• Title/Summary/Keyword: network time-delay

Search Result 1,471, Processing Time 0.027 seconds

A Data Gathering Protocol for Multihop Transmission for Large Sensor Networks (대형 센서네트워크에서 멀티홉 전송을 이용한 데이터 수집 프로토콜)

  • Park, Jang-Su;Ahn, Byoung-Chul
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.50-56
    • /
    • 2010
  • This paper proposes a data gathering method by adapting the mobile sink to prolong the whole operation time of large WSNs. After partitioning a network into several clusters, a mobile sink visits each cluster and collects data from it. An efficient protocol improves the energy efficiency by delivering messages from the mobile sink to the cluster head as well as reduces the data gathering delay, which is the disadvantage of the mobile sink. For the scalability of sensor network, the network architecture should support the multihop transmission in the duster rather than the single hop transmission. The process for the data aggregation linked to the travelling path is proposed to improve the energy consumption of intermediate nodes. The experiment results show that the proposed model is more efficient than legacy methods in the energy consumption and the data gathering time.

Performance Evaluation of a Multimedia -Based Handoff Method (멀티캐스트에 기초한 핸드오프 방법의 성능 평가)

  • Ha, Eun-Yong;Choe, Yang-Hui;Kim, Jong-Sang
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.930-938
    • /
    • 1999
  • 미래의 통합 이동 통신망은 멀티미디어 데이터 서비스를 하기 위해 작은 셀로 망이 구성될 것이다. 셀이 작은 경우, 이동 호스트의 셀간 이동이 상대적으로 증가해서 잦은 핸드오프 처리로 서비스 중단이 빈번히 발생할 수 있을 뿐만 아니라 자원의 낭비도 많아지게 된다. 따라서 이런 문제를 해결하기 위해 이동 호스트의 이동성을 예측해서 멀티캐스트 연결을 구성해서 사전 핸드오프 처리를 하는 SGMH방법을 제안한다. SGMH방법의 성능 평가를 위해 핸드오프 처리과정의 데이터 및 제어 정보의 흐름을 분석하고, 망 종속 인자들을 도입해서 버퍼 오버헤드와 서비스 중단 시간 면에서 기존 핸드오프 방법들과 비교했다. 비교 분석한 결과는 제안한 방법이 기존의 방법보다 기지국에서의 버퍼 오버헤드뿐만 아니라 서비스 중단 시간을 줄일 수 있음을 보였다.Abstract For mobile multimedia data services, future mobile communication networks will consist of small cells. In case of smaller cell size, the number of user movements between cells will increase and more network resources will be consumed for processing frequent handoffs. This processing delay will cause frequent connection service disruptions. To solve these problems, a multicast-based handoff method ,called SGMH(Sub-Group Multicast-based Handoff), is suggested. SGMH method estimates future movements of mobile hosts and setups a dynamic multicast connection tree for procesing handoffs. For performance evaluation, we represent flows of data and control messages as timing diagrams and introduce several network related factors. In terms of buffer overhead and service disruption time we compared the SGMH method to other methods. The results show that SGMH method has better performance in that it can reduce consumption of network resources and minimize service disruption time.

MAC Address Spoofing Attack Detection and Prevention Mechanism with Access Point based IEEE 802.11 Wireless Network (Access Point 기반 무선 네트워크 환경에서의 MAC Address Spoofing 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.85-96
    • /
    • 2008
  • An authentication procedure on wired and wireless network will be done based on the registration and management process storing both the user's IP address and client device's MAC address information. However, existent MAC address registration/administration mechanisms were weak in MAC Spoofing attack as the attacker can change his/her own MAC address to client's MAC address. Therefore, an advanced mechanism should be proposed to protect the MAC address spoofing attack. But, existing techniques sequentially compare a sequence number on packet with previous one to distinguish the alteration and modification of MAC address. However, they are not sufficient to actively detect and protect the wireless MAC spoofing attack. In this paper, both AirSensor and AP are used in wireless network for collecting the MAC address on wireless packets. And then proposed module is used for detecting and protecting MAC spoofing attack in real time based on MAC Address Lookup table. The proposed mechanism provides enhanced detection/protection performance and it also provides a real time correspondence mechanism on wireless MAC spoofing attack with minimum delay.

  • PDF

A Study for the Express Railway of Seoul Metropolitan Area(Kangnam$\sim$Ilsan) (수도권(강남$\sim$일산) 급행철도 도입에 관한 연구)

  • Park, Kwang-Bok
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.1269-1278
    • /
    • 2009
  • The Seoul metropolitan area is generated the transportation problems of traffic congestion, delay of travel time, etc due to the increase of traffic demand at Seongnam area, Koyang/Paju area, Incheon/Bucheon area, etc, because that have not provided the urban surrounding railway network and live to be concentrated about 49% of the population of Korea. The Koyang/Paju route axis is required the urban surrounding railway network because the share percentage of public transportation is 51%, the automobiles is 48.8% and the subway is 27.3% and the housing development plan for 530,000 persons have provided. According to the result of the study for the introduction of the express railway between Kangnam to Ilsan of 37.8Km, in case of operation of 150Kmm at express railway, the scheduled speed between Kangnam to Ilsan is 103Km/h, the running time is about 23 minutes. The demand of traffic of this project was forecasted about 237,000persons by traffic analysis. This project which was analysed B/C of 1.08 by the result of the feasibility study have a economic feasibility.

