• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.031 seconds

Spatio-temporal protocol for power-efficient acquisition wireless sensors based SHM

  • Bogdanovic, Nikola;Ampeliotis, Dimitris;Berberidis, Kostas;Casciat, Fabio;Plata-Chaves, Jorge
    • Smart Structures and Systems
    • /
    • v.14 no.1
    • /
    • pp.1-16
    • /
    • 2014
  • In this work, we address the so-called sensor reachback problem for Wireless Sensor Networks, which consists in collecting the measurements acquired by a large number of sensor nodes into a sink node which has major computational and power capabilities. Focused on applications such as Structural Health Monitoring, we propose a cooperative communication protocol that exploits the spatio-temporal correlations of the sensor measurements in order to save energy when transmitting the information to the sink node in a non-stationary environment. In addition to cooperative communications, the protocol is based on two well-studied adaptive filtering techniques, Least Mean Squares and Recursive Least Squares, which trade off computational complexity and reduction in the number of transmissions to the sink node. Finally, experiments with real acceleration measurements, obtained from the Canton Tower in China, are included to show the effectiveness of the proposed method.

Bandwidth Requirement and Priority-based Synchronization Methods in Hybrid Client-Server Architecture for Mobile Multiplayer Games (모바일 멀티플레이어 게임을 위한 하이브리드 클라이언트-서버 구조의 대역폭 요건과 우선순위 기반 동기화 기법)

  • Kim, Jinhwan
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.4
    • /
    • pp.526-534
    • /
    • 2014
  • Most of the multiplayer games available online are based on a client-server architecture because this architecture gives better administration control to the game providers than peer-to-peer architecture. In this architecture, the server is responsible for all the communication between the connected clients. The weakness of this architecture is its bandwidth requirement and scalability. Peer-to-peer architectures have then been proposed to solve these issues. In this paper, we propose a hybrid client-server architecture in which the game state is partially shared by the mobile terminal to achieve consistency among different players. Like a peer-to-peer architecture, this architecture uses client-side capacities to reduce bandwidth requirements for the server and improves consistency in wireless networks. Client events have different timeliness and consistency requirements according to their nature in the game world. These requirements lead to tasks with different priorities on CPU processing. In the proposed architecture, either the server or the client applies consistency mechanism according to the priority level. Simulation experiments show that the bandwidth of the server in this architecture is smaller than that of the client-server architecture. As a result, the server in the proposed architecture can accommodate more clients with enhancing the scalability.

A Study on AC/DC Power Converter of Energy Harvesting for Considered to Solar Position Tracking Control (태양광 위치 추적 제어를 고려한 에너지 Harvesting AC/DC 전력 변환기 구동에 관한 연구)

  • Na, Seung-Kwon;Ku, Gi-Jun
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.1
    • /
    • pp.56-66
    • /
    • 2014
  • In this paper, the solar cell need the characteristic interpreting because the solar cell changes greatly according to the isolation, temperature and load in the photovoltaic development. Moreover, to get many energy in photovoltaic development need the position tracking of the sun according to the environment change and it is necessary to control the output of solar cells up to the time. Simulation and composed microprocessor and sensor chip an power conversion system with boost converter to experiment results are performed to prove the analysis of the converter operation, and to show the possibility of energy harvesting and photovoltaic development need the position tracking small capacitance, the boost rate of boost converter was similar to 167 percent.

A Study on the Educational Applications of IPTV (IPTV(Internet Protocol Television)의 교육적 활용 방안 연구)

  • Baek, Seon-Ryeon;Lee, Tae-Wuk
    • Journal of The Korean Association of Information Education
    • /
    • v.12 no.1
    • /
    • pp.65-75
    • /
    • 2008
  • With the advent of convergence environment of broadcasting and communication, IPTV has been widely used. It provides services such as information, movie contents and broadcasting with TV through super-highway information networks. The purpose of this study is to suggest its educational applications to overcome the limits existing in the education. For this goal, we sought its concept and characteristic and drew educational implications by analyzing its contents. We also suggested what-if scenarios for its educational applications, considered its possibilities in educational applications and suggested the kinds of teaching-learning utilizing it and its educational applications for the various subjects. Finally, we examined problems which were considered before its applications in the education with the classification of legal, technical and educational problems.

  • PDF

Developing a Home Care Nursing Information System by utilizing Wire-Wireless Network and Mobile Computing System (컴퓨터 통신망과 PDA(휴대용개인단말기)를 이용한 가정간호정보시스템 개발)

  • 박정호;박성애;윤순녕;강성례
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.2
    • /
    • pp.290-296
    • /
    • 2004
  • Purpose: The purpose of this study was to develop a home care nursing network system for operating home care effectively and efficiently by utilizing a wire-wireless network and mobile computing in order to record and send patients' data in real time, and by combining the headquarter office and the local offices with home care nurses over the Internet. It complements the preceding research from 1999 by adding home care nursing standard guidelines and upgrading the PDA program. Method: Method/l and Prototyping were adopted to develop the main network system. Result: The detailed research process is as follows: 1 )home care nursing standard guidelines for Diabetes, cancer and peritoneal-dialysis were added in 12 domains of nursing problem fields with nursing assessment/intervention algorithms. 2) complementing the PDA program was done by omitting and integrating the home care nursing algorhythm path which is unnecessary and duplicated. Also, upgrading the PDA system was done by utilizing the machinery and tools where the PDA and the data transmission modem are integrated, CDMX-1X base construction, in order to reduce a transmission error or transmission failure.

