• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.039 seconds

Reduced-Pipelined Duty Cycle MAC Protocol (RP-MAC) for Wireless Sensor Network

  • Nguyen, Ngoc Minh;Kim, Myung Kyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2433-2452
    • /
    • 2017
  • Recently, the pipeline-forwarding has been proposed as a new technique to resolve the end-to-end latency problem of the duty-cycle MAC protocols in Wireless Sensor Networks (WSNs). Some protocols based on this technique such as PMAC and PRI-MAC have shown an improvement not only in terms of reducing end-to-end latency but also in terms of reducing power consumption. In these protocols, however, the sensor nodes still waste a significant amount of energy for unnecessary idle listening during contention period of upstream nodes to check the channel activity. This paper proposes a new pipeline-forwarding duty-cycle MAC protocol, named RP-MAC (Reduced Pipelined duty-cycle MAC), which tries to reduce the waste of energy. By taking advantage of ACK mechanism and shortening the handshaking procedure, RP-MAC minimizes the time for checking the channel and therefore reduces the energy consumption due to unnecessary idle listening. When comparing RP-MAC with the existing solution PRI-MAC and RMAC, our QualNet-based simulation results show a significant improvement in term of energy consumption.

A Cluster-based Address Allocation Protocol in MANET Environment (MANET 환경에서 클러스터 기반 주소 할당 프로토콜)

  • Cho, Young-Bok;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9A
    • /
    • pp.898-904
    • /
    • 2007
  • I must receive node discernment address for communication between node that participate to network in MANETs(Mobile Ad-hoc Networks). Address is created by node confidence or different node. I achieve address redundancy check (Duplicate Address Detection) to examine whether this address is available unique address. However, this method happens problem that MANETs' extensity drops. This paper can manage by group unit binding transfer nodes to group in MANETs. I suggest method that apply special quality of cluster that exchange subordinate decrease and mobility government official of control message are easy in address assignment protocol minimize time required in redundancy check and solves extensity problem. Method that propose in this paper shows excellent performance according to node number increase than wave and MANETConf [2] through simulation.

RCDP: Raptor-Based Content Delivery Protocol for Unicast Communication in Wireless Networks for ITS

  • Baguena, Miguel;Toh, C.K.;Calafate, Carlos T.;Cano, Juan-Carlos;Manzoni, Pietro
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.198-206
    • /
    • 2013
  • Recent advances in forward error correction (FEC) coding techniques were focused on addressing the challenges of multicast and broadcast delivery. However, FEC approaches can also be used for unicast content delivery in order to solve transmission control protocol issues found in wireless networks. In this paper, we exploit the error resilient properties of Raptor codes by proposing Raptor-based content delivery protocol (RCDP) - a novel solution for reliable and bidirectional unicast communication in lossy links that can improve content delivery in situations where the wireless network is the bottleneck. RCDP has been designed, validated, optimized, and its performance has been analyzed in terms of throughput and resource efficiency. Experimental results show that RCDP is a highly efficient solution for environments characterized by high delays and packet losses making it very suitable for intelligent transport system oriented applications since it achieves significant performance improvements when compared to traditional transport layer protocols.

Omnidirectional Camera-based Image Rendering Synchronization System Using Head Mounted Display (헤드마운티드 디스플레이를 활용한 전방위 카메라 기반 영상 렌더링 동기화 시스템)

  • Lee, Seungjoon;Kang, Suk-Ju
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.6
    • /
    • pp.782-788
    • /
    • 2018
  • This paper proposes a novel method for the omnidirectional camera-based image rendering synchronization system using head mounted display. There are two main processes in the proposed system. The first one is rendering 360-degree images which are remotely photographed to head mounted display. This method is based on transmission control protocol/internet protocol(TCP/IP), and the sequential images are rapidly captured and transmitted to the server using TCP/IP protocol with the byte array data format. Then, the server collects the byte array data, and make them into images. Finally, the observer can see them while wearing head mounted display. The second process is displaying the specific region by detecting the user's head rotation. After extracting the user's head Euler angles from head mounted display's inertial measurement units sensor, the proposed system display the region based on these angles. In the experimental results, rendering the original image at the same resolution in a given network environment causes loss of frame rate, and rendering at the same frame rate results in loss of resolution. Therefore, it is necessary to select optimal parameters considering environmental requirements.

Integrated NEMO Route Optimization to Improve Security and Communication Path (보안성과 전송 경로를 함께 개선한 NEMO의 통합적인 경로 최적화)

  • Cho, Kyung-San;Shin, Duk-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.203-210
    • /
    • 2008
  • Because BSP(Basic Support Protocol) of NEMO(Network Mobility) has important limitation of not providing route optimization, several route optimization schemes have been proposed. By analyzing and improving the limitations of the existing schemes. we Propose an advanced integrated route optimization scheme for the communication through both the internal and external routing of nested NEMO. Our proposal includes a secure route optimization protocol which connects TLMR directly to an external node CN without passing through any HAs. and allows TLMR to control the internal path without passing through the internet. Thus, our scheme can strengthen the security as well as improve the path and delay of NEMO communication.

  • PDF

Analysis of Response Characteristics of CAN-Based Feedback Control System Considering Message lime Delays (메시지 지연시간을 고려한 CAN 기반 피드백 제어시스템의 응답특성 분석)

  • Jeon, Jong-Man;Kim, Dae-Won
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.5
    • /
    • pp.190-196
    • /
    • 2002
  • In this paper, the response characteristics of CAN-based feedback control system are analyzed when message time delays through the network are considered. The message time delays are composed of computation time delay and communication time delay. The application layer of CAN communication is modeled mathematically to analyze two time delays, and the communication time delay is redefined under several assumption conditions. The CAN-based feedback control system is proposed as a target system that is the machining system with the three axes. The response characteristics of time delays in the proposed system are analyzed through computer simulations, and can be improved by the compensation using the PID tuning method to satisfy the design specifications of the system.

