• Title/Summary/Keyword: wireless control network

Search Result 1,580, Processing Time 0.031 seconds

Adaptive Beacon Scheduling Algorithm to Reduce End-to-End Delay in Cluster-tree based LR-WPAN (클러스터-트리 기반 LR-WPAN에서 End-to-End 지연시간을 줄이기 위한 적응적 Beacon 스케줄링 알고리즘)

  • Kang, Jae-Eun;Park, Hak-Rae;Lee, Jong-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3B
    • /
    • pp.255-263
    • /
    • 2009
  • In this paper, we propose an adaptive beacon scheduling algorithm to control a reception period of actual data according to variation of amount of traffic in IEEE 802.15.4 LR-WPAN(Low Rate-Wireless Personal Area Network) with the cluster-tree topology. If a beacon interval is shortened, the amount of the traffic a node receives can be increased while consumption of the energy can be also increased. In this sense, we can achieve optimal on orgy consumption by controlling the beacon interval when the amount of data to be received is being decreased. The result of simulation using NS-2 shows that the proposed algorithm improves performances in terms of packet loss rate and end-to-end delay compared with algorithm using a fixed beacon interval. For a design of cluster-tree based LR-WPAN managing delay-sensitive services, the proposed algorithm and the associated results can be applied usefully.

A Software Framework for Verifying Sensor Network Operations and Sensing Algorithms (센서네트워크 동작 및 센싱 알고리즘 검증을 위한 소프트웨어 프레임워크)

  • Yoo, Seong-Eun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.1
    • /
    • pp.63-71
    • /
    • 2012
  • Most of sensor networks are difficult to be debugged, verified, and upgraded once they are deployed in the fields, for they are usually deployed in real world and large scale. Therefore, before deploying the sensor networks, we should test and verify them sufficiently in realistic testbeds. However, since we need to control physical environments which interact with sensor networks, it takes much of time and cost to test and verify sensor networks at the level of resource-constrained sensor nodes in such environments. This paper proposes an efficient software framework for evaluating and verifying sensor networks in the view points of network and application operations (i.e., accuracy of sensing algorithms). Applying the proposed software framework to the development of a simulator for a smart parking application based on wireless sensor network, this paper verifies the feasibility of the proposed framework.

Power Splitting-based Analog Network Coding for Improving Physical Layer Security in Energy Harvesting Networks (에너지 하베스팅 네트워크에서 물리계층 보안을 향상시키기 위한 파워 분할 기반의 아날로그 네트워크 코딩)

  • Lee, Kisong;Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1849-1854
    • /
    • 2017
  • Recently, RF energy harvesting, in which energy is collected from the external RF signals, is considered as a promising technology to resolve the energy shortage problem of wireless sensors. In addition, it is important to guarantee secure communication between sensors for implementing Internet-of-Things. In this paper, we propose a power splitting-based network analog coding for maximizing a physical layer security in 2-hop networks where the wireless-powered relay can harvest energy from the signals transmitted by two sources. We formulate systems where two sources, relay, and eavesdropper exist, and find an optimal power splitting ratio for maximizing the minimum required secrecy capacity using an exhaustive search. Through simulations under various environments, it is demonstrated that the proposed scheme improves the minimum required secrecy capacity by preventing the eavesdropper from overhearing source signals, compared to the conventional scheme.

MADF: Mobile-Assisted Data Forwarding for Wireless Data Networks

  • Xiaoxin;Gary, Shueng-Han;Biswanath;Bharat
    • Journal of Communications and Networks
    • /
    • v.6 no.3
    • /
    • pp.216-225
    • /
    • 2004
  • In a cellular network, if there are too many data users in a cell, data may suffer long delay, and system's quality-of-service (QoS) will degrade. Some traditional schemes such as dynamic channel-allocation scheme (DCA) will assign more channels to hot (or overloaded) cells through a central control system (CC) and the throughput increase will be upper bounded by the number of new channels assigned to the cell. In mobile-assisted data forwarding (MADF), we add an ad-hoc overlay to the fixed cellular infrastructure and special channels-called forwarding channels- are used to connect mobile units in a hot cell and its surrounding cold cells without going through the hot cell's base station. Thus, mobile units in a hot cell can forward data to other cold cells to achieve load balancing. Most of the forwarding-channel management work in MADF is done by mobile units themselves in order to relieve the load from the CC. The traffic increase in a certain cell will not be upper bounded by the number of forwarding channels. It can be more if the users in hot cell are significantly far away from one another and these users can use the same forwarding channels to forward data to different cold neighboring cells without interference. We find that, in a system using MADF, under a certain delay requirement, the throughput in a certain cell or for the whole net-work can be greatly improved.

Epidemic Reliable Multicast by Peer Collaborations in Wireless Tactical Networks (무선 전술 네트워크에서 단말의 협력을 통한 전염 기반의 신뢰성 있는 멀티캐스트)

  • Hong, Min-Ki;Kang, Kyung-Ran;Cho, Young-Jong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.865-875
    • /
    • 2008
  • In this paper, we propose a reliable multicast scheme for the tactical wireless ad hoc network where the members share the situation and operation data. Our scheme consists of two phases to guarantee the reliability. During the dissemination phase, we utilizes an epidemic approach similar to gossip-based ad hoc routing. Then the group members interchange the message reception state information periodically so that they are able to recover missing packets from the other members. We evaluate the performance of our scheme through extensive simulations using the network simulator in comparison with other existing reliable multicast schemes in mobile ad hoc network. Our scheme shows higher packet delivery ratio regardless of the mobility and imposes much lower control overhead to the non-group members compared with the existing schemes.

