• 제목/요약/키워드: Network Latency

검색결과 764건 처리시간 0.025초

클러스터 트리 라우팅 프로토콜 연구 (Study of Cluster Tree Routing Protocols)

  • 조무호
    • 조명전기설비학회논문지
    • /
    • 제19권8호
    • /
    • pp.138-143
    • /
    • 2005
  • 클러스터 기반의 계층적 트리 구조는 대형화가 용이하면서 라우팅 프로토콜이 단순하다는 점에서 장점을 가진다. 본 논문에서는 무선 센스 네트워크에서 클러스터 트리 네트워크 관리를 효과적으로 지원할 수 있는 방안과 라우팅 프로토콜의 데이터 모음과 지연에 대해 분석한다. 수치 해석의 결과에서 보면 중간 노드에서의 데이터 모음을 통한 통신 메시지 수를 줄임으로 센스 노드의 전력 소모를 크게 절약할 수 있지만, 이에 따른 메시지 전달 지연이 커짐을 알 수 있었다. 또한 클러스터 헤드를 무작위로 선정하게 되면 메시지 지연이 매우 많이 증가될 수 있는 것이 확인되었다.

고속데이터 전송을 위한 개선된 Binary CDMA 모뎀 구현 (Improved Binary CDMA Modem Design for High-Speed Wireless Communications)

  • 이장연;조진웅;홍대기
    • 반도체디스플레이기술학회지
    • /
    • 제9권2호
    • /
    • pp.11-14
    • /
    • 2010
  • In this paper, an improved binary-CDMA (Code Division Multiple Access) system for high speed multimedia data transmission will be presented. The improved binary CDMA technology will be used in municipal wireless network. The new name of the system is the Guardian system using a binary CDMA technology. The Guardian system can provide high data rate, and improve its throughput by minimizing latency from the limitation of resources of system bus during multimedia data transmission. Finally, we analyze the performance of Guardian modem according to the report of wireless data transmission test.

Small Cell Communication Analysis based on Machine Learning in 5G Mobile Communication

  • Kim, Yoon-Hwan
    • 통합자연과학논문집
    • /
    • 제14권2호
    • /
    • pp.50-56
    • /
    • 2021
  • Due to the recent increase in the mobile streaming market, mobile traffic is increasing exponentially. IMT-2020, named as the next generation mobile communication standard by ITU, is called the 5th generation mobile communication (5G), and is a technology that satisfies the data traffic capacity, low latency, high energy efficiency, and economic efficiency compared to the existing LTE (Long Term Evolution) system. 5G implements this technology by utilizing a high frequency band, but there is a problem of path loss due to the use of a high frequency band, which is greatly affected by system performance. In this paper, small cell technology was presented as a solution to the high frequency utilization of 5G mobile communication system, and furthermore, the system performance was improved by applying machine learning technology to macro communication and small cell communication method decision. It was found that the system performance was improved due to the technical application and the application of machine learning techniques.

PMIPv6 빠른 핸드오버에서의 Out-of-Order 패킷 분석 (Out-of-Order Packet Analysis in Fast Handover for Proxy Mobile IPv6)

  • ;손민한;추현승
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2013년도 추계학술발표대회
    • /
    • pp.287-289
    • /
    • 2013
  • Fast Handover for Proxy Mobile IPv6 (FPMIPv6), a protocol described in RFC 5949, is used to reduce handover latency and minimize packet loss problem occuring in the Proxy Mobile IPv6 (PMIPv6) protocol. However, during the study of implementing FPMIPv6, we found the Out-of-Order Packet (OoOP) problem that occurs in the experiment of FPMIPv6. Since the OoOP is an issue that affects significantly to QoS of the network, in this paper, we analyze the OoOP problem by using network model. The analysis conducts the cause of occurring OoOP problem due to there exist two paths for data transmitted from Correspondent Node (CN) to MN in FPMIPv6.

An Intelligent Machine Learning Inspired Optimization Algorithm to Enhance Secured Data Transmission in IoT Cloud Ecosystem

  • Ankam, Sreejyothsna;Reddy, N.Sudhakar
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.83-90
    • /
    • 2022
  • Traditional Cloud Computing would be unable to safely host IoT data due to its high latency as the number of IoT sensors and physical devices accommodated on the Internet grows by the day. Because of the difficulty of processing all IoT large data on Cloud facilities, there hasn't been enough research done on automating the security of all components in the IoT-Cloud ecosystem that deal with big data and real-time jobs. It's difficult, for example, to build an automatic, secure data transfer from the IoT layer to the cloud layer, which incorporates a large number of scattered devices. Addressing this issue this article presents an intelligent algorithm that deals with enhancing security aspects in IoT cloud ecosystem using butterfly optimization algorithm.

