• Title/Summary/Keyword: wireless control network

Search Result 1,580, Processing Time 0.034 seconds

KOINONIA High-Rate WPAN Channel Time Allocation and CAC Algorithm for Multimedia Transmission (KOINONIA 고속 WPAN의 멀티미디어 전송을 위한 채널 타임 할당 및 CAC 알고리즘)

  • Park Jong-Ho;Lee Tae-Jin;June Sun-Do;Youn Kyu-Jung;Won Yun-Jae;Cho Jin-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5A
    • /
    • pp.417-425
    • /
    • 2005
  • KOINONIA is high-rate Wireless Personal Area Network (WPAN) technology, and is developed for multimedia traffic transmission in personal area. A KOINONIA piconet is a collection of one or more associated slaves under a single master. Efficient scheduling of a master for the traffic of slaves is essential to use channel effectively and to guarantee QoS of multimedia traffic. We propose a new scheduling algorithm to allocate channel time at desired intervals regardless of superframe length, and a Connection Admission Control(CAC) algorithm to regulate the number of traffics in a piconet. Our proposed algorithms have been shown to save channel time and to meet QoS requirements compared to the conventional weighted round-robin algorithm.

A Frequency Domain based Positioning Method using Auto Regressive Modeling in LR-WPAN (주파수 영역상의 AR 모델링 기반 이용한 LR-WPAN용 무선측위기법)

  • Hong, Yun-Gi;Bae, Seung-Chun;Choi, Sung-Soo;Lee, Won-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6C
    • /
    • pp.561-570
    • /
    • 2009
  • Ultra-wideband communication systems based on impulse radio have merits that are possible for the high data rate transmission, high resolution ranging are positioning system. Conventionally, in order to accomplish these features, the high-speed ADC (Analog to Digital Convertor) is necessary to apply radio determination system operating in time domain. However, considering low rate - wireless personal area network (LR-WPAN) aims to low-cost hardware implementation, the expensive ADC converting GHz sampling per second is not appropriate. So, this paper introduces a low complex AR (Auto Regressive) model based non-coherent ranging scheme operating in frequency domain with using low-speed ADC utilizing analog Voltage Control Oscillator (VCO) mode for the frequency domain transformation. To verify the superiority of the proposed ranging and location algorithm working in frequency domain, the suggested IEEE 802.15.4a TG channel model is used to exploit affirmative features of the proposed algorithm with conducting the simulation results.

Implementation and Performance Evaluation of Reporting Interval-adaptive Sensor Control Scheme for Energy Efficient Data Gathering (에너지 효율적 센서 데이터 수집을 위한 리포팅 허용 지연시간 적응형 센서 제어 기법 구현 및 성능평가)

  • Shon, Tae-Shik;Choi, Hyo-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.459-464
    • /
    • 2010
  • Due to the application-specific nature of wireless sensor networks, the sensitivity to such a requirement as data reporting latency may vary depending on the type of applications, thus requiring application-specific algorithm and protocol design paradigms which help us to maximize energy conservation and thus the network lifetime. In this paper, we implement and evaluate a novel delay-adaptive sensor scheduling scheme for energy-saving data gathering which is based on a two phase clustering (TPC), in wireless sensor networks. The TPC is implemented on sensor Mote hardwares. With the help of TPC implemented, sensors selectively use direct links for control and forwarding time critical sensed data and relay links for data forwarding based on the user delay constraints given. Implementation study shows that TPC helps the sensors to increase a significant amount of energy while collecting sensed data from sensors in a real environment.

An Energy-Efficient Asynchronous Sensor MAC Protocol Design for Wireless Sensor Networks (무선 센서 네트워크를 위한 에너지 효율적인 비동기 방식의 센서 MAC 프로토콜 설계)

  • Park, In-Hye;Lee, Hyung-Keun;Kang, Seok-Joong
    • Journal of IKEEE
    • /
    • v.16 no.2
    • /
    • pp.86-94
    • /
    • 2012
  • Synchronization MAC Protocol such as S-MAC and T-MAC utilize duty cycling technique which peroidically operate wake-up and sleep state for reducing energy consumption. But synchronization MAC showed low energy efficiency because of additional control packets. For better energy consumption, Asychronization MAC protocols are suggested. For example, B-MAC, and X-MAC protocol adopt Low Power Listening (LPL) technique with CSMA algorithm. All nodes in these protocols joining a network with independent duty cycle schedules without additional synchronization control packets. For this reason, asynchronous MAC protocol improve energy efficiency. In this study, a low-power MAC protocol which is based on X-MAC protocol for wireless sensor network is proposed for better energy efficiency. For this protocol, we suggest preamble numbering, and virtual-synchronization technique between sender and receive node. Using TelosB mote for evaluate energy efficiency.

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.

A Design and Implementation of Method for Positioning Vehicle Using Sensing Data (센싱 데이터를 이용한 차량 측위 기법의 설계 및 구현)

  • Moon, Hye-Young;Kim, Jin-Deog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.422-424
    • /
    • 2010
  • Recently the car attached many ECUs and entertainment devices to provide the easiness maintenance and driver's convenience. CAN and MOST networks have been used to manage and control those devices in the car. Wireless network also has been established to receive information from external. These days a car navigation system with GPS is being integrated with CAN, MOST and Wireless network. In these circumstances, the car navigation system can have HMI function to integrate and control the car networks' devices. To solve the GPS problems such as positioning errors or losing signals from satellites in the tunnels and urban canyons, this paper designs and implements a method for positioning vehicle by using the sensing data of sensors and Wi-Fi devices based on this integrated environment.

