• Title/Summary/Keyword: Wireless Network Simulation

Search Result 1,710, Processing Time 0.028 seconds

SACK-SNOOP Protocol for Wireless TCP Performance Improvement (무선 TCP 성능 향상을 위한 SACK-SNOOP 프로토콜)

  • Ahn, Chi-Hyun;Kim, Hyung-Chul;Woo, Jong-Jung;Kim, Jang-Hyung;Lee, Dae-Young;Jun, Kye-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.392-401
    • /
    • 2007
  • Wireless network has high BER characteristic because of path loss, fading, noise and interference. Many packet losses occur without any congestion in wireless network. Therefore, many wireless TCP algorithms have been proposed. SNOOP, one of wireless TCP algorithms, hides packet losses for Fixed Host and retransmits lost packets in wireless network. However, SNOOP has a weakness for bust errors in wireless network. This paper proposes the SACK-SNOOP to improve TCP performance based on SNOOP and Freeze-TCP that use ZWA messages in wireless network. This message makes FH stop sending packets to MH. BS could retransmit error packets to MH for this time. SACK-SNOOP use improved Selective ACK, thereby reducing the number of packet sequences according to error environment. This method reduces the processing time for generation, transmission, analysis of ACK. This time gain is enough to retransmit local burst errors in wireless link. Furthermore, SACK-SNOOP can manage the retransmitted error by extending delay time to FH. The simulation shows that our proposed protocol is more effective for packet losses in wireless networks.

The Access Method for a Collision Prevent from the Wireless Network (무선네트워크에서 충돌예방을 위한 접근방법)

  • Kim, Dong-Ok;Lee, Kee-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.119-126
    • /
    • 2009
  • In this paper propose a method to reduce data for collision resolution. It is to reduce a damage of the back off algorithm to apply in both wire and wireless networks. Double back off size can be work in the first and the last movement point service as a same time in IEEE 802.16. It propose of the algorithm to be suited to IEEE 802.16 for increasing network access percentage in increase a data treat, delay error range and random access over fuller condition. In the result of the computer simulation, the proposal algorism give a increasing speed more than under the this paper. From this computer simulation result, we can get the confirmation of the small loss in saturated and saturated could be a longer in last network.

A Study on the Virtual Reality Simulation Monitoring Verification System Available Wireless Communication Network (무선 통신망을 활용한 VR 시뮬레이션 관제상황 검증 시스템에 관한 연구)

  • Lee, Yang-Sun;Kang, Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.7 no.3
    • /
    • pp.193-197
    • /
    • 2006
  • In this paper, We proposed monitoring verification system using virtual reality simulation technology in monitoring fields for peculiar environment. Also, we analyzed the proposed system about required technology issues and operation process. The proposed monitoring verification system available wireless communication network is expected that application is possible in medical treatment field or special dangerous article processing filed as well as monitoring verification of mobile electric railcar

  • PDF

A Gateway Protocol Architecture for Zigbee Based Wireless Sensor Network Interconnecting TCP/IP Networks

  • Qiu, Peng;Heo, Ung;Choi, Jae-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.3
    • /
    • pp.176-180
    • /
    • 2009
  • This paper investigates protocol architecture for a web-sensor gateway interconnecting internet and wireless sensor network, in which Zigbee sensors are connected over the IEEE802.15.4 communication protocol standard. The web-sensor gateway is to deliver data between TCP/IP and Zigbee/IEEE802.15.4 protocols, transparently. Since the gateway provides a means to remotely control and aggregate sensor data over the internet, it needs to be designed in the view point of users and in their convenience. In accordance, the common gateway interface technology satisfying users on the web browser to efficiently manage and query the sensors in the wireless sensor networks, ubiquitously, is also introduced. Finally, a simulation prototype for the web-sensor gateway is proposed and verified using OPNET simulation tool.