The development of a ship's network monitoring system using SNMP based on standard IEC 61162-460

  • Wu, Zu-Xin;Rind, Sobia;Yu, Yung-Ho;Cho, Seok-Je
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.10
    • /
    • pp.906-915
    • /
    • 2016
  • In this study, a network monitoring system, including a secure 460-Network and a 460-Gateway, is designed and developed according with the requirements of the IEC (International Electro-Technical Commission) 61162-460 network standard for the safety and security of networks on board ships. At present, internal or external unauthorized access to or malicious attack on a ship's on board systems are possible threats to the safe operation of a ship's network. To secure the ship's network, a 460-Network was designed and implemented by using a 460-Switch, 460-Nodes, and a 460-Gateway that contains firewalls and a DMZ (Demilitarized Zone) with various application servers. In addition, a 460-firewall was used to block all traffic from unauthorized networks. 460-NMS (Network Monitoring System) is a network-monitoring software application that was developed by using an simple network management protocol (SNMP) SharpNet library with the .Net 4.5 framework and a backhand SQLite database management system, which is used to manage network information. 460-NMS receives network information from a 460-Switch by utilizing SNMP, SNMP Trap, and Syslog. 460-NMS monitors the 460-Network load, traffic flow, current network status, network failure, and unknown devices connected to the network. It notifies the network administrator via alarms, notifications, or warnings in case any network problem occurs. Once developed, 460-NMS was tested both in a laboratory environment and for a real ship network that had been installed by the manufacturer and was confirmed to comply with the IEC 61162-460 requirements. Network safety and security issues onboard ships could be solved by designing a secure 460-Network along with a 460-Gateway and by constantly monitoring the 460-Network according to the requirements of the IEC 61162-460 network standard.

A Network Module and a Web Server for Web-based Remote Control of Embedded Systems (웹 기반 원격 제어를 위한 내장형 시스템용 네트워크 모듈 및 웹 서버)

  • 선동국;김성조;이재호;김선자
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.3
    • /
    • pp.231-242
    • /
    • 2004
  • Remote control and monitoring of information appliances require RTOS and TCP/IP network module to communicate each other. Traditional TCP/IP protocol stacks, however, require relatively large resources to be useful in small 8 or 16-bit systems both in terms of code size and memory usage. It motivates design and implementation of micro TCP/IP that is lightweight for embedded systems. Micro embedded web server is also required to control and monitor information appliances through the Web. In this paper, we design and implement micro TCP/IP and Web server for information appliances. For this goal, we investigate requirements for the interoperability of embedded systems with the Internet and the Web-based control of embedded systems. Next, we compare our micro TCP/IP protocol stack with that of RTIP and QPlus in terms of object code size and performance. The size of micro TCP/IP protocol stack can be reduced by 3/2 and 1/4, respectively, comparing with that of RTIP and QPlus. We also show that the performance of our micro TCP/IP is similar to that of RTIP and QPlus since it handles 2.9Mbps when delayed ACK is not adapted.

Congestion Control Algorithms Evaluation of TCP Linux Variants in Dumbbell (덤벨 네트워크에서 TCP 리눅스 변종의 혼잡 제어 알고리즘 평가)

  • Mateen, Ahamed;Zaman, Muhanmmad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.139-145
    • /
    • 2016
  • Dumbbell is the most basic topology that can be used in almost all kind of network experiment within it or just by little expansion. While Transmission Control Protocol TCP is the basic protocol that is used for the connectivity among networks and stations. TCP major and basic goal is to provide path and services to different applications for communication. For that reason TCP has to transfer a lot of data through a communication medium that cause serious congestion problem. To calculate the congestion problem, different kind of pre-cure solutions are developer which are Loss Based Variant and Delay Based Variant. While LBV keep track of the data that is going to be passed through TCP protocol, if the data packets start dropping that means congestion occurrence which notify as a symptom, TCP CUBIC use LBV for notifying the loss. Similarly the DBV work with the acknowledgment procedure that is used in when data ACK get late with respect to its set data rate time, TCP COMPOUND/VAGAS are examples of DBV. Many algorithms have been purposed to control the congestion in different TCP variants but the loss of data packets did not completely controlled. In this paper, the congestion control algorithms are implemented and corresponding results are analyzed in Dumbbell topology, it is typically used to analyze the TCP traffic flows. Fairness of throughput is evaluated for different TCP variants using network simulator (NS-2).

TCP-Friendly Rate Control for Vertical Handover over Wireless Heterogeneous Network (무선 이종망 환경에서 Vertical Handover를 위한 TCP-Friendly 비트율 제어)

  • Pyun, Jae-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.2
    • /
    • pp.33-40
    • /
    • 2008
  • Streaming video has become a popular form of transferring media over the wired/wireless network. TCP-friendly rate control (TFRC) is used as a streaming media transport protocol. Using the TCP congestion response function and current network conditions, TFRC adjusts its sending rate to yield the maximum TCP-friendly throughput. Since TFRC was designed for applications that would prefer to maintain a slowly-changing sending rate, it is less responsive to changes in handover between wireless heterogeneous networks such as 3G network, WLAN, and so on. This paper shows a new TFRC method for vertical handover over wireless heterogeneous network. The proposed TFRC method has features of low quality interruption and fast rate adaptation to a new target network. The simulation results show that the proposed one provides better QoS and throughput support than the traditional TFRC scheme during vertical handover.