded, analyzed and saved from server program in real-time via mobile phone or internet at a remote place. All of the programs were designed with LabVIEW software.

  • PDF

A Study of Load Tolerance Node using Load-balance in Mobile Ad hoc Networks (모바일 애드 혹 네트워크에서 로드 밸런스를 이용한 분산 노드 설정에 관한 연구)

  • Oh, Dong-Keun;Oh, Young-Jun;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.1001-1008
    • /
    • 2015
  • Mobile Ad hoc Network(MANET) consists of a node that has mobility. In MANET, the node has routing, the node builds a network of their own, no dependent infrastructure. Topology are exchanged due to node mobility in MANET. For reducing the change of topology, hierarchical network algorithm has been investigated. In hierarchical network, cluster member node communicates through cluster head node. When the load-balancing of cluster head node is exceed, assigned cluster member node can't communicate with base station. To solve this problem, we proposed Load Tolerance algorithm. The proposed algorithm, when cluster member node can't send a message by cluster head node that exceed load-balancing, then the cluster member node sends a message by selected load tolerance node. Through a simulation, the proposed algorithm improves packet delivery ratio in cluster routing.

A Stable Clustering Scheme Based on Node Mobility for Mobile Ad Hoc Networks (모바일 애드 혹 네트워크에서 이동성을 고려한 안정적인 클러스터링 기법)

  • Kim, Hyek-Su;Hwang, Jun-Ho;Yoo, Myung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.480-488
    • /
    • 2009
  • A mobile ad-hoc network is an autonomous collection of wireless mobile nodes that organizes a temporary network without any network infrastructure. Due to node mobility, it is a challenging task to maintain the network topology. In this paper, we propose a stable clustering algorithm that uses node mobility for cluster formation. In the proposed algorithm, the node mobility is measured by counting the number of nodes entering into/leaving from its transmission range. The node having the lowest mobility is selected as a cluster head. For topology maintenance with reduced control overhead, the cluster head adaptively controls the broadcasting period of hello message to the measured node mobility. Through computer simulations, it is verified that the proposed algorithm outperforms previous clustering algorithms in terms of control overhead, the rate of node mobility changes and the number of cluster head changes.

A study of set route path avoiding traffic concentration in Mobile Ad hoc Network (MANET에서 트래픽 집중현상을 회피하는 경로설정에 관한 연구)

  • Oh, Dong-keun;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.781-783
    • /
    • 2014
  • Mobile ad hoc network(MANET) consists of node that has mobility. MANET has increased overhead that caused by frequent topology changes. For reducing overhead, hierarchical network that communicates through cluster head node has been researched. When traffic is concentrated on cluster head node, cluster member node can't send message. To solve this problem, we proposed Step Parent algorithm. Proposed algorithm, cluster member node checks traffic of cluster head node using route path of other cluster head node in efficient coverage area. When cluster head node has increased traffic, cluster member node make a new route path by route path by routing path to another cluster head node. So cluster member node sends a message to destination node, we check improving delivery ratio.

  • PDF

A Probabilistic Broadcasting Mechanism based on Cross Layer Model Deliberating Received Signal Strength Ratio in Mobile Ad Hoc Networks

  • Kim, Jae-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.3
    • /
    • pp.25-32
    • /
    • 2016
  • Mobile Ad Hoc Networks(MANETs) consists of mobile nodes which communicate with each other without any centralized infrastructure. Message broadcasting by flooding for route discovery in MANET can result in high redundant retransmission, contention and collision of broadcasting packet, known as the broadcast storm problem collectively. The cross-layer design is adopted in this paper, which lets routing layer share the received signal strength information at MAC layer. Also this paper proposes a new probabilistic approach that dynamically adjusts the rebroadcasting probability of a node for routing request packets (RREQs) according to the received signal strength. The simulation results show that the proposed approach demonstrates better performance than blind flooding, fixed probabilistic broadcasting approaches.

An Approach to the DirectX Based Wireless Real-time Mobile-Fixed Station System (무선 환경에서의 고정연결 이동-고정 시스템 구현)

  • Park, Jung-Hoon;Park, Jin-Bae;Yoon, Tae-Sung;Yoo, Sun-Kook
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2093-2095
    • /
    • 2002
  • Nowadays, there are actually lots of changes in wireless communications of Korea. But it is not an exact PTP(Peer to Peer) Communication. In other words, a mobile station which can find fixed station can be connected with wireless internet server or other services, oppositely fixed station cannot approach to mobile station. Even though it exists, it is difficult to communicate with full duplex. We can service using CDMA 1X techniques such as cellular based SMS (Short Message Service) service or very simple MPRG Services. In this paper, we propose a system, using DirectX based mobile/fixed station stand alone program, depending on bandwidth of wireless service provider, tranceiving high resolution moving picture or reliable data regularly by a fixed connection each other.

  • PDF

Evaluation of Safeness and Functionality in Applied Technologies for Mobile Messengers

  • Cho, Gyu-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.8
    • /
    • pp.29-39
    • /
    • 2016
  • Recently, KakaoTalk users seek secure messengers with fears of 'possible' censorship over a mobile messenger. Instead German messenger "Telegram" is gaining popularity in South Korea. Are the known as secure messengers actually secure? In this paper, we evaluate secure mobile messengers in terms of private information protection. We establish the fourteen criteria to evaluate the functionality of messenger apps including communication encryption in transit, the possibility of leakage of decrypted messages via server, an encryption algorithm, a key exchange algorithm, an ephemeral message application, etc. Line, Telegram, Snapchat, WhatsApp, Wickr, Facebook Messenger and KakaoTalk, which have many worldwide and domestic users, are to be targeted. Wickr is ranked at the top of the evaluation, followed by Telegram and Line but KakaoTalk and Snapchat are ranked at the bottom of the evaluation list.

Monitoring System Using Mobile Warning and Mobile Web-page (모바일 경보와 모바일 웹페이지를 통한 모니터링 시스템)

  • Ju, Seung Hwan;Seo, Hee Suk;Lee, Seung Jae;Kim, Min Soo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.29-38
    • /
    • 2010
  • It often occur to nature disaster that like earthquake, typhoon, etc. around KOREA. A Haiti and Chile also metropolitan area of KOREA occur earthquake. in result, People think of nature disaster. Structures of present age are easily affected by nature disaster. So we are important that warn of dangerous situation as soon as possible. On this study, I introduce Integrated monitoring system that administrator check a event as early. I develop Monitoring System using SMS(Short Message Service). Administrator always monitor structure on real-time using mobile web-page. As Administrator using mobile device like PDA, Administrator always monitor structure. As using this system, Damage of nature disaster is minimized and is prevented post damage.

A Looping Problem in the Tree-Based Mobility Management for Mobile IP Supported Ad Hoc Networks

  • Han, Trung-Dinh;Oh, Hoon
    • Journal of Communications and Networks
    • /
    • v.13 no.4
    • /
    • pp.385-392
    • /
    • 2011
  • A loop can take place in the process of managing tree topology for mobility management of mobile nodes in infrastructure-based mobile ad hoc networks. The formation of a loop degrades an effective bandwidth of the wireless network by passing an identical message repeatedly within the same loop. Therefore, the loop should be resolved to revert the system back to the normal state. In this paper, we propose a simple and novel mechanism that detects and resolves a loop quickly by tracking the depth of trees. The mobility management approach that employs the loop resolution method is evaluated comparatively with the original tree-based one and the hybrid one. It is shown that the proposed approach far outperforms the other approaches, and it is robust against the rapid changes in network topology.