Large Flows Detection, Marking, and Mitigation based on sFlow Standard in SDN

  • Afaq, Muhammad;Rehman, Shafqat;Song, Wang-Cheol
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.189-198
    • /
    • 2015
  • Despite the fact that traffic engineering techniques have been comprehensively utilized in the past to enhance the performance of communication networks, the distinctive characteristics of Software Defined Networking (SDN) demand new traffic engineering techniques for better traffic control and management. Considering the behavior of traffic, large flows normally carry out transfers of large blocks of data and are naturally packet latency insensitive. However, small flows are often latency-sensitive. Without intelligent traffic engineering, these small flows may be blocked in the same queue behind megabytes of file transfer traffic. So it is very important to identify large flows for different applications. In the scope of this paper, we present an approach to detect large flows in real-time without even a short delay. After the detection of large flows, the next problem is how to control these large flows effectively and prevent network jam. In order to address this issue, we propose an approach in which when the controller is enabled, the large flow is mitigated the moment it hits the predefined threshold value in the control application. This real-time detection, marking, and controlling of large flows will assure an optimize usage of an overall network.

Design of a set of One-to-Many Node-Disjoint and Nearly Shortest Paths on Recursive Circulant Networks

  • Chung, Ilyong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.7
    • /
    • pp.897-904
    • /
    • 2013
  • The recursive circulant network G(N,d) can be widely used in the design and implementation of parallel processing architectures. It consists of N identical nodes, each node is connected through bidirectional, point-to-point communication channels to different neighbors by jumping $d^i$, where $0{\leq}i{\leq}{\lceil}{\log}_dN{\rceil}$ - 1. In this paper, we investigate the routing of a message on $G(2^m,4)$, a special kind of RCN, that is key to the performance of this network. On $G(2^m,4)$ we would like to transmit k packets from a source node to k destination nodes simultaneously along paths on this network, the $i^{th}$ packet will be transmitted along the $i^{th}$ path, where $1{\leq}k{\leq}m-1$, $0{{\leq}}i{{\leq}}m-1$. In order for all packets to arrive at a destination node quickly and securely, we present an $O(m^4)$ routing algorithm on $G(2^m,4)$ for generating a set of one-to-many node-disjoint and nearly shortest paths, where each path is either shortest or nearly shortest and the total length of these paths is nearly minimum since the path is mainly determined by employing the Hungarian method.

A Study on the Implementation of WBAN-Based Medical Gateway (WBAN 기반의 의료용 게이트웨이 구현에 관한 연구)

  • Park, Yong-Min
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.640-647
    • /
    • 2014
  • The WBAN technology means a short distance wireless network which provides each device's interactive communication by connecting devices inside and outside of body located within 3 meters. It is necessary to develop core technology that the WBAN middleware and application service for WBAN sensor network. A device for gathering patient's biometric information was used zigbex of Hanbaek electronics and we designed the message structure which is collected the biometric information. The gateway design and implementation for the WBAN environment. The embedded system was HBE-empos II of Hanbaek electronics and the WBAN network is implemented to BNC and BN that used for hbe-ubi-zigbex. It was confirmed that the proposed sensor gateway could be used for the interconnection of the proposed system with other networks.

A Study on Efficient Transmission Rate Control of ABR Traffic in PNNI Networks (PNNI 망에서 효율적인 ABR 트래픽 전송률 제어에 관한 연구)

  • Kim Byun-gon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.973-980
    • /
    • 2005
  • In this paper, we analyze previous flow control algorithm for serving ABR traffic, and then propose the algorithm which calculate fair transmission rate and control efficiently ABR traffic using VS/VD switch which has an effect on PNNI environment with long delay. For getting the transmission rate, the proposed algorithm use FMMRA as ER scheme which calculate exactly the fair share. And, in large delay state, we can obtain fair cell sharing by calculating transmission rates which obtained by transmitted queue length information of VD to VS for serve and drain cell in queue Through the computer simulation, we evaluate the performance of proposed algorithm. According to the results, the proposed algorithm shows good performance.

A Comparative Analysis of EAP Authentication/Key-Establishment Protocols (EAP 인증/키설정 프로토콜 비교분석)

  • Park DongGook;Cho Kyung-Ryong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1323-1332
    • /
    • 2005
  • EAP (Extensible authentication protocol) is a sort of general framework for authentication rather than a specific authentication protocol. An important consequence of this is that EAP can accommodate a variety of authentication/key-establishment protocols for different internet access networks possibly integrated to a common IP core network This paper tries a comparative analysis of several specific authentication/key establishment protocols for EAP, and suggest a strategic viewpoint toward the question: which one to un. In addition, we tried to make things clear about an intellectual property right issue with regard to some password-based protocols.