• 제목/요약/키워드: Relay networks

Search Result 528, Processing Time 0.023 seconds

A Study on Environment Management System in Tunnel using Wireless Sensor Networks (무선 센서 네트워크를 이용한 터널 내 환경 관리 시스템에 관한 연구)

  • Joo, Yang-Ick;Kim, Jae-Wan
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.10
    • /
    • pp.1196-1203
    • /
    • 2013
  • In general, the cost of transceiver for wireless network configuration is more expensive than that for wired network. However, in case of environmental management system in a tunnel, the cost can be minimized by adopting low rate tranceiver because the amount of the exchanged data for tunnel monitoring is very small. When the obtained data from sensor node is sent directly to the corresponding command node, there is no need to consider routing problem of the data transfer. However in this case, sensor nodes are required to be implemented with high power transmitter and experience high energy consumption. To tackle this problem, relay nodes can be used to transfer the data of tunnel monitoring, and suitable routing protocols for selecting optimum path are needed. Therefore, in this paper, we propose a routing algorithm and a self-configuration protocol for environment management system in tunnel.

ECMA-392 Cooperative MAC Protocol for QoS Guarantee in Multi-Hop Wireless Bridge in Ship Area (선박 내 멀티 홉 무선 브릿지에서 QoS 보장을 위한 ECMA-392 협력 MAC 프로토콜)

  • Lee, Seung Beom;Jeong, Hwan-Jong;Jeong, Min-A;Lee, Yeonwoo;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1289-1297
    • /
    • 2014
  • In this paper, we use the ECMA-392 standard, the first cognitive radio networks to meet the demand for IT services in the ship. We propose a ECMA-392 cooperative MAC protocol to ensure QoS to support multimedia services in the ship area in a multi-hop wireless bridge using ECMA-392 networks. Because the proposed protocol transmits directly or relay transmission by selecting efficient routes based on the information of the ECMA-392 devices, it provides communication to ensure QoS of the device. The simulation results show that the proposed cooperative MAC protocol improves a throughput of devices compared to the existing method.

Security Scheme for Prevent malicious Nodes in WiMAX Environment (노드간 에너지 소비를 효율적으로 분산시킨 PRML 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Nam-Kyu;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.774-784
    • /
    • 2009
  • A wireless sensor network consisting of a large number of nodes with limited battery power should minimize energy consumption at each node to prolong the network lifetime. To improve the sensitivity of wireless sensor networks, an efficient scheduling algorithm and energy management technology for minimizing the energy consumption at each node is desired. ill this paper, we propose energy-aware routing mechanism for maximum lifetime and to optimize the solution quality for sensor network maintenance and to relay node from its adjacent cluster heads according to the node"s residual energy and its distance to the base station. Proposed protocol may minimize the energy consumption at each node, thus prolong the lifetime of the system regardless of where the sink is located outside or inside the cluster. Simulation results of proposed scheme show that our mechanism balances the energy consumption well among all sensor nodes and achieves an obvious improvement on the network lifetime. To verify propriety using NS-2, proposed scheme constructs sensor networks adapt to current model and evaluate consumption of total energy, energy consumption of cluster head, average energy dissipation over varying network areas with HEED and LEACH-C.

A Prediction Method using WRC(Weighted Rate Control Algorithm) in DTN (DTN에서 노드의 속성 정보 변화율과 가중치를 이용한 이동 예측 기법)

  • Jeon, Il-Kyu;Oh, Young-jun;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.113-115
    • /
    • 2015
  • In this paper, we proposed an algorithm based on movement prediction using rate of change of the attribute information of nodes what is called WRC(Weighted Rate Control) in delay tolerant networks(DTNs). Existing DTN routing algorithms based on movement prediction communicate by selecting relay nodes increasing connectivity with destination node. Thus, because the mobile nodes are in flux, the prediction algorithms that do not reflect the newest attribute information of node decrease reliability. In this paper, proposed algorithm approximate speed and direction of attribute information of node and analysis rate of change of attribute information of node. Then, it predict movement path of node using proposed weight. As the result, proposed algorithm show that network overhead and transmission delay time decreased by predicting movement path of node.

  • PDF

Multi-Hop MAC Protocol for Wireless Sensor Networks (센서 네트워크를 위한 멀티 홉 MAC 프로토콜)

  • Cho, Kyong-Tak;Bahk, Sae-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6A
    • /
    • pp.506-514
    • /
    • 2009
  • To minimize energy consumption, most of MAC Protocols in WSNs exploit low duty cycling. Among those, RMAC [4] allows a node to transmit a data packet for multiple hops in a single duty cycle, which is made possible by exploiting a control frame named Pioneer (PION) in setting up the path. In this paper, we present a MAC Protocol called Hop Extended MAC (HE-MAC) that transmits the data packet for more multiple hops in a single duty cycle. It employs an EXP (Explorer) frame to set up the multiple hop transmission, which contains the information of the maximum hop that a packet can be transmitted. With the use of the information in EXP and an internal state of Ready to Receive (RTR), HEMAC extends the relay of the packet beyond the termination of the data period by two more hops compared to RMAC. Along with our proposed adaptive sleeping method, it also reduces power consumption and handles heavy traffic efficiently without experiencing packet inversion observed in RMAC. We analytically obtain the packet delivery latency in HE-MAC and evaluate the performance through ns-2 simulations. Compared to RMAC, HE-MAC achieves 14% less power consumption and 20% less packet delay on average for a random topology of 300 nodes.

