• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.04 seconds

A method of mobile RFID code processing for ALE middleware (ALE 미들웨어를 위한 모바일 RFID 코드 처리 방법)

  • Byun, Ji-Yoong;Lee, Sang-Joon;Byun, Yung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.461-468
    • /
    • 2008
  • RFID technology is one of the core technologies for ubiquitous computing, and many research activities have been going on in this research area currently. Related with these researches, mobile RFID network services using mobile devices having a built-in RFID reader and mobile networks have been launched in Korea, for the first time in the world. In this paper, we propose a method to coulect ALE middleware suggested by EPCglobal and existing mobile RFID network services. Especially, a RFID code conversion method is proposed to process mobile RFID code systems within ALE middleware systems. Using the proposed method, application developers and(or) content business industries can acquire the information they want, which is filtered and refined in real-time or periodically, from mobile RFID users. So, they can Provide customized services to users by using the user preference information. In this war, the ALE middleware system can be easily extended to process mobile RFID code effectively.

SACK-SNOOP Protocol for Wireless TCP Performance Improvement (무선 TCP 성능 향상을 위한 SACK-SNOOP 프로토콜)

  • Ahn, Chi-Hyun;Kim, Hyung-Chul;Woo, Jong-Jung;Kim, Jang-Hyung;Lee, Dae-Young;Jun, Kye-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.392-401
    • /
    • 2007
  • Wireless network has high BER characteristic because of path loss, fading, noise and interference. Many packet losses occur without any congestion in wireless network. Therefore, many wireless TCP algorithms have been proposed. SNOOP, one of wireless TCP algorithms, hides packet losses for Fixed Host and retransmits lost packets in wireless network. However, SNOOP has a weakness for bust errors in wireless network. This paper proposes the SACK-SNOOP to improve TCP performance based on SNOOP and Freeze-TCP that use ZWA messages in wireless network. This message makes FH stop sending packets to MH. BS could retransmit error packets to MH for this time. SACK-SNOOP use improved Selective ACK, thereby reducing the number of packet sequences according to error environment. This method reduces the processing time for generation, transmission, analysis of ACK. This time gain is enough to retransmit local burst errors in wireless link. Furthermore, SACK-SNOOP can manage the retransmitted error by extending delay time to FH. The simulation shows that our proposed protocol is more effective for packet losses in wireless networks.

Performance Evaluation according to MAP Inter-arrival Time for DOCSIS 3.0 based Cable Network (DOCSIS3.0 기반 케이블망에서 MAP 주기에 따른 성능평가)

  • Roh, Sun-Sik;Song, Jae-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1069-1076
    • /
    • 2007
  • DOCSIS 3.0 protocol are proposed to support high-speed cable network DOCSIS 3.0 MAC protocol regulates CM and CMTS channel transfer times through MAP message. So MAP Inter-arrival time is primary factor of network performance. However, standards does not include the details of MAP Inter-arrival Time affecting the performance of MAC protocols for DOCSIS 3.0. In this paper, we evaluated the performance of DOCSIS 3.0 protocol follow in MAP Inter-arrival Time. Based on the evaluation results, we propose the optimal MAP Inter-arrival Time. We found that the protocol shows best performance when the MAP Inter-arrival Time is 0.05sec. The research results can apply to performance element which important for the construction of DOCSIS 3.0 base cable networks.

Dragon-MAC: Securing Wireless Sensor Network with Authenticated Encryption (Dragon-MAC: 인증 암호를 이용한 효율적인 무선센서네크워크 보안)

  • Lim, Shu-Yun;Pu, Chuan-Chin;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1519-1527
    • /
    • 2007
  • In order to combat the security threats that sensor networks are exposed to, a cryptography protocol is implemented at sensor nodes for point-to-point encryption between nodes. Given that nodes have limited resources, symmetric cryptography that is proven to be efficient for low power devices is implemented. Data protection is integrated into a sensor's packet by the means of symmetric encryption with the Dragon stream cipher and incorporating the newly designed Dragon-MAC Message Authentication Code. The proposed algorithm was designed to employ some of the data already computed by the underlying Dragon stream cipher for the purpose of minimizing the computational cost of the operations required by the MAC algorithm. In view that Dragon is a word based stream cipher with a fast key stream generation, it is very suitable for a constrained environment. Our protocol regarded the entity authentication and message authentication through the implementation of authenticated encryption scheme in wireless sensor nodes.

Power Efficient Cell Searching Algorithm to Support Mobility in Portable Digital Broadcasting Networks (휴대용 디지털 방송망에서의 이동성지원을 위한 전력 효율적인 셀 탐색 기법)

  • Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1574-1581
    • /
    • 2007
  • DVB-H (Digital Video Broadcasting for Handhold) is a new standard, currently being developed for a portable digital broadcasting, which enhance the multimedia broadcasting service in the Euroapean standard DVB-T (DVB-Terrestrial). Seamless mobility and power saving are essential requirements in the DVB-H system. To support seamless mobility, DVB-H system should provides seamless handover for mobile stations in the MFN (multi frequency network). For seamless handover, the receiver should monitor neighboring cells and it increases the power consumption. And so, power efficient sell searching algorithm for seamless handover is required. In this paper, we propose hypothesis feeling based handover algorithm to enhance the power efficiency by using the fast cell searching, and analyze the performance of handover schemes through the numerical evaluation and simulation.