오픈소스 기반의 실시간 EtherCAT 제어 시스템의 구현 (Implementation of Real-time EtherCAT Control System based on Open Source)

  • 경윤진;최동일
    • 로봇학회논문지
    • /
    • 제18권3호
    • /
    • pp.281-284
    • /
    • 2023
  • Real-time control communication network system is important for developing defense robots because it affects environmental interaction, performance, and safety. We propose a real-time control communication network using the Xenomai real-time operating system and the open-source EtherCAT master library, SOEM. EtherCAT is an Ethernet-based industrial communication method. It has low latency and many functions such as cable redundancy and distributed clock synchronization. We use Xenomai RTOS and Intel NUC to develop the system. Experimental tests demonstrate the Real-time EtherCAT master implementation, and communication with CiA301-based slave devices. The jitter measurement was conducted to validate the real-time performance of the system. The proposed system shows possibility for real-time robotics applications in various defense robots.

Performance Analysis of Blockchain Consensus Protocols-A Review

  • Amina Yaqoob;Alma Shamas;Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.181-192
    • /
    • 2023
  • Blockchain system brought innovation in the area of accounting, credit monitoring and trade secrets. Consensus algorithm that considered the central component of blockchain, significantly influences performance and security of blockchain system. In this paper we presented four consensus protocols specifically as Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS) and Practical Byzantine Fault-Tolerance (PBFT), we also reviewed different security threats that affect the performance of Consensus Protocols and precisely enlist their counter measures. Further we evaluated the performance of these Consensus Protocols in tabular form based on different parameters. At the end we discussed a comprehensive comparison of Consensus protocols in terms of Throughput, Latency and Scalability. We presume that our results can be beneficial to blockchain system and token economists, practitioners and researchers.

Deep Reinforcement Learning-Based Edge Caching in Heterogeneous Networks

  • Yoonjeong, Choi; Yujin, Lim
    • Journal of Information Processing Systems
    • /
    • 제18권6호
    • /
    • pp.803-812
    • /
    • 2022
  • With the increasing number of mobile device users worldwide, utilizing mobile edge computing (MEC) devices close to users for content caching can reduce transmission latency than receiving content from a server or cloud. However, because MEC has limited storage capacity, it is necessary to determine the content types and sizes to be cached. In this study, we investigate a caching strategy that increases the hit ratio from small base stations (SBSs) for mobile users in a heterogeneous network consisting of one macro base station (MBS) and multiple SBSs. If there are several SBSs that users can access, the hit ratio can be improved by reducing duplicate content and increasing the diversity of content in SBSs. We propose a Deep Q-Network (DQN)-based caching strategy that considers time-varying content popularity and content redundancy in multiple SBSs. Content is stored in the SBS in a divided form using maximum distance separable (MDS) codes to enhance the diversity of the content. Experiments in various environments show that the proposed caching strategy outperforms the other methods in terms of hit ratio.

산업 IoT 전용 분산 연합 학습 기반 침입 탐지 시스템 (Distributed Federated Learning-based Intrusion Detection System for Industrial IoT Networks)

  • ;최필주;이석환;권기룡
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 추계학술발표대회
    • /
    • pp.151-153
    • /
    • 2023
  • Federated learning (FL)-based network intrusion detection techniques have enormous potential for securing the Industrial Internet of Things (IIoT) cybersecurity. The openness and connection of systems in smart industrial facilities can be targeted and manipulated by malicious actors, which emphasizes the significance of cybersecurity. The conventional centralized technique's drawbacks, including excessive latency, a congested network, and privacy leaks, are all addressed by the FL method. In addition, the rich data enables the training of models while combining private data from numerous participants. This research aims to create an FL-based architecture to improve cybersecurity and intrusion detection in IoT networks. In order to assess the effectiveness of the suggested approach, we have utilized well-known cybersecurity datasets along with centralized and federated machine learning models.

전술 기동망의 이동성 지원을 위한 PMIP기반 분산 이동성 관리 적용방안 (PMIP-based Distributed Mobility Management for Tactical Network)

  • 선경재;김영한;노홍준;박형원;한명훈;권대훈
    • 한국군사과학기술학회지
    • /
    • 제22권5호
    • /
    • pp.654-666
    • /
    • 2019
  • The tactical network has several different characteristics compared with commercial internet network such as hierarchical topology, dynamic topology changing and wireless link based connectivity. For considering IP mobility management in the tactical network, current mobility management using Mobile IP(MIP) is not suitable with some reasons such as non-optimal routing paths and single point of failure. Proxy Mobile IP(PMIP) which supporting network-based mobility in hierarchical manner can provide optimal routing path in the tactical network environment, but centralized anchor is still remained a threat to the stability of the tactical network which changes its topology dynamically. In this paper, we propose PMIP-based distributed mobility management for the tactical network environment. From our design, routing paths are always configured in optimized way, as well as path is recovered quickly when the mobility anchor of user is failed. From numerical analysis, comparing to other mobility scheme, result shows that the proposed scheme can reduce packet transmission cost and latency in tactical network model.