• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.027 seconds

Performance Evaluation of PEP based TCP Splitting Scheme in Satellite Communication Systems (위성 통신 시스템에서 TCP연결 분할 기반 PEP의 성능 평가)

  • Weldegiorgis, Nathnael Gebregziabhe;Lee, Kyu-Hwan;Kim, Jong-Mu;Kim, Jae-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.8
    • /
    • pp.10-17
    • /
    • 2015
  • A satellite communication system is one of viable solutions for Internet applications running in wide areas. However, the performance of TCP can be seriously degraded in the satellite networks due to long round-trip time (RTT) and high bit error rate (BER) over satellite links. Therefore, a performance enhancing proxy(PEP) based TCP splitting connection scheme is used in the satellite link to improve the TCP performance. In this paper, we implement PEP testbed and conduct experiment to evaluate the performance of TCP splitting connection by comparing with high-speed TCP solutions in various environments. In our experimental environment, we consider multiple connections, high packet loss, and limited bandwidth. The experiment results show that PEP improves the TCP throughput than high-speed TCP variants in various environments. However, there is no improvement of the TCP throughput with the limited bandwidth because there is packet loss caused by both the congestion and the channel error.

A Period Adaptive Wakeup Technique based on Receive Prediction for WSN (무선 센서 네트워크를 위한 수신 예측 기반 주기 적응적 웨이크업 기법)

  • Lee, Kyung-Hoon;Lee, Hak-Jai;Kim, Young-Min
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.11
    • /
    • pp.1265-1270
    • /
    • 2015
  • For the sensor node or collection node operating with a battery in a wireless sensor network, MAC protocols with improved energy efficiency are important performance factors. In this paper, in order to improve the restrictive capability in accordance with the fixed activity period of the duty cycle technology in the MAC protocol for wireless sensor networks, we propose a periodic adaptive wakeup technique based on receive prediction. The proposed technique is through a performance evaluation using the CC2500 RF transceiver and C8051F330 microcontroller based wireless node, to analyze the minimum active period. As a result, it was confirmed that it is possible to improve energy efficiency by adaptively changing the sleep period in accordance with the change of period.

UHF and S-Band Radar Networks (UHF와 S밴드 레이더 관측망 구축)

  • Kim, Park-Sa;Kim, Kwang-Ho;Campistrom, Bernard;Yoon, Hong-Joo;Kwon, Byung-Hyuk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.305-312
    • /
    • 2018
  • The quality of the radar and profiler network was estimated to forecast difficult meteorological situations. A network of UHF Doppler wind profilers and Doppler weather radars have been deployed all over the Korean Peninsular, with dense spatial resolution between instruments. The radar network allows to retrieve the three dimensional dynamics and to analyze the numerical model outputs at small and meso scales. This work has seldom been performed in any other place of the world, with such a high resolution. The wind field from radar network is a good agreement with the background wind fields based on the numerical modeling. This study will be helpful to forecast severe weathers as well as local meteorological phenomena.

The Public Key Polynomial Cryptosystem for Data Security in Communication Networks (통신 네트워크의 정보보호를 위한 공개키 다항식 암호시스템)

  • Yang, Tae-Kyu
    • The Journal of Information Technology
    • /
    • v.6 no.4
    • /
    • pp.59-68
    • /
    • 2003
  • In this paper, a public key kanpsack cryptosystem algorithm is based on the security to a difficulty of polynomial factorization in computer communication is proposed. For the proposed public key kanpsack cryptosystem, a polynomial vector B(x,y,z) is formed by transform of superincreasing vector A, a polynomial f(x,y,z) is selected. Next then, the two polynomials B(x,y,z) and f(x,y,z) is decided on the public key. Therefore a public key knapsack cryptosystem is based on the security to a difficulty of factorization of a polynomial f(x,y,z)=0 with three variables. In this paper, a public key encryption algorithm for data security of computer network is proposed. This is based on the security to a difficulty of factorization. For the proposed public key encryption, the public key generation algorithm selects two polynomials f(x,y,z) and g(x,y,z). The propriety of the proposed public key cryptosystem algorithm is verified with the computer simulation.

  • PDF

Development of electro hydraulic ballast remote valve control system with diagnostic function using redundant modbus communication (이중화 모드버스 통신을 이용한 퍼지기반 고장진단기능을 가진 선박 밸러스트 전기유압식 원격밸브제어시스템 개발)

  • Kim, Jong Hyun;Yu, Yung Ho
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.3
    • /
    • pp.292-301
    • /
    • 2014
  • This paper describes development of distributed type independent electro-hydraulic ballast valve remote control system with diagnostic function based on fuzzy inference using redundant Modbus communication and ethernet Modbus TCP/IP. Diagnostic function estimate degradation of system components and diagnose system faults, which results in shortage of fault maintenance time and improvement of system safety. Slave devices which control each valve and master device which command, monitor and diagnose slave system are developed. Slave devices are connected to master device with redundant Modbus networks and master device is connected to ship's integrated control system with Modbus TCP/IP. Also this paper describes development of simulator to test and confirm whether developed system can be integrated with ship's integrated control and monitoring system.