  • PDF

A Study on the RACMC Algorithm for the Efficient Management of ATM Network Resources (ATM망 자원의 효율적 관리를 위한 RACMC 알고리즘에 관한 연구)

  • Ryoo, In-Tae;Kim, Young-Il;Shim, Cheul;Kim, Dong-Yon;Lee, Sang-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.11
    • /
    • pp.1701-1713
    • /
    • 1993
  • This paper proposes a simple and highly effective RACMC(Real-time ATM Cell Monitoring and Control) algorithm and the resulting bandwidth gain effects art considered. RACMC algorithm performs usage parameter controls according to the monitoring informations of input data cells generated from the accepted connections and the controlling informations set by the M/P(Management Plane) for that connection. The results of monitoring and controlling actions for ATM data cells are transmitted to the M/P and the control parameters in lookup table are updated according to the condition of currently used bandwith. Therefore, the proposed algorithm can allocate network resource optimally and solve the several tantalizing problems that the existing cell control algorithm have, that is, the difficulty in controlling as monitoring very bursty traffics, unavoidable processing delay, and limited input buffer size when implemented. By the performance analysis using computer simulation, RACMC algorithm proves to be very effective especially in ATM network as implemented simply.

  • PDF

An Enhanced DAP-NAD Scheme for Multi-Hop Transmission in Combat Net Radio Networks (전투 무선망에서 다중 홉 전송을 위한 향상된 DAP-NAD 기법)

  • Jung, Jong-Kwan;Kim, Jong-Yon;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.977-985
    • /
    • 2012
  • Recently, many countries have been developing new protocols to improve the performance of tactical ad hoc networks for implementing NCW (Network Centric Warfare). Combat net radio (CNR) networks are the most important communication infra for the ground forces such as infantry of Army. U.S. Army had developed MIL-STD-188-220D that is the Interoperability Standard for DMTDs (Digital Messages Transfer Device Subsystems) for voice and data communication in CNR. MIL-STD-188-220D is a candidate for MAC protocol of TMMR which is next radio and has a few constraints to used in TMMR. NAD (Network Access Delay) defined in MIL-STD-188-220D needs time synchronization to avoid collision. However, it is difficult for time synchronization to fit in multi-hop environment. We suggest the enhanced DAP (Deterministic Adaptable Priority)-NAD to prevent conflicts and decrease delays in multi-hop CNR. Simulation results show that the proposed scheme improves the performance in multi-hop CNR networks.

QoS Support in the Air Defense Alternative System (방공작전 예비체계의 QoS 지원)

  • Sim, Dong-Sub;Lee, Young-Ran;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.903-909
    • /
    • 2010
  • ADAS is the air defense control system performing air surveillance and identification of ROK and near air. This system is self-developed by Air Force, currently operated successfully as the alternative system of MCRC. ADAS processes converting and combining transferred the real time radar data detected by radars. additionally, it displays significant radar data as producing in tracks. Then, it uses the message queue for IPC(Inter Process Communication). the various tactical data processed in the server is ultimately send to the network management process through the message queue for transmitting to the weapon director console. the weapon director receives this transmitted tactical data through the console to execute air defense operations. However, there is a problem that data packet is delayed or lost since the weapon Director does not receive as the amount of tactical data from the server overflowed with air tracks and missions increased. This paper improved the algorism to display and transmit the various tactical data processed from ADAS server to numbers of the weapon director console in the real time without any delay or lost. Improved the algorism, established at exercise, the development server in the real operation network and the weapon director console, is proved by comparing the number of sending tactical data packets in the server and receiving packets in the weapon director.

Power-Efficient Broadcasting Scheme for Mobile VOD System (모바일 VOD 시스템의 전력효율을 감안한 브로드캐스팅 기법)

  • Choi, Young;Choi, Hwang-Kyu
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.612-622
    • /
    • 2007
  • As compared with wired network environment, mobile VOD service in wireless network environment is difficult to guarantee the quality of VOD service due to the limitation of the system resources. Moreover, the wireless network has small bandwidth resources and short access range so that has limitations for providing the service to a large number of mobile clients. The limited battery capacity of a mobile device becomes an obstacle to mobile clients for enjoying VOD service for a long time. Therefore, these drawbacks should be considered in developing mobile VOD applications. This paper proposes a new technique for improving QoS of mobile VOD service by jointly use of broadcasting technique, which can provide VOD service to a large number of mobile clients simultaneously, and bursty communication technique, which can reduce the power consumption of a mobile device. With having these two techniques, streaming data are divided into segments, each of which is grouped into a particular packet and then transmitted at a time in the busty communication manner. In the performance evaluation, the power consumption on WNIC of a mobile device can be reduced by over 80%, and the initial service delay can be reduced in proportion to the number of channels compared with the existing staggered broadcasting technique.

  • PDF

Model Optimization for Supporting Spiking Neural Networks on FPGA Hardware (FPGA상에서 스파이킹 뉴럴 네트워크 지원을 위한 모델 최적화)

  • Kim, Seoyeon;Yun, Young-Sun;Hong, Jiman;Kim, Bongjae;Lee, Keon Myung;Jung, Jinman
    • Smart Media Journal
    • /
    • v.11 no.2
    • /
    • pp.70-76
    • /
    • 2022
  • IoT application development using a cloud server causes problems such as data transmission and reception delay, network traffic, and cost for real-time processing support in network connected hardware. To solve this problem, edge cloud-based platforms can use neuromorphic hardware to enable fast data transfer. In this paper, we propose a model optimization method for supporting spiking neural networks on FPGA hardware. We focused on auto-adjusting network model parameters optimized for neuromorphic hardware. The proposed method performs optimization to show higher performance based on user requirements for accuracy. As a result of performance analysis, it satisfies all requirements of accuracy and showed higher performance in terms of expected execution time, unlike the naive method supported by the existing open source framework.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.