Study of Efficient Energy Management for Ubiquitous Sensor Networks with Optimization of the RF power (전송전력 최적화를 통한 센서네트워크의 효율적인 에너지관리에 대한 연구)

  • Eom, Heung-Sik;Kim, Keon-Wook
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.3
    • /
    • pp.37-42
    • /
    • 2007
  • This paper reconsiders established power conservation models for ubiquitous sensor networks that use relay nodes instead of direct communication and proposes novel network power consumption model with consideration of the channel level and radio chip level simultaneously. We estimate the effect of minimum hop-count policy in terms of network power consumption through simulation of various situations for low power RF module CC2420. It is observed that maximum RF power and minimum hop-count results in lower energy consumption relatively. Also, in total network energy consumption, which is included re-transmission, minimum hop count policy presents decrease by 33.1% of energy consumption in compare with the conventional model.

Data Pre-Caching Mechanism in NDN-based Drone Networks (NDN 기반 드론 네트워크의 데이터 사전 캐싱 기법)

  • Choi, Suho;Joe, Inwhee;Kim, Wontae
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1116-1121
    • /
    • 2019
  • Networking services based on the flying drones may cause many handover events because the coverage radius is narrower than that of the existing infrastructure, such as cellular networks. Therefore, it copes with frequent handover by pre-caching data to target network provider before handover using a content store. As a result of the simulation, it can be confirmed that the delay is lowered. This is because the data that was requested before the handover is delivered to the target drones, and the car that has completed the handover receives the data through the target drones. On the other hand, if the proposed method is not used, it can be confirmed that the delay is increased. This is because it can not cope with the path change due to the handover and re-sends the packet requesting the data.

Internetworking Models Between Wireless Sensor Networks and the Internet Based on IPv6 (무선 센서 네트워크와 IPv6 기반 인터넷 간의 연동 모델)

  • Kwon, Hoon;Kim, Jeong-Hee;Kwak, Ho-Young;Do, Yang-Hoi;Kim, Dae-Young;Kim, Do-Hyeun
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.11
    • /
    • pp.1474-1482
    • /
    • 2006
  • Recently, it is advanced about the variable research of IPv6 and the wireless sensor network. However, the existed researches are not enough about the internetworking technology between the wireless sensor network and the Internet based on IPv6 for supporting ubiquitous service. Accordingly, this paper proposes two internetworking models for connecting the wireless sensor network and Internet based on IPv6. The relay router in the first model and the sink node of the wireless sensor network in the second mode] were used as a gateway. Then we analyze and compare with two internetworking models. Additionally we construct the test-bed connected between the wireless sensor network and KOREN(KOrea advanced REsearch Network) based on IPv6 using the first model. And we verified the operation of the test-bed by experiments.

  • PDF

PNC(Pipeline Network Coding)-Based Message and Node Authentication in Wireless Networks (무선 네트워크에서 파이프라인 네트워크 코딩 기반 메시지 및 노드 인증)

  • Ahn, Myeong-Gi;Cho, Young-Jong;Kang, Kyungran
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.999-1008
    • /
    • 2017
  • In this paper, we propose a pipeline network coding (PNC) scheme for efficient data transmission in wireless networks, a data authentication scheme for verifying the integrity of data, and a node authentication scheme for a virtual source. PNC is a technique that improves the overall network performance by relaying data such that the relay node performing network coding transmits to the sender instead. However, network coding is vulnerable to a pollution attack, which is an attack by a malicious attacker to inject modified data into the network. To prevent this, hash-based message authentication code (HMAC) is used. For this purpose, in order to generate a tag used for data authentication, a key must be distributed to the nodes performing authentication. We applied a hash chain to minimize the overhead of key distribution. A null vector is used as the authentication scheme for the virtual source. Finally, we analyze the safety and complexity of the proposed scheme and show he performance through simulation.

Improving the Availability of Scalable on-demand Streams by Dynamic Buffering on P2P Networks

  • Lin, Chow-Sing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.491-508
    • /
    • 2010
  • In peer-to-peer (P2P) on-demand streaming networks, the alleviation of server load depends on reciprocal stream sharing among peers. In general, on-demand video services enable clients to watch videos from beginning to end. As long as clients are able to buffer the initial part of the video they are watching, on-demand service can provide access to the video to the next clients who request to watch it. Therefore, the key challenge is how to keep the initial part of a video in a peer's buffer for as long as possible, and thus maximize the availability of a video for stream relay. In addition, to address the issues of delivering data on lossy network and providing scalable quality of services for clients, the adoption of multiple description coding (MDC) has been proven as a feasible resolution by much research work. In this paper, we propose a novel caching scheme for P2P on-demand streaming, called Dynamic Buffering. The proposed Dynamic Buffering relies on the feature of MDC to gradually reduce the number of cached descriptions held in a client's buffers, once the buffer is full. Preserving as many initial parts of descriptions in the buffer as possible, instead of losing them all at one time, effectively extends peers’ service time. In addition, this study proposes a description distribution balancing scheme to further improve the use of resources. Simulation experiments show that Dynamic Buffering can make efficient use of cache space, reduce server bandwidth consumption, and increase the number of peers being served.