Study of Optimum Parameters for Improving QoS in Wireless LAN (무선랜 QoS의 성능향상을 위한 최적 파라미터에 관한 연구)

  • Jin, Hyunjoon
    • Journal of IKEEE
    • /
    • v.17 no.2
    • /
    • pp.96-103
    • /
    • 2013
  • Since multimedia data takes large part of realtime transmission in wireless communication environments such as IEEE 802.11, QoS issues became one of the important problems with network performance. 802.11e MAC provides differentiated services based on priority schemes to solve existing 802.11 MAC problems. The TXOP is an important factor with the priority to improve network performance and QoS because it defines the time duration in which multiple frames can be transferred at one time for each station. In this paper, therefore frame sizes, TXOP Limit, and Priority values in accordance with the number of stations are experimented and derived for best network performance and QoS. Using 802.11e standard parameters, simulation results show the best throughput when the number of stations is 5 and TXOP Limit value is 6.016ms. For fairness, the best result is achieved at 3.008ms of TXOP Limit value and 15-31 of CW(Contention Window) that is lower priority than CW 7-15.

A Study on the Binary-Coded Physical-Layer Network Coding with High-Order Modulation Techniques (고차원 변조방식을 적용한 이진 부호화된 물리계층 네트워크 코딩에 관한 연구)

  • Lim, Hyeonwoo;Ban, Tae-Won;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.9
    • /
    • pp.2131-2139
    • /
    • 2014
  • In this paper, a binary-coded physical-layer network coding (PNC) is considered when high-order modulation techniques are used at source nodes in wireless communication environments. In the conventional PNC schemes, tight power control and phase compensation are required at a relay node. However, they may not be feasible in practical wireless communication environments. Thus, we do not assume the pre-equalization in this paper, and we only utilize the channel state information at receiver (CSIR). We propose a signal detection method for the binary-coded PNC with high-order modulation, such as QPSK and 16QAM, at the source nodes, while the conventional scheme only consider the BPSK at source nodes. We also analyze the bit-error performance of the proposed technique in both uncoded and coded cases.

A CSMA/CA with Binary Exponential Back-off based Priority MAC Protocol in Tactical Wireless Networks (전술 무선망에서 2진 지수 백오프를 사용하는 CSMA/CA 기반 우선순위 적용 MAC 프로토콜 설계)

  • Byun, Ae-Ran;Son, Woong;Jang, Youn-Seon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.12-19
    • /
    • 2015
  • In network-centric warfare, the communication network has played a significant role in defeating an enemy. Especially, the urgent and important data should be preferentially delivered in time. Thus, we proposed a priority MAC protocol based on CSMA/CA with Binary Exponential Back-off for tactical wireless networks. This MAC protocol suggested a PCW(Prioritized Contention Window) with differentiated back-off time by priority and a RBR(Repetitive Back-off Reset) to reset the remaining back-off time. The results showed that this proposed MAC has higher performance than those of DCF(Distributed Coordination Function) in the transmission success rate and the number of control packet transmission by reducing the packet collision. Thus, it produced more effective power consumption. In comparison with DCF, this proposed protocol is more suitable in high-traffic network.

An improved LEACH-C routing protocol considering the distance between the cluster head and the base station (클러스터 헤드와 기지국간의 거리를 고려한 향상된 LEACH-C 라우팅 프로토콜)

  • Kim, TaeHyeon;Park, Sea Young;Kwon, Oh Seok;Lee, Jong-Yong;Jung, Kye-Dong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.373-377
    • /
    • 2022
  • Wireless sensor networks are being used in various fields. Wireless sensor networks are applied in many areas, such as security, military detection, environmental management, industrial control, and home automation. There is a problem about the limit of energy that the sensor network basically has. In this paper, we propose the LEACH-CCBD (Low Energy Adaptive Clustering hierarchy - Centrailized with Cluster and Basestation Distance) algorithm that uses energy efficiently by improving network transmission based on LEACH-C among the representative routing protocols. The LEACH-CCBD algorithm is a method of assigning a cluster head to a cluster head by comparing the sum of the distance from the member node to the cluster distance and the distance from the cluster node to the base station with respect to the membership of the member nodes in the cluster when configuring the cluster. The proposed LEACH-CCBD used Matlab simulation to confirm the performance results for each protocol. As a result of the experiment, as the lifetime of the network increased, it was shown to be superior to the LEACH and LEACH-C algorithms.

MLP-A(Multi Link Protection for Airborne Network Verifying) algorithms and implementation in multiple air mobile/verification links (다중 공중 이동/검증 링크에서의 MLP-A 알고리즘 및 구현)

  • Youn, Jong-Taek;Jeong, Hyung-jin;Kim, Yongi;Jeon, Joon-Seok;Park, Juman;Joo, Taehwan;Go, Minsun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.3
    • /
    • pp.422-429
    • /
    • 2022
  • In this paper, the intermediate frequency transmission signal level between the network system-based baseband and RF unit consisting of multi-channel airborne relay devices and a lot of mission devices, which are currently undergoing technology development tasks, is kept constant at the reference signal level. Considering the other party's receiving input range, despite changes in the short-range long-range wireless communication environment, it presents a multi-link protection and MLP-A algorithm that allows signals to be transmitted stably and reliably through signal detection automatic gain control, and experiments and analysis considering short-distance and long-distance wireless environments were performed by designing, manufacturing, and implementing RF units to which MLP-A algorithms were applied, and applying distance calculation equations to the configuration of multiple air movements and verification networks. Through this, it was confirmed that a stable and reliable RF communication system can be operated.