  • PDF

Privacy-Preserving, Energy-Saving Data Aggregation Scheme in Wireless Sensor Networks

  • Zhou, Liming;Shan, Yingzi
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.83-95
    • /
    • 2020
  • Because sensor nodes have limited resources in wireless sensor networks, data aggregation can efficiently reduce communication overhead and extend the network lifetime. Although many existing methods are particularly useful for data aggregation applications, they incur unbalanced communication cost and waste lots of sensors' energy. In this paper, we propose a privacy-preserving, energy-saving data aggregation scheme (EBPP). Our method can efficiently reduce the communication cost and provide privacy preservation to protect useful information. Meanwhile, the balanced energy of the nodes can extend the network lifetime in our scheme. Through many simulation experiments, we use several performance criteria to evaluate the method. According to the simulation and analysis results, this method can more effectively balance energy dissipation and provide privacy preservation compared to the existing schemes.

Power Consumption Analysis of Prominent Time Synchronization Protocols for Wireless Sensor Networks

  • Bae, Shi-Kyu
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.300-313
    • /
    • 2014
  • Various Time Synchronization protocols for a Wireless Sensor Network (WSN) have been developed since time synchronization is important in many time-critical WSN applications. Aside from synchronization accuracy, energy constraint should also be considered seriously for time synchronization protocols in WSNs, which typically have limited power environments. This paper performs analysis of prominent WSN time synchronization protocols in terms of power consumption and test by simulation. In the analysis and simulation tests, each protocol shows different performance in terms of power consumption. This result is helpful in choosing or developing an appropriate time synchronization protocol that meets the requirements of synchronization accuracy and power consumption (or network lifetime) for a specific WSN application.

Advanced Transverse Wave Approach for MM-Wave Analysis of Planar Antennas applied in 5G-Technology

  • Ayari, Mohamed;Touati, Yamen El;Altowaijri, Saleh
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.295-299
    • /
    • 2022
  • In this paper, a fast numerical electromagnetic (EM) method based on the transverse wave formulation called-up Advanced Transverse Wave Approach (A-TWA) is presented. An appropriate 5G antenna is designed, simulated and investigated in the context of Millimeter-Wave Wireless Communication Systems. The obtained simulation results are found in good agreement with literature. Such a method can provide for the simulators a great library integrating the most complexly and sensitively geometry elements that can have a huge impact on the applications supported by new wireless technologies.

An Energy Efficient Chain-based Routing Protocol for Wireless Sensor Networks

  • Sheikhpour, Razieh;Jabbehdari, Sam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.6
    • /
    • pp.1357-1378
    • /
    • 2013
  • Energy constraint of wireless sensor networks makes energy saving and prolonging the network lifetime become the most important goals of routing protocols. In this paper, we propose an Energy Efficient Chain-based Routing Protocol (EECRP) for wireless sensor networks to minimize energy consumption and transmission delay. EECRP organizes sensor nodes into a set of horizontal chains and a vertical chain. Chain heads are elected based on the residual energy of nodes and distance from the header of upper level. In each horizontal chain, sensor nodes transmit their data to their own chain head based on chain routing mechanism. EECRP also adopts a chain-based data transmission mechanism for sending data packets from the chain heads to the base station. The simulation results show that EECRP outperforms LEACH, PEGASIS and ECCP in terms of network lifetime, energy consumption, number of data messages received at the base station, transmission delay and especially energy${\times}$delay metric.

A Performance Comparison of Ad-hoc Wireless Network Routing Protocols (Ad Hoc 무선망의 Routing Protocol 성능 비교분석)

  • 김동일
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.2
    • /
    • pp.208-213
    • /
    • 2003
  • Recently, a variety of new routing protocols targeted specifically wireless mobile nodes environment have been developed. This paper presents the results of a detailed packet level simulation comparing two multi-hop wireless ad-hoc network routing protocols that cover a range of design choices between DSDV and DSR. And we suggest a performance comparison of network routing protocols through NS-2 simulator.

A New Approach to Solve the Rate Control Problem in Wired-cum-Wireless Networks

  • Loi Le Cong;Hwang Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1636-1648
    • /
    • 2006
  • In this paper, we propose a new optimization approach to the rate control problem in a wired-cum-wireless network. A primal-dual interior-point(PDIP) algorithm is used to find the solution of the rate optimization problem. We show a comparison between the dual-based(DB) algorithm and PDIP algorithm for solving the rate control problem in the wired-cum-wireless network. The PDIP algorithm performs much better than the DB algorithm. The PDIP can be considered as an attractive method to solve the rate control problem in network. We also present a numerical example and simulation to illustrate our conclusions.

  • PDF