The Algorithm for minimizing data loss In handoff between Packet networks of 3GPPx (이동 패킷 망에서 핸드오프시 데이터 유실을 최소화하는 알고리즘)

  • Choi Seung-Kwon;Ryu Jae-Hong;Choi Woon-Soo;Lee Byong-Rok;Cho Yong-Hwan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.507-513
    • /
    • 2005
  • This paper proposes a fast handoff scheme between PDSNs in 3GPPs network for a mobile node. It introduces a method by which handoff can be performed without reestablishing PPP connection that may occur in the process of performing handoff between PDSNs. The method for handoff between PDSNs which provide packet services to a mobile node, requires that the PDSNs should receive subscribers information about mobile nodes from their neighbor PDSNs forming a communication network. When the PDSN recognizes the mobile node moving into its coverage area, it can quickly establish a communication channel with the mobile node based on the already received subscriber information. As a result, handoff is performed without reestablishing PPP. Accordingly, handoff between PDSNs can be performed faster, removing time needed for establishing a PPP session with a terminal and for terminating a previously set up PPP session.

  • PDF

Advanced Protocols and Methods of Robot Collision Avoidance for Social Network Service (로봇의 소셜 네트워크 서비스를 위한 프로토콜 및 충돌회피 방법)

  • Shin, Seok-Hoon;Hwang, Tae-Hyun;Shin, Seung-A;No, In-Ho;Shim, Joo-Bo;Oh, Mi-Sun;Ko, Joo-Young;Shim, Jae-Chang
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.931-940
    • /
    • 2012
  • Social networking services which spreading rapidly is a system using interrelationship of people by internet or mobile. SNS is a network system of the human-centered. In this paper, in order to make robot become a member of social networks we studied the necessary elements and formation. For robot with communication function and sensing, autonomous, collision avoidance method and communication protocol is needed to let Robot share the present conditions dangerous or special situation. We realized this after investigating necessary sensor for SNS, studying robot's collision-avoidance method, and defining protocol of robot for SNS. Also, we suggested and implemented the wired and wireless integrated communications method.

The Method of Data Integration based on Maritime Sensors using USN (USN을 활용한 해양 센서 데이터 집합 방안)

  • Hong, Sung-Hwa;Ko, Jae-Pil;Kwak, Jae-Min
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.3
    • /
    • pp.306-311
    • /
    • 2017
  • In the future ubiquitous network, information will collect data from various sensors in the field. Since the sensor nodes are equipped with small, often irreplaceable, batteries with limited power capacity, it is essential that the network be energy-efficient in order to maximize its lifetime. In this paper, we propose an effective network routing method that can operate with low power as well as the transmission of data and information obtained from sensor networks, and identified the number of sensors with the best connectivity to help with the proper placement of the sensor. These purposes of this research are the development of the sensor middle-ware to integrate the maritime information and the proposal of the routing algorithm for gathering the maritime information of various sensors. In addition, for more secure ship navigation, we proposed a method to construct a sensor network using various electronic equipments that are difficult to access in a ship, and then construct a communication system using NMEA(the national marine electronics association), a ship communication standard, in the future.

A Study on Implementation of Authentication System for Home Networking Service (홈 네트워크 서비스를 위한 인증시스템 구현에 관한 연구)

  • Lee, Ki-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1091-1098
    • /
    • 2009
  • In this paper, we designed the authentication system for home network service and applied it to actual sensor nodes. The pair-wise pre-distribution key skim is applied for prevention of authentication key from sniffing on the wireless sensor networks. The authentication key and data are encrypted by using the CBC mode RC5 algorithm based on the SPINS. The experimental environment consists of a base station (BS)and sensor nodes and each sensor node sends both sensing data and the encrypted authentication key to the BS. For simulations we set up some what-if scenarios of security menaces in home network service.Slightly modified the TOS_Msg data arrays of TinyOS is suggested to store 8-byte authentication key which can enable data encryption and authentication at the each sensor node. As a result, malfunction caused by communication between BS and nodes of other groups of added nodes having malicious purpose can be protected. Also, we confirmed that a critical data of home networking service like vital signal can be transmitted securely through this system by encryption technique.

A Pointer Forwarding Scheme for Fault-tolerant Location Management in Mobile Networks (이동망에서 결함 허용 위치 관리를 위한 포인터 포워밍 방법)

  • Lee, Kyung-Sook;Ha, Sook-Jeong;Chun, Sung-Kwang;Bae, Ihn-Han
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.387-394
    • /
    • 2004
  • One of the main challenges in personal communication services(PCS ) Is to locate many mobile terminals that nay move from place to place frequently. This kind of system operation is called location management. This task entails sophisticated signaling traffic and database queries. Several strategies have been proposed to improve the efficiency of location management. These strategies use location register databases to store the current locations of mobile terminals, and are vulnerable to failure of the location register databases. In this paper, we propose a fault-tolerant pointer forwarding scheme with distributed home location register in order to tolerate the failure of location registers. The performance of the proposed scheme is evaluated analytically by simulation, and Is compared with Biaz's bypass forwarding strategy and two-path forwarding strategy.