A Study on IPTV Video Quality by Routing Protocols in Wireless LAN (무선 LAN 환경에서 경로 배정 프로토콜에 따른 IPTV 영상 서비스 품질에 관한 연구)

  • Jung, Jae-hoon;Park, Seung-seob
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.572-575
    • /
    • 2009
  • With the advent of integration environment of broadcasting and communication, IPTV has been widely used. It provides services such as information, movie contents and broadcasting through TV using super-high speed networks. Developments of Wireless LAN and IP network technology create various and fusional services such as IPTV, VoIP that are based on IP network. The development of Wireless LAN is very important in IPTV network field which requires the best quality of service on the security, QoS and bandwidth. In this Paper, We configure the experimental network in its RIP and OSPF environment to test the Video Quality of IPTV in Wireless LAN. We measure and evaluate broadcasting quality by using PSNR to show the corelation of Routing Protocols in Wireless LAN in which how they affect to the IPTV real-time Video Quality.

  • PDF

Environment Monitoring System Using Autonomous Mobile Robot (자율 주행 로봇을 이용한 환경 모니터링 시스템)

  • Jeong, Hye-jin;Kim, Won-jung;Son, Cheol-su;Cho, Byung-lok;Yang, Su-yeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.1038-1041
    • /
    • 2009
  • Wireless sensor network with wireless sensor nodes which equipped with temperature, humidity, illumination, or soil sensor etc, get a natural environment information and analyze and utilized variety way.these network consist of a short distance wireless communication and multi-hop techniques with multiple nodes equipped low-power wireless transceivers. so the characteristic of the data collected through the wireless sensor network is obtained from compact nodes within a limited range. However, to get a data from the wireless sensor nodes scattered in a wide range, this network needs a wireless transceiver that consumes many power or a lot of intermediate nodes. then, merit of low cost and low electrical energy decrease. To solve this problem, this paper offers environment monitoring system using autonomous mobile robot that collect data from groups of each sensor networks scattered widely.

  • PDF

Wireless sensor networks for permanent health monitoring of historic buildings

  • Zonta, Daniele;Wu, Huayong;Pozzi, Matteo;Zanon, Paolo;Ceriotti, Matteo;Mottola, Luca;Picco, Gian Pietro;Murphy, Amy L.;Guna, Stefan;Corra, Michele
    • Smart Structures and Systems
    • /
    • v.6 no.5_6
    • /
    • pp.595-618
    • /
    • 2010
  • This paper describes the application of a wireless sensor network to a 31 meter-tall medieval tower located in the city of Trento, Italy. The effort is motivated by preservation of the integrity of a set of frescoes decorating the room on the second floor, representing one of most important International Gothic artworks in Europe. The specific application demanded development of customized hardware and software. The wireless module selected as the core platform allows reliable wireless communication at low cost with a long service life. Sensors include accelerometers, deformation gauges, and thermometers. A multi-hop data collection protocol was applied in the software to improve the system's flexibility and scalability. The system has been operating since September 2008, and in recent months the data loss ratio was estimated as less than 0.01%. The data acquired so far are in agreement with the prediction resulting a priori from the 3-dimensional FEM. Based on these data a Bayesian updating procedure is employed to real-time estimate the probability of abnormal condition states. This first period of operation demonstrated the stability and reliability of the system, and its ability to recognize any possible occurrence of abnormal conditions that could jeopardize the integrity of the frescos.

A study on the overseas expansion strategy of domestic ICT companies in the post-corona era -Focusing on case studies of ICT companies- (포스트 코로나 시대의 국내 ICT기업의 해외 진출 전략에 관한 연구 -ICT 기업 사례분석을 중심으로-)

  • Park, Sang-Hee;Kim, Ki-Yoon;Jung, Hyun-Seung;Hyun, Daiwon
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.163-173
    • /
    • 2021
  • The purpose of this study was to explore a support model for domestic ICT companies to advance into overseas markets suitable for the post-corona era along with the rapidly changing global economic situation. As a result of the analysis, first, by analyzing the internationalization cases of domestic ICT companies through the realization theory, in the COVID-19 situation, domestic ICT companies organically respond to crisis situations through ad hoc responses, use of international networks, use of external organizations, and resource-based practices. Through qualitative analysis, we were able to confirm that we are growing overseas while achieving our goals. In addition, strategies for domestic ICT companies to grow through internationalization were derived. Ultimately, it was interpreted as a part that required advancement of government policy according to the government's overseas expansion support system.

Determining Whether to Enter a Hazardous Area Using Pedestrian Trajectory Prediction Techniques and Improving the Training of Small Models with Knowledge Distillation (보행자 경로 예측 기법을 이용한 위험구역 진입 여부 결정과 Knowledge Distillation을 이용한 작은 모델 학습 개선)

  • Choi, In-Kyu;Lee, Young Han;Song, Hyok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.9
    • /
    • pp.1244-1253
    • /
    • 2021
  • In this paper, we propose a method for predicting in advance whether pedestrians will enter the hazardous area after the current time using the pedestrian trajectory prediction method and an efficient simplification method of the trajectory prediction network. In addition, we propose a method to apply KD(Knowledge Distillation) to a small network for real-time operation in an embedded environment. Using the correlation between predicted future paths and hazard zones, we determined whether to enter or not, and applied efficient KD when learning small networks to minimize performance degradation. Experimentally, it was confirmed that the model applied with the simplification method proposed improved the speed by 37.49% compared to the existing model, but led to a slight decrease in accuracy. As a result of learning a small network with an initial accuracy of 91.43% using KD, It was confirmed that it has improved accuracy of 94.76%.