  • PDF

Spatial Correlation-based Resource Sharing in Cognitive Radio SWIPT Networks

  • Rong, Mei;Liang, Zhonghua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3172-3193
    • /
    • 2022
  • Cognitive radio-simultaneous wireless information and power transfer (CR-SWIPT) has attracted much interest since it can improve both the spectrum and energy efficiency of wireless networks. This paper focuses on the resource sharing between a point-to-point primary system (PRS) and a multiuser multi-antenna cellular cognitive radio system (CRS) containing a large number of cognitive users (CUs). The resource sharing optimization problem is formulated by jointly scheduling CUs and adjusting the transmit power at the cognitive base station (CBS). The effect of accessing CUs' spatial channel correlation on the possible transmit power of the CBS is investigated. Accordingly, we provide a low-complexity suboptimal approach termed the semi-correlated semi-orthogonal user selection (SC-SOUS) algorithm to enhance the spectrum efficiency. In the proposed algorithm, CUs that are highly correlated to the information decoding primary receiver (IPR) and mutually near orthogonal are selected for simultaneous transmission to reduce the interference to the IPR and increase the sum rate of the CRS. We further develop a spatial correlation-based resource sharing (SC-RS) strategy to improve energy sharing performance. CUs nearly orthogonal to the energy harvesting primary receiver (EPR) are chosen as candidates for user selection. Therefore, the EPR can harvest more energy from the CBS so that the energy utilization of the network can improve. Besides, zero-forcing precoding and power control are adopted to eliminate interference within the CRS and meet the transmit power constraints. Simulation results and analysis show that, compared with the existing CU selection methods, the proposed low-complex strategy can enhance both the achievable sum rate of the CRS and the energy sharing capability of the network.

Asymmetric RTS/CTS for Exposed Node Reduction in IEEE 802.11 Ad Hoc Networks

  • Matoba, Akihisa;Hanada, Masaki;Kanemitsu, Hidehiro;Kim, Moo Wan
    • Journal of Computing Science and Engineering
    • /
    • v.8 no.2
    • /
    • pp.107-118
    • /
    • 2014
  • One interesting problem regarding wireless local area network (WLAN) ad-hoc networks is the effective mitigation of hidden nodes. The WLAN standard IEEE 802.11 provides request to send/clear to send (RTS/CTS) as mitigation for the hidden node problem; however, this causes the exposed node problem. The first 802.11 standard provided only two transmission rates, 1 and 2 Mbps, and control frames, such as RTS/CTS assumed to be sent at 1 Mbps. The 802.11 standard has been enhanced several times since then and now it supports multi-rate transmission up to 65 Mbps in the currently popular 802.11n (20 MHz channel, single stream with long guard interval). As a result, the difference in transmission rates and coverages between the data frame and control frame can be very large. However adjusting the RTS/CTS transmission rate to optimize network throughput has not been well investigated. In this paper, we propose a method to decrease the number of exposed nodes by increasing the RTS transmission rate to decrease RTS coverage. Our proposed method, Asymmetric Range by Multi-Rate Control (ARMRC), can decrease or even completely eliminate exposed nodes and improve the entire network throughput. Experimental results by simulation show that the network throughput in the proposed method is higher by 20% to 50% under certain conditions, and the proposed method is found to be effective in equalizing dispersion of throughput among nodes.

A Study on Wireless Data Quality Measurement Method for u-Healthcare Service in WiBro Environment (WiBro 환경에서의 u-Healthcare 서비스를 위한 무선데이터 품질 측정 방안 연구)

  • Shim, Jae-Sung;Yun, Sung-Yeol;Park, Seok-Cheon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.2
    • /
    • pp.834-841
    • /
    • 2012
  • In order to the mobile service uses the wireless terminal including the development of the wire wireless network and Smart phone, and etc. use including mobile office, which and etc. increases. Because in order that the u-Healthcare service using this appeared before the footlights and the existing quality measurement reference considered the speed, error rate, and etc. just, guarantees the stability of the u-Healthcare, the quality control by service are necessary. In this paper, the quality measurement reference by mobile service considering the radio environment as the method for satisfying the quality guarantee of the u-Healthcare mobile service user and user needs was presented. The WiBro u-Healthcare wireless data service quality based system in the end user perspective was established through the main performance index and entrepreneur case presented in the international standardization institute including 3GPP, WiMAX forum, GSMA, and etc. through the related research and the validity of the quality index establishment was presented according to each service.

A Study of Wired and wireless VoIP vulnerability analysis and hacking attacks and security (유무선 VoIP 취약점 분석과 해킹공격 및 보안 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.737-744
    • /
    • 2012
  • Recently VoIP has provided voice(both wired and wireless from IP-based) as well as the transmission of multimedia information. VoIP used All-IP type, Gateway type, mVoIP etc. Wired and wireless VoIP has security vulnerabilities that VoIP call control signals, illegal eavesdropping, service misuse attacks, denial of service attack, as well as wireless vulnerabilities etc. from WiFi Zone. Therefore, the analysis of security vulnerabilities in wired and wireless VoIP and hacking incidents on security measures for research and study is needed. In this paper, VoIP (All-IP type, and for Gateway type) for system and network scanning, and, IP Phone to get the information and analysis of the vulnerability. All-IP type and Gateway type discovered about the vulnerability of VoIP hacking attacks (Denial of Service attacks, VoIP spam attacks) is carried out. And that is a real VoIP system installed and operated in the field of security measures through research and analysis is proposed.